1
0
mirror of https://github.com/privacyguides/i18n.git synced 2026-03-16 20:00:36 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2026-03-10 23:39:52 +00:00
parent 4556cbd808
commit b5c8338597
32 changed files with 136 additions and 105 deletions

View File

@@ -298,19 +298,20 @@ It is important to note that using a VPN provider will not make you anonymous, b
### Technology
We require all our recommended VPN providers to provide standard configuration files which can be used in a generic, open-source client. **If** a VPN provides their own custom client, we require a kill switch to block network data leaks when disconnected.
We require our recommended providers to support modern technologies currently available to VPNs.
**Minimum to Qualify:**
- Must provide standard configuration files which can be used in a generic, open-source client such as the WireGuard apps.
- Support for strong protocols such as WireGuard.
- Kill switch built in to clients.
- Functional kill switch built in to service-provided clients on our recommended [desktop](desktop.md) and [mobile](android/distributions.md) platforms. This kill switch should be able to block all internet traffic when the VPN connection drops unexpectedly.
- Multi-hop support. Multi-hopping is important to keep data private in case of a single node compromise.
- If VPN clients are provided, they should be [open source](https://en.wikipedia.org/wiki/Open_source), like the VPN software they generally have built into them. We believe that [source code](https://en.wikipedia.org/wiki/Source_code) availability provides greater transparency about what the program is actually doing.
- Censorship resistance features designed to bypass firewalls without DPI.
**Best Case:**
- Kill switch with highly configurable options (enable/disable on certain networks, on boot, etc.)
- Kill switch on all major platforms with highly configurable options (enable/disable on certain networks, on boot, etc.)
- Easy-to-use VPN clients
- [IPv6](https://en.wikipedia.org/wiki/IPv6) support. We expect that servers will allow incoming connections via IPv6 and allow you to access services hosted on IPv6 addresses.
- Capability of [remote port forwarding](https://en.wikipedia.org/wiki/Port_forwarding#Remote_port_forwarding) assists in creating connections when using P2P ([Peer-to-Peer](https://en.wikipedia.org/wiki/Peer-to-peer)) file sharing software or hosting a server (e.g., Mumble).