diff --git a/i18n/ar/android.md b/i18n/ar/android.md
index 481bad8a..d0b9cfd7 100644
--- a/i18n/ar/android.md
+++ b/i18n/ar/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/ar/basics/account-creation.md b/i18n/ar/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/ar/basics/account-creation.md
+++ b/i18n/ar/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/ar/basics/email-security.md b/i18n/ar/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/ar/basics/email-security.md
+++ b/i18n/ar/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/ar/basics/threat-modeling.md b/i18n/ar/basics/threat-modeling.md
index 895ccfb9..5f16a964 100644
--- a/i18n/ar/basics/threat-modeling.md
+++ b/i18n/ar/basics/threat-modeling.md
@@ -1,10 +1,11 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "نمذَجَةُ التَّهديد"
icon: 'المادة/الحساب-المستهدف'
-description: موازنة الأمان، الخصوصية، وقابلية الاستخدام تعد واحدة من أول وأصعب المهام التي ستواجهها في رحلة الخصوصية.
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
-موازنة الأمان، الخصوصية، وقابلية الاستخدام تعد واحدة من أول وأصعب المهام التي ستواجهها في رحلة الخصوصية. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
+Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
If you wanted to use the **most** secure tools available, you'd have to sacrifice *a lot* of usability. And, even then, ==nothing is ever fully secure.== There's **high** security, but never **full** security. That's why threat models are important.
diff --git a/i18n/ar/basics/vpn-overview.md b/i18n/ar/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/ar/basics/vpn-overview.md
+++ b/i18n/ar/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/ar/cloud.md b/i18n/ar/cloud.md
index df3a7bff..ec8f0a82 100644
--- a/i18n/ar/cloud.md
+++ b/i18n/ar/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/ar/cryptocurrency.md b/i18n/ar/cryptocurrency.md
index ba06ba1e..a994b44f 100644
--- a/i18n/ar/cryptocurrency.md
+++ b/i18n/ar/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/ar/data-redaction.md b/i18n/ar/data-redaction.md
index 961594a8..39b14f11 100644
--- a/i18n/ar/data-redaction.md
+++ b/i18n/ar/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/ar/desktop-browsers.md b/i18n/ar/desktop-browsers.md
index dbe6322f..ddf97bdb 100644
--- a/i18n/ar/desktop-browsers.md
+++ b/i18n/ar/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/ar/email.md b/i18n/ar/email.md
index be8f72c1..c834046f 100644
--- a/i18n/ar/email.md
+++ b/i18n/ar/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "البُرُد الإلكترونية"
icon: material/email
description: توفِّر الجهات المذكورة مخزنًا آمنًا لرسائلك، والكثير منهم يدعم تعمية أوبنبيجيبي مع جهات أخرى.
@@ -123,7 +124,7 @@ description: توفِّر الجهات المذكورة مخزنًا آمنًا
#### :material-check:{ .pg-green } أمن الحساب
-تدعم Mailbox.org [الاستيثاق بخطوتين](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) في موقعهم فقط. لك استخدام كلمة مرور لمرة واحدة حسب الوقت (TOTP) أو [يوبِكي](https://en.wikipedia.org/wiki/YubiKey) من [يوبِكلاود](https://www.yubico.com/products/services-software/yubicloud). بعض معايير الوِب مثل [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) ليست مدعومةً بعد.
+تدعم Mailbox.org [الاستيثاق بخطوتين](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) في موقعهم فقط. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). بعض معايير الوِب مثل [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) ليست مدعومةً بعد.
#### :material-information-outline:{ .pg-blue } أمن البيانات
diff --git a/i18n/ar/encryption.md b/i18n/ar/encryption.md
index ded8533b..4391eba5 100644
--- a/i18n/ar/encryption.md
+++ b/i18n/ar/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/ar/index.md b/i18n/ar/index.md
index a671869c..e81c84ea 100644
--- a/i18n/ar/index.md
+++ b/i18n/ar/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.ar.html
hide:
- navigation
diff --git a/i18n/ar/mobile-browsers.md b/i18n/ar/mobile-browsers.md
index c6be3a37..acc0c9c2 100644
--- a/i18n/ar/mobile-browsers.md
+++ b/i18n/ar/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/ar/multi-factor-authentication.md b/i18n/ar/multi-factor-authentication.md
index def33276..a4030c74 100644
--- a/i18n/ar/multi-factor-authentication.md
+++ b/i18n/ar/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/ar/passwords.md b/i18n/ar/passwords.md
index 59579402..485231b1 100644
--- a/i18n/ar/passwords.md
+++ b/i18n/ar/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/ar/real-time-communication.md b/i18n/ar/real-time-communication.md
index 68f9d767..7abd8617 100644
--- a/i18n/ar/real-time-communication.md
+++ b/i18n/ar/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/ar/search-engines.md b/i18n/ar/search-engines.md
index 911525d7..a590a9eb 100644
--- a/i18n/ar/search-engines.md
+++ b/i18n/ar/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/ar/tools.md b/i18n/ar/tools.md
index d9e57d9b..221131d1 100644
--- a/i18n/ar/tools.md
+++ b/i18n/ar/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/ar/tor.md b/i18n/ar/tor.md
index 4ed6ad30..c0933ee4 100644
--- a/i18n/ar/tor.md
+++ b/i18n/ar/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: متصفِّح تور
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/ar/vpn.md b/i18n/ar/vpn.md
index 759c8702..1b42d5dd 100644
--- a/i18n/ar/vpn.md
+++ b/i18n/ar/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "خِدْمَات شبكة خاصة افتراضية"
icon: material/vpn
description: هذه هي أفضل خِدْمَات شبكة خاصة افتراضية للمحافظة خصوصيتك وأمانك على الإنترنت. اعثر على مزود للخدمة هنا ليس يريد التجسس عليك.
diff --git a/i18n/bn/android.md b/i18n/bn/android.md
index 03eb727d..a63a51ac 100644
--- a/i18n/bn/android.md
+++ b/i18n/bn/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "অ্যান্ড্রয়েড"
icon: 'ফন্টঅ্যাওসাম/ ব্র্যান্ড / অ্যান্ড্রয়েড'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP এর ডেরিভেটিভস্
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/bn/basics/account-creation.md b/i18n/bn/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/bn/basics/account-creation.md
+++ b/i18n/bn/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/bn/basics/email-security.md b/i18n/bn/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/bn/basics/email-security.md
+++ b/i18n/bn/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/bn/basics/threat-modeling.md b/i18n/bn/basics/threat-modeling.md
index 72d64044..1dcd5ff6 100644
--- a/i18n/bn/basics/threat-modeling.md
+++ b/i18n/bn/basics/threat-modeling.md
@@ -1,10 +1,11 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
-description: প্রাইভেসি সিকিউরিটি, এবং ব্যবহারযোগ্যতা এর মধ্যে ভারসাম্য রক্ষা করা আপনার প্রাইভেসি যাত্রার সবথেকে কঠিন কাজ।
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
-প্রাইভেসি সিকিউরিটি, এবং ব্যবহারযোগ্যতা এর মধ্যে ভারসাম্য রক্ষা করা আপনার প্রাইভেসি যাত্রার সবথেকে কঠিন কাজ। Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
+Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
যদি আপনি **সবথেকে** সিকিউর সফটও়্যারগুলো ব্যাবহার করতে চান আপনাকে *কিছু* ব্যবহারযোগ্যতা বিসর্জন দিতে হবে। And, even then, ==nothing is ever fully secure.== There's **high** security, but never **full** security. একারণে থ্রেট মডেল তৈরি করা জরুরি।
diff --git a/i18n/bn/basics/vpn-overview.md b/i18n/bn/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/bn/basics/vpn-overview.md
+++ b/i18n/bn/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/bn/cloud.md b/i18n/bn/cloud.md
index df3a7bff..ec8f0a82 100644
--- a/i18n/bn/cloud.md
+++ b/i18n/bn/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/bn/cryptocurrency.md b/i18n/bn/cryptocurrency.md
index ba06ba1e..a994b44f 100644
--- a/i18n/bn/cryptocurrency.md
+++ b/i18n/bn/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/bn/data-redaction.md b/i18n/bn/data-redaction.md
index 961594a8..39b14f11 100644
--- a/i18n/bn/data-redaction.md
+++ b/i18n/bn/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/bn/desktop-browsers.md b/i18n/bn/desktop-browsers.md
index dbe6322f..ddf97bdb 100644
--- a/i18n/bn/desktop-browsers.md
+++ b/i18n/bn/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/bn/email.md b/i18n/bn/email.md
index f9028330..43efeb41 100644
--- a/i18n/bn/email.md
+++ b/i18n/bn/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/bn/encryption.md b/i18n/bn/encryption.md
index ded8533b..4391eba5 100644
--- a/i18n/bn/encryption.md
+++ b/i18n/bn/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/bn/index.md b/i18n/bn/index.md
index 5f3319ec..8ad52c12 100644
--- a/i18n/bn/index.md
+++ b/i18n/bn/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.bn.html
hide:
- navigation
diff --git a/i18n/bn/mobile-browsers.md b/i18n/bn/mobile-browsers.md
index d87ac47f..360b25fa 100644
--- a/i18n/bn/mobile-browsers.md
+++ b/i18n/bn/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/bn/multi-factor-authentication.md b/i18n/bn/multi-factor-authentication.md
index def33276..a4030c74 100644
--- a/i18n/bn/multi-factor-authentication.md
+++ b/i18n/bn/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/bn/passwords.md b/i18n/bn/passwords.md
index a5d5c220..9fcd5620 100644
--- a/i18n/bn/passwords.md
+++ b/i18n/bn/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/bn/real-time-communication.md b/i18n/bn/real-time-communication.md
index 68f9d767..7abd8617 100644
--- a/i18n/bn/real-time-communication.md
+++ b/i18n/bn/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/bn/search-engines.md b/i18n/bn/search-engines.md
index 911525d7..a590a9eb 100644
--- a/i18n/bn/search-engines.md
+++ b/i18n/bn/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/bn/tools.md b/i18n/bn/tools.md
index d9e57d9b..221131d1 100644
--- a/i18n/bn/tools.md
+++ b/i18n/bn/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/bn/tor.md b/i18n/bn/tor.md
index b1f2afbf..02767509 100644
--- a/i18n/bn/tor.md
+++ b/i18n/bn/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - অ্যান্ড্রয়েড
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/bn/vpn.md b/i18n/bn/vpn.md
index 2556c40a..e281b025 100644
--- a/i18n/bn/vpn.md
+++ b/i18n/bn/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/cs/android.md b/i18n/cs/android.md
index 481bad8a..d0b9cfd7 100644
--- a/i18n/cs/android.md
+++ b/i18n/cs/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/cs/basics/account-creation.md b/i18n/cs/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/cs/basics/account-creation.md
+++ b/i18n/cs/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/cs/basics/email-security.md b/i18n/cs/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/cs/basics/email-security.md
+++ b/i18n/cs/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/cs/basics/threat-modeling.md b/i18n/cs/basics/threat-modeling.md
index fc1b3b41..2cf64c5e 100644
--- a/i18n/cs/basics/threat-modeling.md
+++ b/i18n/cs/basics/threat-modeling.md
@@ -1,4 +1,5 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
diff --git a/i18n/cs/basics/vpn-overview.md b/i18n/cs/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/cs/basics/vpn-overview.md
+++ b/i18n/cs/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/cs/cloud.md b/i18n/cs/cloud.md
index df3a7bff..ec8f0a82 100644
--- a/i18n/cs/cloud.md
+++ b/i18n/cs/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/cs/cryptocurrency.md b/i18n/cs/cryptocurrency.md
index ba06ba1e..a994b44f 100644
--- a/i18n/cs/cryptocurrency.md
+++ b/i18n/cs/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/cs/data-redaction.md b/i18n/cs/data-redaction.md
index 961594a8..39b14f11 100644
--- a/i18n/cs/data-redaction.md
+++ b/i18n/cs/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/cs/desktop-browsers.md b/i18n/cs/desktop-browsers.md
index 2d713561..584edc0a 100644
--- a/i18n/cs/desktop-browsers.md
+++ b/i18n/cs/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Prohlížeče pro počítače"
icon: material/laptop
description: Tyto webové prohlížeče nabízejí lepší ochranu soukromí než Google Chrome.
diff --git a/i18n/cs/email.md b/i18n/cs/email.md
index f9028330..43efeb41 100644
--- a/i18n/cs/email.md
+++ b/i18n/cs/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/cs/encryption.md b/i18n/cs/encryption.md
index ded8533b..4391eba5 100644
--- a/i18n/cs/encryption.md
+++ b/i18n/cs/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/cs/index.md b/i18n/cs/index.md
index 284686a3..a4e747ed 100644
--- a/i18n/cs/index.md
+++ b/i18n/cs/index.md
@@ -1,5 +1,6 @@
---
-template: overrides/home.en.html
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
+template: overrides/home.cs.html
hide:
- navigation
- toc
@@ -35,36 +36,36 @@ schema:
---
-## Why should I care?
+## Proč by mě to mělo zajímat?
-##### “I have nothing to hide. Why should I care about my privacy?”
+##### "Nic před nikým neskrývám. Proč by mě mělo soukromí zajímat?"
-Much like the right to interracial marriage, woman's suffrage, freedom of speech, and many others, our right to privacy hasn't always been upheld. In several dictatorships, it still isn't. Generations before ours fought for our right to privacy. ==Privacy is a human right, inherent to all of us,== that we are entitled to (without discrimination).
+Stejně jako právo na mezirasové manželství, volební právo žen, svoboda projevu a mnoho dalších, ani právo na soukromí nebylo vždy respektováno. V několika diktátorských státech tomu stále tak není. Minulé generace bojovaly za naše právo na soukromí. ==Soukromí je lidské právo, které patří každému z nás== a na které máme právo (bez diskriminace).
-You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human.
+Neplťte si soukromí s utajováním nějaké činnosti. Všichni víme, co se děje v kouplně, ale přesto si zavřete dveře. To proto, že chcete soukromí, ne kvůli utajení něčeho, co v koupelně děláte. **Každý** má co chránit. Soukromí je něco, co nás dělá lidmi.
-[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" }
+[:material-target-account: Běžné internetové hrozby](basics/common-threats.md){ class="md-button md-button--primary" }
-## What should I do?
+## Co mám dělat?
-##### First, you need to make a plan
+##### Nejprve si musíte vytvořit plán
-Trying to protect all your data from everyone all the time is impractical, expensive, and exhausting. But don't worry! Security is a process, and, by thinking ahead, you can put together a plan that's right for you. Security isn't just about the tools you use or the software you download. Rather, it begins by understanding the unique threats you face, and how you can mitigate them.
+Snažit se neustále chránit všechna data před všemi je nepraktické, nákladné a vyčerpávající. Ale nebojte se! Security is a process, and, by thinking ahead, you can put together a plan that's right for you. Bezpečnost se netýká jen nástrojů, které používáte, nebo softwaru, který stahujete. Vše začíná tím, že pochopíte, jakým hrozbám čelíte a jak je můžete zmírnit.
-==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
+==Tento proces identifikace hrozeb a vytváření protiopatření se nazývá **threat modeling**== a tvoří základ každého dobrého plánu pro bezpečnost a ochranu soukromí.
-[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
+[:material-book-outline: Další informace o threat modelingu](basics/threat-modeling.md){ class="md-button md-button--primary" }
---
-## We need you! Here's how to get involved:
+## Potřebujeme vás! Zde je návod, jak začít:
-[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
+[:simple-discourse:](https://discuss.privacyguides.net/){ title="Zapojte se na našem fóru" }
+[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Sledujte nás na Mastodonu" }
+[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Připějte na této stránce" }
+[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Pomožte s překladem stránky" }
+[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Napište nám na Matrixu" }
+[:material-information-outline:](about/index.md){ title="Dozvěťte se o nás více" }
+[:material-hand-coin-outline:](about/donate.md){ title="Podpořte projekt" }
-It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
+Pro webové stránky jako je Privacy Guides je důležité, aby byly vždy aktuální. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
diff --git a/i18n/cs/mobile-browsers.md b/i18n/cs/mobile-browsers.md
index c6be3a37..acc0c9c2 100644
--- a/i18n/cs/mobile-browsers.md
+++ b/i18n/cs/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/cs/multi-factor-authentication.md b/i18n/cs/multi-factor-authentication.md
index def33276..a4030c74 100644
--- a/i18n/cs/multi-factor-authentication.md
+++ b/i18n/cs/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/cs/passwords.md b/i18n/cs/passwords.md
index 59579402..485231b1 100644
--- a/i18n/cs/passwords.md
+++ b/i18n/cs/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/cs/real-time-communication.md b/i18n/cs/real-time-communication.md
index 68f9d767..7abd8617 100644
--- a/i18n/cs/real-time-communication.md
+++ b/i18n/cs/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/cs/search-engines.md b/i18n/cs/search-engines.md
index 911525d7..a590a9eb 100644
--- a/i18n/cs/search-engines.md
+++ b/i18n/cs/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/cs/tools.md b/i18n/cs/tools.md
index d9e57d9b..221131d1 100644
--- a/i18n/cs/tools.md
+++ b/i18n/cs/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/cs/tor.md b/i18n/cs/tor.md
index b1f2afbf..8142c1da 100644
--- a/i18n/cs/tor.md
+++ b/i18n/cs/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/cs/vpn.md b/i18n/cs/vpn.md
index 2556c40a..e281b025 100644
--- a/i18n/cs/vpn.md
+++ b/i18n/cs/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/de/android.md b/i18n/de/android.md
index 481bad8a..d0b9cfd7 100644
--- a/i18n/de/android.md
+++ b/i18n/de/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/de/basics/account-creation.md b/i18n/de/basics/account-creation.md
index ee329f9c..be100a69 100644
--- a/i18n/de/basics/account-creation.md
+++ b/i18n/de/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Benutzerkontenerstellung"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/de/basics/common-threats.md b/i18n/de/basics/common-threats.md
index e278c0cb..c9fa0d85 100644
--- a/i18n/de/basics/common-threats.md
+++ b/i18n/de/basics/common-threats.md
@@ -1,19 +1,19 @@
---
-title: "Common Threats"
+title: "Häufige Bedrohungen"
icon: 'material/eye-outline'
-description: Your threat model is personal to you, but these are some of the things many visitors to this site care about.
+description: Deine persönliche Bedrohungsanalyse kannst du nur selber durchführen. Vielen Besuchern dieser Webseite sind aber folgende Dinge wichtig.
---
-Broadly speaking, we categorize our recommendations into the [threats](threat-modeling.md) or goals that apply to most people. ==You may be concerned with none, one, a few, or all of these possibilities==, and the tools and services you use depend on what your goals are. You may have specific threats outside of these categories as well, which is perfectly fine! The important part is developing an understanding of the benefits and shortcomings of the tools you choose to use, because virtually none of them will protect you from every threat.
+Wir ordnen unsere Empfehlungen nach [Bedrohungen](threat-modeling.md) beziehungsweise Zielen, die für die meisten Menschen gelten. ==Dich können keine, eine, einige oder alle dieser Themen betreffen==, und du solltest die von dir eingesetzten Werkzeuge und Dienste von deinen Zielen abhängig machen. Du kannst auch spezifische Bedrohungen außerhalb dieser Kategorien haben, das ist völlig in Ordnung! Wichtig ist, dass du die Vorteile und Schwächen der von dir gewählten Werkzeuge kennst, denn praktisch keines davon schützt dich vor jeder Bedrohung.
-- :material-incognito: Anonymity - Shielding your online activity from your real identity, protecting you from people who are trying to uncover *your* identity specifically.
-- :material-target-account: Targeted Attacks - Being protected from hackers or other malicious actors who are trying to gain access to *your* data or devices specifically.
-- :material-bug-outline: Passive Attacks - Being protected from things like malware, data breaches, and other attacks that are made against many people at once.
-- :material-server-network: Service Providers - Protecting your data from service providers (e.g. with E2EE, which renders your data unreadable to the server).
-- :material-eye-outline: Mass Surveillance - Protection from government agencies, organizations, websites, and services which work together to track your activities.
-- :material-account-cash: Surveillance Capitalism - Protecting yourself from big advertising networks, like Google and Facebook, as well as a myriad of other third-party data collectors.
-- :material-account-search: Public Exposure - Limiting the information about you that is accessible online—to search engines or the general public.
-- :material-close-outline: Censorship - Avoiding censored access to information or being censored yourself when speaking online.
+- :material-incognito: Anonymität - Trennen deiner Online-Aktivitäten von deiner realen Identität, um dich vor Personen zu schützen, die gezielt versuchen *deine* Identität aufzudecken.
+- :material-target-account: Gezielte Angriffe - Schutz vor Hackern oder anderen böswilligen Akteuren, die versuchen, sich Zugang zu *deinen* Daten oder Geräten zu verschaffen.
+- :material-bug-outline: Passive Angriffe - Schutz vor Malware, Datenleaks und anderen Angriffen, die sich gegen viele Menschen gleichzeitig richten.
+- :material-server-network: Diensteanbieter - Schutz deiner Daten vor Dienstleistern (z.B. mit E2EE, welche deine Daten für den Server unlesbar macht).
+- :material-eye-outline: Massenüberwachung - Schutz vor Regierungsbehörden, Organisationen, Webseiten und Diensten, die zusammenarbeiten, um deine Aktivitäten zu verfolgen.
+- :material-account-cash: Überwachungskapitalismus - Schütz dich vor großen Werbenetzwerken wie Google und Facebook sowie vor einer Vielzahl anderer Datensammler.
+- :material-account-search: Öffentliche Bloßstellung - Begrenzung der Informationen über dich online—für Suchmaschinen oder die allgemeine Öffentlichkeit.
+- :material-close-outline: Zensur - Umgehen von beschränktem Zugang zu Informationen oder vermeiden selbst zensiert zu werden.
Some of these threats may be more important to you than others, depending on your specific concerns. For example, a software developer with access to valuable or critical data may be primarily concerned with :material-target-account: Targeted Attacks, but they probably still want to protect their personal data from being swept up in :material-eye-outline: Mass Surveillance programs. Similarly, many people may be primarily concerned with :material-account-search: Public Exposure of their personal data, but they should still be wary of security-focused issues, such as :material-bug-outline: Passive Attacks—like malware affecting their devices.
diff --git a/i18n/de/basics/email-security.md b/i18n/de/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/de/basics/email-security.md
+++ b/i18n/de/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/de/basics/threat-modeling.md b/i18n/de/basics/threat-modeling.md
index fc1b3b41..2cf64c5e 100644
--- a/i18n/de/basics/threat-modeling.md
+++ b/i18n/de/basics/threat-modeling.md
@@ -1,4 +1,5 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
diff --git a/i18n/de/basics/vpn-overview.md b/i18n/de/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/de/basics/vpn-overview.md
+++ b/i18n/de/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/de/cloud.md b/i18n/de/cloud.md
index df3a7bff..ec8f0a82 100644
--- a/i18n/de/cloud.md
+++ b/i18n/de/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/de/cryptocurrency.md b/i18n/de/cryptocurrency.md
index ba06ba1e..a994b44f 100644
--- a/i18n/de/cryptocurrency.md
+++ b/i18n/de/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/de/data-redaction.md b/i18n/de/data-redaction.md
index 961594a8..39b14f11 100644
--- a/i18n/de/data-redaction.md
+++ b/i18n/de/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/de/desktop-browsers.md b/i18n/de/desktop-browsers.md
index dbe6322f..d1e54139 100644
--- a/i18n/de/desktop-browsers.md
+++ b/i18n/de/desktop-browsers.md
@@ -1,12 +1,13 @@
---
+meta_title: "Datenschutzfreundliche Webbrowser für PC und Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
-description: These web browsers provide stronger privacy protections than Google Chrome.
+description: Diese Webbrowser bieten einen stärkeren Schutz der Privatsphäre als Google Chrome.
schema:
-
"@context": http://schema.org
"@type": WebPage
- name: Private Desktop Browser Recommendations
+ name: Empfohlene private Desktop-Browser
url: "./"
relatedLink: "../mobile-browsers/"
-
@@ -14,7 +15,7 @@ schema:
"@type": SoftwareApplication
name: Mullvad Browser
image: /assets/img/browsers/mullvad_browser.svg
- url: https://mullvad.net/en/browser
+ url: https://mullvad.net/de/browser
applicationCategory: Web Browser
operatingSystem:
- Windows
@@ -29,7 +30,7 @@ schema:
name: Firefox
image: /assets/img/browsers/firefox.svg
url: https://firefox.com
- sameAs: https://en.wikipedia.org/wiki/Firefox
+ sameAs: https://de.wikipedia.org/wiki/Firefox
applicationCategory: Web Browser
operatingSystem:
- Windows
@@ -44,7 +45,7 @@ schema:
name: Brave
image: /assets/img/browsers/brave.svg
url: https://brave.com
- sameAs: https://en.wikipedia.org/wiki/Brave_(web_browser)
+ sameAs: https://de.wikipedia.org/wiki/Brave_(Browser)
applicationCategory: Web Browser
operatingSystem:
- Windows
@@ -55,17 +56,17 @@ schema:
url: "./"
---
-These are our currently recommended desktop web browsers and configurations for standard/non-anonymous browsing. We recommend [Mullvad Browser](#mullvad-browser) if you are focused on strong privacy protections and anti-fingerprinting out of the box, [Firefox](#firefox) for casual internet browsers looking for a good alternative to Google Chrome, and [Brave](#brave) if you need Chromium browser compatibility.
+Dies sind die von uns derzeit empfohlenen Desktop-Webbrowser und Konfigurationen für das normale/nicht anonyme Surfen. Wir empfehlen [Mullvad Browser](#mullvad-browser) wenn du Wert auf starken Datenschutz und Anti-Fingerprinting legst, [Firefox](#firefox) für gelegentliche Internetnutzer, die eine gute Alternative zu Google Chrome suchen, und [Brave](#brave) wenn du Chromium-Browser-Kompatibilität benötigst.
-If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. We make some configuration recommendations on this page, but all browsers other than Tor Browser will be traceable by *somebody* in some manner or another.
+Wenn du anonym im Internet surfen möchtest, solltest du stattdessen [Tor](tor.md) verwenden. Wir geben einige Konfigurationsempfehlungen, aber bei allen anderen Browsern als Tor wirst du von *irgendjemandem* auf die eine oder andere Weise zurückverfolgt werden können.
## Mullvad Browser
!!! recommendation
- { align=right }
+ { align=right }
- **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN.
+ **Mullvad Browser** ist eine Version des [Tor Browsers](tor.md#tor-browser), bei der die Tor-Netzwerk-Integration entfernt wurde, um VPN-Nutzern die Anti-Fingerprinting-Technologien vom Tor Browser zur Verfügung zu stellen. Es wird vom Tor-Projekt entwickelt, von [Mullvad](vpn.md#mullvad) vertrieben und erfordert **nicht** die Verwendung von Mullvad's VPN.
[:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary }
[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" }
diff --git a/i18n/de/email.md b/i18n/de/email.md
index b998945a..9f3786b0 100644
--- a/i18n/de/email.md
+++ b/i18n/de/email.md
@@ -1,23 +1,24 @@
---
-title: "Email Services"
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
+title: "E-Mail Dienste"
icon: material/email
-description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
+description: Diese E-Mail-Dienstleister speichern deine E-Mails sicher und viele davon bieten auch interoperable OpenPGP-Verschlüsselung mit anderen Anbietern.
---
-E-Mail ist praktisch eine Notwendigkeit für die Nutzung aller Online-Dienste, wir empfehlen sie jedoch nicht für Gespräche von Mensch zu Mensch. Anstatt E-Mails für die Kontaktaufnahme mit anderen Personen zu verwenden, sollte ein Instant Messenger benutzt werden, der vorwärts gerichtete Geheimhaltung(forward secrecy) unterstützt.
+E-Mail ist praktisch notwendig für die Nutzung aller Online-Dienste, wir empfehlen sie jedoch nicht zur Kommunikation von Mensch zu Mensch. Anstatt E-Mails für die Kontaktaufnahme mit anderen Personen zu verwenden, sollte ein Instant Messenger benutzt werden, der vorwärts gerichtete Geheimhaltung(forward secrecy) unterstützt.
[Empfohlene Instant Messenger](real-time-communication.md ""){.md-button}
Für alles andere empfehlen wir eine Reihe von E-Mail-Anbietern, die auf nachhaltigen Geschäftsmodellen basieren und integrierten Sicherheits- und Datenschutzfunktionen bieten.
-- [OpenPGP-Compatible Email Providers :material-arrow-right-drop-circle:](#openpgp-compatible-services)
-- [Other Encrypted Providers :material-arrow-right-drop-circle:](#more-providers)
+- [OpenPGP-kompatible E-Mail-Anbieter :material-arrow-right-drop-circle:](#openpgp-compatible-services)
+- [Andere verschlüsselte Anbieter :material-arrow-right-drop-circle:](#more-providers)
- [Email Aliasing Services :material-arrow-right-drop-circle:](#email-aliasing-services)
-- [Self-Hosted Options :material-arrow-right-drop-circle:](#self-hosting-email)
+- [Selbstbetreibbare Optionen :material-arrow-right-drop-circle:](#self-hosting-email)
## OpenPGP-kompatible Dienste
-These providers natively support OpenPGP encryption/decryption and the Web Key Directory (WKD) standard, allowing for provider-agnostic E2EE emails. Zum Beispiel können Proton Mail-Benutzende eine E2EE-Nachricht an Mailbox.org-Benutzende senden, oder sie können OpenPGP-verschlüsselte Benachrichtigungen von Internetdiensten erhalten, die dies unterstützen.
+Diese Anbieter unterstützen von Haus aus die OpenPGP-Verschlüsselung/Entschlüsselung und den Web Key Directory (WKD)-Standard, so dass anbieterunabhängige E2E-verschlüsselte E-Mails möglich sind. Zum Beispiel können Proton Mail-Benutzende eine E2EE-Nachricht an Mailbox.org-Benutzende senden oder sie können OpenPGP-verschlüsselte Benachrichtigungen von Internetdiensten erhalten, die dies unterstützen.
@@ -56,7 +57,7 @@ These providers natively support OpenPGP encryption/decryption and the Web Key D
- [:simple-linux: Linux](https://proton.me/mail/bridge#download)
- [:octicons-browser-16: Web](https://mail.proton.me)
-Kostenlose Konten haben einige Einschränkungen, wie z. B. die fehlende Möglichkeit, Text zu durchsuchen, und keinen Zugang zu [Proton Mail Bridge](https://proton.me/mail/bridge), die für die Verwendung eines [empfohlenen Desktop-E-Mail-Programms](email-clients.md) (z. B. Thunderbird) erforderlich ist. Bezahlte Konten umfassen Funktionen wie Proton Mail Bridge, zusätzlichen Speicher und das Verwenden eigener Domains. A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton Mail's apps on 9th November 2021 by [Securitum](https://research.securitum.com).
+Kostenlose Konten haben einige Einschränkungen, wie z. B. die fehlende Möglichkeit, Text zu durchsuchen, und keinen Zugang zu [Proton Mail Bridge](https://proton.me/mail/bridge), die für die Verwendung eines [empfohlenen Desktop-E-Mail-Programms](email-clients.md) (z. B. Thunderbird) erforderlich ist. Bezahlte Konten umfassen Funktionen wie Proton Mail Bridge, zusätzlichen Speicher und das Verwenden eigener Domains. Am 9. November 2021 wurden durch [Securitum](https://research.securitum.com) ein Sicherheitsaudit durchgeführt und die Anwendungen von Proton Mail [zertifiziert](https://proton.me/blog/security-audit-all-proton-apps).
