diff --git a/i18n/ar/basics/why-privacy-matters.md b/i18n/ar/basics/why-privacy-matters.md new file mode 100644 index 00000000..3b7c700e --- /dev/null +++ b/i18n/ar/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. هذا لأنك تريد الخصوصية وليس السريَّة. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/ar/index.md b/i18n/ar/index.md index e81c84ea..e9665264 100644 --- a/i18n/ar/index.md +++ b/i18n/ar/index.md @@ -44,7 +44,7 @@ schema: يجب عليك عدم الخلط بين الخصوصية والسريَّة. نحن نعلم ما يحدث في الحَمَّام، لكنك ما زلت تغلق الباب، أليس كذلك؟ هذا لأنك تريد الخصوصية وليس السريَّة. **الجميع** لديه شيء لحمايته. الخصوصية شيء أصيل في البشريَّة. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## ماذا يجب أن أفعل؟ diff --git a/i18n/bn/basics/why-privacy-matters.md b/i18n/bn/basics/why-privacy-matters.md new file mode 100644 index 00000000..e223dc35 --- /dev/null +++ b/i18n/bn/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/bn/index.md b/i18n/bn/index.md index 8ad52c12..58bad79a 100644 --- a/i18n/bn/index.md +++ b/i18n/bn/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/cs/basics/why-privacy-matters.md b/i18n/cs/basics/why-privacy-matters.md new file mode 100644 index 00000000..8b5a2ff2 --- /dev/null +++ b/i18n/cs/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. To proto, že chcete soukromí, ne kvůli utajení něčeho, co v koupelně děláte. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/cs/index.md b/i18n/cs/index.md index a4e747ed..deda9a77 100644 --- a/i18n/cs/index.md +++ b/i18n/cs/index.md @@ -44,7 +44,7 @@ Stejně jako právo na mezirasové manželství, volební právo žen, svoboda p Neplťte si soukromí s utajováním nějaké činnosti. Všichni víme, co se děje v kouplně, ale přesto si zavřete dveře. To proto, že chcete soukromí, ne kvůli utajení něčeho, co v koupelně děláte. **Každý** má co chránit. Soukromí je něco, co nás dělá lidmi. -[:material-target-account: Běžné internetové hrozby](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Co mám dělat? diff --git a/i18n/de/basics/why-privacy-matters.md b/i18n/de/basics/why-privacy-matters.md new file mode 100644 index 00000000..9411e448 --- /dev/null +++ b/i18n/de/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Datenschutz** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Sicherheit** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Das liegt daran, dass du deine Privatsphäre willst, aber nicht unbedingt alles verheimlichen willst. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/de/index.md b/i18n/de/index.md index 2e2f27b7..f3f10797 100644 --- a/i18n/de/index.md +++ b/i18n/de/index.md @@ -44,7 +44,7 @@ schema: Privatsphäre sollte nicht mit Verheimlichen verwechselt werden. Wir wissen, was auf der Toilette passiert, aber machen trotzdem die Tür zu. Das liegt daran, dass du deine Privatsphäre willst, aber nicht unbedingt alles verheimlichen willst. **Alle** haben etwas zu schützen. Privatsphäre ist etwas, das uns zum Menschen macht. -[:material-target-account: Häufige Internet-Bedrohungen](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Was kann ich tun? diff --git a/i18n/el/basics/why-privacy-matters.md b/i18n/el/basics/why-privacy-matters.md new file mode 100644 index 00000000..34f3eecc --- /dev/null +++ b/i18n/el/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Αυτό συμβαίνει επειδή θέλεις ιδιωτικότητα, όχι μυστικότητα. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/el/index.md b/i18n/el/index.md index 81f83c3c..9c71faca 100644 --- a/i18n/el/index.md +++ b/i18n/el/index.md @@ -44,7 +44,7 @@ schema: Δεν πρέπει να μπερδεύεις την ιδιωτικότητα με τη μυστικότητα. Ξέρουμε τι συμβαίνει όσο είσαι στο μπάνιο, αλλά εξακολουθείς να κλείνεις την πόρτα. Αυτό συμβαίνει επειδή θέλεις ιδιωτικότητα, όχι μυστικότητα. **Όλοι** έχουν κάτι να προστατεύσουν. Η ιδιωτικότητα είναι κάτι που μας κάνει ανθρώπους. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Τι πρέπει να κάνω; diff --git a/i18n/eo/basics/why-privacy-matters.md b/i18n/eo/basics/why-privacy-matters.md new file mode 100644 index 00000000..e223dc35 --- /dev/null +++ b/i18n/eo/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/eo/index.md b/i18n/eo/index.md index cca18ca9..9ce79f27 100644 --- a/i18n/eo/index.md +++ b/i18n/eo/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/es/basics/why-privacy-matters.md b/i18n/es/basics/why-privacy-matters.md new file mode 100644 index 00000000..c858cd31 --- /dev/null +++ b/i18n/es/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Por Qué es Importante la Privacidad" +icon: 'material/shield-account' +--- + +En la era moderna de explotación de datos digitales, tu privacidad nunca ha sido más crítica, y sin embargo muchos creen que ya es una causa perdida. No lo es. ==Tu privacidad está en juego==, y debes preocuparte por ella. La privacidad es poder, y es muy importante que ese poder acabe en las manos adecuadas. + +En última instancia, la privacidad tiene que ver con la información humana, y esto es importante porque sabemos que la información humana confiere poder sobre los seres humanos. Si nos preocupamos por nuestra capacidad de ser seres humanos auténticos, realizados y libres, tenemos que preocuparnos por las normas que se aplican a la información sobre nosotros. Gran parte de nuestra sociedad moderna se estructura en torno a la **información**. Cuando compras en línea, lees las noticias, buscas algo, votas, buscas direcciones o cualquier otra cosa, dependes de la información. Si vivimos en una sociedad de la información, nuestra información importa y, por tanto, la privacidad también. + +## ¿Qué es la Privacidad? + +Mucha gente confunde los conceptos de **privacidad**, **seguridad**, y **anonimato**. Por ejemplo, verás a gente criticar varios productos por "no ser privados" cuando en realidad quieren decir que no proporcionan anonimato. En este sitio web tratamos estos tres temas, pero es importante que entiendas la diferencia entre ellos y cuándo entra en juego cada uno. + +**Privacidad** +: + +==La privacidad es la garantía de que tus datos sólo son vistos por las partes a las que van dirigidos. = En el contexto de la mensajería instantánea, por ejemplo, el cifrado de extremo a extremo proporciona privacidad al mantener tu mensaje visible sólo para ti y para el destinatario. + +**Seguridad** +: + +La seguridad es la capacidad de confiar en las aplicaciones que se utilizan -que las partes implicadas son quienes dicen ser- y mantenerlas seguras. En el contexto de la navegación por Internet, por ejemplo, la seguridad puede ser proporcionada por certificados HTTPS. + + Los certificados demuestran que está hablando directamente con el sitio web que visitas y evitan que los atacantes de su red lean o modifiquen los datos enviados al sitio web o desde él. + +**Anonimato** +: + +El anonimato es la capacidad de actuar sin un identificador persistente. Puedes conseguirlo en línea con [Tor](../tor.md), que te permite navegar por Internet con una dirección IP y una conexión de red aleatorias en lugar de las tuyas propias. + + El **pseudonimato** es un concepto similar, pero te permite tener un identificador persistente sin que esté vinculado a tu identidad real. Si todo el mundo te conoce como `@GamerGuy12` online, pero nadie conoce tu nombre real, ese es tu seudónimo. + +Todos estos conceptos se solapan, pero es posible tener cualquier combinación de ellos. Para la mayoría de la gente, el punto óptimo es cuando estos tres conceptos se solapan. Sin embargo, es más difícil de conseguir de lo que muchos creen en un principio. A veces hay que hacer concesiones en algunos aspectos, y eso también está bien. Aquí es donde entra en juego el **modelado de amenazas**, que te permite tomar buenas decisiones sobre [el software y los servicios](../tools.md) que utilizas. + +[:material-book-outline: Aprende más sobre el modelado de amenazas](basics/threat-modeling.md ""){.md-button} + +## Privacidad vs. Secretismo + +Un argumento común contra los movimientos a favor de la privacidad es la noción de que uno no necesita privacidad si no tiene **"nada que ocultar".** Se trata de una idea errónea y peligrosa, porque crea la sensación de que las personas que exigen privacidad deben ser pervertidas, criminales o estar equivocadas. + +==No deberías confundir privacidad con secretismo.== Sabemos lo que sucede en el baño, pero aun así cierras la puerta. Esto se debe a que quieres privacidad, no secretismo. Siempre hay ciertos datos sobre nosotros -por ejemplo, información personal sobre nuestra salud o nuestro comportamiento sexual- que no querríamos que todo el mundo conociera, y eso está bien. La necesidad de privacidad es legítima, y eso es lo que nos hace humanos. La privacidad consiste en potenciar tus derechos sobre tu propia información, no en ocultar secretos. + +## ¿Es la Privacidad una Cuestión de Control? + +Una definición común de privacidad es que es la capacidad de *controlar* quién tiene acceso a tus datos. Es fácil caer en esta trampa, de hecho es la definición de privacidad con la que funcionó este sitio web durante mucho tiempo. Suena bien y atrae a mucha gente, pero en la práctica no funciona. + +Por ejemplo, los formularios de consentimiento de cookies. Es posible que los encuentre docenas de veces al día en los distintos sitios web que visitas, con una bonita serie de casillas de verificación y controles deslizantes que te permiten "comisariar" tus preferencias para que se ajusten exactamente a tus necesidades. Al final, nos limitamos a darle al botón "Acepto", porque sólo queremos leer el artículo o hacer una compra. Nadie quiere completar una auditoría de privacidad personal en cada uno de los sitios web que visita. Se trata de un ejercicio de [arquitectura de elección](https://en.wikipedia.org/wiki/Choice_architecture), diseñado para que tomes el camino más fácil en lugar de adentrarte en un laberinto de opciones de configuración que, para empezar, no tienen por qué existir. + +==El control de tu privacidad dentro de la mayoría de las aplicaciones es una ilusión.== Es un tablero brillante con todo tipo de opciones que puedes elegir sobre tus datos, pero rara vez son las opciones que buscas, como "sólo usar mis datos para ayudarme" Este tipo de control pretende hacerte sentir culpable de tus elecciones, de que "tuviste la opción" de hacer más privadas las aplicaciones que utilizas y elegiste no hacerlo. + +La privacidad es algo que tenemos que tener incorporado en [el software y los servicios](../tools.md) que utilizamos por defecto, no puedes hacer que la mayoría de las aplicaciones sean privadas por tu cuenta. + +## Fuentes + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) por Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants en GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/es/email-clients.md b/i18n/es/email-clients.md index 19a0ce0f..d458f92c 100644 --- a/i18n/es/email-clients.md +++ b/i18n/es/email-clients.md @@ -66,11 +66,11 @@ Estas opciones se encuentran en :material-menu: → **Ajustes** → **Privacidad **Apple Mail** está incluido en macOS y puede ampliarse para que sea compatible con OpenPGP con [GPG Suite](encryption.md#gpg-suite), que añade la posibilidad de enviar correo electrónico cifrado con PGP. - [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} + [:octicons-home-16: Página Principal](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Política de Privacidad" } + [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentación} -Apple Mail has the ability to load remote content in the background or block it entirely and hide your IP address from senders on [macOS](https://support.apple.com/guide/mail/mlhl03be2866/mac) and [iOS](https://support.apple.com/guide/iphone/iphf084865c7/ios). +Apple Mail tiene la capacidad de cargar contenido remoto en segundo plano o bloquearlo por completo y ocultar su dirección IP a los remitentes en [macOS](https://support.apple.com/guide/mail/mlhl03be2866/mac) e [iOS](https://support.apple.com/guide/iphone/iphf084865c7/ios). ### Canary Mail (iOS) diff --git a/i18n/es/index.md b/i18n/es/index.md index 29455227..4dd035f9 100644 --- a/i18n/es/index.md +++ b/i18n/es/index.md @@ -44,7 +44,7 @@ Al igual que el derecho al matrimonio interracial, el sufragio femenino, la libe No deberías confundir privacidad con secretismo. Sabemos lo que pasa en el cuarto de baño, pero aún así cierras la puerta. Esto se debe a que quieres privacidad, no secretismo. **Todo el mundo** tiene algo que proteger. La privacidad es algo que nos hace humanos. -[:material-target-account: Amenazas Comunes en Internet](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Por Qué es Importante la Privacidad](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## ¿Qué debo hacer? diff --git a/i18n/es/news-aggregators.md b/i18n/es/news-aggregators.md index 15425285..22c974e0 100644 --- a/i18n/es/news-aggregators.md +++ b/i18n/es/news-aggregators.md @@ -99,7 +99,7 @@ Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una ma { align=right } - **NetNewsWire** es un lector de fuentes gratuito y de código abierto para macOS e iOS centrado en un diseño y unas funciones nativos. It supports the typical feed formats alongside built-in support for Reddit feeds. + **NetNewsWire** es un lector de fuentes gratuito y de código abierto para macOS e iOS centrado en un diseño y unas funciones nativos. Es compatible con los formatos de fuente típicos, además incluye soporte integrado para fuentes de Reddit. [:octicons-home-16: Página Principal](https://netnewswire.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Política de Privacidad" } diff --git a/i18n/es/passwords.md b/i18n/es/passwords.md index f0e2515d..c5f52d60 100644 --- a/i18n/es/passwords.md +++ b/i18n/es/passwords.md @@ -177,9 +177,9 @@ El código del lado del servidor de Bitwarden es [de código abierto](https://gi **1Password** es un administrador de contraseñas con un fuerte enfoque en la seguridad y la facilidad de uso, que le permite almacenar contraseñas, tarjetas de crédito, licencias de software y cualquier otra información sensible en una bóveda digital segura. Su bóveda es alojada en los servidores de 1Password por una [cuota mensual](https://1password.com/sign-up/). 1Password es [audited](https://support.1password.com/security-assessments/) de forma regular y ofrece una atención al cliente excepcional. 1Password es de código cerrado; sin embargo, la seguridad del producto está exhaustivamente documentada en su [libro blanco de seguridad](https://1passwordstatic.com/files/security/1password-white-paper.pdf). - [:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} + [:octicons-home-16: Página Principal](https://1password.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Política de Privacidad" } + [:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentación} ??? downloads "Descargas" diff --git a/i18n/fa/basics/why-privacy-matters.md b/i18n/fa/basics/why-privacy-matters.md new file mode 100644 index 00000000..e223dc35 --- /dev/null +++ b/i18n/fa/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/fa/index.md b/i18n/fa/index.md index 46b341f7..b148d03e 100644 --- a/i18n/fa/index.md +++ b/i18n/fa/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/fr/basics/why-privacy-matters.md b/i18n/fr/basics/why-privacy-matters.md new file mode 100644 index 00000000..5a103865 --- /dev/null +++ b/i18n/fr/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Confidentialité** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Sécurité** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. C'est parce que vous voulez une vie privée, et non pas du secret. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/fr/index.md b/i18n/fr/index.md index e70e59ef..4bd52009 100644 --- a/i18n/fr/index.md +++ b/i18n/fr/index.md @@ -44,7 +44,7 @@ Tout comme le droit au mariage mixte, le droit de vote des femmes, la liberté d Il ne faut pas confondre la vie privée et le secret. Même si on sait ce qui se passe dans la salle de bain, vous fermez quand même la porte. C'est parce que vous voulez une vie privée, et non pas du secret. **Tout le monde** a quelque chose à protéger. La vie privée est quelque chose qui nous rend humains. -[:material-target-account: Menaces Internet courantes](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Que dois-je faire ? diff --git a/i18n/he/basics/why-privacy-matters.md b/i18n/he/basics/why-privacy-matters.md new file mode 100644 index 00000000..bb48d5ef --- /dev/null +++ b/i18n/he/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**פרטיות** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**אבטחה** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. זה בגלל שאתה רוצה פרטיות, לא סודיות. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## מקורות + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/he/index.md b/i18n/he/index.md index c6ada5ac..35cdd063 100644 --- a/i18n/he/index.md +++ b/i18n/he/index.md @@ -44,7 +44,7 @@ schema: אין לבלבל בין פרטיות לסודיות. אנחנו יודעים מה קורה בשירותים, אבל עדיין סוגרים את הדלת. זה בגלל שאתה רוצה פרטיות, לא סודיות. **לכל** אחד יש על מה להגן. פרטיות היא משהו שהופך אותנו לאנושיים. -[:material-target-account: איומי אינטרנט נפוצים](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## מה אני צריך לעשות? diff --git a/i18n/hi/basics/why-privacy-matters.md b/i18n/hi/basics/why-privacy-matters.md new file mode 100644 index 00000000..e223dc35 --- /dev/null +++ b/i18n/hi/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/hi/index.md b/i18n/hi/index.md index 531bf330..8c300bc8 100644 --- a/i18n/hi/index.md +++ b/i18n/hi/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/hu/basics/why-privacy-matters.md b/i18n/hu/basics/why-privacy-matters.md new file mode 100644 index 00000000..e89f1ec1 --- /dev/null +++ b/i18n/hu/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Adatvédelem** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Adatbiztonság** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Ez azért van, mert magánéletet akarsz, nem titoktartást. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/hu/index.md b/i18n/hu/index.md index 2e5de347..4eb390c3 100644 --- a/i18n/hu/index.md +++ b/i18n/hu/index.md @@ -44,7 +44,7 @@ A kultúrák közötti házassághoz, a női választójoghoz, a szólásszabads Nem szabad összekeverni a magánéletet a titoktartással. Tudjuk, hogy mi történik a mosdóban, de az ajtó mégis becsukjuk. Ez azért van, mert magánéletet akarsz, nem titoktartást. **Mindenkinek** van valami, amit meg akar védeni. A magánélet olyasmi, ami emberré tesz minket. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Mihez kezdjek? diff --git a/i18n/id/basics/why-privacy-matters.md b/i18n/id/basics/why-privacy-matters.md new file mode 100644 index 00000000..f438ddef --- /dev/null +++ b/i18n/id/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privasi** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Keamanan** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Itu karena Anda menginginkan privasi, bukan kerahasiaan. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sumber + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/id/index.md b/i18n/id/index.md index 9cd3d087..5ea48e41 100644 --- a/i18n/id/index.md +++ b/i18n/id/index.md @@ -44,7 +44,7 @@ Sama seperti hak untuk menikah antar ras, hak pilih perempuan, kebebasan berbica Anda tidak harus bingung antara privasi dengan kerahasiaan. Kami tahu apa yang terjadi di kamar mandi, tapi Anda tetap menutup pintunya. Itu karena Anda menginginkan privasi, bukan kerahasiaan. **Setiap orang** memiliki sesuatu untuk dilindungi. Privasi adalah sesuatu yang membuat kita menjadi manusia. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Apa yang harus saya lakukan? diff --git a/i18n/it/about/index.md b/i18n/it/about/index.md index 72af6baa..b0aefadb 100644 --- a/i18n/it/about/index.md +++ b/i18n/it/about/index.md @@ -21,7 +21,7 @@ schema: **Privacy Guides** è un sito web a sfondo sociale che fornisce [informazioni](/kb) per proteggere la sicurezza e la privacy dei dati. La nostra missione è informare il pubblico sul valore della privacy digitale e sulle iniziative governative globali che mirano a monitorare la vostra attività online. Siamo un collettivo senza scopo di lucro gestito interamente da [membri del team](https://discuss.privacyguides.net/g/team) e collaboratori volontari. Il nostro sito è privo di pubblicità e non è affiliato a nessuno dei fornitori elencati. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Pagina principale } +[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Pagina Principale } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Codice sorgente" } [:octicons-heart-16:](donate.md){ .card-link title=Contribuisci } diff --git a/i18n/it/android.md b/i18n/it/android.md index 3cdec65f..4d714f70 100644 --- a/i18n/it/android.md +++ b/i18n/it/android.md @@ -83,7 +83,7 @@ schema: **Android Open Source Project** è un sistema operativo mobile open-source sviluppato da Google che viene utilizzato nella maggior parte dei dispositivi mobile del mondo. La maggior parte dei telefoni venduti con Android sono modificati per includere integrazioni e applicazioni invasive come Google Play Services, quindi è possibile migliorare significativamente la privacy sul proprio dispositivo mobile sostituendo l'installazione predefinita del telefono con una versione di Android priva di queste caratteristiche invasive. -[:octicons-home-16:](https://source.android.com/){ .card-link title="Pagina principale" } +[:octicons-home-16:](https://source.android.com/){ .card-link title="Pagina Principale" } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentazione} [:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Codice sorgente" } @@ -110,8 +110,8 @@ Consigliamo di installare sul dispositivo uno dei seguenti sistemi operativi bas GrapheneOS offre miglioramenti aggiuntivi in termini di [hardening della sicurezza] (https://it.wikipedia.org/wiki/Hardening) e di privacy. Dispone di un [allocatore di memoria rafforzato](https://github.com/GrapheneOS/hardened_malloc), di autorizzazioni per la rete e per i sensori, di varie altre [caratteristiche di sicurezza](https://grapheneos.org/features). GrapheneOS viene inoltre fornito con aggiornamenti completi del firmware e build firmate, quindi il verified boot è pienamente supportato. - [:octicons-home-16: Pagina principale](https://signal.org/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://signal.org/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentazione} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://grapheneos.org/donate/){ .card-link title=Contribuisci } @@ -131,9 +131,9 @@ I telefoni Google Pixel sono gli unici dispositivi che attualmente soddisfano i **DivestOS** è un soft-fork di [LineageOS](https://lineageos.org/). DivestOS eredita molti [dispositivi supportati] (https://divestos.org/index.php?page=devices&base=LineageOS) da LineageOS. Fornisce build firmate, che consentono di avere [verified boot](https://source.android.com/security/verifiedboot) su alcuni dispositivi non-Pixel. - [:octicons-home-16: Pagnia principale](https://divestos.org){ .md-button .md-button--primary } + [:octicons-home-16: Pagnia Principale](https://divestos.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title=Onion } - [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribuisci } @@ -224,8 +224,8 @@ In questo sito raccomandiamo un'ampia gamma di applicazioni per Android. Le app **Auditor * * è un'app che sfrutta le funzionalità di sicurezza hardware per fornire il monitoraggio dell'integrità del dispositivo convalidando attivamente l'identità di un dispositivo e l'integrità del suo sistema operativo. Attualmente funziona solo con GrapheneOS o con il sistema operativo stock per i [dispositivi supportati](https://attestation.app/about#device-support). - [:octicons-home-16: Pagina principale](https://attestation.app){ .md-button .md-button--primary } - [:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://attestation.app){ .md-button .md-button--primary } + [:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://attestation.app/about){ .card-link title=Documentazione} [:octicons-code-16:](https://attestation.app/source){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://attestation.app/donate){ .card-link title=Contribuisci } @@ -317,7 +317,7 @@ Il Google Play Store richiede un account Google per l'accesso, il che non è un **Aurora Store** è un client di Google Play Store che non richiede un account Google, Google Play Services o microG per scaricare le app. - [:octicons-home-16: Pagina principale](https://auroraoss.com/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://auroraoss.com/){ .md-button .md-button--primary } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Codice sorgente" }. ??? download diff --git a/i18n/it/basics/why-privacy-matters.md b/i18n/it/basics/why-privacy-matters.md new file mode 100644 index 00000000..4bcc340a --- /dev/null +++ b/i18n/it/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Perchè la Privacy è importante" +icon: 'material/shield-account' +--- + +Nell'era moderna dello sfruttamento dei dati digitali, la tua privacy non è mai stata così importante, eppure molti credono che sia già una causa persa. Non è così. ==La tua privacy è in palio==, e devi prendertene cura. La Privacy è questione di potere, ed è molto importante che questo potere finisca nelle mani giuste. + +La privacy riguarda dopotutto le informazioni umane, e questo è importante poiché sappiamo che le informazioni umane conferiscono potere sugli esseri umani. Se ci interessa la nostra capacità di diventare esseri umani autentici, realizzati e liberi, dobbiamo preoccuparci innanzitutto delle regole che si applicano alle informazioni che ci riguardano. Gran parte della società moderna in cui viviamo si basa sulle **informazioni**. Quando fai acquisti online, leggi notizie, cerchi qualcosa, voti, cerchi indicazioni stradali o qualsiasi altra cosa, ti stai affidando a informazioni. Se viviamo in una società basata sulle informazioni, le nostre informazioni sono importanti e di conseguenza la privacy è importante. + +## Che cos'è la Privacy? + +Molte persone confondono il significato di **privacy**, **sicurezza**, e **anonimato**. Vedrai persone criticare diversi prodotti definendoli "non privati", quando in realtà intendono che non forniscono l'anonimato, per esempio. In questo sito, trattiamo tutti e tre gli argomenti, ma è importante capire la differenza tra loro e quando ciascuno di essi entra in gioco. + +**Privacy** +: + +==La privacy è la garanzia che i tuoi dati siano visti solo dalle parti a cui intendi farli visualizzare.== Nel contesto di un'app di messaggistica istantanea, ad esempio, la crittografia end-to-end fornisce la privacy mantenendo il messaggio visibile solo a te stesso e al destinatario. + +**Sicurezza** +: + +La sicurezza è la capacità di fidarsi delle applicazioni che utilizzi—che le parti coinvolte sono quelle che dicono di essere—e di mantenerle sicure. Nel contesto della navigazione web, per esempio, la sicurezza può essere fornita attraverso i certificati HTTPS. + + I certificati dimostrano che stai parlando effettivamente con il sito che stai visitando, impedendo agli aggressori presenti sulla tua rete di leggere o modificare i dati inviati o ricevuti dal sito web. + +**Anonimato** +: + +L'anonimato è la capacità di agire senza un identificatore persistente. È possibile ottenere questo risultato online utilizzando [Tor](../tor.md), che consente di navigare in Internet con un indirizzo IP ed una connessione di rete casuale anziché la tua. + + **Pseudonimato** è un concetto simile, ma ti consente di avere un identificatore persistente che non viene legato alla tua vera identità. Se tutti ti conoscono come `@GamerGuy12` online, ma nessuno conosce il tuo vero nome, quello è il tuo pseudonimo. + +Tutti questi concetti si sovrappongono, ma è possibile avere qualsiasi combinazione di tutti e tre. La perfezione per la maggior parte delle persone la si raggiunge quando tutti e tre i concetti si sovrappongono. Tuttavia, è più difficile da raggiungere di quanto molti credano inizialmente. A volte, dovrai sacrificarne uno dei 3, e va bene anche così. È qui che entra in gioco la **modellazione delle minacce** che consente di prendere decisioni informate sui [software e sui servizi](../tools.md) da utilizzare. + +[:material-book-outline: Per saperne di più sulla Modellazione delle minacce](basics/threat-modeling.md ""){.md-button} + +## Privacy vs Segretezza + +Una controargomentazione abbastanza comune ai movimenti a favore della privacy è l'idea che una persona non ha bisogno di privacy se non ha **"nulla da nascondere".** Si tratta di un concetto sbagliato e pericoloso, perché da l'idea che le persone che richiedono la privacy debbano essere devianti, criminali o sbagliate. + +==Non bisogna confondere la privacy con la segretezza.== Sappiamo cosa succede in bagno, ma comunque tu chiudi la porta. Questo perché vuoi la privacy, non la segretezza. Ci sono sempre alcuni fatti che ci riguardano—per esempio, informazioni sulla salute personale o sulle abitudini sessuali—che non vorremmo che il mondo intero conoscesse, ed è giusto così. La necessità di privacy è legittima, ed è questo che ci rende umani. La privacy consiste nel rafforzare i diritti sulle proprie informazioni, non nel nascondere i segreti. + +## La privacy è controllo? + +Una definizione comune di privacy è che si tratta della possibilità di *controllare* chi ha accesso ai tuoi dati. È una trappola in cui è facile caderci, infatti è la definizione di privacy su cui abbiamo gestito questo sito per molto tempo. Sembra bello, piace a molte persone, ma in pratica non funziona. + +Prendi i moduli di consenso per i cookie ad esempio. Potresti trovarli decine di volte al giorno sui vari siti web che visiti, con una bella serie di caselle e slider che ti consentono di "selezionare" le preferenze per adattarle alle tue esigenze. Alla fine, ci limitiamo a cliccare il pulsante "Accetto", perché vogliamo solo leggere l'articolo o fare un acquisto. Nessuno vuole completare una verifica della propria privacy personale su ogni singolo sito web che visita. Si tratta di un esercizio di [architettura delle scelte](https://en.wikipedia.org/wiki/Choice_architecture), progettato per farvi prendere la via d'uscita più veloce invece di addentrarvi in un labirinto di opzioni di configurazione che non hanno bisogno di esistere in primo luogo. + +==Il controllo della tua privacy all'interno della maggior parte delle app è soltanto un'illusione.== È un'interfaccia scintillante con ogni tipo di scelta che si può fare con i propri dati, ma raramente riesci a trovare le scelte che stai effettivamente cercando, come "usa i miei dati solo per aiutarmi" Questo tipo di controllo ha lo scopo di farti sentire in colpa per le tue scelte, perché "potevi scegliere" di rendere private le app che utilizzi di solito e hai deciso di non farlo. + +La privacy è un elemento che deve essere integrato nei [ software e nei servizi](../tools.md) che utilizziamo di default; non puoi rendere la maggior parte delle app private da solo. + +## Fonti + +- [Perchè la Privacy è importante](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) di Neil Richards +- [Il nuovo petrolio: Perchè la privacy & la sicurezza sono importanti](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants su GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/it/calendar.md b/i18n/it/calendar.md index 5e1a8aa2..f714d1b5 100644 --- a/i18n/it/calendar.md +++ b/i18n/it/calendar.md @@ -19,7 +19,7 @@ I calendari contengono alcuni dei vostri dati più sensibili; utilizzate prodott Calendari multipli e funzionalità di condivisione estese sono limitate agli abbonati a pagamento. [:octicons-home-16: Pagina principale](https://tutanota.com/calendar){ .md-button .md-button--primary } - [:octicons-eye-16:](https://tutanota.com/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://tutanota.com/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://tutanota.com/faq){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://tutanota.com/community/){ .card-link title=Contribuisci } @@ -43,7 +43,7 @@ I calendari contengono alcuni dei vostri dati più sensibili; utilizzate prodott **Proton Calendar** è un servizio di calendario criptato disponibile per i membri Proton tramite web o client mobile. Le caratteristiche includono: E2EE automatico di tutti i dati, funzioni di condivisione, funzionalità di importazione/esportazione e [altre funzionalità](https://proton.me/support/proton-calendar-guide). Gli utenti gratuiti hanno accesso ad un singolo calendario, mentre gli abbonati a pagamento possono crearne fino a 20. Anche la funzionalità di condivisione avanzata è limitata agli abbonati a pagamento. [:octicons-home-16: Pagina principale](https://proton.me/calendar){ .md-button .md-button--primary } - [:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="informativa sulla privacy" } + [:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://proton.me/support/proton-calendar-guide){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Codice sorgente" } diff --git a/i18n/it/cryptocurrency.md b/i18n/it/cryptocurrency.md index 1d372719..ec366535 100644 --- a/i18n/it/cryptocurrency.md +++ b/i18n/it/cryptocurrency.md @@ -21,7 +21,7 @@ Effettuare pagamenti online è una delle maggiori sfide per la privacy. Queste c **Monero** utilizza una blockchain con tecnologie che migliorano la privacy e offuscano le transazioni per ottenere l'anonimato. Ogni transazione Monero nasconde l'importo della transazione, gli indirizzi di invio e ricezione, e la fonte dei fondi senza dover fare i salti mortali, il che la rende una scelta ideale per i neofiti delle criptovalute. - [:octicons-home-16: Pagina principale](https://www.getmonero.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://www.getmonero.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Codice Sorgente" } [:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribuisci } diff --git a/i18n/it/data-redaction.md b/i18n/it/data-redaction.md index 852fd310..6d792742 100644 --- a/i18n/it/data-redaction.md +++ b/i18n/it/data-redaction.md @@ -118,10 +118,10 @@ L'applicazione offre diversi modi per cancellare i metadati dalle immagini. Ovve Spesso è usato come un componente di altre applicazioni di rimozione Exif ed è presente nei repository della maggior parte delle distribuzioni Linux. - [:octicons-home-16: Homepage](https://exiftool.org){ .md-button .md-button--primary } - [:octicons-info-16:](https://exiftool.org/faq.html){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/exiftool/exiftool){ .card-link title="Source Code" } - [:octicons-heart-16:](https://exiftool.org/#donate){ .card-link title=Contribute } + [:octicons-home-16: Pagina principale](https://exiftool.org){ .md-button .md-button--primary } + [:octicons-info-16:](https://exiftool.org/faq.html){ .card-link title=Documentazione} + [:octicons-code-16:](https://github.com/exiftool/exiftool){ .card-link title="Codice sorgente" } + [:octicons-heart-16:](https://exiftool.org/#donate){ .card-link title=Contribuisci } ??? download diff --git a/i18n/it/desktop-browsers.md b/i18n/it/desktop-browsers.md index 9abf4a26..34830c99 100644 --- a/i18n/it/desktop-browsers.md +++ b/i18n/it/desktop-browsers.md @@ -69,16 +69,16 @@ Se hai bisogno di navigare in Internet in modo anonimo, dovresti invece usare [T **Mullvad Browser** è una versione di [Tor Browser](tor.md#tor-browser) con le integrazioni della rete Tor rimosse, con l'obiettivo di fornire le tecnologie anti-fingerprinting di Tor Browser agli utenti che usano una VPN. È sviluppato dal Progetto Tor e distribuito da [Mullvad](vpn.md#mullvad) e **non** richiede l'uso della VPN di Mullvad. - [:octicons-home-16: Pagina principale](https://mullvad.net/en/browser){ .md-button .md-button--primary } - [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://mullvad.net/en/browser){ .md-button .md-button--primary } + [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentazione} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Codice sorgente" } - ??? downloads + ??? download - - [:simple-windows11: Windows](https://mullvad.net/en/download/browser/windows) - - [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos) - - [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux) + - [:simple-windows11: Windows](https://mullvad.net/it/download/browser/windows) + - [:simple-apple: macOS](https://mullvad.net/it/download/browser/macos) + - [:simple-linux: Linux](https://mullvad.net/it/download/browser/linux) Come [Tor Browser](tor.md), Mullvad Browser è progettato per prevenire il fingerprinting rendendo l'impronta digitale del browser identica a quella di tutti gli altri utenti di Mullvad Browser e include impostazioni ed estensioni predefinite che vengono configurate automaticamente dai livelli di sicurezza predefiniti: *Standard*, *Safer* e *Safest*. Pertanto, è indispensabile **non** modificare il browser oltre i livelli di sicurezza [predefiniti](https://tb-manual.torproject.org/security-settings/). Altre modifiche renderebbero l'impronta digitale unica, vanificando lo scopo dell'utilizzo di questo browser. Se desideri configurare il tuo browser in modo più completo e il fingerprinting non vi preoccupa, vi consigliamo di utilizzare [Firefox](#firefox). @@ -110,8 +110,8 @@ Mullvad Browser utilizza DuckDuckGo come [motore di ricerca](search-engines.md) **Firefox** offre robuste impostazioni di privacy, come la [protezione antitracciamento avanzata](https://support.mozilla.org/it/kb/protezione-antitracciamento-avanzata-firefox-desktop), che aiuta a bloccare varie [tipologie di tracciamento](https://support.mozilla.org/it/kb/protezione-antitracciamento-avanzata-firefox-desktop#w_che-cosa-viene-bloccato-con-la-protezione-antitracciamento-avanzata). - [:octicons-home-16: Pagina principale](https://firefox.