From b5c8338597081529687c4896c1b4d144a03da481 Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Tue, 10 Mar 2026 23:39:52 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/ar/vpn.md | 7 ++++--- i18n/bn-IN/vpn.md | 7 ++++--- i18n/bn/vpn.md | 7 ++++--- i18n/cs/vpn.md | 7 ++++--- i18n/de/vpn.md | 9 +++++---- i18n/el/vpn.md | 7 ++++--- i18n/eo/vpn.md | 7 ++++--- .../toolbox/tip-consider-everyones-unique-situation.md | 6 +++--- i18n/es/vpn.md | 9 +++++---- i18n/fa/vpn.md | 9 +++++---- i18n/fi/vpn.md | 7 ++++--- i18n/fr/vpn.md | 9 +++++---- i18n/he/vpn.md | 7 ++++--- i18n/hi/vpn.md | 7 ++++--- i18n/hu/vpn.md | 7 ++++--- i18n/id/vpn.md | 7 ++++--- i18n/it/vpn.md | 7 ++++--- i18n/ja/vpn.md | 9 +++++---- i18n/ko/vpn.md | 7 ++++--- i18n/ku-IQ/vpn.md | 7 ++++--- i18n/nl/vpn.md | 7 ++++--- i18n/pl/vpn.md | 9 +++++---- i18n/pt-BR/vpn.md | 9 +++++---- i18n/pt/vpn.md | 7 ++++--- i18n/ru/vpn.md | 9 +++++---- i18n/sv/vpn.md | 7 ++++--- i18n/tr/vpn.md | 7 ++++--- i18n/uk/vpn.md | 7 ++++--- i18n/vi/vpn.md | 7 ++++--- i18n/zh-Hant/vpn.md | 7 ++++--- i18n/zh-TW/vpn.md | 9 +++++---- i18n/zh/vpn.md | 7 ++++--- 32 files changed, 136 insertions(+), 105 deletions(-) diff --git a/i18n/ar/vpn.md b/i18n/ar/vpn.md index 85fdf889..7e3c5e82 100644 --- a/i18n/ar/vpn.md +++ b/i18n/ar/vpn.md @@ -301,19 +301,20 @@ Mullvad هو خدمة VPN سريعة ومنخفضة التكلفة، تركز ب ### Technology -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum to Qualify:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **أحسن الاحتمالات:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Easy-to-use VPN clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses. - Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble). diff --git a/i18n/bn-IN/vpn.md b/i18n/bn-IN/vpn.md index f76b8b87..d3dc8989 100644 --- a/i18n/bn-IN/vpn.md +++ b/i18n/bn-IN/vpn.md @@ -299,19 +299,20 @@ It is important to note that using a VPN provider will not make you anonymous, b ### Technology -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum to Qualify:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Best Case:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Easy-to-use VPN clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses. - Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble). diff --git a/i18n/bn/vpn.md b/i18n/bn/vpn.md index f76b8b87..d3dc8989 100644 --- a/i18n/bn/vpn.md +++ b/i18n/bn/vpn.md @@ -299,19 +299,20 @@ It is important to note that using a VPN provider will not make you anonymous, b ### Technology -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum to Qualify:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Best Case:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Easy-to-use VPN clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses. - Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble). diff --git a/i18n/cs/vpn.md b/i18n/cs/vpn.md index 80c856a5..96876a2d 100644 --- a/i18n/cs/vpn.md +++ b/i18n/cs/vpn.md @@ -299,19 +299,20 @@ It is important to note that using a VPN provider will not make you anonymous, b ### Technology -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum to Qualify:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Best Case:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Easy-to-use VPN clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses. - Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble). diff --git a/i18n/de/vpn.md b/i18n/de/vpn.md index dfe28894..d9ca3499 100644 --- a/i18n/de/vpn.md +++ b/i18n/de/vpn.md @@ -299,19 +299,20 @@ Es ist wichtig zu wissen, dass die Nutzung eines VPN-Anbieters dich nicht anonym ### Technologie -Wir verlangen von allen von uns empfohlenen VPN-Anbietern, dass sie Standard-Konfigurationsdateien bereitstellen, die in einem generischen Open-Source-Client verwendet werden können. **Wenn** ein eigener VPN-Client bereitstellt wird, benötigt er einen Kill-Switch, um Datenlecks im Netzwerk zu blockieren, wenn die Verbindung getrennt wird. +We require our recommended providers to support modern technologies currently available to VPNs. **Mindestvoraussetzung um zu qualifizieren:** -- Unterstützung von starken Protokollen wie WireGuard. -- In die Clients integrierter Kill-Switch. +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. +- Support for strong protocols such as WireGuard. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-Hop-Unterstützung. Multi-Hopping ist wichtig, um Daten im Falle einer Kompromittierung eines einzelnen Knotens geheim zu halten. - Wenn VPN-Clients zur Verfügung gestellt werden, sollten sie [Open Source](https://de.wikipedia.org/wiki/Open_Source)sein, wie die VPN-Software, die in der Regel in sie integriert ist. Wir sind der Meinung, dass die Verfügbarkeit des [Quellcodes](https://en.wikipedia.org/wiki/Source_code) mehr Transparenz darüber schafft, was das Programm tatsächlich tut. - Zensurresistente Funktionen zur Umgehung von Firewalls ohne DPI. **Im besten Fall:** -- Kill-Switch mit hochgradig konfigurierbaren Optionen (Aktivierung/Deaktivierung in bestimmten Netzen, beim Booten usw.