If you have the Proton Unlimited, Business, or Visionary Plan, you also get [SimpleLogin](#simplelogin) Premium for free.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/de/encryption.md b/i18n/de/encryption.md
index ded8533b..4391eba5 100644
--- a/i18n/de/encryption.md
+++ b/i18n/de/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/de/index.md b/i18n/de/index.md
index 215ba223..90dc1c36 100644
--- a/i18n/de/index.md
+++ b/i18n/de/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.de.html
hide:
- navigation
@@ -57,7 +58,7 @@ Der Versuch, alle unsere Daten ständig vor allen zu schützen, ist unpraktisch,
---
-## Wir brauchen dich! Hier ist, wie man sich beteiligt:
+## Wir brauchen dich! So kannst du mitmachen:
[:simple-discourse:](https://discuss.privacyguides.net/){ title="Trete unserem Forum bei" }
[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Folge uns auf Mastodon" }
@@ -67,4 +68,4 @@ Der Versuch, alle unsere Daten ständig vor allen zu schützen, ist unpraktisch,
[:material-information-outline:](about/index.md){ title="Erfahre mehr über uns" }
[:material-hand-coin-outline:](about/donate.md){ title="Unterstütze das Projekt" }
-Es ist wichtig, dass eine Website wie Privacy Guides immer auf dem neuesten Stand bleibt. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. Es ist schwer, mit der Schnelllebigkeit des Internets Schritt zu halten, aber wir versuchen unser Bestes. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
+Es ist wichtig, dass eine Website wie Privacy Guides immer auf dem neuesten Stand bleibt. Wir brauchen unser Publikum um Software-Updates für die auf unserer Website aufgeführten Anwendungen im Auge zu behalten und die neuesten Nachrichten über die von uns empfohlenen Anbieter zu verfolgen. Es ist schwer, mit der Schnelllebigkeit des Internets Schritt zu halten, aber wir versuchen unser Bestes. Solltest du einen Fehler entdecken, der Meinung sein, dass ein Anbieter nicht aufgelistet sein sollte, ein qualifizierter Anbieter fehlt, ein Browser-Plugin nicht mehr die beste Wahl ist oder du ein anderes Problem finden, lass es uns bitte wissen.
diff --git a/i18n/de/mobile-browsers.md b/i18n/de/mobile-browsers.md
index c6be3a37..acc0c9c2 100644
--- a/i18n/de/mobile-browsers.md
+++ b/i18n/de/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/de/multi-factor-authentication.md b/i18n/de/multi-factor-authentication.md
index def33276..a4030c74 100644
--- a/i18n/de/multi-factor-authentication.md
+++ b/i18n/de/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/de/passwords.md b/i18n/de/passwords.md
index 59579402..485231b1 100644
--- a/i18n/de/passwords.md
+++ b/i18n/de/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/de/real-time-communication.md b/i18n/de/real-time-communication.md
index 68f9d767..7abd8617 100644
--- a/i18n/de/real-time-communication.md
+++ b/i18n/de/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/de/search-engines.md b/i18n/de/search-engines.md
index 911525d7..a590a9eb 100644
--- a/i18n/de/search-engines.md
+++ b/i18n/de/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/de/tools.md b/i18n/de/tools.md
index 98d0007c..39e94c8c 100644
--- a/i18n/de/tools.md
+++ b/i18n/de/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/de/tor.md b/i18n/de/tor.md
index 8c2e2c59..518ae6b7 100644
--- a/i18n/de/tor.md
+++ b/i18n/de/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/de/vpn.md b/i18n/de/vpn.md
index fa30c8a4..439e390b 100644
--- a/i18n/de/vpn.md
+++ b/i18n/de/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/el/android.md b/i18n/el/android.md
index 481bad8a..d0b9cfd7 100644
--- a/i18n/el/android.md
+++ b/i18n/el/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/el/basics/account-creation.md b/i18n/el/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/el/basics/account-creation.md
+++ b/i18n/el/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/el/basics/email-security.md b/i18n/el/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/el/basics/email-security.md
+++ b/i18n/el/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/el/basics/threat-modeling.md b/i18n/el/basics/threat-modeling.md
index fc1b3b41..2cf64c5e 100644
--- a/i18n/el/basics/threat-modeling.md
+++ b/i18n/el/basics/threat-modeling.md
@@ -1,4 +1,5 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
diff --git a/i18n/el/basics/vpn-overview.md b/i18n/el/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/el/basics/vpn-overview.md
+++ b/i18n/el/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/el/cloud.md b/i18n/el/cloud.md
index df3a7bff..ec8f0a82 100644
--- a/i18n/el/cloud.md
+++ b/i18n/el/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/el/cryptocurrency.md b/i18n/el/cryptocurrency.md
index ba06ba1e..a994b44f 100644
--- a/i18n/el/cryptocurrency.md
+++ b/i18n/el/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/el/data-redaction.md b/i18n/el/data-redaction.md
index 961594a8..39b14f11 100644
--- a/i18n/el/data-redaction.md
+++ b/i18n/el/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/el/desktop-browsers.md b/i18n/el/desktop-browsers.md
index dbe6322f..ddf97bdb 100644
--- a/i18n/el/desktop-browsers.md
+++ b/i18n/el/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/el/email.md b/i18n/el/email.md
index f9028330..43efeb41 100644
--- a/i18n/el/email.md
+++ b/i18n/el/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/el/encryption.md b/i18n/el/encryption.md
index ded8533b..4391eba5 100644
--- a/i18n/el/encryption.md
+++ b/i18n/el/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/el/index.md b/i18n/el/index.md
index b73009ce..81f83c3c 100644
--- a/i18n/el/index.md
+++ b/i18n/el/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.el.html
hide:
- navigation
diff --git a/i18n/el/mobile-browsers.md b/i18n/el/mobile-browsers.md
index c6be3a37..acc0c9c2 100644
--- a/i18n/el/mobile-browsers.md
+++ b/i18n/el/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/el/multi-factor-authentication.md b/i18n/el/multi-factor-authentication.md
index def33276..a4030c74 100644
--- a/i18n/el/multi-factor-authentication.md
+++ b/i18n/el/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/el/passwords.md b/i18n/el/passwords.md
index 59579402..485231b1 100644
--- a/i18n/el/passwords.md
+++ b/i18n/el/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/el/real-time-communication.md b/i18n/el/real-time-communication.md
index 68f9d767..7abd8617 100644
--- a/i18n/el/real-time-communication.md
+++ b/i18n/el/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/el/search-engines.md b/i18n/el/search-engines.md
index 911525d7..a590a9eb 100644
--- a/i18n/el/search-engines.md
+++ b/i18n/el/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/el/tools.md b/i18n/el/tools.md
index 75b16d05..8b7da7ea 100644
--- a/i18n/el/tools.md
+++ b/i18n/el/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/el/tor.md b/i18n/el/tor.md
index b1f2afbf..8142c1da 100644
--- a/i18n/el/tor.md
+++ b/i18n/el/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/el/vpn.md b/i18n/el/vpn.md
index cc3efc54..fda56e8b 100644
--- a/i18n/el/vpn.md
+++ b/i18n/el/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/eo/android.md b/i18n/eo/android.md
index 481bad8a..d0b9cfd7 100644
--- a/i18n/eo/android.md
+++ b/i18n/eo/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/eo/basics/account-creation.md b/i18n/eo/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/eo/basics/account-creation.md
+++ b/i18n/eo/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/eo/basics/email-security.md b/i18n/eo/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/eo/basics/email-security.md
+++ b/i18n/eo/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/eo/basics/threat-modeling.md b/i18n/eo/basics/threat-modeling.md
index fc1b3b41..2cf64c5e 100644
--- a/i18n/eo/basics/threat-modeling.md
+++ b/i18n/eo/basics/threat-modeling.md
@@ -1,4 +1,5 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
diff --git a/i18n/eo/basics/vpn-overview.md b/i18n/eo/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/eo/basics/vpn-overview.md
+++ b/i18n/eo/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/eo/cloud.md b/i18n/eo/cloud.md
index df3a7bff..ec8f0a82 100644
--- a/i18n/eo/cloud.md
+++ b/i18n/eo/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/eo/cryptocurrency.md b/i18n/eo/cryptocurrency.md
index ba06ba1e..a994b44f 100644
--- a/i18n/eo/cryptocurrency.md
+++ b/i18n/eo/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/eo/data-redaction.md b/i18n/eo/data-redaction.md
index 961594a8..39b14f11 100644
--- a/i18n/eo/data-redaction.md
+++ b/i18n/eo/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/eo/desktop-browsers.md b/i18n/eo/desktop-browsers.md
index dbe6322f..ddf97bdb 100644
--- a/i18n/eo/desktop-browsers.md
+++ b/i18n/eo/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/eo/email.md b/i18n/eo/email.md
index f9028330..43efeb41 100644
--- a/i18n/eo/email.md
+++ b/i18n/eo/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/eo/encryption.md b/i18n/eo/encryption.md
index ded8533b..4391eba5 100644
--- a/i18n/eo/encryption.md
+++ b/i18n/eo/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/eo/index.md b/i18n/eo/index.md
index 3c0701ea..cca18ca9 100644
--- a/i18n/eo/index.md
+++ b/i18n/eo/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.eo.html
hide:
- navigation
diff --git a/i18n/eo/mobile-browsers.md b/i18n/eo/mobile-browsers.md
index c6be3a37..acc0c9c2 100644
--- a/i18n/eo/mobile-browsers.md
+++ b/i18n/eo/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/eo/multi-factor-authentication.md b/i18n/eo/multi-factor-authentication.md
index def33276..a4030c74 100644
--- a/i18n/eo/multi-factor-authentication.md
+++ b/i18n/eo/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/eo/passwords.md b/i18n/eo/passwords.md
index 59579402..485231b1 100644
--- a/i18n/eo/passwords.md
+++ b/i18n/eo/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/eo/real-time-communication.md b/i18n/eo/real-time-communication.md
index 68f9d767..7abd8617 100644
--- a/i18n/eo/real-time-communication.md
+++ b/i18n/eo/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/eo/search-engines.md b/i18n/eo/search-engines.md
index 911525d7..a590a9eb 100644
--- a/i18n/eo/search-engines.md
+++ b/i18n/eo/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/eo/tools.md b/i18n/eo/tools.md
index d9e57d9b..221131d1 100644
--- a/i18n/eo/tools.md
+++ b/i18n/eo/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/eo/tor.md b/i18n/eo/tor.md
index b1f2afbf..8142c1da 100644
--- a/i18n/eo/tor.md
+++ b/i18n/eo/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/eo/vpn.md b/i18n/eo/vpn.md
index 2556c40a..e281b025 100644
--- a/i18n/eo/vpn.md
+++ b/i18n/eo/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/es/android.md b/i18n/es/android.md
index dc930856..c4973af4 100644
--- a/i18n/es/android.md
+++ b/i18n/es/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: Puedes sustituir el sistema operativo de tu teléfono Android por estas alternativas seguras y respetuosas con la privacidad.
@@ -89,8 +90,6 @@ Estos son los sistemas operativos Android, dispositivos y aplicaciones que recom
[Visión general de Android :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Por qué recomendamos GrapheneOS sobre CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## Derivados de AOSP
Recomendamos instalar uno de estos sistemas operativos Android personalizados en tu dispositivo, enumerados por orden de preferencia, en función de la compatibilidad de tu dispositivo con estos sistemas operativos.
@@ -120,6 +119,8 @@ GrapheneOS es compatible con [Sandboxed Google Play](https://grapheneos.org/usag
Los teléfonos Pixel de Google son los únicos dispositivos que actualmente cumplen los [requisitos de seguridad de hardware ](https://grapheneos.org/faq#device-support)de GrapheneOS.
+[Por qué recomendamos GrapheneOS sobre CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -221,10 +222,10 @@ En este sitio recomendamos una amplia variedad de aplicaciones para Android. Las
!!! recommendation
- { align=right }
- { align=right }
+ { align=right }
+ { align=right }
- **Auditor** es una aplicación que aprovecha las funciones de seguridad del hardware para supervisar la integridad de los dispositivos [compatibles](https://attestation.app/about#device-support). Actualmente, sólo funciona con GrapheneOS y con el sistema operativo original del dispositivo.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Página Principal](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Politica de Privacidad" }
diff --git a/i18n/es/basics/account-creation.md b/i18n/es/basics/account-creation.md
index 5b03cf8c..61d7869d 100644
--- a/i18n/es/basics/account-creation.md
+++ b/i18n/es/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Creación de cuenta"
icon: 'material/account-plus'
description: Crear cuentas en línea es prácticamente una necesidad en Internet, sigue estos pasos para asegurarte de mantener tu privacidad.
diff --git a/i18n/es/basics/email-security.md b/i18n/es/basics/email-security.md
index f6fb9396..8997316f 100644
--- a/i18n/es/basics/email-security.md
+++ b/i18n/es/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Seguridad del correo electrónico
icon: material/email
description: El correo electrónico es intrínsecamente inseguro en muchos aspectos, y éstas son algunas de las razones por las que no es nuestra primera opción para las comunicaciones seguras.
@@ -22,7 +23,7 @@ Los proveedores de correo electrónico que permiten utilizar protocolos de acces
### ¿Cómo puedo proteger mis claves privadas?
-Una tarjeta inteligente (como una [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) o una [Nitrokey](https://www.nitrokey.com)) funciona recibiendo un mensaje de correo electrónico cifrado desde un dispositivo (teléfono, tableta, ordenador, etc.) que ejecuta un cliente de correo electrónico/correo web. El mensaje es entonces descifrado por la tarjeta inteligente y el contenido descifrado es enviado de vuelta al dispositivo.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. El mensaje es entonces descifrado por la tarjeta inteligente y el contenido descifrado es enviado de vuelta al dispositivo.
Es ventajoso que el descifrado ocurra en la tarjeta inteligente para evitar la posible exposición de tu clave privada a un dispositivo comprometido.
diff --git a/i18n/es/basics/threat-modeling.md b/i18n/es/basics/threat-modeling.md
index f7faab0f..c7eee6ce 100644
--- a/i18n/es/basics/threat-modeling.md
+++ b/i18n/es/basics/threat-modeling.md
@@ -1,7 +1,8 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "¿Qué son los modelos de amenaza?"
icon: 'material/target-account'
-description: Equilibrar la seguridad, privacidad y usabilidad es una de las primeras y más difíciles tareas a las que te enfrentarás en tu camino de privacidad.
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
Equilibrar la seguridad, privacidad y usabilidad es una de las primeras y más difíciles tareas a las que te enfrentarás en tu camino de privacidad. Todo es un intercambio: Entre más seguro algo es, más restrictivo o inconveniente suele ser, etc. A menudo, gente encuentra que el problema con las herramientas que ven recomendadas es que son demasiado difíciles de comenzar a usar!
diff --git a/i18n/es/basics/vpn-overview.md b/i18n/es/basics/vpn-overview.md
index e11aa615..4ff8e27a 100644
--- a/i18n/es/basics/vpn-overview.md
+++ b/i18n/es/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: Vista general de VPN
icon: material/vpn
description: Las Redes Privadas Virtuales desplazan el riesgo de tu proveedor de Internet a un tercero quien confías. Debes tener en cuenta estas cosas.
diff --git a/i18n/es/cloud.md b/i18n/es/cloud.md
index 4236b2c7..1ef7bafe 100644
--- a/i18n/es/cloud.md
+++ b/i18n/es/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Almacenamiento en la Nube"
icon: material/file-cloud
description: Muchos proveedores de almacenamiento en la nube exigen que confíes plenamente en que no mirarán tus archivos. Estas son alternativas privadas.
diff --git a/i18n/es/cryptocurrency.md b/i18n/es/cryptocurrency.md
index a847bee7..3cf6c325 100644
--- a/i18n/es/cryptocurrency.md
+++ b/i18n/es/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Criptomonedas
icon: material/bank-circle
---
diff --git a/i18n/es/data-redaction.md b/i18n/es/data-redaction.md
index 1777dffa..476bf51a 100644
--- a/i18n/es/data-redaction.md
+++ b/i18n/es/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Redacción de Datos y Metadatos"
icon: material/tag-remove
description: Utiliza estas herramientas para eliminar metadatos como la ubicación GPS y otros datos identificativos de las fotos y archivos que compartas.
diff --git a/i18n/es/desktop-browsers.md b/i18n/es/desktop-browsers.md
index fefcdf40..7c2aefc0 100644
--- a/i18n/es/desktop-browsers.md
+++ b/i18n/es/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Navegadores de Escritorio"
icon: material/laptop
description: Estos navegadores web ofrecen protecciones de privacidad más sólidas que Google Chrome.
diff --git a/i18n/es/email.md b/i18n/es/email.md
index 76f69b24..90a84442 100644
--- a/i18n/es/email.md
+++ b/i18n/es/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Servicios de Correo Electrónico"
icon: material/email
description: Estos proveedores de correo electrónico ofrecen un lugar estupendo para almacenar tus correos de forma segura, y muchos ofrecen encriptación OpenPGP inter operable con otros proveedores.
@@ -123,7 +124,7 @@ Mailbox.org no acepta criptomonedas debido a que su procesador de pagos BitPay s
#### :material-check:{ .pg-green } Seguridad de Cuenta
-Mailbox.org soporta [autenticación de doble factor](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo para su correo web. Puedes utilizar TOTP o una [Yubikey](https://en.wikipedia.org/wiki/YubiKey) a través de [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Estándares web como [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) aún no son soportados.
+Mailbox.org soporta [autenticación de doble factor](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo para su correo web. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Estándares web como [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) aún no son soportados.
#### :material-information-outline:{ .pg-blue } Seguridad de Datos
diff --git a/i18n/es/encryption.md b/i18n/es/encryption.md
index b96b2aad..160713c4 100644
--- a/i18n/es/encryption.md
+++ b/i18n/es/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Software de Cifrado"
icon: material/file-lock
description: El cifrado de los datos es la única forma de controlar quién puede acceder a ellos. Estas herramientas le permiten cifrar sus correos electrónicos y cualquier otro archivo.
diff --git a/i18n/es/index.md b/i18n/es/index.md
index 81ddbcd3..4472b4b9 100644
--- a/i18n/es/index.md
+++ b/i18n/es/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.es.html
hide:
- navigation
diff --git a/i18n/es/mobile-browsers.md b/i18n/es/mobile-browsers.md
index d16a250d..44c10068 100644
--- a/i18n/es/mobile-browsers.md
+++ b/i18n/es/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Navegadores Móviles"
icon: material/cellphone-information
description: Estos navegadores son los que recomendamos actualmente para la navegación estándar/no anónima por Internet en su teléfono.
diff --git a/i18n/es/multi-factor-authentication.md b/i18n/es/multi-factor-authentication.md
index 1670e706..e9cc4c5d 100644
--- a/i18n/es/multi-factor-authentication.md
+++ b/i18n/es/multi-factor-authentication.md
@@ -49,7 +49,7 @@ Para los modelos que admiten HOTP y TOTP, hay 3 ranuras para HOTP y 15 para TOTP
!!! warning "Advertencia"
- Aunque las Nitrokeys no revelan los secretos HOTP/TOTP al dispositivo al que están conectadas, el almacenamiento HOTP y TOTP **no** está cifrado y es vulnerable a ataques físicos. Si desea almacenar con HOTP o TOTP estos secretos, le recomendamos encarecidamente que utilice un Yubikey en su lugar.
+ Aunque las Nitrokeys no revelan los secretos HOTP/TOTP al dispositivo al que están conectadas, el almacenamiento HOTP y TOTP **no** está cifrado y es vulnerable a ataques físicos. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning "Advertencia"
diff --git a/i18n/es/passwords.md b/i18n/es/passwords.md
index bb43891d..ccec48d9 100644
--- a/i18n/es/passwords.md
+++ b/i18n/es/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Administradores de Contraseñas"
icon: material/form-textbox-password
description: Los administradores de contraseñas le permiten almacenar y administrar de forma segura contraseñas y otras credenciales.
diff --git a/i18n/es/real-time-communication.md b/i18n/es/real-time-communication.md
index ab317c07..aaed91ad 100644
--- a/i18n/es/real-time-communication.md
+++ b/i18n/es/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Comunicación en Tiempo Real"
icon: material/chat-processing
description: Otros servicios de mensajería instantánea ponen todas sus conversaciones privadas a disposición de la empresa que los gestiona.
diff --git a/i18n/es/search-engines.md b/i18n/es/search-engines.md
index cf008a2c..18ec604e 100644
--- a/i18n/es/search-engines.md
+++ b/i18n/es/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Motores de Búsqueda"
icon: material/search-web
description: Estos motores de búsqueda respetuosos con la privacidad no construyen un perfil publicitario basado en sus búsquedas.
diff --git a/i18n/es/tools.md b/i18n/es/tools.md
index 9e80d3c0..1ce9b503 100644
--- a/i18n/es/tools.md
+++ b/i18n/es/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Herramientas de Privacidad"
icon: material/tools
hide:
diff --git a/i18n/es/tor.md b/i18n/es/tor.md
index f289def9..61159391 100644
--- a/i18n/es/tor.md
+++ b/i18n/es/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Red Tor"
icon: simple/torproject
description: Protege tu navegación por Internet de miradas intrusas utilizando la red Tor, una red segura que elude la censura.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/es/vpn.md b/i18n/es/vpn.md
index dd783f20..b1dab8cf 100644
--- a/i18n/es/vpn.md
+++ b/i18n/es/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "Servicios de VPN"
icon: material/vpn
description: Estos son los mejores servicios VPN para proteger tu privacidad y seguridad en línea. Encuentra un proveedor aquí que no esté para espiarte.
diff --git a/i18n/fa/android.md b/i18n/fa/android.md
index 481bad8a..d0b9cfd7 100644
--- a/i18n/fa/android.md
+++ b/i18n/fa/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/fa/basics/account-creation.md b/i18n/fa/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/fa/basics/account-creation.md
+++ b/i18n/fa/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/fa/basics/email-security.md b/i18n/fa/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/fa/basics/email-security.md
+++ b/i18n/fa/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/fa/basics/threat-modeling.md b/i18n/fa/basics/threat-modeling.md
index fc1b3b41..2cf64c5e 100644
--- a/i18n/fa/basics/threat-modeling.md
+++ b/i18n/fa/basics/threat-modeling.md
@@ -1,4 +1,5 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
diff --git a/i18n/fa/basics/vpn-overview.md b/i18n/fa/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/fa/basics/vpn-overview.md
+++ b/i18n/fa/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/fa/cloud.md b/i18n/fa/cloud.md
index d4a426ba..a7309b33 100644
--- a/i18n/fa/cloud.md
+++ b/i18n/fa/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/fa/cryptocurrency.md b/i18n/fa/cryptocurrency.md
index ba06ba1e..a994b44f 100644
--- a/i18n/fa/cryptocurrency.md
+++ b/i18n/fa/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/fa/data-redaction.md b/i18n/fa/data-redaction.md
index 961594a8..39b14f11 100644
--- a/i18n/fa/data-redaction.md
+++ b/i18n/fa/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/fa/desktop-browsers.md b/i18n/fa/desktop-browsers.md
index e0d6171c..c6b94ef8 100644
--- a/i18n/fa/desktop-browsers.md
+++ b/i18n/fa/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/fa/email.md b/i18n/fa/email.md
index f9028330..43efeb41 100644
--- a/i18n/fa/email.md
+++ b/i18n/fa/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/fa/encryption.md b/i18n/fa/encryption.md
index ded8533b..4391eba5 100644
--- a/i18n/fa/encryption.md
+++ b/i18n/fa/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/fa/index.md b/i18n/fa/index.md
index 8e9c63d9..46b341f7 100644
--- a/i18n/fa/index.md
+++ b/i18n/fa/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.fa.html
hide:
- navigation
diff --git a/i18n/fa/mobile-browsers.md b/i18n/fa/mobile-browsers.md
index 76bb9f46..c2ab1061 100644
--- a/i18n/fa/mobile-browsers.md
+++ b/i18n/fa/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/fa/multi-factor-authentication.md b/i18n/fa/multi-factor-authentication.md
index def33276..a4030c74 100644
--- a/i18n/fa/multi-factor-authentication.md
+++ b/i18n/fa/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/fa/passwords.md b/i18n/fa/passwords.md
index 59579402..485231b1 100644
--- a/i18n/fa/passwords.md
+++ b/i18n/fa/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/fa/real-time-communication.md b/i18n/fa/real-time-communication.md
index 68f9d767..7abd8617 100644
--- a/i18n/fa/real-time-communication.md
+++ b/i18n/fa/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/fa/search-engines.md b/i18n/fa/search-engines.md
index 911525d7..a590a9eb 100644
--- a/i18n/fa/search-engines.md
+++ b/i18n/fa/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/fa/tools.md b/i18n/fa/tools.md
index d9e57d9b..221131d1 100644
--- a/i18n/fa/tools.md
+++ b/i18n/fa/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/fa/tor.md b/i18n/fa/tor.md
index b1f2afbf..8142c1da 100644
--- a/i18n/fa/tor.md
+++ b/i18n/fa/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/fa/vpn.md b/i18n/fa/vpn.md
index 2556c40a..e281b025 100644
--- a/i18n/fa/vpn.md
+++ b/i18n/fa/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/fr/android.md b/i18n/fr/android.md
index ed7ed712..efa7921a 100644
--- a/i18n/fr/android.md
+++ b/i18n/fr/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: Vous pouvez remplacer le système d'exploitation de votre téléphone Android par ces alternatives sécurisées et respectueuses de la vie privée.
@@ -89,8 +90,6 @@ Voici les systèmes d'exploitation, les appareils et les applications Android qu
[Présentation générale d'Android :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Pourquoi nous recommandons GrapheneOS plutôt que CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## Dérivés de AOSP
Nous vous recommandons d'installer l'un de ces systèmes d'exploitation Android personnalisés sur votre appareil, classés par ordre de préférence, en fonction de la compatibilité de votre appareil avec ces systèmes d'exploitation.
@@ -120,6 +119,8 @@ GrapheneOS prend en charge [Sandboxed Google Play](https://grapheneos.org/usage#
Les téléphones Google Pixel sont les seuls appareils qui répondent actuellement aux [exigences de sécurité matérielle](https://grapheneos.org/faq#device-support) de GrapheneOS.
+[Pourquoi nous recommandons GrapheneOS plutôt que CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -221,10 +222,10 @@ Nous recommandons une grande variété d'applications Android sur ce site. Les a
!!! recommendation
- { align=right }
- { align=right }
+ { align=right }
+ { align=right }
- **Auditor** est une application qui exploite les fonctions de sécurité matérielle pour assurer le contrôle de l'intégrité des [appareils pris en charge](https://attestation.app/about#device-support). Pour le moment elle ne fonctionne qu'avec GrapheneOS et le système d'exploitation d'origine de l'appareil.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Page d'accueil](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Politique de confidentialité" }
diff --git a/i18n/fr/basics/account-creation.md b/i18n/fr/basics/account-creation.md
index 02c356d0..1e90d8ec 100644
--- a/i18n/fr/basics/account-creation.md
+++ b/i18n/fr/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Création de compte"
icon: 'material/account-plus'
description: La création de comptes en ligne est pratiquement une nécessité sur internet, prenez ces mesures pour vous assurer de rester privé.
diff --git a/i18n/fr/basics/email-security.md b/i18n/fr/basics/email-security.md
index bb5394e7..b6081683 100644
--- a/i18n/fr/basics/email-security.md
+++ b/i18n/fr/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Sécurité des emails
icon: material/email
description: L'email est intrinsèquement peu sûr à bien des égards, et voici quelques-unes des raisons pour lesquelles il n'est pas notre premier choix en matière de communications sécurisées.
@@ -22,7 +23,7 @@ Les fournisseurs d'emails qui vous permettent d'utiliser les protocoles d'accès
### Comment Puis-Je Protéger Mes Clés Privées?
-Une carte à puce (telle qu'une [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) ou [Nitrokey](https://www.nitrokey.com)) fonctionne en recevant un email chiffré d'un appareil (téléphone, tablette, ordinateur, etc.) exécutant un client mail/webmail. Le message est ensuite déchiffré par la carte à puce et le contenu déchiffré est renvoyé à l'appareil.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Le message est ensuite déchiffré par la carte à puce et le contenu déchiffré est renvoyé à l'appareil.
Il est avantageux que le déchiffrement se fasse sur la carte à puce afin d'éviter d'exposer votre clé privée à un dispositif compromis.
diff --git a/i18n/fr/basics/threat-modeling.md b/i18n/fr/basics/threat-modeling.md
index 5c0e64d5..725b4218 100644
--- a/i18n/fr/basics/threat-modeling.md
+++ b/i18n/fr/basics/threat-modeling.md
@@ -1,10 +1,11 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Modélisation des menaces"
icon: 'material/target-account'
-description: Trouver le bon équilibre entre la sécurité, la confidentialité et la commodité est l'une des premières et plus difficiles tâches que vous aurez à accomplir dans votre parcours pour regagner votre vie privée en ligne.
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
-Trouver le bon équilibre entre la sécurité, la confidentialité et la commodité est l'une des premières et plus difficiles tâches que vous aurez à accomplir dans votre parcours pour regagner votre vie privée en ligne. Tout est une histoire de compromis : plus quelque chose est sécurisé, plus il est limité ou peu pratique, etc. Souvent, les gens trouvent que le problème avec les outils qui leurs sont recommandés est qu'ils sont trop difficiles à utiliser !
+Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Tout est une histoire de compromis : plus quelque chose est sécurisé, plus il est limité ou peu pratique, etc. Souvent, les gens trouvent que le problème avec les outils qui leurs sont recommandés est qu'ils sont trop difficiles à utiliser !
Si vous vouliez utiliser les outils les **plus** sécurisés actuellement disponibles, vous devriez sacrifier *beaucoup* de commodité. Et même dans ce cas, ==rien n'est jamais totalement sécurisé.== On parle de sécurité **élevée**, mais jamais de sécurité **totale**. C'est pourquoi les modèles de menace sont importants.
diff --git a/i18n/fr/basics/vpn-overview.md b/i18n/fr/basics/vpn-overview.md
index 32b63f81..18cf8e07 100644
--- a/i18n/fr/basics/vpn-overview.md
+++ b/i18n/fr/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: Introduction aux VPNs
icon: material/vpn
description: Les réseaux privés virtuels déplacent le risque de votre FAI à un tiers en qui vous avez confiance. Vous devriez garder ces éléments à l'esprit.
diff --git a/i18n/fr/cloud.md b/i18n/fr/cloud.md
index ec3be906..9afbbf71 100644
--- a/i18n/fr/cloud.md
+++ b/i18n/fr/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Stockage cloud"
icon: material/file-cloud
description: De nombreux fournisseurs de stockage cloud nécessitent que vous leur fassiez confiance pour ne pas consulter vos fichiers. Voici des alternatives privées !
diff --git a/i18n/fr/cryptocurrency.md b/i18n/fr/cryptocurrency.md
index d8922b54..718eb7a8 100644
--- a/i18n/fr/cryptocurrency.md
+++ b/i18n/fr/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Crypto-monnaie
icon: material/bank-circle
---
diff --git a/i18n/fr/data-redaction.md b/i18n/fr/data-redaction.md
index 75365924..6b27a444 100644
--- a/i18n/fr/data-redaction.md
+++ b/i18n/fr/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Rédaction de données et de métadonnées"
icon: material/tag-remove
description: Utilisez ces outils pour supprimer les métadonnées telles que la position GPS et d'autres informations d'identification des photos et des fichiers que vous partagez.
diff --git a/i18n/fr/desktop-browsers.md b/i18n/fr/desktop-browsers.md
index e3006caf..f122a304 100644
--- a/i18n/fr/desktop-browsers.md
+++ b/i18n/fr/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Navigateurs de bureau"
icon: material/laptop
description: Ces navigateurs web offrent des protections de la vie privée plus solides que Google Chrome.
diff --git a/i18n/fr/email.md b/i18n/fr/email.md
index 62227dba..dd88472b 100644
--- a/i18n/fr/email.md
+++ b/i18n/fr/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Services d'email"
icon: material/email
description: Ces fournisseurs d'email constituent un excellent moyen de stocker vos emails en toute sécurité, et nombre d'entre eux proposent un système de chiffrement OpenPGP interopérable avec d'autres fournisseurs.