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://firefox.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentazione} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribuisci } @@ -202,11 +202,11 @@ Arkenfox mira solo a contrastare gli script di tracciamento di base o ingenui at **Brave Browser** include un content blocker integrato e [funzionalità di privacy](https://brave.com/privacy-features/), molte delle quali attive in modo predefinito. - Brave è sviluppato a partire dal progetto del browser web Chromium, quindi dovrebbe risultare familiare e avere problemi minimi di compatibilità con i siti web. + Brave è stato sviluppato utilizzando il progetto del browser Chromium, quindi dovrebbe risultarti familiare e avrai pochi problemi di compatibilità con i vari siti web. [:octicons-home-16: Pagina principale](https://brave.com/){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Servizio Onion" } - [:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Codice sorgente" } diff --git a/i18n/it/desktop.md b/i18n/it/desktop.md index ab0502c3..a4c926fd 100644 --- a/i18n/it/desktop.md +++ b/i18n/it/desktop.md @@ -19,7 +19,7 @@ Le distribuzioni Linux sono comunemente consigliate per la protezione della priv **Fedora Workstation** è la distribuzione che raccomandiamo per utenti nuovi a Linux. Fedora generalmente adotta tecnologie più recenti prima di altre distribuzioni, ad esempio [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org), e presto, [FS-Verity](https://fedoraproject.org/wiki/Changes/FsVerityRPM). Queste nuove tecnologie spesso comportano miglioramenti alla sicurezza, privacy e usabilità in generale. - [:octicons-home-16: Pagina principale](https://getfedora.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://getfedora.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentazione} [:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribuisci } @@ -35,7 +35,7 @@ Fedora ha un ciclo di rilascio semi-rolling. Mentre alcuni pacchetti come [GNOME openSUSE Tumbleweed ha un sistema di [aggiornamenti "transazionali"](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) che usa [Btrfs](https://it.wikipedia.org/wiki/Btrfs) e [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) per assicurare che le istantanee possano essere ripristinate in caso di problemi. - [:octicons-home-16: Pagina principale](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } [:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentazione} [:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribuisci } @@ -49,7 +49,7 @@ Tumbleweed segue un modello di rilascio continuo in cui ogni aggiornamento viene **Arch Linux** è una distribuzione leggera, fai-da-te (DIY) che significa che ottieni solo ciò che installi. Per maggiori informazioni visita le loro [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). - [:octicons-home-16: Pagina principale](https://archlinux.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://archlinux.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentazione} [:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribuisci } @@ -69,7 +69,9 @@ Gran parte dei [pacchetti di Arch Linux](https://reproducible.archlinux.org) son **Fedora Silverblue** e **Fedora Kinoite** sono varianti immutabili di Fedora con una forte attenzione al flussi di lavoro basato su contenitori. Silverblue viene fornito con l'ambiente desktop [GNOME](https://www.gnome.org/) mentre Kinoite viene fornito con [KDE](https://kde.org/). Silverblue e Kinoite seguono lo stesso programma di rilascio di Fedora Workstation, beneficiando degli stessi aggiornamenti veloci e rimanendo molto vicini all'upstream. - [Visita silverblue.fedoraproject.org](https://silverblue.fedoraproject.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://silverblue.fedoraproject.org/){ .md-button .md-button--primary } + [:octicons-info-16:](https://docs.fedoraproject.org/it/fedora-silverblue//){ .card-link title=Documentazione} + [:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribuisci } Silverblue (e Kinoite) differiscono da Fedora Workstation perché sostituiscono il gestore di pacchetti [DNF](https://fedoraproject.org/wiki/DNF) con un'alternativa molto più avanzata chiamata [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/rawhide/system-administrators-guide/package-management/rpm-ostree/). Il gestore di pacchetti `rpm-ostree` funziona scaricando un'immagine di base per il sistema, quindi sovrapponendo i pacchetti in un albero di commit simile a [git](https://en.wikipedia.org/wiki/Git). Quando il sistema viene aggiornato, viene scaricata una nuova immagine di base e le sovrapposizioni vengono applicate a questa nuova immagine. @@ -87,7 +89,7 @@ Come alternativa a Flatpaks, c'è l'opzione di [Toolbox](https://docs.fedoraproj NixOS è una distribuzione indipendente basata sul gestore di pacchetti Nix con una particolare attenzione alla riproducibilità e all'affidabilità. - [:octicons-home-16: Pagina principale](https://nixos.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://nixos.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentazione} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribuisci } @@ -111,7 +113,7 @@ Nix è un gestore di pacchetti basato sul codice sorgente; se non c'è nessun pa **Whonix** è basato su [Kicksecure](https://www.whonix.org/wiki/Kicksecure), un fork di Debian focalizzato sulla sicurezza. Mira a fornire privacy, sicurezza e anonimato su internet. Whonix è meglio utilizzato insieme a [Qubes OS](#qubes-os). - [:octicons-home-16: Pagina principale](https://www.whonix.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://www.whonix.org/){ .md-button .md-button--primary } [:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Servizio onion" } [:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentazione} [:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribuisci } @@ -132,7 +134,7 @@ Whonix è utilizzato al meglio [in combinazione con Qubes](https://www.whonix.or **Tails** è un sistema operativo live basato su Debian che instrada tutte le comunicazioni attraverso Tor, che può essere avviato su quasi tutti i computer da un'installazione su DVD, chiavetta USB o scheda SD. Utilizza [Tor](tor.md) per preservare la privacy e l'anonimato aggirando la censura e non lascia traccia di sé sul computer su cui viene utilizzato una volta spento. - [:octicons-home-16: Pagina principale](https://tails.boum.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://tails.boum.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentazione} [:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribuisci } @@ -152,10 +154,10 @@ Da progettazione, Tails è previsto che si ripristini completamente dopo ogni ri **Qubes OS** è un sistema operativo open-source progettato per fornire una forte sicurezza per i computer desktop. È basato su Xen, sul sistema X Window e su Linux, e può eseguire/utilizzare la maggior parte delle applicazioni/driver di Linux. - [:octicons-home-16: Pagina principale](https://www.qubes-os.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://www.qubes-os.org/){ .md-button .md-button--primary } [:material-arrow-right-drop-circle: Panoramica](os/qubes-overview.md){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Servizio Onion" } - [:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentazione } [:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribuisci } diff --git a/i18n/it/dns.md b/i18n/it/dns.md index e11ea548..5994d8af 100644 --- a/i18n/it/dns.md +++ b/i18n/it/dns.md @@ -67,7 +67,7 @@ I software proxy per il DNS cifrato forniscono un proxy locale a cui inoltrare l **RethinkDNS** è un client Android open-source che supporta [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh), [DNS-over-TLS](advanced/dns-overview.md#dns-over-tls-dot), [DNSCrypt](advanced/dns-overview.md#dnscrypt) e DNS Proxy oltre a memorizzare nella cache le risposte DNS, registrare localmente le query DNS e può essere usato anche come firewall. [:octicons-home-16: Pagina principale](https://rethinkdns.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Informativa sulla Privacy" } + [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Codice Sorgente" } @@ -84,7 +84,7 @@ I software proxy per il DNS cifrato forniscono un proxy locale a cui inoltrare l **dnscrypt-proxy** è un proxy DNS con supporto per [DNSCrypt](advanced/dns-overview.md#dnscrypt), [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh) e [DNS anonimizzato](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS). - !!! warning "La funzione DNS anonimizzato [**non**](advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) anonimizza il resto del traffico di rete." + !!! attenzione "La funzione DNS anonimizzato [**non**](advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) anonimizza il resto del traffico di rete." [:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentazione} @@ -112,7 +112,7 @@ Una soluzione DNS self-hosted è utile per fornire il filtraggio su piattaforme AdGuard Home è dotato di un'interfaccia web raffinata per visualizzare gli insight e gestire i contenuti bloccati. [:octicons-home-16: Pagina principale](https://adguard.com/adguard-home/overview.html){ .md-button .md-button--primary } - [:octicons-eye-16:](https://adguard.com/privacy/home.html){ .card-link title="Informativa sulla Privacy" } + [:octicons-eye-16:](https://adguard.com/privacy/home.html){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://github.com/AdguardTeam/AdGuardHome/wiki){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/AdguardTeam/AdGuardHome){ .card-link title="Codice sorgente" } @@ -127,7 +127,7 @@ Una soluzione DNS self-hosted è utile per fornire il filtraggio su piattaforme Pi-hole è stato progettato per essere eseguito su un Raspberry Pi, ma non è limitato a tale hardware. Il software dispone di un'interfaccia web intuitiva per visualizzare gli insight e gestire i contenuti bloccati. [:octicons-home-16: Pagina principale](https://pi-hole.net/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Informativa sulla Privacy" } + [:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribuisci } diff --git a/i18n/it/email-clients.md b/i18n/it/email-clients.md index 52bf04f8..4a1b4dff 100644 --- a/i18n/it/email-clients.md +++ b/i18n/it/email-clients.md @@ -26,7 +26,7 @@ Il nostro elenco di raccomandazioni contiene client di posta elettronica che sup **Thunderbird** è un client di posta elettronica, newsgroup, news feed e chat (XMPP, IRC, Twitter) gratuito, open-source e multipiattaforma, sviluppato dalla comunità Thunderbird e precedentemente dalla Mozilla Foundation. [:octicons-home-16: Pagina principale](https://www.thunderbird.net){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentazione} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Codice sorgente" } @@ -81,7 +81,7 @@ Apple Mail ha la possibilità di caricare contenuti in remoto in background o di **Canary Mail** è un client di posta elettronica a pagamento progettato per rendere perfetta la crittografia end-to-end con funzioni di sicurezza come il blocco biometrico dell'app. [:octicons-home-16: Pagina principale](https://canarymail.io){ .md-button .md-button--primary } - [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentazione} ??? download @@ -105,7 +105,7 @@ Canary Mail è closed-source. Lo consigliamo a causa della scarsa scelta di clie **FairEmail** è un'applicazione di posta elettronica minimale e open-source, che utilizza standard aperti (IMAP, SMTP, OpenPGP) con un basso consumo di dati e batteria. [:octicons-home-16: Pagina principale](https://email.faircode.eu){ .md-button .md-button--primary } - [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribuisci } @@ -124,7 +124,7 @@ Canary Mail è closed-source. Lo consigliamo a causa della scarsa scelta di clie **Evolution** è un'applicazione per la gestione delle informazioni personali che fornisce funzionalità integrate di posta, calendario e rubrica. Evolution dispone di un'ampia [documentazione](https://help.gnome.org/users/evolution/stable/) per aiutarti a iniziare. [:octicons-home-16: Pagina principale](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } - [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentazione} [:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribuisci } @@ -144,7 +144,7 @@ Canary Mail è closed-source. Lo consigliamo a causa della scarsa scelta di clie In futuro, K-9 Mail sarà il client [ufficiale](https://k9mail.app/2022/06/13/K-9-Mail-and-Thunderbird.html) di Thunderbird per Android. [:octicons-home-16: Pagina principale](https://k9mail.app){ .md-button .md-button--primary } - [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/k9mail/k-9){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribuisci } @@ -166,12 +166,7 @@ Canary Mail è closed-source. Lo consigliamo a causa della scarsa scelta di clie { align=right } - **Kontact** è un'applicazione di gestione delle informazioni personali (PIM) del progetto [KDE](https://kde.org). [:octicons-home-16: Pagina principale](https://www.mailvelope.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Informativa sulla privacy" } - [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentazione} - [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Codice sorgente" } - - ??? + **Kontact** è un'applicazione di gestione delle informazioni personali (PIM) del progetto [KDE](https://kde.org). Offre un client email, una rubrica, un'agenda e un client RSS. [:octicons-home-16: Pagina Principale](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Politica sulla Privacy" } @@ -192,10 +187,10 @@ Canary Mail è closed-source. Lo consigliamo a causa della scarsa scelta di clie **Mailvelope** è un'estensione del browser che consente lo scambio di e-mail crittografate secondo lo standard di crittografia OpenPGP. - [:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } + [:octicons-home-16: Pagina Principale](https://www.mailvelope.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Politica sulla Privacy" } + [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentazione} + [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Codice Sorgente" } ??? download @@ -213,10 +208,10 @@ Canary Mail è closed-source. Lo consigliamo a causa della scarsa scelta di clie NeoMutt è un client basato sul testo che ha una curva di apprendimento molto ripida. Tuttavia, è molto personalizzabile. - [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } - [:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } - [:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } + [:octicons-home-16: Pagina Principale](https://neomutt.org){ .md-button .md-button--primary } + [:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentazione} + [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Codice Sorgente" } + [:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribuisci } ??? download diff --git a/i18n/it/email.md b/i18n/it/email.md index 9831fda6..c11ea2db 100644 --- a/i18n/it/email.md +++ b/i18n/it/email.md @@ -107,8 +107,8 @@ Proton Mail non offre una funzione di eredità digitale. **Mailbox.org** è un servizio di posta elettronica che si concentra sull'essere sicuro, privo di pubblicità e alimentato privatamente da energia ecologica al 100%. Mailbox.org è opera dal 2014 e ha sede a Berlino, in Germania. Gli account iniziano con 2 GB di spazio di archiviazione, che possono essere aumentati in base alle esigenze. - [:octicons-home-16: Pagina principale](https://mailbox.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://mailbox.org/en/data-protection-privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://mailbox.org){ .md-button .md-button--primary } + [:octicons-eye-16:](https://mailbox.org/en/data-protection-privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://kb.mailbox.org/en/private){ .card-link title=Documentazione} ??? download @@ -171,8 +171,8 @@ Questi provider archiviano le tue e-mail con una crittografia a conoscenza zero, **StartMail** è un servizio di posta elettronica incentrato sulla sicurezza e sulla privacy grazie all'uso della crittografia standard OpenPGP. StartMail è attiva dal 2014 e ha sede in Boulevard 11, Zeist, Paesi Bassi. Gli account partono da 10 GB. Viene offerto un periodo di prova di 30 giorni. - [:octicons-home-16: Pagina principale](https://www.startmail.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.startmail.com/en/privacy/){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://www.startmail.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.startmail.com/en/privacy/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://support.startmail.com){ .card-link title=Documentazione} ??? download @@ -219,8 +219,8 @@ StartMail non offre una funzione di eredità digitale. **Tutanota** è un servizio di posta elettronica incentrato sulla sicurezza e sulla privacy attraverso l'uso della crittografia. Tutanota è operativa dal **2011** e ha sede ad Hannover, in Germania. Gli account iniziano con 1 GB di spazio di archiviazione con il piano gratuito. - [:octicons-home-16: Pagina principale](https://tutanota.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://tutanota.com/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://tutanota.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://tutanota.com/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://tutanota.com/faq){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://tutanota.com/community/){ .card-link title=Contribuisci } @@ -306,8 +306,8 @@ L'utilizzo di un servizio di aliasing richiede la fiducia del provider di posta **AnonAddy** consente di creare gratuitamente 20 alias di dominio su un dominio condiviso, oppure alias "standard" illimitati, meno anonimi. - [:octicons-home-16: Pagina principale](https://anonaddy.