diff --git a/i18n/ar/basics/why-privacy-matters.md b/i18n/ar/basics/why-privacy-matters.md new file mode 100644 index 00000000..3b7c700e --- /dev/null +++ b/i18n/ar/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. هذا لأنك تريد الخصوصية وليس السريَّة. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/ar/index.md b/i18n/ar/index.md index e81c84ea..e9665264 100644 --- a/i18n/ar/index.md +++ b/i18n/ar/index.md @@ -44,7 +44,7 @@ schema: يجب عليك عدم الخلط بين الخصوصية والسريَّة. نحن نعلم ما يحدث في الحَمَّام، لكنك ما زلت تغلق الباب، أليس كذلك؟ هذا لأنك تريد الخصوصية وليس السريَّة. **الجميع** لديه شيء لحمايته. الخصوصية شيء أصيل في البشريَّة. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## ماذا يجب أن أفعل؟ diff --git a/i18n/bn/basics/why-privacy-matters.md b/i18n/bn/basics/why-privacy-matters.md new file mode 100644 index 00000000..e223dc35 --- /dev/null +++ b/i18n/bn/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/bn/index.md b/i18n/bn/index.md index 8ad52c12..58bad79a 100644 --- a/i18n/bn/index.md +++ b/i18n/bn/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/cs/basics/why-privacy-matters.md b/i18n/cs/basics/why-privacy-matters.md new file mode 100644 index 00000000..8b5a2ff2 --- /dev/null +++ b/i18n/cs/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. To proto, že chcete soukromí, ne kvůli utajení něčeho, co v koupelně děláte. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/cs/index.md b/i18n/cs/index.md index a4e747ed..deda9a77 100644 --- a/i18n/cs/index.md +++ b/i18n/cs/index.md @@ -44,7 +44,7 @@ Stejně jako právo na mezirasové manželství, volební právo žen, svoboda p Neplťte si soukromí s utajováním nějaké činnosti. Všichni víme, co se děje v kouplně, ale přesto si zavřete dveře. To proto, že chcete soukromí, ne kvůli utajení něčeho, co v koupelně děláte. **Každý** má co chránit. Soukromí je něco, co nás dělá lidmi. -[:material-target-account: Běžné internetové hrozby](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Co mám dělat? diff --git a/i18n/de/basics/why-privacy-matters.md b/i18n/de/basics/why-privacy-matters.md new file mode 100644 index 00000000..9411e448 --- /dev/null +++ b/i18n/de/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Datenschutz** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Sicherheit** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Das liegt daran, dass du deine Privatsphäre willst, aber nicht unbedingt alles verheimlichen willst. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/de/index.md b/i18n/de/index.md index 2e2f27b7..f3f10797 100644 --- a/i18n/de/index.md +++ b/i18n/de/index.md @@ -44,7 +44,7 @@ schema: Privatsphäre sollte nicht mit Verheimlichen verwechselt werden. Wir wissen, was auf der Toilette passiert, aber machen trotzdem die Tür zu. Das liegt daran, dass du deine Privatsphäre willst, aber nicht unbedingt alles verheimlichen willst. **Alle** haben etwas zu schützen. Privatsphäre ist etwas, das uns zum Menschen macht. -[:material-target-account: Häufige Internet-Bedrohungen](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Was kann ich tun? diff --git a/i18n/el/basics/why-privacy-matters.md b/i18n/el/basics/why-privacy-matters.md new file mode 100644 index 00000000..34f3eecc --- /dev/null +++ b/i18n/el/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Αυτό συμβαίνει επειδή θέλεις ιδιωτικότητα, όχι μυστικότητα. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/el/index.md b/i18n/el/index.md index 81f83c3c..9c71faca 100644 --- a/i18n/el/index.md +++ b/i18n/el/index.md @@ -44,7 +44,7 @@ schema: Δεν πρέπει να μπερδεύεις την ιδιωτικότητα με τη μυστικότητα. Ξέρουμε τι συμβαίνει όσο είσαι στο μπάνιο, αλλά εξακολουθείς να κλείνεις την πόρτα. Αυτό συμβαίνει επειδή θέλεις ιδιωτικότητα, όχι μυστικότητα. **Όλοι** έχουν κάτι να προστατεύσουν. Η ιδιωτικότητα είναι κάτι που μας κάνει ανθρώπους. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Τι πρέπει να κάνω; diff --git a/i18n/eo/basics/why-privacy-matters.md b/i18n/eo/basics/why-privacy-matters.md new file mode 100644 index 00000000..e223dc35 --- /dev/null +++ b/i18n/eo/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/eo/index.md b/i18n/eo/index.md index cca18ca9..9ce79f27 100644 --- a/i18n/eo/index.md +++ b/i18n/eo/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/es/basics/why-privacy-matters.md b/i18n/es/basics/why-privacy-matters.md new file mode 100644 index 00000000..c858cd31 --- /dev/null +++ b/i18n/es/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Por Qué es Importante la Privacidad" +icon: 'material/shield-account' +--- + +En la era moderna de explotación de datos digitales, tu privacidad nunca ha sido más crítica, y sin embargo muchos creen que ya es una causa perdida. No lo es. ==Tu privacidad está en juego==, y debes preocuparte por ella. La privacidad es poder, y es muy importante que ese poder acabe en las manos adecuadas. + +En última instancia, la privacidad tiene que ver con la información humana, y esto es importante porque sabemos que la información humana confiere poder sobre los seres humanos. Si nos preocupamos por nuestra capacidad de ser seres humanos auténticos, realizados y libres, tenemos que preocuparnos por las normas que se aplican a la información sobre nosotros. Gran parte de nuestra sociedad moderna se estructura en torno a la **información**. Cuando compras en línea, lees las noticias, buscas algo, votas, buscas direcciones o cualquier otra cosa, dependes de la información. Si vivimos en una sociedad de la información, nuestra información importa y, por tanto, la privacidad también. + +## ¿Qué es la Privacidad? + +Mucha gente confunde los conceptos de **privacidad**, **seguridad**, y **anonimato**. Por ejemplo, verás a gente criticar varios productos por "no ser privados" cuando en realidad quieren decir que no proporcionan anonimato. En este sitio web tratamos estos tres temas, pero es importante que entiendas la diferencia entre ellos y cuándo entra en juego cada uno. + +**Privacidad** +: + +==La privacidad es la garantía de que tus datos sólo son vistos por las partes a las que van dirigidos. = En el contexto de la mensajería instantánea, por ejemplo, el cifrado de extremo a extremo proporciona privacidad al mantener tu mensaje visible sólo para ti y para el destinatario. + +**Seguridad** +: + +La seguridad es la capacidad de confiar en las aplicaciones que se utilizan -que las partes implicadas son quienes dicen ser- y mantenerlas seguras. En el contexto de la navegación por Internet, por ejemplo, la seguridad puede ser proporcionada por certificados HTTPS. + + Los certificados demuestran que está hablando directamente con el sitio web que visitas y evitan que los atacantes de su red lean o modifiquen los datos enviados al sitio web o desde él. + +**Anonimato** +: + +El anonimato es la capacidad de actuar sin un identificador persistente. Puedes conseguirlo en línea con [Tor](../tor.md), que te permite navegar por Internet con una dirección IP y una conexión de red aleatorias en lugar de las tuyas propias. + + El **pseudonimato** es un concepto similar, pero te permite tener un identificador persistente sin que esté vinculado a tu identidad real. Si todo el mundo te conoce como `@GamerGuy12` online, pero nadie conoce tu nombre real, ese es tu seudónimo. + +Todos estos conceptos se solapan, pero es posible tener cualquier combinación de ellos. Para la mayoría de la gente, el punto óptimo es cuando estos tres conceptos se solapan. Sin embargo, es más difícil de conseguir de lo que muchos creen en un principio. A veces hay que hacer concesiones en algunos aspectos, y eso también está bien. Aquí es donde entra en juego el **modelado de amenazas**, que te permite tomar buenas decisiones sobre [el software y los servicios](../tools.md) que utilizas. + +[:material-book-outline: Aprende más sobre el modelado de amenazas](basics/threat-modeling.md ""){.md-button} + +## Privacidad vs. Secretismo + +Un argumento común contra los movimientos a favor de la privacidad es la noción de que uno no necesita privacidad si no tiene **"nada que ocultar".** Se trata de una idea errónea y peligrosa, porque crea la sensación de que las personas que exigen privacidad deben ser pervertidas, criminales o estar equivocadas. + +==No deberías confundir privacidad con secretismo.== Sabemos lo que sucede en el baño, pero aun así cierras la puerta. Esto se debe a que quieres privacidad, no secretismo. Siempre hay ciertos datos sobre nosotros -por ejemplo, información personal sobre nuestra salud o nuestro comportamiento sexual- que no querríamos que todo el mundo conociera, y eso está bien. La necesidad de privacidad es legítima, y eso es lo que nos hace humanos. La privacidad consiste en potenciar tus derechos sobre tu propia información, no en ocultar secretos. + +## ¿Es la Privacidad una Cuestión de Control? + +Una definición común de privacidad es que es la capacidad de *controlar* quién tiene acceso a tus datos. Es fácil caer en esta trampa, de hecho es la definición de privacidad con la que funcionó este sitio web durante mucho tiempo. Suena bien y atrae a mucha gente, pero en la práctica no funciona. + +Por ejemplo, los formularios de consentimiento de cookies. Es posible que los encuentre docenas de veces al día en los distintos sitios web que visitas, con una bonita serie de casillas de verificación y controles deslizantes que te permiten "comisariar" tus preferencias para que se ajusten exactamente a tus necesidades. Al final, nos limitamos a darle al botón "Acepto", porque sólo queremos leer el artículo o hacer una compra. Nadie quiere completar una auditoría de privacidad personal en cada uno de los sitios web que visita. Se trata de un ejercicio de [arquitectura de elección](https://en.wikipedia.org/wiki/Choice_architecture), diseñado para que tomes el camino más fácil en lugar de adentrarte en un laberinto de opciones de configuración que, para empezar, no tienen por qué existir. + +==El control de tu privacidad dentro de la mayoría de las aplicaciones es una ilusión.== Es un tablero brillante con todo tipo de opciones que puedes elegir sobre tus datos, pero rara vez son las opciones que buscas, como "sólo usar mis datos para ayudarme" Este tipo de control pretende hacerte sentir culpable de tus elecciones, de que "tuviste la opción" de hacer más privadas las aplicaciones que utilizas y elegiste no hacerlo. + +La privacidad es algo que tenemos que tener incorporado en [el software y los servicios](../tools.md) que utilizamos por defecto, no puedes hacer que la mayoría de las aplicaciones sean privadas por tu cuenta. + +## Fuentes + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) por Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants en GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/es/email-clients.md b/i18n/es/email-clients.md index 19a0ce0f..d458f92c 100644 --- a/i18n/es/email-clients.md +++ b/i18n/es/email-clients.md @@ -66,11 +66,11 @@ Estas opciones se encuentran en :material-menu: → **Ajustes** → **Privacidad **Apple Mail** está incluido en macOS y puede ampliarse para que sea compatible con OpenPGP con [GPG Suite](encryption.md#gpg-suite), que añade la posibilidad de enviar correo electrónico cifrado con PGP. - [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} + [:octicons-home-16: Página Principal](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Política de Privacidad" } + [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentación} -Apple Mail has the ability to load remote content in the background or block it entirely and hide your IP address from senders on [macOS](https://support.apple.com/guide/mail/mlhl03be2866/mac) and [iOS](https://support.apple.com/guide/iphone/iphf084865c7/ios). +Apple Mail tiene la capacidad de cargar contenido remoto en segundo plano o bloquearlo por completo y ocultar su dirección IP a los remitentes en [macOS](https://support.apple.com/guide/mail/mlhl03be2866/mac) e [iOS](https://support.apple.com/guide/iphone/iphf084865c7/ios). ### Canary Mail (iOS) diff --git a/i18n/es/index.md b/i18n/es/index.md index 29455227..4dd035f9 100644 --- a/i18n/es/index.md +++ b/i18n/es/index.md @@ -44,7 +44,7 @@ Al igual que el derecho al matrimonio interracial, el sufragio femenino, la libe No deberías confundir privacidad con secretismo. Sabemos lo que pasa en el cuarto de baño, pero aún así cierras la puerta. Esto se debe a que quieres privacidad, no secretismo. **Todo el mundo** tiene algo que proteger. La privacidad es algo que nos hace humanos. -[:material-target-account: Amenazas Comunes en Internet](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Por Qué es Importante la Privacidad](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## ¿Qué debo hacer? diff --git a/i18n/es/news-aggregators.md b/i18n/es/news-aggregators.md index 15425285..22c974e0 100644 --- a/i18n/es/news-aggregators.md +++ b/i18n/es/news-aggregators.md @@ -99,7 +99,7 @@ Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una ma ![NetNewsWire logo](assets/img/news-aggregators/netnewswire.png){ align=right } - **NetNewsWire** es un lector de fuentes gratuito y de código abierto para macOS e iOS centrado en un diseño y unas funciones nativos. It supports the typical feed formats alongside built-in support for Reddit feeds. + **NetNewsWire** es un lector de fuentes gratuito y de código abierto para macOS e iOS centrado en un diseño y unas funciones nativos. Es compatible con los formatos de fuente típicos, además incluye soporte integrado para fuentes de Reddit. [:octicons-home-16: Página Principal](https://netnewswire.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Política de Privacidad" } diff --git a/i18n/es/passwords.md b/i18n/es/passwords.md index f0e2515d..c5f52d60 100644 --- a/i18n/es/passwords.md +++ b/i18n/es/passwords.md @@ -177,9 +177,9 @@ El código del lado del servidor de Bitwarden es [de código abierto](https://gi **1Password** es un administrador de contraseñas con un fuerte enfoque en la seguridad y la facilidad de uso, que le permite almacenar contraseñas, tarjetas de crédito, licencias de software y cualquier otra información sensible en una bóveda digital segura. Su bóveda es alojada en los servidores de 1Password por una [cuota mensual](https://1password.com/sign-up/). 1Password es [audited](https://support.1password.com/security-assessments/) de forma regular y ofrece una atención al cliente excepcional. 1Password es de código cerrado; sin embargo, la seguridad del producto está exhaustivamente documentada en su [libro blanco de seguridad](https://1passwordstatic.com/files/security/1password-white-paper.pdf). - [:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} + [:octicons-home-16: Página Principal](https://1password.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Política de Privacidad" } + [:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentación} ??? downloads "Descargas" diff --git a/i18n/fa/basics/why-privacy-matters.md b/i18n/fa/basics/why-privacy-matters.md new file mode 100644 index 00000000..e223dc35 --- /dev/null +++ b/i18n/fa/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/fa/index.md b/i18n/fa/index.md index 46b341f7..b148d03e 100644 --- a/i18n/fa/index.md +++ b/i18n/fa/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/fr/basics/why-privacy-matters.md b/i18n/fr/basics/why-privacy-matters.md new file mode 100644 index 00000000..5a103865 --- /dev/null +++ b/i18n/fr/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Confidentialité** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Sécurité** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. C'est parce que vous voulez une vie privée, et non pas du secret. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/fr/index.md b/i18n/fr/index.md index e70e59ef..4bd52009 100644 --- a/i18n/fr/index.md +++ b/i18n/fr/index.md @@ -44,7 +44,7 @@ Tout comme le droit au mariage mixte, le droit de vote des femmes, la liberté d Il ne faut pas confondre la vie privée et le secret. Même si on sait ce qui se passe dans la salle de bain, vous fermez quand même la porte. C'est parce que vous voulez une vie privée, et non pas du secret. **Tout le monde** a quelque chose à protéger. La vie privée est quelque chose qui nous rend humains. -[:material-target-account: Menaces Internet courantes](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Que dois-je faire ? diff --git a/i18n/he/basics/why-privacy-matters.md b/i18n/he/basics/why-privacy-matters.md new file mode 100644 index 00000000..bb48d5ef --- /dev/null +++ b/i18n/he/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**פרטיות** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**אבטחה** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. זה בגלל שאתה רוצה פרטיות, לא סודיות. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## מקורות + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/he/index.md b/i18n/he/index.md index c6ada5ac..35cdd063 100644 --- a/i18n/he/index.md +++ b/i18n/he/index.md @@ -44,7 +44,7 @@ schema: אין לבלבל בין פרטיות לסודיות. אנחנו יודעים מה קורה בשירותים, אבל עדיין סוגרים את הדלת. זה בגלל שאתה רוצה פרטיות, לא סודיות. **לכל** אחד יש על מה להגן. פרטיות היא משהו שהופך אותנו לאנושיים. -[:material-target-account: איומי אינטרנט נפוצים](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## מה אני צריך לעשות? diff --git a/i18n/hi/basics/why-privacy-matters.md b/i18n/hi/basics/why-privacy-matters.md new file mode 100644 index 00000000..e223dc35 --- /dev/null +++ b/i18n/hi/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/hi/index.md b/i18n/hi/index.md index 531bf330..8c300bc8 100644 --- a/i18n/hi/index.md +++ b/i18n/hi/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/hu/basics/why-privacy-matters.md b/i18n/hu/basics/why-privacy-matters.md new file mode 100644 index 00000000..e89f1ec1 --- /dev/null +++ b/i18n/hu/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Adatvédelem** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Adatbiztonság** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Ez azért van, mert magánéletet akarsz, nem titoktartást. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/hu/index.md b/i18n/hu/index.md index 2e5de347..4eb390c3 100644 --- a/i18n/hu/index.md +++ b/i18n/hu/index.md @@ -44,7 +44,7 @@ A kultúrák közötti házassághoz, a női választójoghoz, a szólásszabads Nem szabad összekeverni a magánéletet a titoktartással. Tudjuk, hogy mi történik a mosdóban, de az ajtó mégis becsukjuk. Ez azért van, mert magánéletet akarsz, nem titoktartást. **Mindenkinek** van valami, amit meg akar védeni. A magánélet olyasmi, ami emberré tesz minket. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Mihez kezdjek? diff --git a/i18n/id/basics/why-privacy-matters.md b/i18n/id/basics/why-privacy-matters.md new file mode 100644 index 00000000..f438ddef --- /dev/null +++ b/i18n/id/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privasi** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Keamanan** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Itu karena Anda menginginkan privasi, bukan kerahasiaan. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sumber + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/id/index.md b/i18n/id/index.md index 9cd3d087..5ea48e41 100644 --- a/i18n/id/index.md +++ b/i18n/id/index.md @@ -44,7 +44,7 @@ Sama seperti hak untuk menikah antar ras, hak pilih perempuan, kebebasan berbica Anda tidak harus bingung antara privasi dengan kerahasiaan. Kami tahu apa yang terjadi di kamar mandi, tapi Anda tetap menutup pintunya. Itu karena Anda menginginkan privasi, bukan kerahasiaan. **Setiap orang** memiliki sesuatu untuk dilindungi. Privasi adalah sesuatu yang membuat kita menjadi manusia. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Apa yang harus saya lakukan? diff --git a/i18n/it/about/index.md b/i18n/it/about/index.md index 72af6baa..b0aefadb 100644 --- a/i18n/it/about/index.md +++ b/i18n/it/about/index.md @@ -21,7 +21,7 @@ schema: **Privacy Guides** è un sito web a sfondo sociale che fornisce [informazioni](/kb) per proteggere la sicurezza e la privacy dei dati. La nostra missione è informare il pubblico sul valore della privacy digitale e sulle iniziative governative globali che mirano a monitorare la vostra attività online. Siamo un collettivo senza scopo di lucro gestito interamente da [membri del team](https://discuss.privacyguides.net/g/team) e collaboratori volontari. Il nostro sito è privo di pubblicità e non è affiliato a nessuno dei fornitori elencati. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Pagina principale } +[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Pagina Principale } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Codice sorgente" } [:octicons-heart-16:](donate.md){ .card-link title=Contribuisci } diff --git a/i18n/it/android.md b/i18n/it/android.md index 3cdec65f..4d714f70 100644 --- a/i18n/it/android.md +++ b/i18n/it/android.md @@ -83,7 +83,7 @@ schema: **Android Open Source Project** è un sistema operativo mobile open-source sviluppato da Google che viene utilizzato nella maggior parte dei dispositivi mobile del mondo. La maggior parte dei telefoni venduti con Android sono modificati per includere integrazioni e applicazioni invasive come Google Play Services, quindi è possibile migliorare significativamente la privacy sul proprio dispositivo mobile sostituendo l'installazione predefinita del telefono con una versione di Android priva di queste caratteristiche invasive. -[:octicons-home-16:](https://source.android.com/){ .card-link title="Pagina principale" } +[:octicons-home-16:](https://source.android.com/){ .card-link title="Pagina Principale" } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentazione} [:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Codice sorgente" } @@ -110,8 +110,8 @@ Consigliamo di installare sul dispositivo uno dei seguenti sistemi operativi bas GrapheneOS offre miglioramenti aggiuntivi in termini di [hardening della sicurezza] (https://it.wikipedia.org/wiki/Hardening) e di privacy. Dispone di un [allocatore di memoria rafforzato](https://github.com/GrapheneOS/hardened_malloc), di autorizzazioni per la rete e per i sensori, di varie altre [caratteristiche di sicurezza](https://grapheneos.org/features). GrapheneOS viene inoltre fornito con aggiornamenti completi del firmware e build firmate, quindi il verified boot è pienamente supportato. - [:octicons-home-16: Pagina principale](https://signal.org/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://signal.org/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentazione} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://grapheneos.org/donate/){ .card-link title=Contribuisci } @@ -131,9 +131,9 @@ I telefoni Google Pixel sono gli unici dispositivi che attualmente soddisfano i **DivestOS** è un soft-fork di [LineageOS](https://lineageos.org/). DivestOS eredita molti [dispositivi supportati] (https://divestos.org/index.php?page=devices&base=LineageOS) da LineageOS. Fornisce build firmate, che consentono di avere [verified boot](https://source.android.com/security/verifiedboot) su alcuni dispositivi non-Pixel. - [:octicons-home-16: Pagnia principale](https://divestos.org){ .md-button .md-button--primary } + [:octicons-home-16: Pagnia Principale](https://divestos.