@@ -123,7 +124,7 @@ Mailbox.org n'accepte aucune crypto-monnaie en raison de la suspension des activ
#### :material-check:{ .pg-green } Sécurité du compte
-Mailbox.org prend en charge l'[authentification à deux facteurs](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) pour son webmail uniquement. Vous pouvez utiliser soit TOTP, soit une [Yubikey](https://fr.wikipedia.org/wiki/YubiKey) via le [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Les normes web telles que [WebAuthn](https://fr.wikipedia.org/wiki/WebAuthn) ne sont pas encore prises en charge.
+Mailbox.org prend en charge l'[authentification à deux facteurs](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) pour son webmail uniquement. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Les normes web telles que [WebAuthn](https://fr.wikipedia.org/wiki/WebAuthn) ne sont pas encore prises en charge.
#### :material-information-outline:{ .pg-blue } Sécurité des données
diff --git a/i18n/fr/encryption.md b/i18n/fr/encryption.md
index 27913481..5d4ea3b1 100644
--- a/i18n/fr/encryption.md
+++ b/i18n/fr/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Logiciels de chiffrement"
icon: material/file-lock
description: Le chiffrement des données est le seul moyen de contrôler qui peut y accéder. Ces outils vous permettent de chiffrer vos emails et tout autre fichier.
diff --git a/i18n/fr/index.md b/i18n/fr/index.md
index 3520657e..1b35660b 100644
--- a/i18n/fr/index.md
+++ b/i18n/fr/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.fr.html
hide:
- navigation
diff --git a/i18n/fr/mobile-browsers.md b/i18n/fr/mobile-browsers.md
index 02f08c51..d6bd59b3 100644
--- a/i18n/fr/mobile-browsers.md
+++ b/i18n/fr/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Navigateurs mobiles"
icon: material/cellphone-information
description: Ces navigateurs sont ceux que nous recommandons actuellement pour la navigation internet standard/non anonyme sur votre téléphone.
diff --git a/i18n/fr/multi-factor-authentication.md b/i18n/fr/multi-factor-authentication.md
index 6de452b8..37dffc03 100644
--- a/i18n/fr/multi-factor-authentication.md
+++ b/i18n/fr/multi-factor-authentication.md
@@ -49,7 +49,7 @@ Pour les modèles qui supportent HOTP et TOTP, il y a 3 emplacements pour HOTP e
!!! warning "Avertissement"
- Bien que les Nitrokeys ne divulguent pas les secrets HOTP/TOTP à l'appareil auquel ils sont connectés, le stockage HOTP et TOTP n'est **pas** chiffré et est vulnérable aux attaques physiques. Si vous cherchez à stocker ces secrets HOTP ou TOTP, nous vous recommandons vivement d'utiliser plutôt un Yubikey.
+ Bien que les Nitrokeys ne divulguent pas les secrets HOTP/TOTP à l'appareil auquel ils sont connectés, le stockage HOTP et TOTP n'est **pas** chiffré et est vulnérable aux attaques physiques. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning "Avertissement"
diff --git a/i18n/fr/passwords.md b/i18n/fr/passwords.md
index 4eb73df3..e35a9b33 100644
--- a/i18n/fr/passwords.md
+++ b/i18n/fr/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Gestionnaires de mots de passe"
icon: material/form-textbox-password
description: Les gestionnaires de mots de passe vous permettent de stocker et de gérer en toute sécurité des mots de passe et autres informations d'identification.
diff --git a/i18n/fr/real-time-communication.md b/i18n/fr/real-time-communication.md
index 6ab9be2c..cc87afdb 100644
--- a/i18n/fr/real-time-communication.md
+++ b/i18n/fr/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Communication en temps réel"
icon: material/chat-processing
description: Les autres messageries instantanées mettent toutes vos conversations privées à la disposition de la société qui les gère.
diff --git a/i18n/fr/search-engines.md b/i18n/fr/search-engines.md
index 2139625b..7275177d 100644
--- a/i18n/fr/search-engines.md
+++ b/i18n/fr/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Moteurs de recherche"
icon: material/search-web
description: Ces moteurs de recherche respectueux de la vie privée n'établissent pas de profil publicitaire sur la base de vos recherches.
diff --git a/i18n/fr/tools.md b/i18n/fr/tools.md
index c51cb154..0f24cbc8 100644
--- a/i18n/fr/tools.md
+++ b/i18n/fr/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Outils de protection de la vie privée"
icon: material/tools
hide:
diff --git a/i18n/fr/tor.md b/i18n/fr/tor.md
index 0a7fcb6a..a8b84340 100644
--- a/i18n/fr/tor.md
+++ b/i18n/fr/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Réseau Tor"
icon: simple/torproject
description: Protégez votre navigation sur internet des regards indiscrets en utilisant le réseau Tor, un réseau sécurisé qui contourne la censure.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Navigateur Tor
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/fr/vpn.md b/i18n/fr/vpn.md
index 568ddbb2..c6299da5 100644
--- a/i18n/fr/vpn.md
+++ b/i18n/fr/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "Services VPN"
icon: material/vpn
description: Voici les meilleurs services VPN pour protéger votre vie privée et votre sécurité en ligne. Trouvez ici un fournisseur qui ne cherche pas à vous espionner.
diff --git a/i18n/he/android.md b/i18n/he/android.md
index 579afaea..3d50ccd1 100644
--- a/i18n/he/android.md
+++ b/i18n/he/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "אנדרואיד"
icon: 'simple/android'
description: אתה יכול להחליף את מערכת ההפעלה בטלפון האנדרואיד שלך בחלופות מאובטחות ומכבדות פרטיות אלה.
@@ -89,8 +90,6 @@ schema:
[סקירה כללית של אנדרואיד :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[מדוע אנו ממליצים על GrapheneOS על פני CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## נגזרות AOSP
אנו ממליצים להתקין במכשיר שלך אחת ממערכות ההפעלה המותאמות אישית של אנדרואיד, המפורטות לפי סדר העדפה, בהתאם לתאימות המכשיר שלך למערכות הפעלה אלו.
@@ -120,6 +119,8 @@ GrapheneOS תומך ב-[Sandboxed Google Play](https://grapheneos.org/usage#sand
טלפונים של Google Pixel הם המכשירים היחידים שעומדים כרגע ב[דרישות אבטחת החומרה](https://grapheneos.org/faq#device-support) של GrapheneOS.
+[מדוע אנו ממליצים על GrapheneOS על פני CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -221,10 +222,10 @@ DivestOS משתמשת ב-F-Droid כחנות האפליקציות המוגדרת
!!! recommendation
- { align=right }
- { align=right }
+ { align=right }
+ { align=right }
- **Auditor** היא אפליקציה הממנפת תכונות אבטחת חומרה כדי לספק ניטור שלמות המכשיר עבור [מכשירים נתמכים](https://attestation.app/about#device-support). נכון לעכשיו, זה עובד רק עם GrapheneOS ומערכת ההפעלה הסטוק של המכשיר.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: דף הבית](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="מדיניות פרטיות" }
diff --git a/i18n/he/basics/account-creation.md b/i18n/he/basics/account-creation.md
index ad59cfe2..81fee24e 100644
--- a/i18n/he/basics/account-creation.md
+++ b/i18n/he/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "יצירת חשבון"
icon: 'material/account-plus'
description: יצירת חשבונות מקוונים היא למעשה צורך באינטרנט, בצע את הצעדים האלה כדי לוודא שאתה נשאר פרטי.
diff --git a/i18n/he/basics/email-security.md b/i18n/he/basics/email-security.md
index f6c9aef9..710e3522 100644
--- a/i18n/he/basics/email-security.md
+++ b/i18n/he/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: אבטחת אימייל
icon: material/email
description: אימייל הוא מטבעו לא מאובטח במובנים רבים, ואלה חלק מהסיבות שהוא לא הבחירה המובילה שלנו לתקשורת מאובטחת.
@@ -22,7 +23,7 @@ description: אימייל הוא מטבעו לא מאובטח במובנים ר
### כיצד אוכל להגן על המפתחות הפרטיים שלי?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. לאחר מכן, ההודעה מפוענחת על ידי הכרטיס החכם והתוכן המפוענח נשלח חזרה למכשיר.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. לאחר מכן, ההודעה מפוענחת על ידי הכרטיס החכם והתוכן המפוענח נשלח חזרה למכשיר.
כדאי שהפענוח יתרחש בכרטיס החכם כדי להימנע מחשיפת המפתח הפרטי שלך למכשיר פגום.
diff --git a/i18n/he/basics/threat-modeling.md b/i18n/he/basics/threat-modeling.md
index bf0d2e0b..df37b71e 100644
--- a/i18n/he/basics/threat-modeling.md
+++ b/i18n/he/basics/threat-modeling.md
@@ -1,10 +1,11 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "מודל איומים"
icon: 'material/target-account'
-description: איזון בין אבטחה, פרטיות ושימושיות היא אחת המשימות הראשונות והקשות שתתמודדו איתם במסע הפרטיות שלכם.
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
-איזון בין אבטחה, פרטיות ושימושיות היא אחת המשימות הראשונות והקשות שתתמודדו איתם במסע הפרטיות שלכם. הכל הוא פשרה: ככל שמשהו בטוח יותר, כך הוא בדרך כלל מגביל או לא נוח יותר, וכו'. לעתים קרובות, אנשים מגלים שהבעיה בכלים שהם רואים מומלצים היא שפשוט קשה מדי להתחיל להשתמש בהם!
+Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. הכל הוא פשרה: ככל שמשהו בטוח יותר, כך הוא בדרך כלל מגביל או לא נוח יותר, וכו'. לעתים קרובות, אנשים מגלים שהבעיה בכלים שהם רואים מומלצים היא שפשוט קשה מדי להתחיל להשתמש בהם!
אם תרצה להשתמש ב**רוב** הכלים המאובטחים הזמינים, תצטרך להקריב *הרבה* שימושיות. וגם אז, ==אין דבר שמאובטח תמיד לחלוטין.== יש אבטחה **גבוהה**, אך לעולם לא אבטחה **מלאה**. לכן מודלים של איומים חשובים.
diff --git a/i18n/he/basics/vpn-overview.md b/i18n/he/basics/vpn-overview.md
index 3fd62acb..8e9b7855 100644
--- a/i18n/he/basics/vpn-overview.md
+++ b/i18n/he/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: סקירה כללית של VPN
icon: material/vpn
description: רשתות וירטואליות פרטיות מעבירות את הסיכון מספק שירותי האינטרנט שלך לצד שלישי שאתה סומך עליו. כדאי לזכור את הדברים האלה.
diff --git a/i18n/he/cloud.md b/i18n/he/cloud.md
index 7e602bbf..b5fff462 100644
--- a/i18n/he/cloud.md
+++ b/i18n/he/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "אחסון בענן"
icon: material/file-cloud
description: ספקי אחסון בענן רבים דורשים את האמון שלך שהם לא יסתכלו על הקבצים שלך. אלו חלופות פרטיות!
diff --git a/i18n/he/cryptocurrency.md b/i18n/he/cryptocurrency.md
index ac9c6abf..730cd92b 100644
--- a/i18n/he/cryptocurrency.md
+++ b/i18n/he/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: מטבעות קריפטוגרפיים
icon: material/bank-circle
---
diff --git a/i18n/he/data-redaction.md b/i18n/he/data-redaction.md
index ee04e62b..880e5d23 100644
--- a/i18n/he/data-redaction.md
+++ b/i18n/he/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "הפחתת נתונים ומטא נתונים"
icon: material/tag-remove
description: השתמש בכלים אלה כדי להסיר מטא נתונים כמו מיקום GPS ומידע מזהה אחר מתמונות וקבצים שאתה משתף.
diff --git a/i18n/he/desktop-browsers.md b/i18n/he/desktop-browsers.md
index 509c912b..09f10d7f 100644
--- a/i18n/he/desktop-browsers.md
+++ b/i18n/he/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "דפדפנים שולחניים"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/he/email.md b/i18n/he/email.md
index d86dc9c2..1bdbb563 100644
--- a/i18n/he/email.md
+++ b/i18n/he/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "שירותי אימייל"
icon: material/email
description: ספקי אימייל אלה מציעים מקום מצוין לאחסן את המיילים שלך בצורה מאובטחת, ורבים מציעים הצפנת OpenPGP הניתנת להפעלה הדדית עם ספקים אחרים.
@@ -123,7 +124,7 @@ Mailbox.org אינו מקבל מטבעות קריפטוגרפיים כלשהם
#### :material-check:{ .pg-green } אבטחת חשבון
-Mailbox.org תומך ב[אימות דו-שלבי](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) עבור דואר האינטרנט שלהם בלבד. אתה יכול להשתמש ב-TOTP או ב-[Yubikey](https://en.wikipedia.org/wiki/YubiKey) דרך [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). תקני אינטרנט כגון [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) אינם נתמכים עדיין.
+Mailbox.org תומך ב[אימות דו-שלבי](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) עבור דואר האינטרנט שלהם בלבד. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). תקני אינטרנט כגון [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) אינם נתמכים עדיין.
#### :material-information-outline:{ .pg-blue } אבטחת מידע
diff --git a/i18n/he/encryption.md b/i18n/he/encryption.md
index 7ddf812d..0948e0a4 100644
--- a/i18n/he/encryption.md
+++ b/i18n/he/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "תוכנת הצפנה"
icon: material/file-lock
description: הצפנה של נתונים היא הדרך היחידה לשלוט מי יכול לגשת אליו. כלים אלה מאפשרים לך להצפין את המיילים שלך וכל קובץ אחר.
diff --git a/i18n/he/index.md b/i18n/he/index.md
index 6ec219c7..c8e07bb2 100644
--- a/i18n/he/index.md
+++ b/i18n/he/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.he.html
hide:
- navigation
diff --git a/i18n/he/mobile-browsers.md b/i18n/he/mobile-browsers.md
index 0b902a7f..aff5cf38 100644
--- a/i18n/he/mobile-browsers.md
+++ b/i18n/he/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "דפדפני אינטרנט לנייד"
icon: material/cellphone-information
description: דפדפנים אלו הם מה שאנו ממליצים כיום עבור גלישה רגילה/לא אנונימית באינטרנט בטלפון שלך.
diff --git a/i18n/he/multi-factor-authentication.md b/i18n/he/multi-factor-authentication.md
index 80a8760a..0806b0b4 100644
--- a/i18n/he/multi-factor-authentication.md
+++ b/i18n/he/multi-factor-authentication.md
@@ -49,7 +49,7 @@ description: כלים אלה מסייעים לך באבטחת חשבונות ה
!!! warning "אזהרה"
- בעוד ש-Nitrokeys אינם משחררים את סודות ה-HOTP/TOTP למכשיר שאליו הם מחוברים, אחסון ה-HOTP וה-TOTP **לא** מוצפן ופגיע להתקפות פיזיות. אם אתם מחפשים לאחסן HOTP או TOTP סודות אלה, אנו ממליצים בחום להשתמש ב- Yubikey במקום זאת.
+ בעוד ש-Nitrokeys אינם משחררים את סודות ה-HOTP/TOTP למכשיר שאליו הם מחוברים, אחסון ה-HOTP וה-TOTP **לא** מוצפן ופגיע להתקפות פיזיות. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning "אזהרה"
diff --git a/i18n/he/passwords.md b/i18n/he/passwords.md
index 84b913da..e61485f8 100644
--- a/i18n/he/passwords.md
+++ b/i18n/he/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "מנהלי סיסמאות"
icon: material/form-textbox-password
description: מנהלי סיסמאות מאפשרים לך לאחסן ולנהל בצורה מאובטחת סיסמאות ואישורים אחרים.
diff --git a/i18n/he/real-time-communication.md b/i18n/he/real-time-communication.md
index baabd648..103f2f50 100644
--- a/i18n/he/real-time-communication.md
+++ b/i18n/he/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "תקשורת בזמן אמת"
icon: material/chat-processing
description: מסנג'רים אחרים הופכים את כל השיחות הפרטיות שלך לזמינות לחברה שמנהלת אותן.
diff --git a/i18n/he/search-engines.md b/i18n/he/search-engines.md
index 1c8bdcfd..66dc61cc 100644
--- a/i18n/he/search-engines.md
+++ b/i18n/he/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "מנועי חיפוש"
icon: material/search-web
description: מנועי החיפוש המכבדים את הפרטיות אינם בונים פרופיל פרסום על סמך החיפושים שלך.
diff --git a/i18n/he/tools.md b/i18n/he/tools.md
index c52ae80c..5a886004 100644
--- a/i18n/he/tools.md
+++ b/i18n/he/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "כלי פרטיות"
icon: material/tools
hide:
diff --git a/i18n/he/tor.md b/i18n/he/tor.md
index 81971c91..111fc6ee 100644
--- a/i18n/he/tor.md
+++ b/i18n/he/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "רשת טור (Tor Network)"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: דפדפן Tor
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - לינוקס
+ - אנדרואיד
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/he/vpn.md b/i18n/he/vpn.md
index 53d39a97..b8a0d269 100644
--- a/i18n/he/vpn.md
+++ b/i18n/he/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "שירותי VPN"
icon: material/vpn
description: אלו הם שירותי ה-VPN הטובים ביותר להגנה על הפרטיות והאבטחה שלך באינטרנט. מצא כאן ספק שאינו מעוניין לרגל אחריך.
diff --git a/i18n/hi/android.md b/i18n/hi/android.md
index 481bad8a..d0b9cfd7 100644
--- a/i18n/hi/android.md
+++ b/i18n/hi/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/hi/basics/account-creation.md b/i18n/hi/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/hi/basics/account-creation.md
+++ b/i18n/hi/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/hi/basics/email-security.md b/i18n/hi/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/hi/basics/email-security.md
+++ b/i18n/hi/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/hi/basics/threat-modeling.md b/i18n/hi/basics/threat-modeling.md
index fc1b3b41..2cf64c5e 100644
--- a/i18n/hi/basics/threat-modeling.md
+++ b/i18n/hi/basics/threat-modeling.md
@@ -1,4 +1,5 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
diff --git a/i18n/hi/basics/vpn-overview.md b/i18n/hi/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/hi/basics/vpn-overview.md
+++ b/i18n/hi/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/hi/cloud.md b/i18n/hi/cloud.md
index df3a7bff..ec8f0a82 100644
--- a/i18n/hi/cloud.md
+++ b/i18n/hi/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/hi/cryptocurrency.md b/i18n/hi/cryptocurrency.md
index ba06ba1e..a994b44f 100644
--- a/i18n/hi/cryptocurrency.md
+++ b/i18n/hi/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/hi/data-redaction.md b/i18n/hi/data-redaction.md
index 961594a8..39b14f11 100644
--- a/i18n/hi/data-redaction.md
+++ b/i18n/hi/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/hi/desktop-browsers.md b/i18n/hi/desktop-browsers.md
index dbe6322f..ddf97bdb 100644
--- a/i18n/hi/desktop-browsers.md
+++ b/i18n/hi/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/hi/email.md b/i18n/hi/email.md
index f9028330..43efeb41 100644
--- a/i18n/hi/email.md
+++ b/i18n/hi/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/hi/encryption.md b/i18n/hi/encryption.md
index ded8533b..4391eba5 100644
--- a/i18n/hi/encryption.md
+++ b/i18n/hi/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/hi/index.md b/i18n/hi/index.md
index 0ef297d3..531bf330 100644
--- a/i18n/hi/index.md
+++ b/i18n/hi/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.hi.html
hide:
- navigation
diff --git a/i18n/hi/mobile-browsers.md b/i18n/hi/mobile-browsers.md
index c6be3a37..acc0c9c2 100644
--- a/i18n/hi/mobile-browsers.md
+++ b/i18n/hi/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/hi/multi-factor-authentication.md b/i18n/hi/multi-factor-authentication.md
index def33276..a4030c74 100644
--- a/i18n/hi/multi-factor-authentication.md
+++ b/i18n/hi/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/hi/passwords.md b/i18n/hi/passwords.md
index 59579402..485231b1 100644
--- a/i18n/hi/passwords.md
+++ b/i18n/hi/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/hi/real-time-communication.md b/i18n/hi/real-time-communication.md
index 68f9d767..7abd8617 100644
--- a/i18n/hi/real-time-communication.md
+++ b/i18n/hi/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/hi/search-engines.md b/i18n/hi/search-engines.md
index 911525d7..a590a9eb 100644
--- a/i18n/hi/search-engines.md
+++ b/i18n/hi/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/hi/tools.md b/i18n/hi/tools.md
index d9e57d9b..221131d1 100644
--- a/i18n/hi/tools.md
+++ b/i18n/hi/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/hi/tor.md b/i18n/hi/tor.md
index b1f2afbf..8142c1da 100644
--- a/i18n/hi/tor.md
+++ b/i18n/hi/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/hi/vpn.md b/i18n/hi/vpn.md
index 2556c40a..e281b025 100644
--- a/i18n/hi/vpn.md
+++ b/i18n/hi/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/hu/android.md b/i18n/hu/android.md
index bc4f2c88..595684ff 100644
--- a/i18n/hu/android.md
+++ b/i18n/hu/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/hu/basics/account-creation.md b/i18n/hu/basics/account-creation.md
index 19433a61..f5b43cfb 100644
--- a/i18n/hu/basics/account-creation.md
+++ b/i18n/hu/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/hu/basics/email-security.md b/i18n/hu/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/hu/basics/email-security.md
+++ b/i18n/hu/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/hu/basics/threat-modeling.md b/i18n/hu/basics/threat-modeling.md
index fc1b3b41..2cf64c5e 100644
--- a/i18n/hu/basics/threat-modeling.md
+++ b/i18n/hu/basics/threat-modeling.md
@@ -1,4 +1,5 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
diff --git a/i18n/hu/basics/vpn-overview.md b/i18n/hu/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/hu/basics/vpn-overview.md
+++ b/i18n/hu/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/hu/cloud.md b/i18n/hu/cloud.md
index 16d0bd41..a57ef3dd 100644
--- a/i18n/hu/cloud.md
+++ b/i18n/hu/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Felhőtárhely"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/hu/cryptocurrency.md b/i18n/hu/cryptocurrency.md
index 06d7e760..b5b0c685 100644
--- a/i18n/hu/cryptocurrency.md
+++ b/i18n/hu/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/hu/data-redaction.md b/i18n/hu/data-redaction.md
index 42dd6c82..363c9943 100644
--- a/i18n/hu/data-redaction.md
+++ b/i18n/hu/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Adat és Metaadat Visszatartás"
icon: material/tag-remove
description: Ezekkel az eszközökkel eltávolíthatod a metaadatokat, például a GPS-helyadatokat és más azonosító információkat a megosztott fényképekről és fájlokról.
diff --git a/i18n/hu/desktop-browsers.md b/i18n/hu/desktop-browsers.md
index 7821996c..23b15761 100644
--- a/i18n/hu/desktop-browsers.md
+++ b/i18n/hu/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/hu/email.md b/i18n/hu/email.md
index 30132215..e6146315 100644
--- a/i18n/hu/email.md
+++ b/i18n/hu/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email szolgáltatások"
icon: material/email
description: Ezek az e-mail szolgáltatók nagyszerű helyet kínálnak az e-mailek biztonságos tárolására, és sokan kínálnak más szolgáltatókkal együttműködő OpenPGP titkosítást.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/hu/encryption.md b/i18n/hu/encryption.md
index 31d78074..3960968f 100644
--- a/i18n/hu/encryption.md
+++ b/i18n/hu/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Titkosító Szoftverek"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/hu/index.md b/i18n/hu/index.md
index f1cd02d2..2e5de347 100644
--- a/i18n/hu/index.md
+++ b/i18n/hu/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.hu.html
hide:
- navigation
diff --git a/i18n/hu/mobile-browsers.md b/i18n/hu/mobile-browsers.md
index 40827135..9f0be824 100644
--- a/i18n/hu/mobile-browsers.md
+++ b/i18n/hu/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/hu/multi-factor-authentication.md b/i18n/hu/multi-factor-authentication.md
index cfc5708f..b31007fe 100644
--- a/i18n/hu/multi-factor-authentication.md
+++ b/i18n/hu/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/hu/passwords.md b/i18n/hu/passwords.md
index 9e932ce3..a048936b 100644
--- a/i18n/hu/passwords.md
+++ b/i18n/hu/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Jelszókezelők"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/hu/real-time-communication.md b/i18n/hu/real-time-communication.md
index 2f5e3ce5..ab0be8d2 100644
--- a/i18n/hu/real-time-communication.md
+++ b/i18n/hu/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Videó streamelő kliensek"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/hu/search-engines.md b/i18n/hu/search-engines.md
index aaf0a3d3..d9bb7a37 100644
--- a/i18n/hu/search-engines.md
+++ b/i18n/hu/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Keresőmotorok"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/hu/tools.md b/i18n/hu/tools.md
index 7247a66d..a1b0e174 100644
--- a/i18n/hu/tools.md
+++ b/i18n/hu/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Adatvédelmi Eszközök"
icon: material/tools
hide:
diff --git a/i18n/hu/tor.md b/i18n/hu/tor.md
index ce63debd..ba030531 100644
--- a/i18n/hu/tor.md
+++ b/i18n/hu/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Hálózat"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Böngésző
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/hu/vpn.md b/i18n/hu/vpn.md
index 42ba3ad6..8603e9c1 100644
--- a/i18n/hu/vpn.md
+++ b/i18n/hu/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Szolgáltatások"
icon: material/vpn
description: Ezek a legjobb VPN-szolgáltatások az online magánéleted és biztonságod megvédéséhez. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/id/android.md b/i18n/id/android.md
index 481bad8a..d0b9cfd7 100644
--- a/i18n/id/android.md
+++ b/i18n/id/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/id/basics/account-creation.md b/i18n/id/basics/account-creation.md
index a303f86d..0353fdb9 100644
--- a/i18n/id/basics/account-creation.md
+++ b/i18n/id/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Pembuatan Akun"
icon: 'material/account-plus'
description: Membuat akun online bisa dibilang merupakan kebutuhan internet, lakukan langkah-langkah ini untuk memastikan Anda tetap privat.
diff --git a/i18n/id/basics/email-security.md b/i18n/id/basics/email-security.md
index 8a06fdee..a1f9cb4a 100644
--- a/i18n/id/basics/email-security.md
+++ b/i18n/id/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Keamanan Email
icon: material/email
description: Email pada dasarnya tidak aman dalam banyak hal, dan ini adalah beberapa alasan mengapa email bukanlah pilihan utama kami untuk komunikasi yang aman.
@@ -22,7 +23,7 @@ Penyedia email yang memungkinkan Anda menggunakan protokol akses standar seperti
### Bagaimana Cara Melindungi Kunci Pribadi Saya?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Pesan tersebut kemudian didekripsi oleh smartcard dan konten yang telah didekripsi dikirim kembali ke perangkat.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Pesan tersebut kemudian didekripsi oleh smartcard dan konten yang telah didekripsi dikirim kembali ke perangkat.
Hal ini menguntungkan untuk dekripsi terjadi pada smartcard sehingga untuk menghindari kemungkinan mengekspos kunci pribadi Anda ke perangkat dikompromikan.
diff --git a/i18n/id/basics/threat-modeling.md b/i18n/id/basics/threat-modeling.md
index 59118709..f6c6cb87 100644
--- a/i18n/id/basics/threat-modeling.md
+++ b/i18n/id/basics/threat-modeling.md
@@ -1,7 +1,8 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
-description: Menyeimbangkan keamanan, privasi, dan kegunaan adalah salah satu tugas pertama dan paling sulit yang akan Anda hadapi dalam perjalanan privasi Anda.
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
Menyeimbangkan keamanan, privasi, dan kegunaan adalah salah satu tugas pertama dan paling sulit yang akan Anda hadapi dalam perjalanan privasi Anda. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Sering kali, orang menemukan bahwa masalah dengan alat yang mereka lihat direkomendasikan adalah bahwa alat tersebut terlalu sulit untuk mulai digunakan!
diff --git a/i18n/id/basics/vpn-overview.md b/i18n/id/basics/vpn-overview.md
index 8d724c60..abfcab4c 100644
--- a/i18n/id/basics/vpn-overview.md
+++ b/i18n/id/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: Ikhtisar VPN
icon: material/vpn
description: Virtual Private Networks mengalihkan risiko dari ISP Anda ke pihak ketiga yang Anda percayai. Anda harus mengingat hal-hal ini.
diff --git a/i18n/id/cloud.md b/i18n/id/cloud.md
index df3a7bff..ec8f0a82 100644
--- a/i18n/id/cloud.md
+++ b/i18n/id/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/id/cryptocurrency.md b/i18n/id/cryptocurrency.md
index 176c2553..8345d910 100644
--- a/i18n/id/cryptocurrency.md
+++ b/i18n/id/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Mata Uang Kripto
icon: material/bank-circle
---
diff --git a/i18n/id/data-redaction.md b/i18n/id/data-redaction.md
index 961594a8..39b14f11 100644
--- a/i18n/id/data-redaction.md
+++ b/i18n/id/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/id/desktop-browsers.md b/i18n/id/desktop-browsers.md
index dbe6322f..ddf97bdb 100644
--- a/i18n/id/desktop-browsers.md
+++ b/i18n/id/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/id/email.md b/i18n/id/email.md
index d565155b..7e6a81d1 100644
--- a/i18n/id/email.md
+++ b/i18n/id/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Layanan Surel"
icon: material/email
description: Penyedia surel ini menawarkan tempat yang baik untuk menyimpan surel Anda dengan aman, dan banyak yang menawarkan enkripsi OpenPGP yang dapat dioperasikan dengan penyedia lain.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Keamanan Akun
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/id/encryption.md b/i18n/id/encryption.md
index ca8dffbf..b26d9448 100644
--- a/i18n/id/encryption.md
+++ b/i18n/id/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Perangkat Lunak Enkripsi"
icon: material/file-lock
description: Enkripsi data adalah satu-satunya cara untuk mengendalikan siapa saja yang dapat mengaksesnya. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/id/index.md b/i18n/id/index.md
index f93146e5..9cd3d087 100644
--- a/i18n/id/index.md
+++ b/i18n/id/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.id.html
hide:
- navigation
diff --git a/i18n/id/mobile-browsers.md b/i18n/id/mobile-browsers.md
index c6be3a37..acc0c9c2 100644
--- a/i18n/id/mobile-browsers.md
+++ b/i18n/id/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/id/multi-factor-authentication.md b/i18n/id/multi-factor-authentication.md
index def33276..a4030c74 100644
--- a/i18n/id/multi-factor-authentication.md
+++ b/i18n/id/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/id/passwords.md b/i18n/id/passwords.md
index 8cb4817a..937f05f8 100644
--- a/i18n/id/passwords.md
+++ b/i18n/id/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/id/real-time-communication.md b/i18n/id/real-time-communication.md
index 68f9d767..7abd8617 100644
--- a/i18n/id/real-time-communication.md
+++ b/i18n/id/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/id/search-engines.md b/i18n/id/search-engines.md
index 911525d7..a590a9eb 100644
--- a/i18n/id/search-engines.md
+++ b/i18n/id/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/id/tools.md b/i18n/id/tools.md
index d9e57d9b..221131d1 100644
--- a/i18n/id/tools.md
+++ b/i18n/id/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/id/tor.md b/i18n/id/tor.md
index 251533ae..c43dbbe6 100644
--- a/i18n/id/tor.md
+++ b/i18n/id/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/id/vpn.md b/i18n/id/vpn.md
index 12ebd5c3..7b9479c1 100644
--- a/i18n/id/vpn.md
+++ b/i18n/id/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "Layanan VPN"
icon: material/vpn
description: Ini adalah layanan VPN terbaik untuk melindungi privasi dan keamanan daring Anda. Temukan penyedia di sini yang tidak memata-matai Anda.
diff --git a/i18n/it/android.md b/i18n/it/android.md
index 806af582..892ab082 100644
--- a/i18n/it/android.md
+++ b/i18n/it/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'fontawesome/brands/android'
description: Puoi sostituire il sistema operativo del tuo telefono Android con queste alternative sicure e rispettose della privacy.