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://anonaddy.com/privacy/){ .card-link title="Informativa sulla Privacy" } + [:octicons-home-16: Pagina Principale](https://anonaddy.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://anonaddy.com/privacy/){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://app.anonaddy.com/docs/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/anonaddy){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://anonaddy.com/donate/){ .card-link title=Contribuisci} @@ -337,8 +337,8 @@ Funzionalità gratuite degne di nota: **SimpleLogin** è un servizio gratuito che fornisce alias di posta elettronica su una varietà di nomi di dominio condivisi e, facoltativamente, fornisce funzionalità a pagamento come alias illimitati e domini personalizzati. - [:octicons-home-16: Pagina principale](https://simplelogin.io){ .md-button .md-button--primary } - [:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Informativa sulla Privacy" } + [:octicons-home-16: Pagina Principale](https://simplelogin.io){ .md-button .md-button--primary } + [:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Codice sorgente" } @@ -374,7 +374,7 @@ Gli amministratori di sistema avanzati possono prendere in considerazione la pos **Mailcow** è un server di posta più avanzato, perfetto per chi ha un po' più di esperienza con Linux. Ha tutto il necessario in un container Docker: un server di posta con supporto DKIM, monitoraggio antivirus e spam, webmail e ActiveSync con SOGo e amministrazione basata sul web con supporto 2FA. - [:octicons-home-16: Pagina principale](https://mailcow.email){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://mailcow.email){ .md-button .md-button--primary } [:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribuisci } @@ -385,7 +385,7 @@ Gli amministratori di sistema avanzati possono prendere in considerazione la pos **Mail-in-a-Box** è uno script di configurazione automatica per la distribuzione di un server di posta su Ubuntu. Il suo obiettivo è quello di rendere più semplice la creazione di un proprio server di posta. - [:octicons-home-16: Pagina principale](https://mailinabox.email){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://mailinabox.email){ .md-button .md-button--primary } [:octicons-info-16:](https://mailinabox.email/guide.html){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/mail-in-a-box/mailinabox){ .card-link title="Codice sorgente" } diff --git a/i18n/it/encryption.md b/i18n/it/encryption.md index d3fae1f9..02930eaf 100644 --- a/i18n/it/encryption.md +++ b/i18n/it/encryption.md @@ -21,7 +21,7 @@ Le opzioni qui elencate sono multipiattaforma e ottime per la creazione di backu **Cryptomator** è una soluzione per la crittografia progettata per salvare privatamente i file di qualsiasi provider cloud. Ti permette di creare cassaforti che sono memorizzate su un'unità di archiviazione virtuale, il cui contenuto è crittografato e sincronizzato con i tuoi provider di cloud storage. [:octicons-home-16: Pagina principale](https://cryptomator.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribuisci } @@ -160,7 +160,7 @@ Consigliamo di memorizzare una chiave di ripristino locale in un luogo sicuro, a **LUKS** è il metodo di FDE (full-disk encryption) predefinito per Linux. Può essere usato per cifrare volumi completi, partizioni o creare container crittografati. - [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentazione} [:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Codice Sorgente" } @@ -218,8 +218,8 @@ Gli strumenti con interfacce a riga di comando sono utili per integrare [script **Kryptor** è uno strumenti gratuito e open-source per la crittografia e la firma dei file che utilizza algoritmi di cifratura moderni e sicuri. Punta a essere una versione migliorata di[age](https://github.com/FiloSottile/age) e [Minisign](https://jedisct1.github.io/minisign/) per fornire un'alternativa semplice a GPG. - [:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } + [:octicons-home-16: Pagina Principale](https://www.kryptor.co.uk){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribuisci } @@ -266,7 +266,7 @@ Quando cripti con PGP, puoi configurare diverse opzioni nel file `gpg.conf`. Rac **GnuPG** è un'alternativa con licenza GPL alla suite PGP per software crittografici. GnuPG è compliant a [RFC 4880](https://tools.ietf.org/html/rfc4880), che è l'attuale specifica IETF di OpenPGP. Il progetto GnuPG ha lavorato a una [bozza aggiornata](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) nel tentativo di modernizzare OpenPGP. GnuPG fa parte del progetto software Free Software Foundation di GNU ed ha ricevuto un'importante [finanziamento](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) dal governo tedesco. [:octicons-home-16: Pagina principale](https://gnupg.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://gnupg.org/documentation/index.html){ .card-link title=Documentazione} [:octicons-code-16:](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git){ .card-link title="Codice sorgente" } @@ -286,7 +286,7 @@ Quando cripti con PGP, puoi configurare diverse opzioni nel file `gpg.conf`. Rac **GPG4win** è un pacchetto per Windows di [Intevation e g10 Code](https://gpg4win.org/impressum.html). Comprende [diversi strumenti](https://gpg4win.org/about.html) che possono aiutare nell'utilizzo di GPG su Microsoft Windows. Il progetto è stato avviato e in origine [finanziato dal](https://web.archive.org/web/20190425125223/https://joinup.ec.europa.eu/news/government-used-cryptography) Federal Office per l'Information Security (BSI) tedesco nel 2005. [:octicons-home-16: Pagina principale](https://gpg4win.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://gpg4win.org/privacy-policy.html){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://gpg4win.org/privacy-policy.html){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://gpg4win.org/documentation.html){ .card-link title=Documentazione} [:octicons-code-16:](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpg4win.git;a=summary){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://gpg4win.org/donate.html){ .card-link title=Contribuisci } @@ -309,8 +309,8 @@ Quando cripti con PGP, puoi configurare diverse opzioni nel file `gpg.conf`. Rac Si consiglia di dare un'occhiata ai [primi passi](https://gpgtools.tenderapp.com/kb/how-to/first-steps-where-do-i-start-where-do-i-begin-setup-gpgtools-create-a-new-key-your-first-encrypted-email) e alle [conoscenze di base](https://gpgtools.tenderapp.com/kb) come supporto. - [:octicons-home-16: Pagina principale](https://gpgtools.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://gpgtools.org/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://gpgtools.org){ .md-button .md-button--primary } + [:octicons-eye-16:](https://gpgtools.org/privacy){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://gpgtools.tenderapp.com/kb){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/GPGTools){ .card-link title="Codice sorgente" } @@ -327,10 +327,9 @@ Quando cripti con PGP, puoi configurare diverse opzioni nel file `gpg.conf`. Rac **OpenKeychain** è un'implementazione Android di GnuPG. È comunementa richiesta da client mail come [K-9 Mail](email-clients.md#k-9-mail) e [FairEmail](email-clients.md#fairemail) e da alltre applicazioni Android per fornire supporto alla crittografia. Cure53 ha completato un'[ispezione di sicurezza](https://www.openkeychain.org/openkeychain-3-6) di OpenKeychain 3.6 nell'ottobre 2015. Dettagli tecnici riguardo all'audit e alle soluzioni di OpenKeychain possono essere trovate [qui](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). [:octicons-home-16: Pagina principale](https://www.openkeychain.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Codice Sorgente" } - :octicons-heart-16:{ .card-link title="Le donazioni possono essere fatte nell'app" } ??? download diff --git a/i18n/it/file-sharing.md b/i18n/it/file-sharing.md index e3f8e624..78f0ef0d 100644 --- a/i18n/it/file-sharing.md +++ b/i18n/it/file-sharing.md @@ -68,7 +68,7 @@ ffsend upload --host https://send.vis.ee/ FILE **FreedomBox** è un sistema operativo progettato per essere eseguito su un [single-board computer (SBC)](https://it.wikipedia.org/wiki/Single-board_computer). Lo scopo è quello di semplificare la configurazione delle applicazioni server per le quali si desidera il self-hosting. - [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentazione} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Codice Sorgente" } [:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribuisci } @@ -83,7 +83,7 @@ ffsend upload --host https://send.vis.ee/ FILE **Nextcloud** è una suite di software gratuiti e open-source client-server per la creazione di servizi di file hosting su un server privato controllato dall'utente. - [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Codice Sorgente" } @@ -111,7 +111,7 @@ ffsend upload --host https://send.vis.ee/ FILE **Syncthing** è un'utility open-source di sincronizzazione continua dei file peer-to-peer. Viene utilizzata per sincronizzare i file tra due o più dispositivi sulla rete locale o su Internet. Syncthing non utilizza alcun server centralizzato, ma il [Block Exchange Protocol](https://docs.syncthing.net/specs/bep-v1.html#bep-v1) per trasferire i dati tra i vari dispositivi. Tutti i dati sono criptati usando TLS. - [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Codice Sorgente" } [:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribuisci } diff --git a/i18n/it/frontends.md b/i18n/it/frontends.md index 4a544b07..41fe4aba 100644 --- a/i18n/it/frontends.md +++ b/i18n/it/frontends.md @@ -101,7 +101,7 @@ Quando utilizza un'istanza di ProxiTok, assicurati di leggere l'informativa sull Per impostazione predefinita, FreeTube blocca tutti gli annunci pubblicitari di YouTube. Inoltre, è possibile integrare [SponsorBlock](https://sponsor.ajay.app) per saltare i segmenti sponsorizzati dei video. [:octicons-home-16: Pagina principale](https://freetubeapp.io){ .md-button .md-button--primary } - [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribuisci } @@ -127,7 +127,7 @@ Quando utilizza un'istanza di ProxiTok, assicurati di leggere l'informativa sull Prima di poter utilizzare Yattee per guardare YouTube, è necessario effettuare alcuni [passaggi extra](https://gonzoknows.com/posts/Yattee/), a causa delle restrizioni dell'App Store. - [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Codice Sorgente" } @@ -181,7 +181,7 @@ Per impostazione predefinita, LibreTube blocca tutti gli annunci pubblicitari di L'elenco delle iscrizioni e delle playlist viene salvato localmente sul dispositivo Android. [:octicons-home-16: Pagina principale](https://newpipe.net){ .md-button .md-button--primary } - [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribuisci } @@ -207,7 +207,7 @@ Per impostazione predefinita, LibreTube blocca tutti gli annunci pubblicitari di Esistono diverse istanze pubbliche, alcune delle quali supportano i servizi onion di [Tor](https://www.torproject.org). - [:octicons-home-16: Pagina principale](https://invidious.io){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Istanze pubbliche"} [:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Codice sorgente" } diff --git a/i18n/it/index.md b/i18n/it/index.md index 571c9aa7..68138bc1 100644 --- a/i18n/it/index.md +++ b/i18n/it/index.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Guides: La vostra risorsa indipendente per la privacy e la sicurezza" +meta_title: "Privacy Guides: La tua risorsa indipendente per la privacy e la sicurezza" template: overrides/home.it.html hide: - navigation @@ -44,7 +44,7 @@ Proprio come il diritto al matrimonio interrazziale, il suffragio della donna, l Non bisogna confondere la privacy con la segretezza. Sappiamo cosa succede in bagno, ma chiudi lo stesso la porta. Questo perché vuoi la privacy, non la segretezza. **Tutti** hanno qualcosa da proteggere. La privacy è qualcosa che ci rende umani. -[:material-target-account: Minacce comuni di Internet](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Perchè la Privacy è importante](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Cosa dovrei fare? diff --git a/i18n/it/mobile-browsers.md b/i18n/it/mobile-browsers.md index 9c1130af..56f9a663 100644 --- a/i18n/it/mobile-browsers.md +++ b/i18n/it/mobile-browsers.md @@ -51,11 +51,11 @@ Per Android, Firefox è meno sicuro delle alternative basate su Chromium: il mot **Brave Browser** include un content blocker integrato e [funzionalità di privacy](https://brave.com/privacy-features/), molte delle quali attive in modo predefinito. - Brave è sviluppato a partire dal progetto del browser web Chromium, quindi dovrebbe risultare familiare e avere problemi minimi di compatibilità con i siti web. + Brave è stato sviluppato utilizzando il progetto del browser Chromium, quindi dovrebbe risultarti familiare e avrai pochi problemi di compatibilità con i vari siti web. [:octicons-home-16: Pagina principale](https://brave.com/){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Servizio Onion" } - [:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Codice sorgente" } @@ -193,7 +193,7 @@ Se usi iCloud con la Protezione avanzata dei dati, consigliamo anche di controll AdGuard per iOS ha alcune funzionalità premium, ma il blocco di contenuti standard di Safari è gratuito. [:octicons-home-16: Pagina principale](https://adguard.com/en/adguard-ios/overview.html){ .md-button .md-button--primary } - [:octicons-eye-16:](https://adguard.com/privacy/ios.html){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://adguard.com/privacy/ios.html){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://kb.adguard.com/ios){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Codice sorgente" } diff --git a/i18n/it/multi-factor-authentication.md b/i18n/it/multi-factor-authentication.md index 7c47b2f0..13b45b07 100644 --- a/i18n/it/multi-factor-authentication.md +++ b/i18n/it/multi-factor-authentication.md @@ -18,7 +18,7 @@ cover: multi-factor-authentication.png Uno dei vantaggi di YubiKey è che una chiave può fare quasi tutto ciò che ci si aspetta da una chiave di sicurezza fisica (YubiKey 5). Invitiamo a svolgere il [quiz](https://www.yubico.com/quiz/) per essere sicuri di fare il giusto acquisto. [:octicons-home-16: Pagina principale](https://www.yubico.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentazione} La [tabella di confronto](https://www.yubico.com/store/compare/) mostra le caratteristiche e le differenze tra le YubiKey. Consigliamo vivamente di scegliere le chiavi della Serie 5. @@ -39,7 +39,7 @@ Per i modelli che supportano HOTP e TOTP, ci sono 2 slot nell'interfaccia OTP ch **Nitrokey** ha una chiave di sicurezza che supporta [FIDO2 e WebAuthn] (basics/multi-factor-authentication.md#fido-fast-identity-online), chiamata **Nitrokey FIDO2**. Per il supporto PGP, è necessario un'altra delle loro chiavi, come la **Nitrokey Start**, la **Nitrokey Pro 2** o la **Nitrokey Storage 2**. [:octicons-home-16: Pagina principale](https://www.nitrokey.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentazione} La [tabella di confronto](https://www.nitrokey.com/#comparison) mostra le caratteristiche e le differenze tra le chiavette Nitrokey. La **Nitrokey 3** elencata ha un insieme di funzioni combinate. @@ -99,7 +99,7 @@ Consigliamo vivamente di utilizare applicazioni TOTP per dispositivi mobili inve **Aegis Authenticator** è un'applicazione gratuita, sicura e open-source per gestire i token di verifica dei due passaggi per i vostri servizi online. [:octicons-home-16: Pagina principale](https://getaegis.app){ .md-button .md-button--primary } - [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribuisci } @@ -118,7 +118,7 @@ Consigliamo vivamente di utilizare applicazioni TOTP per dispositivi mobili inve **Raivo OTP** è un client per password su iOS nativo, leggero e sicuro, basato sul tempo (TOTP) & sul contatore (HOTP). Ravio OTP offre la sincronizzazione & il backup opzionali via iCloud. È inoltre disponibile per macOS come applicazione nella barra di stato, ma non funzione indipendentemente dall'applicazione su iOS. [:octicons-home-16: Pagina principale](https://raivo-otp.