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title=Onion } - [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribuisci } @@ -224,8 +224,8 @@ In questo sito raccomandiamo un'ampia gamma di applicazioni per Android. Le app **Auditor * * è un'app che sfrutta le funzionalità di sicurezza hardware per fornire il monitoraggio dell'integrità del dispositivo convalidando attivamente l'identità di un dispositivo e l'integrità del suo sistema operativo. Attualmente funziona solo con GrapheneOS o con il sistema operativo stock per i [dispositivi supportati](https://attestation.app/about#device-support). - [:octicons-home-16: Pagina principale](https://attestation.app){ .md-button .md-button--primary } - [:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://attestation.app){ .md-button .md-button--primary } + [:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://attestation.app/about){ .card-link title=Documentazione} [:octicons-code-16:](https://attestation.app/source){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://attestation.app/donate){ .card-link title=Contribuisci } @@ -317,7 +317,7 @@ Il Google Play Store richiede un account Google per l'accesso, il che non è un **Aurora Store** è un client di Google Play Store che non richiede un account Google, Google Play Services o microG per scaricare le app. - [:octicons-home-16: Pagina principale](https://auroraoss.com/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://auroraoss.com/){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Codice sorgente" }. ??? download diff --git a/i18n/it/basics/why-privacy-matters.md b/i18n/it/basics/why-privacy-matters.md new file mode 100644 index 00000000..4bcc340a --- /dev/null +++ b/i18n/it/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Perchè la Privacy è importante" +icon: 'material/shield-account' +--- + +Nell'era moderna dello sfruttamento dei dati digitali, la tua privacy non è mai stata così importante, eppure molti credono che sia già una causa persa. Non è così. ==La tua privacy è in palio==, e devi prendertene cura. La Privacy è questione di potere, ed è molto importante che questo potere finisca nelle mani giuste. + +La privacy riguarda dopotutto le informazioni umane, e questo è importante poiché sappiamo che le informazioni umane conferiscono potere sugli esseri umani. Se ci interessa la nostra capacità di diventare esseri umani autentici, realizzati e liberi, dobbiamo preoccuparci innanzitutto delle regole che si applicano alle informazioni che ci riguardano. Gran parte della società moderna in cui viviamo si basa sulle **informazioni**. Quando fai acquisti online, leggi notizie, cerchi qualcosa, voti, cerchi indicazioni stradali o qualsiasi altra cosa, ti stai affidando a informazioni. Se viviamo in una società basata sulle informazioni, le nostre informazioni sono importanti e di conseguenza la privacy è importante. + +## Che cos'è la Privacy? + +Molte persone confondono il significato di **privacy**, **sicurezza**, e **anonimato**. Vedrai persone criticare diversi prodotti definendoli "non privati", quando in realtà intendono che non forniscono l'anonimato, per esempio. In questo sito, trattiamo tutti e tre gli argomenti, ma è importante capire la differenza tra loro e quando ciascuno di essi entra in gioco. + +**Privacy** +: + +==La privacy è la garanzia che i tuoi dati siano visti solo dalle parti a cui intendi farli visualizzare.== Nel contesto di un'app di messaggistica istantanea, ad esempio, la crittografia end-to-end fornisce la privacy mantenendo il messaggio visibile solo a te stesso e al destinatario. + +**Sicurezza** +: + +La sicurezza è la capacità di fidarsi delle applicazioni che utilizzi—che le parti coinvolte sono quelle che dicono di essere—e di mantenerle sicure. Nel contesto della navigazione web, per esempio, la sicurezza può essere fornita attraverso i certificati HTTPS. + + I certificati dimostrano che stai parlando effettivamente con il sito che stai visitando, impedendo agli aggressori presenti sulla tua rete di leggere o modificare i dati inviati o ricevuti dal sito web. + +**Anonimato** +: + +L'anonimato è la capacità di agire senza un identificatore persistente. È possibile ottenere questo risultato online utilizzando [Tor](../tor.md), che consente di navigare in Internet con un indirizzo IP ed una connessione di rete casuale anziché la tua. + + **Pseudonimato** è un concetto simile, ma ti consente di avere un identificatore persistente che non viene legato alla tua vera identità. Se tutti ti conoscono come `@GamerGuy12` online, ma nessuno conosce il tuo vero nome, quello è il tuo pseudonimo. + +Tutti questi concetti si sovrappongono, ma è possibile avere qualsiasi combinazione di tutti e tre. La perfezione per la maggior parte delle persone la si raggiunge quando tutti e tre i concetti si sovrappongono. Tuttavia, è più difficile da raggiungere di quanto molti credano inizialmente. A volte, dovrai sacrificarne uno dei 3, e va bene anche così. È qui che entra in gioco la **modellazione delle minacce** che consente di prendere decisioni informate sui [software e sui servizi](../tools.md) da utilizzare. + +[:material-book-outline: Per saperne di più sulla Modellazione delle minacce](basics/threat-modeling.md ""){.md-button} + +## Privacy vs Segretezza + +Una controargomentazione abbastanza comune ai movimenti a favore della privacy è l'idea che una persona non ha bisogno di privacy se non ha **"nulla da nascondere".** Si tratta di un concetto sbagliato e pericoloso, perché da l'idea che le persone che richiedono la privacy debbano essere devianti, criminali o sbagliate. + +==Non bisogna confondere la privacy con la segretezza.== Sappiamo cosa succede in bagno, ma comunque tu chiudi la porta. Questo perché vuoi la privacy, non la segretezza. Ci sono sempre alcuni fatti che ci riguardano—per esempio, informazioni sulla salute personale o sulle abitudini sessuali—che non vorremmo che il mondo intero conoscesse, ed è giusto così. La necessità di privacy è legittima, ed è questo che ci rende umani. La privacy consiste nel rafforzare i diritti sulle proprie informazioni, non nel nascondere i segreti. + +## La privacy è controllo? + +Una definizione comune di privacy è che si tratta della possibilità di *controllare* chi ha accesso ai tuoi dati. È una trappola in cui è facile caderci, infatti è la definizione di privacy su cui abbiamo gestito questo sito per molto tempo. Sembra bello, piace a molte persone, ma in pratica non funziona. + +Prendi i moduli di consenso per i cookie ad esempio. Potresti trovarli decine di volte al giorno sui vari siti web che visiti, con una bella serie di caselle e slider che ti consentono di "selezionare" le preferenze per adattarle alle tue esigenze. Alla fine, ci limitiamo a cliccare il pulsante "Accetto", perché vogliamo solo leggere l'articolo o fare un acquisto. Nessuno vuole completare una verifica della propria privacy personale su ogni singolo sito web che visita. Si tratta di un esercizio di [architettura delle scelte](https://en.wikipedia.org/wiki/Choice_architecture), progettato per farvi prendere la via d'uscita più veloce invece di addentrarvi in un labirinto di opzioni di configurazione che non hanno bisogno di esistere in primo luogo. + +==Il controllo della tua privacy all'interno della maggior parte delle app è soltanto un'illusione.== È un'interfaccia scintillante con ogni tipo di scelta che si può fare con i propri dati, ma raramente riesci a trovare le scelte che stai effettivamente cercando, come "usa i miei dati solo per aiutarmi" Questo tipo di controllo ha lo scopo di farti sentire in colpa per le tue scelte, perché "potevi scegliere" di rendere private le app che utilizzi di solito e hai deciso di non farlo. + +La privacy è un elemento che deve essere integrato nei [ software e nei servizi](../tools.md) che utilizziamo di default; non puoi rendere la maggior parte delle app private da solo. + +## Fonti + +- [Perchè la Privacy è importante](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) di Neil Richards +- [Il nuovo petrolio: Perchè la privacy & la sicurezza sono importanti](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants su GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/it/calendar.md b/i18n/it/calendar.md index 5e1a8aa2..f714d1b5 100644 --- a/i18n/it/calendar.md +++ b/i18n/it/calendar.md @@ -19,7 +19,7 @@ I calendari contengono alcuni dei vostri dati più sensibili; utilizzate prodott Calendari multipli e funzionalità di condivisione estese sono limitate agli abbonati a pagamento. [:octicons-home-16: Pagina principale](https://tutanota.com/calendar){ .md-button .md-button--primary } - [:octicons-eye-16:](https://tutanota.com/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://tutanota.com/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://tutanota.com/faq){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://tutanota.com/community/){ .card-link title=Contribuisci } @@ -43,7 +43,7 @@ I calendari contengono alcuni dei vostri dati più sensibili; utilizzate prodott **Proton Calendar** è un servizio di calendario criptato disponibile per i membri Proton tramite web o client mobile. Le caratteristiche includono: E2EE automatico di tutti i dati, funzioni di condivisione, funzionalità di importazione/esportazione e [altre funzionalità](https://proton.me/support/proton-calendar-guide). Gli utenti gratuiti hanno accesso ad un singolo calendario, mentre gli abbonati a pagamento possono crearne fino a 20. Anche la funzionalità di condivisione avanzata è limitata agli abbonati a pagamento. [:octicons-home-16: Pagina principale](https://proton.me/calendar){ .md-button .md-button--primary } - [:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="informativa sulla privacy" } + [:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://proton.me/support/proton-calendar-guide){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Codice sorgente" } diff --git a/i18n/it/cryptocurrency.md b/i18n/it/cryptocurrency.md index 1d372719..ec366535 100644 --- a/i18n/it/cryptocurrency.md +++ b/i18n/it/cryptocurrency.md @@ -21,7 +21,7 @@ Effettuare pagamenti online è una delle maggiori sfide per la privacy. Queste c **Monero** utilizza una blockchain con tecnologie che migliorano la privacy e offuscano le transazioni per ottenere l'anonimato. Ogni transazione Monero nasconde l'importo della transazione, gli indirizzi di invio e ricezione, e la fonte dei fondi senza dover fare i salti mortali, il che la rende una scelta ideale per i neofiti delle criptovalute. - [:octicons-home-16: Pagina principale](https://www.getmonero.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://www.getmonero.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Codice Sorgente" } [:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribuisci } diff --git a/i18n/it/data-redaction.md b/i18n/it/data-redaction.md index 852fd310..6d792742 100644 --- a/i18n/it/data-redaction.md +++ b/i18n/it/data-redaction.md @@ -118,10 +118,10 @@ L'applicazione offre diversi modi per cancellare i metadati dalle immagini. Ovve Spesso è usato come un componente di altre applicazioni di rimozione Exif ed è presente nei repository della maggior parte delle distribuzioni Linux. - [:octicons-home-16: Homepage](https://exiftool.org){ .md-button .md-button--primary } - [:octicons-info-16:](https://exiftool.org/faq.html){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/exiftool/exiftool){ .card-link title="Source Code" } - [:octicons-heart-16:](https://exiftool.org/#donate){ .card-link title=Contribute } + [:octicons-home-16: Pagina principale](https://exiftool.org){ .md-button .md-button--primary } + [:octicons-info-16:](https://exiftool.org/faq.html){ .card-link title=Documentazione} + [:octicons-code-16:](https://github.com/exiftool/exiftool){ .card-link title="Codice sorgente" } + [:octicons-heart-16:](https://exiftool.org/#donate){ .card-link title=Contribuisci } ??? download diff --git a/i18n/it/desktop-browsers.md b/i18n/it/desktop-browsers.md index 9abf4a26..34830c99 100644 --- a/i18n/it/desktop-browsers.md +++ b/i18n/it/desktop-browsers.md @@ -69,16 +69,16 @@ Se hai bisogno di navigare in Internet in modo anonimo, dovresti invece usare [T **Mullvad Browser** è una versione di [Tor Browser](tor.md#tor-browser) con le integrazioni della rete Tor rimosse, con l'obiettivo di fornire le tecnologie anti-fingerprinting di Tor Browser agli utenti che usano una VPN. È sviluppato dal Progetto Tor e distribuito da [Mullvad](vpn.md#mullvad) e **non** richiede l'uso della VPN di Mullvad. - [:octicons-home-16: Pagina principale](https://mullvad.net/en/browser){ .md-button .md-button--primary } - [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://mullvad.net/en/browser){ .md-button .md-button--primary } + [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentazione} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Codice sorgente" } - ??? downloads + ??? download - - [:simple-windows11: Windows](https://mullvad.net/en/download/browser/windows) - - [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos) - - [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux) + - [:simple-windows11: Windows](https://mullvad.net/it/download/browser/windows) + - [:simple-apple: macOS](https://mullvad.net/it/download/browser/macos) + - [:simple-linux: Linux](https://mullvad.net/it/download/browser/linux) Come [Tor Browser](tor.md), Mullvad Browser è progettato per prevenire il fingerprinting rendendo l'impronta digitale del browser identica a quella di tutti gli altri utenti di Mullvad Browser e include impostazioni ed estensioni predefinite che vengono configurate automaticamente dai livelli di sicurezza predefiniti: *Standard*, *Safer* e *Safest*. Pertanto, è indispensabile **non** modificare il browser oltre i livelli di sicurezza [predefiniti](https://tb-manual.torproject.org/security-settings/). Altre modifiche renderebbero l'impronta digitale unica, vanificando lo scopo dell'utilizzo di questo browser. Se desideri configurare il tuo browser in modo più completo e il fingerprinting non vi preoccupa, vi consigliamo di utilizzare [Firefox](#firefox). @@ -110,8 +110,8 @@ Mullvad Browser utilizza DuckDuckGo come [motore di ricerca](search-engines.md) **Firefox** offre robuste impostazioni di privacy, come la [protezione antitracciamento avanzata](https://support.mozilla.org/it/kb/protezione-antitracciamento-avanzata-firefox-desktop), che aiuta a bloccare varie [tipologie di tracciamento](https://support.mozilla.org/it/kb/protezione-antitracciamento-avanzata-firefox-desktop#w_che-cosa-viene-bloccato-con-la-protezione-antitracciamento-avanzata). - [:octicons-home-16: Pagina principale](https://firefox.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://firefox.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentazione} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribuisci } @@ -202,11 +202,11 @@ Arkenfox mira solo a contrastare gli script di tracciamento di base o ingenui at **Brave Browser** include un content blocker integrato e [funzionalità di privacy](https://brave.com/privacy-features/), molte delle quali attive in modo predefinito. - Brave è sviluppato a partire dal progetto del browser web Chromium, quindi dovrebbe risultare familiare e avere problemi minimi di compatibilità con i siti web. + Brave è stato sviluppato utilizzando il progetto del browser Chromium, quindi dovrebbe risultarti familiare e avrai pochi problemi di compatibilità con i vari siti web. [:octicons-home-16: Pagina principale](https://brave.com/){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Servizio Onion" } - [:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Codice sorgente" } diff --git a/i18n/it/desktop.md b/i18n/it/desktop.md index ab0502c3..a4c926fd 100644 --- a/i18n/it/desktop.md +++ b/i18n/it/desktop.md @@ -19,7 +19,7 @@ Le distribuzioni Linux sono comunemente consigliate per la protezione della priv **Fedora Workstation** è la distribuzione che raccomandiamo per utenti nuovi a Linux. Fedora generalmente adotta tecnologie più recenti prima di altre distribuzioni, ad esempio [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org), e presto, [FS-Verity](https://fedoraproject.org/wiki/Changes/FsVerityRPM). Queste nuove tecnologie spesso comportano miglioramenti alla sicurezza, privacy e usabilità in generale. - [:octicons-home-16: Pagina principale](https://getfedora.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://getfedora.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentazione} [:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribuisci } @@ -35,7 +35,7 @@ Fedora ha un ciclo di rilascio semi-rolling. Mentre alcuni pacchetti come [GNOME openSUSE Tumbleweed ha un sistema di [aggiornamenti "transazionali"](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) che usa [Btrfs](https://it.wikipedia.org/wiki/Btrfs) e [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) per assicurare che le istantanee possano essere ripristinate in caso di problemi. - [:octicons-home-16: Pagina principale](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } [:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentazione} [:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribuisci } @@ -49,7 +49,7 @@ Tumbleweed segue un modello di rilascio continuo in cui ogni aggiornamento viene **Arch Linux** è una distribuzione leggera, fai-da-te (DIY) che significa che ottieni solo ciò che installi. Per maggiori informazioni visita le loro [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). - [:octicons-home-16: Pagina principale](https://archlinux.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://archlinux.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentazione} [:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribuisci } @@ -69,7 +69,9 @@ Gran parte dei [pacchetti di Arch Linux](https://reproducible.archlinux.org) son **Fedora Silverblue** e **Fedora Kinoite** sono varianti immutabili di Fedora con una forte attenzione al flussi di lavoro basato su contenitori. Silverblue viene fornito con l'ambiente desktop [GNOME](https://www.gnome.org/) mentre Kinoite viene fornito con [KDE](https://kde.org/). Silverblue e Kinoite seguono lo stesso programma di rilascio di Fedora Workstation, beneficiando degli stessi aggiornamenti veloci e rimanendo molto vicini all'upstream. - [Visita silverblue.fedoraproject.org](https://silverblue.fedoraproject.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://silverblue.fedoraproject.org/){ .md-button .md-button--primary } + [:octicons-info-16:](https://docs.fedoraproject.org/it/fedora-silverblue//){ .card-link title=Documentazione} + [:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribuisci } Silverblue (e Kinoite) differiscono da Fedora Workstation perché sostituiscono il gestore di pacchetti [DNF](https://fedoraproject.org/wiki/DNF) con un'alternativa molto più avanzata chiamata [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/rawhide/system-administrators-guide/package-management/rpm-ostree/). Il gestore di pacchetti `rpm-ostree` funziona scaricando un'immagine di base per il sistema, quindi sovrapponendo i pacchetti in un albero di commit simile a [git](https://en.wikipedia.org/wiki/Git). Quando il sistema viene aggiornato, viene scaricata una nuova immagine di base e le sovrapposizioni vengono applicate a questa nuova immagine. @@ -87,7 +89,7 @@ Come alternativa a Flatpaks, c'è l'opzione di [Toolbox](https://docs.fedoraproj NixOS è una distribuzione indipendente basata sul gestore di pacchetti Nix con una particolare attenzione alla riproducibilità e all'affidabilità. - [:octicons-home-16: Pagina principale](https://nixos.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://nixos.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentazione} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribuisci } @@ -111,7 +113,7 @@ Nix è un gestore di pacchetti basato sul codice sorgente; se non c'è nessun pa **Whonix** è basato su [Kicksecure](https://www.whonix.org/wiki/Kicksecure), un fork di Debian focalizzato sulla sicurezza. Mira a fornire privacy, sicurezza e anonimato su internet. Whonix è meglio utilizzato insieme a [Qubes OS](#qubes-os). - [:octicons-home-16: Pagina principale](https://www.whonix.