@@ -89,8 +90,6 @@ Questi sono i sistemi operativi, i dispositivi e le applicazioni Android che con
[Panoramica generale di Android :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Perché consigliamo GrapheneOS rispetto a CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## Derivati di AOSP
Consigliamo di installare sul dispositivo uno dei seguenti sistemi operativi basati su Android, elencati in ordine di preferenza, a seconda della compatibilità del proprio dispositivo con questi sistemi operativi.
@@ -120,6 +119,8 @@ GrapheneOS supporta [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
I telefoni Google Pixel sono gli unici dispositivi che attualmente soddisfano i [requisiti di sicurezza hardware](https://grapheneos.org/faq#device-support) di GrapheneOS.
+[Perché consigliamo GrapheneOS rispetto a CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -222,9 +223,9 @@ In questo sito raccomandiamo un'ampia gamma di applicazioni per Android. Le app
!!! recommendation
{ align=right }
- { align=right }
+ { align=right }
- **Auditor** è un'app che sfrutta le funzionalità di sicurezza hardware per fornire il monitoraggio dell'integrità del dispositivo per [dispositivi supportati](https://attestation.app/about#device-support). Attualmente funziona solo con GrapheneOS e con il sistema operativo originale del dispositivo.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Pagina principale](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Informativa sulla privacy" }
diff --git a/i18n/it/basics/account-creation.md b/i18n/it/basics/account-creation.md
index 6b1693a2..5fcbf116 100644
--- a/i18n/it/basics/account-creation.md
+++ b/i18n/it/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Creazione account"
icon: 'material/account-plus'
description: La creazione di account online è praticamente una necessità di internet, adottate questi accorgimenti per assicurarvi di rimanere privati.
diff --git a/i18n/it/basics/email-security.md b/i18n/it/basics/email-security.md
index 6f483fa7..3df88842 100644
--- a/i18n/it/basics/email-security.md
+++ b/i18n/it/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Sicurezza Email
icon: material/email
description: La posta elettronica è intrinsecamente insicura sotto molti punti di vista e questi sono alcuni dei motivi per cui non è la nostra scelta principale per le comunicazioni sicure.
@@ -22,7 +23,7 @@ I provider di posta elettronica che consentono di utilizzare protocolli di acces
### Come proteggo la mia chiave privata?
-Una smartcard (come [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) o [Nitrokey](https://www.nitrokey.com)) funziona ricevendo un messaggio e-mail crittografato da un dispositivo (telefono, tablet, computer, ecc.) con un client e-mail/webmail. Il messaggio viene quindi decifrato dalla smartcard e il contenuto decifrato viene inviato al dispositivo.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Il messaggio viene quindi decifrato dalla smartcard e il contenuto decifrato viene inviato al dispositivo.
È preferibile che la decodifica avvenga sulla smartcard, per evitare di esporre la chiave privata a un dispositivo compromesso.
diff --git a/i18n/it/basics/threat-modeling.md b/i18n/it/basics/threat-modeling.md
index e102ed30..b8705aac 100644
--- a/i18n/it/basics/threat-modeling.md
+++ b/i18n/it/basics/threat-modeling.md
@@ -1,10 +1,11 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Modelli di minaccia"
icon: 'material/target-account'
-description: Bilanciare sicurezza, privacy e usabilità è il primo e il più difficile compito che incontrerai durante il tuo viaggio nella privacy.
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
-Bilanciare sicurezza, privacy e usabilità è il primo e il più difficile compito che incontrerai durante il tuo viaggio nella privacy. Tutto è un compromesso: più qualcosa è sicuro, più è restrittivo o scomodo in generale, ecc. Spesso, le persone scoprono che il problema con gli strumenti che vedono raccomandati è che sono troppo difficili da iniziare a usare!
+Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Tutto è un compromesso: più qualcosa è sicuro, più è restrittivo o scomodo in generale, ecc. Spesso, le persone scoprono che il problema con gli strumenti che vedono raccomandati è che sono troppo difficili da iniziare a usare!
Se si vogliono utilizzare gli strumenti **più** sicuri a disposizione, è necessario sacrificare *molto* in termini di usabilità. E, anche allora, ==nulla è mai completamente sicuro.== C'è un alta **sicurezza**, ma mai una completa **sicurezza**. È per questo che i modelli di minaccia sono importanti.
diff --git a/i18n/it/basics/vpn-overview.md b/i18n/it/basics/vpn-overview.md
index b8500d94..f5c260e4 100644
--- a/i18n/it/basics/vpn-overview.md
+++ b/i18n/it/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: Panoramica VPN
icon: material/vpn
description: Le reti virtuali private spostano il rischio dal vostro ISP a una terza parte di cui vi fidate. Dovresti tenere a mente questi aspetti.
diff --git a/i18n/it/cloud.md b/i18n/it/cloud.md
index 65d7e4f1..f12488e2 100644
--- a/i18n/it/cloud.md
+++ b/i18n/it/cloud.md
@@ -1,14 +1,15 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Archiviazione in cloud"
icon: material/file-cloud
-description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
+description: Molti fornitori di spazio d'archiviazione in cloud richiedono la tua fiducia sul fatto che non guarderanno i tuoi file. Queste sono alternative private!
---
-Molti fornitori di spazio di archiviazione cloud richiedono la tua totale fiducia sul fatto che non guarderanno nei tuoi file. The alternatives listed below eliminate the need for trust by implementing secure E2EE.
+Molti fornitori di spazio di archiviazione cloud richiedono la tua totale fiducia sul fatto che non guarderanno nei tuoi file. Le alternative elencate di seguito eliminano la necessità di fiducia implementando l'E2EE.
-If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients.
+Se queste alternative non soddisfano le vostre esigenze, vi suggeriamo di utilizzare un software di crittografia come [Cryptomator](encryption.md#cryptomator-cloud) con un altro cloud provider. L'uso di Cryptomator insieme a **qualsiasi ** provider cloud (compresi questi) può essere una buona idea per ridurre il rischio di falle di crittografia nei client nativi di un provider.
-??? recommendation
+??? domanda "Stai cercando Nextcloud?"
Nextcloud is [still a recommended tool](productivity.md) for self-hosting a file management suite, however we do not recommend third-party Nextcloud storage providers at the moment, because we do [not recommend](https://discuss.privacyguides.net/t/dont-recommend-nextcloud-e2ee/10352/29) Nextcloud's built-in E2EE functionality for home users.
diff --git a/i18n/it/cryptocurrency.md b/i18n/it/cryptocurrency.md
index 2aa0f4bc..c99a4a86 100644
--- a/i18n/it/cryptocurrency.md
+++ b/i18n/it/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Criptovalute
icon: material/bank-circle
---
diff --git a/i18n/it/data-redaction.md b/i18n/it/data-redaction.md
index d2efaa45..972aa6af 100644
--- a/i18n/it/data-redaction.md
+++ b/i18n/it/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Rimozione di dati e metadati"
icon: material/tag-remove
description: Utilizza questi strumenti per rimuovere metadati come la posizione GPS e altre informazioni identificative dalle foto e dai file che condividete.
diff --git a/i18n/it/desktop-browsers.md b/i18n/it/desktop-browsers.md
index b0e2c0e4..08ed189a 100644
--- a/i18n/it/desktop-browsers.md
+++ b/i18n/it/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Browser desktop"
icon: material/laptop
description: Questi browser web offrono una maggiore protezione della privacy rispetto a Google Chrome.
diff --git a/i18n/it/email.md b/i18n/it/email.md
index f2c94fc9..65cce189 100644
--- a/i18n/it/email.md
+++ b/i18n/it/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Servizi mail"
icon: material/email
description: Questi provider di posta elettronica offrono un luogo ideale per archiviare le tue mail in modo sicuro e molti offrono la crittografia OpenPGP interoperabile con altri provider.
@@ -123,7 +124,7 @@ Mailbox.org non accetta criptovalute a causa della sospensione delle attività d
#### :material-check:{ .pg-green } Sicurezza dell'account
-Mailbox.org supporta l'[autenticazione a due fattori](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo per la loro webmail. È possibile utilizzare TOTP o [Yubikey](https://en.wikipedia.org/wiki/YubiKey) tramite il [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Gli standard Web come [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) non sono ancora supportati.
+Mailbox.org supporta l'[autenticazione a due fattori](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo per la loro webmail. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Gli standard Web come [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) non sono ancora supportati.
#### :material-information-outline:{ .pg-blue } Sicurezza dei dati
diff --git a/i18n/it/encryption.md b/i18n/it/encryption.md
index 6a703f59..12150a1a 100644
--- a/i18n/it/encryption.md
+++ b/i18n/it/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Software di crittografia"
icon: material/file-lock
description: La crittografia dei dati è l'unico modo per controllare chi può accedervi. Questi strumenti ti consentono di crittografare le tue email e qualsiasi altro file.
diff --git a/i18n/it/index.md b/i18n/it/index.md
index ba7c859a..f7c1920e 100644
--- a/i18n/it/index.md
+++ b/i18n/it/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.it.html
hide:
- navigation
diff --git a/i18n/it/mobile-browsers.md b/i18n/it/mobile-browsers.md
index 68c82aa5..2ba2ac11 100644
--- a/i18n/it/mobile-browsers.md
+++ b/i18n/it/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Browser mobile"
icon: octicons/device-mobile-16
description: Questi browser sono quelli che attualmente consigliamo per la navigazione Internet standard/non anonima sul tuo telefono.
diff --git a/i18n/it/multi-factor-authentication.md b/i18n/it/multi-factor-authentication.md
index 344c8c8d..fbb389a6 100644
--- a/i18n/it/multi-factor-authentication.md
+++ b/i18n/it/multi-factor-authentication.md
@@ -1,7 +1,7 @@
---
title: "Autenticatori a più fattori"
icon: 'material/two-factor-authentication'
-description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
+description: Questi strumenti vi aiutano proteggendo i vostri account Internet con l'Autenticazione a più fattori senza inviare i vostri segreti a terzi.
---
## Chiavi di sicurezza fisiche
@@ -49,13 +49,13 @@ Per i modelli che supportano HOTP e TOTP, ci sono 3 slot per HOTP e 15 per TOTP.
!!! warning
- Sebbene le Nitrokey non rilascino i segreti HOTP/TOTP al dispositivo a cui sono collegati, la memoria HOTP e TOTP non è crittografata ed è vulnerabile agli attacchi fisici. Se desideri memorizzare i segreti HOTP o TOTP, consigliamo caldamente di utilizzare una Yubikey.
+ Sebbene le Nitrokey non rilascino i segreti HOTP/TOTP al dispositivo a cui sono collegati, la memoria HOTP e TOTP non è crittografata ed è vulnerabile agli attacchi fisici. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
Reimpostare l'interfaccia OpenPGP su una Nitrokey rende il database [inaccessible](https://docs.nitrokey.com/pro/factory-reset.html).
-The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware.
+La Nitrokey Pro 2, Nitrokey Storage 2 e l'imminente Nitrokey 3 supportano la verifica dell'integrità del sistema per i laptop con il firmware [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/).
Il firmware di Nitrokey è open-source, a differenza di YubiKey. Il firmware dei modelli NitroKey moderni (tranne che per **NitroKey Pro 2**) è aggiornabile.
@@ -69,19 +69,19 @@ Il firmware di Nitrokey è open-source, a differenza di YubiKey. Il firmware dei
#### Requisiti minimi
-- Must use high quality, tamper resistant hardware security modules.
+- Deve utilizzare moduli di sicurezza hardware di alta qualità e resistenti alle manomissioni.
- Deve supportare le ultime specifiche FIDO2.
-- Must not allow private key extraction.
-- Devices which cost over $35 must support handling OpenPGP and S/MIME.
+- Non deve consentire l'estrazione della chiave privata.
+- I dispositivi che costano più di 35 dollari devono supportare la gestione di OpenPGP e S/MIME.
#### Caso migliore
KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). Ciò può comportare la perdita di dati se si importa questo file in un altro gestore di password.
-- Should be available in USB-C form-factor.
-- Should be available with NFC.
-- Should support TOTP secret storage.
-- Should support secure firmware updates.
+- Dovrebbe essere disponibile in formato USB-C.
+- Dovrebbe essere disponibile con NFC.
+- Dovrebbe supportare la memorizzazione delle chiavi TOTP.
+- Dovrebbe supportare gli aggiornamenti del firmware sicuri.
## Applicazioni di autenticazione
@@ -133,7 +133,7 @@ Consigliamo vivamente di utilizare applicazioni TOTP per dispositivi mobili inve
Stiamo lavorando per stabilire criteri ben definiti per ogni sezione del nostro sito, e questo potrebbe essere soggetto a modifiche. Se avete domande sui nostri criteri, vi preghiamo di [chiedere sul nostro forum](https://discuss.privacyguides.net/latest) e non date per scontato che non abbiamo preso in considerazione qualcosa nel formulare le nostre raccomandazioni se non è elencato qui. Sono molti i fattori presi in considerazione e discussi quando consigliamo un progetto, e stiamo lavorando per documentare ogni singolo fattore.
-- Source code must be publicly available.
-- Must not require internet connectivity.
-- Must not sync to a third-party cloud sync/backup service.
- - **Optional** E2EE sync support with OS-native tools is acceptable, e.g. encrypted sync via iCloud.
+- Il codice sorgente deve essere di dominio pubblico.
+- Non deve richiedere la connessione a Internet.
+- Non deve sincronizzarsi a un servizio cloud/backup di terze parti.
+ - **È opzionale ** l'E2EE con strumenti nativi del sistema operativo, ad esempio la sincronizzazione criptata tramite iCloud.
diff --git a/i18n/it/news-aggregators.md b/i18n/it/news-aggregators.md
index 159d5484..4c6ea143 100644
--- a/i18n/it/news-aggregators.md
+++ b/i18n/it/news-aggregators.md
@@ -1,10 +1,10 @@
---
title: "Aggregatori di notizie"
icon: octicons/rss-24
-description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS.
+description: Questi client di aggregazione di notizie consentono di tenersi aggiornati con i blog e siti di news preferiti utilizzando standard Internet come RSS.
---
-A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites.
+Un [Aggregatore di news](https://en.wikipedia.org/wiki/News_aggregator)è un modo per tenersi aggiornati con i blog e siti di news preferiti.
## Client aggregatori
@@ -131,28 +131,28 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k
Stiamo lavorando per stabilire criteri ben definiti per ogni sezione del nostro sito, e questo potrebbe essere soggetto a modifiche. Se avete domande sui nostri criteri, vi preghiamo di [chiedere sul nostro forum](https://discuss.privacyguides.net/latest) e non date per scontato che non abbiamo preso in considerazione qualcosa nel formulare le nostre raccomandazioni se non è elencato qui. Sono molti i fattori presi in considerazione e discussi quando consigliamo un progetto, e stiamo lavorando per documentare ogni singolo fattore.
- Deve essere un software open-source.
-- Must operate locally, i.e. must not be a cloud service.
+- Deve funzionare localmente, cioè non deve essere un servizio in cloud.
-## Social Media RSS Support
+## Social che supportano RSS
-Some social media services also support RSS although it's not often advertised.
+Alcuni social supportano anche gli RSS, ma non spesso viene citato.
### Reddit
Usando una qualsiasi [istanza](https://github.com/zedeus/nitter/wiki/Instances) di Nitter, è possibile iscriversi mediante RSS.
-!!! example
- Replace `subreddit_name` with the subreddit you wish to subscribe to.
+!!! esempio
+ Sostituisci `nome_subreddit` con il nome del subreddit al quale desideri iscriverti.
```text
- https://www.reddit.com/r/{{ subreddit_name }}/new/.rss
+ https://www.reddit.com/r/{{ nome_subreddit }}/new/.rss
```
### Twitter
Puoi iscriverti ai canali YouTube senza accedere e senza associare le informazioni di utilizzo al proprio account Google.
-!!! example
+!!! esempio
1. Scegli un istanza e imposta `istanza_nitter`.
2. Sostituisci `account_twitter` con il nome dell'account che desideri seguire.
@@ -162,11 +162,11 @@ Puoi iscriverti ai canali YouTube senza accedere e senza associare le informazio
### YouTube
-You can subscribe YouTube channels without logging in and associating usage information with your Google Account.
+È possibile iscriversi ai canali YouTube senza effettuare il login e senza associare le proprie informazioni al tuo account Google.
-!!! example
+!!! esempio
- https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID]
+ Per iscriversi ad un canale YouTube con un client RSS, cercare innanzitutto il [codice canale](https://support.google.com/youtube/answer/6180214), sostituendo `[ID CANALE]` qui sotto:
```text
- https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID]
+ https://www.youtube.com/feeds/videos.xml?channel_id=[ID CANALE]
```
diff --git a/i18n/it/notebooks.md b/i18n/it/notebooks.md
index 72b03d5b..9af4862c 100644
--- a/i18n/it/notebooks.md
+++ b/i18n/it/notebooks.md
@@ -1,5 +1,5 @@
---
-title: "Note"
+title: "Appunti"
icon: material/notebook-edit-outline
description: Queste app criptate per prendere appunti consentono di tenere traccia dei propri appunti senza darli a terze parti.
---
diff --git a/i18n/it/os/android-overview.md b/i18n/it/os/android-overview.md
index 8572240a..86c077ff 100644
--- a/i18n/it/os/android-overview.md
+++ b/i18n/it/os/android-overview.md
@@ -60,38 +60,38 @@ Uno smartphone con l'ultima versione di Android sarà sempre più sicuro di un v
Android 10:
-- [Scoped Storage](https://developer.android.com/about/versions/10/privacy/changes#scoped-storage) consente di avere un maggiore controllo sui file e di limitare ciò che può [accedere all'archiviazione esterna](https://developer.android.com/training/data-storage#permissions). Apps can have a specific directory in external storage as well as the ability to store specific types of media there.
-- Tighter access on [device location](https://developer.android.com/about/versions/10/privacy/changes#app-access-device-location) by introducing the `ACCESS_BACKGROUND_LOCATION` permission. This prevents apps from accessing the location when running in the background without express permission from the user.
+- [Scoped Storage](https://developer.android.com/about/versions/10/privacy/changes#scoped-storage) consente di avere un maggiore controllo sui file e di limitare ciò che può [accedere all'archiviazione esterna](https://developer.android.com/training/data-storage#permissions). Le applicazioni possono avere una directory specifica nell'archiviazione esterna e la possibilità di memorizzarvi tipi specifici di file multimediali.
+- Accesso limitato alla [posizione del dispositivo](https://developer.android.com/about/versions/10/privacy/changes#app-access-device-location) introducendo il permesso `ACCESS_BACKGROUND_LOCATION`. Questo impedisce alle app di accedere alla posizione quando sono in esecuzione in background senza l'autorizzazione espressa dell'utente.
Android 11:
-- [One-time permissions](https://developer.android.com/about/versions/11/privacy/permissions#one-time) which allows you to grant a permission to an app just once.
-- [Auto-reset permissions](https://developer.android.com/about/versions/11/privacy/permissions#auto-reset), which resets [runtime permissions](https://developer.android.com/guide/topics/permissions/overview#runtime) that were granted when the app was opened.
-- Granular permissions for accessing [phone number](https://developer.android.com/about/versions/11/privacy/permissions#phone-numbers) related features.
+- [One-time permissions](https://developer.android.com/about/versions/11/privacy/permissions#one-time) che concedere un permesso ad un'applicazione un'unica volta.
+- [Ripristino automatico dei permessi](https://developer.android.com/about/versions/11/privacy/permissions#auto-reset), che ripristina le [ autorizzazioni runtime ](https://developer.android.com/guide/topics/permissions/overview#runtime) concesse all'apertura dell'applicazione.
+- Autorizzazioni granulari per accedere alle funzioni relative al [ numero di telefono](https://developer.android.com/about/versions/11/privacy/permissions#phone-numbers).
Android 12:
-- A permission to grant only the [approximate location](https://developer.android.com/about/versions/12/behavior-changes-12#approximate-location).
-- Auto-reset of [hibernated apps](https://developer.android.com/about/versions/12/behavior-changes-12#app-hibernation).
-- [Data access auditing](https://developer.android.com/about/versions/12/behavior-changes-12#data-access-auditing) which makes it easier to determine what part of an app is performing a specific type of data access.
+- Un'autorizzazione per concedere solo la [posizione approssimativa](https://developer.android.com/about/versions/12/behavior-changes-12#approximate-location) del dispositivo.
+- Ripristino automatico delle [applicazioni ibernate](https://developer.android.com/about/versions/12/behavior-changes-12#app-hibernation).
+- [Audit dell'accesso ai dati](https://developer.android.com/about/versions/12/behavior-changes-12#data-access-auditing) il quale facilita la determinazione della parte di un'app che accede a determinati tipologie di dati.
Android 13:
-- A permission for [nearby wifi access](https://developer.android.com/about/versions/13/behavior-changes-13#nearby-wifi-devices-permission). The MAC addresses of nearby WiFi access points was a popular way for apps to track a user's location.
-- More [granular media permissions](https://developer.android.com/about/versions/13/behavior-changes-13#granular-media-permissions), meaning you can grant access to images, videos or audio files only.
-- Background use of sensors now requires the [`BODY_SENSORS`](https://developer.android.com/about/versions/13/behavior-changes-13#body-sensors-background-permission) permission.
+- Un permesso per [l'accesso wifi nelle vicinanze](https://developer.android.com/about/versions/13/behavior-changes-13#nearby-wifi-devices-permission). Gli indirizzi MAC degli access point WiFi nelle vicinanze erano un modo molto diffuso per le app di tracciare la posizione dell'utente.
+- Più [autorizzazioni granulari per i media](https://developer.android.com/about/versions/13/behavior-changes-13#granular-media-permissions), il che significa che è possibile concedere l'accesso solo a immagini, video o file audio.
+- L'uso in background dei sensori richiede ora l'autorizzazione [`BODY_SENSORS`](https://developer.android.com/about/versions/13/behavior-changes-13#body-sensors-background-permission).
-An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need.
+Un'applicazione potrebbe richiedere un'autorizzazione per far funzionare una sua specifica funzione. Ad esempio, qualsiasi app in grado di scansionare codici QR richiederà l'autorizzazione della fotocamera. Alcune app possono richiedere più autorizzazioni di quelle necessarie.
-[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.
+[Exodus](https://exodus-privacy.eu.org/) può essere utile se devi confrontare app con scopi simili. Se un'applicazione richiede molte autorizzazioni e presenta molte pubblicità e analytics, probabilmente è un brutto segno. Consigliamo di esaminare i singoli tracker e di leggerne le descrizioni piuttosto che limitarsi a **contare il totale di** e assumere che tutte le voci elencate siano uguali.
!!! warning
- If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.
+ Se un'applicazione è principalmente un servizio web-based, il tracciamento può avvenire sul lato server. [Facebook](https://reports.exodus-privacy.eu.org/it/reports/com.facebook.katana/latest/) mostra "nessun tracker", ma sicuramente traccia gli interessi e il comportamento degli utenti all'interno del sito. Le applicazioni potrebbero eludere il rilevamento non utilizzando librerie di codici standard prodotte dalla società pubblicitaria, anche se è molto improbabile.
-!!! note
+!!! nota
- Le applicazioni che rispettano la privacy come [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) possono mostrare alcuni tracker come [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
+ Le applicazioni che rispettano la privacy come [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) possono mostrare alcuni tracker come [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/it/trackers/49/). Questa libreria include [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) che può fornire [notifiche push](https://en.wikipedia.org/wiki/Push_technology) nelle applicazioni. Questo [è il caso] (https://fosstodon.org/@bitwarden/109636825700482007) di Bitwarden. Ciò non significa che Bitwarden utilizzi tutte le funzioni di analytics fornite da Google Firebase Analytics.
## Accesso ai media
diff --git a/i18n/it/passwords.md b/i18n/it/passwords.md
index 9d05e6cf..d52cdb50 100644
--- a/i18n/it/passwords.md
+++ b/i18n/it/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Gestori di password"
icon: material/form-textbox-password
description: I gestori delle password permettono di archiviare e gestire con sicurezza le password e altre credenziali.
@@ -6,7 +7,7 @@ schema:
-
"@context": http://schema.org
"@type": WebPage
- name: Password Manager Recommendations
+ name: Gestori di password consigliati
url: "./"
-
"@context": http://schema.org
@@ -14,7 +15,7 @@ schema:
name: Bitwarden
image: /assets/img/password-management/bitwarden.svg
url: https://bitwarden.com
- sameAs: https://en.wikipedia.org/wiki/Bitwarden
+ sameAs: https://it.wikipedia.org/wiki/Bitwarden
applicationCategory: Gestore di password
operatingSystem:
- Windows
@@ -64,7 +65,7 @@ schema:
name: KeePassDX (Android)
image: /assets/img/password-management/keepassxc.svg
url: https://keepassxc.org/
- sameAs: https://en.wikipedia.org/wiki/KeePassXC
+ sameAs: https://it.wikipedia.org/wiki/KeePassXC
applicationCategory: Gestore di password
operatingSystem:
- Windows
@@ -213,7 +214,7 @@ Un vantaggio di 1Password rispetto a Bitwarden è il supporto di prima classe pe
[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentazione}
[:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Codice sorgente" }
- ??? downloads
+ ??? download
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono)
- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224)
@@ -233,39 +234,65 @@ Psono fornisce un'ampia documentazione sul proprio prodotto. Il web-client di Ps
#### Requisiti minimi
-- Must utilize strong, standards-based/modern E2EE.
-- Must have thoroughly documented encryption and security practices.
-- Must have a published audit from a reputable, independent third-party.
+- Deve utilizzare un sistema E2EE solido, basato su criteri standard/moderni.
+- Deve avere pratiche di sicurezza e crittografia accuratamente documentate.
+- Deve avere un audit pubblicato da una terza parte affidabile e indipendente.
- Tutta la telemetria non essenziale deve essere facoltativa.
-- Must not collect more PII than is necessary for billing purposes.
+- Non deve raccogliere più PII di quanto sia necessario ai fini della fatturazione.
#### Caso migliore
KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). Ciò può comportare la perdita di dati se si importa questo file in un altro gestore di password.
-- Telemetry should be opt-in (disabled by default) or not collected at all.
-- Should be open-source and reasonably self-hostable.
+- La telemetria dovrebbe essere opt-in (disattivata per impostazione predefinita) o non essere raccolta affatto.
+- Dovrebbe essere open-source e facilmente self-hostabile.
## Archiviazione locale
Queste opzioni ti consentono di gestire localmente un database di password criptato.
+### KeePassXC
+
+!!! recommendation
+
+ { align=right }
+
+ **KeePassXC** è un fork comunitario di KeePassX, un port nativo multipiattaforma di KeePass Password Safe, con l'obiettivo di estenderlo e migliorarlo con nuove funzionalità e correzioni di bug per fornire un gestore di password open-source ricco di funzionalità, multipiattaforma e moderno.
+
+ [:octicons-home-16: Pagina Principale](https://keepassxc.org){ .md-button .md-button--primary }
+ [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Politica sulla Privacy" }
+ [:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentazione}
+ [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Codice sorgente" }
+ [:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribuisci }
+
+ ??? download
+
+ - [:simple-windows11: Windows](https://keepassxc.org/download/#windows)
+ - [:simple-apple: macOS](https://keepassxc.org/download/#mac)
+ - [:simple-linux: Linux](https://keepassxc.org/download/#linux)
+ - [:simple-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC)
+ - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser)
+ - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk)
+
+KeePassXC memorizza i dati esportati come file [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). Ciò può comportare una perdita di dati se si importa questo file in un altro gestore di password. Consigliamo di controllare manualmente ogni record.
+
### KeePassDX (Android)
!!! recommendation
{ align=right }
- **KeePassDX** è un leggero gestore di password per Android, che consente di modificare i dati crittografati in un unico file in formato KeePass e di compilare i moduli in modo sicuro.
+ **KeePassDX** è un gestore di password leggero per Android, che consente di modificare i dati crittografati in un unico file in formato KeePass e di compilare i moduli in modo sicuro. [Contribuente Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) permette di sbloccare contenuti cosmetici e funzioni non standard del protocollo, ma soprattutto aiuta e incoraggia lo sviluppo.
- [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) permette di sbloccare contenuti cosmetici e funzioni del protocollo non standard, ma soprattutto aiuta e incoraggia lo sviluppo. [:octicons-home-16: Pagina principale](https://www.keepassdx.com){ .md-button .md-button--primary }
+ [:octicons-home-16: Pagina Principale](https://www.keepassdx.com){ .md-button .md-button--primary }
[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentazione}
- [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Codice sorgente" }
+ [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Codice Sorgente" }
[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribuisci }
- ???
-
-Inoltre, è disponibile una versione solo offline: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). Questa versione è stata ridotta nel tentativo di ridurre la superficie di attacco. We advise you check each record manually.
+ ??? download
+
+ - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free)
+ - [:simple-github: GitHub](https://github.com/Kunzisoft/KeePassDX/releases)
### Strongbox (iOS & macOS)
@@ -273,58 +300,39 @@ Inoltre, è disponibile una versione solo offline: [Strongbox Zero](https://apps
{ align=right }
- **Strongbox** è un gestore di password nativo e open-source per iOS e macOS. Supportando entrambi i formati KeePass e Password Safe, Strongbox può essere utilizzato in tandem con altri gestori di password, come KeePassXC, su piattaforme non Apple.
+ **Strongbox** è un gestore di password nativo e open-source per iOS e macOS. Supportando entrambi i formati KeePass e Password Safe, Strongbox può essere utilizzato in tandem con altri gestori di password, come KeePassXC, o piattaforme non Apple. Utilizzando un [modello freemium] (https://strongboxsafe.com/pricing/), Strongbox offre la maggior parte delle funzionalità nel suo livello gratuito, mentre le [features]
+ (https://strongboxsafe.com/comparison/)più convenienti—come l'autenticazione biometrica—sono bloccate dietro un abbonamento o una licenza permanente.
- Utilizzando un [modello freemium] (https://strongboxsafe.com/pricing/), Strongbox offre la maggior parte delle funzionalità nel suo livello gratuito, mentre quelle più convenienti [features](https://strongboxsafe.com/comparison/), come l'autenticazione biometrica, sono bloccate dietro un abbonamento o una licenza perpetua. [:octicons-home-16: Pagina principale](https://strongboxsafe.com){ .md-button .md-button--primary }
- [:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Informativa sulla privacy" }
+ [:octicons-home-16: Pagina Principale](https://strongboxsafe.com){ .md-button .md-button--primary }
+ [:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Politica sulla Privacy" }
[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentazione}
[:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Codice sorgente" }
[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribuisci }
- ???
-
-### gopass
-
-!!! recommendation
-
- { align=right }
-
- **gopass** è un gestore di password per la riga di comando scritto in Go. Funziona su tutti i principali sistemi operativi desktop e server (Linux, macOS, BSD, Windows). [:octicons-home-16: Pagina principale](https://www.gopass.pw){ .md-button .md-button--primary }
- [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentazione}
- [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Codice sorgente" }
- [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribuisci }
-
- ???
-
- downloads
-
- - [:simple-windows11: Windows](https://www.gopass.pw/#install-windows)
- - [:simple-apple: macOS](https://www.gopass.pw/#install-macos)
- - [:simple-linux: Linux](https://www.gopass.pw/#install-linux)
- - [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) downloads
+ ??? download
- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface.
+Inoltre, è disponibile una versione solo offline: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). Questa versione è stata ridotta nel tentativo di ridurre la superficie di attacco.
### Linea di comando
-These products are minimal password managers that can be used within scripting applications.
+Questi prodotti sono gestori di password minimali che possono essere utilizzati all'interno di applicazioni di scripting.
#### gopass
!!! recommendation
- { align=right }
+ { align=right }
- **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows).