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://raivo-otp.com/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://raivo-otp.com/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-code-16:](https://github.com/raivo-otp/ios-application){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://raivo-otp.com/donate){ .card-link title=Contribuisci } diff --git a/i18n/it/news-aggregators.md b/i18n/it/news-aggregators.md index be596256..33d76da0 100644 --- a/i18n/it/news-aggregators.md +++ b/i18n/it/news-aggregators.md @@ -17,11 +17,11 @@ Un [Aggregatore di news](https://en.wikipedia.org/wiki/News_aggregator)è un mod **Akregator** è un aggregatore di notizie, parte del progetto [KDE](https://kde.org). È dotato di ricerca rapida, funzionalità avanzate di archivio e un browser interno per leggere semplicemente le notizie. - [:octicons-home-16: Homepage](https://apps.kde.org/akregator){ .md-button .md-button--primary } - [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} - [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } - [:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } + [:octicons-home-16: Pagina Principale](https://apps.kde.org/akregator){ .md-button .md-button--primary } + [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Politica sulla Privacy" } + [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentazione} + [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Codice Sorgente" } + [:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribuisci } ??? download @@ -51,8 +51,8 @@ Un [Aggregatore di news](https://en.wikipedia.org/wiki/News_aggregator)è un mod **Fluent Reader** è un aggregatore di notizie sicuro e multipiattaforma, dotato di utili funzioni per la privacy come la cancellazione dei cookie all'uscita, di rigorose [content security policies (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) e del supporto proxy, che consente di utilizzarlo su [Tor](tor.md). - [:octicons-home-16: Pagina principale](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } - [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } + [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribuisci } @@ -70,9 +70,9 @@ Un [Aggregatore di news](https://en.wikipedia.org/wiki/News_aggregator)è un mod **GNOME Feeds** è un aggregatore di notizie [RSS](https://en.wikipedia.org/wiki/RSS) e [Atom](https://en.wikipedia.org/wiki/Atom_(Web_standard)) per [GNOME](https://www.gnome.org). Ha un'interfaccia semplice ed è piuttosto veloce. - [:octicons-home-16: Pagina principale](https://gfeeds.gabmus.org){ .md-button .md-button--primary } - [:octicons-code-16:](https://gitlab.gnome.org/World/gfeeds){ .card-link title="Source Code" } - [:octicons-heart-16:](https://liberapay.com/gabmus/){ .card-link title=Contribute } + [:octicons-home-16: Pagina Principale](https://gfeeds.gabmus.org){ .md-button .md-button--primary } + [:octicons-code-16:](https://gitlab.gnome.org/World/gfeeds){ .card-link title="Codice Sorgente" } + [:octicons-heart-16:](https://liberapay.com/gabmus/){ .card-link title=Contribuisci } ??? download diff --git a/i18n/it/notebooks.md b/i18n/it/notebooks.md index 2c43406d..05e5e75b 100644 --- a/i18n/it/notebooks.md +++ b/i18n/it/notebooks.md @@ -19,8 +19,8 @@ Se stai attualmente utilizzando un'applicazione come Evernote, Google Keep o Mic **Joplin** è un'applicazione gratuita, open-source e dotata di tutte le funzionalità per prendere appunti e per le attività da svolgere, in grado di gestire un gran numero di note markdown organizzate in taccuini e tag. Offre E2EE e può sincronizzarsi con Nextcloud, Dropbox e altro ancora. Offre anche la possibilità di importare facilmente note da Evernote e note in testo semplice. - [:octicons-home-16: Pagina principale](https://joplinapp.org/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://joplinapp.org/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribuisci } @@ -46,8 +46,8 @@ Joplin non supporta la protezione con password/PIN per [l'applicazione stessa o **Standard Notes** è un'applicazione per appunti semplice e privata che rende i tuoi appunti facili e disponibili ovunque tu sia. È dotato di E2EE su ogni piattaforma e di una potente esperienza desktop con temi ed editor personalizzati. È stato anche [sottoposto a ispezione indipendente (PDF)](https://s3.amazonaws.com/standard-notes/security/Report-SN-Audit.pdf). - [:octicons-home-16: Pagina principale](https://standardnotes.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://standardnotes.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribuisci } @@ -70,7 +70,12 @@ Joplin non supporta la protezione con password/PIN per [l'applicazione stessa o **Org-mode** è una [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) per GNU Emacs. Org-mode serve per prendere appunti, mantenere elenchi TODO, pianificare progetti e scrivere documenti con un sistema di testo semplice rapido ed efficace. - La sincronizzazione è possibile con gli strumenti di [sincronizzazione dei file](file-sharing.md#file-sync). download + [:octicons-home-16: Pagina Principale](https://crypt.ee){ .md-button .md-button--primary } + [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Politica sulla Privacy" } + [:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentazione} + [:octicons-code-16:](https://github.com/cryptee){ .card-link title="Codice Sorgente" } + + ??? download - [:octicons-globe-16: PWA](https://crypt.ee/download) @@ -86,10 +91,10 @@ Cryptee offre 100 MB di spazio di archiviazione gratuito, con opzioni a pagament **Org-mode** è una [modalità principale](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) per GNU Emacs. Org-mode serve per prendere appunti, gestire elenchi di cose da fare, pianificare progetti e scrivere documenti con un sistema di testo semplice rapido ed efficace. La sincronizzazione è possibile con gli strumenti di [sincronizzazione dei file](file-sharing.md#file-sync). - [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentazione} [:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Codice sorgente" } - [:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contributo } + [:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribuisci } ## Criteri diff --git a/i18n/it/passwords.md b/i18n/it/passwords.md index 171584b2..06b85fb8 100644 --- a/i18n/it/passwords.md +++ b/i18n/it/passwords.md @@ -140,8 +140,8 @@ Questi gestori di password sincronizzano le password su un server cloud per faci **Bitwarden** è un gestore di password gratuito e open-source. L'obiettivo è quello di risolvere i problemi di gestione delle password per individui, team e organizzazioni aziendali. Bitwarden è una delle soluzioni migliori e più sicure per memorizzare tutti i vostri login e password, mantenendoli comodamente sincronizzati tra tutti i vostri dispositivi. - [:octicons-home-16: Pagina principale](https://bitwarden.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://bitwarden.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Codice sorgente" } @@ -204,7 +204,7 @@ Un vantaggio di 1Password rispetto a Bitwarden è il supporto di prima classe pe **Psono** è un gestore di password gratuito e open-source sviluppato in Germania, con particolare attenzione alla gestione delle password per i team. Psono supporta la condivisione sicura di password, file, segnalibri ed email. Tutti i segreti sono protetti da una password principale. [:octicons-home-16: Pagina principale](https://psono.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentazione} [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Codice sorgente" } diff --git a/i18n/it/productivity.md b/i18n/it/productivity.md index b51d2907..edf984de 100644 --- a/i18n/it/productivity.md +++ b/i18n/it/productivity.md @@ -17,7 +17,7 @@ La maggior parte delle suite per ufficio online non supportano la crittografia e **Nextcloud** è una suite di software gratuiti e open-source client-server per la creazione di servizi di file hosting su un server privato controllato dall'utente. - [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Codice Sorgente" } @@ -35,12 +35,7 @@ La maggior parte delle suite per ufficio online non supportano la crittografia e !!! attenzione - Sconsigliamo di utilizzare l'[App E2EE](https://apps.nextcloud.com/apps/end_to_end_encryption) per Nextcloud, in quanto potrebbe causare la perdita di dati; è altamente sperimentale e non soddisfa i criteri di qualità. [:octicons-home-16: Pagina principale](https://www.onlyoffice.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Informativa sulla privacy" } - [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentazione} - [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Codice sorgente" } - - ??? + Sconsigliamo di utilizzare l'[App E2EE](https://apps.nextcloud.com/apps/end_to_end_encryption) per Nextcloud, in quanto potrebbe causare la perdita di dati; è altamente sperimentale e non soddisfa i criteri di qualità. Per questo motivo, non consigliamo i provider Nextcloud di terze parti. ### OnlyOffice @@ -50,8 +45,8 @@ La maggior parte delle suite per ufficio online non supportano la crittografia e **CryptPad** è un'alternativa privata e di design ai più diffusi strumenti per l'ufficio. Tutti i contenuti di questo servizio web sono criptati end-to-end e possono essere condivisi facilmente con altri utenti. - [:octicons-home-16: Pagina principale](https://cryptpad.fr){ .md-button .md-button--primary } - [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://cryptpad.fr){ .md-button .md-button--primary } + [:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribuisci } @@ -92,9 +87,9 @@ KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikip [:octicons-home-16: Pagina Principale](https://www.libreoffice.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Politica sulla Privacy" } - [:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentazione} - [:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Codice Sorgente" } - [:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribuisci } + [:octicons-info-16:](https://documentation.libreoffice.org/it/documentazione-in-italiano/){ .card-link title=Documentazione} + [:octicons-code-16:](https://it.libreoffice.org/chi-siamo/codice-sorgente/){ .card-link title="Codice Sorgente" } + [:octicons-heart-16:](https://it.libreoffice.org/donazioni/){ .card-link title=Contribuisci } ??? download @@ -156,6 +151,6 @@ In generale, definiamo suite per ufficio le applicazioni che possono facilmente **PrivateBin** è un pastebin online minimalista e open-source in cui il server non ha alcuna conoscenza dei dati incollati. I dati vengono criptati/decriptati nel browser utilizzando AES a 256 bit. È la versione migliorata di ZeroBin. Esiste un [elenco di istanze](https://privatebin.info/directory/). [:octicons-home-16: Pagina Principale](https://privatebin.info){ .md-button .md-button--primary } - [:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="istanze pubbliche"} + [:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Istanze pubbliche"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Codice Sorgente" } diff --git a/i18n/it/real-time-communication.md b/i18n/it/real-time-communication.md index ee1fb329..d1aa858d 100644 --- a/i18n/it/real-time-communication.md +++ b/i18n/it/real-time-communication.md @@ -24,9 +24,9 @@ Questi messenger sono ideali per proteggere le tue comunicazioni sensibili. Tutte le comunicazioni sono E2EE. Le liste di contatti è crittografata usando il tuo PIN Signal e il server non può accedervi. Anche i profili personali sono crittografati e condivisi solo con i contatti con cui parli. - [:octicons-home-16: Pagina principale](https://signal.org/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Informativa sulla privacy" } - [:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentazione} + [:octicons-home-16: Pagina Principale](https://signal.org/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Politica sulla privacy" } + [:octicons-info-16:](https://support.signal.org/hc/it){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribuisci } @@ -55,8 +55,8 @@ Abbiamo alcuni suggerimenti aggiuntivi per configurare e rendere più sicuro Sig **SimpleX** Chat è un'app di messaggistica istantanea decentralizzata che non dipende da alcun identificatore univoco, come numeri di telefono o nomi utente. Gli utenti di SimpleX Chat possono scansionare un codice QR o cliccare un link di invito per partecipare alle conversazioni di gruppo. - [:octicons-home-16: Pagina principale](https://simplex.chat){ .md-button .md-button--primary } - [:octicons-eye-16:](https://github.com/simplex-chat/simplex-chat/blob/stable/PRIVACY.md){.card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://simplex.chat){ .md-button .md-button--primary } + [:octicons-eye-16:](https://github.com/simplex-chat/simplex-chat/blob/stable/PRIVACY.md){.card-link title="Politica sulla privacy" } [:octicons-info-16:](https://github.com/simplex-chat/simplex-chat/tree/stable/docs){.card-link title=Documentazione} [:octicons-code-16:](https://github.com/simplex-chat){.card-link title="Codice sorgente" } @@ -117,8 +117,8 @@ Briar supporta la Perfect Forward Secrecy usando l'[Handshake](https://code.bria I messaggi e i file condivisi nelle stanze private (quelle che richiedono un invito) sono E2EE in modo predefinito, così come le chiamate e videochiamate tra due persone. - [:octicons-home-16: Pagina principale](https://element.io/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://element.io/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/vector-im){ .card-link title="Codice sorgente" } @@ -151,7 +151,7 @@ Il protocollo è stato [verificato](https://matrix.org/blog/2016/11/21/matrixs-o Session usa la rete decentralizzata [Oxen Service Node Network](https://oxen.io/) per memorizzare e instradare i messaggi. Ogni messaggio crittografato viene instradato attraverso tre nodi della rete di nodi di servizio Oxen, rendendo virtualmente impossibile per i nodi compilare informazioni significative su coloro che utilizzano la rete. [:octicons-home-16: Pagina principale](https://getsession.org/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Codice sorgente" } diff --git a/i18n/it/router.md b/i18n/it/router.md index a28af937..9d5a1ba9 100644 --- a/i18n/it/router.md +++ b/i18n/it/router.md @@ -16,7 +16,7 @@ Di seguito sono elencati alcuni sistemi operativi alternativi che possono essere **OpenWrt** è un sistema operativo basato su Linux, usato principalmente su dispositivi embedded per instradare il traffico di rete. Include util-linux, uClibc e BusyBox. Tutti i componenti sono stati ottimizzati per i router domestici. - [:octicons-home-16: Pagina principale](https://openwrt.org){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://openwrt.org){ .md-button .md-button--primary } [:octicons-info-16:](https://openwrt.org/docs/start){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/openwrt/openwrt){ .card-link title="Codice Sorgente" } [:octicons-heart-16:](https://openwrt.org/donate){ .card-link title=Contribuisci } @@ -31,7 +31,7 @@ Di seguito sono elencati alcuni sistemi operativi alternativi che possono essere **OPNsense** è una piattaforma open source di firewall e routing basata su FreeBSD che incorpora molte funzionalità avanzate come il traffic shaping, il bilanciamento del carico e le funzionalità VPN, con molte altre funzionalità disponibili sotto forma di plugin. OPNsense viene comunemente utilizzato come firewall perimetrale, router, access point wireless, server DHCP, server DNS ed endpoint VPN. - [:octicons-home-16: Pagina principale](https://opnsense.org/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://opnsense.org/){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Codice Sorgente" } [:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribuisci} diff --git a/i18n/it/search-engines.md b/i18n/it/search-engines.md index 089a3f0f..7b2a692e 100644 --- a/i18n/it/search-engines.md +++ b/i18n/it/search-engines.md @@ -24,9 +24,9 @@ Considera l'utilizzo di un [VPN](vpn.md) o di [Tor](https://www.torproject.org/) Suggeriamo di disabilitare l'opzione [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) nelle impostazioni, che è attiva di default. - [:octicons-home-16: Pagina principale](https://search.brave.com/){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://search.brave.com/){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Servizio Onion" } - [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentazione} Brave Search ha sede negli Stati Uniti. La loro[informativa sulla privacy](https://search.brave.com/help/privacy-policy) dichiara che raccolgono dati aggregati, i quali includono il sistema operativo e il browser in utilizzo, ma nessuna informazione d'identificazione personale. Gli indirizzi IP sono temporaneamente processati, ma non conservati. @@ -41,9 +41,9 @@ Brave Search ha sede negli Stati Uniti. La loro[informativa sulla privacy](https DuckDuckGo è il motore di ricerca predefinito del Tor Browser ed è una delle poche opzioni disponibili sul browser Safari di Apple. - [:octicons-home-16: Pagina principale](https://duckduckgo.com){ .md-button .md-button--primary } + [:octicons-home-16: Pagina Principale](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Servizio Onion" } - [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentazione} DuckDuckGo ha sede negli Stati Uniti. La loro[informativa della privacy](https://duckduckgo.com/privacy) dichiara che **raccolgono** le tue ricerche per migliorare il prodotto, ma non registrano il tuo indirizzo IP o qualsiasi altra informazione d'identificazione personale. @@ -58,9 +58,9 @@ DuckDuckGo offre altre [due versioni](https://help.duckduckgo.com/features/non-j **SearXNG** è un meta-motore di ricerca open source e self-hostable, che aggrega risultati di altri motore di ricerca, ma senza raccogliere alcuna informazione a sua volta. È un fork attivamente mantenuto di [SearX](https://github.com/searx/searx). - [:octicons-home-16: Pagina principale](https://searxng.org){ .md-button .md-button--primary } - [:octicons-server-16:](https://searx.space/){ .card-link title="Istanze pubbliche"} - [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Codice sorgente" } + [:octicons-home-16: Pagina Principale](https://searxng.org){ .md-button .md-button--primary } + [:octicons-server-16:](https://searx.space/){ .card-link title="Istanze Pubbliche"} + [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Codice Sorgente" } SearXNG è un proxy tra l'utente e i motori di ricerca che aggrega. Le tue stringhe di ricerca vengono inviate a tutti i motori dai quali SearXNG ottiene i suoi risultati. @@ -77,8 +77,8 @@ Quando utilizzi una istanza di SearXNG, ricordati di leggere la rispettiva infor **Startpage** è un motore di ricerca privato noto per riportare risultati di ricerca di Google. Il fiore all'occhiello di Startpage è la [Anonymous View](https://www.startpage.com/en/anonymous-view/), che si sforza di standardizzare l'attività degli utenti in modo da rendere più difficile l'identificazione univoca. Questa funzione può essere utile per nascondere [alcune](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) caratteristiche della rete e del browser. A differenza di quanto suggerisce il nome, non ci si deve affidare a questa funzione per ottenere l'anonimato. Se cerchi l'anonimato, utilizzate invece il [Tor Browser](tor.md#tor-browser). - [:octicons-home-16: Pagina principale](https://www.startpage.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://www.startpage.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Politica sulla Privacy" } [:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentazione} !!! warning diff --git a/i18n/it/tor.md b/i18n/it/tor.md index 4ffb28a5..7e98704a 100644 --- a/i18n/it/tor.md +++ b/i18n/it/tor.md @@ -53,7 +53,7 @@ Esistono diversi modi per connettersi alla rete Tor dal proprio dispositivo, il [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Servizio Onion" } [:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentazione } [:octicons-code-16:](https://gitweb.torproject.org/tor-browser.git/){ .card-link title="Codice sorgente" } - [:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribuisce } + [:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribuisci } ??? download @@ -79,7 +79,7 @@ Tor Browser è progettato per evitare il fingerprinting o l'identificazione dell **Orbot** è una VPN Tor gratuita per smartphone che instrada il traffico da qualsiasi app sul dispositivo attraverso la rete Tor. [:octicons-home-16: Pagina principale](https://orbot.app/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentazione} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Codice sorgente" } [:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribuisci } diff --git a/i18n/it/video-streaming.md b/i18n/it/video-streaming.md index 603827e6..c8a0f7ef 100644 --- a/i18n/it/video-streaming.md +++ b/i18n/it/video-streaming.md @@ -17,8 +17,8 @@ Il rischio principale quando si usa una piattaforma di streaming video è che le **Il client desktop di LBRY** consente lo streaming di video dalla rete LBRY e memorizza l'elenco delle iscrizioni nel proprio portafoglio LBRY. - [:octicons-home-16: Pagina principale](https://lbry.