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://www.whonix.org/){ .md-button .md-button--primary } [:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Servizio onion" } [:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentazione} [:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribuisci } @@ -132,7 +134,7 @@ Whonix è utilizzato al meglio [in combinazione con Qubes](https://www.whonix.or **Tails** è un sistema operativo live basato su Debian che instrada tutte le comunicazioni attraverso Tor, che può essere avviato su quasi tutti i computer da un'installazione su DVD, chiavetta USB o scheda SD. Utilizza [Tor](tor.md) per preservare la privacy e l'anonimato aggirando la censura e non lascia traccia di sé sul computer su cui viene utilizzato una volta spento. - [:octicons-home-16: Pagina principale](https://tails.boum.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://tails.boum.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentazione} [:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribuisci } @@ -152,10 +154,10 @@ Da progettazione, Tails è previsto che si ripristini completamente dopo ogni ri **Qubes OS** è un sistema operativo open-source progettato per fornire una forte sicurezza per i computer desktop. È basato su Xen, sul sistema X Window e su Linux, e può eseguire/utilizzare la maggior parte delle applicazioni/driver di Linux. - [:octicons-home-16: Pagina principale](https://www.qubes-os.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://www.qubes-os.org/){ .md-button .md-button--primary } [:material-arrow-right-drop-circle: Panoramica](os/qubes-overview.md){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Servizio Onion" } - [:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentazione } [:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribuisci } diff --git a/i18n/it/dns.md b/i18n/it/dns.md index e11ea548..5994d8af 100644 --- a/i18n/it/dns.md +++ b/i18n/it/dns.md @@ -67,7 +67,7 @@ I software proxy per il DNS cifrato forniscono un proxy locale a cui inoltrare l **RethinkDNS** è un client Android open-source che supporta [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh), [DNS-over-TLS](advanced/dns-overview.md#dns-over-tls-dot), [DNSCrypt](advanced/dns-overview.md#dnscrypt) e DNS Proxy oltre a memorizzare nella cache le risposte DNS, registrare localmente le query DNS e può essere usato anche come firewall. [:octicons-home-16: Pagina principale](https://rethinkdns.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Informativa sulla Privacy" } + [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Codice Sorgente" } @@ -84,7 +84,7 @@ I software proxy per il DNS cifrato forniscono un proxy locale a cui inoltrare l **dnscrypt-proxy** è un proxy DNS con supporto per [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh) e [DNS anonimizzato](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). - !!! warning "La funzione DNS anonimizzato [**non**](advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) anonimizza il resto del traffico di rete." + !!! attenzione "La funzione DNS anonimizzato [**non**](advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) anonimizza il resto del traffico di rete." [:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentazione} @@ -112,7 +112,7 @@ Una soluzione DNS self-hosted è utile per fornire il filtraggio su piattaforme AdGuard Home è dotato di un'interfaccia web raffinata per visualizzare gli insight e gestire i contenuti bloccati. [:octicons-home-16: Pagina principale](https://adguard.com/adguard-home/overview.html){ .md-button .md-button--primary } - [:octicons-eye-16:](https://adguard.com/privacy/home.html){ .card-link title="Informativa sulla Privacy" } + [:octicons-eye-16:](https://adguard.com/privacy/home.html){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://github.com/AdguardTeam/AdGuardHome/wiki){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/AdguardTeam/AdGuardHome){ .card-link title="Codice sorgente" } @@ -127,7 +127,7 @@ Una soluzione DNS self-hosted è utile per fornire il filtraggio su piattaforme Pi-hole è stato progettato per essere eseguito su un Raspberry Pi, ma non è limitato a tale hardware. Il software dispone di un'interfaccia web intuitiva per visualizzare gli insight e gestire i contenuti bloccati. [:octicons-home-16: Pagina principale](https://pi-hole.net/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Informativa sulla Privacy" } + [:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribuisci } diff --git a/i18n/it/email-clients.md b/i18n/it/email-clients.md index 52bf04f8..4a1b4dff 100644 --- a/i18n/it/email-clients.md +++ b/i18n/it/email-clients.md @@ -26,7 +26,7 @@ Il nostro elenco di raccomandazioni contiene client di posta elettronica che sup **Thunderbird** è un client di posta elettronica, newsgroup, news feed e chat (XMPP, IRC, Twitter) gratuito, open-source e multipiattaforma, sviluppato dalla comunità Thunderbird e precedentemente dalla Mozilla Foundation. [:octicons-home-16: Pagina principale](https://www.thunderbird.net){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentazione} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Codice sorgente" } @@ -81,7 +81,7 @@ Apple Mail ha la possibilità di caricare contenuti in remoto in background o di **Canary Mail** è un client di posta elettronica a pagamento progettato per rendere perfetta la crittografia end-to-end con funzioni di sicurezza come il blocco biometrico dell'app. [:octicons-home-16: Pagina principale](https://canarymail.io){ .md-button .md-button--primary } - [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentazione} ??? download @@ -105,7 +105,7 @@ Canary Mail è closed-source. Lo consigliamo a causa della scarsa scelta di clie **FairEmail** è un'applicazione di posta elettronica minimale e open-source, che utilizza standard aperti (IMAP, SMTP, OpenPGP) con un basso consumo di dati e batteria. [:octicons-home-16: Pagina principale](https://email.faircode.eu){ .md-button .md-button--primary } - [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribuisci } @@ -124,7 +124,7 @@ Canary Mail è closed-source. Lo consigliamo a causa della scarsa scelta di clie **Evolution** è un'applicazione per la gestione delle informazioni personali che fornisce funzionalità integrate di posta, calendario e rubrica. Evolution dispone di un'ampia [documentazione](https://help.gnome.org/users/evolution/stable/) per aiutarti a iniziare. [:octicons-home-16: Pagina principale](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } - [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentazione} [:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribuisci } @@ -144,7 +144,7 @@ Canary Mail è closed-source. Lo consigliamo a causa della scarsa scelta di clie In futuro, K-9 Mail sarà il client [ufficiale](https://k9mail.app/2022/06/13/K-9-Mail-and-Thunderbird.html) di Thunderbird per Android. [:octicons-home-16: Pagina principale](https://k9mail.app){ .md-button .md-button--primary } - [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/k9mail/k-9){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribuisci } @@ -166,12 +166,7 @@ Canary Mail è closed-source. Lo consigliamo a causa della scarsa scelta di clie ![Logo Kontact](assets/img/email-clients/kontact.svg){ align=right } - **Kontact** è un'applicazione di gestione delle informazioni personali (PIM) del progetto [KDE](https://kde.org). [:octicons-home-16: Pagina principale](https://www.mailvelope.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Informativa sulla privacy" } - [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentazione} - [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Codice sorgente" } - - ??? + **Kontact** è un'applicazione di gestione delle informazioni personali (PIM) del progetto [KDE](https://kde.org). Offre un client email, una rubrica, un'agenda e un client RSS. [:octicons-home-16: Pagina Principale](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Politica sulla Privacy" } @@ -192,10 +187,10 @@ Canary Mail è closed-source. Lo consigliamo a causa della scarsa scelta di clie **Mailvelope** è un'estensione del browser che consente lo scambio di e-mail crittografate secondo lo standard di crittografia OpenPGP. - [:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } + [:octicons-home-16: Pagina Principale](https://www.mailvelope.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Politica sulla Privacy" } + [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentazione} + [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Codice Sorgente" } ??? download @@ -213,10 +208,10 @@ Canary Mail è closed-source. Lo consigliamo a causa della scarsa scelta di clie NeoMutt è un client basato sul testo che ha una curva di apprendimento molto ripida. Tuttavia, è molto personalizzabile. - [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } - [:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } - [:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } + [:octicons-home-16: Pagina Principale](https://neomutt.org){ .md-button .md-button--primary } + [:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentazione} + [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Codice Sorgente" } + [:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribuisci } ??? download diff --git a/i18n/it/email.md b/i18n/it/email.md index 9831fda6..c11ea2db 100644 --- a/i18n/it/email.md +++ b/i18n/it/email.md @@ -107,8 +107,8 @@ Proton Mail non offre una funzione di eredità digitale. **Mailbox.org** è un servizio di posta elettronica che si concentra sull'essere sicuro, privo di pubblicità e alimentato privatamente da energia ecologica al 100%. Mailbox.org è opera dal 2014 e ha sede a Berlino, in Germania. Gli account iniziano con 2 GB di spazio di archiviazione, che possono essere aumentati in base alle esigenze. - [:octicons-home-16: Pagina principale](https://mailbox.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://mailbox.org/en/data-protection-privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://mailbox.org){ .md-button .md-button--primary } + [:octicons-eye-16:](https://mailbox.org/en/data-protection-privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://kb.mailbox.org/en/private){ .card-link title=Documentazione} ??? download @@ -171,8 +171,8 @@ Questi provider archiviano le tue e-mail con una crittografia a conoscenza zero, **StartMail** è un servizio di posta elettronica incentrato sulla sicurezza e sulla privacy grazie all'uso della crittografia standard OpenPGP. StartMail è attiva dal 2014 e ha sede in Boulevard 11, Zeist, Paesi Bassi. Gli account partono da 10 GB. Viene offerto un periodo di prova di 30 giorni. - [:octicons-home-16: Pagina principale](https://www.startmail.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.startmail.com/en/privacy/){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://www.startmail.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.startmail.com/en/privacy/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://support.startmail.com){ .card-link title=Documentazione} ??? download @@ -219,8 +219,8 @@ StartMail non offre una funzione di eredità digitale. **Tutanota** è un servizio di posta elettronica incentrato sulla sicurezza e sulla privacy attraverso l'uso della crittografia. Tutanota è operativa dal **2011** e ha sede ad Hannover, in Germania. Gli account iniziano con 1 GB di spazio di archiviazione con il piano gratuito. - [:octicons-home-16: Pagina principale](https://tutanota.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://tutanota.com/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://tutanota.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://tutanota.com/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://tutanota.com/faq){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://tutanota.com/community/){ .card-link title=Contribuisci } @@ -306,8 +306,8 @@ L'utilizzo di un servizio di aliasing richiede la fiducia del provider di posta **AnonAddy** consente di creare gratuitamente 20 alias di dominio su un dominio condiviso, oppure alias "standard" illimitati, meno anonimi. - [:octicons-home-16: Pagina principale](https://anonaddy.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://anonaddy.com/privacy/){ .card-link title="Informativa sulla Privacy" } + [:octicons-home-16: Pagina Principale](https://anonaddy.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://anonaddy.com/privacy/){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://app.anonaddy.com/docs/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/anonaddy){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://anonaddy.com/donate/){ .card-link title=Contribuisci} @@ -337,8 +337,8 @@ Funzionalità gratuite degne di nota: **SimpleLogin** è un servizio gratuito che fornisce alias di posta elettronica su una varietà di nomi di dominio condivisi e, facoltativamente, fornisce funzionalità a pagamento come alias illimitati e domini personalizzati. - [:octicons-home-16: Pagina principale](https://simplelogin.io){ .md-button .md-button--primary } - [:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Informativa sulla Privacy" } + [:octicons-home-16: Pagina Principale](https://simplelogin.io){ .md-button .md-button--primary } + [:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Codice sorgente" } @@ -374,7 +374,7 @@ Gli amministratori di sistema avanzati possono prendere in considerazione la pos **Mailcow** è un server di posta più avanzato, perfetto per chi ha un po' più di esperienza con Linux. Ha tutto il necessario in un container Docker: un server di posta con supporto DKIM, monitoraggio antivirus e spam, webmail e ActiveSync con SOGo e amministrazione basata sul web con supporto 2FA. - [:octicons-home-16: Pagina principale](https://mailcow.email){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://mailcow.email){ .md-button .md-button--primary } [:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribuisci } @@ -385,7 +385,7 @@ Gli amministratori di sistema avanzati possono prendere in considerazione la pos **Mail-in-a-Box** è uno script di configurazione automatica per la distribuzione di un server di posta su Ubuntu. Il suo obiettivo è quello di rendere più semplice la creazione di un proprio server di posta. - [:octicons-home-16: Pagina principale](https://mailinabox.email){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://mailinabox.email){ .md-button .md-button--primary } [:octicons-info-16:](https://mailinabox.email/guide.html){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/mail-in-a-box/mailinabox){ .card-link title="Codice sorgente" } diff --git a/i18n/it/encryption.md b/i18n/it/encryption.md index d3fae1f9..02930eaf 100644 --- a/i18n/it/encryption.md +++ b/i18n/it/encryption.md @@ -21,7 +21,7 @@ Le opzioni qui elencate sono multipiattaforma e ottime per la creazione di backu **Cryptomator** è una soluzione per la crittografia progettata per salvare privatamente i file di qualsiasi provider cloud. Ti permette di creare cassaforti che sono memorizzate su un'unità di archiviazione virtuale, il cui contenuto è crittografato e sincronizzato con i tuoi provider di cloud storage. [:octicons-home-16: Pagina principale](https://cryptomator.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribuisci } @@ -160,7 +160,7 @@ Consigliamo di memorizzare una chiave di ripristino locale in un luogo sicuro, a **LUKS** è il metodo di FDE (full-disk encryption) predefinito per Linux. Può essere usato per cifrare volumi completi, partizioni o creare container crittografati. - [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentazione} [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Codice Sorgente" } @@ -218,8 +218,8 @@ Gli strumenti con interfacce a riga di comando sono utili per integrare [script **Kryptor** è uno strumenti gratuito e open-source per la crittografia e la firma dei file che utilizza algoritmi di cifratura moderni e sicuri. Punta a essere una versione migliorata di[age](https://github.com/FiloSottile/age) e [Minisign](https://jedisct1.github.io/minisign/) per fornire un'alternativa semplice a GPG. - [:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } + [:octicons-home-16: Pagina Principale](https://www.kryptor.co.uk){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribuisci } @@ -266,7 +266,7 @@ Quando cripti con PGP, puoi configurare diverse opzioni nel file `gpg.conf`. Rac **GnuPG** è un'alternativa con licenza GPL alla suite PGP per software crittografici. GnuPG è compliant a [RFC 4880](https://tools.ietf.org/html/rfc4880), che è l'attuale specifica IETF di OpenPGP. Il progetto GnuPG ha lavorato a una [bozza aggiornata](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) nel tentativo di modernizzare OpenPGP. GnuPG fa parte del progetto software Free Software Foundation di GNU ed ha ricevuto un'importante [finanziamento](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) dal governo tedesco. [:octicons-home-16: Pagina principale](https://gnupg.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://gnupg.org/documentation/index.html){ .card-link title=Documentazione} [:octicons-code-16:](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git){ .card-link title="Codice sorgente" } @@ -286,7 +286,7 @@ Quando cripti con PGP, puoi configurare diverse opzioni nel file `gpg.conf`. Rac **GPG4win** è un pacchetto per Windows di [Intevation e g10 Code](https://gpg4win.org/impressum.html). Comprende [diversi strumenti](https://gpg4win.org/about.html) che possono aiutare nell'utilizzo di GPG su Microsoft Windows. Il progetto è stato avviato e in origine [finanziato dal](https://web.archive.org/web/20190425125223/https://joinup.ec.europa.eu/news/government-used-cryptography) Federal Office per l'Information Security (BSI) tedesco nel 2005. [:octicons-home-16: Pagina principale](https://gpg4win.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://gpg4win.org/privacy-policy.html){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://gpg4win.org/privacy-policy.html){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://gpg4win.org/documentation.html){ .card-link title=Documentazione} [:octicons-code-16:](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpg4win.git;a=summary){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://gpg4win.org/donate.html){ .card-link title=Contribuisci } @@ -309,8 +309,8 @@ Quando cripti con PGP, puoi configurare diverse opzioni nel file `gpg.conf`. Rac Si consiglia di dare un'occhiata ai [primi passi](https://gpgtools.tenderapp.com/kb/how-to/first-steps-where-do-i-start-where-do-i-begin-setup-gpgtools-create-a-new-key-your-first-encrypted-email) e alle [conoscenze di base](https://gpgtools.tenderapp.com/kb) come supporto. - [:octicons-home-16: Pagina principale](https://gpgtools.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://gpgtools.org/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://gpgtools.org){ .md-button .md-button--primary } + [:octicons-eye-16:](https://gpgtools.org/privacy){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://gpgtools.tenderapp.com/kb){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/GPGTools){ .card-link title="Codice sorgente" } @@ -327,10 +327,9 @@ Quando cripti con PGP, puoi configurare diverse opzioni nel file `gpg.conf`. Rac **OpenKeychain** è un'implementazione Android di GnuPG. È comunementa richiesta da client mail come [K-9 Mail](email-clients.md#k-9-mail) e [FairEmail](email-clients.md#fairemail) e da alltre applicazioni Android per fornire supporto alla crittografia. Cure53 ha completato un'[ispezione di sicurezza](https://www.openkeychain.org/openkeychain-3-6) di OpenKeychain 3.6 nell'ottobre 2015. Dettagli tecnici riguardo all'audit e alle soluzioni di OpenKeychain possono essere trovate [qui](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). [:octicons-home-16: Pagina principale](https://www.openkeychain.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Codice Sorgente" } - :octicons-heart-16:{ .card-link title="Le donazioni possono essere fatte nell'app" } ??? download diff --git a/i18n/it/file-sharing.md b/i18n/it/file-sharing.md index e3f8e624..78f0ef0d 100644 --- a/i18n/it/file-sharing.md +++ b/i18n/it/file-sharing.md @@ -68,7 +68,7 @@ ffsend upload --host https://send.vis.ee/ FILE **FreedomBox** è un sistema operativo progettato per essere eseguito su un [single-board computer (SBC)](https://it.wikipedia.org/wiki/Single-board_computer). Lo scopo è quello di semplificare la configurazione delle applicazioni server per le quali si desidera il self-hosting. - [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentazione} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Codice Sorgente" } [:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribuisci } @@ -83,7 +83,7 @@ ffsend upload --host https://send.vis.ee/ FILE **Nextcloud** è una suite di software gratuiti e open-source client-server per la creazione di servizi di file hosting su un server privato controllato dall'utente. - [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Codice Sorgente" } @@ -111,7 +111,7 @@ ffsend upload --host https://send.vis.ee/ FILE **Syncthing** è un'utility open-source di sincronizzazione continua dei file peer-to-peer. Viene utilizzata per sincronizzare i file tra due o più dispositivi sulla rete locale o su Internet. Syncthing non utilizza alcun server centralizzato, ma il [Block Exchange Protocol](https://docs.syncthing.net/specs/bep-v1.html#bep-v1) per trasferire i dati tra i vari dispositivi. Tutti i dati sono criptati usando TLS. - [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Codice Sorgente" } [:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribuisci } diff --git a/i18n/it/frontends.md b/i18n/it/frontends.md index 4a544b07..41fe4aba 100644 --- a/i18n/it/frontends.md +++ b/i18n/it/frontends.md @@ -101,7 +101,7 @@ Quando utilizza un'istanza di ProxiTok, assicurati di leggere l'informativa sull Per impostazione predefinita, FreeTube blocca tutti gli annunci pubblicitari di YouTube. Inoltre, è possibile integrare [SponsorBlock](https://sponsor.ajay.app) per saltare i segmenti sponsorizzati dei video. [:octicons-home-16: Pagina principale](https://freetubeapp.io){ .md-button .md-button--primary } - [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribuisci } @@ -127,7 +127,7 @@ Quando utilizza un'istanza di ProxiTok, assicurati di leggere l'informativa sull Prima di poter utilizzare Yattee per guardare YouTube, è necessario effettuare alcuni [passaggi extra](https://gonzoknows.com/posts/Yattee/), a causa delle restrizioni dell'App Store. - [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Codice Sorgente" } @@ -181,7 +181,7 @@ Per impostazione predefinita, LibreTube blocca tutti gli annunci pubblicitari di L'elenco delle iscrizioni e delle playlist viene salvato localmente sul dispositivo Android. [:octicons-home-16: Pagina principale](https://newpipe.net){ .md-button .md-button--primary } - [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribuisci } @@ -207,7 +207,7 @@ Per impostazione predefinita, LibreTube blocca tutti gli annunci pubblicitari di Esistono diverse istanze pubbliche, alcune delle quali supportano i servizi onion di [Tor](https://www.torproject.org). - [:octicons-home-16: Pagina principale](https://invidious.io){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Istanze pubbliche"} [:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Codice sorgente" } diff --git a/i18n/it/index.md b/i18n/it/index.md index 571c9aa7..68138bc1 100644 --- a/i18n/it/index.md +++ b/i18n/it/index.