+ **gopass** è un gestore di password a riga di comando scritto in Go. Funziona su tutti i principali sistemi operativi desktop e server (Linux, macOS, BSD, Windows).
- [:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary }
- [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation}
- [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" }
- [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute }
+ [:octicons-home-16: Pagina Principale](https://www.gopass.pw){ .md-button .md-button--primary }
+ [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentazione}
+ [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Codice sorgente" }
+ [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribuisci }
- ??? downloads
+ ??? download
- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows)
- [:simple-apple: macOS](https://www.gopass.pw/#install-macos)
diff --git a/i18n/it/real-time-communication.md b/i18n/it/real-time-communication.md
index 9553c095..bb07a85c 100644
--- a/i18n/it/real-time-communication.md
+++ b/i18n/it/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Comunicazione in tempo reale"
icon: material/chat-processing
description: Altre app di messaggistica istantanea rendono disponibili tutte le tue conversazioni private alla società che le gestisce.
diff --git a/i18n/it/search-engines.md b/i18n/it/search-engines.md
index 28e4471e..b3d37768 100644
--- a/i18n/it/search-engines.md
+++ b/i18n/it/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Motori di ricerca"
icon: material/search-web
description: Questi motori di ricerca, che rispettano la privacy, non costruiscono un profilo pubblicitario basato sulle vostre ricerche.
diff --git a/i18n/it/tools.md b/i18n/it/tools.md
index 85032f3f..439c357c 100644
--- a/i18n/it/tools.md
+++ b/i18n/it/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Strumenti per la privacy"
icon: material/tools
hide:
diff --git a/i18n/it/tor.md b/i18n/it/tor.md
index 9f9b64ce..8776be03 100644
--- a/i18n/it/tor.md
+++ b/i18n/it/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Rete Tor"
icon: simple/torproject
description: Proteggi la tua navigazione internet da occhi indiscreti utilizzando la rete Tor, una rete sicura che elude la censura.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/it/vpn.md b/i18n/it/vpn.md
index 6fd44624..cbbd7668 100644
--- a/i18n/it/vpn.md
+++ b/i18n/it/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "Servizi VPN"
icon: material/vpn
description: Questi sono i migliori servizi VPN per proteggere la tua privacy e sicurezza online. Trovate un fornitore che non ti spii.
diff --git a/i18n/ja/404.md b/i18n/ja/404.md
index 7a52bfe9..1536fbb3 100644
--- a/i18n/ja/404.md
+++ b/i18n/ja/404.md
@@ -11,9 +11,9 @@ meta:
お探しのページは見つかりませんでした。 お探しのページは、以下のいずれかのページではありませんか?
-- [Introduction to Threat Modeling](basics/threat-modeling.md)
-- [Recommended DNS Providers](dns.md)
-- [Best Desktop Web Browsers](desktop-browsers.md)
-- [Best VPN Providers](vpn.md)
-- [Privacy Guides Forum](https://discuss.privacyguides.net)
-- [Our Blog](https://blog.privacyguides.org)
+- [脅威モデリングの入門](basics/threat-modeling.md)
+- [おすすめのDNSプロバイダ](dns.md)
+- [最高のデスクトップウェブブラウザ](desktop-browsers.md)
+- [最高のVPNプロバイダ](vpn.md)
+- [Privacy Guidesフォーラム](https://discuss.privacyguides.net)
+- [私たちのブログ](https://blog.privacyguides.org)
diff --git a/i18n/ja/advanced/payments.md b/i18n/ja/advanced/payments.md
index 7e046ecd..99ebac87 100644
--- a/i18n/ja/advanced/payments.md
+++ b/i18n/ja/advanced/payments.md
@@ -41,7 +41,7 @@ Another way to protect your information from merchants online is to use virtual,
These tend to be good options for recurring/subscription payments online, while prepaid gift cards are preferred for one-time transactions.
-## Cryptocurrency
+## 暗号通貨
Cryptocurrencies are a digital form of currency designed to work without central authorities such as a government or bank. While *some* cryptocurrency projects can allow you to make private transactions online, many use a public blockchain which does not provide any transaction privacy. Cryptocurrencies also tend to be very volatile assets, meaning their value can change rapidly and significantly at any time. As such, we generally don't recommend using cryptocurrency as a long-term store of value. If you decide to use cryptocurrency online, make sure you have a full understanding of its privacy aspects beforehand, and only invest amounts which would not be disastrous to lose.
diff --git a/i18n/ja/android.md b/i18n/ja/android.md
index 481bad8a..d0b9cfd7 100644
--- a/i18n/ja/android.md
+++ b/i18n/ja/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/ja/basics/account-creation.md b/i18n/ja/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/ja/basics/account-creation.md
+++ b/i18n/ja/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/ja/basics/account-deletion.md b/i18n/ja/basics/account-deletion.md
index 2498d604..5cd77835 100644
--- a/i18n/ja/basics/account-deletion.md
+++ b/i18n/ja/basics/account-deletion.md
@@ -25,7 +25,7 @@ Desktop platforms also often have a password manager which may help you recover
- iOS [Passwords](https://support.apple.com/en-us/HT211146)
- Linux, Gnome Keyring, which can be accessed through [Seahorse](https://help.gnome.org/users/seahorse/stable/passwords-view.html.en) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager)
-### Email
+### メール
If you didn't use a password manager in the past or you think you have accounts that were never added to your password manager, another option is to search the email account(s) that you believe you signed up on. On your email client, search for keywords such as "verify" or "welcome." Almost every time you make an online account, the service will send a verification link or an introductory message to your email. This can be a good way to find old, forgotten accounts.
diff --git a/i18n/ja/basics/email-security.md b/i18n/ja/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/ja/basics/email-security.md
+++ b/i18n/ja/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/ja/basics/multi-factor-authentication.md b/i18n/ja/basics/multi-factor-authentication.md
index ae57848d..8e73f880 100644
--- a/i18n/ja/basics/multi-factor-authentication.md
+++ b/i18n/ja/basics/multi-factor-authentication.md
@@ -1,5 +1,5 @@
---
-title: "Multi-Factor Authentication"
+title: "多要素認証 (Multi-Factor Authentication)"
icon: 'material/two-factor-authentication'
description: MFA is a critical security mechanism for securing your online accounts, but some methods are stronger than others.
---
diff --git a/i18n/ja/basics/passwords-overview.md b/i18n/ja/basics/passwords-overview.md
index 6858d8b5..5e5e868a 100644
--- a/i18n/ja/basics/passwords-overview.md
+++ b/i18n/ja/basics/passwords-overview.md
@@ -90,7 +90,7 @@ To sum it up, diceware passphrases are your best option when you need something
## Storing Passwords
-### Password Managers
+### パスワードマネージャ
The best way to store your passwords is by using a password manager. They allow you to store your passwords in a file or in the cloud and protect them with a single master password. That way, you will only have to remember one strong password, which lets you access the rest of them.
diff --git a/i18n/ja/basics/threat-modeling.md b/i18n/ja/basics/threat-modeling.md
index fc1b3b41..2cf64c5e 100644
--- a/i18n/ja/basics/threat-modeling.md
+++ b/i18n/ja/basics/threat-modeling.md
@@ -1,4 +1,5 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
diff --git a/i18n/ja/basics/vpn-overview.md b/i18n/ja/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/ja/basics/vpn-overview.md
+++ b/i18n/ja/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/ja/calendar.md b/i18n/ja/calendar.md
index bbcb033a..a6e1b63d 100644
--- a/i18n/ja/calendar.md
+++ b/i18n/ja/calendar.md
@@ -1,5 +1,5 @@
---
-title: "Calendar Sync"
+title: "カレンダー同期"
icon: material/calendar
description: Calendars contain some of your most sensitive data; use products that implement encryption at rest.
---
diff --git a/i18n/ja/cloud.md b/i18n/ja/cloud.md
index df3a7bff..c58b5774 100644
--- a/i18n/ja/cloud.md
+++ b/i18n/ja/cloud.md
@@ -1,5 +1,6 @@
---
-title: "Cloud Storage"
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
+title: "クラウドストレージ"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
---
diff --git a/i18n/ja/cryptocurrency.md b/i18n/ja/cryptocurrency.md
index ba06ba1e..7936d76e 100644
--- a/i18n/ja/cryptocurrency.md
+++ b/i18n/ja/cryptocurrency.md
@@ -1,5 +1,6 @@
---
-title: Cryptocurrency
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
+title: 暗号通貨
icon: material/bank-circle
---
diff --git a/i18n/ja/data-redaction.md b/i18n/ja/data-redaction.md
index 961594a8..15b3f23a 100644
--- a/i18n/ja/data-redaction.md
+++ b/i18n/ja/data-redaction.md
@@ -1,5 +1,6 @@
---
-title: "Data and Metadata Redaction"
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
+title: "データとメタデータの編集"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
---
diff --git a/i18n/ja/desktop-browsers.md b/i18n/ja/desktop-browsers.md
index 1d0e42e4..724e5884 100644
--- a/i18n/ja/desktop-browsers.md
+++ b/i18n/ja/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "デスクトップブラウザ"
icon: material/laptop
description: これらのウェブブラウザは、Google Chromeよりも強力なプライバシー保護を提供します。
diff --git a/i18n/ja/email-clients.md b/i18n/ja/email-clients.md
index eec0e292..47760ca8 100644
--- a/i18n/ja/email-clients.md
+++ b/i18n/ja/email-clients.md
@@ -1,5 +1,5 @@
---
-title: "Email Clients"
+title: "メールクライアント"
icon: material/email-open
description: These email clients are privacy-respecting and support OpenPGP email encryption.
---
diff --git a/i18n/ja/email.md b/i18n/ja/email.md
index f9028330..43efeb41 100644
--- a/i18n/ja/email.md
+++ b/i18n/ja/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/ja/encryption.md b/i18n/ja/encryption.md
index ded8533b..17507d9d 100644
--- a/i18n/ja/encryption.md
+++ b/i18n/ja/encryption.md
@@ -1,5 +1,6 @@
---
-title: "Encryption Software"
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
+title: "暗号化ソフトウェア"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
---
diff --git a/i18n/ja/file-sharing.md b/i18n/ja/file-sharing.md
index 3e79d791..7dd0d07a 100644
--- a/i18n/ja/file-sharing.md
+++ b/i18n/ja/file-sharing.md
@@ -1,5 +1,5 @@
---
-title: "File Sharing and Sync"
+title: "ファイル共有と同期"
icon: material/share-variant
description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
---
diff --git a/i18n/ja/financial-services.md b/i18n/ja/financial-services.md
index 480c924c..8616c032 100644
--- a/i18n/ja/financial-services.md
+++ b/i18n/ja/financial-services.md
@@ -1,5 +1,5 @@
---
-title: Financial Services
+title: 金融サービス
icon: material/bank
---
diff --git a/i18n/ja/frontends.md b/i18n/ja/frontends.md
index d717b093..51aec91f 100644
--- a/i18n/ja/frontends.md
+++ b/i18n/ja/frontends.md
@@ -1,5 +1,5 @@
---
-title: "Frontends"
+title: "フロントエンド"
icon: material/flip-to-front
description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances.
---
diff --git a/i18n/ja/index.md b/i18n/ja/index.md
index dd11fec5..f9808ae4 100644
--- a/i18n/ja/index.md
+++ b/i18n/ja/index.md
@@ -1,5 +1,6 @@
---
-template: overrides/home.en.html
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
+template: overrides/home.ja.html
hide:
- navigation
- toc
@@ -67,4 +68,4 @@ schema:
[:material-information-outline:](about/index.md){ title="私たちの詳細" }
[:material-hand-coin-outline:](about/donate.md){ title="プロジェクトを支援" }
-It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
+Privacy Guidesのようなウェブサイトは、常に最新の情報を提供することが重要です。 閲覧者は、私たちのサイトに掲載されたアプリケーションのソフトウェアアップデートを確認し、おすすめのプロバイダに関する最新情報を入手する必要があります。 インターネットの速さに追いつくのは難しいですが、私たちは最善を尽くします。 誤りを見つけた場合、不適切なプロバイダが掲載されていると感じた場合、適格なプロバイダが掲載されていない場合、ブラウザのプラグインが最適でないと感じた場合、またはその他の問題を発見した場合は、ご連絡ください。
diff --git a/i18n/ja/mobile-browsers.md b/i18n/ja/mobile-browsers.md
index c6be3a37..acc0c9c2 100644
--- a/i18n/ja/mobile-browsers.md
+++ b/i18n/ja/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/ja/multi-factor-authentication.md b/i18n/ja/multi-factor-authentication.md
index def33276..a4030c74 100644
--- a/i18n/ja/multi-factor-authentication.md
+++ b/i18n/ja/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/ja/passwords.md b/i18n/ja/passwords.md
index 59579402..ccb3a998 100644
--- a/i18n/ja/passwords.md
+++ b/i18n/ja/passwords.md
@@ -1,5 +1,6 @@
---
-title: "Password Managers"
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
+title: "パスワードマネージャ"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
schema:
diff --git a/i18n/ja/productivity.md b/i18n/ja/productivity.md
index 4490325d..33e53576 100644
--- a/i18n/ja/productivity.md
+++ b/i18n/ja/productivity.md
@@ -1,5 +1,5 @@
---
-title: "Productivity Tools"
+title: "生産性向上ツール"
icon: material/file-sign
description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do.
---
diff --git a/i18n/ja/real-time-communication.md b/i18n/ja/real-time-communication.md
index 68f9d767..e54f1241 100644
--- a/i18n/ja/real-time-communication.md
+++ b/i18n/ja/real-time-communication.md
@@ -1,5 +1,6 @@
---
-title: "Real-Time Communication"
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
+title: "リアルタイムコミュニケーション"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
---
@@ -99,7 +100,7 @@ Briar has a fully [published specification](https://code.briarproject.org/briar/
Briar supports perfect forward secrecy by using the Bramble [Handshake](https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BHP.md) and [Transport](https://code.briarproject.org/briar/briar-spec/blob/master/protocols/BTP.md) protocol.
-## Additional Options
+## 追加のオプション
!!! warning
diff --git a/i18n/ja/search-engines.md b/i18n/ja/search-engines.md
index 911525d7..76630297 100644
--- a/i18n/ja/search-engines.md
+++ b/i18n/ja/search-engines.md
@@ -1,5 +1,6 @@
---
-title: "Search Engines"
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
+title: "検索エンジン"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
---
diff --git a/i18n/ja/tools.md b/i18n/ja/tools.md
index d9e57d9b..539b9287 100644
--- a/i18n/ja/tools.md
+++ b/i18n/ja/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
@@ -12,7 +13,7 @@ If you want assistance figuring out the best privacy tools and alternative progr
For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page.
-## Tor Network
+## Torネットワーク
@@ -26,7 +27,7 @@ For more details about each project, why they were chosen, and additional tips o
[Learn more :material-arrow-right-drop-circle:](tor.md)
-## Desktop Web Browsers
+## デスクトップウェブブラウザ
@@ -38,7 +39,7 @@ For more details about each project, why they were chosen, and additional tips o
[Learn more :material-arrow-right-drop-circle:](desktop-browsers.md)
-### Additional Resources
+### 追加のリソース
@@ -48,7 +49,7 @@ For more details about each project, why they were chosen, and additional tips o
[Learn more :material-arrow-right-drop-circle:](desktop-browsers.md#additional-resources)
-## Mobile Web Browsers
+## モバイルウェブブラウザ
@@ -59,7 +60,7 @@ For more details about each project, why they were chosen, and additional tips o
[Learn more :material-arrow-right-drop-circle:](mobile-browsers.md)
-### Additional Resources
+### 追加のリソース
@@ -82,7 +83,7 @@ For more details about each project, why they were chosen, and additional tips o
[Learn more :material-arrow-right-drop-circle:](android.md)
-#### Android Apps
+#### Androidアプリ
@@ -124,9 +125,9 @@ For more details about each project, why they were chosen, and additional tips o
[Learn more :material-arrow-right-drop-circle:](router.md)
-## Service Providers
+## サービスプロバイダ
-### Cloud Storage
+### クラウドストレージ
@@ -139,7 +140,7 @@ For more details about each project, why they were chosen, and additional tips o
### DNS
-#### DNS Providers
+#### DNSプロバイダ
We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended.
@@ -167,7 +168,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](dns.md#self-hosted-solutions)
-### Email
+### メール
@@ -202,7 +203,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](email.md#self-hosting-email)
-### Financial Services
+### 金融サービス
#### Payment Masking Services
@@ -225,7 +226,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](financial-services.md#gift-card-marketplaces)
-### Search Engines
+### 検索エンジン
@@ -238,7 +239,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](search-engines.md)
-### VPN Providers
+### VPNプロバイダ
??? danger "VPNs do not provide anonymity"
@@ -260,9 +261,9 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](vpn.md)
-## Software
+## ソフトウェア
-### Calendar Sync
+### カレンダー同期
@@ -273,7 +274,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](calendar.md)
-### Cryptocurrency
+### 暗号通貨
@@ -283,7 +284,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](cryptocurrency.md)
-### Data and Metadata Redaction
+### データとメタデータの編集
@@ -297,7 +298,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](data-redaction.md)
-### Email Clients
+### メールクライアント
@@ -315,7 +316,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](email-clients.md)
-### Encryption Software
+### 暗号化ソフトウェア
??? info "Operating System Disk Encryption"
@@ -336,7 +337,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](encryption.md)
-#### OpenPGP Clients
+#### OpenPGPクライアント
@@ -349,7 +350,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](encryption.md#openpgp)
-### File Sharing and Sync
+### ファイル共有と同期
@@ -363,7 +364,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](file-sharing.md)
-### Frontends
+### フロントエンド
@@ -380,7 +381,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](frontends.md)
-### Multi-Factor Authentication Tools
+### 多要素認証ツール
@@ -422,7 +423,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](notebooks.md)
-### Password Managers
+### パスワードマネージャ
@@ -438,7 +439,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](passwords.md)
-### Productivity Tools
+### 生産性向上ツール
@@ -452,7 +453,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
[Learn more :material-arrow-right-drop-circle:](productivity.md)
-### Real-Time Communication
+### リアルタイムコミュニケーション
diff --git a/i18n/ja/tor.md b/i18n/ja/tor.md
index b1f2afbf..af9a3a9e 100644
--- a/i18n/ja/tor.md
+++ b/i18n/ja/tor.md
@@ -1,7 +1,25 @@
---
-title: "Tor Network"
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
+title: "Torネットワーク"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
@@ -18,7 +36,7 @@ Tor works by routing your internet traffic through those volunteer-operated serv
[Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button}
-## Connecting to Tor
+## Torへの接続
There are a variety of ways to connect to the Tor network from your device, the most commonly used being the **Tor Browser**, a fork of Firefox designed for anonymous browsing for desktop computers and Android. In addition to the apps listed below, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser.
diff --git a/i18n/ja/vpn.md b/i18n/ja/vpn.md
index 2556c40a..3bf325ca 100644
--- a/i18n/ja/vpn.md
+++ b/i18n/ja/vpn.md
@@ -1,5 +1,6 @@
---
-title: "VPN Services"
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
+title: "VPNサービス"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
---
@@ -26,9 +27,9 @@ If you're looking for additional **privacy** from your ISP, on a public Wi-Fi ne
[Detailed VPN Overview :material-arrow-right-drop-circle:](basics/vpn-overview.md ""){.md-button}
-## Recommended Providers
+## おすすめのプロバイダ
-Our recommended providers use encryption, accept Monero, support WireGuard & OpenVPN, and have a no logging policy. Read our [full list of criteria](#criteria) for more information.
+私たちがおすすめするプロバイダは、暗号化を使用し、Moneroを受け入れ、WireGuardとOpenVPNに対応し、ノーログポリシーを持っています。 Read our [full list of criteria](#criteria) for more information.
### IVPN
@@ -36,14 +37,14 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope
{ align=right }
- **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar.
+ **IVPN**はプレミアムVPNプロバイダの一つで、2009年から運営されています。 IVPNの拠点はジブラルタルです。
[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
- ??? downloads
+ ??? ダウンロード
- [:simple-android: Android](https://www.ivpn.net/apps-android/)
- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683)
@@ -51,7 +52,7 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope
- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/)
- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/)
-#### :material-check:{ .pg-green } 35 Countries
+#### :material-check:{ .pg-green } 35か国
IVPN has [servers in 35 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination.
{ .annotate }
@@ -96,7 +97,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN
{ align=right }
- **Mullvad** is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since **2009**. Mullvad is based in Sweden and does not have a free trial.
+ **Mullvad** is a fast and inexpensive VPN with a serious focus on transparency and security. They have been in operation since **2009**. Mullvadの拠点はスウェーデンで、フリートライアルはありません。
[:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary }
[:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" }
@@ -104,7 +105,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN
[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
- ??? downloads
+ ??? ダウンロード
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn)
- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513)
diff --git a/i18n/ko/android.md b/i18n/ko/android.md
index 481bad8a..d0b9cfd7 100644
--- a/i18n/ko/android.md
+++ b/i18n/ko/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/ko/basics/account-creation.md b/i18n/ko/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/ko/basics/account-creation.md
+++ b/i18n/ko/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/ko/basics/email-security.md b/i18n/ko/basics/email-security.md
index f264d395..23f37dcf 100644
--- a/i18n/ko/basics/email-security.md
+++ b/i18n/ko/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: 이메일 보안
icon: material/email
description: 이메일은 태생적으로 여러 가지 면에서 안전하지 않습니다. 따라서 안전한 통신을 위한 최선의 선택은 아닙니다.
@@ -22,13 +23,13 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
-## Email Metadata Overview
+## 이메일 메타데이터 개요
-Email metadata is stored in the [message header](https://en.wikipedia.org/wiki/Email#Message_header) of the email message and includes some visible headers that you may have seen such as: `To`, `From`, `Cc`, `Date`, `Subject`. There are also a number of hidden headers included by many email clients and providers that can reveal information about your account.
+이메일 메타데이터는 이메일 메시지의 [메시지 헤더](https://en.wikipedia.org/wiki/Email#Message_header)에 저장됩니다. 이메일 메타데이터에는 여러분이 봐왔을 `To`(받는사람), `From`(보낸사람), `Cc`(참조), `Date`(보낸 날짜), `Subject`(제목) 등이 포함됩니다. 이외에도 여러 숨겨진 헤더가 이메일 클라이언트 및 제공 업체로부터 추가되며, 이러한 정보는 여러분의 계정에 대한 정보를 노출시킬 수 있습니다.
Client software may use email metadata to show who a message is from and what time it was received. Servers may use it to determine where an email message must be sent, among [other purposes](https://en.wikipedia.org/wiki/Email#Message_header) which are not always transparent.
diff --git a/i18n/ko/basics/threat-modeling.md b/i18n/ko/basics/threat-modeling.md
index 135aff0f..d7f64d30 100644
--- a/i18n/ko/basics/threat-modeling.md
+++ b/i18n/ko/basics/threat-modeling.md
@@ -1,10 +1,11 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "위협 모델링"
icon: 'material/target-account'
-description: 보안, 개인정보 보호, 사용성 간의 균형 조절은 개인정보 보호 여정에서 가장 먼저 직면하게 될 가장 어려운 과제 중 하나입니다.
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
-보안, 개인정보 보호, 사용성 간의 균형 조절은 개인정보 보호 여정에서 제일 먼저 직면하게 될 가장 어려운 과제 중 하나입니다. 무엇이든 장단점이 있습니다. '더 뛰어난 보안'은 일반적으로 '더 많은 제약이나 불편함'을 의미합니다. 사람들로부터 권장 툴의 문제점으로 자주 지적되는 것은, "사용하기 너무 어렵다"라는 점입니다.
+보안, 개인정보 보호, 사용성 간의 균형 조절은 개인정보 보호 여정에서 가장 먼저 직면하게 될 가장 어려운 과제 중 하나입니다. 무엇이든 장단점이 있습니다. '더 뛰어난 보안'은 일반적으로 '더 많은 제약이나 불편함'을 의미합니다. 사람들로부터 권장 툴의 문제점으로 자주 지적되는 것은, "사용하기 너무 어렵다"라는 점입니다.
**가장 안전한** 보안 툴을 사용하고자 한다면, 사용성을 **대폭 희생**해야 합니다. 게다가 ==완벽한 보안은 존재하지 않습니다.== **높은** 보안은 존재하지만 **완벽한** 보안은 존재하지 않습니다. 그렇기에 위협 모델링이 중요한 것입니다.
diff --git a/i18n/ko/basics/vpn-overview.md b/i18n/ko/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/ko/basics/vpn-overview.md
+++ b/i18n/ko/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/ko/cloud.md b/i18n/ko/cloud.md
index fe981c0b..b54a4dc1 100644
--- a/i18n/ko/cloud.md
+++ b/i18n/ko/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "클라우드 스토리지"
icon: material/file-cloud
description: 대부분의 클라우드 스토리지 제공 업체는, 업체가 사용자의 파일을 보지 않을 것이라는 믿음이 필수적입니다. 프라이버시 보호 대체제를 소개합니다!
@@ -80,7 +81,7 @@ Tresorit은 독립적인 보안 감사를 여러 차례 받았습니다.
- 종단 간 암호화가 적용되어야 합니다.
- 테스트용 무료 요금제/체험판 기간을 제공해야 합니다.
-- TOTP/FIDO2 다중 요소 인증 혹은 Passkey 로그인을 지원해야 합니다.
+- TOTP/FIDO2 다중 인증 혹은 Passkey 로그인을 지원해야 합니다.
- 기본적인 파일 관리 기능을 지원하는 웹 인터페이스를 제공해야 합니다.
- 모든 파일/문서를 쉽게 내보낼 수 있어야 합니다.
- 감사받은 표준 암호화를 사용해야 합니다.
diff --git a/i18n/ko/cryptocurrency.md b/i18n/ko/cryptocurrency.md
index ba06ba1e..a994b44f 100644
--- a/i18n/ko/cryptocurrency.md
+++ b/i18n/ko/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/ko/data-redaction.md b/i18n/ko/data-redaction.md
index 961594a8..39b14f11 100644
--- a/i18n/ko/data-redaction.md
+++ b/i18n/ko/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/ko/desktop-browsers.md b/i18n/ko/desktop-browsers.md
index ef0cdaf8..8ae0a230 100644
--- a/i18n/ko/desktop-browsers.md
+++ b/i18n/ko/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "데스크톱 브라우저"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/ko/email.md b/i18n/ko/email.md
index 50771efc..6cfba49d 100644
--- a/i18n/ko/email.md
+++ b/i18n/ko/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "이메일 서비스"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -28,9 +29,9 @@ These providers natively support OpenPGP encryption/decryption and the Web Key D
!!! warning
- When using E2EE technology like OpenPGP, email will still have some metadata that is not encrypted in the header of the email. Read more about [email metadata](basics/email-security.md#email-metadata-overview).
+ OpenPGP와 같은 종단간 암호화 기술을 사용하더라도 이메일의 헤더에 일부 메타데이터는 암호화되지 않습니다. Read more about [email metadata](basics/email-security.md#email-metadata-overview).
- OpenPGP also does not support Forward secrecy, which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. [How do I protect my private keys?](basics/email-security.md#how-do-i-protect-my-private-keys)
+ 또한, OpenPGP는 순방향 비밀성을 제공하지 않습니다. 따라서 발신자 또는 수신자의 개인 키가 유출된다면 지금까지 같은 키로 암호화된 메세지의 내용 또한 유출됩니다. [내 개인 키를 보호하려면 어떻게 해야 하나요?](basics/email-security.md#how-do-i-protect-my-private-keys)
### Proton Mail
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/ko/encryption.md b/i18n/ko/encryption.md
index ded8533b..4391eba5 100644
--- a/i18n/ko/encryption.md
+++ b/i18n/ko/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/ko/index.md b/i18n/ko/index.md
index 32f2c5c3..eb90a3b9 100644
--- a/i18n/ko/index.md
+++ b/i18n/ko/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.ko.html
hide:
- navigation
@@ -39,11 +40,11 @@ schema:
##### "전 숨길 게 없어요. 프라이버시를 신경 써야 할 이유가 있나요?"
-다문화 가정, 성평등, 표현의 자유 등 여타 기본권과 마찬가지로, 우리의 사생활은 언제나 보장받아야 하지만 때론 그렇지 못한 것이 사실입니다. 여러 독재 정권 국가에서는 더더욱 그렇습니다. 사생활의 자유는 앞선 세대들이 싸워 쟁취해낸 권리입니다. =='사생활의 비밀과 자유'는 인간이라면 누구나 보장받아야 하며== 차별받거나 침해받아선 안 됩니다.
+다문화 가정, 성평등, 표현의 자유 등 여타 기본권과 마찬가지로, 우리의 사생활(프라이버시)은 언제나 보장받아야 하지만 때론 그렇지 못한 것이 사실입니다. 여러 독재 정권 국가에서는 더더욱 그렇습니다. 사생활의 자유는 앞선 세대들이 싸워 쟁취해낸 권리입니다. =='사생활의 비밀과 자유'는 인간이라면 누구나 보장받아야 하며== 차별받거나 침해받아선 안 됩니다.
'무언가를 숨기거나 감추는 것'과 '사생활 보호'를 혼동하면 안 됩니다. 여러분이 화장실에서 뭘 하는지는 명백함에도 불구하고, 여러분은 항상 화장실 문을 닫아둡니다. 이는 여러분이 무언가를 감추고자 한 것이 아닌, 사생활을 보호하고자 한 것이죠. **누구나** 보호해야 할 것이 있습니다. 우리가 사람답게 살기 위해서는 프라이버시가 필요합니다.
-[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" }
+[:material-target-account: 인터넷상의 일반적인 위협](basics/common-threats.md){ class="md-button md-button--primary" }
## 무엇을 해야 하나요?
@@ -53,7 +54,7 @@ schema:
==위협을 식별하고, 대응책을 정의하는 과정을 **위협 모델링**==이라 합니다. 훌륭한 보안, 개인정보 보호 계획이라면 언제나 그 근간에는 위협 모델링이 존재합니다.
-[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
+[:material-book-outline: 위협 모델링 자세히 알아보기](basics/threat-modeling.md){ class="md-button md-button--primary" }
---
@@ -67,4 +68,4 @@ schema:
[:material-information-outline:](about/index.md){ title="Privacy Guides에 대해 알아보기" }
[:material-hand-coin-outline:](about/donate.md){ title="프로젝트 후원하기" }
-Privacy Guides와 같은 사이트는 언제나 최신 정보를 제공하는 것이 중요합니다. 사이트에서 안내된 프로그램의 업데이트를 주시하고, 추천한 제공 업체 관련 최신 뉴스를 따라가기 위해서는 여러분들의 집단 지성이 필요합니다. 인터넷의 빠른 변화를 따라잡기는 쉽지 않지만, 우린 최선을 다하고 있습니다. 사이트에서 오류를 발견하셨거나, 특정 제공 업체가 목록에서 제외되어야 한다고 생각하시거나, 혹은 적절한 제공업체가 누락되었거나, 브라우저 플러그인이 더 이상 훌륭한 선택이 아니라고 생각하시는 등 각종 문제를 발견한 경우 알려주시기 바랍니다.