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://lbry.com/privacypolicy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://lbry.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://lbry.com/privacypolicy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://lbry.com/faq){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/lbryio/lbry-desktop){ .card-link title="Codice sorgente" } diff --git a/i18n/it/vpn.md b/i18n/it/vpn.md index ae45cd8b..c2de8924 100644 --- a/i18n/it/vpn.md +++ b/i18n/it/vpn.md @@ -41,7 +41,7 @@ I fornitori che consigliamo utilizzano la crittografia, accettano Monero, suppor **IVPN** è un altro provider VPN premium, sono attivi dal 2009. IVPN ha sede a Gibilterra. [:octicons-home-16: Pagina principale](https://crypt.ee){ .md-button .md-button--primary } - [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Informativa sulla privacy" } + [:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Politica sulla privacy" } [:octicons-info-16:](https://www.ivpn.net/knowledgebase/general){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Codice sorgente" } @@ -175,12 +175,12 @@ Mullvad è molto trasparente su quali nodi [possiede o affitta](https://mullvad. **Proton VPN** è un forte concorrente nello spazio VPN ed è attivo dal 2016. Proton AG ha sede in Svizzera e offre un livello gratuito limitato, così come un'opzione premium più ricca di funzioni. - **Gratuito** — **Piano Plus da 71,88€ all'anno** (1) - - [:octicons-home-16: Pagina principale](https://protonvpn.com/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Informativa sulla privacy" } + [:octicons-home-16: Pagina Principale](https://protonvpn.com/){ .md-button .md-button--primary } + [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Politica sulla Privacy " } [:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentazione} - [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Codice sorgente" } download + [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Codice Sorgente" } + + ??? download - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) - [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) diff --git a/i18n/ja/404.md b/i18n/ja/404.md index 1536fbb3..9fd15ba6 100644 --- a/i18n/ja/404.md +++ b/i18n/ja/404.md @@ -15,5 +15,5 @@ meta: - [おすすめのDNSプロバイダ](dns.md) - [最高のデスクトップウェブブラウザ](desktop-browsers.md) - [最高のVPNプロバイダ](vpn.md) -- [Privacy Guidesフォーラム](https://discuss.privacyguides.net) +- [Privacy Guides フォーラム](https://discuss.privacyguides.net) - [私たちのブログ](https://blog.privacyguides.org) diff --git a/i18n/ja/about/privacy-policy.md b/i18n/ja/about/privacy-policy.md index d440687d..8abb84fc 100644 --- a/i18n/ja/about/privacy-policy.md +++ b/i18n/ja/about/privacy-policy.md @@ -46,7 +46,7 @@ The Privacy Guides team generally does not have access to personal data outside ```text Jonah Aragon -Services Administrator +サービス管理者 jonah@privacyguides.org ``` diff --git a/i18n/ja/basics/passwords-overview.md b/i18n/ja/basics/passwords-overview.md index 5e5e868a..321d80e9 100644 --- a/i18n/ja/basics/passwords-overview.md +++ b/i18n/ja/basics/passwords-overview.md @@ -1,26 +1,26 @@ --- -title: "Introduction to Passwords" +title: "パスワードの概要" icon: 'material/form-textbox-password' description: These are some tips and tricks on how to create the strongest passwords and keep your accounts secure. --- -Passwords are an essential part of our everyday digital lives. We use them to protect our accounts, our devices and our secrets. Despite often being the only thing between us and an adversary who's after our private information, not a lot of thought is put into them, which often leads to people using passwords that can be easily guessed or brute-forced. +パスワードは、日々のデジタルライフに欠かせないものです。 私たちは、アカウント、デバイス、秘密を守るためにパスワードを使用します。 パスワードは多くの場合、敵対者から個人情報を守る唯一の要素です。にも関わらず、十分に検討されず、簡単に推測できたり、総当たりできるパスワードが使われることが多いようです。 -## Best Practices +## ベストプラクティス -### Use unique passwords for every service +### 各サービスで異なるパスワードを使う -Imagine this; you sign up for an account with the same e-mail and password on multiple online services. If one of those service providers is malicious, or their service has a data breach that exposes your password in an unencrypted format, all a bad actor would have to do is try that e-mail and password combination across multiple popular services until they get a hit. It doesn't matter how strong that one password is, because they already have it. +複数のオンラインサービスで、同じメールアドレスとパスワードを使ってアカウントを作成した場合を想像してください。 もし、いずれかのサービス提供者が悪意を持っていたり、サービスが情報漏洩を起こしてパスワードが暗号化されていない状態で公開された場合、悪意ある者は他の人気あるサービスでそのメールアドレスとパスワードの組み合わせでログインを試すことができます。 そのパスワードがどれだけ強固でも、悪意ある者に漏洩した場合は安全性を担保できません。 -This is called [credential stuffing](https://en.wikipedia.org/wiki/Credential_stuffing), and it is one of the most common ways that your accounts can be compromised by bad actors. To avoid this, make sure that you never re-use your passwords. +これは、[クレデンシャルスタッフィング攻撃](https://en.wikipedia.org/wiki/Credential_stuffing)と呼ばれ、悪意ある者がアカウントを侵害するために用いる、よくある攻撃の一つです。 この攻撃への有効な対策は、パスワードを使いまわさないことです。 -### Use randomly generated passwords +### ランダムに生成されたパスワードを使う ==You should **never** rely on yourself to come up with a good password.== We recommend using [randomly generated passwords](#passwords) or [diceware passphrases](#diceware-passphrases) with sufficient entropy to protect your accounts and devices. All of our [recommended password managers](../passwords.md) include a built-in password generator that you can use. -### Rotating Passwords +### パスワードを変更する You should avoid changing passwords that you have to remember (such as your password manager's master password) too often unless you have reason to believe it has been compromised, as changing it too often exposes you to the risk of forgetting it. @@ -106,6 +106,6 @@ There are many good options to choose from, both cloud-based and local. Choose o Furthermore, we do not recommend storing single-use recovery codes in your password manager. Those should be stored separately such as in an encrypted container on an offline storage device. -### Backups +### バックアップ You should store an [encrypted](../encryption.md) backup of your passwords on multiple storage devices or a cloud storage provider. This can help you access your passwords if something happens to your primary device or the service you are using. diff --git a/i18n/ja/basics/why-privacy-matters.md b/i18n/ja/basics/why-privacy-matters.md new file mode 100644 index 00000000..47cf3195 --- /dev/null +++ b/i18n/ja/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. 用を足しているという事実を秘密にするためではなく、プライバシーを守るためにドアを閉めるのです。 There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## ソース + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/ja/desktop-browsers.md b/i18n/ja/desktop-browsers.md index 6c1b8330..3c6dfa8e 100644 --- a/i18n/ja/desktop-browsers.md +++ b/i18n/ja/desktop-browsers.md @@ -57,24 +57,24 @@ schema: url: "./" --- -These are our currently recommended desktop web browsers and configurations for standard/non-anonymous browsing. We recommend [Mullvad Browser](#mullvad-browser) if you are focused on strong privacy protections and anti-fingerprinting out of the box, [Firefox](#firefox) for casual internet browsers looking for a good alternative to Google Chrome, and [Brave](#brave) if you need Chromium browser compatibility. +以下は、一般的な、非匿名のブラウジング用に、現在おすすめされているデスクトップ版のウェブブラウザとその設定です。 強力なプライバシー保護とフィンガープリント対策を重視する場合は[Mullvad Browser](#mullvad-browser)を、カジュアルなブラウジングやGoogle Chromeの良い代替品を探している場合は[Firefox](#firefox)を、Chromiumブラウザとの互換性が必要な場合は[Brave](#brave)をおすすめします。 -If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. We make some configuration recommendations on this page, but all browsers other than Tor Browser will be traceable by *somebody* in some manner or another. +匿名でインターネットを閲覧するには、[Tor](tor.md)を使用してください。 このページではいくつかの設定をおすすめしていますが、Tor Browser以外のブラウザは、何らかの方法で、*誰かしら*が、あなたを追跡できます。 ## Mullvad Browser !!! recommendation - { align=right } + { align=right } - **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. + **Mullvad Browser**はVPNユーザーにTor Browserのフィンガープリント対策のブラウザ技術を提供することを目的とした、Torネットワークへの接続機能のない[Tor Browser](tor.md#tor-browser)です。 Tor Projectが開発し、[Mullvad](vpn.md#mullvad)が配布しています。MullvadのVPNを使用する必要は**ありません**。 - [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } - [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} - [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" } + [:octicons-home-16: ホームページ](https://mullvad.net/en/browser){ .md-button .md-button--primary } + [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="プライバシーポリシー" } + [:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=文書} + [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="ソースコード" } - ??? downloads + ??? ダウンロード - [:simple-windows11: Windows](https://mullvad.net/en/download/browser/windows) - [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos) @@ -92,7 +92,7 @@ Note that while you can use Mullvad Browser with any VPN provider, other people Mullvad Browser comes with the *uBlock Origin* and *NoScript* browser extensions pre-installed. While we typically [don't recommend](#extensions) adding *additional* browser extensions, these extensions that come pre-installed with the browser should **not** be removed or configured outside their default values, because doing so would noticeably make your browser fingerprint distinct from other Mullvad Browser users. It also comes pre-installed with the Mullvad Browser Extension, which *can* be safely removed without impacting your browser fingerprint if you would like, but is also safe to keep even if you don't use Mullvad VPN. -### Private Browsing Mode +### プライベートブラウジングモード Mullvad Browser operates in permanent private browsing mode, meaning your history, cookies, and other site data will always be cleared every time the browser is closed. Your bookmarks, browser settings, and extension settings will still be preserved. @@ -106,17 +106,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- !!! recommendation - { align=right } + { align=right } - **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). + **Firefox**は、[強化型トラッキング防止](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop)などの強力なプライバシー設定を提供し、[様々な種類のトラッキング](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks)をブロックするのに役立ちます。 - [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } - [:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} - [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } - [:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } + [:octicons-home-16: ホームページ](https://firefox.com){ .md-button .md-button--primary } + [:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="プライバシーポリシー" } + [:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=文書} + [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="ソースコード" } + [:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=貢献 } - ??? downloads + ??? ダウンロード - [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) - [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) @@ -126,7 +126,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- !!! warning Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). -### Recommended Configuration +### おすすめの設定 These options can be found in :material-menu: → **Settings** @@ -146,7 +146,7 @@ Search suggestions send everything you type in the address bar to the default se This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability. -##### Firefox Suggest (US only) +##### Firefox Suggest (アメリカのみ) [Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. diff --git a/i18n/ja/index.md b/i18n/ja/index.md index 20c199eb..0b9733b3 100644 --- a/i18n/ja/index.md +++ b/i18n/ja/index.md @@ -44,7 +44,7 @@ schema: プライバシーと秘密を混同してはいけません。 トイレで用を足す時、ドアを閉めるかと思います。 用を足しているという事実を秘密にするためではなく、プライバシーを守るためにドアを閉めるのです。 **誰もが**守るべきものを持っています。 プライバシーは私たちを人間たらしめるものです。 -[:material-target-account: 主なインターネット上の脅威](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: プライバシーはなぜ重要なのか](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## どうしたらいいですか? diff --git a/i18n/ko/basics/passwords-overview.md b/i18n/ko/basics/passwords-overview.md index c927340c..e7274d1d 100644 --- a/i18n/ko/basics/passwords-overview.md +++ b/i18n/ko/basics/passwords-overview.md @@ -20,7 +20,7 @@ description: These are some tips and tricks on how to create the strongest passw All of our [recommended password managers](../passwords.md) include a built-in password generator that you can use. -### Rotating Passwords +### 비밀번호 변경 You should avoid changing passwords that you have to remember (such as your password manager's master password) too often unless you have reason to believe it has been compromised, as changing it too often exposes you to the risk of forgetting it. diff --git a/i18n/ko/basics/why-privacy-matters.md b/i18n/ko/basics/why-privacy-matters.md new file mode 100644 index 00000000..82e71d2c --- /dev/null +++ b/i18n/ko/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**프라이버시** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**보안** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. 이는 여러분이 무언가를 감추고자 한 것이 아닌, 사생활을 보호하고자 한 것이죠. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## 출처 + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/ko/index.md b/i18n/ko/index.md index 0f366bd0..c0ca5fdf 100644 --- a/i18n/ko/index.md +++ b/i18n/ko/index.md @@ -44,7 +44,7 @@ schema: '무언가를 숨기거나 감추는 것'과 '사생활 보호'를 혼동하면 안 됩니다. 여러분이 화장실에서 뭘 하는지는 명백함에도 불구하고, 여러분은 항상 화장실 문을 닫아둡니다. 이는 여러분이 무언가를 감추고자 한 것이 아닌, 사생활을 보호하고자 한 것이죠. **누구나** 보호해야 할 것이 있습니다. 우리가 사람답게 살기 위해서는 프라이버시가 필요합니다. -[:material-target-account: 인터넷상의 일반적인 위협](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## 무엇을 해야 하나요? diff --git a/i18n/ko/passwords.md b/i18n/ko/passwords.md index 70262b67..953ef3d0 100644 --- a/i18n/ko/passwords.md +++ b/i18n/ko/passwords.md @@ -118,7 +118,7 @@ schema: url: "./" --- -비밀번호 관리자를 사용하여, 비밀번호를 비롯한 기타 자격 증명을 마스터 패스워드로 안전하게 저장 및 관리할 수 있습니다. +비밀번호 관리자를 사용하여, 비밀번호를 비롯한 기타 자격 증명을 마스터 비밀번호로 안전하게 저장 및 관리할 수 있습니다. [Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md) @@ -138,7 +138,7 @@ schema: { align=right } - **Bitwarden**은 무료 오픈 소스 비밀번호 관리자입니다. 개인, 팀, 비즈니스 조직의 비밀번호 관리 문제를 해결하는 것을 목표로 합니다. Bitwarden is among the best and safest solutions to store all of your logins and passwords while conveniently keeping them synced between all of your devices. + **Bitwarden**은 무료 오픈 소스 비밀번호 관리자입니다. 개인, 팀, 비즈니스 조직의 비밀번호 관리 문제를 해결하는 것을 목표로 합니다. Bitwarden은 모든 로그인 및 비밀번호를 저장하는 동시에 간편하게 모든 기기 간 동기화가 가능한, 가장 안전하고 뛰어난 서비스로 꼽히는 솔루션입니다. [:octicons-home-16: 홈페이지](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="프라이버시 정책" } @@ -191,17 +191,17 @@ Bitwarden 서버 코드는 [오픈 소스](https://github.com/bitwarden/server) **1Passsword**는 이전부터 macOS 및 iOS 사용자에게 가장 뛰어난 비밀번호 관리자 사용 경험을 제공해왔습니다. 오늘날에는 모든 플랫폼에서 동일한 기능성을 제공합니다. 고급 기능뿐만 아니라, 기술 이해도가 낮은 사용자 및 가족을 위한 다양한 기능을 자랑합니다. -1Password 보관함은 마스터 패스워드와 무작위 생성 34자 보안 키로 보호되어 여러분의 데이터를 서버에서 암호화합니다. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data. +1Password 보관함은 마스터 비밀번호와 무작위 생성 34자 보안 키로 보호되어 여러분의 데이터를 서버에서 암호화합니다. 이 보안 키의 존재로 인해, 여러분은 마스터 비밀번호 강도에 관계없이 여러분의 데이터를 높은 엔트로피로 보호할 수 있습니다. 대부분의 다른 비밀번호 관리자는 사용자 데이터 보호를 사용자의 마스터 비밀번호 강도에만 전적으로 의존합니다. -One advantage 1Password has over Bitwarden is its first-class support for native clients. While Bitwarden relegates many duties, especially account management features, to their web vault interface, 1Password makes nearly every feature available within its native mobile or desktop clients. 1Password's clients also have a more intuitive UI, which makes them easier to use and navigate. +Bitwarden 대비 1Password 장점 중 하나는 네이티브 클라이언트 지원이 매우 뛰어나다는 점입니다. Bitwarden은 상당수의 기능을(특히 계정 관리 기능) 웹 보관함 인터페이스에서만 제공합니다. 반면, 1Password는 거의 모든 기능을 모바일/데스크톱 네이티브 클라이언트에서 이용할 수 있습니다. 또한 1Password 클라이언트는 보다 직관적인 UI를 제공하여 더욱 쉬운 사용 및 탐색이 가능합니다. ### Psono !!! recommendation - { align=right } + { align=right } - **Psono** is a free and open-source password manager from Germany, with a focus on password management for teams. Psono supports secure sharing of passwords, files, bookmarks, and emails. All secrets are protected by a master password. + **Psono**는 팀 비밀번호 관리 서비스에 중점을 둔 독일의 무료 오픈 소스 비밀번호 관리자입니다. Psono는 비밀번호, 파일, 북마크, 이메일의 안전한 공유를 지원합니다. 모든 비밀 정보는 마스터 비밀번호로 보호됩니다. [:octicons-home-16: 홈페이지](https://psono.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="프라이버시 정책" } @@ -216,7 +216,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) -Psono는 제품에 관련된 문서를 매우 폭넓게 제공합니다. The web-client for Psono can be self-hosted; alternatively, you can choose the full Community Edition or the Enterprise Edition with additional features. +Psono는 제품에 관련된 문서를 매우 폭넓게 제공합니다. Psono 웹 클라이언트는 자체 호스팅 가능합니다. Community Edition 혹은 추가 기능이 포함된 Enterprise Edition을 선택할 수 있습니다. ### 평가 기준 @@ -230,9 +230,9 @@ Psono는 제품에 관련된 문서를 매우 폭넓게 제공합니다. The web - 강력한 표준 기반/최신 E2EE를 활용해야 합니다. - 암호화 및 보안 사례를 철저히 문서화해야 합니다. -- Must have a published audit from a reputable, independent third-party. +- 평한이 좋은 독립적인 제3자로부터 공개 감사를 받아야 합니다. - 필수적이지 않은 원격 분석 데이터 수집은 모두 선택 사항이어야 합니다. -- Must not collect more PII than is necessary for billing purposes. +- 요금 청구 용도로 필요한 것 이상으로 PII를 수집해서는 안 됩니다. #### 우대 사항 @@ -292,9 +292,9 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se !!! recommendation - { align=right } + { align=right } - **Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. + **Strongbox**는 iOS, macOS용 네이티브 오픈 소스 비밀번호 관리자입니다. KeePass, Password Safe 형식을 지원하므로, Apple 외 플랫폼에서는 KeePassXC 등의 다른 비밀번호 관리자와 함께 사용할 수 있습니다. Strongbox는 [부분 유료화](https://strongboxsafe.com/pricing/) 모델을 채택하고 있습니다. 무료 플랜에서도 대부분의 기능을 제공하나, 생체 인증 등 [편의 기능](https://strongboxsafe.com/comparison/)은 구독/영구 플랜에만 제공됩니다. [:octicons-home-16: 홈페이지](https://strongboxsafe.