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Guides: La vostra risorsa indipendente per la privacy e la sicurezza" +meta_title: "Privacy Guides: La tua risorsa indipendente per la privacy e la sicurezza" template: overrides/home.it.html hide: - navigation @@ -44,7 +44,7 @@ Proprio come il diritto al matrimonio interrazziale, il suffragio della donna, l Non bisogna confondere la privacy con la segretezza. Sappiamo cosa succede in bagno, ma chiudi lo stesso la porta. Questo perché vuoi la privacy, non la segretezza. **Tutti** hanno qualcosa da proteggere. La privacy è qualcosa che ci rende umani. -[:material-target-account: Minacce comuni di Internet](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Perchè la Privacy è importante](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Cosa dovrei fare? diff --git a/i18n/it/mobile-browsers.md b/i18n/it/mobile-browsers.md index 9c1130af..56f9a663 100644 --- a/i18n/it/mobile-browsers.md +++ b/i18n/it/mobile-browsers.md @@ -51,11 +51,11 @@ Per Android, Firefox è meno sicuro delle alternative basate su Chromium: il mot **Brave Browser** include un content blocker integrato e [funzionalità di privacy](https://brave.com/privacy-features/), molte delle quali attive in modo predefinito. - Brave è sviluppato a partire dal progetto del browser web Chromium, quindi dovrebbe risultare familiare e avere problemi minimi di compatibilità con i siti web. + Brave è stato sviluppato utilizzando il progetto del browser Chromium, quindi dovrebbe risultarti familiare e avrai pochi problemi di compatibilità con i vari siti web. [:octicons-home-16: Pagina principale](https://brave.com/){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Servizio Onion" } - [:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Codice sorgente" } @@ -193,7 +193,7 @@ Se usi iCloud con la Protezione avanzata dei dati, consigliamo anche di controll AdGuard per iOS ha alcune funzionalità premium, ma il blocco di contenuti standard di Safari è gratuito. [:octicons-home-16: Pagina principale](https://adguard.com/en/adguard-ios/overview.html){ .md-button .md-button--primary } - [:octicons-eye-16:](https://adguard.com/privacy/ios.html){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://adguard.com/privacy/ios.html){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://kb.adguard.com/ios){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Codice sorgente" } diff --git a/i18n/it/multi-factor-authentication.md b/i18n/it/multi-factor-authentication.md index 7c47b2f0..13b45b07 100644 --- a/i18n/it/multi-factor-authentication.md +++ b/i18n/it/multi-factor-authentication.md @@ -18,7 +18,7 @@ cover: multi-factor-authentication.png Uno dei vantaggi di YubiKey è che una chiave può fare quasi tutto ciò che ci si aspetta da una chiave di sicurezza fisica (YubiKey 5). Invitiamo a svolgere il [quiz](https://www.yubico.com/quiz/) per essere sicuri di fare il giusto acquisto. [:octicons-home-16: Pagina principale](https://www.yubico.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentazione} La [tabella di confronto](https://www.yubico.com/store/compare/) mostra le caratteristiche e le differenze tra le YubiKey. Consigliamo vivamente di scegliere le chiavi della Serie 5. @@ -39,7 +39,7 @@ Per i modelli che supportano HOTP e TOTP, ci sono 2 slot nell'interfaccia OTP ch **Nitrokey** ha una chiave di sicurezza che supporta [FIDO2 e WebAuthn] (basics/multi-factor-authentication.md#fido-fast-identity-online), chiamata **Nitrokey FIDO2**. Per il supporto PGP, è necessario un'altra delle loro chiavi, come la **Nitrokey Start**, la **Nitrokey Pro 2** o la **Nitrokey Storage 2**. [:octicons-home-16: Pagina principale](https://www.nitrokey.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentazione} La [tabella di confronto](https://www.nitrokey.com/#comparison) mostra le caratteristiche e le differenze tra le chiavette Nitrokey. La **Nitrokey 3** elencata ha un insieme di funzioni combinate. @@ -99,7 +99,7 @@ Consigliamo vivamente di utilizare applicazioni TOTP per dispositivi mobili inve **Aegis Authenticator** è un'applicazione gratuita, sicura e open-source per gestire i token di verifica dei due passaggi per i vostri servizi online. [:octicons-home-16: Pagina principale](https://getaegis.app){ .md-button .md-button--primary } - [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribuisci } @@ -118,7 +118,7 @@ Consigliamo vivamente di utilizare applicazioni TOTP per dispositivi mobili inve **Raivo OTP** è un client per password su iOS nativo, leggero e sicuro, basato sul tempo (TOTP) & sul contatore (HOTP). Ravio OTP offre la sincronizzazione & il backup opzionali via iCloud. È inoltre disponibile per macOS come applicazione nella barra di stato, ma non funzione indipendentemente dall'applicazione su iOS. [:octicons-home-16: Pagina principale](https://raivo-otp.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://raivo-otp.com/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://raivo-otp.com/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-code-16:](https://github.com/raivo-otp/ios-application){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://raivo-otp.com/donate){ .card-link title=Contribuisci } diff --git a/i18n/it/news-aggregators.md b/i18n/it/news-aggregators.md index be596256..33d76da0 100644 --- a/i18n/it/news-aggregators.md +++ b/i18n/it/news-aggregators.md @@ -17,11 +17,11 @@ Un [Aggregatore di news](https://en.wikipedia.org/wiki/News_aggregator)è un mod **Akregator** è un aggregatore di notizie, parte del progetto [KDE](https://kde.org). È dotato di ricerca rapida, funzionalità avanzate di archivio e un browser interno per leggere semplicemente le notizie. - [:octicons-home-16: Homepage](https://apps.kde.org/akregator){ .md-button .md-button--primary } - [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} - [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } - [:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } + [:octicons-home-16: Pagina Principale](https://apps.kde.org/akregator){ .md-button .md-button--primary } + [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Politica sulla Privacy" } + [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentazione} + [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Codice Sorgente" } + [:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribuisci } ??? download @@ -51,8 +51,8 @@ Un [Aggregatore di news](https://en.wikipedia.org/wiki/News_aggregator)è un mod **Fluent Reader** è un aggregatore di notizie sicuro e multipiattaforma, dotato di utili funzioni per la privacy come la cancellazione dei cookie all'uscita, di rigorose [content security policies (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) e del supporto proxy, che consente di utilizzarlo su [Tor](tor.md). - [:octicons-home-16: Pagina principale](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } - [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } + [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribuisci } @@ -70,9 +70,9 @@ Un [Aggregatore di news](https://en.wikipedia.org/wiki/News_aggregator)è un mod **GNOME Feeds** è un aggregatore di notizie [RSS](https://en.wikipedia.org/wiki/RSS) e [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)) per [GNOME](https://www.gnome.org). Ha un'interfaccia semplice ed è piuttosto veloce. - [:octicons-home-16: Pagina principale](https://gfeeds.gabmus.org){ .md-button .md-button--primary } - [:octicons-code-16:](https://gitlab.gnome.org/World/gfeeds){ .card-link title="Source Code" } - [:octicons-heart-16:](https://liberapay.com/gabmus/){ .card-link title=Contribute } + [:octicons-home-16: Pagina Principale](https://gfeeds.gabmus.org){ .md-button .md-button--primary } + [:octicons-code-16:](https://gitlab.gnome.org/World/gfeeds){ .card-link title="Codice Sorgente" } + [:octicons-heart-16:](https://liberapay.com/gabmus/){ .card-link title=Contribuisci } ??? download diff --git a/i18n/it/notebooks.md b/i18n/it/notebooks.md index 2c43406d..05e5e75b 100644 --- a/i18n/it/notebooks.md +++ b/i18n/it/notebooks.md @@ -19,8 +19,8 @@ Se stai attualmente utilizzando un'applicazione come Evernote, Google Keep o Mic **Joplin** è un'applicazione gratuita, open-source e dotata di tutte le funzionalità per prendere appunti e per le attività da svolgere, in grado di gestire un gran numero di note markdown organizzate in taccuini e tag. Offre E2EE e può sincronizzarsi con Nextcloud, Dropbox e altro ancora. Offre anche la possibilità di importare facilmente note da Evernote e note in testo semplice. - [:octicons-home-16: Pagina principale](https://joplinapp.org/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://joplinapp.org/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribuisci } @@ -46,8 +46,8 @@ Joplin non supporta la protezione con password/PIN per [l'applicazione stessa o **Standard Notes** è un'applicazione per appunti semplice e privata che rende i tuoi appunti facili e disponibili ovunque tu sia. È dotato di E2EE su ogni piattaforma e di una potente esperienza desktop con temi ed editor personalizzati. È stato anche [sottoposto a ispezione indipendente (PDF)](https://s3.amazonaws.com/standard-notes/security/Report-SN-Audit.pdf). - [:octicons-home-16: Pagina principale](https://standardnotes.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://standardnotes.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribuisci } @@ -70,7 +70,12 @@ Joplin non supporta la protezione con password/PIN per [l'applicazione stessa o **Org-mode** è una [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) per GNU Emacs. Org-mode serve per prendere appunti, mantenere elenchi TODO, pianificare progetti e scrivere documenti con un sistema di testo semplice rapido ed efficace. - La sincronizzazione è possibile con gli strumenti di [sincronizzazione dei file](file-sharing.md#file-sync). download + [:octicons-home-16: Pagina Principale](https://crypt.ee){ .md-button .md-button--primary } + [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Politica sulla Privacy" } + [:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentazione} + [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Codice Sorgente" } + + ??? download - [:octicons-globe-16: PWA](https://crypt.ee/download) @@ -86,10 +91,10 @@ Cryptee offre 100 MB di spazio di archiviazione gratuito, con opzioni a pagament **Org-mode** è una [modalità principale](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) per GNU Emacs. Org-mode serve per prendere appunti, gestire elenchi di cose da fare, pianificare progetti e scrivere documenti con un sistema di testo semplice rapido ed efficace. La sincronizzazione è possibile con gli strumenti di [sincronizzazione dei file](file-sharing.md#file-sync). - [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentazione} [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Codice sorgente" } - [:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contributo } + [:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribuisci } ## Criteri diff --git a/i18n/it/passwords.md b/i18n/it/passwords.md index 171584b2..06b85fb8 100644 --- a/i18n/it/passwords.md +++ b/i18n/it/passwords.md @@ -140,8 +140,8 @@ Questi gestori di password sincronizzano le password su un server cloud per faci **Bitwarden** è un gestore di password gratuito e open-source. L'obiettivo è quello di risolvere i problemi di gestione delle password per individui, team e organizzazioni aziendali. Bitwarden è una delle soluzioni migliori e più sicure per memorizzare tutti i vostri login e password, mantenendoli comodamente sincronizzati tra tutti i vostri dispositivi. - [:octicons-home-16: Pagina principale](https://bitwarden.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://bitwarden.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Codice sorgente" } @@ -204,7 +204,7 @@ Un vantaggio di 1Password rispetto a Bitwarden è il supporto di prima classe pe **Psono** è un gestore di password gratuito e open-source sviluppato in Germania, con particolare attenzione alla gestione delle password per i team. Psono supporta la condivisione sicura di password, file, segnalibri ed email. Tutti i segreti sono protetti da una password principale. [:octicons-home-16: Pagina principale](https://psono.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentazione} [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Codice sorgente" } diff --git a/i18n/it/productivity.md b/i18n/it/productivity.md index b51d2907..edf984de 100644 --- a/i18n/it/productivity.md +++ b/i18n/it/productivity.md @@ -17,7 +17,7 @@ La maggior parte delle suite per ufficio online non supportano la crittografia e **Nextcloud** è una suite di software gratuiti e open-source client-server per la creazione di servizi di file hosting su un server privato controllato dall'utente. - [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Codice Sorgente" } @@ -35,12 +35,7 @@ La maggior parte delle suite per ufficio online non supportano la crittografia e !!! attenzione - Sconsigliamo di utilizzare l'[App E2EE](https://apps.nextcloud.com/apps/end_to_end_encryption) per Nextcloud, in quanto potrebbe causare la perdita di dati; è altamente sperimentale e non soddisfa i criteri di qualità. [:octicons-home-16: Pagina principale](https://www.onlyoffice.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Informativa sulla privacy" } - [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentazione} - [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Codice sorgente" } - - ??? + Sconsigliamo di utilizzare l'[App E2EE](https://apps.nextcloud.com/apps/end_to_end_encryption) per Nextcloud, in quanto potrebbe causare la perdita di dati; è altamente sperimentale e non soddisfa i criteri di qualità. Per questo motivo, non consigliamo i provider Nextcloud di terze parti. ### OnlyOffice @@ -50,8 +45,8 @@ La maggior parte delle suite per ufficio online non supportano la crittografia e **CryptPad** è un'alternativa privata e di design ai più diffusi strumenti per l'ufficio. Tutti i contenuti di questo servizio web sono criptati end-to-end e possono essere condivisi facilmente con altri utenti. - [:octicons-home-16: Pagina principale](https://cryptpad.fr){ .md-button .md-button--primary } - [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://cryptpad.fr){ .md-button .md-button--primary } + [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribuisci } @@ -92,9 +87,9 @@ KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikip [:octicons-home-16: Pagina Principale](https://www.libreoffice.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Politica sulla Privacy" } - [:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentazione} - [:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Codice Sorgente" } - [:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribuisci } + [:octicons-info-16:](https://documentation.libreoffice.org/it/documentazione-in-italiano/){ .card-link title=Documentazione} + [:octicons-code-16:](https://it.libreoffice.org/chi-siamo/codice-sorgente/){ .card-link title="Codice Sorgente" } + [:octicons-heart-16:](https://it.libreoffice.org/donazioni/){ .card-link title=Contribuisci } ??? download @@ -156,6 +151,6 @@ In generale, definiamo suite per ufficio le applicazioni che possono facilmente **PrivateBin** è un pastebin online minimalista e open-source in cui il server non ha alcuna conoscenza dei dati incollati. I dati vengono criptati/decriptati nel browser utilizzando AES a 256 bit. È la versione migliorata di ZeroBin. Esiste un [elenco di istanze](https://privatebin.info/directory/). [:octicons-home-16: Pagina Principale](https://privatebin.info){ .md-button .md-button--primary } - [:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="istanze pubbliche"} + [:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Istanze pubbliche"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Codice Sorgente" } diff --git a/i18n/it/real-time-communication.md b/i18n/it/real-time-communication.md index ee1fb329..d1aa858d 100644 --- a/i18n/it/real-time-communication.md +++ b/i18n/it/real-time-communication.md @@ -24,9 +24,9 @@ Questi messenger sono ideali per proteggere le tue comunicazioni sensibili. Tutte le comunicazioni sono E2EE. Le liste di contatti è crittografata usando il tuo PIN Signal e il server non può accedervi. Anche i profili personali sono crittografati e condivisi solo con i contatti con cui parli. - [:octicons-home-16: Pagina principale](https://signal.org/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Informativa sulla privacy" } - [:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentazione} + [:octicons-home-16: Pagina Principale](https://signal.org/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Politica sulla privacy" } + [:octicons-info-16:](https://support.signal.org/hc/it){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribuisci } @@ -55,8 +55,8 @@ Abbiamo alcuni suggerimenti aggiuntivi per configurare e rendere più sicuro Sig **SimpleX** Chat è un'app di messaggistica istantanea decentralizzata che non dipende da alcun identificatore univoco, come numeri di telefono o nomi utente. Gli utenti di SimpleX Chat possono scansionare un codice QR o cliccare un link di invito per partecipare alle conversazioni di gruppo. - [:octicons-home-16: Pagina principale](https://simplex.chat){ .md-button .md-button--primary } - [:octicons-eye-16:](https://github.com/simplex-chat/simplex-chat/blob/stable/PRIVACY.md){.card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://simplex.chat){ .md-button .md-button--primary } + [:octicons-eye-16:](https://github.com/simplex-chat/simplex-chat/blob/stable/PRIVACY.md){.card-link title="Politica sulla privacy" } [:octicons-info-16:](https://github.com/simplex-chat/simplex-chat/tree/stable/docs){.card-link title=Documentazione} [:octicons-code-16:](https://github.com/simplex-chat){.card-link title="Codice sorgente" } @@ -117,8 +117,8 @@ Briar supporta la Perfect Forward Secrecy usando l'[Handshake](https://code.bria I messaggi e i file condivisi nelle stanze private (quelle che richiedono un invito) sono E2EE in modo predefinito, così come le chiamate e videochiamate tra due persone. - [:octicons-home-16: Pagina principale](https://element.io/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://element.io/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/vector-im){ .card-link title="Codice sorgente" } @@ -151,7 +151,7 @@ Il protocollo è stato [verificato](https://matrix.org/blog/2016/11/21/matrixs-o Session usa la rete decentralizzata [Oxen Service Node Network](https://oxen.io/) per memorizzare e instradare i messaggi. Ogni messaggio crittografato viene instradato attraverso tre nodi della rete di nodi di servizio Oxen, rendendo virtualmente impossibile per i nodi compilare informazioni significative su coloro che utilizzano la rete. [:octicons-home-16: Pagina principale](https://getsession.org/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Codice sorgente" } diff --git a/i18n/it/router.md b/i18n/it/router.md index a28af937..9d5a1ba9 100644 --- a/i18n/it/router.md +++ b/i18n/it/router.md @@ -16,7 +16,7 @@ Di seguito sono elencati alcuni sistemi operativi alternativi che possono essere **OpenWrt** è un sistema operativo basato su Linux, usato principalmente su dispositivi embedded per instradare il traffico di rete. Include util-linux, uClibc e BusyBox. Tutti i componenti sono stati ottimizzati per i router domestici. - [:octicons-home-16: Pagina principale](https://openwrt.org){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://openwrt.org){ .md-button .md-button--primary } [:octicons-info-16:](https://openwrt.org/docs/start){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/openwrt/openwrt){ .card-link title="Codice Sorgente" } [:octicons-heart-16:](https://openwrt.org/donate){ .card-link title=Contribuisci } @@ -31,7 +31,7 @@ Di seguito sono elencati alcuni sistemi operativi alternativi che possono essere **OPNsense** è una piattaforma open source di firewall e routing basata su FreeBSD che incorpora molte funzionalità avanzate come il traffic shaping, il bilanciamento del carico e le funzionalità VPN, con molte altre funzionalità disponibili sotto forma di plugin. OPNsense viene comunemente utilizzato come firewall perimetrale, router, access point wireless, server DHCP, server DNS ed endpoint VPN. - [:octicons-home-16: Pagina principale](https://opnsense.