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Einfach zu bedienende VPN-Clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) Unterstützung. Wir erwarten, dass die Server eingehende Verbindungen über IPv6 zulassen und dir den Zugang zu Diensten ermöglichen, die auf IPv6-Adressen gehostet werden. - Die Möglichkeit der [Remote-Port-Weiterleitung](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) hilft bei der Herstellung von Verbindungen bei der Verwendung von P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) Dateitauschbörsen-Software zum Austausch von Dateien oder zum Hosten eines Servers (z. B. Mumble). diff --git a/i18n/el/vpn.md b/i18n/el/vpn.md index b9294e94..ddc608c5 100644 --- a/i18n/el/vpn.md +++ b/i18n/el/vpn.md @@ -299,19 +299,20 @@ It is important to note that using a VPN provider will not make you anonymous, b ### Technology -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum to Qualify:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Best Case:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Easy-to-use VPN clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses. - Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble). diff --git a/i18n/eo/vpn.md b/i18n/eo/vpn.md index f76b8b87..d3dc8989 100644 --- a/i18n/eo/vpn.md +++ b/i18n/eo/vpn.md @@ -299,19 +299,20 @@ It is important to note that using a VPN provider will not make you anonymous, b ### Technology -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum to Qualify:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Best Case:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Easy-to-use VPN clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses. - Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble). diff --git a/i18n/es/activism/toolbox/tip-consider-everyones-unique-situation.md b/i18n/es/activism/toolbox/tip-consider-everyones-unique-situation.md index dcaf3f1e..17cb6d5c 100644 --- a/i18n/es/activism/toolbox/tip-consider-everyones-unique-situation.md +++ b/i18n/es/activism/toolbox/tip-consider-everyones-unique-situation.md @@ -29,13 +29,13 @@ Para establecer un modelo de amenaza, haga las siguientes preguntas: 4. ¿Qué podría pasar si esta persona o entidad tuviera acceso a esta información? 5. ¿Cuáles son las protecciones disponibles para proteger esta información específicamente de esta persona o entidad? 6. ¿Cuál sería el inconveniente de utilizar estas protecciones? -7. How long do these protections need to remain in place? +7. ¿Durante cuánto tiempo deben mantenerse estas protecciones? -Ask, rinse, and repeat for each type of information. The answers to these questions will be unique for each person or organization. This is their unique threat model. +Pregunte, clarifique y repita para cada tipo de información. Las respuestas a estas preguntas serán únicas para cada persona u organización. Este es su modelo único de amenaza.
Example scenario: Threat of stalking -**Needs:** Alice is a young celebrity sharing a lot of information about herself on social media. As part of her work, she has to be able to share photos of herself, her legal name, some of her travel information, and details about her personal life. +**Needs:** Alice is a young celebrity sharing a lot of information about herself on social media. Como parte de su trabajo, tiene que poder compartir fotos suyas, su nombre legal, algunos datos de sus viajes y detalles sobre su vida personal. **Threat:** However, to protect herself from an aggressive stalker, she must protect information about her _home address_ at all cost. diff --git a/i18n/es/vpn.md b/i18n/es/vpn.md index 0cea81f3..58372a80 100644 --- a/i18n/es/vpn.md +++ b/i18n/es/vpn.md @@ -301,19 +301,20 @@ Es importante tener en cuenta que el uso de un proveedor de VPN no le hará anó ### Tecnología -Exigimos que todos nuestros proveedores de VPN recomendados proporcionen archivos de configuración estándar que puedan utilizarse en un cliente genérico de código abierto. **Si** una VPN proporciona su propio cliente personalizado, requerimos un kill switch para bloquear las filtraciones de datos de red cuando se desconecte. +We require our recommended providers to support modern technologies currently available to VPNs. **Mínimo para Calificar:** -- Compatibilidad con protocolos robustos como WireGuard. -- Kill switch integrado en los clientes. +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. +- Support for strong protocols such as WireGuard. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Soporte de multisalto. Los saltos múltiples son importantes para mantener la privacidad de los datos en caso de que un solo nodo se vea comprometido. - Si se proporcionan clientes VPN, deben ser de [código abierto](https://en.wikipedia.org/wiki/Open_source), como el software VPN que generalmente llevan incorporado. Creemos que la disponibilidad del [código fuente](https://en.wikipedia.org/wiki/Source_code) proporciona una mayor transparencia sobre lo que hace realmente el programa. - Funciones de resistencia a la censura diseñadas para eludir cortafuegos sin DPI. **Mejor Caso:** -- Kill switch con opciones altamente configurables (activar/desactivar en determinadas redes, en el arranque, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Clientes VPN fáciles de usar - Soporte de [IPv6](https://en.wikipedia.org/wiki/IPv6). Esperamos que los servidores permitan las conexiones entrantes a través de IPv6 y le permitan acceder a los servicios alojados en direcciones IPv6. - La capacidad de [redirección de puertos](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) ayuda a crear conexiones cuando se utiliza software de intercambio de archivos P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)), Freenet, o se aloja un servidor (por ejemplo, Mumble). diff --git a/i18n/fa/vpn.md b/i18n/fa/vpn.md index a3115578..6de02a5b 100644 --- a/i18n/fa/vpn.md +++ b/i18n/fa/vpn.md @@ -295,19 +295,20 @@ IVPN has obfuscation modes using [V2Ray](https://v2ray.com/en/index) which helps ### فناوری -ما از همه ارائه‌دهندگان VPN پیشنهادی خود می‌خواهیم که فایل‌های پیکربندی استانداردی ارائه دهند که بتوان از آن‌ها در یک کلاینت عمومی و متن‌باز استفاده کرد. **اگر** یک VPN کلاینت سفارشی خود را ارائه دهد، ما نیازمند یک کلید قطع (kill switch) هستیم تا هنگام قطع اتصال، از نشت داده‌های شبکه جلوگیری کند. +We require our recommended providers to support modern technologies currently available to VPNs. **حداقل شرایط لازم:** -- پشتیبانی از پروتکل‌های قدرتمندی مانند WireGuard. -- کلید قطع اضطراری در کلاینت‌ها تعبیه شده است. +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. +- Support for strong protocols such as WireGuard. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - پشتیبانی چندمرحله‌ای. چندمرحله‌ای بودن برای حفظ حریم خصوصی داده‌ها در صورت به خطر افتادن یک گره اهمیت دارد. - اگر کلاینت‌های VPN ارائه می‌شوند، باید [متن‌باز](https://en.wikipedia.org/wiki/Open_source) باشند، مانند نرم‌افزار VPN که معمولاً به طور پیش‌فرض در آن‌ها وجود دارد. ما معتقدیم که در دسترس بودن [کد منبع](https://en.wikipedia.org/wiki/Source_code) شفافیت بیشتری درباره اینکه برنامه واقعاً چه کاری انجام می‌دهد، فراهم می‌کند. - ویژگی‌های مقاومت در برابر سانسور که برای عبور از فایروال‌ها بدون بازرسی عمیق بسته‌ها (DPI) طراحی شده‌اند. **بهترین حالت:** -- کلید قطع اتصال با گزینه‌های قابل تنظیم فراوان (فعال/غیرفعال‌سازی در شبکه‌های خاص، هنگام راه‌اندازی و غیره) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - کلاینت‌های VPN آسان برای استفاده - پشتیبانی از [IPv6](https://en.wikipedia.org/wiki/IPv6). ما انتظار داریم که سرورها اجازه اتصال ورودی از طریق IPv6 را بدهند و به شما امکان دسترسی به سرویس‌هایی که روی آدرس‌های IPv6 میزبانی می‌شوند را فراهم کنند. - قابلیت [فوروارد کردن پورت از راه دور](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) به ایجاد اتصال هنگام استفاده از نرم‌افزارهای اشتراک‌گذاری فایل P2P ([همتا به همتا](https://en.wikipedia.org/wiki/Peer-to-peer)) یا میزبانی یک سرور (مثلاً Mumble) کمک می‌کند. diff --git a/i18n/fi/vpn.md b/i18n/fi/vpn.md index f76b8b87..d3dc8989 100644 --- a/i18n/fi/vpn.md +++ b/i18n/fi/vpn.md @@ -299,19 +299,20 @@ It is important to note that using a VPN provider will not make you anonymous, b ### Technology -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum to Qualify:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Best Case:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Easy-to-use VPN clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses. - Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble). diff --git a/i18n/fr/vpn.md b/i18n/fr/vpn.md index 4a3458ca..a1ebff85 100644 --- a/i18n/fr/vpn.md +++ b/i18n/fr/vpn.md @@ -299,19 +299,20 @@ Il est important de noter que l'utilisation d'un fournisseur VPN ne vous rendra ### Technologie -Nous demandons à tous les fournisseurs de VPN que nous recommandons de fournir des fichiers de configuration standard qui peuvent être utilisés dans un client générique à code source ouvert. Si un VPN fournit son propre client personnalisé, nous exigeons une fonction d'arrêt d'urgence ("kill switch") pour bloquer les fuites de données du réseau en cas de déconnexion. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum pour se qualifier :** -- Prise en charge de protocoles robustes tels que WireGuard. -- Fonction d'arrêt d'urgence (kill switch) intégrée aux clients +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. +- Support for strong protocols such as WireGuard. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Prise en charge du multi-hop. Le multi-hop est important pour préserver la confidentialité des données en cas de compromission d'un seul nœud. - Si des clients VPN sont fournis, ils doivent être [open source](https://en.wikipedia.org/wiki/Open_source), comme le logiciel VPN qui y est généralement intégré. Nous pensons que la disponibilité du [code source](https://fr.wikipedia.org/wiki/Code_source) offre une plus grande transparence sur les activités réelles du programme. - Fonctions de résistance à la censure conçues pour contourner les pare-feux sans Inspection Profonde des Paquets (IPP) **Dans le meilleur des cas :** -- Fonction d'arrêt d'urgence avec des options hautement configurables (activation/désactivation sur certains réseaux, au démarrage, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Clients VPN faciles à utiliser - Prise en charge de l'[IPV6](https://fr.wikipedia.org/wiki/IPv6). Nous nous attendons à ce que les serveurs autorisent les connexions entrantes via IPv6 et vous permettent d'accéder aux services hébergés sur des adresses IPv6. - La capacité de [transfert de port à distance](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) aide à créer des connexions lors de l'utilisation de logiciels de partage de fichiers P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) ou de l'hébergement d'un serveur (par exemple, Mumble). diff --git a/i18n/he/vpn.md b/i18n/he/vpn.md index 2d64d976..2530376f 100644 --- a/i18n/he/vpn.md +++ b/i18n/he/vpn.md @@ -299,19 +299,20 @@ Mullvad is very transparent about which nodes they [own or rent](https://mullvad ### טכנולוגיה -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **מינימום כדי לעמוד בדרישות:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - אם מסופקים לקוחות VPN, הם צריכים להיות [קוד פתוח](https://en.wikipedia.org/wiki/Open_source), כמו תוכנת ה-VPN שהם בדרך כלל מובנים בהם. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **המקרה הטוב ביותר:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - קליינטים VPN קלים לשימוש - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. אנו מצפים כי שרתים יאפשרו חיבורים נכנסים באמצעות IPv6 ויאפשרו לך לגשת לשירותים המתארחים בכתובות IPv6. - היכולת של [העברת יציאות מרחוק](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) מסייעת ביצירת חיבורים בעת שימוש בתוכנת שיתוף קבצים P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer))או בעת אירוח שרת (לדוגמה, Mumble). diff --git a/i18n/hi/vpn.md b/i18n/hi/vpn.md index f76b8b87..d3dc8989 100644 --- a/i18n/hi/vpn.md +++ b/i18n/hi/vpn.md @@ -299,19 +299,20 @@ It is important to note that using a VPN provider will not make you anonymous, b ### Technology -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum to Qualify:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Best Case:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Easy-to-use VPN clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses. - Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble). diff --git a/i18n/hu/vpn.md b/i18n/hu/vpn.md index cd1544b4..2995480e 100644 --- a/i18n/hu/vpn.md +++ b/i18n/hu/vpn.md @@ -299,19 +299,20 @@ Fontos megjegyezni, hogy egy VPN szolgáltató használata nem teszi téged anon ### Technológia -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Alap elvárások minősítéshez:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Legjobb Esetben:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Könnyen használható VPN kliensek - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. Elvárjuk, hogy szerverek engedélyezzék az IPv6-on keresztül érkező kapcsolatokat, és lehetővé tegyék IPv6-címeken üzemeltetett szolgáltatások elérését. - A [távoli port forwardolás](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) képessége segíti a P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) fájlmegosztó szoftverek használatát vagy egy szerver (pl. Mumble) üzemeltetése esetén a kapcsolatok létrehozását. diff --git a/i18n/id/vpn.md b/i18n/id/vpn.md index 3bd33da3..1c7a822e 100644 --- a/i18n/id/vpn.md +++ b/i18n/id/vpn.md @@ -299,19 +299,20 @@ Penting untuk dicatat bahwa menggunakan penyedia VPN tidak akan membuat Anda men ### Teknologi -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum untuk Memenuhi Syarat:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - Jika klien VPN tersedia, klien tersebut seharusnya [bersumber terbuka](https://id.wikipedia.org/wiki/Perangkat_lunak_sumber_terbuka), seperti perangkat lunak VPN yang umumnya sudah terpasang di dalamnya. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Kasus Terbaik:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Klien VPN yang mudah digunakan - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. Kami berharap server akan mengizinkan koneksi masuk melalui IPv6 dan memungkinkan Anda untuk mengakses layanan yang dihosting pada alamat IPv6. - Kemampuan [penerusan porta jarak jauh](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) membantu dalam membuat koneksi ketika menggunakan perangkat lunak berbagi file P2P ([Peer-to-Peer](https://id.wikipedia.org/wiki/Peer-to-peer)) atau hosting server (misalnya, Mumble). diff --git a/i18n/it/vpn.md b/i18n/it/vpn.md index 5a748c87..4a9898ae 100644 --- a/i18n/it/vpn.md +++ b/i18n/it/vpn.md @@ -299,19 +299,20 @@ Mullvad è molto trasparente su quali nodi [possiede o fitta](https://mullvad.ne ### Tecnologia -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Requisiti minimi:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - Se vengono forniti client VPN, devono essere [open source](https://en.wikipedia.org/wiki/Open_source), come il software VPN che generalmente hanno incorporato. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Caso migliore:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Client VPN facili da usare - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. Ci aspettiamo che i server accettino connessioni in arrivo via IPv6 e che ti permettano di accedere a servizi su indirizzi IPv6. - La capacità di [port forwarding remoto](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assiste nel creare connessioni, utilizzando software di condivisione di file P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) od ospitando un server (es. Mumble). diff --git a/i18n/ja/vpn.md b/i18n/ja/vpn.md index 956b73ed..83f2491a 100644 --- a/i18n/ja/vpn.md +++ b/i18n/ja/vpn.md @@ -299,19 +299,20 @@ VPNプロバイダーを利用すると、特定の状況下ではより良い ### テクノロジー -VPNプロバイダーには一般的なオープンソースのクライアントで使用するための標準的な設定ファイルを提供することを求めています。 **仮に**VPNプロバイダーが独自のカスタムクライアントを用いる場合、切断時にネットワークデータの漏えいをふせぐためのキルスイッチが必要です。 +We require our recommended providers to support modern technologies currently available to VPNs. **最低条件:** -- WireGuardのような強力なプロトコルへの対応。 -- クライアントにビルトインのキルスイッチがあること。 +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. +- Support for strong protocols such as WireGuard. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - マルチホップへの対応。 マルチホップは単一のノードがセキュリティ侵害を受けた際、データのプライベートを保護するために重要です。 - VPNクライアントを提供する場合、一般的にビルトインされているVPNソフトウェアのように[オープンソース](https://en.wikipedia.org/wiki/Open_source)であること。 [ソースコード](https://en.wikipedia.org/wiki/Source_code)が公開されることでプログラムの実際の挙動についてのより高い透明性が得られると考えています。 - 検閲に対抗するため、DPIを受けることなくファイヤーウォールを回避する機能。 **満たされることが望ましい基準:** -- 高度な設定(特定のネットワークや起動時の有効・無効)が可能なキルスイッチがあること +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - 使いやすいVPNクライアントであること。 - [IPv6](https://en.wikipedia.org/wiki/IPv6)への対応。 サーバーがIPv6経由の着信接続を許可し、IPv6アドレスでホストされているサービスにアクセスできることが望ましい。 - [リモートポート転送](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding)機能が備わっていること。リモートポート転送機能は、P2P([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer))ファイル共有ソフトウェアを使用していたり、サーバー(Mumbleなど)をホストしていたりする際に接続を確立することを支援するものです。 diff --git a/i18n/ko/vpn.md b/i18n/ko/vpn.md index 1211f4ed..524bf5aa 100644 --- a/i18n/ko/vpn.md +++ b/i18n/ko/vpn.md @@ -299,19 +299,20 @@ VPN은 익명성을 제공하지 않는다는 것을 인지하는 것은 매우 ### 기술 -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **최소 요구 사항:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **우대 사항:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - 사용하기 쉬운 VPN 클라이언트 - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. 서버들은 IPv6를 통한 연결을 허용하고, IPv6 주소에 호스팅되는 서비스에 접속할 수 있도록 해야 합니다. - [원격 포트포워딩](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding)을 지원하여 P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) 파일 공유와 Mumble과 같은 서비스 호스팅할 수 있음 diff --git a/i18n/ku-IQ/vpn.md b/i18n/ku-IQ/vpn.md index bd03f678..83108e52 100644 --- a/i18n/ku-IQ/vpn.md +++ b/i18n/ku-IQ/vpn.md @@ -299,19 +299,20 @@ It is important to note that using a VPN provider will not make you anonymous, b ### Technology -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum to Qualify:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Best Case:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Easy-to-use VPN clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses. - Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble). diff --git a/i18n/nl/vpn.md b/i18n/nl/vpn.md index 825b73ba..9d31c93a 100644 --- a/i18n/nl/vpn.md +++ b/i18n/nl/vpn.md @@ -299,19 +299,20 @@ Het is belangrijk op te merken dat het gebruik van een VPN-provider je niet anon ### Technologie -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum om in aanmerking te komen:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Beste geval:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Gemakkelijk te gebruiken VPN-clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We verwachten dat servers inkomende verbindingen via IPv6 zullen toestaan en je toegang zullen geven tot services die gehost worden op IPv6-adressen. - De mogelijkheid van [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) helpt bij het maken van verbindingen bij het gebruik van P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software, Freenet, of het hosten van een server (bv. Mumble). diff --git a/i18n/pl/vpn.md b/i18n/pl/vpn.md index aabc3c2c..1f2ebd2c 100644 --- a/i18n/pl/vpn.md +++ b/i18n/pl/vpn.md @@ -299,19 +299,20 @@ Ważne jest, aby pamiętać, że korzystanie z dostawcy usługi VPN nie czyni Ci ### Technologia -Wymagamy, aby wszyscy zalecani przez nas dostawcy VPN udostępniali standardowe pliki konfiguracyjne, które można wykorzystać w uniwersalnym kliencie VPN typu open-source. **Jeśli** dostawca udostępnia własną aplikację, musi ona mieć wbudowany tzw. „kill switch”, który blokuje przesyłanie danych po utracie połączenia z VPN, zapobiegając wyciekom ruchu sieciowego. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimalne wymagania:** -- Obsługa silnych protokołów, takich jak WireGuard. -- Wbudowany kill switch w swoich aplikacjach. +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. +- Support for strong protocols such as WireGuard. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Obsługa multi-hop (łączenie przez wiele serwerów), co zwiększa prywatność w razie kompromitacji jednego z węzłów. - Jeśli dostawca oferuje własne aplikacje, powinny być one [open source](https://en.wikipedia.org/wiki/Open_source), podobnie jak oprogramowanie VPN, na którym zazwyczaj są oparte. Wierzymy, że dostępność [kodu źródłowego](https://en.wikipedia.org/wiki/Source_code) zapewnia większą przejrzystość i możliwość weryfikacji działania programu. - Funkcje odporne na cenzurę, zaprojektowane tak, aby omijać zapory sieciowe bez konieczności analizy głębokiej zawartości pakietów (DPI). **Najlepszy scenariusz:** -- Kill switch z rozbudowanymi opcjami konfiguracji (np. włączenie/wyłączenie w określonych sieciach, uruchamianie przy starcie systemu itp.). +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Łatwe w obsłudze aplikacje VPN. - Obsługa protokołu [IPv6](https://en.wikipedia.org/wiki/IPv6). Oczekujemy, że serwery umożliwiają zarówno połączenia przychodzące przez IPv6, jak i dostęp do usług działających w tej sieci. - Możliwość [zdalnego przekierowywania portów](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding), co ułatwia tworzenie połączeń w aplikacjach typu P2P ([peer-to-peer](https://en.wikipedia.org/wiki/Peer-to-peer)) lub przy hostowaniu własnych usług (np. serwera Mumble). diff --git a/i18n/pt-BR/vpn.md b/i18n/pt-BR/vpn.md index e0d1f6f1..bb6bc1a1 100644 --- a/i18n/pt-BR/vpn.md +++ b/i18n/pt-BR/vpn.md @@ -300,19 +300,20 @@ A Mullvad é muito transparente sobre quais nós são [de](https://mullvad.net/e ### Tecnologia -Exigimos que todos os nossos provedores de VPN recomendados forneçam arquivos de configuração OpenVPN para serem usados em qualquer cliente. **Se** uma VPN fornecer seu próprio cliente personalizado, será necessário um killswitch para bloquear vazamentos de dados de rede quando desconectado. +We require our recommended providers to support modern technologies currently available to VPNs. **Mínimo Para Qualificação:** -- Suporte a protocolos robustos, como o WireGuard e o OpenVPN. -- Killswitch integrado aos clientes. +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. +- Support for strong protocols such as WireGuard. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Suporte a Multihop. O *Multihopping* é importante para manter os dados protegidos no caso de comprometimento de um único nó da rede. - Todos os clientes VPN fornecidos pelas marcas devem ser de [código aberto](https://en.wikipedia.org/wiki/Open_source), como o software VPN que eles normalmente trazem incorporado. Acreditamos que a disponibilidade do [código-fonte](https://en.wikipedia.org/wiki/Source_code) proporciona maior transparência sobre o que o seu dispositivo está realmente fazendo. - Recursos de resistência à censura projetados para contornar firewalls sem DPI. **Melhor Caso:** -- Função Killswitch com opções altamente personalizáveis (ativar/desativar em determinadas redes, na inicialização, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Clientes VPN fáceis de usar - Suporte a [IPv6](https://en.wikipedia.org/wiki/IPv6). Esperamos que os servidores permitam conexões de entrada via IPv6 e que você possa acessar serviços hospedados em endereços IPv6. - O recurso de [encaminhamento remoto de portas](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) ajuda a criar conexões ao usar o software de compartilhamento de arquivos P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) ou ao hospedar um servidor (por exemplo, Mumble). diff --git a/i18n/pt/vpn.md b/i18n/pt/vpn.md index 16cadedf..bd50a563 100644 --- a/i18n/pt/vpn.md +++ b/i18n/pt/vpn.md @@ -299,19 +299,20 @@ Mullvad is very transparent about which nodes they [own or rent](https://mullvad ### Tecnologia -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Mínimos de qualificação:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Melhor caso:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Clientes VPN fáceis de utilizar - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. É suposto que os servidores permitam ligações de entrada através do IPv6 e que lhe permitam aceder a serviços alojados em endereços IPv6. - A capacidade de [reencaminhamento de portas remotas](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) ajuda a criar ligações quando se utiliza software de partilha de ficheiros P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) ou se aloja um servidor (por exemplo, Mumble). diff --git a/i18n/ru/vpn.md b/i18n/ru/vpn.md index 2ce00f45..4677eace 100644 --- a/i18n/ru/vpn.md +++ b/i18n/ru/vpn.md @@ -299,19 +299,20 @@ Mullvad очень открыт в отношении того, какими у ### Технологии -Мы требуем, чтобы все наши рекомендуемые VPN-провайдеры предоставляли стандартные конфигурационные файлы, которые можно использовать в универсальном клиенте с открытым исходным кодом. **Если** VPN предоставляет свой собственный пользовательский клиент, мы требуем наличия kill switch для блокировки утечки сетевых данных при отключении. +We require our recommended providers to support modern technologies currently available to VPNs. **Минимальные требования:** -- Поддержка надежных протоколов, таких как WireGuard. -- Kill switch встроен в приложения. +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. +- Support for strong protocols such as WireGuard. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Поддержка Multi-hop. Multi-hop важен для сохранения конфиденциальности данных в случае компрометации одного узла. - Если предоставляются VPN-клиенты, они должны быть [с открытым исходным кодом](https://en.wikipedia.org/wiki/Open_source), как и VPN-программное обеспечение, которое обычно в них встроено. Мы считаем, что доступность [исходного кода](https://en.wikipedia.org/wiki/Source_code) обеспечивает большую прозрачность относительно того, что программа на самом деле делает. - Функции защиты от цензуры, разработанные для обхода брандмауэров без DPI. **В лучшем случае:** -- Kill switch с широкими возможностями настройки (включение/выключение в определенных сетях, при включении и т.д.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Простые в использовании приложения VPN - Поддержка [IPv6](https://en.wikipedia.org/wiki/IPv6). Мы ожидаем, что серверы будут разрешать входящие соединения через IPv6 и позволят вам получить доступ к услугам, размещенным на адресах IPv6. - Возможность [удаленной переадресации портов](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) помогает создавать соединения при использовании программного обеспечения для обмена файлами P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) или хостинга сервера (например, Mumble). diff --git a/i18n/sv/vpn.md b/i18n/sv/vpn.md index 58de7a96..08ee28f9 100644 --- a/i18n/sv/vpn.md +++ b/i18n/sv/vpn.md @@ -299,19 +299,20 @@ It is important to note that using a VPN provider will not make you anonymous, b ### Technology -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum to Qualify:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Best Case:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Easy-to-use VPN clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses. - Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble). diff --git a/i18n/tr/vpn.md b/i18n/tr/vpn.md index fbe9e932..10a9b639 100644 --- a/i18n/tr/vpn.md +++ b/i18n/tr/vpn.md @@ -298,19 +298,20 @@ It is important to note that using a VPN provider will not make you anonymous, b ### Technology -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum to Qualify:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Best Case:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Easy-to-use VPN clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses. - Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble). diff --git a/i18n/uk/vpn.md b/i18n/uk/vpn.md index 5e1825ea..f9a19ffc 100644 --- a/i18n/uk/vpn.md +++ b/i18n/uk/vpn.md @@ -299,19 +299,20 @@ It is important to note that using a VPN provider will not make you anonymous, b ### Technology -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum to Qualify:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Best Case:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Easy-to-use VPN clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses. - Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble). diff --git a/i18n/vi/vpn.md b/i18n/vi/vpn.md index 9621d27d..aa59623f 100644 --- a/i18n/vi/vpn.md +++ b/i18n/vi/vpn.md @@ -299,19 +299,20 @@ It is important to note that using a VPN provider will not make you anonymous, b ### Technology -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **Minimum to Qualify:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Best Case:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - Easy-to-use VPN clients - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses. - Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble). diff --git a/i18n/zh-Hant/vpn.md b/i18n/zh-Hant/vpn.md index 3e4c3ccb..f46cebf5 100644 --- a/i18n/zh-Hant/vpn.md +++ b/i18n/zh-Hant/vpn.md @@ -299,19 +299,20 @@ Mullvad 對於他們[自有或租用](https://mullvad.net/en/servers)的節點 ### 技術 -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **最低合格要求:** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - 如有提供 VPN 用戶端,則應為 [開源](https://en.wikipedia.org/wiki/Open_source),一如所內建的 VPN 軟體。 我們相信,提供[原始碼](https://en.wikipedia.org/wiki/Source_code)可顯著提高透明度,讓我們知道程式實際在做什麼。 - 抗審查功能可在沒有 DPI 的情況下繞過防火牆。 **最佳情況:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - 易於使用的 VPN 客戶端 - 支援 [IPv6](https://en.wikipedia.org/wiki/IPv6)。 我們希望伺服器能允許透過 IPv6 傳入連線,並允許您存取託管在 IPv6 位址上的服務。 - [遠端端口轉發](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) 的功能可協助在使用 P2P ([對等](https://en.wikipedia.org/wiki/Peer-to-peer)) 檔案共享軟體或自建伺服器 (例如 Mumble) 時建立連接。 diff --git a/i18n/zh-TW/vpn.md b/i18n/zh-TW/vpn.md index 0a7a6851..2bd1f4b3 100644 --- a/i18n/zh-TW/vpn.md +++ b/i18n/zh-TW/vpn.md @@ -299,19 +299,20 @@ Mullvad 對於他們[自有或租用](https://mullvad.net/en/servers)的節點 ### 技術 -我們要求所有推薦的 VPN 供應商提供標準的設定檔,如此才能在通用的開放原始碼客戶端使用。 **若** VPN 提供了自己的客戶端,我們則要求要有 kill switch 來阻止未連線至 VPN 時洩漏網路資料。 +We require our recommended providers to support modern technologies currently available to VPNs. **最低合格要求:** -- 支援強健的協定,如 WireGuard。 -- 客戶端內建 Kill switch。 +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. +- Support for strong protocols such as WireGuard. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - 支援多重跳躍。 萬一單個節點被入侵,多重跳躍方式就非常重要,如此才能維持資料的隱密程度。 - 如有提供 VPN 用戶端,則應為 [開源](https://en.wikipedia.org/wiki/Open_source),一如所內建的 VPN 軟體。 我們相信,提供[原始碼](https://en.wikipedia.org/wiki/Source_code)可顯著提高透明度,讓我們知道程式實際在做什麼。 - 抗審查功能可在沒有 DPI 的情況下繞過防火牆。 **最佳情況:** -- Kill switch 具備高度可設定的選項(在特定的網路或開機時啟用/停用等等) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - 易於使用的 VPN 客戶端 - 支援 [IPv6](https://en.wikipedia.org/wiki/IPv6)。 我們希望伺服器能允許透過 IPv6 傳入連線,並允許您存取託管在 IPv6 位址上的服務。 - [遠端端口轉發](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) 的功能可協助在使用 P2P ([對等](https://en.wikipedia.org/wiki/Peer-to-peer)) 檔案共享軟體或自建伺服器 (例如 Mumble) 時建立連接。 diff --git a/i18n/zh/vpn.md b/i18n/zh/vpn.md index aad9915a..4741948f 100644 --- a/i18n/zh/vpn.md +++ b/i18n/zh/vpn.md @@ -299,19 +299,20 @@ Mullvad is very transparent about which nodes they [own or rent](https://mullvad ### 技术 -We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected. +We require our recommended providers to support modern technologies currently available to VPNs. **符合条件的最低要求。** +- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps. - Support for strong protocols such as WireGuard. -- Kill switch built in to clients. +- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly. - Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise. - If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing. - Censorship resistance features designed to bypass firewalls without DPI. **Best Case:** -- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.) +- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.) - 易于使用的VPN客户端 - [IPv6](https://en.wikipedia.org/wiki/IPv6) support. 我们希望服务器将允许通过IPv6的传入连接,并允许你访问IPv6地址上托管的服务。 - [远程端口转发的能力](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) 在使用P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) 文件共享软件或托管服务器(如Mumble)时,有助于创建连接。