+Privacy Guides와 같은 사이트는 언제나 최신 정보를 제공하는 것이 중요합니다. 사이트에서 안내된 프로그램의 업데이트를 주시하고, 추천한 제공 업체 관련 최신 뉴스를 따라가기 위해서는 여러분들의 집단 지성이 필요합니다. 인터넷의 빠른 변화를 따라잡기는 쉽지 않지만, 우린 최선을 다하고 있습니다. 사이트에서 오류를 발견하셨거나, 특정 제공 업체가 목록에서 제외되어야 한다고 생각하시거나, 혹은 적절한 제공 업체가 누락되었거나, 브라우저 플러그인이 더 이상 훌륭한 선택이 아니라고 생각하시는 등 각종 문제를 발견한 경우 알려주시기 바랍니다.
diff --git a/i18n/ko/mobile-browsers.md b/i18n/ko/mobile-browsers.md
index 0ee8f40b..bdf0de25 100644
--- a/i18n/ko/mobile-browsers.md
+++ b/i18n/ko/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "모바일 브라우저"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/ko/multi-factor-authentication.md b/i18n/ko/multi-factor-authentication.md
index def33276..a4030c74 100644
--- a/i18n/ko/multi-factor-authentication.md
+++ b/i18n/ko/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/ko/passwords.md b/i18n/ko/passwords.md
index e361e3c6..e375cb4e 100644
--- a/i18n/ko/passwords.md
+++ b/i18n/ko/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "비밀번호 관리자"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/ko/real-time-communication.md b/i18n/ko/real-time-communication.md
index 68f9d767..7abd8617 100644
--- a/i18n/ko/real-time-communication.md
+++ b/i18n/ko/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/ko/search-engines.md b/i18n/ko/search-engines.md
index 911525d7..a590a9eb 100644
--- a/i18n/ko/search-engines.md
+++ b/i18n/ko/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/ko/tools.md b/i18n/ko/tools.md
index d9e57d9b..221131d1 100644
--- a/i18n/ko/tools.md
+++ b/i18n/ko/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/ko/tor.md b/i18n/ko/tor.md
index b1f2afbf..8142c1da 100644
--- a/i18n/ko/tor.md
+++ b/i18n/ko/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/ko/vpn.md b/i18n/ko/vpn.md
index 2556c40a..e281b025 100644
--- a/i18n/ko/vpn.md
+++ b/i18n/ko/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/ku-IQ/android.md b/i18n/ku-IQ/android.md
index 57de5696..f38572fd 100644
--- a/i18n/ku-IQ/android.md
+++ b/i18n/ku-IQ/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "ئەندرۆید"
icon: 'simple/android'
description: 'دەتوانیت سیستەمی کارپێکردن سەر تەلەفۆنی ئەندرۆیدەکەت بگۆڕیت بۆ ئەم جێگرەوانەی، کە پارێزراو و ڕێزگرن لە تایبەتمەندێتی.'
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/ku-IQ/basics/account-creation.md b/i18n/ku-IQ/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/ku-IQ/basics/account-creation.md
+++ b/i18n/ku-IQ/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/ku-IQ/basics/email-security.md b/i18n/ku-IQ/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/ku-IQ/basics/email-security.md
+++ b/i18n/ku-IQ/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/ku-IQ/basics/threat-modeling.md b/i18n/ku-IQ/basics/threat-modeling.md
index fc1b3b41..2cf64c5e 100644
--- a/i18n/ku-IQ/basics/threat-modeling.md
+++ b/i18n/ku-IQ/basics/threat-modeling.md
@@ -1,4 +1,5 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
diff --git a/i18n/ku-IQ/basics/vpn-overview.md b/i18n/ku-IQ/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/ku-IQ/basics/vpn-overview.md
+++ b/i18n/ku-IQ/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/ku-IQ/cloud.md b/i18n/ku-IQ/cloud.md
index df3a7bff..ec8f0a82 100644
--- a/i18n/ku-IQ/cloud.md
+++ b/i18n/ku-IQ/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/ku-IQ/cryptocurrency.md b/i18n/ku-IQ/cryptocurrency.md
index ba06ba1e..a994b44f 100644
--- a/i18n/ku-IQ/cryptocurrency.md
+++ b/i18n/ku-IQ/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/ku-IQ/data-redaction.md b/i18n/ku-IQ/data-redaction.md
index 961594a8..39b14f11 100644
--- a/i18n/ku-IQ/data-redaction.md
+++ b/i18n/ku-IQ/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/ku-IQ/desktop-browsers.md b/i18n/ku-IQ/desktop-browsers.md
index dbe6322f..ddf97bdb 100644
--- a/i18n/ku-IQ/desktop-browsers.md
+++ b/i18n/ku-IQ/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/ku-IQ/email.md b/i18n/ku-IQ/email.md
index 7e19eb10..8e674c7f 100644
--- a/i18n/ku-IQ/email.md
+++ b/i18n/ku-IQ/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "خزمەتگوزاری پۆستەی ئەلکتڕۆنی"
icon: material/email
description: ئەم دابینکەرانەی پۆستەی ئەلکتڕۆنی شوێنێکی نایاب پێشکەش دەکەن بۆ کۆکردنەوەی پۆستەکان بە پارێزراوی.
@@ -123,7 +124,7 @@ Mailbox.org هیچ جۆرە دراوێکی دیجیتاڵی قبوڵ ناکات
#### :material-check:{ .pg-green }پارێزراوێتی هەژمار
-Mailbox.org تەنها پشتگیری لە [سەلماندنی دووانی](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) بۆ ماڵپەری پۆستەی ئەلکتڕۆنییەکەیان دەکات. دەتوانیت TOTP بەکاربێنیت یان [Yubikey](https://en.wikipedia.org/wiki/YubiKey) لەڕێگای [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). شیوازە باوەکانی وەک [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) هێشتا پشتگیری نەکراون.
+Mailbox.org تەنها پشتگیری لە [سەلماندنی دووانی](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) بۆ ماڵپەری پۆستەی ئەلکتڕۆنییەکەیان دەکات. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). شیوازە باوەکانی وەک [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) هێشتا پشتگیری نەکراون.
#### :material-information-outline:{ .pg-blue }پارێزراوێتی زانیاری
diff --git a/i18n/ku-IQ/encryption.md b/i18n/ku-IQ/encryption.md
index ded8533b..4391eba5 100644
--- a/i18n/ku-IQ/encryption.md
+++ b/i18n/ku-IQ/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/ku-IQ/index.md b/i18n/ku-IQ/index.md
index 284686a3..b16f292e 100644
--- a/i18n/ku-IQ/index.md
+++ b/i18n/ku-IQ/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.en.html
hide:
- navigation
diff --git a/i18n/ku-IQ/mobile-browsers.md b/i18n/ku-IQ/mobile-browsers.md
index c6be3a37..acc0c9c2 100644
--- a/i18n/ku-IQ/mobile-browsers.md
+++ b/i18n/ku-IQ/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/ku-IQ/multi-factor-authentication.md b/i18n/ku-IQ/multi-factor-authentication.md
index def33276..a4030c74 100644
--- a/i18n/ku-IQ/multi-factor-authentication.md
+++ b/i18n/ku-IQ/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/ku-IQ/passwords.md b/i18n/ku-IQ/passwords.md
index 59579402..485231b1 100644
--- a/i18n/ku-IQ/passwords.md
+++ b/i18n/ku-IQ/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/ku-IQ/real-time-communication.md b/i18n/ku-IQ/real-time-communication.md
index 68f9d767..7abd8617 100644
--- a/i18n/ku-IQ/real-time-communication.md
+++ b/i18n/ku-IQ/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/ku-IQ/search-engines.md b/i18n/ku-IQ/search-engines.md
index 911525d7..a590a9eb 100644
--- a/i18n/ku-IQ/search-engines.md
+++ b/i18n/ku-IQ/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/ku-IQ/tools.md b/i18n/ku-IQ/tools.md
index d9e57d9b..221131d1 100644
--- a/i18n/ku-IQ/tools.md
+++ b/i18n/ku-IQ/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/ku-IQ/tor.md b/i18n/ku-IQ/tor.md
index b1f2afbf..8142c1da 100644
--- a/i18n/ku-IQ/tor.md
+++ b/i18n/ku-IQ/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/ku-IQ/vpn.md b/i18n/ku-IQ/vpn.md
index 459d8bd9..88052f9e 100644
--- a/i18n/ku-IQ/vpn.md
+++ b/i18n/ku-IQ/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/nl/about/donate.md b/i18n/nl/about/donate.md
index 965ec57f..7d289c6a 100644
--- a/i18n/nl/about/donate.md
+++ b/i18n/nl/about/donate.md
@@ -7,7 +7,7 @@ Het vergt veel [mensen](https://github.com/privacyguides/privacyguides.org/graph
Als je ons financieel wilt steunen, is de handigste methode voor ons om bij te dragen via Open Collective, een website die wordt beheerd door onze fiscale gastheer. Open Collective accepteert betalingen via creditcards, PayPal en bankoverschrijvingen.
-[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" }
+[Doneer op OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" } }
Donaties rechtstreeks aan ons Open Collective zijn in het algemeen aftrekbaar van de belasting in de VS, omdat onze fiscale gastheer (de Open Collective Foundation) een geregistreerde 501(c)3 organisatie is. Na jouw donatie ontvangt je een ontvangstbewijs van de Open Collective Foundation. Privacy Guides geeft geen financieel advies, en je dient contact op te nemen met uw belastingadviseur om na te gaan of dit op je van toepassing is.
diff --git a/i18n/nl/android.md b/i18n/nl/android.md
index 67d34b9f..3c9325f6 100644
--- a/i18n/nl/android.md
+++ b/i18n/nl/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: Je kunt het besturingssysteem op jouw Android-telefoon vervangen door deze veilige en privacy respecterende alternatieven.
@@ -89,8 +90,6 @@ Dit zijn de Android-besturingssystemen, apparaten en apps die wij aanbevelen om
[Algemeen Android-overzicht en -aanbevelingen :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Waarom we GrapheneOS aanbevelen boven CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP-derivaten
Wij raden je aan een van deze aangepaste Android-besturingssystemen op jouw toestel te installeren, in volgorde van voorkeur, afhankelijk van de compatibiliteit van jouw toestel met deze besturingssystemen.
@@ -120,6 +119,8 @@ GrapheneOS ondersteunt [Sandboxed Google Play](https://grapheneos.org/usage#sand
Google Pixel-telefoons zijn de enige apparaten die momenteel voldoen aan GrapheneOS's [hardware beveiligingseisen](https://grapheneos.org/faq#device-support).
+[Waarom we GrapheneOS aanbevelen boven CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ Wij bevelen op deze site een groot aantal Android-apps aan. De hier vermelde app
{ align=right }
{ align=right }
- **Auditor** is een app die hardwarebeveiligingsfuncties gebruikt om de integriteit van het apparaat te bewaken voor [ondersteunde apparaten](https://attestation.app/about#device-support). Momenteel werkt het alleen met GrapheneOS en het standaard besturingssysteem van het toestel.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacybeleid" }
diff --git a/i18n/nl/basics/account-creation.md b/i18n/nl/basics/account-creation.md
index e609c988..b391483c 100644
--- a/i18n/nl/basics/account-creation.md
+++ b/i18n/nl/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Het aanmaken van accounts"
icon: 'material/account-plus'
description: Online accounts aanmaken is bijna een internetbehoefte, neem deze stappen om ervoor te zorgen dat je privé blijft.
diff --git a/i18n/nl/basics/email-security.md b/i18n/nl/basics/email-security.md
index 7fbeabe3..806045e7 100644
--- a/i18n/nl/basics/email-security.md
+++ b/i18n/nl/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email beveiliging
icon: material/email
description: E-mail is op vele manieren inherent onveilig, en dit zijn enkele van de redenen waarom het niet onze eerste keuze is voor veilige communicatie.
@@ -22,7 +23,7 @@ E-mailproviders die je in staat stellen standaard toegangsprotocollen zoals IMAP
### Hoe bescherm ik mijn private sleutels?
-Een smartcard (zoals een [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) of [Nitrokey](https://www.nitrokey.com)) werkt door een geëncrypteerd e-mailbericht te ontvangen van een apparaat (telefoon, tablet, computer, enz.) waarop een e-mail/webmailclient draait. Het bericht wordt vervolgens door de smartcard ontsleuteld en de ontsleutelde inhoud wordt teruggestuurd naar het apparaat.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Het bericht wordt vervolgens door de smartcard ontsleuteld en de ontsleutelde inhoud wordt teruggestuurd naar het apparaat.
Het is gunstig dat de ontcijfering op de smartcard gebeurt om te voorkomen dat jouw privé-sleutel aan een gecompromitteerd apparaat wordt blootgesteld.
diff --git a/i18n/nl/basics/threat-modeling.md b/i18n/nl/basics/threat-modeling.md
index a010348c..2411ff52 100644
--- a/i18n/nl/basics/threat-modeling.md
+++ b/i18n/nl/basics/threat-modeling.md
@@ -1,10 +1,11 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Bedreiging Modellering"
icon: 'material/target-account'
-description: Een evenwicht vinden tussen veiligheid, privacy en gebruiksvriendelijkheid is een van de eerste en moeilijkste taken die je op jouw privacyreis tegenkomt.
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
-Een evenwicht vinden tussen veiligheid, privacy en gebruiksvriendelijkheid is een van de eerste en moeilijkste taken die je op jouw privacyreis tegenkomt. Alles is een afweging: hoe veiliger iets is, hoe beperkter of onhandiger het over het algemeen is, enzovoort. Vaak vinden mensen het probleem met de hulpmiddelen die ze aanbevolen zien, dat ze gewoon te moeilijk zijn om te beginnen gebruiken!
+Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Alles is een afweging: hoe veiliger iets is, hoe beperkter of onhandiger het over het algemeen is, enzovoort. Vaak vinden mensen het probleem met de hulpmiddelen die ze aanbevolen zien, dat ze gewoon te moeilijk zijn om te beginnen gebruiken!
Als je de **meest** veilige tools wilt gebruiken, moet je *veel* gebruiksgemak opofferen. En zelfs dan, ==niets is ooit volledig veilig.== Er is **hoge** veiligheid, maar nooit **volledige** veiligheid. Daarom zijn dreigingsmodellen belangrijk.
diff --git a/i18n/nl/basics/vpn-overview.md b/i18n/nl/basics/vpn-overview.md
index baa7229f..39c2c7bd 100644
--- a/i18n/nl/basics/vpn-overview.md
+++ b/i18n/nl/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN-overzicht
icon: material/vpn
description: Virtual Private Networks verleggen het risico van jouw ISP naar een derde partij die je vertrouwt. Je moet deze dingen in gedachten houden.
diff --git a/i18n/nl/cloud.md b/i18n/nl/cloud.md
index 7f7586dc..c8f4dd8f 100644
--- a/i18n/nl/cloud.md
+++ b/i18n/nl/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud opslag"
icon: material/file-cloud
description: Veel aanbieders van cloud-opslag eisen jouw volledige vertrouwen dat zij niet in jouw bestanden zullen kijken. Dit zijn de privé alternatieven!
diff --git a/i18n/nl/cryptocurrency.md b/i18n/nl/cryptocurrency.md
index 2b2412b5..a50f84a3 100644
--- a/i18n/nl/cryptocurrency.md
+++ b/i18n/nl/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/nl/data-redaction.md b/i18n/nl/data-redaction.md
index 93075d3f..bbad5fb0 100644
--- a/i18n/nl/data-redaction.md
+++ b/i18n/nl/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Redactie van gegevens en metagegevens"
icon: material/tag-remove
description: Gebruik deze hulpmiddelen om metadata zoals GPS-locatie en andere identificerende informatie te verwijderen uit foto's en bestanden die je deelt.
diff --git a/i18n/nl/desktop-browsers.md b/i18n/nl/desktop-browsers.md
index e29088c9..337ecd71 100644
--- a/i18n/nl/desktop-browsers.md
+++ b/i18n/nl/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: Deze webbrowsers bieden sterkere privacybescherming dan Google Chrome.
diff --git a/i18n/nl/email.md b/i18n/nl/email.md
index e5f86f8e..a81a36be 100644
--- a/i18n/nl/email.md
+++ b/i18n/nl/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Diensten"
icon: material/email
description: Deze e-mailproviders bieden een uitstekende plaats om jouw e-mails veilig op te slaan, en vele bieden interoperabele OpenPGP versleuteling met andere providers.
@@ -123,7 +124,7 @@ Mailbox.org accepteert geen Bitcoin of andere cryptocurrencies als gevolg van he
#### :material-check:{ .pg-green } Accountbeveiliging
-Mailbox.org ondersteunt [twee-factor authenticatie](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) alleen voor hun webmail. Je kunt TOTP of een [Yubikey](https://en.wikipedia.org/wiki/YubiKey) gebruiken via de [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Webstandaarden zoals [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) worden nog niet ondersteund.
+Mailbox.org ondersteunt [twee-factor authenticatie](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) alleen voor hun webmail. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Webstandaarden zoals [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) worden nog niet ondersteund.
#### :material-information-outline:{ .pg-blue } Gegevensbeveiliging
diff --git a/i18n/nl/encryption.md b/i18n/nl/encryption.md
index 5aaddf4e..e70fbff7 100644
--- a/i18n/nl/encryption.md
+++ b/i18n/nl/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Versleutelingssoftware"
icon: material/file-lock
description: Encryptie van gegevens is de enige manier om te controleren wie er toegang toe heeft. Met deze tools kun je jouw e-mails en andere bestanden versleutelen.
diff --git a/i18n/nl/index.md b/i18n/nl/index.md
index 0b88c440..3634e693 100644
--- a/i18n/nl/index.md
+++ b/i18n/nl/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.nl.html
hide:
- navigation
diff --git a/i18n/nl/mobile-browsers.md b/i18n/nl/mobile-browsers.md
index 3083a836..735d56d0 100644
--- a/i18n/nl/mobile-browsers.md
+++ b/i18n/nl/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobiele browsers"
icon: material/cellphone-information
description: Deze browsers zijn wat we momenteel aanbevelen voor standaard/niet-anoniem internetten op jouw telefoon.
diff --git a/i18n/nl/multi-factor-authentication.md b/i18n/nl/multi-factor-authentication.md
index 867acc69..200b0f3f 100644
--- a/i18n/nl/multi-factor-authentication.md
+++ b/i18n/nl/multi-factor-authentication.md
@@ -49,7 +49,7 @@ Voor de modellen die HOTP en TOTP ondersteunen, zijn er 3 slots voor HOTP en 15
!!! warning
- Hoewel Nitrokeys de HOTP/TOTP geheimen niet vrijgeven aan het apparaat waar ze op aangesloten zijn, is de HOTP en TOTP opslag **niet** versleuteld en is kwetsbaar voor fysieke aanvallen. Als je deze geheimen HOTP of TOTP wilt bewaren, raden we je ten zeerste aan om in plaats daarvan een Yubikey te gebruiken.
+ Hoewel Nitrokeys de HOTP/TOTP geheimen niet vrijgeven aan het apparaat waar ze op aangesloten zijn, is de HOTP en TOTP opslag **niet** versleuteld en is kwetsbaar voor fysieke aanvallen. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/nl/passwords.md b/i18n/nl/passwords.md
index c2a9bad0..799fb8eb 100644
--- a/i18n/nl/passwords.md
+++ b/i18n/nl/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Wachtwoord managers"
icon: material/form-textbox-password
description: Met wachtwoord Managers kunt je wachtwoorden en andere geheimen veilig opslaan en beheren met behulp van een hoofdwachtwoord.
@@ -6,7 +7,7 @@ schema:
-
"@context": http://schema.org
"@type": WebPage
- name: Password Manager Recommendations
+ name: Aanbevelingen voor wachtwoordbeheerders
url: "./"
-
"@context": http://schema.org
diff --git a/i18n/nl/real-time-communication.md b/i18n/nl/real-time-communication.md
index 84730fff..48b25d56 100644
--- a/i18n/nl/real-time-communication.md
+++ b/i18n/nl/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communicatie"
icon: material/chat-processing
description: Andere instant messengers maken al je privégesprekken beschikbaar voor het bedrijf dat ze beheert.
diff --git a/i18n/nl/search-engines.md b/i18n/nl/search-engines.md
index 97358a6a..fd755cce 100644
--- a/i18n/nl/search-engines.md
+++ b/i18n/nl/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Zoekmachines"
icon: material/search-web
description: Deze privacy respecterende zoekmachines bouwen geen advertentieprofiel op basis van jouw zoekopdrachten.
diff --git a/i18n/nl/tools.md b/i18n/nl/tools.md
index 1f7ba41c..b5b75bae 100644
--- a/i18n/nl/tools.md
+++ b/i18n/nl/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Hulpmiddelen"
icon: material/tools
hide:
diff --git a/i18n/nl/tor.md b/i18n/nl/tor.md
index ffe80387..bc6d0a08 100644
--- a/i18n/nl/tor.md
+++ b/i18n/nl/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Netwerk"
icon: simple/torproject
description: Bescherm je surf gedrag tegen pottenkijkers door gebruik te maken van het Tor netwerk, een beveiligd netwerk dat censuur omzeilt.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/nl/vpn.md b/i18n/nl/vpn.md
index 7e087ace..38798dea 100644
--- a/i18n/nl/vpn.md
+++ b/i18n/nl/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN-diensten"
icon: material/vpn
description: Dit zijn de beste VPN-diensten om jouw privacy en veiligheid online te beschermen. Vind hier een provider die er niet op uit is om je te bespioneren.
diff --git a/i18n/pl/android.md b/i18n/pl/android.md
index 690f8e8e..a9257531 100644
--- a/i18n/pl/android.md
+++ b/i18n/pl/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'fontawesome/brands/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## Pochodne AOSP
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! rekomendacja
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/pl/basics/account-creation.md b/i18n/pl/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/pl/basics/account-creation.md
+++ b/i18n/pl/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/pl/basics/email-security.md b/i18n/pl/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/pl/basics/email-security.md
+++ b/i18n/pl/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/pl/basics/threat-modeling.md b/i18n/pl/basics/threat-modeling.md
index 2b52e6ae..f8c1ae49 100644
--- a/i18n/pl/basics/threat-modeling.md
+++ b/i18n/pl/basics/threat-modeling.md
@@ -1,10 +1,11 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Czym są modele zagrożeń"
icon: 'material/target-account'
-description: Osiągnięcie kompromisu pomiędzy bezpieczeństwem, prywatnością oraz łatwością korzystania jest pierwszym, a zarazem najtrudniejszym zadaniem z jakim przyjdzie Ci się zmierzyć na swojej drodze do prywatności.
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
-Osiągnięcie kompromisu pomiędzy bezpieczeństwem, prywatnością oraz łatwością korzystania jest pierwszym, a zarazem najtrudniejszym zadaniem z jakim przyjdzie Ci się zmierzyć na swojej drodze do prywatności. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
+Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
Chcąc korzystać z **najbezpieczniejszych** narzędzi należy poświęcić *ogromną ilość* funkcji. And, even then, ==nothing is ever fully secure.== There's **high** security, but never **full** security. Z tego powodu, modele zagrożeń są ważne.
diff --git a/i18n/pl/basics/vpn-overview.md b/i18n/pl/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/pl/basics/vpn-overview.md
+++ b/i18n/pl/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/pl/cloud.md b/i18n/pl/cloud.md
index c236b1d5..133b3704 100644
--- a/i18n/pl/cloud.md
+++ b/i18n/pl/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/pl/cryptocurrency.md b/i18n/pl/cryptocurrency.md
index 8721af78..99b7f241 100644
--- a/i18n/pl/cryptocurrency.md
+++ b/i18n/pl/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/pl/data-redaction.md b/i18n/pl/data-redaction.md
index 4cace524..5da43dcf 100644
--- a/i18n/pl/data-redaction.md
+++ b/i18n/pl/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/pl/desktop-browsers.md b/i18n/pl/desktop-browsers.md
index 7994d3f9..72a6246b 100644
--- a/i18n/pl/desktop-browsers.md
+++ b/i18n/pl/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/pl/email.md b/i18n/pl/email.md
index dae83a18..7d2e4aeb 100644
--- a/i18n/pl/email.md
+++ b/i18n/pl/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/pl/encryption.md b/i18n/pl/encryption.md
index ac015322..9ff0dd41 100644
--- a/i18n/pl/encryption.md
+++ b/i18n/pl/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Oprogramowanie szyfrujące"
icon: material/file-lock
description: Szyfrowanie danych to jedyny sposób na kontrolowanie tego, kto ma do nich dostęp. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/pl/index.md b/i18n/pl/index.md
index 32a00f35..e70bd5de 100644
--- a/i18n/pl/index.md
+++ b/i18n/pl/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.pl.html
hide:
- navigation
diff --git a/i18n/pl/mobile-browsers.md b/i18n/pl/mobile-browsers.md
index 6b01a480..500e7cf2 100644
--- a/i18n/pl/mobile-browsers.md
+++ b/i18n/pl/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Przeglądarki mobilne"
icon: octicons/device-mobile-16
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/pl/multi-factor-authentication.md b/i18n/pl/multi-factor-authentication.md
index f0980cc8..18fd3ae2 100644
--- a/i18n/pl/multi-factor-authentication.md
+++ b/i18n/pl/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/pl/passwords.md b/i18n/pl/passwords.md
index 55d89ed8..7da1c50f 100644
--- a/i18n/pl/passwords.md
+++ b/i18n/pl/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/pl/real-time-communication.md b/i18n/pl/real-time-communication.md
index 7e9c8a31..027580eb 100644
--- a/i18n/pl/real-time-communication.md
+++ b/i18n/pl/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/pl/search-engines.md b/i18n/pl/search-engines.md
index 22c86ff0..d29f057c 100644
--- a/i18n/pl/search-engines.md
+++ b/i18n/pl/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/pl/tools.md b/i18n/pl/tools.md
index 8d9384e8..bb157ae6 100644
--- a/i18n/pl/tools.md
+++ b/i18n/pl/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Narzędzia ochrony prywatności"
icon: material/tools
hide:
diff --git a/i18n/pl/tor.md b/i18n/pl/tor.md
index 7a278205..3e9ee26d 100644
--- a/i18n/pl/tor.md
+++ b/i18n/pl/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/pl/vpn.md b/i18n/pl/vpn.md
index 83f4ab70..c0ea264a 100644
--- a/i18n/pl/vpn.md
+++ b/i18n/pl/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/pt-BR/advanced/dns-overview.md b/i18n/pt-BR/advanced/dns-overview.md
index 1eec3792..12789a10 100644
--- a/i18n/pt-BR/advanced/dns-overview.md
+++ b/i18n/pt-BR/advanced/dns-overview.md
@@ -1,24 +1,24 @@
---
title: "Introdução ao DNS"
icon: material/dns
-description: The Domain Name System is the "phonebook of the internet," helping your browser find the website it's looking for.
+description: O Sistema de Nome de Domínio é a "agenda telefônica da internet", ajudando seu navegador a encontrar o site que ele está procurando.
---
The [Domain Name System](https://en.wikipedia.org/wiki/Domain_Name_System) is the 'phonebook of the Internet'. DNS translates domain names to IP addresses so browsers and other services can load Internet resources, through a decentralized network of servers.
## O que é DNS?
-When you visit a website, a numerical address is returned. For example, when you visit `privacyguides.org`, the address `192.98.54.105` is returned.
+Quando você visita um site, é retornado um endereço numérico. Por exemplo, quando você visita `privacyguides.org`, o endereço `192.98.54.105` é retornado.
-DNS has existed since the [early days](https://en.wikipedia.org/wiki/Domain_Name_System#History) of the Internet. DNS requests made to and from DNS servers are **not** generally encrypted. In a residential setting, a customer is given servers by the ISP via [DHCP](https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol).
+DNS has existed since the [early days](https://en.wikipedia.org/wiki/Domain_Name_System#History) of the Internet. As solicitações de DNS feitas de e para servidores DNS geralmente **não** são criptografadas. In a residential setting, a customer is given servers by the ISP via [DHCP](https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol).
-Unencrypted DNS requests are able to be easily **surveilled** and **modified** in transit. In some parts of the world, ISPs are ordered to do primitive [DNS filtering](https://en.wikipedia.org/wiki/DNS_blocking). When you request the IP address of a domain that is blocked, the server may not respond or may respond with a different IP address. As the DNS protocol is not encrypted, the ISP (or any network operator) can use [DPI](https://en.wikipedia.org/wiki/Deep_packet_inspection) to monitor requests. ISPs can also block requests based on common characteristics, regardless of which DNS server is used. Unencrypted DNS always uses [port](https://en.wikipedia.org/wiki/Port_(computer_networking)) 53 and always uses UDP.
+Solicitações DNS não criptografadas podem ser facilmente **vigiadas** e **modificadas** em trânsito. In some parts of the world, ISPs are ordered to do primitive [DNS filtering](https://en.wikipedia.org/wiki/DNS_blocking). Quando você solicita o endereço IP de um domínio bloqueado, o servidor pode não responder ou pode responder com um endereço IP diferente. As the DNS protocol is not encrypted, the ISP (or any network operator) can use [DPI](https://en.wikipedia.org/wiki/Deep_packet_inspection) to monitor requests. Os ISPs também podem bloquear solicitações com base em características comuns, independentemente de qual servidor DNS é usado. Unencrypted DNS always uses [port](https://en.wikipedia.org/wiki/Port_(computer_networking)) 53 and always uses UDP.
Below, we discuss and provide a tutorial to prove what an outside observer may see using regular unencrypted DNS and [encrypted DNS](#what-is-encrypted-dns).
### DNS não Criptografado
-1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified:
+1. Usando [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (parte do projeto [Wireshark](https://en.wikipedia.org/wiki/Wireshark)), podemos monitorar e registrar o fluxo de pacotes da Internet. This command records packets that meet the rules specified:
```bash
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
diff --git a/i18n/pt-BR/android.md b/i18n/pt-BR/android.md
index ca51fe7b..7e0e1388 100644
--- a/i18n/pt-BR/android.md
+++ b/i18n/pt-BR/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recomendações para Android: GrapheneOS e DivestOS — Privacy Guides"
title: "Android"
icon: 'simple/android'
description: Você pode substituir o sistema operacional do seu celular Android por essas alternativas seguras e que respeitam a privacidade.
@@ -89,8 +90,6 @@ Estes são os sistemas operacionais, dispositivos e aplicações Android que rec
[Visão Geral do Android :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Por que recomendamos o GrapheneOS em vez do CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## Derivados do AOSP
Recomendamos instalar um desses sistemas operacionais Android personalizados em seu dispositivo, listados em ordem de preferência, dependendo da compatibilidade do seu dispositivo com esses sistemas operacionais.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Os telefones Google Pixel são os únicos dispositivos que atualmente atendem aos [requisitos de segurança de hardware do GrapheneOS](https://grapheneos.org/faq#device-support).
+[Por que recomendamos o GrapheneOS em vez do CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recomendação
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/pt-BR/basics/account-creation.md b/i18n/pt-BR/basics/account-creation.md
index fd13c324..6c290e01 100644
--- a/i18n/pt-BR/basics/account-creation.md
+++ b/i18n/pt-BR/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "Como Criar Contas na Internet de Forma Privada — Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/pt-BR/basics/email-security.md b/i18n/pt-BR/basics/email-security.md
index c5047e7c..0eba2107 100644
--- a/i18n/pt-BR/basics/email-security.md
+++ b/i18n/pt-BR/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Porque o E-mail Não é a Melhor Escolha para Privacidade e Segurança — Privacy Guides"
title: Segurança de Email
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### Como Protejo Minhas Chaves Privadas?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/pt-BR/basics/threat-modeling.md b/i18n/pt-BR/basics/threat-modeling.md
index ac0d872b..9e058c18 100644
--- a/i18n/pt-BR/basics/threat-modeling.md
+++ b/i18n/pt-BR/basics/threat-modeling.md
@@ -1,4 +1,5 @@
---
+meta_title: "Modelagem de Ameaças: O Primeiro Passo em sua Jornada de Privacidade — Privacy Guides"
title: "Modelagem de Ameaças"
icon: 'material/target-account'
description: Equilibrar segurança, privacidade e usabilidade é uma das primeiras e mais difíceis tarefas que você enfrentará em sua jornada de privacidade.
diff --git a/i18n/pt-BR/basics/vpn-overview.md b/i18n/pt-BR/basics/vpn-overview.md
index 643b7ae2..f5e514b1 100644
--- a/i18n/pt-BR/basics/vpn-overview.md
+++ b/i18n/pt-BR/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: As Redes Privadas Virtuais transferem o risco do seu ISP para um terceiro em quem você confia. You should keep these things in mind.
diff --git a/i18n/pt-BR/cloud.md b/i18n/pt-BR/cloud.md
index 275c0c2c..09396411 100644
--- a/i18n/pt-BR/cloud.md
+++ b/i18n/pt-BR/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "Melhores Fornecedores Privados e Seguros de Armazenamento em Nuvem — Privacy Guides"
title: "Armazenamento em nuvem"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/pt-BR/cryptocurrency.md b/i18n/pt-BR/cryptocurrency.md
index 7c0606c8..3d765c04 100644
--- a/i18n/pt-BR/cryptocurrency.md
+++ b/i18n/pt-BR/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Criptomoedas
icon: material/bank-circle
---
diff --git a/i18n/pt-BR/data-redaction.md b/i18n/pt-BR/data-redaction.md
index 961594a8..39b14f11 100644
--- a/i18n/pt-BR/data-redaction.md
+++ b/i18n/pt-BR/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/pt-BR/desktop-browsers.md b/i18n/pt-BR/desktop-browsers.md
index 9f2d19c0..d899ce81 100644
--- a/i18n/pt-BR/desktop-browsers.md
+++ b/i18n/pt-BR/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Navegadores de Internet que Respeitam a Privacidade para PC e Mac — Privacy Guides"
title: "Navegadores Desktop"
icon: material/laptop
description: Estes navegadores de internet dão uma proteção à privacidade mais forte do que o Google Chrome.