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Codice Sorgente" } [:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribuisci} diff --git a/i18n/it/search-engines.md b/i18n/it/search-engines.md index 089a3f0f..7b2a692e 100644 --- a/i18n/it/search-engines.md +++ b/i18n/it/search-engines.md @@ -24,9 +24,9 @@ Considera l'utilizzo di un [VPN](vpn.md) o di [Tor](https://www.torproject.org/) Suggeriamo di disabilitare l'opzione [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) nelle impostazioni, che è attiva di default. - [:octicons-home-16: Pagina principale](https://search.brave.com/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://search.brave.com/){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Servizio Onion" } - [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentazione} Brave Search ha sede negli Stati Uniti. La loro[informativa sulla privacy](https://search.brave.com/help/privacy-policy) dichiara che raccolgono dati aggregati, i quali includono il sistema operativo e il browser in utilizzo, ma nessuna informazione d'identificazione personale. Gli indirizzi IP sono temporaneamente processati, ma non conservati. @@ -41,9 +41,9 @@ Brave Search ha sede negli Stati Uniti. La loro[informativa sulla privacy](https DuckDuckGo è il motore di ricerca predefinito del Tor Browser ed è una delle poche opzioni disponibili sul browser Safari di Apple. - [:octicons-home-16: Pagina principale](https://duckduckgo.com){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Servizio Onion" } - [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentazione} DuckDuckGo ha sede negli Stati Uniti. La loro[informativa della privacy](https://duckduckgo.com/privacy) dichiara che **raccolgono** le tue ricerche per migliorare il prodotto, ma non registrano il tuo indirizzo IP o qualsiasi altra informazione d'identificazione personale. @@ -58,9 +58,9 @@ DuckDuckGo offre altre [due versioni](https://help.duckduckgo.com/features/non-j **SearXNG** è un meta-motore di ricerca open source e self-hostable, che aggrega risultati di altri motore di ricerca, ma senza raccogliere alcuna informazione a sua volta. È un fork attivamente mantenuto di [SearX](https://github.com/searx/searx). - [:octicons-home-16: Pagina principale](https://searxng.org){ .md-button .md-button--primary } - [:octicons-server-16:](https://searx.space/){ .card-link title="Istanze pubbliche"} - [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Codice sorgente" } + [:octicons-home-16: Pagina Principale](https://searxng.org){ .md-button .md-button--primary } + [:octicons-server-16:](https://searx.space/){ .card-link title="Istanze Pubbliche"} + [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Codice Sorgente" } SearXNG è un proxy tra l'utente e i motori di ricerca che aggrega. Le tue stringhe di ricerca vengono inviate a tutti i motori dai quali SearXNG ottiene i suoi risultati. @@ -77,8 +77,8 @@ Quando utilizzi una istanza di SearXNG, ricordati di leggere la rispettiva infor **Startpage** è un motore di ricerca privato noto per riportare risultati di ricerca di Google. Il fiore all'occhiello di Startpage è la [Anonymous View](https://www.startpage.com/en/anonymous-view/), che si sforza di standardizzare l'attività degli utenti in modo da rendere più difficile l'identificazione univoca. Questa funzione può essere utile per nascondere [alcune](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) caratteristiche della rete e del browser. A differenza di quanto suggerisce il nome, non ci si deve affidare a questa funzione per ottenere l'anonimato. Se cerchi l'anonimato, utilizzate invece il [Tor Browser](tor.md#tor-browser). - [:octicons-home-16: Pagina principale](https://www.startpage.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://www.startpage.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentazione} !!! warning diff --git a/i18n/it/tor.md b/i18n/it/tor.md index 4ffb28a5..7e98704a 100644 --- a/i18n/it/tor.md +++ b/i18n/it/tor.md @@ -53,7 +53,7 @@ Esistono diversi modi per connettersi alla rete Tor dal proprio dispositivo, il [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Servizio Onion" } [:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentazione } [:octicons-code-16:](https://gitweb.torproject.org/tor-browser.git/){ .card-link title="Codice sorgente" } - [:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribuisce } + [:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribuisci } ??? download @@ -79,7 +79,7 @@ Tor Browser è progettato per evitare il fingerprinting o l'identificazione dell **Orbot** è una VPN Tor gratuita per smartphone che instrada il traffico da qualsiasi app sul dispositivo attraverso la rete Tor. [:octicons-home-16: Pagina principale](https://orbot.app/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentazione} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribuisci } diff --git a/i18n/it/video-streaming.md b/i18n/it/video-streaming.md index 603827e6..c8a0f7ef 100644 --- a/i18n/it/video-streaming.md +++ b/i18n/it/video-streaming.md @@ -17,8 +17,8 @@ Il rischio principale quando si usa una piattaforma di streaming video è che le **Il client desktop di LBRY** consente lo streaming di video dalla rete LBRY e memorizza l'elenco delle iscrizioni nel proprio portafoglio LBRY. - [:octicons-home-16: Pagina principale](https://lbry.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://lbry.com/privacypolicy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://lbry.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://lbry.com/privacypolicy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://lbry.com/faq){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/lbryio/lbry-desktop){ .card-link title="Codice sorgente" } diff --git a/i18n/it/vpn.md b/i18n/it/vpn.md index ae45cd8b..c2de8924 100644 --- a/i18n/it/vpn.md +++ b/i18n/it/vpn.md @@ -41,7 +41,7 @@ I fornitori che consigliamo utilizzano la crittografia, accettano Monero, suppor **IVPN** è un altro provider VPN premium, sono attivi dal 2009. IVPN ha sede a Gibilterra. [:octicons-home-16: Pagina principale](https://crypt.ee){ .md-button .md-button--primary } - [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://www.ivpn.net/knowledgebase/general){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Codice sorgente" } @@ -175,12 +175,12 @@ Mullvad è molto trasparente su quali nodi [possiede o affitta](https://mullvad. **Proton VPN** è un forte concorrente nello spazio VPN ed è attivo dal 2016. Proton AG ha sede in Svizzera e offre un livello gratuito limitato, così come un'opzione premium più ricca di funzioni. - **Gratuito** — **Piano Plus da 71,88€ all'anno** (1) - - [:octicons-home-16: Pagina principale](https://protonvpn.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://protonvpn.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Politica sulla Privacy " } [:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentazione} - [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Codice sorgente" } download + [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Codice Sorgente" } + + ??? download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) - [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) diff --git a/i18n/ja/404.md b/i18n/ja/404.md index 1536fbb3..9fd15ba6 100644 --- a/i18n/ja/404.md +++ b/i18n/ja/404.md @@ -15,5 +15,5 @@ meta: - [おすすめのDNSプロバイダ](dns.md) - [最高のデスクトップウェブブラウザ](desktop-browsers.md) - [最高のVPNプロバイダ](vpn.md) -- [Privacy Guidesフォーラム](https://discuss.privacyguides.net) +- [Privacy Guides フォーラム](https://discuss.privacyguides.net) - [私たちのブログ](https://blog.privacyguides.org) diff --git a/i18n/ja/about/privacy-policy.md b/i18n/ja/about/privacy-policy.md index d440687d..8abb84fc 100644 --- a/i18n/ja/about/privacy-policy.md +++ b/i18n/ja/about/privacy-policy.md @@ -46,7 +46,7 @@ The Privacy Guides team generally does not have access to personal data outside ```text Jonah Aragon -Services Administrator +サービス管理者 jonah@privacyguides.org ``` diff --git a/i18n/ja/basics/passwords-overview.md b/i18n/ja/basics/passwords-overview.md index 5e5e868a..321d80e9 100644 --- a/i18n/ja/basics/passwords-overview.md +++ b/i18n/ja/basics/passwords-overview.md @@ -1,26 +1,26 @@ --- -title: "Introduction to Passwords" +title: "パスワードの概要" icon: 'material/form-textbox-password' description: These are some tips and tricks on how to create the strongest passwords and keep your accounts secure. --- -Passwords are an essential part of our everyday digital lives. We use them to protect our accounts, our devices and our secrets. Despite often being the only thing between us and an adversary who's after our private information, not a lot of thought is put into them, which often leads to people using passwords that can be easily guessed or brute-forced. +パスワードは、日々のデジタルライフに欠かせないものです。 私たちは、アカウント、デバイス、秘密を守るためにパスワードを使用します。 パスワードは多くの場合、敵対者から個人情報を守る唯一の要素です。にも関わらず、十分に検討されず、簡単に推測できたり、総当たりできるパスワードが使われることが多いようです。 -## Best Practices +## ベストプラクティス -### Use unique passwords for every service +### 各サービスで異なるパスワードを使う -Imagine this; you sign up for an account with the same e-mail and password on multiple online services. If one of those service providers is malicious, or their service has a data breach that exposes your password in an unencrypted format, all a bad actor would have to do is try that e-mail and password combination across multiple popular services until they get a hit. It doesn't matter how strong that one password is, because they already have it. +複数のオンラインサービスで、同じメールアドレスとパスワードを使ってアカウントを作成した場合を想像してください。 もし、いずれかのサービス提供者が悪意を持っていたり、サービスが情報漏洩を起こしてパスワードが暗号化されていない状態で公開された場合、悪意ある者は他の人気あるサービスでそのメールアドレスとパスワードの組み合わせでログインを試すことができます。 そのパスワードがどれだけ強固でも、悪意ある者に漏洩した場合は安全性を担保できません。 -This is called [credential stuffing](https://en.wikipedia.org/wiki/Credential_stuffing), and it is one of the most common ways that your accounts can be compromised by bad actors. To avoid this, make sure that you never re-use your passwords. +これは、[クレデンシャルスタッフィング攻撃](https://en.wikipedia.org/wiki/Credential_stuffing)と呼ばれ、悪意ある者がアカウントを侵害するために用いる、よくある攻撃の一つです。 この攻撃への有効な対策は、パスワードを使いまわさないことです。 -### Use randomly generated passwords +### ランダムに生成されたパスワードを使う ==You should **never** rely on yourself to come up with a good password.== We recommend using [randomly generated passwords](#passwords) or [diceware passphrases](#diceware-passphrases) with sufficient entropy to protect your accounts and devices. All of our [recommended password managers](../passwords.md) include a built-in password generator that you can use. -### Rotating Passwords +### パスワードを変更する You should avoid changing passwords that you have to remember (such as your password manager's master password) too often unless you have reason to believe it has been compromised, as changing it too often exposes you to the risk of forgetting it. @@ -106,6 +106,6 @@ There are many good options to choose from, both cloud-based and local. Choose o Furthermore, we do not recommend storing single-use recovery codes in your password manager. Those should be stored separately such as in an encrypted container on an offline storage device. -### Backups +### バックアップ You should store an [encrypted](../encryption.md) backup of your passwords on multiple storage devices or a cloud storage provider. This can help you access your passwords if something happens to your primary device or the service you are using. diff --git a/i18n/ja/basics/why-privacy-matters.md b/i18n/ja/basics/why-privacy-matters.md new file mode 100644 index 00000000..47cf3195 --- /dev/null +++ b/i18n/ja/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. 用を足しているという事実を秘密にするためではなく、プライバシーを守るためにドアを閉めるのです。 There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## ソース + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/ja/desktop-browsers.md b/i18n/ja/desktop-browsers.md index 6c1b8330..3c6dfa8e 100644 --- a/i18n/ja/desktop-browsers.md +++ b/i18n/ja/desktop-browsers.md @@ -57,24 +57,24 @@ schema: url: "./" --- -These are our currently recommended desktop web browsers and configurations for standard/non-anonymous browsing. We recommend [Mullvad Browser](#mullvad-browser) if you are focused on strong privacy protections and anti-fingerprinting out of the box, [Firefox](#firefox) for casual internet browsers looking for a good alternative to Google Chrome, and [Brave](#brave) if you need Chromium browser compatibility. +以下は、一般的な、非匿名のブラウジング用に、現在おすすめされているデスクトップ版のウェブブラウザとその設定です。 強力なプライバシー保護とフィンガープリント対策を重視する場合は[Mullvad Browser](#mullvad-browser)を、カジュアルなブラウジングやGoogle Chromeの良い代替品を探している場合は[Firefox](#firefox)を、Chromiumブラウザとの互換性が必要な場合は[Brave](#brave)をおすすめします。 -If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. We make some configuration recommendations on this page, but all browsers other than Tor Browser will be traceable by *somebody* in some manner or another. +匿名でインターネットを閲覧するには、[Tor](tor.md)を使用してください。 このページではいくつかの設定をおすすめしていますが、Tor Browser以外のブラウザは、何らかの方法で、*誰かしら*が、あなたを追跡できます。 ## Mullvad Browser !!! recommendation - ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ align=right } + ![Mullvad Browserのロゴ](assets/img/browsers/mullvad_browser.svg){ align=right } - **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. + **Mullvad Browser**はVPNユーザーにTor Browserのフィンガープリント対策のブラウザ技術を提供することを目的とした、Torネットワークへの接続機能のない[Tor Browser](tor.md#tor-browser)です。 Tor Projectが開発し、[Mullvad](vpn.md#mullvad)が配布しています。MullvadのVPNを使用する必要は**ありません**。 - [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } - [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} - [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" } + [:octicons-home-16: ホームページ](https://mullvad.net/en/browser){ .md-button .md-button--primary } + [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="プライバシーポリシー" } + [:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=文書} + [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="ソースコード" } - ??? downloads + ??? ダウンロード - [:simple-windows11: Windows](https://mullvad.net/en/download/browser/windows) - [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos) @@ -92,7 +92,7 @@ Note that while you can use Mullvad Browser with any VPN provider, other people Mullvad Browser comes with the *uBlock Origin* and *NoScript* browser extensions pre-installed. While we typically [don't recommend](#extensions) adding *additional* browser extensions, these extensions that come pre-installed with the browser should **not** be removed or configured outside their default values, because doing so would noticeably make your browser fingerprint distinct from other Mullvad Browser users. It also comes pre-installed with the Mullvad Browser Extension, which *can* be safely removed without impacting your browser fingerprint if you would like, but is also safe to keep even if you don't use Mullvad VPN. -### Private Browsing Mode +### プライベートブラウジングモード Mullvad Browser operates in permanent private browsing mode, meaning your history, cookies, and other site data will always be cleared every time the browser is closed. Your bookmarks, browser settings, and extension settings will still be preserved. @@ -106,17 +106,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- !!! recommendation - ![Firefox logo](assets/img/browsers/firefox.svg){ align=right } + ![Firefoxのロゴ](assets/img/browsers/firefox.svg){ align=right } - **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). + **Firefox**は、[強化型トラッキング防止](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop)などの強力なプライバシー設定を提供し、[様々な種類のトラッキング](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks)をブロックするのに役立ちます。 - [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} - [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } - [:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } + [:octicons-home-16: ホームページ](https://firefox.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="プライバシーポリシー" } + [:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=文書} + [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="ソースコード" } + [:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=貢献 } - ??? downloads + ??? ダウンロード - [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) - [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) @@ -126,7 +126,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- !!! warning Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). -### Recommended Configuration +### おすすめの設定 These options can be found in :material-menu: → **Settings** @@ -146,7 +146,7 @@ Search suggestions send everything you type in the address bar to the default se This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability. -##### Firefox Suggest (US only) +##### Firefox Suggest (アメリカのみ) [Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. diff --git a/i18n/ja/index.md b/i18n/ja/index.md index 20c199eb..0b9733b3 100644 --- a/i18n/ja/index.md +++ b/i18n/ja/index.md @@ -44,7 +44,7 @@ schema: プライバシーと秘密を混同してはいけません。 トイレで用を足す時、ドアを閉めるかと思います。 用を足しているという事実を秘密にするためではなく、プライバシーを守るためにドアを閉めるのです。 **誰もが**守るべきものを持っています。 プライバシーは私たちを人間たらしめるものです。 -[:material-target-account: 主なインターネット上の脅威](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: プライバシーはなぜ重要なのか](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## どうしたらいいですか? diff --git a/i18n/ko/basics/passwords-overview.md b/i18n/ko/basics/passwords-overview.md index c927340c..e7274d1d 100644 --- a/i18n/ko/basics/passwords-overview.md +++ b/i18n/ko/basics/passwords-overview.md @@ -20,7 +20,7 @@ description: These are some tips and tricks on how to create the strongest passw All of our [recommended password managers](../passwords.md) include a built-in password generator that you can use. -### Rotating Passwords +### 비밀번호 변경 You should avoid changing passwords that you have to remember (such as your password manager's master password) too often unless you have reason to believe it has been compromised, as changing it too often exposes you to the risk of forgetting it. diff --git a/i18n/ko/basics/why-privacy-matters.md b/i18n/ko/basics/why-privacy-matters.md new file mode 100644 index 00000000..82e71d2c --- /dev/null +++ b/i18n/ko/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**프라이버시** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**보안** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. 이는 여러분이 무언가를 감추고자 한 것이 아닌, 사생활을 보호하고자 한 것이죠. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## 출처 + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/ko/index.md b/i18n/ko/index.md index 0f366bd0..c0ca5fdf 100644 --- a/i18n/ko/index.md +++ b/i18n/ko/index.md @@ -44,7 +44,7 @@ schema: '무언가를 숨기거나 감추는 것'과 '사생활 보호'를 혼동하면 안 됩니다. 여러분이 화장실에서 뭘 하는지는 명백함에도 불구하고, 여러분은 항상 화장실 문을 닫아둡니다. 이는 여러분이 무언가를 감추고자 한 것이 아닌, 사생활을 보호하고자 한 것이죠. **누구나** 보호해야 할 것이 있습니다. 우리가 사람답게 살기 위해서는 프라이버시가 필요합니다. -[:material-target-account: 인터넷상의 일반적인 위협](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## 무엇을 해야 하나요? diff --git a/i18n/ko/passwords.md b/i18n/ko/passwords.md index 70262b67..953ef3d0 100644 --- a/i18n/ko/passwords.md +++ b/i18n/ko/passwords.md @@ -118,7 +118,7 @@ schema: url: "./" --- -비밀번호 관리자를 사용하여, 비밀번호를 비롯한 기타 자격 증명을 마스터 패스워드로 안전하게 저장 및 관리할 수 있습니다. +비밀번호 관리자를 사용하여, 비밀번호를 비롯한 기타 자격 증명을 마스터 비밀번호로 안전하게 저장 및 관리할 수 있습니다. [Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) @@ -138,7 +138,7 @@ schema: ![Bitwarden 로고](assets/img/password-management/bitwarden.svg){ align=right } - **Bitwarden**은 무료 오픈 소스 비밀번호 관리자입니다. 개인, 팀, 비즈니스 조직의 비밀번호 관리 문제를 해결하는 것을 목표로 합니다. Bitwarden is among the best and safest solutions to store all of your logins and passwords while conveniently keeping them synced between all of your devices. + **Bitwarden**은 무료 오픈 소스 비밀번호 관리자입니다. 개인, 팀, 비즈니스 조직의 비밀번호 관리 문제를 해결하는 것을 목표로 합니다. Bitwarden은 모든 로그인 및 비밀번호를 저장하는 동시에 간편하게 모든 기기 간 동기화가 가능한, 가장 안전하고 뛰어난 서비스로 꼽히는 솔루션입니다. [:octicons-home-16: 홈페이지](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="프라이버시 정책" } @@ -191,17 +191,17 @@ Bitwarden 서버 코드는 [오픈 소스](https://github.com/bitwarden/server) **1Passsword**는 이전부터 macOS 및 iOS 사용자에게 가장 뛰어난 비밀번호 관리자 사용 경험을 제공해왔습니다. 오늘날에는 모든 플랫폼에서 동일한 기능성을 제공합니다. 고급 기능뿐만 아니라, 기술 이해도가 낮은 사용자 및 가족을 위한 다양한 기능을 자랑합니다. -1Password 보관함은 마스터 패스워드와 무작위 생성 34자 보안 키로 보호되어 여러분의 데이터를 서버에서 암호화합니다. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. +1Password 보관함은 마스터 비밀번호와 무작위 생성 34자 보안 키로 보호되어 여러분의 데이터를 서버에서 암호화합니다. 이 보안 키의 존재로 인해, 여러분은 마스터 비밀번호 강도에 관계없이 여러분의 데이터를 높은 엔트로피로 보호할 수 있습니다. 대부분의 다른 비밀번호 관리자는 사용자 데이터 보호를 사용자의 마스터 비밀번호 강도에만 전적으로 의존합니다. -One advantage 1Password has over Bitwarden is its first-class support for native clients. While Bitwarden relegates many duties, especially account management features, to their web vault interface, 1Password makes nearly every feature available within its native mobile or desktop clients. 1Password's clients also have a more intuitive UI, which makes them easier to use and navigate. +Bitwarden 대비 1Password 장점 중 하나는 네이티브 클라이언트 지원이 매우 뛰어나다는 점입니다. Bitwarden은 상당수의 기능을(특히 계정 관리 기능) 웹 보관함 인터페이스에서만 제공합니다. 반면, 1Password는 거의 모든 기능을 모바일/데스크톱 네이티브 클라이언트에서 이용할 수 있습니다. 또한 1Password 클라이언트는 보다 직관적인 UI를 제공하여 더욱 쉬운 사용 및 탐색이 가능합니다. ### Psono !!! recommendation - ![Psono logo](assets/img/password-management/psono.svg){ align=right } + ![Psono 로고](assets/img/password-management/psono.svg){ align=right } - **Psono** is a free and open-source password manager from Germany, with a focus on password management for teams. Psono supports secure sharing of passwords, files, bookmarks, and emails. All secrets are protected by a master password. + **Psono**는 팀 비밀번호 관리 서비스에 중점을 둔 독일의 무료 오픈 소스 비밀번호 관리자입니다. Psono는 비밀번호, 파일, 북마크, 이메일의 안전한 공유를 지원합니다. 모든 비밀 정보는 마스터 비밀번호로 보호됩니다. [:octicons-home-16: 홈페이지](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="프라이버시 정책" } @@ -216,7 +216,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) -Psono는 제품에 관련된 문서를 매우 폭넓게 제공합니다. The web-client for Psono can be self-hosted; alternatively, you can choose the full Community Edition or the Enterprise Edition with additional features. +Psono는 제품에 관련된 문서를 매우 폭넓게 제공합니다. Psono 웹 클라이언트는 자체 호스팅 가능합니다. Community Edition 혹은 추가 기능이 포함된 Enterprise Edition을 선택할 수 있습니다. ### 평가 기준 @@ -230,9 +230,9 @@ Psono는 제품에 관련된 문서를 매우 폭넓게 제공합니다. The web - 강력한 표준 기반/최신 E2EE를 활용해야 합니다. - 암호화 및 보안 사례를 철저히 문서화해야 합니다. -- Must have a published audit from a reputable, independent third-party. +- 평한이 좋은 독립적인 제3자로부터 공개 감사를 받아야 합니다. - 필수적이지 않은 원격 분석 데이터 수집은 모두 선택 사항이어야 합니다. -- Must not collect more PII than is necessary for billing purposes. +- 요금 청구 용도로 필요한 것 이상으로 PII를 수집해서는 안 됩니다. #### 우대 사항 @@ -292,9 +292,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se !!! recommendation - ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } + ![Strongbox 로고](assets/img/password-management/strongbox.svg){ align=right } - **Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. + **Strongbox**는 iOS, macOS용 네이티브 오픈 소스 비밀번호 관리자입니다. KeePass, Password Safe 형식을 지원하므로, Apple 외 플랫폼에서는 KeePassXC 등의 다른 비밀번호 관리자와 함께 사용할 수 있습니다. Strongbox는 [부분 유료화](https://strongboxsafe.com/pricing/) 모델을 채택하고 있습니다. 