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="프라이버시 정책" } @@ -310,15 +310,15 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ### 커맨드라인 -These products are minimal password managers that can be used within scripting applications. +커맨드라인 비밀번호 관리자는 스크립트 애플리케이션 내에서 사용할 수 있는 미니멀한 비밀번호 관리자입니다. #### gopass !!! recommendation - { align=right } + { align=right } - **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). + **gopass**는 Go 언어로 작성된 커맨드라인용 비밀번호 관리자입니다. 모든 주요 데스크톱 및 서버 운영 체제(Linux, macOS, BSD, Windows)에서 작동합니다. [:octicons-home-16: 홈페이지](https://www.gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=문서} diff --git a/i18n/ku-IQ/basics/why-privacy-matters.md b/i18n/ku-IQ/basics/why-privacy-matters.md new file mode 100644 index 00000000..e223dc35 --- /dev/null +++ b/i18n/ku-IQ/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Sources + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/ku-IQ/index.md b/i18n/ku-IQ/index.md index b16f292e..65298b7a 100644 --- a/i18n/ku-IQ/index.md +++ b/i18n/ku-IQ/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/nl/basics/why-privacy-matters.md b/i18n/nl/basics/why-privacy-matters.md new file mode 100644 index 00000000..df0213e4 --- /dev/null +++ b/i18n/nl/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Waarom privacy belangrijk is" +icon: 'material/shield-account' +--- + +In het moderne tijdperk van digitale gegevensuitbuiting is jouw privacy nog nooit zo belangrijk geweest, en toch denken velen dat het al een verloren zaak is. Dat is het niet. ==Je privacy ligt voor het grijpen==, en daar moet je om geven. Privacy gaat over macht, en het is zo belangrijk dat die macht in de juiste handen terechtkomt. + +De privacy gaat uiteindelijk over menselijke informatie, en dat is belangrijk omdat we weten dat menselijke informatie de macht over mensen geeft. Als we waarde hechten aan ons vermogen om authentieke en vrije mensen te zijn, moeten we ons zorgen maken over de regels die van toepassing zijn op informatie over ons. Zo veel van onze moderne samenleving is gestructureerd rondom **informatie**. Wanneer je online winkelt, het nieuws leest, iets opzoekt, stemt, de weg zoekt, of wat dan ook, vertrouw je op informatie. Als we in een informatiemaatschappij leven, is onze informatie belangrijk, en daarom is privacy belangrijk. + +## Wat is privacy? + +Veel mensen halen de begrippen **privacy**, **veiligheid**, en **anonimiteit** door elkaar. Je ziet mensen verschillende producten bekritiseren als "niet privé", terwijl ze eigenlijk bedoelen dat het bijvoorbeeld geen anonimiteit biedt. Op deze website behandelen we alle drie onderwerpen, maar het is belangrijk dat je het verschil begrijpt en wanneer het om verschillende zaken gaat. + +**Privacy** +: + +==Privacy is de garantie dat jouw gegevens alleen worden gezien door de partijen die jij daar toegang voor geeft.== In de context van een berichten dienst biedt bijvoorbeeld end-to-end encryptie privacy door jouw bericht alleen zichtbaar te houden voor jou en de ontvanger. + +**Veiligheid** +: + +Veiligheid is het vermogen om de applicaties die je gebruikt te vertrouwen, dat de betrokken partijen zijn wie ze zeggen te zijn, en deze applicaties veilig te houden. In de context van het browsen op het web kan de beveiliging bijvoorbeeld worden verstrekt door HTTPS-certificaten. + + Certificaten bewijzen dat je rechtstreeks praat met de website die je bezoekt, en voorkomt dat aanvallers op jouw netwerk de gegevens kunnen lezen of wijzigen die van of naar de website worden gestuurd. + +**Anonimiteit** +: + +Anonimiteit is de mogelijkheid om te handelen zonder blijvende identificatie. Je kunt dit online bereiken met [Tor](../tor.md), waarmee je op het internet kunt surfen met een willekeurig IP-adres en netwerkverbinding in plaats van jouw eigen. + + **Pseudonimiteit** is een vergelijkbaar concept, maar maakt het mogelijk een persistente identificatiecode te hebben zonder dat die aan je echte identiteit is gekoppeld. Als iedereen je online kent als `@GamerGuy12` , maar niemand je echte naam kent, is dat je pseudoniem. + +Al deze begrippen overlappen elkaar, maar het is mogelijk om er een combinatie van te maken. De beste plek voor de meeste mensen is wanneer deze drie concepten elkaar overlappen. Het is echter lastiger te bereiken dan velen aanvankelijk denken. Soms moet je compromissen sluiten op sommige daarvan, en dat is ook oké. Dit is waar **dreigingsmodellering** wordt gebruikt, zodat je weloverwogen beslissingen kunt nemen over de [software en diensten](../tools.md) die je gebruikt. + +[:material-book-outline: Meer informatie over dreigingsmodellering](basics/threat-modeling.md ""){.md-button} + +## Privacy versus geheimzinnigheid + +Een veelgebruikt tegenargument voor de privacy beweging is het idee dat iemand geen privacy nodig heeft als hij **"niets te verbergen heeft".** Dit is een gevaarlijke misvatting, omdat het het gevoel creëert dat mensen die privacy eisen afwijkend, crimineel of verkeerd zijn. + +==Je moet privacy niet verwarren met geheimzinnigheid.== We weten wat er in de badkamer gebeurt, maar toch doe je de deur dicht. Dat is omdat je privacy wilt, geen geheimzinnigheid. Er zijn altijd bepaalde feiten over ons - bijvoorbeeld persoonlijke gezondheidsinformatie of seksueel gedrag - waarvan we niet willen dat de hele wereld ze weet, en dat is niet erg. De behoefte aan privacy is legitiem, en dat maakt ons menselijk. Privacy gaat over je rechten op je eigen informatie, niet over het verbergen van geheimen. + +## Gaat privacy over controle? + +Een gangbare definitie van privacy is dat het de mogelijkheid is om *te controleren* wie toegang heeft tot jouw gegevens. Dit is een gemakkelijke val om in te trappen, in feite is het de definitie van privacy waarop wij deze website lange tijd hebben gebaseerd. Het klinkt mooi, en het spreekt veel mensen aan, maar in de praktijk werkt het gewoon niet. + +Neem bijvoorbeeld de cookie popups. Je kunt deze tientallen keren per dag tegenkomen op de verschillende websites die je bezoekt, met een mooie reeks selectievakjes en schuifjes waarmee je jouw voorkeuren kunt aangeven om precies aan jouw wensen te voldoen. Uiteindelijk drukken we gewoon op de knop "Ik ga akkoord", omdat we gewoon het artikel willen lezen of een aankoop willen doen. Niemand wil een persoonlijke privacycontrole uitvoeren op elke website die hij bezoekt. Dit is een oefening in het onderwerp [ 'keuzearchitectuur"](https://en.wikipedia.org/wiki/Choice_architecture), bedoeld om je de gemakkelijke weg te laten nemen in plaats van je te verdiepen in een doolhof van configuratieopties die helemaal niet hoeven te bestaan. + +==Controle over je privacy binnen de meeste apps is een illusie.== Het is een glimmend dashboard met allerlei keuzes die je kunt maken over je gegevens, maar zelden de keuzes die je zoekt, zoals "gebruik mijn gegevens alleen om mij te helpen". Dit soort controle is bedoeld om je schuldig te laten voelen over je keuzes, dat je "de keuze had" om de apps die je gebruikt meer privé te maken, en je koos ervoor om dat niet te doen. + +Privacy is iets wat we standaard in [software en diensten](../tools.md) moeten ingebakken hebben je kan de meeste apps niet zelfstandig privé maken. + +## Bronnen + +- [Waarom privacy belangrijk is](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) door Neil Richards +- [The New Oil: Waarom privacy & veiligheid belangrijk is](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/nl/index.md b/i18n/nl/index.md index d53ed023..ccdd64fb 100644 --- a/i18n/nl/index.md +++ b/i18n/nl/index.md @@ -44,7 +44,7 @@ Net zoals het recht op interraciale huwelijken, het kiesrecht voor vrouwen, de v Je moet privacy niet verwarren met geheimhouding. We weten wat er in de badkamer gebeurt, maar je doet nog steeds de deur dicht. Dat is omdat je privacy wilt, geen geheimzinnigheid. **Iedereen** heeft iets te beschermen. Privacy is iets wat ons menselijk maakt. -[:material-target-account: Veelvoorkomende internetbedreigingen](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## Wat moet ik doen? diff --git a/i18n/pl/basics/why-privacy-matters.md b/i18n/pl/basics/why-privacy-matters.md new file mode 100644 index 00000000..25e3e2b3 --- /dev/null +++ b/i18n/pl/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Źródła + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/pl/index.md b/i18n/pl/index.md index e70bd5de..7dd542b4 100644 --- a/i18n/pl/index.md +++ b/i18n/pl/index.md @@ -44,7 +44,7 @@ Podobnie jak prawo do małżeństw różnych ras, prawo wyborcze kobiet, wolnoś You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/pt-BR/basics/why-privacy-matters.md b/i18n/pt-BR/basics/why-privacy-matters.md new file mode 100644 index 00000000..7e1ae6a2 --- /dev/null +++ b/i18n/pt-BR/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Isso é porque você quer privacidade, não segredo. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Fontes + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/pt-BR/index.md b/i18n/pt-BR/index.md index ac45f90d..e9e38df5 100644 --- a/i18n/pt-BR/index.md +++ b/i18n/pt-BR/index.md @@ -44,7 +44,7 @@ Assim como o direito ao casamento inter-racial, o direito feminino de votar, a l Você não deve confundir privacidade com segredo. Sabemos o que acontece no banheiro, mas você ainda fecha a porta. Isso é porque você quer privacidade, não segredo. **Todo mundo** tem algo para proteger. Privacidade é algo que nos torna humanos. -[:material-target-account: Ameaças Comuns na Internet ](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## O que eu devo fazer? diff --git a/i18n/pt/basics/why-privacy-matters.md b/i18n/pt/basics/why-privacy-matters.md new file mode 100644 index 00000000..3657c1ff --- /dev/null +++ b/i18n/pt/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Tecnologia** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Privacidade** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Fontes + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/pt/index.md b/i18n/pt/index.md index 7a44f19f..2c365422 100644 --- a/i18n/pt/index.md +++ b/i18n/pt/index.md @@ -44,7 +44,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human. -[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## What should I do? diff --git a/i18n/ru/basics/why-privacy-matters.md b/i18n/ru/basics/why-privacy-matters.md new file mode 100644 index 00000000..9b7a5a11 --- /dev/null +++ b/i18n/ru/basics/why-privacy-matters.md @@ -0,0 +1,57 @@ +--- +title: "Why Privacy Matters" +icon: 'material/shield-account' +--- + +In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. + +Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters. + +## What is Privacy? + +Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play. + +**Privacy** +: + +==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient. + +**Security** +: + +Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates. + + Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website. + +**Anonymity** +: + +Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own. + + **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym. + +All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use. + +[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button} + +## Privacy vs. Secrecy + +A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. + +==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Это потому, что вы хотите приватности, а не секретности. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. + +## Is Privacy About Control? + +A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work. + +Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place. + +==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to. + +Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own. + +## Источники + +- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298) diff --git a/i18n/ru/index.md b/i18n/ru/index.md index adf48b0a..c6fb7a3c 100644 --- a/i18n/ru/index.md +++ b/i18n/ru/index.md @@ -44,7 +44,7 @@ schema: Не стоит путать приватность с секретностью. Все знают, что происходит в вашей ванной, но вы всё равно закрываете дверь. Это потому, что вы хотите приватности, а не секретности. **Каждому** есть что защищать. Приватность — это то, что делает вас человеком. -[:material-target-account: Распространённые интернет-угрозы](basics/common-threats.md){ class="md-button md-button--primary" } +[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" } ## И что же мне делать? diff --git a/i18n/ru/tor.md b/i18n/ru/tor.md index af7cd5e9..353871f5 100644 --- a/i18n/ru/tor.md +++ b/i18n/ru/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://www.torproject.org/ru/ sameAs: https://ru.wikipedia.org/wiki/Tor applicationCategory: Браузер operatingSystem: @@ -74,65 +74,65 @@ Tor работает, направляя ваш трафик через эти !!! recommendation - { align=right } + { align=right } - **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. + **Orbot** - это бесплатный Tor VPN для смартфонов, который направляет трафик от любого приложения на вашем устройстве через сеть Tor. [:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } - [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} - [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } - [:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribute } + [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Политика конфеденциальности" } + [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Документация} + [:octicons-code-16:](https://orbot.app/code){ .card-link title="Исходный код" } + [:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Поддержать } - ??? downloads + ??? загрузки - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) - [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) -We previously recommended enabling the *Isolate Destination Address* preference in Orbot settings. While this setting can theoretically improve privacy by enforcing the use of a different circuit for each IP address you connect to, it doesn't provide a practical advantage for most applications (especially web browsing), can come with a significant performance penalty, and increases the load on the Tor network. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1] +We previously recommended enabling the *Isolate Destination Address* preference in Orbot settings. Хотя эта настройка теоретически может улучшить конфиденциальность за счет принудительного использования отдельной схемы для каждого IP-адреса, к которому вы подключаетесь, она не дает практического преимущества для большинства приложений (особенно для просмотра веб-страниц), может сопровождаться значительным снижением производительности и увеличивает нагрузку на сеть Tor. Мы больше не рекомендуем изменять этот параметр по сравнению с его значением по умолчанию, если вы не уверены в том, что это необходимо.[^1] -!!! tip "Tips for Android" +!!! совет "Советы для Android" - Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using [VpnService](https://developer.android.com/reference/android/net/VpnService) and can be used with the VPN killswitch in :gear: **Settings** → **Network & internet** → **VPN** → :gear: → **Block connections without VPN**. + Orbot может проксировать отдельные приложения, если они поддерживают SOCKS или HTTP проксирование. Он также может проксировать все ваши сетевые подключения с помощью [VpnService](https://developer.android.com/reference/android/net/VpnService) и может использоваться с VPN killswitch в :gear: **Настройки** → **Сеть и интернет** → **VPN** → :gear: → **Блокировать подключения без VPN**. - Orbot is often outdated on the Guardian Project's [F-Droid repository](https://guardianproject.info/fdroid) and [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android), so consider downloading directly from the [GitHub repository](https://github.com/guardianproject/orbot/releases) instead. + В [репозитории F-Droid](https://guardianproject.info/fdroid) проекта Guardian и [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) часто загружена устаревшая версия Orbot, поэтому его лучше загружать непосредственно с [оепозитория GitHub](https://github.com/guardianproject/orbot/releases). - All versions are signed using the same signature so they should be compatible with each other. + Все версии подписаны одной и той же подписью, поэтому они должны быть совместимы друг с другом. -## Relays and Bridges +## Ретрансляторы и Мосты -### Terms of Service; Didn't Read +### Snowflake !!! recommendation - { align=right } - { align=right } + { align=right } + { align=right } - **Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + **Snowflake** позволяет вам пожертвовать пропускную способность проекту Tor, используя "прокси Snowflake" в вашем браузере. - People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + Люди, подвергающиеся цензуре, могут использовать прокси Snowflake для подключения к сети Tor. Snowflake - это отличный способ внести свой вклад в работу сети Tor, даже если у вас нет технических знаний для запуска ретранслятора или моста Tor. - [:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } - [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} - [:octicons-code-16:](https://gitweb.torproject.org/pluggable-transports/snowflake.git/){ .card-link title="Source Code" } - [:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } + [:octicons-home-16: Домашняя страница](https://snowflake.torproject.org/){ .md-button .md-button--primary } + [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Документация} + [:octicons-code-16:](https://gitweb.torproject.org/pluggable-transports/snowflake.git/){ .card-link title="Исходный код" } + [:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Поддержать } - ??? downloads + ??? загрузки - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/torproject-snowflake/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/snowflake/mafpmfcccpbjnhfhjnllmmalhifmlcie) - [:octicons-browser-16: Web](https://snowflake.torproject.org/embed "Leave this page open to be a Snowflake proxy") -??? tip "Embedded Snowflake" +??? совет "Встроенный Snowflake" - You can enable Snowflake in your browser by clicking the switch below and ==leaving this page open==. You can also install Snowflake as a browser extension to have it always run while your browser is open, however adding third-party extensions can increase your attack surface. + Вы можете включить Snowflake в своем браузере, нажав на переключатель ниже и ==оставив эту страницу открытой==. Вы также можете установить Snowflake в качестве расширения браузера, чтобы он всегда работал, пока открыт браузер, однако добавление сторонних расширений может увеличить площадь атаки.