@@ -78,27 +79,27 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins
- [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos)
- [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux)
-Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Assim, é importante que você não modifique o navegador de forma alguma a não ser através do ajuste dos [níveis de segurança](https://tb-manual.torproject.org/security-settings/) predefinidos. Outras modificações tornariam a sua impressão digital única, derrotando o propósito de usar este navegador. Se você preferir personalizar mais o navegador e a identificação das suas impressões digitais não é uma preocupação para você, recomendamos o [Firefox](#firefox).
+Como o [Navegador Tor](tor.md), o Navegador Mullvad foi projetado para evitar a impressão digital, tornando a impressão digital de seu navegador igual a de todas as outras pessoas do Navegador Mullvad, de modo que ele inclui configurações e extensões predefinidas que são configuradas automaticamente pelos seguintes níveis de segurança padrão: Padrão *(Standard)*, Seguro *(Safer)* e O Mais Seguro *(Safest)*. Assim, é importante que você não modifique o navegador de forma alguma a não ser através do ajuste dos [níveis de segurança](https://tb-manual.torproject.org/security-settings/) disponíveis. Outras modificações tornariam a sua impressão digital única, derrotando o propósito de usar este navegador. Se você preferir personalizar mais o navegador e a identificação das suas impressões digitais não é uma preocupação para você, recomendamos o [Firefox](#firefox).
### Anti-Fingerprinting
**Without** using a [VPN](vpn.md), Mullvad Browser provides the same protections against [naive fingerprinting scripts](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) as other private browsers like Firefox+[Arkenfox](#arkenfox-advanced) or [Brave](#brave). O Navegador Mullvad oferece proteção pronta para uso, à custa de alguma flexibilidade e conveniência que outros navegadores privados podem oferecer.
-==For the strongest anti-fingerprinting protection, we recommend using Mullvad Browser in conjunction **with** a VPN==, whether that is Mullvad or another recommended VPN provider. Quando você estiver usando uma VPN e o Navegador Mullvad, você compartilhará uma impressão digital e um grupo de endereços IP com uma grande variedade de outras pessoas, dando a você uma "multidão" para se misturar. Esta estratégia é a única forma de frustrar scripts avançados de rastreamento, e é a mesma técnica anti-impressão digital usada pelo Navegador Tor.
+==Para a mais forte proteção contra impressões digitais, recomendamos o uso do Navegador Mullvad em conjunto **com** uma VPN==, seja ela Mullvad ou outro provedor de VPN recomendado. Quando você estiver usando uma VPN e o Navegador Mullvad, você compartilhará uma impressão digital e um grupo de endereços IP com uma grande variedade de outras pessoas, dando a você uma "multidão" para se misturar. Esta estratégia é a única forma de frustrar scripts avançados de rastreamento, e é a mesma técnica anti-impressão digital usada pelo Navegador Tor.
-Note que enquanto você pode usar o Navegador Mullvad com qualquer fornecedor de VPN, outras pessoas nessa VPN também devem estar usando o Mullvad Browser para que essa "multidão" exista, algo que é mais provável na Mullvad VPN do que em outros fornecedores, principalmente por causa do recente lançamento do Navegador Mullvad. Mullvad Browser does not have built-in VPN connectivity, nor does it check whether you are using a VPN before browsing; your VPN connection has to be configured and managed separately.
+Note que enquanto você pode usar o Navegador Mullvad com qualquer fornecedor de VPN, outras pessoas nessa VPN também devem estar usando o Mullvad Browser para que essa "multidão" exista, algo que é mais provável na Mullvad VPN do que em outros fornecedores, principalmente por causa do recente lançamento do Navegador Mullvad. O Navegador Mullvad não possui conectividade VPN integrada, nem verifica se você está usando uma VPN antes de navegar; sua conexão VPN precisa ser configurada e administrada separadamente.
-Mullvad Browser comes with the *uBlock Origin* and *NoScript* browser extensions pre-installed. While we typically [don't recommend](#extensions) adding *additional* browser extensions, these extensions that come pre-installed with the browser should **not** be removed or configured outside their default values, because doing so would noticeably make your browser fingerprint distinct from other Mullvad Browser users. It also comes pre-installed with the Mullvad Browser Extension, which *can* be safely removed without impacting your browser fingerprint if you would like, but is also safe to keep even if you don't use Mullvad VPN.
+O Navegador Mullvad vem com as extensões de navegador *uBlock Origin* e *NoScript* pré-instaladas. Ainda que normalmente [não recomendemos](#extensions) acrescentar *mais* extensões ao navegador, estas extensões que vêm pré-instaladas com o navegador **não** devem ser removidas ou configuradas fora de seus valores padrão, pois isso tornaria sua impressão digital do navegador visivelmente diferente de outros usuários do Navegador Mullvad. Ele também vem pré-instalado com a Extensão Mullvad Browser, que *pode* ser removida em segurança, se você quiser, sem afetar a impressão digital do seu navegador, mas também é seguro para manter mesmo se você não usar o Mullvad VPN.
-### Private Browsing Mode
+### Modo de Navegação Privada
-Mullvad Browser operates in permanent private browsing mode, meaning your history, cookies, and other site data will always be cleared every time the browser is closed. Your bookmarks, browser settings, and extension settings will still be preserved.
+O Navegador Mullvad opera em modo de navegação privada permanente, o que significa que o seu histórico, cookies e outros dados de sites serão apagados sempre que o navegador for fechado. Seus favoritos, configurações do navegador e configurações de extensão ainda serão preservados.
-This is required to prevent advanced forms of tracking, but does come at the cost of convenience and some Firefox features, such as Multi-Account Containers. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise don't work properly in Mullvad Browser, and Mullvad Browser for general browsing.
+Isso é necessário para evitar formas avançadas de rastreamento, mas vem com o custo de conveniência e alguns recursos do Firefox, como contêineres de várias contas. Lembre-se de que você sempre pode usar vários navegadores, por exemplo, você pode considerar usar o Firefox+ Arkenfox para alguns sites em que deseja permanecer conectado ou não funcionar corretamente no Navegador Mullvad, e usar o Navegador Mullvad para navegação geral.
### Mullvad Leta
-Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-engines.md), but it also comes preinstalled with **Mullvad Leta**, a search engine which requires an active Mullvad VPN subscription to access. Mullvad Leta queries Google's paid search API directly (which is why it is limited to paying subscribers), however because of this limitation it is possible for Mullvad to correlate search queries and Mullvad VPN accounts. For this reason we discourage the use of Mullvad Leta, even though Mullvad collects very little information about their VPN subscribers.
+Navegador de Mullvad vem com o DuckDuckGo definido como o [mecanismo de pesquisa padrão](search-engines.md), mas também vem pré-instalado com o **Mullvad Leta**, um mecanismo de busca que requer uma assinatura ativa do Mullvad VPN para acessar. A Mullvad Leta consulta diretamente a API de pesquisa paga do Google (razão pela qual se limita a assinantes pagos), no entanto, devido a esta limitação, é possível à Mullvad correlacionar as consultas de pesquisa e as contas VPN da Mullvad. Por esse motivo, desencorajamos o uso do Mullvad Leta, mesmo que o Mullvad colete muito pouca informação sobre seus assinantes de VPN.
## Firefox
@@ -126,30 +127,30 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-
### Firefox
-These options can be found in :material-menu: → **Settings**
+Essas opções podem ser encontradas em :material-menu: → **Configurações**
-#### Search
+#### Pesquisa
-- [ ] Uncheck **Provide search suggestions**
+- [ ] Desmarque **Mostrar sugestões de pesquisa**
-Search suggestion features may not be available in your region.
+Os recursos de sugestão de pesquisa podem não estar disponíveis na sua região.
-Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
+Sugestões de pesquisa enviam tudo o que você digita na barra de endereços para o mecanismo de pesquisa padrão, independente se você enviar uma pesquisa real. Desabilitar sugestões de busca permite que você controle com mais precisão quais dados você envia para o seu provedor de mecanismo de pesquisa.
-#### Privacy & Security
+#### Privacidade & Segurança
-##### Proteção Reforçada de Rastreio (ETP)
+##### Proteção aprimorada contra rastreamento (ETP)
-- Selecione **Strict**
+- [x] Selecione **Rigoroso**
-This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
+Isso protege você bloqueando rastreadores de mídia social, scripts de impressão digital (observe que isso não protege você de *todas as* impressões digitais), criptominers, “cookies” de rastreamento entre sites e alguns outros conteúdos de rastreamento. A Proteção aprimorada contra rastreamento (ETP) protege contra muitas ameaças comuns, mas isso não bloqueia todos os meios de rastreamento porque é projetado para ter um mínimo ou nenhum impacto na usabilidade do site.
-##### Firefox Suggest (US only)
+##### Firefox Suggest (apenas nos EUA)
-[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes.
+[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) é um recurso semelhante às sugestões de pesquisa que só está disponível nos EUA. Recomendamos desativá-lo pelo mesmo motivo que recomendamos desativar as sugestões de pesquisa. Se você não ver essas opções sob o **cabeçalho da barra de endereços**, você não tem esse novo experimento e pode ignorar essas alterações.
-- [ ] Uncheck **Suggestions from the web**
-- [ ] Uncheck **Suggestions from sponsors**
+- [ ] Desmarque **Sugestões da web**
+- [ ] Desmarque **Sugestões de patrocinadores**
##### Sanitizar ao Fechar
@@ -157,7 +158,7 @@ O serviço [Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy
- Selecione **Excluir cookies e dados do site quando o Firefox estiver fechado**
-Geralmente, não recomendamos a instalação de nenhuma extensão, pois elas aumentam sua superfície de ataque; no entanto, se você deseja o bloqueio de conteúdo, o [uBlock Origin](#additional-resources) pode ser útil para você. A extensão também é uma extensão :trophy: [recomendada](https://support.mozilla.org/kb/add-on-badges#w_recommended-extensions) pela Mozilla. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
+Isso protege você contra cookies persistentes, mas não te protege contra cookies adquiridos durante a atual sessão de navegação. A extensão também é uma extensão :trophy: [recomendada](https://support.mozilla.org/kb/add-on-badges#w_recommended-extensions) pela Mozilla. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
##### Desativar Telemetria
diff --git a/i18n/pt-BR/email.md b/i18n/pt-BR/email.md
index 2da6e8ad..6234c083 100644
--- a/i18n/pt-BR/email.md
+++ b/i18n/pt-BR/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recomendações de E-mail Privado Criptografado — Privacy Guides"
title: "Serviços de Email"
icon: material/email
description: Esses provedores de email oferecem um ótimo lugar para armazenar seus emails de forma segura, e muitos oferecem criptografia OpenPGP compatível com outros provedores.
@@ -121,7 +122,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/pt-BR/encryption.md b/i18n/pt-BR/encryption.md
index aba09710..63e4b1fc 100644
--- a/i18n/pt-BR/encryption.md
+++ b/i18n/pt-BR/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Softwares de Criptografia"
icon: material/file-lock
description: A criptografia de dados é a única maneira de controlar quem pode acessá-los. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/pt-BR/index.md b/i18n/pt-BR/index.md
index 83a914a1..ac45f90d 100644
--- a/i18n/pt-BR/index.md
+++ b/i18n/pt-BR/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Sua Fonte Independente de Privacidade e Segurança"
template: overrides/home.pt-BR.html
hide:
- navigation
@@ -39,25 +40,25 @@ schema:
##### "Não tenho nada a esconder. Por que eu deveria me preocupar com a minha privacidade?”
-Assim como o direito ao casamento inter-racial, o direito feminino de votar, a liberdade de expressão e muitos outros, nosso direito à privacidade nem sempre foi respeitado. Em várias ditaduras, ainda não é. Gerações anteriores à nossa lutaram pelo nosso direito à privacidade. ==Privacidade é um direito humano, inerente a todos nós,== ao qual temos direito (sem discriminação).
+Assim como o direito ao casamento inter-racial, o direito feminino de votar, a liberdade de expressão, e muitos outros, nosso direito à privacidade nem sempre foi respeitado. Em várias ditaduras, ainda não é. Gerações anteriores à nossa lutaram pelo nosso direito à privacidade. ==Privacidade é um direito humano, inerente a todos nós,== ao qual temos direito (sem discriminação).
-Você não deve confundir privacidade com sigilo. Sabemos o que acontece no banheiro, mas você ainda fecha a porta. Isso é porque você quer privacidade, não sigilo. **Todo mundo** tem algo para proteger. Privacidade é algo que nos torna humanos.
+Você não deve confundir privacidade com segredo. Sabemos o que acontece no banheiro, mas você ainda fecha a porta. Isso é porque você quer privacidade, não segredo. **Todo mundo** tem algo para proteger. Privacidade é algo que nos torna humanos.
-[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" }
+[:material-target-account: Ameaças Comuns na Internet ](basics/common-threats.md){ class="md-button md-button--primary" }
-## O que eu deveria fazer?
+## O que eu devo fazer?
##### Primeiro, você precisa fazer um plano
-Tentar proteger todos os seus dados de todos — o tempo todo — é impraticável, caro e exaustivo. Mas não se preocupe! A segurança é um processo e, ao pensar no futuro, você pode montar um plano que seja certo para você. Segurança não é apenas sobre as ferramentas que você usa ou o software que você baixa. Em vez disso, começa por entender as ameaças que você enfrenta e como você pode mitigá-las.
+Tentar proteger os seus dados contra todos, o tempo todo, é impraticável, caro e exaustivo. Mas não se preocupe! A segurança é um processo e, pensando no futuro, você pode construir um plano que seja o mais indicado para você. Segurança não é apenas sobre as ferramentas que você usa ou o programa que você baixa. Muito além disso, começa por perceber as ameaças únicas que você enfrenta, e como você pode reduzi-las.
-==Este processo de identificação de ameaças e definição de contramedidas é chamado de **threat modeling**==, e forma a base de todo bom plano de segurança e privacidade.
+==Este processo de identificação de ameaças e definição de contramedidas é chamado **modelagem de ameaça**==, e forma a base de todo bom plano de segurança e privacidade.
-[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
+[:material-book-outline: Saiba mais sobre a Modelagem de Ameaças](basics/threat-modeling.md){ class="md-button md-button--primary" }
---
-## Precisamos de você! Veja como participar do projeto:
+## Precisamos de você! Como se envolver:
[:simple-discourse:](https://discuss.privacyguides.net/){ title="Participe do nosso fórum" }
[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Siga-nos no Mastodon" }
diff --git a/i18n/pt-BR/mobile-browsers.md b/i18n/pt-BR/mobile-browsers.md
index 84150da7..f14e1f27 100644
--- a/i18n/pt-BR/mobile-browsers.md
+++ b/i18n/pt-BR/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/pt-BR/multi-factor-authentication.md b/i18n/pt-BR/multi-factor-authentication.md
index 9a8254ae..a0151c7b 100644
--- a/i18n/pt-BR/multi-factor-authentication.md
+++ b/i18n/pt-BR/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/pt-BR/passwords.md b/i18n/pt-BR/passwords.md
index a787a60f..b1ec8a72 100644
--- a/i18n/pt-BR/passwords.md
+++ b/i18n/pt-BR/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Gerenciadores de Senhas"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/pt-BR/real-time-communication.md b/i18n/pt-BR/real-time-communication.md
index 0c240a28..95ab1b7d 100644
--- a/i18n/pt-BR/real-time-communication.md
+++ b/i18n/pt-BR/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "Melhores Mensageiros Instantâneos Privados — Privacy Guides"
title: "Comunicação em Tempo Real"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/pt-BR/search-engines.md b/i18n/pt-BR/search-engines.md
index 392dd4db..0b01a9c7 100644
--- a/i18n/pt-BR/search-engines.md
+++ b/i18n/pt-BR/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Mecanismos de Pesquisa Recomendados: Alternativas Anônimas ao Google — Privacy Guides"
title: "Motores de busca"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/pt-BR/tools.md b/i18n/pt-BR/tools.md
index 4a8aee68..14e7c222 100644
--- a/i18n/pt-BR/tools.md
+++ b/i18n/pt-BR/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Ferramentas de Privacidade"
icon: material/tools
hide:
diff --git a/i18n/pt-BR/tor.md b/i18n/pt-BR/tor.md
index 545f0fc0..8c7e837e 100644
--- a/i18n/pt-BR/tor.md
+++ b/i18n/pt-BR/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Rede Tor"
icon: simple/torproject
description: Proteja a sua navegação na Internet de olhares curiosos utilizando a rede Tor, uma rede segura que contorna a censura.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Navegador Tor
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Navegador de Internet
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/pt-BR/vpn.md b/i18n/pt-BR/vpn.md
index 222bd426..a009b723 100644
--- a/i18n/pt-BR/vpn.md
+++ b/i18n/pt-BR/vpn.md
@@ -1,10 +1,11 @@
---
+meta_title: "Recomendações e Comparação de Serviços VPN Privados, Sem Patrocinadores ou Anúncios — Privacy Guides"
title: "Serviços de VPN"
icon: material/vpn
description: Estes são os melhores serviços VPN para proteger sua privacidade e segurança on-line. Encontre aqui um provedor que não tem como objetivo espionar você.
---
-Se você está procurando mais **privacidade** do seu ISP, em uma rede Wi-Fi pública, ou ao fazer torrent de arquivos, uma VPN pode ser a solução para você, desde que entenda os riscos envolvidos. Nós entendemos que estes provedores estão acima dos demais:
+Se você está procurando mais **privacidade** do seu provedor de internet (ISP), ou em uma rede Wi-Fi pública, ou ao fazer torrent de arquivos, uma VPN pode ser a solução para você, desde que entenda os riscos envolvidos. Nós entendemos que estes provedores estão acima dos demais:
@@ -140,13 +141,13 @@ Mullvad provides the source code for their desktop and mobile clients in their [
#### :material-check:{ .pg-green } Aceita Dinheiro e Monero
-Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin, Bitcoin Cash, **Monero** and **cash/local currency** as anonymous forms of payment. They also accept Swish and bank wire transfers.
+Mullvad, além de aceitar cartões de crédito/débito e PayPal, aceita Bitcoin, Bitcoin Cash, **Monero** e **dinheiro / moeda local** como formas anônimas de pagamento. Eles também aceitam Swish e transferências bancárias.
#### :material-check:{ .pg-green } Suporta WireGuard
Mullvad suporta o protocolo WireGuard®. [WireGuard](https://www.wireguard.com) é um protocolo mais recente que usa criptografia de última geração [](https://www.wireguard.com/protocol/). Além disso, WireGuard pretende ser mais simples e mais eficiente.
-Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/).
+Mullvad [recomenda](https://mullvad.net/en/help/why-wireguard/) o uso do WireGuard em seu serviço. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/).
#### :material-check:{ .pg-green } IPv6 Support
diff --git a/i18n/pt/android.md b/i18n/pt/android.md
index c94ec2f0..78dcec4c 100644
--- a/i18n/pt/android.md
+++ b/i18n/pt/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ Notavelmente, o GrapheneOS suporta [Sandboxed Google Play](https://grapheneos.or
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## Derivados AOSP
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -121,6 +120,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### CalyxOS
!!! nota
@@ -228,7 +229,10 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
!!! nota
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
- Orbot está frequentemente desatualizado no [repositório F-Droid](https://guardianproject.info/fdroid) e [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) do Projeto Guardian, então considere fazer o download diretamente do [repositório GitHub](https://github.com/guardianproject/orbot). Todas as versões são assinadas usando a mesma assinatura, portanto devem ser compatíveis umas com as outras.
+ { align=right }
+ { align=right }
+
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/pt/basics/account-creation.md b/i18n/pt/basics/account-creation.md
index 87b8b03a..89da8637 100644
--- a/i18n/pt/basics/account-creation.md
+++ b/i18n/pt/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/pt/basics/email-security.md b/i18n/pt/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/pt/basics/email-security.md
+++ b/i18n/pt/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/pt/basics/threat-modeling.md b/i18n/pt/basics/threat-modeling.md
index c93feab9..2e51b132 100644
--- a/i18n/pt/basics/threat-modeling.md
+++ b/i18n/pt/basics/threat-modeling.md
@@ -1,10 +1,11 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "evergreen"
icon: 'O que são modelos de ameaça?'
-description: Equilibrar segurança, privacidade e usabilidade é uma das primeiras e mais difíceis tarefas que você enfrentará na sua jornada de privacidade.
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
-Equilibrar segurança, privacidade e usabilidade é uma das primeiras e mais difíceis tarefas que você enfrentará na sua jornada de privacidade. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
+Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
Se você quisesse usar o **mais** ferramentas seguras disponíveis, você teria que sacrificar *muito* de usabilidade. And, even then, ==nothing is ever fully secure.== There's **high** security, but never **full** security. É por isso que os modelos de ameaça são importantes.
diff --git a/i18n/pt/basics/vpn-overview.md b/i18n/pt/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/pt/basics/vpn-overview.md
+++ b/i18n/pt/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/pt/cloud.md b/i18n/pt/cloud.md
index bddde3a0..ca657794 100644
--- a/i18n/pt/cloud.md
+++ b/i18n/pt/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Email"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/pt/cryptocurrency.md b/i18n/pt/cryptocurrency.md
index 2566b514..cbe3c5af 100644
--- a/i18n/pt/cryptocurrency.md
+++ b/i18n/pt/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/pt/data-redaction.md b/i18n/pt/data-redaction.md
index fabc8601..caea098c 100644
--- a/i18n/pt/data-redaction.md
+++ b/i18n/pt/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Ferramentas de encriptação"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/pt/desktop-browsers.md b/i18n/pt/desktop-browsers.md
index 69dc4532..a460c130 100644
--- a/i18n/pt/desktop-browsers.md
+++ b/i18n/pt/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/pt/email.md b/i18n/pt/email.md
index 299fe1e2..574a65c3 100644
--- a/i18n/pt/email.md
+++ b/i18n/pt/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -117,7 +118,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/pt/encryption.md b/i18n/pt/encryption.md
index 237f5673..c2237df7 100644
--- a/i18n/pt/encryption.md
+++ b/i18n/pt/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Software de encriptação"
icon: material/file-lock
description: A encriptação de dados é a única forma de controlar quem pode acessá-los. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/pt/index.md b/i18n/pt/index.md
index b5c32a84..7a44f19f 100644
--- a/i18n/pt/index.md
+++ b/i18n/pt/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.pt.html
hide:
- navigation
diff --git a/i18n/pt/mobile-browsers.md b/i18n/pt/mobile-browsers.md
index 5d44212d..4d25e412 100644
--- a/i18n/pt/mobile-browsers.md
+++ b/i18n/pt/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/pt/multi-factor-authentication.md b/i18n/pt/multi-factor-authentication.md
index c7b00ed1..ef0bcbf9 100644
--- a/i18n/pt/multi-factor-authentication.md
+++ b/i18n/pt/multi-factor-authentication.md
@@ -49,7 +49,7 @@ Para os modelos que suportam HOTP e TOTP, existem 3 slots para HOTP e 15 para TO
!!! Recomendamos que você verifique o [documentação](https://developers.yubico.com/SSH/) de Yubico sobre como configurar isso.
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! Recomendamos que você verifique o [documentação](https://developers.yubico.com/SSH/) de Yubico sobre como configurar isso.
diff --git a/i18n/pt/passwords.md b/i18n/pt/passwords.md
index 09d3bcf2..38e5edd3 100644
--- a/i18n/pt/passwords.md
+++ b/i18n/pt/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Redes Auto-Contidas"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/pt/real-time-communication.md b/i18n/pt/real-time-communication.md
index df81180a..922802b3 100644
--- a/i18n/pt/real-time-communication.md
+++ b/i18n/pt/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Clientes de streaming de vídeo"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/pt/search-engines.md b/i18n/pt/search-engines.md
index a0953385..b38dc1ab 100644
--- a/i18n/pt/search-engines.md
+++ b/i18n/pt/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Motores de Busca"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/pt/tools.md b/i18n/pt/tools.md
index a3eea02b..6ffeb5d8 100644
--- a/i18n/pt/tools.md
+++ b/i18n/pt/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Ferramentas de Privacidade"
icon: material/tools
hide:
diff --git a/i18n/pt/tor.md b/i18n/pt/tor.md
index de28076f..84055ad4 100644
--- a/i18n/pt/tor.md
+++ b/i18n/pt/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Navegador Tor
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/pt/vpn.md b/i18n/pt/vpn.md
index f74923e4..de061506 100644
--- a/i18n/pt/vpn.md
+++ b/i18n/pt/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/ru/android.md b/i18n/ru/android.md
index 163b7c24..f6f5d96a 100644
--- a/i18n/ru/android.md
+++ b/i18n/ru/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## Деривативы AOSP
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/ru/basics/account-creation.md b/i18n/ru/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/ru/basics/account-creation.md
+++ b/i18n/ru/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/ru/basics/email-security.md b/i18n/ru/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/ru/basics/email-security.md
+++ b/i18n/ru/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/ru/basics/threat-modeling.md b/i18n/ru/basics/threat-modeling.md
index bd784b8f..56e49ef2 100644
--- a/i18n/ru/basics/threat-modeling.md
+++ b/i18n/ru/basics/threat-modeling.md
@@ -1,10 +1,11 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Моделирование угроз"
icon: 'material/target-account'
-description: Баланс между безопасностью, конфиденциальностью и удобством использования - одна из первых и самых сложных задач, с которыми вы столкнетесь на пути к конфиденциальности.
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
-Баланс между безопасностью, конфиденциальностью и удобством использования - одна из первых и самых сложных задач, с которыми вы столкнетесь на пути к конфиденциальности. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
+Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
Если вы хотите использовать **наиболее** безопасные инструменты, то вам придется пожертвовать *множеством* удобств. And, even then, ==nothing is ever fully secure.== There's **high** security, but never **full** security. Поэтому модели угроз очень важны.
diff --git a/i18n/ru/basics/vpn-overview.md b/i18n/ru/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/ru/basics/vpn-overview.md
+++ b/i18n/ru/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/ru/cloud.md b/i18n/ru/cloud.md
index 28f4e75b..af844c3d 100644
--- a/i18n/ru/cloud.md
+++ b/i18n/ru/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Электронная почта"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/ru/cryptocurrency.md b/i18n/ru/cryptocurrency.md
index 441a1e50..1aa5bc72 100644
--- a/i18n/ru/cryptocurrency.md
+++ b/i18n/ru/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Криптовалюта
icon: material/bank-circle
---
diff --git a/i18n/ru/data-redaction.md b/i18n/ru/data-redaction.md
index 42ec0dcb..98d07d06 100644
--- a/i18n/ru/data-redaction.md
+++ b/i18n/ru/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Инструменты для шифрования"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/ru/desktop-browsers.md b/i18n/ru/desktop-browsers.md
index bbdb4f53..6af065da 100644
--- a/i18n/ru/desktop-browsers.md
+++ b/i18n/ru/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/ru/email.md b/i18n/ru/email.md
index f4b8a353..b45b8f4c 100644
--- a/i18n/ru/email.md
+++ b/i18n/ru/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Электронная почта"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/ru/encryption.md b/i18n/ru/encryption.md
index 99d89405..8ca0bef9 100644
--- a/i18n/ru/encryption.md
+++ b/i18n/ru/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Инструменты для шифрования"
icon: material/file-lock
description: Шифрование данных - единственный способ контролировать доступ к ним. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/ru/index.md b/i18n/ru/index.md
index 5ed86a3a..07830673 100644
--- a/i18n/ru/index.md
+++ b/i18n/ru/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.ru.html
hide:
- navigation
diff --git a/i18n/ru/mobile-browsers.md b/i18n/ru/mobile-browsers.md
index fa39da4b..fb305a19 100644
--- a/i18n/ru/mobile-browsers.md
+++ b/i18n/ru/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/ru/multi-factor-authentication.md b/i18n/ru/multi-factor-authentication.md
index c4a06cd7..3661c56a 100644
--- a/i18n/ru/multi-factor-authentication.md
+++ b/i18n/ru/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! note
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! note
diff --git a/i18n/ru/passwords.md b/i18n/ru/passwords.md
index f441334a..9d888cff 100644
--- a/i18n/ru/passwords.md
+++ b/i18n/ru/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Менеджеры паролей"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/ru/real-time-communication.md b/i18n/ru/real-time-communication.md
index 989f6799..0bbc4cfb 100644
--- a/i18n/ru/real-time-communication.md
+++ b/i18n/ru/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Мессенджеры"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/ru/search-engines.md b/i18n/ru/search-engines.md
index 42828131..e7610b1e 100644
--- a/i18n/ru/search-engines.md
+++ b/i18n/ru/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Поисковые системы"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/ru/tools.md b/i18n/ru/tools.md
index 9f79272e..f6fcda39 100644
--- a/i18n/ru/tools.md
+++ b/i18n/ru/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Инструменты обеспечения приватности"
icon: material/tools
hide:
diff --git a/i18n/ru/tor.md b/i18n/ru/tor.md
index e64226de..0b5a6046 100644
--- a/i18n/ru/tor.md
+++ b/i18n/ru/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Сеть Tor"
icon: simple/torproject
description: Защитите свой интернет-сёрфинг от посторонних глаз, используя сеть Tor - безопасную сеть, обходящую цензуру.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Браузер Tor
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/ru/vpn.md b/i18n/ru/vpn.md
index 10e4d2f1..dee815df 100644
--- a/i18n/ru/vpn.md
+++ b/i18n/ru/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN сервисы"
icon: material/vpn
description: Это лучшие VPN-сервисы для защиты вашей конфиденциальности и безопасности в Интернете. Найдите провайдера, который не будет шпионить за вами.
diff --git a/i18n/sv/android.md b/i18n/sv/android.md
index 20f12676..9852869c 100644
--- a/i18n/sv/android.md
+++ b/i18n/sv/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/sv/basics/account-creation.md b/i18n/sv/basics/account-creation.md
index 522e4363..ffb52dc1 100644
--- a/i18n/sv/basics/account-creation.md
+++ b/i18n/sv/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/sv/basics/email-security.md b/i18n/sv/basics/email-security.md
index b9762178..38f8d238 100644
--- a/i18n/sv/basics/email-security.md
+++ b/i18n/sv/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: E-postsäkerhet
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ E-postleverantörer som tillåter dig att använda standardprotokoll som IMAP oc
### Hur skyddar jag mina privata nycklar?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Meddelandet dekrypteras sedan av smartkortet och det dekrypterade innehållet skickas tillbaka till enheten.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Meddelandet dekrypteras sedan av smartkortet och det dekrypterade innehållet skickas tillbaka till enheten.