무료 플랜에서도 대부분의 기능을 제공하나, 생체 인증 등 [편의 기능](https://strongboxsafe.com/comparison/)은 구독/영구 플랜에만 제공됩니다. [:octicons-home-16: 홈페이지](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="프라이버시 정책" } @@ -310,15 +310,15 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ### 커맨드라인 -These products are minimal password managers that can be used within scripting applications. +커맨드라인 비밀번호 관리자는 스크립트 애플리케이션 내에서 사용할 수 있는 미니멀한 비밀번호 관리자입니다. #### gopass !!! recommendation - ![gopass logo](assets/img/password-management/gopass.svg){ align=right } + ![gopass 로고](assets/img/password-management/gopass.svg){ align=right } - **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). + **gopass**는 Go 언어로 작성된 커맨드라인용 비밀번호 관리자입니다. 모든 주요 데스크톱 및 서버 운영 체제(Linux, macOS, BSD, Windows)에서 작동합니다. [:octicons-home-16: 홈페이지](https://www.gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=문서} diff --git a/i18n/ku-IQ/basics/why-privacy-matters.md b/i18n/ku-IQ/basics/why-privacy-matters.md new file mode 100644 index 00000000..e223dc35 --- /dev/null +++ b/i18n/ku-IQ/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/ku-IQ/index.md b/i18n/ku-IQ/index.md index b16f292e..65298b7a 100644 --- a/i18n/ku-IQ/index.md +++ b/i18n/ku-IQ/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/nl/basics/why-privacy-matters.md b/i18n/nl/basics/why-privacy-matters.md new file mode 100644 index 00000000..df0213e4 --- /dev/null +++ b/i18n/nl/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Waarom privacy belangrijk is" +icon: 'material/shield-account' +--- + +In het moderne tijdperk van digitale gegevensuitbuiting is jouw privacy nog nooit zo belangrijk geweest, en toch denken velen dat het al een verloren zaak is. Dat is het niet. ==Je privacy ligt voor het grijpen==, en daar moet je om geven. Privacy gaat over macht, en het is zo belangrijk dat die macht in de juiste handen terechtkomt. + +De privacy gaat uiteindelijk over menselijke informatie, en dat is belangrijk omdat we weten dat menselijke informatie de macht over mensen geeft. Als we waarde hechten aan ons vermogen om authentieke en vrije mensen te zijn, moeten we ons zorgen maken over de regels die van toepassing zijn op informatie over ons. Zo veel van onze moderne samenleving is gestructureerd rondom **informatie**. Wanneer je online winkelt, het nieuws leest, iets opzoekt, stemt, de weg zoekt, of wat dan ook, vertrouw je op informatie. Als we in een informatiemaatschappij leven, is onze informatie belangrijk, en daarom is privacy belangrijk. + +## Wat is privacy? + +Veel mensen halen de begrippen **privacy**, **veiligheid**, en **anonimiteit** door elkaar. Je ziet mensen verschillende producten bekritiseren als "niet privé", terwijl ze eigenlijk bedoelen dat het bijvoorbeeld geen anonimiteit biedt. Op deze website behandelen we alle drie onderwerpen, maar het is belangrijk dat je het verschil begrijpt en wanneer het om verschillende zaken gaat. + +**Privacy** +: + +==Privacy is de garantie dat jouw gegevens alleen worden gezien door de partijen die jij daar toegang voor geeft.== In de context van een berichten dienst biedt bijvoorbeeld end-to-end encryptie privacy door jouw bericht alleen zichtbaar te houden voor jou en de ontvanger. + +**Veiligheid** +: + +Veiligheid is het vermogen om de applicaties die je gebruikt te vertrouwen, dat de betrokken partijen zijn wie ze zeggen te zijn, en deze applicaties veilig te houden. In de context van het browsen op het web kan de beveiliging bijvoorbeeld worden verstrekt door HTTPS-certificaten. + + Certificaten bewijzen dat je rechtstreeks praat met de website die je bezoekt, en voorkomt dat aanvallers op jouw netwerk de gegevens kunnen lezen of wijzigen die van of naar de website worden gestuurd. + +**Anonimiteit** +: + +Anonimiteit is de mogelijkheid om te handelen zonder blijvende identificatie. Je kunt dit online bereiken met [Tor](../tor.md), waarmee je op het internet kunt surfen met een willekeurig IP-adres en netwerkverbinding in plaats van jouw eigen. + + **Pseudonimiteit** is een vergelijkbaar concept, maar maakt het mogelijk een persistente identificatiecode te hebben zonder dat die aan je echte identiteit is gekoppeld. Als iedereen je online kent als `@GamerGuy12` , maar niemand je echte naam kent, is dat je pseudoniem. + +Al deze begrippen overlappen elkaar, maar het is mogelijk om er een combinatie van te maken. De beste plek voor de meeste mensen is wanneer deze drie concepten elkaar overlappen. Het is echter lastiger te bereiken dan velen aanvankelijk denken. Soms moet je compromissen sluiten op sommige daarvan, en dat is ook oké. Dit is waar **dreigingsmodellering** wordt gebruikt, zodat je weloverwogen beslissingen kunt nemen over de [software en diensten](../tools.md) die je gebruikt. + +[:material-book-outline: Meer informatie over dreigingsmodellering](basics/threat-modeling.md ""){.md-button} + +## Privacy versus geheimzinnigheid + +Een veelgebruikt tegenargument voor de privacy beweging is het idee dat iemand geen privacy nodig heeft als hij **"niets te verbergen heeft".** Dit is een gevaarlijke misvatting, omdat het het gevoel creëert dat mensen die privacy eisen afwijkend, crimineel of verkeerd zijn. + +==Je moet privacy niet verwarren met geheimzinnigheid.== We weten wat er in de badkamer gebeurt, maar toch doe je de deur dicht. Dat is omdat je privacy wilt, geen geheimzinnigheid. Er zijn altijd bepaalde feiten over ons - bijvoorbeeld persoonlijke gezondheidsinformatie of seksueel gedrag - waarvan we niet willen dat de hele wereld ze weet, en dat is niet erg. De behoefte aan privacy is legitiem, en dat maakt ons menselijk. Privacy gaat over je rechten op je eigen informatie, niet over het verbergen van geheimen. + +## Gaat privacy over controle? + +Een gangbare definitie van privacy is dat het de mogelijkheid is om *te controleren* wie toegang heeft tot jouw gegevens. Dit is een gemakkelijke val om in te trappen, in feite is het de definitie van privacy waarop wij deze website lange tijd hebben gebaseerd. Het klinkt mooi, en het spreekt veel mensen aan, maar in de praktijk werkt het gewoon niet. + +Neem bijvoorbeeld de cookie popups. Je kunt deze tientallen keren per dag tegenkomen op de verschillende websites die je bezoekt, met een mooie reeks selectievakjes en schuifjes waarmee je jouw voorkeuren kunt aangeven om precies aan jouw wensen te voldoen. Uiteindelijk drukken we gewoon op de knop "Ik ga akkoord", omdat we gewoon het artikel willen lezen of een aankoop willen doen. Niemand wil een persoonlijke privacycontrole uitvoeren op elke website die hij bezoekt. Dit is een oefening in het onderwerp [ 'keuzearchitectuur"](https://en.wikipedia.org/wiki/Choice_architecture), bedoeld om je de gemakkelijke weg te laten nemen in plaats van je te verdiepen in een doolhof van configuratieopties die helemaal niet hoeven te bestaan. + +==Controle over je privacy binnen de meeste apps is een illusie.== Het is een glimmend dashboard met allerlei keuzes die je kunt maken over je gegevens, maar zelden de keuzes die je zoekt, zoals "gebruik mijn gegevens alleen om mij te helpen". Dit soort controle is bedoeld om je schuldig te laten voelen over je keuzes, dat je "de keuze had" om de apps die je gebruikt meer privé te maken, en je koos ervoor om dat niet te doen. + +Privacy is iets wat we standaard in [software en diensten](../tools.md) moeten ingebakken hebben je kan de meeste apps niet zelfstandig privé maken. + +## Bronnen + +- [Waarom privacy belangrijk is](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) door Neil Richards +- [The New Oil: Waarom privacy & veiligheid belangrijk is](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/nl/index.md b/i18n/nl/index.md index d53ed023..ccdd64fb 100644 --- a/i18n/nl/index.md +++ b/i18n/nl/index.md @@ -44,7 +44,7 @@ Net zoals het recht op interraciale huwelijken, het kiesrecht voor vrouwen, de v Je moet privacy niet verwarren met geheimhouding. We weten wat er in de badkamer gebeurt, maar je doet nog steeds de deur dicht. Dat is omdat je privacy wilt, geen geheimzinnigheid. **Iedereen** heeft iets te beschermen. Privacy is iets wat ons menselijk maakt. -[:material-target-account: Veelvoorkomende internetbedreigingen](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Wat moet ik doen? diff --git a/i18n/pl/basics/why-privacy-matters.md b/i18n/pl/basics/why-privacy-matters.md new file mode 100644 index 00000000..25e3e2b3 --- /dev/null +++ b/i18n/pl/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Źródła + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/pl/index.md b/i18n/pl/index.md index e70bd5de..7dd542b4 100644 --- a/i18n/pl/index.md +++ b/i18n/pl/index.md @@ -44,7 +44,7 @@ Podobnie jak prawo do małżeństw różnych ras, prawo wyborcze kobiet, wolnoś You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/pt-BR/basics/why-privacy-matters.md b/i18n/pt-BR/basics/why-privacy-matters.md new file mode 100644 index 00000000..7e1ae6a2 --- /dev/null +++ b/i18n/pt-BR/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Isso é porque você quer privacidade, não segredo. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Fontes + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/pt-BR/index.md b/i18n/pt-BR/index.md index ac45f90d..e9e38df5 100644 --- a/i18n/pt-BR/index.md +++ b/i18n/pt-BR/index.md @@ -44,7 +44,7 @@ Assim como o direito ao casamento inter-racial, o direito feminino de votar, a l Você não deve confundir privacidade com segredo. Sabemos o que acontece no banheiro, mas você ainda fecha a porta. Isso é porque você quer privacidade, não segredo. **Todo mundo** tem algo para proteger. Privacidade é algo que nos torna humanos. -[:material-target-account: Ameaças Comuns na Internet ](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## O que eu devo fazer? diff --git a/i18n/pt/basics/why-privacy-matters.md b/i18n/pt/basics/why-privacy-matters.md new file mode 100644 index 00000000..3657c1ff --- /dev/null +++ b/i18n/pt/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Tecnologia** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Privacidade** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Fontes + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/pt/index.md b/i18n/pt/index.md index 7a44f19f..2c365422 100644 --- a/i18n/pt/index.md +++ b/i18n/pt/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/ru/basics/why-privacy-matters.md b/i18n/ru/basics/why-privacy-matters.md new file mode 100644 index 00000000..9b7a5a11 --- /dev/null +++ b/i18n/ru/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Это потому, что вы хотите приватности, а не секретности. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Источники + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/ru/index.md b/i18n/ru/index.md index adf48b0a..c6fb7a3c 100644 --- a/i18n/ru/index.md +++ b/i18n/ru/index.md @@ -44,7 +44,7 @@ schema: Не стоит путать приватность с секретностью. Все знают, что происходит в вашей ванной, но вы всё равно закрываете дверь. Это потому, что вы хотите приватности, а не секретности. **Каждому** есть что защищать. Приватность — это то, что делает вас человеком. -[:material-target-account: Распространённые интернет-угрозы](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## И что же мне делать? diff --git a/i18n/ru/tor.md b/i18n/ru/tor.md index af7cd5e9..353871f5 100644 --- a/i18n/ru/tor.md +++ b/i18n/ru/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://www.torproject.org/ru/ sameAs: https://ru.wikipedia.org/wiki/Tor applicationCategory: Браузер operatingSystem: @@ -74,65 +74,65 @@ Tor работает, направляя ваш трафик через эти !!! recommendation - ![Orbot logo](assets/img/self-contained-networks/orbot.svg){ align=right } + ![Логотип Orbot](assets/img/self-contained-networks/orbot.svg){ align=right } - **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. + **Orbot** - это бесплатный Tor VPN для смартфонов, который направляет трафик от любого приложения на вашем устройстве через сеть Tor. [:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} - [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } - [:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribute } + [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Политика конфеденциальности" } + [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Документация} + [:octicons-code-16:](https://orbot.app/code){ .card-link title="Исходный код" } + [:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Поддержать } - ??? downloads + ??? загрузки - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) - [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) -We previously recommended enabling the *Isolate Destination Address* preference in Orbot settings. While this setting can theoretically improve privacy by enforcing the use of a different circuit for each IP address you connect to, it doesn't provide a practical advantage for most applications (especially web browsing), can come with a significant performance penalty, and increases the load on the Tor network. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1] +We previously recommended enabling the *Isolate Destination Address* preference in Orbot settings. Хотя эта настройка теоретически может улучшить конфиденциальность за счет принудительного использования отдельной схемы для каждого IP-адреса, к которому вы подключаетесь, она не дает практического преимущества для большинства приложений (особенно для просмотра веб-страниц), может сопровождаться значительным снижением производительности и увеличивает нагрузку на сеть Tor. Мы больше не рекомендуем изменять этот параметр по сравнению с его значением по умолчанию, если вы не уверены в том, что это необходимо.[^1] -!!! tip "Tips for Android" +!!! совет "Советы для Android" - Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using [VpnService](https://developer.android.com/reference/android/net/VpnService) and can be used with the VPN killswitch in :gear: **Settings** → **Network & internet** → **VPN** → :gear: → **Block connections without VPN**. + Orbot может проксировать отдельные приложения, если они поддерживают SOCKS или HTTP проксирование. Он также может проксировать все ваши сетевые подключения с помощью [VpnService](https://developer.android.com/reference/android/net/VpnService) и может использоваться с VPN killswitch в :gear: **Настройки** → **Сеть и интернет** → **VPN** → :gear: → **Блокировать подключения без VPN**. - Orbot is often outdated on the Guardian Project's [F-Droid repository](https://guardianproject.info/fdroid) and [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android), so consider downloading directly from the [GitHub repository](https://github.com/guardianproject/orbot/releases) instead. + В [репозитории F-Droid](https://guardianproject.info/fdroid) проекта Guardian и [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) часто загружена устаревшая версия Orbot, поэтому его лучше загружать непосредственно с [оепозитория GitHub](https://github.com/guardianproject/orbot/releases). - All versions are signed using the same signature so they should be compatible with each other. + Все версии подписаны одной и той же подписью, поэтому они должны быть совместимы друг с другом. -## Relays and Bridges +## Ретрансляторы и Мосты -### Terms of Service; Didn't Read +### Snowflake !!! recommendation - ![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } - ![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + ![Логотип Snowflake](assets/img/browsers/snowflake.svg#only-light){ align=right } + ![Логотип Snowflake](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - **Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + **Snowflake** позволяет вам пожертвовать пропускную способность проекту Tor, используя "прокси Snowflake" в вашем браузере. - People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + Люди, подвергающиеся цензуре, могут использовать прокси Snowflake для подключения к сети Tor. Snowflake - это отличный способ внести свой вклад в работу сети Tor, даже если у вас нет технических знаний для запуска ретранслятора или моста Tor. - [:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } - [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} - [:octicons-code-16:](https://gitweb.torproject.org/pluggable-transports/snowflake.git/){ .card-link title="Source Code" } - [:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } + [:octicons-home-16: Домашняя страница](https://snowflake.torproject.org/){ .md-button .md-button--primary } + [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Документация} + [:octicons-code-16:](https://gitweb.torproject.org/pluggable-transports/snowflake.git/){ .card-link title="Исходный код" } + [:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Поддержать } - ??? downloads + ??? загрузки - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/torproject-snowflake/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/snowflake/mafpmfcccpbjnhfhjnllmmalhifmlcie) - [:octicons-browser-16: Web](https://snowflake.torproject.org/embed "Leave this page open to be a Snowflake proxy") -??? tip "Embedded Snowflake" +??? совет "Встроенный Snowflake" - You can enable Snowflake in your browser by clicking the switch below and ==leaving this page open==. You can also install Snowflake as a browser extension to have it always run while your browser is open, however adding third-party extensions can increase your attack surface. + Вы можете включить Snowflake в своем браузере, нажав на переключатель ниже и ==оставив эту страницу открытой==. Вы также можете установить Snowflake в качестве расширения браузера, чтобы он всегда работал, пока открыт браузер, однако добавление сторонних расширений может увеличить площадь атаки.
- If the embed does not appear for you, ensure you are not blocking the third-party frame from `torproject.org`. Alternatively, visit [this page](https://snowflake.torproject.org/embed.html). + если встроенное изображение не отображается, то убедитесь, что вы не блокируете third-party frame от `torproject.org`. Вы также можете посетить [эту страницу](https://snowflake.torproject.org/embed.html). -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. +Snowflake никоим образом не увеличивает вашу конфиденциальность и не используется для подключения к сети Tor в вашем персональном браузере. Однако если ваше интернет-соединение не подвергается цензуре, вам следует рассмотреть возможность его запуска, чтобы помочь людям в сетях с цензурой добиться большей конфиденциальности. Нет необходимости беспокоиться о том, на какие сайты люди заходят через ваш прокси-сервер - их видимый IP адрес будет соответствовать их выходному узлу Tor, а не вашему. -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. +Запуск прокси Snowflake не представляет особого риска. Это даже менее рискованно, чем запуск ретранслятора или моста Tor, которые не являются особо рискованными мероприятиями. Тем не менее он все равно проксирует трафик через вашу сеть, что может иметь определенные последствия, особенно если ваша сеть ограничена в пропускной способности. Убедитесь, что вы понимаете [как работает Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home), прежде чем принимать решение о запуске прокси. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: Настройка `IsolateDestAddr` обсуждается в [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) и [документации Whonix's Stream Isolation](https://www.whonix.org/wiki/Stream_Isolation), в которых оба проекта пришли к выводу, что это неподходящий подход для большинства пользователей. diff --git a/i18n/sv/basics/why-privacy-matters.md b/i18n/sv/basics/why-privacy-matters.md new file mode 100644 index 00000000..e223dc35 --- /dev/null +++ b/i18n/sv/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/sv/index.md b/i18n/sv/index.md index fc0d8496..c4e821bd 100644 --- a/i18n/sv/index.md +++ b/i18n/sv/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/tr/basics/why-privacy-matters.md b/i18n/tr/basics/why-privacy-matters.md new file mode 100644 index 00000000..e7a002ec --- /dev/null +++ b/i18n/tr/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Çünkü gizlilik değil, mahremiyet istiyorsunuz. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Kaynaklar + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/tr/index.md b/i18n/tr/index.md index f45c8c80..27173395 100644 --- a/i18n/tr/index.md +++ b/i18n/tr/index.md @@ -44,7 +44,7 @@ Tıpkı ırklar arası evlilik hakkı, kadınların oy hakkı, ifade özgürlü Mahremiyet ile gizliliği birbirine karıştırmamalısınız. Banyoda ne olduğunu biliyoruz ama yine de kapıyı kapatıyoruz. Çünkü gizlilik değil, mahremiyet istiyorsunuz. **Herkesin** koruyacak bir şeyi vardır. Mahremiyet bizi insan yapan bir şeydir. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Ne yapmalıyım? diff --git a/i18n/uk/basics/why-privacy-matters.md b/i18n/uk/basics/why-privacy-matters.md new file mode 100644 index 00000000..a7ea815b --- /dev/null +++ b/i18n/uk/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Це тому, що ви хочете конфіденційності, а не таємності. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Джерела + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/uk/index.md b/i18n/uk/index.md index 589c3540..f370a7f8 100644 --- a/i18n/uk/index.md +++ b/i18n/uk/index.md @@ -44,7 +44,7 @@ schema: Не варто плутати конфіденційність із таємністю. Ми знаємо, що відбувається у ванній, але ви все одно зачиняєте двері. Це тому, що ви хочете конфіденційності, а не таємності. **Кожному** є що захищати. Конфіденційність - це щось, що робить нас людьми. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Що мені робити? diff --git a/i18n/vi/basics/why-privacy-matters.md b/i18n/vi/basics/why-privacy-matters.md new file mode 100644 index 00000000..e223dc35 --- /dev/null +++ b/i18n/vi/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/vi/index.md b/i18n/vi/index.md index c7b1f065..16d6443c 100644 --- a/i18n/vi/index.md +++ b/i18n/vi/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/zh-Hant/CODE_OF_CONDUCT.md b/i18n/zh-Hant/CODE_OF_CONDUCT.md index 88a0e910..23073dad 100644 --- a/i18n/zh-Hant/CODE_OF_CONDUCT.md +++ b/i18n/zh-Hant/CODE_OF_CONDUCT.md @@ -1,53 +1,53 @@ -# Community Code of Conduct +# 社區行為守則 -**We pledge** to make our community a harassment-free experience for everyone. +**我們承諾** 打造一個沒有人受騷擾的社區。 -**We strive** to create a positive environment, using welcoming and inclusive language, and being respectful of the viewpoints of others. +**我們致力於**打造正向環境、 使用歡迎包容語言、尊重接納別人的觀點。 -**We do not allow** inappropriate or otherwise unacceptable behavior, such as sexualized language, trolling and insulting comments, or otherwise promoting intolerance or harassment. +**我們不允許**不適當的行為,例如性用語、捉弄與侮辱評論、鼓吹對立或騷擾。 -## Community Standards +## 社區標準 -What we expect from members of our communities: +我們對社區成員的期許: -1. **Don't spread misinformation** +1. **不要散佈不實消息** - We are creating an evidence-based educational community around information privacy and security, not a home for conspiracy theories. For example, when making a claim that a certain piece of software is malicious or that certain telemetry data is privacy invasive, explain in detail what is collected and how it collected. Claims of this nature must be backed by technical evidence. + 我們欲打造一個以證據為基石的教育社區,用來討論資訊隱私與安全,而不是陰謀論的溫床。 例如,聲稱某個軟體是惡意軟體或某些遙測資訊侵犯隱私時,請詳細解釋收集的內容和收集方式。 宣稱的本質必須有技術證據支撐。 -1. **Don't abuse our willingness to help** +1. **請勿濫用別人幫忙的善意** - Our community members are not your free tech support. We are happy to help you with specific steps on your privacy journey if you are willing to put in effort on your end. We are not willing to answer endlessly repeated questions about generic computer problems you could have answered yourself with a 30-second internet search. Don't be a [help vampire](https://slash7.com/2006/12/22/vampires/). + 社區成員並不是免費的技術支援者 如果您願意為此付出努力,我們很樂意幫助您完成隱私之旅的具體步驟。 我們不願回答一再重複的電腦常見問題,它們只需花 30 秒網路搜尋即可找到答案。 不要 [助紂為虐](https://slash7.com/2006/12/22/vampires/)。 -1. **Behave in a positive and constructive manner** +1. **舉止要積極正向** - Examples of behavior that contributes to a positive environment for our community include: + 有助於為社區創造積極環境的行為示例包括: - - Demonstrating empathy and kindness toward other people - - Being respectful of differing opinions, viewpoints, and experiences - - Giving and gracefully accepting constructive feedback - - Accepting responsibility and apologizing to those affected by our mistakes, and learning from the experience - - Focusing on what is best not just for us as individuals, but for the overall community + - 表現出對他人的同情和友善 + - 尊重各種不同的觀點和經驗 + - 給予並優雅地接受建設性反饋 + - 承擔責任並向因我們錯誤而受影響的人道歉,從經驗中吸取教訓 + - 專注於不僅對個人也對整個社區最有利的事情 -### Unacceptable Behavior +### 不允許的行為 -The following behaviors are considered harassment and are unacceptable within our community: +以下行為被視為騷擾,本社區不認可這些行為: -- The use of sexualized language or imagery, and sexual attention or advances of any kind -- Trolling, insulting or derogatory comments, and personal or political attacks -- Public or private harassment -- Publishing others' private information, such as a physical or email address, without their explicit permission -- Other conduct which could reasonably be considered inappropriate in a professional setting +- 使用帶有性暗示的言語或圖像或不受歡迎的性關注 +- 惡意破壞、貶損他人評論與人身攻擊 +- 公開或私下場合騷擾他人 +- 未經許可的公開其他人的個資,如住址、電郵 +- 任何在一個專業的場合下被合理的認為不應出現的行為 -## Scope +## 範圍 -Our Code of Conduct applies within all project spaces, as well as when an individual is representing the Privacy Guides project in other communities. +我們的行為守則適用在專案的各個面向,也適用於在外代表 Privacy Guides 的個人。 -We are responsible for clarifying the standards of our community, and have the right to remove or alter the comments of those participating within our community, as necessary and at our discretion. +我們有責任闡明社區標準,並有權在必要時自行決定刪除或更改社區參與者的評論。 -### Contact +### 聯絡 -If you observe a problem on a platform like Matrix or Reddit, please contact our moderators on that platform in chat, via DM, or through any designated "Modmail" system. +如果在 Matrix 或 Reddit 等平台上發現問題,請通過聊天、DM 或任何指定的“Modmail”系統聯繫我們在該平台上的版主。 -If you have a problem elsewhere, or a problem our community moderators are unable to resolve, reach out to `jonah@privacyguides.org` and/or `dngray@privacyguides.org`. +如果您有其它問題或困難而本社區的版主管理員無法處理, 請聯絡: `jonah@privacyguides.org` 或`dngray@privacyguides.org`. -All community leaders are obligated to respect the privacy and security of the reporter of any incident. +所有社區領導人有義務尊重事件申報人的隱私與安全。 diff --git a/i18n/zh-Hant/android.md b/i18n/zh-Hant/android.md index ed93394e..e7eab0ba 100644 --- a/i18n/zh-Hant/android.md +++ b/i18n/zh-Hant/android.md @@ -222,7 +222,7 @@ Pixel 手機很容易安裝 GrapheneOS 只需依其 [網頁安裝程式](https:/ ![Auditor logo](assets/img/android/auditor.svg#only-light){ align=right } ![Auditor logo](assets/img/android/auditor-dark.svg#only-dark){ align=right } - **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support). + **Auditor** 是一款利用硬體安全功能通過主動驗證設備身份及其作業系統的完整性來進行完整性監控的應用程式。 目前僅在 GrapheneOS 或 [支援設備](https://attestation.app/about#device-support)的庫存作業系統運行。 [:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" } @@ -238,9 +238,9 @@ Pixel 手機很容易安裝 GrapheneOS 只需依其 [網頁安裝程式](https:/ Auditor 通過下列方式鑑證和入侵檢測。 -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an *auditor* and *auditee*, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the *Auditor*. -- The *auditor* can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). -- The *auditor* records the current state and configuration of the *auditee*. +- *審計者 * 和 *被審計對象*之間使用 [首次使用信任(TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) 模式, Auditor *的硬體支援密鑰庫 中對配建立私鑰。 +- *審計者* 可以是 Auditor 應用程式的另一個實例,或是 [遠程認證服務](https://attestation.app)。 +- *審計者* 記錄 *審計對象*當前的狀態和配置。 - 如果在配對完成後發生篡改 *審計對象的作業系統* ,審計人員將意識到設備狀態和配置的變化。 - 您會被提醒注意此一變化。 @@ -255,7 +255,7 @@ Auditor 通過下列方式鑑證和入侵檢測。 ![Secure camera logo](assets/img/android/secure_camera.svg#only-light){ align=right } ![Secure camera logo](assets/img/android/secure_camera-dark.svg#only-dark){ align=right } - **Secure Camera** is a camera app focused on privacy and security which can capture images, videos and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices. + **Secure Camera** 專注於隱私和安全的相機應用,可以捕捉圖像、影片和二維碼。 CameraX 供應商擴展(肖像、HDR、夜視、面部修飾和自動)也支持可用設備。 [:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary } [:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation} @@ -268,17 +268,17 @@ Auditor 通過下列方式鑑證和入侵檢測。 - [:simple-github: GitHub](https://github.com/GrapheneOS/Camera/releases) - [:material-cube-outline: GrapheneOS App Store](https://github.com/GrapheneOS/Apps/releases) -Main privacy features include: +主要隱私功能包括: -- Auto removal of [Exif](https://en.wikipedia.org/wiki/Exif) metadata (enabled by default) -- Use of the new [Media](https://developer.android.com/training/data-storage/shared/media) API, therefore [storage permissions](https://developer.android.com/training/data-storage) are not required -- Microphone permission not required unless you want to record sound +- 自動移除 [Exif](https://en.wikipedia.org/wiki/Exif) 中繼資料 (設預啟用) +- 使用新的 [媒介](https://developer.android.com/training/data-storage/shared/media) API,因此不需要 [儲存權限](https://developer.android.com/training/data-storage)。 +- 除非需錄制聲音,否則無需麥克風權限。 !!! 備註 - Metadata is not currently deleted from video files but that is planned. + 目前影片沒有刪除中繼資料,未來計畫要刪除。 - The image orientation metadata is not deleted. If you enable location (in Secure Camera) that **won't** be deleted either. If you want to delete that later you will need to use an external app such as [ExifEraser](data-redaction.md#exiferaser). + 圖片方向的中繼資料未刪除。 如果 ( Secure Camera) 開啟定位, 也 **不會** 被不會偵測到。 如果之後想刪除,必須使用外部應用如[ExifEraser](data-redaction.md#exiferaser)。 ### 安全的 PDF 檢視器 @@ -287,7 +287,7 @@ Main privacy features include: ![Secure PDF Viewer logo](assets/img/android/secure_pdf_viewer.svg#only-light){ align=right } ![Secure PDF Viewer logo](assets/img/android/secure_pdf_viewer-dark.svg#only-dark){ align=right } - **Secure PDF Viewer** is a PDF viewer based on [pdf.js](https://en.wikipedia.org/wiki/PDF.js) that doesn't require any permissions. The PDF is fed into a [sandboxed](https://en.wikipedia.org/wiki/Sandbox_(software_development)) [webview](https://developer.android.com/guide/webapps/webview). This means that it doesn't require permission directly to access content or files. + **Secure PDF Viewer** 是基於 [pdf.js](https://en.wikipedia.org/wiki/PDF.js)的PDF 瀏覽器,無需任何權限。 此 PDF 被送入[sandboxed](https://en.wikipedia.org/wiki/Sandbox_(software_development))[webview](https://developer.android.com/guide/webapps/webview)。 這意味著它不需要權限就能直接存取內容或檔案。 [內容安全政策](https://en.wikipedia.org/wiki/Content_Security_Policy)用來強制要求 WebView 內的JavaScript 和造型屬性需全為靜態內容。 @@ -305,7 +305,7 @@ Main privacy features include: ### GrapheneOS App Store -GrapheneOS 應用商店可在 [GitHub](https://github.com/GrapheneOS/Apps/releases)找到。 It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS 應用商店可在 [GitHub](https://github.com/GrapheneOS/Apps/releases)找到。 它支持Android 12 以上版本,並且能夠自行更新。 該應用商店有 GrapheneOS 專案的獨立應用建制,如 [Auditor](https://attestation.app/)、[Camera](https://github.com/GrapheneOS/Camera)、 [PDF Viewer](https://github.com/GrapheneOS/PdfViewer)。 如果正在尋找這些應用程式,強烈建議從 GrapheneOS 應用程式商店而不是 Google Play 商店獲得,因為 GrapheneOS 會對自家商店的應用程式簽署 Google 無法訪問的簽名。 ### Aurora Store @@ -315,7 +315,7 @@ Google Play商店需要登錄 Google 帳戶,這對隱私來說不是很好。 ![Aurora Store logo](assets/img/android/aurora-store.webp){ align=right } - **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. + **Aurora Store** 為 Google Play Store 客戶端,其無須 Google 帳戶 或 microG 即可下戴應用。 [:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -324,35 +324,35 @@ Google Play商店需要登錄 Google 帳戶,這對隱私來說不是很好。 - [:simple-gitlab: GitLab](https://gitlab.com/AuroraOSS/AuroraStore/-/releases) -Aurora Store不允許其匿名帳戶下載付費應用程式。 You can optionally log in with your Google account with Aurora Store to download apps you have purchased, which does give access to the list of apps you've installed to Google, however you still benefit from not requiring the full Google Play client and Google Play Services or microG on your device. +Aurora Store不允許其匿名帳戶下載付費應用程式。 您可以選擇使用 Google 帳戶登錄 Aurora Store 來下載所購買的應用程式,這確實可以訪問您的 Google 安裝應用程式列表,但是設備仍可無需完整的Google Play 客戶端、Google Play 服務或microG。 -### Manually with RSS Notifications +### 手動使用 RSS 通知 -For apps that are released on platforms like GitHub and GitLab, you may be able to add an RSS feed to your [news aggregator](/news-aggregators) that will help you keep track of new releases. +在GitHub和GitLab 等平台上發布的應用程式,也可在 [新聞聚合器](/news-aggregators) ,添加一個 RSS源,有助於追踪新版本消息。 ![RSS APK](./assets/img/android/rss-apk-light.png#only-light) ![RSS APK](./assets/img/android/rss-apk-dark.png#only-dark) ![APK Changes](./assets/img/android/rss-changes-light.png#only-light) ![APK Changes](./assets/img/android/rss-changes-dark.png#only-dark) #### GitHub -On GitHub, using [Secure Camera](#secure-camera) as an example, you would navigate to its [releases page](https://github.com/GrapheneOS/Camera/releases) and append `.atom` to the URL: +在 GitHub,以 [Secure Camera](#secure-camera) 為例,可以導航到它的 [發布頁](https://github.com/GrapheneOS/Camera/releases) ,並在URL 最後加 `.atom`。 `https://github.com/GrapheneOS/Camera/releases.atom` #### GitLab -On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate to its [project repository](https://gitlab.com/AuroraOSS/AuroraStore) and append `/-/tags?format=atom` to the URL: +在GitLab ,以 [Aurora Store](#aurora-store) 為例,可以導航到其 [專案存取庫](https://gitlab.com/AuroraOSS/AuroraStore) ,並在URL 最後加 `/-/tags?format=atom`。 `https://gitlab.com/AuroraOSS/AuroraStore/-/tags?format=atom` #### 查驗 APK 指紋碼 -If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). +如果想下載 APK 檔案進行手動安裝,可用 [`apksigner`](https://developer.android.com/studio/command-line/apksigner) 工具驗證其簽名,這是 Android [build-tools](https://developer.android.com/studio/releases/build-tools)的一部分。 -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. 安裝 [Java JDK](https://www.oracle.com/java/technologies/downloads/)。 -2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). +2. 下載 [Android Studio 命令列工具](https://developer.android.com/studio#command-tools). -3. Extract the downloaded archive: +3. 解壓縮下載的存檔: ```bash unzip commandlinetools-*.zip @@ -360,13 +360,13 @@ If you download APK files to install manually, you can verify their signature wi ./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3" ``` -4. Run the signature verification command: +4. 執行簽名驗證指令: ```bash ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. 產生的雜湊結果可與另一個來源進行比對。 某些開發者例如 Signal 在會其官網顥示其[指紋碼](https://signal.org/android/apk/)。 ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -379,13 +379,13 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid 圖標](assets/img/android/f-droid.svg){ align=right width=120px } -==We do **not** currently recommend F-Droid as a way to obtain apps.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid 另外還有 [可複制建構](https://f-droid.org/en/docs/Reproducible_Builds/) ,用於一些應用程式,並致力於自由和開源軟體。 然而,官方F-Droid 有 [不少問題](https://privsec.dev/posts/android/f-droid-security-issues/)包括客戶端應用、 品質控制、建置方式、簽署和交付套件等等。 +==我們 **目前不推薦** 用 F-Droid 來獲取應用程式。== F-Droid 經常被推薦為 Google Play 替代品,特別是隱私社區。 可添加第三方資源庫的選項與不被局限在 Google 圍牆花園,導致了它的流行。 F-Droid 另外還有 [可複制建構](https://f-droid.org/en/docs/Reproducible_Builds/) ,用於一些應用程式,並致力於自由和開源軟體。 然而,官方F-Droid 有 [不少問題](https://privsec.dev/posts/android/f-droid-security-issues/)包括客戶端應用、 品質控制、建置方式、簽署和交付套件等等。 由於其構制應用程式的程序,F-Droid 官方資源庫中的應用程式經常在更新上落後。 F-Droid 維護者在用自己的密鑰簽署應用程式時也會重複使用套件 ID,此作法並不理想,因為這給予 F-Droid 團隊終極信任。 其他流行的第三方資源庫,如 [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) ,緩解一些擔憂。 IzzyOnDroid 存儲庫直接從 GitHub 拉取構建,是開發者自己存儲庫的下一個最好的東西。 然而,這不是我們所推薦的,當應用程式進入 F-droid 主倉庫時,通常 [就會從該倉庫刪除](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446)。 雖然可以理解(因為該特定倉庫的作用是應用程式在為 F-Droid 主倉庫接受之前託管工作),它可能會讓所安裝的應用程式不再收到更新。 -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through Play Store, Aurora Store, or by getting the APK directly from the developer. 重要的是要記住,這些資源庫裏一些應用程式已多年未更新,可能依賴於不支援的程式庫等,構成潛在的安全風險。 使用這種方法尋找新的應用程式時,應該善用最佳判斷。 +也就是說, [F-droid](https://f-droid.org/en/packages/) 和 [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) 存取庫有無數應用程式,所以它們成為搜索和發現開源應用程式的有用工具,然後通過 Play Store、Aurora Store 或直接從開發者獲得 APK 下載。 重要的是要記住,這些資源庫裏一些應用程式已多年未更新,可能依賴於不支援的程式庫等,構成潛在的安全風險。 使用這種方法尋找新的應用程式時,應該善用最佳判斷。 !!! 備註 @@ -404,11 +404,11 @@ That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](htt - 必須是開源軟體。 - 必須支援 bootloader 鎖定與自定 AVB 密鑰支援。 - Android 主要系統發布後的 1個月內接受更新。 -- Must receive Android feature updates (minor version) within 0-14 days of release. -- Must receive regular security patches within 0-5 days of release. -- Must **not** be "rooted" out of the box. -- Must **not** enable Google Play Services by default. -- Must **not** require system modification to support Google Play Services. +- 必须在发布后0-14天内收到安卓功能更新(小版本)。 +- 必須在發布後 5 天內收到定期安全補丁。 +- 必須 **不可打破常規地** root 。 +- 必須**不要**預設啟用 Google Play 服務。 +- 必須 **不用** 系統調配以支援 Google Play 服務。 ### 裝置 diff --git a/i18n/zh-Hant/basics/why-privacy-matters.md b/i18n/zh-Hant/basics/why-privacy-matters.md new file mode 100644 index 00000000..822a9675 --- /dev/null +++ b/i18n/zh-Hant/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "為什麼隱私很重要" +icon: 'material/shield-account' +--- + +在此數位資料被狠狠利用的時代,隱私從未如此重要,但許多人認為隱私早已失敗。 它不是 ==您的隱私將被奪取== 亟需關心它。 隱私關乎權力,更重要的是由誰來掌握此權力。 + +隱私最終關乎人類資訊,這很重要,因為人類資訊會賦予人們權力。 如果關心我們能成為真實、完整和自由人的能力,就必須在意你我資訊的適用規則。 現代社會的大部分內容都是圍繞**資訊**構建。 網上購物、閱讀新聞、查找資料、投票、找路或其他任何事情時,都在依賴資訊。 我們生活在資訊社會,我們的個人資訊很重要,隱私很重要。 + +## 什麼是隱私? + +許多人常把 **隱私**、 **安全**和 **匿名** 這幾個概念搞混。 例如,人們批評各種產品“不私密”,而實際上他們是指這些產品不提供匿名功能。 本網站涵蓋了這三個主題,但重要的是須了解它們之間的區別,以及每個主題何時發揮作用。 + +**隱私** +: + +==隱私是保證您的資料只被你同意的查看者看到。== 例如在即時通訊的情況中,端到端加密所提供隱私讓消息只能被您與收件人看到。 + +**安全** +: + +安全是信任所使用的應用程式——相關人士如他們所說的那樣——保證這些應用程式的安全。 又例如,在網頁瀏覽時 ,透過 HTTPS 憑證提供安全性。 + + 憑證證明您直接與正在訪問的網站對話,防止網路攻擊者讀取或修改與網站之間交流通訊的資料。 + +**匿名** +: + +匿名指沒有一個長期可識別的身份 您可以使用 [Tor](../tor.md) 達成此目的,它允許您使用隨機 IP 地址與網路連接與瀏覽網際網路而不是自己的 IP。 + + **假名** 是類似概念,它允許您擁有一個持久的識別符號,而無需將此符號與您的真實身份聯繫起來。 如果網上每個人都知道您是 `@GamerGuy12`,但沒有人知道您的真實姓名,那就是您的假名。 + +這些概念都有重疊,也有可能將這些概念任意組合。 對大多數人來說,最佳狀態是這三個概念都重疊的時候。 然而,實現起來比許多人原本想的更困難。 有時候必須在某些部份讓步,這也沒關係。 這就是**威脅建模**發揮作用之處,讓您可以就使用[軟體和服務](../tools.md) 做出明智決定 。 + +[:material-book-outline: 了解更多威脅模型](basics/threat-modeling.md ""){.md-button} + +## 隱私 vs. 祕密 + +對隱私運動常見一個反駁論點是,如果一個人**“沒有什麼可隱藏的”,就不需要隱私。**這是危險的誤解,讓人覺得要求隱私的人一定是越軌、犯罪或錯誤。 + +==不應該混淆隱私和祕密。== 人人都知道浴室裡發生了什麼,但你還是會關上門。 這是因為您需要隱私,而不是保密。 總有一些關於我們的事實——比如,個人健康資訊或性行為——不想讓全世界都知道,這沒關係。 需要隱私是合理合法的,它讓人之所以為人。 隱私是賦予權利來決定自己的資訊,而不是為了隱藏祕密。 + +## 隱私關乎控制? + +隱私一個常見定義是,*控制*誰有權訪問您的資料。 隱私是一個容易掉落的陷阱,事實上這是我們長期以來運營本網站的隱私定義。 聽起來不錯,能打動不少人,但實際上卻無效。 + +以 cookies 同意表格為例。 在訪問的各種網站,每天可能會遇到幾十次這樣的情況,它們有一系列不錯的複選框和滑塊,可讓您“調整”偏好以完全滿足您的需求。 但最後我們只是點擊了“我同意”按鈕,因為只是想閱讀文章或進行購買。 沒人想在所訪問的各個網站上完成個人隱私審計。 這是[選擇架構](https://en.wikipedia.org/wiki/Choice_architecture)中的練習,旨在讓您走簡單的路線,而不是鑽研配置選項卻是一個不存在迷宮。 + +==在大多數應用程式中控制隱私是一種幻想。== 它是一個閃亮的儀表板,您可以對自己的資料做出各種選擇,但很少有您正在尋找的選擇,比如“只使用我的資料來幫助我 ” 這種類型的控制旨在讓您對自己的選擇感到內疚,您“可以選擇”讓使用的應用程式更為私密,但您卻不這麼做。 + +隱私需要融入到默認使用的[軟體和服務](../tools.md),您不能將大多數應用程式變成自己的隱私。 + +## 來源 + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [新石油l: 為何隱私 & 安全重要](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/zh-Hant/index.md b/i18n/zh-Hant/index.md index b44d365f..de30283e 100644 --- a/i18n/zh-Hant/index.md +++ b/i18n/zh-Hant/index.md @@ -44,7 +44,7 @@ schema: 別再把隱私和祕密混為一談 人人都知道浴室裏發生了什麼,但你還是把門關上。 這是因為您需要隱私,而不是保密。 **每個人**都有要保護的東西 隱私讓我們之所以為人 -[:material-target-account: 常見網際網路威脅](basics/common-threats.md){class = "md-button md-button--primary"} +[:material-book-outline: 為什麼隱私很重要](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## 我該怎麼辦 diff --git a/i18n/zh-Hant/meta/git-recommendations.md b/i18n/zh-Hant/meta/git-recommendations.md index f59b5f81..88a7405d 100644 --- a/i18n/zh-Hant/meta/git-recommendations.md +++ b/i18n/zh-Hant/meta/git-recommendations.md @@ -1,44 +1,44 @@ --- -title: Git Recommendations +title: Git 使用建議 --- -If you make changes to this website on GitHub.com's web editor directly, you shouldn't have to worry about this. If you are developing locally and/or are a long-term website editor (who should probably be developing locally!), consider these recommendations. +如果想直接在 github.com 網頁編輯器對本站進行修改,則無須擔心此處的建議。 如您使用本地端開發或長期網站編編器(可能為本地端),請參考以下建議。 -## Enable SSH Key Commit Signing +## 開啟 SSH 密鑰提交簽署 -You can use an existing SSH key for signing, or [create a new one](https://docs.github.com/en/authentication/connecting-to-github-with-ssh/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent). +可使用現有的SSH 密鑰簽署或 [建立新密鑰one](https://docs.github.com/en/authentication/connecting-to-github-with-ssh/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent)。 -1. Configure your Git client to sign commits and tags by default (remove `--global` to only sign by default for this repo): +1. 設置 Git 客戶端以預設簽署提交與標籤(移除 `--global` 以便只對此存取庫作簽署): ``` git config --global commit.gpgsign true git config --global gpg.format ssh git config --global tag.gpgSign true ``` -2. Copy your SSH public key to your clipboard, for example: +2. 將 SSH 公鑰複製到剪貼板,例如: ``` pbcopy < ~/.ssh/id_ed25519.pub # Copies the contents of the id_ed25519.pub file to your clipboard ``` -3. Set your SSH key for signing in Git with the following command, replacing the last string in quotes with the public key in your clipboard: +3. 利用下方指令在 Git 底下設定 SSH 密鑰簽署,將最後字串置換成剪貼板中的公鑰且前後帶引號: ``` git config --global user.signingkey 'ssh-ed25519 AAAAC3(...) user@example.com' ``` -Ensure you [add your SSH key to your GitHub account](https://docs.github.com/en/authentication/connecting-to-github-with-ssh/adding-a-new-ssh-key-to-your-github-account#adding-a-new-ssh-key-to-your-account) **as a Signing Key** (as opposed to or in addition to as an Authentication Key). +確認 [加入您 GitHub 帳戶中的 SSH 密鑰](https://docs.github.com/en/authentication/connecting-to-github-with-ssh/adding-a-new-ssh-key-to-your-github-account#adding-a-new-ssh-key-to-your-account) **簽署密鑰** (其不同於驗證密鑰)。 ## Rebase on Git pull -Use `git pull --rebase` instead of `git pull` when pulling in changes from GitHub to your local machine. This way your local changes will always be "on top of" the latest changes on GitHub, and you avoid merge commits (which are disallowed in this repo). +使用 `git pull --rebase` 取代 `git pull` 以從 Github 把變動提取回本地端機器。 這種方式會使本地端的變動總在 Github 之上,而您可避免合併提交(本取存庫亦不允許)。 -You can set this to be the default behavior: +可將它設為默認行為: ``` git config --global pull.rebase true ``` -## Rebase from `main` before submitting a PR +## 發送提取請求前,先自 `main`重整。 -If you are working on your own branch, run these commands before submitting a PR: +如果是在自建的旁支工作,提取請求前先執行這些指令: ``` git fetch origin diff --git a/i18n/zh/basics/why-privacy-matters.md b/i18n/zh/basics/why-privacy-matters.md new file mode 100644 index 00000000..1e351102 --- /dev/null +++ b/i18n/zh/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**隐私** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**安全性** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## 资料来源 + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/zh/index.md b/i18n/zh/index.md index 412cbb9d..0a5c515f 100644 --- a/i18n/zh/index.md +++ b/i18n/zh/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/theme/overrides/home.ar.html b/theme/overrides/home.ar.html index bbd46ef4..493f9d7f 100644 --- a/theme/overrides/home.ar.html +++ b/theme/overrides/home.ar.html @@ -38,7 +38,7 @@