منظمات هائلة تراقب أنشطتك على الإنترنت. Privacy Guides هو مصدرك المركزي للخصوصية والأمن لتحمي نفسك على الإنترنت.
- + ابدأ رحلة الخصوصية diff --git a/theme/overrides/home.bn.html b/theme/overrides/home.bn.html index 54a2ca6b..b8235e36 100644 --- a/theme/overrides/home.bn.html +++ b/theme/overrides/home.bn.html @@ -38,7 +38,7 @@বড়ো কোম্পানিগুলি আপনার অনলাইন কার্যক্রম-এর ওপর নজরদারি করছে। প্রাইভেসী গাইডস হলো আপনার অনলাইন প্রাইভেসী এবং সিকিউরিটি সম্পর্কে জানবার প্রধান জায়গা।
- + আপনার প্রাইভেসি এর যাত্রা শুরু করুন diff --git a/theme/overrides/home.cs.html b/theme/overrides/home.cs.html index e7371f59..abc1601a 100644 --- a/theme/overrides/home.cs.html +++ b/theme/overrides/home.cs.html @@ -38,7 +38,7 @@Masivní organizace sledují vaše online aktivity. Privacy Guides je vaším hlavním zdrojem informací o ochraně soukromí a bezpečnosti na internetu.
- + Začněte svoji cestu za soukromím diff --git a/theme/overrides/home.de.html b/theme/overrides/home.de.html index 7353337a..b826deaf 100644 --- a/theme/overrides/home.de.html +++ b/theme/overrides/home.de.html @@ -38,7 +38,7 @@Große Konzerne überwachen deine Onlineaktivitäten. Privacy Guides ist deine zentrale Informationsquelle für Datenschutz und Sicherheit, um dich online zu schützen.
- + Beginne Deine Reise zur Privatsphäre diff --git a/theme/overrides/home.el.html b/theme/overrides/home.el.html index 32301971..dd177e0f 100644 --- a/theme/overrides/home.el.html +++ b/theme/overrides/home.el.html @@ -38,7 +38,7 @@Μαζικές οργανώσεις παρακολουθούν τις δραστηριότητές σας στο διαδίκτυο. Ο οδηγός Privacy Guides είναι η κεντρική πηγή προστασίας του απορρήτου σας και της ασφάλειας στο διαδίκτυο.
- + Ξεκινήστε το ταξίδι απορρήτου σας diff --git a/theme/overrides/home.eo.html b/theme/overrides/home.eo.html index 8d5c73c9..22ff2f27 100644 --- a/theme/overrides/home.eo.html +++ b/theme/overrides/home.eo.html @@ -38,7 +38,7 @@Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.
- + Start Your Privacy Journey diff --git a/theme/overrides/home.es.html b/theme/overrides/home.es.html index c7713554..61966951 100644 --- a/theme/overrides/home.es.html +++ b/theme/overrides/home.es.html @@ -38,7 +38,7 @@Organizaciones masivas están monitoreando tus actividades en línea. Privacy Guides es tu recurso central de privacidad y seguridad para protegerte en línea.
- + Inicia Tu Viaje de Privacidad diff --git a/theme/overrides/home.fa.html b/theme/overrides/home.fa.html index d80f2a82..e145aac7 100644 --- a/theme/overrides/home.fa.html +++ b/theme/overrides/home.fa.html @@ -38,7 +38,7 @@سازمانهای بزرگ فعالیتهای اینترنتی شما را رصد میکنند. وبسایت Privacy Guides منبع اصلی حریم خصوصی و امنیت شما برای محافظت از خودتان در اینترنت است.
- + Start Your Privacy Journey diff --git a/theme/overrides/home.fr.html b/theme/overrides/home.fr.html index 91475e0c..15de13a5 100644 --- a/theme/overrides/home.fr.html +++ b/theme/overrides/home.fr.html @@ -38,7 +38,7 @@Des organisations massives surveillent vos activités en ligne. Privacy Guides est votre ressource centrale en matière de vie privée et de sécurité pour vous protéger en ligne.
- + Commencez votre voyage vers la vie privée diff --git a/theme/overrides/home.he.html b/theme/overrides/home.he.html index dc3bde86..50839ea6 100644 --- a/theme/overrides/home.he.html +++ b/theme/overrides/home.he.html @@ -38,7 +38,7 @@ארגונים גדולים עוקבים אחר הפעילות שלכם באינטרנט. Privacy Guides (מדריכי פרטיות) הם משאב הפרטיות והאבטחה המרכזי שלכם כדי להגן על עצמכם באופן מקוון.
- + התחל את מסע הפרטיות שלך diff --git a/theme/overrides/home.hi.html b/theme/overrides/home.hi.html index 8d5c73c9..22ff2f27 100644 --- a/theme/overrides/home.hi.html +++ b/theme/overrides/home.hi.html @@ -38,7 +38,7 @@Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.
- + Start Your Privacy Journey diff --git a/theme/overrides/home.hu.html b/theme/overrides/home.hu.html index 18cf5e00..32e65fe5 100644 --- a/theme/overrides/home.hu.html +++ b/theme/overrides/home.hu.html @@ -38,7 +38,7 @@Hatalmas szervezetek figyelik az online tevékenységeidet. A Privacy Guides a te központi adatvédelmi és adatbiztonsági erőforrásod magad megvédéséhez online.
- + Kezdj Bele Adatvédelmi Utazásodba diff --git a/theme/overrides/home.id.html b/theme/overrides/home.id.html index 0348c927..984294b8 100644 --- a/theme/overrides/home.id.html +++ b/theme/overrides/home.id.html @@ -38,7 +38,7 @@Organisasi besar sedang memantau aktivitas daring Anda. Privacy Guides adalah sumber daya privasi dan keamanan Anda untuk melindungi Anda secara daring.
- + Mulai Perjalanan Privasi Anda diff --git a/theme/overrides/home.it.html b/theme/overrides/home.it.html index 1c1023dd..f18d167a 100644 --- a/theme/overrides/home.it.html +++ b/theme/overrides/home.it.html @@ -38,7 +38,7 @@Le grandi organizzazioni stanno monitorando le tue attività online. Privacy Guides è la risorsa centrale per la privacy e la sicurezza per proteggersi online.
- + Inizia il tuo percorso sulla privacy diff --git a/theme/overrides/home.ja.html b/theme/overrides/home.ja.html index 41d826c8..1b7b4381 100644 --- a/theme/overrides/home.ja.html +++ b/theme/overrides/home.ja.html @@ -23,10 +23,10 @@ {% extends "main.html" %} {% block extrahead %} - - - - + + + + {{ super() }} {% endblock %} {% block tabs %} @@ -38,7 +38,7 @@大規模な組織が、あなたのオンラインでの活動を監視しています。 Privacy Guidesはあなたがオンラインで自分自身を守るための、プライバシーとセキュリティに関するリソースです。
- + プライバシー保護を始める diff --git a/theme/overrides/home.ko.html b/theme/overrides/home.ko.html index 03548608..87491324 100644 --- a/theme/overrides/home.ko.html +++ b/theme/overrides/home.ko.html @@ -38,7 +38,7 @@Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.
- + Start Your Privacy Journey diff --git a/theme/overrides/home.ku-IQ.html b/theme/overrides/home.ku-IQ.html index d7cc58d1..0c163542 100644 --- a/theme/overrides/home.ku-IQ.html +++ b/theme/overrides/home.ku-IQ.html @@ -38,7 +38,7 @@ڕێکخراوە زەبەلاحەکان چاودێری چالاکی سەرئینتەرنێتت دەکەن. Privacy Guides ناوەندی سەرچاوەی تۆیە بۆ پاراستن و تایبەتێتی شێوازی خۆپاراستن لەسەرهێڵ.
- + گەشتی تایبەتێتی دەست پێبکە diff --git a/theme/overrides/home.nl.html b/theme/overrides/home.nl.html index 1fabd075..d748ea4d 100644 --- a/theme/overrides/home.nl.html +++ b/theme/overrides/home.nl.html @@ -38,7 +38,7 @@Enorme organisaties houden jouw online activiteiten in de gaten. Privacy Guides is jouw centrale bron voor privacy en beveiliging om jezelf online te beschermen.
- + Begin jouw privacyreis diff --git a/theme/overrides/home.pl.html b/theme/overrides/home.pl.html index 655114eb..5eeb5aeb 100644 --- a/theme/overrides/home.pl.html +++ b/theme/overrides/home.pl.html @@ -38,7 +38,7 @@Ogromne korporacje monitorują Twoją aktywność w Internecie. Privacy Guides to Twoje centrum dla prywatności oraz bezpieczeństwa, które pomoże Ci chronić się w Internecie.
- + Rozpocznij swoją przygodę ku prywatności diff --git a/theme/overrides/home.pt-BR.html b/theme/overrides/home.pt-BR.html index bbfa633c..e278883f 100644 --- a/theme/overrides/home.pt-BR.html +++ b/theme/overrides/home.pt-BR.html @@ -38,7 +38,7 @@Grandes organizações estão monitorando suas atividades online. Privacy Guides é sua central de recursos no que diz respeito a privacidade e segurança para se proteger online.
- + Comece Sua Jornada de Privacidade diff --git a/theme/overrides/home.pt.html b/theme/overrides/home.pt.html index 8d5c73c9..22ff2f27 100644 --- a/theme/overrides/home.pt.html +++ b/theme/overrides/home.pt.html @@ -38,7 +38,7 @@Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.
- + Start Your Privacy Journey diff --git a/theme/overrides/home.ru.html b/theme/overrides/home.ru.html index 4d111ca5..f0a24901 100644 --- a/theme/overrides/home.ru.html +++ b/theme/overrides/home.ru.html @@ -38,7 +38,7 @@Огромные организации следят за вашей деятельностью в Интернете. Privacy Guides - это ваш главный ресурс по конфиденциальности и безопасности для защиты себя в Интернете.
- + Начните свой путь к приватности diff --git a/theme/overrides/home.sv.html b/theme/overrides/home.sv.html index 2fea8d27..c6f9258f 100644 --- a/theme/overrides/home.sv.html +++ b/theme/overrides/home.sv.html @@ -38,7 +38,7 @@Stora organisationer övervakar dina aktiviteter på nätet. Privacy Guides är din centrala resurs för integritet och säkerhet för att skydda dig själv på nätet.
- + Börja din resa i integritetsfrågor diff --git a/theme/overrides/home.tr.html b/theme/overrides/home.tr.html index ffacda54..f58bcb01 100644 --- a/theme/overrides/home.tr.html +++ b/theme/overrides/home.tr.html @@ -38,7 +38,7 @@Büyük kurumlar sizin çevrimiçi hareketlerinizi izliyor. Privacy Guides, kendinizi çevrimiçi olarak korumanız için merkezi gizlilik ve güvenlik kaynağıdır.
- + Gizlilik Yolculuğunuza Başlayın diff --git a/theme/overrides/home.uk.html b/theme/overrides/home.uk.html index 920d5791..6eee5b31 100644 --- a/theme/overrides/home.uk.html +++ b/theme/overrides/home.uk.html @@ -38,7 +38,7 @@Великі організації стежать за вашою діяльністю в Інтернеті. Privacy Guides — ваш головний ресурс для захисту конфіденційності та безпеки в Інтернеті.
- + Почніть свою подорож до конфіденційності diff --git a/theme/overrides/home.vi.html b/theme/overrides/home.vi.html index bb986de0..1942d94c 100644 --- a/theme/overrides/home.vi.html +++ b/theme/overrides/home.vi.html @@ -38,7 +38,7 @@Các tổ chức đông đảo đang theo dõi các hoạt động trực tuyến của bạn. Privacy Guides là tài nguyên bảo mật và quyền riêng tư trung tâm của bạn để bảo vệ bạn khi trực tuyến.
- + Start Your Privacy Journey diff --git a/theme/overrides/home.zh-Hant.html b/theme/overrides/home.zh-Hant.html index e91f8a82..11739771 100644 --- a/theme/overrides/home.zh-Hant.html +++ b/theme/overrides/home.zh-Hant.html @@ -38,7 +38,7 @@巨型組織正在監視您的線上活動。 Privacy Guides 是您重要的網路隱私與安全資源。
- + 按此開始您的隱私旅程 diff --git a/theme/overrides/home.zh.html b/theme/overrides/home.zh.html index 38f5da2b..2cd6085d 100644 --- a/theme/overrides/home.zh.html +++ b/theme/overrides/home.zh.html @@ -38,7 +38,7 @@