الدليل لاستعادة خصوصيتك على الإنترنت.

منظمات هائلة تراقب أنشطتك على الإنترنت. Privacy Guides هو مصدرك المركزي للخصوصية والأمن لتحمي نفسك على الإنترنت.

- + ابدأ رحلة الخصوصية diff --git a/theme/overrides/home.bn.html b/theme/overrides/home.bn.html index 54a2ca6b..b8235e36 100644 --- a/theme/overrides/home.bn.html +++ b/theme/overrides/home.bn.html @@ -38,7 +38,7 @@

আপনার অনলাইন প্রাইভেসী রক্ষা করার জন্য গাইড।

বড়ো কোম্পানিগুলি আপনার অনলাইন কার্যক্রম-এর ওপর নজরদারি করছে। প্রাইভেসী গাইডস হলো আপনার অনলাইন প্রাইভেসী এবং সিকিউরিটি সম্পর্কে জানবার প্রধান জায়গা।

-
+ আপনার প্রাইভেসি এর যাত্রা শুরু করুন diff --git a/theme/overrides/home.cs.html b/theme/overrides/home.cs.html index e7371f59..abc1601a 100644 --- a/theme/overrides/home.cs.html +++ b/theme/overrides/home.cs.html @@ -38,7 +38,7 @@

The guide to restoring your online privacy.

Masivní organizace sledují vaše online aktivity. Privacy Guides je vaším hlavním zdrojem informací o ochraně soukromí a bezpečnosti na internetu.

-
+ Začněte svoji cestu za soukromím diff --git a/theme/overrides/home.de.html b/theme/overrides/home.de.html index 7353337a..b826deaf 100644 --- a/theme/overrides/home.de.html +++ b/theme/overrides/home.de.html @@ -38,7 +38,7 @@

Der Leitfaden zur Wiederherstellung Ihrer Online-Privatsphäre.

Große Konzerne überwachen deine Onlineaktivitäten. Privacy Guides ist deine zentrale Informationsquelle für Datenschutz und Sicherheit, um dich online zu schützen.

-
+ Beginne Deine Reise zur Privatsphäre diff --git a/theme/overrides/home.el.html b/theme/overrides/home.el.html index 32301971..dd177e0f 100644 --- a/theme/overrides/home.el.html +++ b/theme/overrides/home.el.html @@ -38,7 +38,7 @@

Ο οδηγός για την αποκατάσταση του διαδικτυακού απορρήτου σας.

Μαζικές οργανώσεις παρακολουθούν τις δραστηριότητές σας στο διαδίκτυο. Ο οδηγός Privacy Guides είναι η κεντρική πηγή προστασίας του απορρήτου σας και της ασφάλειας στο διαδίκτυο.

-
+ Ξεκινήστε το ταξίδι απορρήτου σας diff --git a/theme/overrides/home.eo.html b/theme/overrides/home.eo.html index 8d5c73c9..22ff2f27 100644 --- a/theme/overrides/home.eo.html +++ b/theme/overrides/home.eo.html @@ -38,7 +38,7 @@

The guide to restoring your online privacy.

Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.

-
+ Start Your Privacy Journey diff --git a/theme/overrides/home.es.html b/theme/overrides/home.es.html index c7713554..61966951 100644 --- a/theme/overrides/home.es.html +++ b/theme/overrides/home.es.html @@ -38,7 +38,7 @@

La guía para restaurar tu privacidad en línea.

Organizaciones masivas están monitoreando tus actividades en línea. Privacy Guides es tu recurso central de privacidad y seguridad para protegerte en línea.

-
+ Inicia Tu Viaje de Privacidad diff --git a/theme/overrides/home.fa.html b/theme/overrides/home.fa.html index d80f2a82..e145aac7 100644 --- a/theme/overrides/home.fa.html +++ b/theme/overrides/home.fa.html @@ -38,7 +38,7 @@

راهنمای بازگرداندن حریم خصوصی شما.

سازمانهای بزرگ فعالیتهای اینترنتی شما را رصد می‌کنند. وبسایت Privacy Guides منبع اصلی حریم خصوصی و امنیت شما برای محافظت از خودتان در اینترنت است.

-
+ Start Your Privacy Journey diff --git a/theme/overrides/home.fr.html b/theme/overrides/home.fr.html index 91475e0c..15de13a5 100644 --- a/theme/overrides/home.fr.html +++ b/theme/overrides/home.fr.html @@ -38,7 +38,7 @@

Le guide pour restaurer votre vie privée en ligne.

Des organisations massives surveillent vos activités en ligne. Privacy Guides est votre ressource centrale en matière de vie privée et de sécurité pour vous protéger en ligne.

-
+ Commencez votre voyage vers la vie privée diff --git a/theme/overrides/home.he.html b/theme/overrides/home.he.html index dc3bde86..50839ea6 100644 --- a/theme/overrides/home.he.html +++ b/theme/overrides/home.he.html @@ -38,7 +38,7 @@

המדריך לשחזור הפרטיות המקוונת שלך.

ארגונים גדולים עוקבים אחר הפעילות שלכם באינטרנט. Privacy Guides (מדריכי פרטיות) הם משאב הפרטיות והאבטחה המרכזי שלכם כדי להגן על עצמכם באופן מקוון.

-
+ התחל את מסע הפרטיות שלך diff --git a/theme/overrides/home.hi.html b/theme/overrides/home.hi.html index 8d5c73c9..22ff2f27 100644 --- a/theme/overrides/home.hi.html +++ b/theme/overrides/home.hi.html @@ -38,7 +38,7 @@

The guide to restoring your online privacy.

Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.

-
+ Start Your Privacy Journey diff --git a/theme/overrides/home.hu.html b/theme/overrides/home.hu.html index 18cf5e00..32e65fe5 100644 --- a/theme/overrides/home.hu.html +++ b/theme/overrides/home.hu.html @@ -38,7 +38,7 @@

Útmutató az online magánéleted helyreállításához.

Hatalmas szervezetek figyelik az online tevékenységeidet. A Privacy Guides a te központi adatvédelmi és adatbiztonsági erőforrásod magad megvédéséhez online.

-
+ Kezdj Bele Adatvédelmi Utazásodba diff --git a/theme/overrides/home.id.html b/theme/overrides/home.id.html index 0348c927..984294b8 100644 --- a/theme/overrides/home.id.html +++ b/theme/overrides/home.id.html @@ -38,7 +38,7 @@

Panduan untuk memulihkan privasi daring Anda.

Organisasi besar sedang memantau aktivitas daring Anda. Privacy Guides adalah sumber daya privasi dan keamanan Anda untuk melindungi Anda secara daring.

-
+ Mulai Perjalanan Privasi Anda diff --git a/theme/overrides/home.it.html b/theme/overrides/home.it.html index 1c1023dd..f18d167a 100644 --- a/theme/overrides/home.it.html +++ b/theme/overrides/home.it.html @@ -38,7 +38,7 @@

La guida per ripristinare la tua privacy online.

Le grandi organizzazioni stanno monitorando le tue attività online. Privacy Guides è la risorsa centrale per la privacy e la sicurezza per proteggersi online.

-
+ Inizia il tuo percorso sulla privacy diff --git a/theme/overrides/home.ja.html b/theme/overrides/home.ja.html index 41d826c8..1b7b4381 100644 --- a/theme/overrides/home.ja.html +++ b/theme/overrides/home.ja.html @@ -23,10 +23,10 @@ {% extends "main.html" %} {% block extrahead %} - - - - + + + + {{ super() }} {% endblock %} {% block tabs %} @@ -38,7 +38,7 @@

オンラインプライバシーを取り戻すためのガイドです。

大規模な組織が、あなたのオンラインでの活動を監視しています。 Privacy Guidesはあなたがオンラインで自分自身を守るための、プライバシーとセキュリティに関するリソースです。

-
+ プライバシー保護を始める diff --git a/theme/overrides/home.ko.html b/theme/overrides/home.ko.html index 03548608..87491324 100644 --- a/theme/overrides/home.ko.html +++ b/theme/overrides/home.ko.html @@ -38,7 +38,7 @@

The guide to restoring your online privacy.

Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.

-
+ Start Your Privacy Journey diff --git a/theme/overrides/home.ku-IQ.html b/theme/overrides/home.ku-IQ.html index d7cc58d1..0c163542 100644 --- a/theme/overrides/home.ku-IQ.html +++ b/theme/overrides/home.ku-IQ.html @@ -38,7 +38,7 @@

ڕێبەرێک بۆ گەڕاندنەوەی تایبەتێتی خۆت لە ئینتەرنێت.

ڕێکخراوە زەبەلاحەکان چاودێری چالاکی سەرئینتەرنێتت دەکەن. Privacy Guides ناوەندی سەرچاوەی تۆیە بۆ پاراستن و تایبەتێتی شێوازی خۆپاراستن لەسەرهێڵ.

-
+ گەشتی تایبەتێتی دەست پێبکە diff --git a/theme/overrides/home.nl.html b/theme/overrides/home.nl.html index 1fabd075..d748ea4d 100644 --- a/theme/overrides/home.nl.html +++ b/theme/overrides/home.nl.html @@ -38,7 +38,7 @@

De gids voor het herstellen van jouw online privacy.

Enorme organisaties houden jouw online activiteiten in de gaten. Privacy Guides is jouw centrale bron voor privacy en beveiliging om jezelf online te beschermen.

-
+ Begin jouw privacyreis diff --git a/theme/overrides/home.pl.html b/theme/overrides/home.pl.html index 655114eb..5eeb5aeb 100644 --- a/theme/overrides/home.pl.html +++ b/theme/overrides/home.pl.html @@ -38,7 +38,7 @@

Przewodnik do odzyskania swojej prywatności w Internecie.

Ogromne korporacje monitorują Twoją aktywność w Internecie. Privacy Guides to Twoje centrum dla prywatności oraz bezpieczeństwa, które pomoże Ci chronić się w Internecie.

-
+ Rozpocznij swoją przygodę ku prywatności diff --git a/theme/overrides/home.pt-BR.html b/theme/overrides/home.pt-BR.html index bbfa633c..e278883f 100644 --- a/theme/overrides/home.pt-BR.html +++ b/theme/overrides/home.pt-BR.html @@ -38,7 +38,7 @@

O guia para restaurar sua privacidade online.

Grandes organizações estão monitorando suas atividades online. Privacy Guides é sua central de recursos no que diz respeito a privacidade e segurança para se proteger online.

-
+ Comece Sua Jornada de Privacidade diff --git a/theme/overrides/home.pt.html b/theme/overrides/home.pt.html index 8d5c73c9..22ff2f27 100644 --- a/theme/overrides/home.pt.html +++ b/theme/overrides/home.pt.html @@ -38,7 +38,7 @@

The guide to restoring your online privacy.

Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.

-
+ Start Your Privacy Journey diff --git a/theme/overrides/home.ru.html b/theme/overrides/home.ru.html index 4d111ca5..f0a24901 100644 --- a/theme/overrides/home.ru.html +++ b/theme/overrides/home.ru.html @@ -38,7 +38,7 @@

Руководство по возвращению вашей приватности в интернете.

Огромные организации следят за вашей деятельностью в Интернете. Privacy Guides - это ваш главный ресурс по конфиденциальности и безопасности для защиты себя в Интернете.

-
+ Начните свой путь к приватности diff --git a/theme/overrides/home.sv.html b/theme/overrides/home.sv.html index 2fea8d27..c6f9258f 100644 --- a/theme/overrides/home.sv.html +++ b/theme/overrides/home.sv.html @@ -38,7 +38,7 @@

En guide till hur du återställer din integritet på nätet.

Stora organisationer övervakar dina aktiviteter på nätet. Privacy Guides är din centrala resurs för integritet och säkerhet för att skydda dig själv på nätet.

-
+ Börja din resa i integritetsfrågor diff --git a/theme/overrides/home.tr.html b/theme/overrides/home.tr.html index ffacda54..f58bcb01 100644 --- a/theme/overrides/home.tr.html +++ b/theme/overrides/home.tr.html @@ -38,7 +38,7 @@

Çevrimiçi gizliliğinizi yeniden sağlama rehberi.

Büyük kurumlar sizin çevrimiçi hareketlerinizi izliyor. Privacy Guides, kendinizi çevrimiçi olarak korumanız için merkezi gizlilik ve güvenlik kaynağıdır.

-
+ Gizlilik Yolculuğunuza Başlayın diff --git a/theme/overrides/home.uk.html b/theme/overrides/home.uk.html index 920d5791..6eee5b31 100644 --- a/theme/overrides/home.uk.html +++ b/theme/overrides/home.uk.html @@ -38,7 +38,7 @@

Посібник з відновлення вашої конфіденційності в Інтернеті.

Великі організації стежать за вашою діяльністю в Інтернеті. Privacy Guides — ваш головний ресурс для захисту конфіденційності та безпеки в Інтернеті.

-
+ Почніть свою подорож до конфіденційності diff --git a/theme/overrides/home.vi.html b/theme/overrides/home.vi.html index bb986de0..1942d94c 100644 --- a/theme/overrides/home.vi.html +++ b/theme/overrides/home.vi.html @@ -38,7 +38,7 @@