Det är fördelaktigt att dekrypteringen sker på smartkortet för att undvika att den privata nyckeln exponeras för en komprometterad enhet.
diff --git a/i18n/sv/basics/threat-modeling.md b/i18n/sv/basics/threat-modeling.md
index fc1b3b41..2cf64c5e 100644
--- a/i18n/sv/basics/threat-modeling.md
+++ b/i18n/sv/basics/threat-modeling.md
@@ -1,4 +1,5 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
diff --git a/i18n/sv/basics/vpn-overview.md b/i18n/sv/basics/vpn-overview.md
index a8dad25a..f33b7448 100644
--- a/i18n/sv/basics/vpn-overview.md
+++ b/i18n/sv/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN-översikt
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/sv/cloud.md b/i18n/sv/cloud.md
index 4743e729..6a029133 100644
--- a/i18n/sv/cloud.md
+++ b/i18n/sv/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Molnlagring"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/sv/cryptocurrency.md b/i18n/sv/cryptocurrency.md
index 25efd838..6d219099 100644
--- a/i18n/sv/cryptocurrency.md
+++ b/i18n/sv/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/sv/data-redaction.md b/i18n/sv/data-redaction.md
index 40f4450e..0247b266 100644
--- a/i18n/sv/data-redaction.md
+++ b/i18n/sv/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Redigering av data och metadata"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/sv/desktop-browsers.md b/i18n/sv/desktop-browsers.md
index 3423d761..ac0fe6e1 100644
--- a/i18n/sv/desktop-browsers.md
+++ b/i18n/sv/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/sv/email.md b/i18n/sv/email.md
index b9c8574f..8916221d 100644
--- a/i18n/sv/email.md
+++ b/i18n/sv/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/sv/encryption.md b/i18n/sv/encryption.md
index 38e6c936..31344af3 100644
--- a/i18n/sv/encryption.md
+++ b/i18n/sv/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Programvara för kryptering"
icon: material/file-lock
description: Kryptering av data är det enda sättet att kontrollera vem som har tillgång till dem. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/sv/index.md b/i18n/sv/index.md
index eb717d06..fc0d8496 100644
--- a/i18n/sv/index.md
+++ b/i18n/sv/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.sv.html
hide:
- navigation
diff --git a/i18n/sv/mobile-browsers.md b/i18n/sv/mobile-browsers.md
index 8f43e464..a90a1b9a 100644
--- a/i18n/sv/mobile-browsers.md
+++ b/i18n/sv/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobila webbläsare"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/sv/multi-factor-authentication.md b/i18n/sv/multi-factor-authentication.md
index f7b5d7f6..af2ddffc 100644
--- a/i18n/sv/multi-factor-authentication.md
+++ b/i18n/sv/multi-factor-authentication.md
@@ -49,7 +49,7 @@ För de modeller som stöder HOTP och TOTP finns det 3 platser för HOTP och 15
!!! varning
- Även om Nitrokeys inte lämnar ut HOTP/TOTP-hemligheterna till den enhet de är anslutna till, är HOTP- och TOTP-lagringen **inte** krypterad och sårbar för fysiska attacker. Om du vill lagra HOTP- eller TOTP-hemligheter rekommenderar vi starkt att du använder en Yubikey i stället.
+ Även om Nitrokeys inte lämnar ut HOTP/TOTP-hemligheterna till den enhet de är anslutna till, är HOTP- och TOTP-lagringen **inte** krypterad och sårbar för fysiska attacker. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! varning
diff --git a/i18n/sv/passwords.md b/i18n/sv/passwords.md
index c9714068..dffd5718 100644
--- a/i18n/sv/passwords.md
+++ b/i18n/sv/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Lösenordshanterare"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/sv/real-time-communication.md b/i18n/sv/real-time-communication.md
index d9157869..34047230 100644
--- a/i18n/sv/real-time-communication.md
+++ b/i18n/sv/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Realtidskommunikation"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/sv/search-engines.md b/i18n/sv/search-engines.md
index e4318c7e..5fb0d85b 100644
--- a/i18n/sv/search-engines.md
+++ b/i18n/sv/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Sökmotorer"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/sv/tools.md b/i18n/sv/tools.md
index 591fb521..a2d19c64 100644
--- a/i18n/sv/tools.md
+++ b/i18n/sv/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Verktyg för integritet"
icon: material/tools
hide:
diff --git a/i18n/sv/tor.md b/i18n/sv/tor.md
index 173de64a..1a211ad2 100644
--- a/i18n/sv/tor.md
+++ b/i18n/sv/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor-nätverket"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/sv/vpn.md b/i18n/sv/vpn.md
index 93ab955f..12ba50f8 100644
--- a/i18n/sv/vpn.md
+++ b/i18n/sv/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/tr/android.md b/i18n/tr/android.md
index 2c9daa50..be480b23 100644
--- a/i18n/tr/android.md
+++ b/i18n/tr/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! öneri
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/tr/basics/account-creation.md b/i18n/tr/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/tr/basics/account-creation.md
+++ b/i18n/tr/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/tr/basics/email-security.md b/i18n/tr/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/tr/basics/email-security.md
+++ b/i18n/tr/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/tr/basics/threat-modeling.md b/i18n/tr/basics/threat-modeling.md
index a35b694c..30bb7807 100644
--- a/i18n/tr/basics/threat-modeling.md
+++ b/i18n/tr/basics/threat-modeling.md
@@ -1,10 +1,11 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Tehdit Modellemesi"
icon: 'material/target-account'
-description: Gizlilik yolculuğunuzda yüzleşeceğiniz ilk ve en zorlu görev; güvenliği, gizliliği ve kullanılabilirliği dengeleyebilmektir.
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
-Gizlilik yolculuğunuzda yüzleşeceğiniz ilk ve en zorlu görev; güvenliği, gizliliği ve kullanılabilirliği dengeleyebilmektir. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
+Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
If you wanted to use the **most** secure tools available, you'd have to sacrifice *a lot* of usability. And, even then, ==nothing is ever fully secure.== There's **high** security, but never **full** security. Bu yüzden tehdit modelleri önemlidir.
diff --git a/i18n/tr/basics/vpn-overview.md b/i18n/tr/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/tr/basics/vpn-overview.md
+++ b/i18n/tr/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/tr/cloud.md b/i18n/tr/cloud.md
index 7539dc96..922ea85a 100644
--- a/i18n/tr/cloud.md
+++ b/i18n/tr/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/tr/cryptocurrency.md b/i18n/tr/cryptocurrency.md
index bb268f7a..5ccba828 100644
--- a/i18n/tr/cryptocurrency.md
+++ b/i18n/tr/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/tr/data-redaction.md b/i18n/tr/data-redaction.md
index bbb28647..793cc206 100644
--- a/i18n/tr/data-redaction.md
+++ b/i18n/tr/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/tr/desktop-browsers.md b/i18n/tr/desktop-browsers.md
index 85cacc51..4796ac21 100644
--- a/i18n/tr/desktop-browsers.md
+++ b/i18n/tr/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Masaüstü Tarayıcıları"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/tr/email.md b/i18n/tr/email.md
index aa40e6d6..835cd3ad 100644
--- a/i18n/tr/email.md
+++ b/i18n/tr/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/tr/encryption.md b/i18n/tr/encryption.md
index b12cdc8b..1c9eb7c3 100644
--- a/i18n/tr/encryption.md
+++ b/i18n/tr/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/tr/index.md b/i18n/tr/index.md
index 4cacd505..f45c8c80 100644
--- a/i18n/tr/index.md
+++ b/i18n/tr/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.tr.html
hide:
- navigation
diff --git a/i18n/tr/mobile-browsers.md b/i18n/tr/mobile-browsers.md
index 72681d00..f5a5d261 100644
--- a/i18n/tr/mobile-browsers.md
+++ b/i18n/tr/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/tr/multi-factor-authentication.md b/i18n/tr/multi-factor-authentication.md
index d2f857fd..7e217b39 100644
--- a/i18n/tr/multi-factor-authentication.md
+++ b/i18n/tr/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/tr/passwords.md b/i18n/tr/passwords.md
index 0900e9ae..e5423ffc 100644
--- a/i18n/tr/passwords.md
+++ b/i18n/tr/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/tr/real-time-communication.md b/i18n/tr/real-time-communication.md
index cabf9f4d..5bc4ad3b 100644
--- a/i18n/tr/real-time-communication.md
+++ b/i18n/tr/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Gerçek Zamanlı İletişim"
icon: material/chat-processing
description: Diğer anlık mesajlaşma uygulamaları, tüm özel konuşmalarınızı kendilerini işleten şirketin kullanımına sunuyor.
diff --git a/i18n/tr/search-engines.md b/i18n/tr/search-engines.md
index 72087382..04e6d06f 100644
--- a/i18n/tr/search-engines.md
+++ b/i18n/tr/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/tr/tools.md b/i18n/tr/tools.md
index 54c45a41..edc3c7aa 100644
--- a/i18n/tr/tools.md
+++ b/i18n/tr/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/tr/tor.md b/i18n/tr/tor.md
index 78b374b1..ee02c2cf 100644
--- a/i18n/tr/tor.md
+++ b/i18n/tr/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Tarayıcı
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/tr/vpn.md b/i18n/tr/vpn.md
index 4f441906..33b2b24e 100644
--- a/i18n/tr/vpn.md
+++ b/i18n/tr/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/uk/android.md b/i18n/uk/android.md
index fbcabfd2..702b1962 100644
--- a/i18n/uk/android.md
+++ b/i18n/uk/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! рекомендації
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/uk/basics/account-creation.md b/i18n/uk/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/uk/basics/account-creation.md
+++ b/i18n/uk/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/uk/basics/email-security.md b/i18n/uk/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/uk/basics/email-security.md
+++ b/i18n/uk/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/uk/basics/threat-modeling.md b/i18n/uk/basics/threat-modeling.md
index 9f0ba7db..03035001 100644
--- a/i18n/uk/basics/threat-modeling.md
+++ b/i18n/uk/basics/threat-modeling.md
@@ -1,7 +1,8 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Моделювання загроз"
icon: 'material/target-account'
-description: Баланс між безпекою, конфіденційністю та зручністю використання - одне з перших і найскладніших завдань, з яким ви зіткнетеся на шляху до приватності.
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
Баланс між безпекою, конфіденційністю та зручністю використання - одне з перших і найскладніших завдань, з яким ви зіткнетеся на шляху до приватності. У всьому є компроміс: чим безпечніше щось, тим більш обмежувальним або незручним воно є в цілому і т.д. Часто люди вважають, що проблема з рекомендованими інструментами полягає в тому, що їх занадто складно почати використовувати!
diff --git a/i18n/uk/basics/vpn-overview.md b/i18n/uk/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/uk/basics/vpn-overview.md
+++ b/i18n/uk/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/uk/cloud.md b/i18n/uk/cloud.md
index 3dade49b..a1fa59cb 100644
--- a/i18n/uk/cloud.md
+++ b/i18n/uk/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/uk/cryptocurrency.md b/i18n/uk/cryptocurrency.md
index 9c7289a8..513f385b 100644
--- a/i18n/uk/cryptocurrency.md
+++ b/i18n/uk/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/uk/data-redaction.md b/i18n/uk/data-redaction.md
index 9cb58e36..eeabfaac 100644
--- a/i18n/uk/data-redaction.md
+++ b/i18n/uk/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/uk/desktop-browsers.md b/i18n/uk/desktop-browsers.md
index 9b5ad531..73dccf68 100644
--- a/i18n/uk/desktop-browsers.md
+++ b/i18n/uk/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/uk/email.md b/i18n/uk/email.md
index 7f4d483f..c509ef89 100644
--- a/i18n/uk/email.md
+++ b/i18n/uk/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Сервіси електронної пошти"
icon: material/email
description: Ці провайдери електронної пошти пропонують чудове місце для безпечного зберігання ваших листів, а багато з них пропонують сумісне з іншими провайдерами шифрування OpenPGP.
@@ -123,7 +124,7 @@ Mailbox.org не приймає жодних криптовалют, оскіл
#### :material-check:{ .pg-green } Безпека облікового запису
-Mailbox.org підтримує [двофакторну аутентифікацію](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) лише для їхньої електронної пошти. Ви можете використовувати TOTP або [Yubikey](https://en.wikipedia.org/wiki/YubiKey) через [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Веб-стандарти, такі як [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) на цей момент не підтримуються.
+Mailbox.org підтримує [двофакторну аутентифікацію](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) лише для їхньої електронної пошти. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Веб-стандарти, такі як [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) на цей момент не підтримуються.
#### :material-information-outline:{ .pg-blue } Безпека даних
diff --git a/i18n/uk/encryption.md b/i18n/uk/encryption.md
index ad322182..86ba5da1 100644
--- a/i18n/uk/encryption.md
+++ b/i18n/uk/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/uk/index.md b/i18n/uk/index.md
index 241076a9..589c3540 100644
--- a/i18n/uk/index.md
+++ b/i18n/uk/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.uk.html
hide:
- navigation
diff --git a/i18n/uk/mobile-browsers.md b/i18n/uk/mobile-browsers.md
index 8ff0e992..91e215d4 100644
--- a/i18n/uk/mobile-browsers.md
+++ b/i18n/uk/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/uk/multi-factor-authentication.md b/i18n/uk/multi-factor-authentication.md
index 84955985..d39b2535 100644
--- a/i18n/uk/multi-factor-authentication.md
+++ b/i18n/uk/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/uk/passwords.md b/i18n/uk/passwords.md
index 48b9a92f..a00dd27f 100644
--- a/i18n/uk/passwords.md
+++ b/i18n/uk/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/uk/real-time-communication.md b/i18n/uk/real-time-communication.md
index 1062db12..8a807e54 100644
--- a/i18n/uk/real-time-communication.md
+++ b/i18n/uk/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/uk/search-engines.md b/i18n/uk/search-engines.md
index 5eccf292..8fe3eac3 100644
--- a/i18n/uk/search-engines.md
+++ b/i18n/uk/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/uk/tools.md b/i18n/uk/tools.md
index a38a5b7f..3a0f8176 100644
--- a/i18n/uk/tools.md
+++ b/i18n/uk/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/uk/tor.md b/i18n/uk/tor.md
index 8dfd3a6a..838ccbd2 100644
--- a/i18n/uk/tor.md
+++ b/i18n/uk/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/uk/vpn.md b/i18n/uk/vpn.md
index 871dcd72..a70ab154 100644
--- a/i18n/uk/vpn.md
+++ b/i18n/uk/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/vi/android.md b/i18n/vi/android.md
index 27bc645c..463cd30c 100644
--- a/i18n/vi/android.md
+++ b/i18n/vi/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'fontawesome/brands/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -116,6 +115,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### CalyxOS
!!! khuyến nghị
@@ -218,7 +219,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/vi/basics/account-creation.md b/i18n/vi/basics/account-creation.md
index afa5d429..87f1eddc 100644
--- a/i18n/vi/basics/account-creation.md
+++ b/i18n/vi/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/vi/basics/email-security.md b/i18n/vi/basics/email-security.md
index 4654b3ce..5eb3132f 100644
--- a/i18n/vi/basics/email-security.md
+++ b/i18n/vi/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
diff --git a/i18n/vi/basics/threat-modeling.md b/i18n/vi/basics/threat-modeling.md
index fc1b3b41..2cf64c5e 100644
--- a/i18n/vi/basics/threat-modeling.md
+++ b/i18n/vi/basics/threat-modeling.md
@@ -1,4 +1,5 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
diff --git a/i18n/vi/basics/vpn-overview.md b/i18n/vi/basics/vpn-overview.md
index 06d19ab9..bfbc0670 100644
--- a/i18n/vi/basics/vpn-overview.md
+++ b/i18n/vi/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/vi/cloud.md b/i18n/vi/cloud.md
index f12edec8..72625238 100644
--- a/i18n/vi/cloud.md
+++ b/i18n/vi/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/vi/cryptocurrency.md b/i18n/vi/cryptocurrency.md
index 3a9abb2c..67264f4c 100644
--- a/i18n/vi/cryptocurrency.md
+++ b/i18n/vi/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/vi/data-redaction.md b/i18n/vi/data-redaction.md
index cbbc4113..e3a76ca2 100644
--- a/i18n/vi/data-redaction.md
+++ b/i18n/vi/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/vi/desktop-browsers.md b/i18n/vi/desktop-browsers.md
index e41ef6d4..33107bab 100644
--- a/i18n/vi/desktop-browsers.md
+++ b/i18n/vi/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/vi/email.md b/i18n/vi/email.md
index dd0d2361..b5dd082c 100644
--- a/i18n/vi/email.md
+++ b/i18n/vi/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/vi/encryption.md b/i18n/vi/encryption.md
index 2be6f6bb..0b90186f 100644
--- a/i18n/vi/encryption.md
+++ b/i18n/vi/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/vi/index.md b/i18n/vi/index.md
index 5b27275c..c7b1f065 100644
--- a/i18n/vi/index.md
+++ b/i18n/vi/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.vi.html
hide:
- navigation
diff --git a/i18n/vi/mobile-browsers.md b/i18n/vi/mobile-browsers.md
index 6ac46fa7..4ac900e6 100644
--- a/i18n/vi/mobile-browsers.md
+++ b/i18n/vi/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/vi/multi-factor-authentication.md b/i18n/vi/multi-factor-authentication.md
index 61ef62c5..e51dfb59 100644
--- a/i18n/vi/multi-factor-authentication.md
+++ b/i18n/vi/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning
diff --git a/i18n/vi/passwords.md b/i18n/vi/passwords.md
index ccfa8de8..1c79562f 100644
--- a/i18n/vi/passwords.md
+++ b/i18n/vi/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/vi/real-time-communication.md b/i18n/vi/real-time-communication.md
index 621316c0..aca22eda 100644
--- a/i18n/vi/real-time-communication.md
+++ b/i18n/vi/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/vi/search-engines.md b/i18n/vi/search-engines.md
index cd43dd43..65c38f2c 100644
--- a/i18n/vi/search-engines.md
+++ b/i18n/vi/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/vi/tools.md b/i18n/vi/tools.md
index b4bf897f..de42db39 100644
--- a/i18n/vi/tools.md
+++ b/i18n/vi/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
diff --git a/i18n/vi/tor.md b/i18n/vi/tor.md
index 645e3d4e..33c30c8e 100644
--- a/i18n/vi/tor.md
+++ b/i18n/vi/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - Android
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/vi/vpn.md b/i18n/vi/vpn.md
index ab74c9d9..e0ee3883 100644
--- a/i18n/vi/vpn.md
+++ b/i18n/vi/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/i18n/zh-Hant/android.md b/i18n/zh-Hant/android.md
index 98346814..b96629b4 100644
--- a/i18n/zh-Hant/android.md
+++ b/i18n/zh-Hant/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "安卓"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- **Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
diff --git a/i18n/zh-Hant/basics/account-creation.md b/i18n/zh-Hant/basics/account-creation.md
index 67910ab8..b43f2c20 100644
--- a/i18n/zh-Hant/basics/account-creation.md
+++ b/i18n/zh-Hant/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "帳號創建"
icon: 'material/account-plus'
description: 創建帳戶為實際連線網際網路所必要,請採取下列步驟確保您的線上隱私。
diff --git a/i18n/zh-Hant/basics/email-security.md b/i18n/zh-Hant/basics/email-security.md
index 0571e0c5..b3523fcc 100644
--- a/i18n/zh-Hant/basics/email-security.md
+++ b/i18n/zh-Hant/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: 電子郵件安全
icon: material/email
description: 從許多方面來看電子郵件本質上是不安全的,這也是它並非安全通信首選的原因。
@@ -22,7 +23,7 @@ description: 從許多方面來看電子郵件本質上是不安全的,這也
### 我要怎樣保護自己的私密鑰匙?
-智慧鑰卡(例如 [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) 或 [Nitrokey](https://www.nitrokey.com))的工作原理是從執行電子郵件/網絡郵件用戶端的設備(手機,平板電腦,電腦等)接收加密的電子郵件消息。 安全鑰卡會解密該訊息再把解開的內容傳到設備。
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. 安全鑰卡會解密該訊息再把解開的內容傳到設備。
在智能卡上進行解密是有利的,以避免可能將您的私鑰暴露在受損的設備上。
diff --git a/i18n/zh-Hant/basics/threat-modeling.md b/i18n/zh-Hant/basics/threat-modeling.md
index ffc812f4..9048152e 100644
--- a/i18n/zh-Hant/basics/threat-modeling.md
+++ b/i18n/zh-Hant/basics/threat-modeling.md
@@ -1,7 +1,8 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "建立威脅模型"
icon: 'material/target-account'
-description: 平衡安全性、隱私權和可用性是您在隱私權之旅中將面臨的首要和最困難的任務之一。
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
平衡安全性、隱私權和可用性是您在隱私權之旅中將面臨的首要和最困難的任務之一。 一切都要各方權衡:越安全的東西,它通常越受限制或越不方便。 通常,人們發現那些被推薦的工具的問題是它們太難開始使用了!
diff --git a/i18n/zh-Hant/basics/vpn-overview.md b/i18n/zh-Hant/basics/vpn-overview.md
index 4a845067..b72dd6ff 100644
--- a/i18n/zh-Hant/basics/vpn-overview.md
+++ b/i18n/zh-Hant/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN 簡介
icon: material/vpn
description: 虛擬私用網路將風險從您的ISP 轉移到您信任的第三方。 你應該記住這些事情。
diff --git a/i18n/zh-Hant/cloud.md b/i18n/zh-Hant/cloud.md
index 48ee2762..7a4ea105 100644
--- a/i18n/zh-Hant/cloud.md
+++ b/i18n/zh-Hant/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "雲端儲存"
icon: material/file-cloud
description: 許多雲端儲存服務供應商需要您相信他們不會查看您的檔案。 這些都是私密替代品!
diff --git a/i18n/zh-Hant/cryptocurrency.md b/i18n/zh-Hant/cryptocurrency.md
index 5c36aac6..9446f20f 100644
--- a/i18n/zh-Hant/cryptocurrency.md
+++ b/i18n/zh-Hant/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: 加密貨幣
icon: material/bank-circle
---
diff --git a/i18n/zh-Hant/data-redaction.md b/i18n/zh-Hant/data-redaction.md
index c2acc05e..e4b1255e 100644
--- a/i18n/zh-Hant/data-redaction.md
+++ b/i18n/zh-Hant/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "資料和中繼資料處理"
icon: material/tag-remove
description: 使用這些工具來移除所分享的相片和文件中的GPS定位和其他識別資訊等中繼資料。
diff --git a/i18n/zh-Hant/desktop-browsers.md b/i18n/zh-Hant/desktop-browsers.md
index ca6024ec..b6b0b713 100644
--- a/i18n/zh-Hant/desktop-browsers.md
+++ b/i18n/zh-Hant/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Desktop Browsers"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/zh-Hant/email.md b/i18n/zh-Hant/email.md
index 0af9ed55..1e71b545 100644
--- a/i18n/zh-Hant/email.md
+++ b/i18n/zh-Hant/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "電子郵件服務"
icon: material/email
description: 這些電子郵件提供商提供了一個好地方來安全地存儲您的電子郵件,也有不少能與其他供應商相互操作的 OpenPGP 加密。
@@ -123,7 +124,7 @@ Mailbox.org 不接受任何加密貨幣,因為他們的支付處理商 BitPay
#### :material-check:{ .pg-green } 帳戶安全
-Mailbox.org支援 [雙因素驗證](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) ,僅適用於他們的網絡郵件。 您可以通過 [Yubicloud ](https://www.yubico.com/products/services-software/yubicloud)使用 TOTP 或 [ Yubikey ](https://en.wikipedia.org/wiki/YubiKey) 。 Web 標準如 [WebAuthn ](https://en.wikipedia.org/wiki/WebAuthn) 尚不支援。
+Mailbox.org支援 [雙因素驗證](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) ,僅適用於他們的網絡郵件。 You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web 標準如 [WebAuthn ](https://en.wikipedia.org/wiki/WebAuthn) 尚不支援。
#### :material-information-outline:{ .pg-blue } 資料安全
diff --git a/i18n/zh-Hant/encryption.md b/i18n/zh-Hant/encryption.md
index 3c61c140..5ace4149 100644
--- a/i18n/zh-Hant/encryption.md
+++ b/i18n/zh-Hant/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "加密軟體"
icon: material/file-lock
description: 數據加密是控制誰可以訪問它的唯一方法。 這些工具允許您加密電子郵件和任何其他檔案。
diff --git a/i18n/zh-Hant/index.md b/i18n/zh-Hant/index.md
index f20be2b3..b84d6896 100644
--- a/i18n/zh-Hant/index.md
+++ b/i18n/zh-Hant/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.zh-Hant.html
hide:
- navigation
diff --git a/i18n/zh-Hant/mobile-browsers.md b/i18n/zh-Hant/mobile-browsers.md
index 66858c52..7cfdc7c6 100644
--- a/i18n/zh-Hant/mobile-browsers.md
+++ b/i18n/zh-Hant/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "行動瀏覽器"
icon: material/cellphone-information
description: 這些瀏覽器是我們目前推薦在手機使用的標準/非匿名互聯網瀏覽器。
diff --git a/i18n/zh-Hant/multi-factor-authentication.md b/i18n/zh-Hant/multi-factor-authentication.md
index ecf15cf6..c201dd67 100644
--- a/i18n/zh-Hant/multi-factor-authentication.md
+++ b/i18n/zh-Hant/multi-factor-authentication.md
@@ -49,7 +49,7 @@ YubiKeys可以利用 [YubiKey Manager](https://www.yubico.com/support/download/y
!!! 警告
- 雖然 Nitrokeys 不會將 HOTP/TOTP 機密釋放給所插入的設備,但HOTP 和 TOTP存儲* *未經加密* * ,容易受到物理攻擊。 如果您需要存儲 HOTP 或 TOTP 這類祕密,強烈建議您使用Yubikey 代替。
+ 雖然 Nitrokeys 不會將 HOTP/TOTP 機密釋放給所插入的設備,但HOTP 和 TOTP存儲* *未經加密* * ,容易受到物理攻擊。 If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! 警告
diff --git a/i18n/zh-Hant/passwords.md b/i18n/zh-Hant/passwords.md
index 50262cd3..5ac389b0 100644
--- a/i18n/zh-Hant/passwords.md
+++ b/i18n/zh-Hant/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "密碼管理器。"
icon: material/form-textbox-password
description: 密碼管理員允許您安全地存儲和管理密碼和其他憑證。
diff --git a/i18n/zh-Hant/real-time-communication.md b/i18n/zh-Hant/real-time-communication.md
index 56616210..8d566c00 100644
--- a/i18n/zh-Hant/real-time-communication.md
+++ b/i18n/zh-Hant/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "即時通訊軟體"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/zh-Hant/search-engines.md b/i18n/zh-Hant/search-engines.md
index a3572d52..5873c73c 100644
--- a/i18n/zh-Hant/search-engines.md
+++ b/i18n/zh-Hant/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "搜尋引擎"
icon: material/search-web
description: 這些尊重隱私的搜尋引擎不會根據您的搜尋建立廣告剖繪。
diff --git a/i18n/zh-Hant/tools.md b/i18n/zh-Hant/tools.md
index 30a61e65..eae617b0 100644
--- a/i18n/zh-Hant/tools.md
+++ b/i18n/zh-Hant/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "隱私工具"
icon: material/tools
hide:
diff --git a/i18n/zh-Hant/tor.md b/i18n/zh-Hant/tor.md
index 6fe66b0b..212a04de 100644
--- a/i18n/zh-Hant/tor.md
+++ b/i18n/zh-Hant/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor 網絡"
icon: simple/torproject
description: 透過Tor 網絡來保護您的網際網路瀏覽免受窺探, Tor 網絡是一個規避審查的安全網絡。
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor Browser
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows
+ - macOS
+ - Linux
+ - 安卓
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/zh-Hant/vpn.md b/i18n/zh-Hant/vpn.md
index a7f9c2e7..8b153a6f 100644
--- a/i18n/zh-Hant/vpn.md
+++ b/i18n/zh-Hant/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN 服務"
icon: material/vpn
description: 這些是保護您線上隱私和安全的最佳 VPN 服務。 在這裡找一個不會監視您的供應商。
diff --git a/i18n/zh/android.md b/i18n/zh/android.md
index 964bea3e..530764ff 100644
--- a/i18n/zh/android.md
+++ b/i18n/zh/android.md
@@ -1,4 +1,5 @@
---
+meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "安卓"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@@ -89,8 +90,6 @@ schema:
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
-[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
-
## AOSP 衍生品
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
+[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
+
### DivestOS
!!! recommendation
@@ -223,7 +224,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
{ align=right }
{ align=right }
- * *Auditor* * 是一款利用硬件安全功能为[支持的设备](https://attestation.app/about#device-support) 提供设备完整性监控的应用程序。 目前,它只适用于GrapheneOS和设备的库存操作系统。
+ **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: 主页](https://grapheneos.org/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/about#privacy-policy){ .card-link title="隐私政策" }
diff --git a/i18n/zh/basics/account-creation.md b/i18n/zh/basics/account-creation.md
index 70f5811f..535aa9e1 100644
--- a/i18n/zh/basics/account-creation.md
+++ b/i18n/zh/basics/account-creation.md
@@ -1,4 +1,5 @@
---
+meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "账户创建"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
diff --git a/i18n/zh/basics/email-security.md b/i18n/zh/basics/email-security.md
index ddf96a4e..2a86d8dd 100644
--- a/i18n/zh/basics/email-security.md
+++ b/i18n/zh/basics/email-security.md
@@ -1,4 +1,5 @@
---
+meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: 电子邮件安全
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@@ -22,7 +23,7 @@ description: Email is inherently insecure in many ways, and these are some of th
### 我如何保护我的私钥?
-A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. 然后,该信息被智能卡解密,解密后的内容被送回设备。
+A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. 然后,该信息被智能卡解密,解密后的内容被送回设备。
在智能卡上进行解密是很有利的,这样可以避免将你的私钥暴露给某个被攻破的设备。
diff --git a/i18n/zh/basics/threat-modeling.md b/i18n/zh/basics/threat-modeling.md
index d1ae47d9..ad7f5bba 100644
--- a/i18n/zh/basics/threat-modeling.md
+++ b/i18n/zh/basics/threat-modeling.md
@@ -1,10 +1,11 @@
---
+meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "威胁模型"
icon: '资料/目标账户'
-description: 在安全、隐私和可用性之间取得平衡是你在隐私之路上面临的首要和最困难的任务之一。
+description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
---
-在安全、隐私和可用性之间取得平衡是你在隐私之路上面临的首要和最困难的任务之一。 每件事都是一种权衡:越是安全的东西,一般来说限制性越强或越不方便,等等。 人们经常会发现这些推荐的工具最大的问题就是太难于上手使用!
+Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. 每件事都是一种权衡:越是安全的东西,一般来说限制性越强或越不方便,等等。 人们经常会发现这些推荐的工具最大的问题就是太难于上手使用!
如果你想使用**最安全**的工具,你就必须牺牲很多*的可用性*。 即使如此,==没有什么是完全安全的。== 有 **高度**安全 ,但从来没有**完全**安全。 这就是为什么威胁模型很重要。
diff --git a/i18n/zh/basics/vpn-overview.md b/i18n/zh/basics/vpn-overview.md
index 90b28ea4..5b3ce8b8 100644
--- a/i18n/zh/basics/vpn-overview.md
+++ b/i18n/zh/basics/vpn-overview.md
@@ -1,4 +1,5 @@
---
+meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN概述
icon: 资料/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
diff --git a/i18n/zh/cloud.md b/i18n/zh/cloud.md
index ae3783d9..d19e2a18 100644
--- a/i18n/zh/cloud.md
+++ b/i18n/zh/cloud.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "路由器固件"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
diff --git a/i18n/zh/cryptocurrency.md b/i18n/zh/cryptocurrency.md
index a20ebf51..69b72421 100644
--- a/i18n/zh/cryptocurrency.md
+++ b/i18n/zh/cryptocurrency.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---
diff --git a/i18n/zh/data-redaction.md b/i18n/zh/data-redaction.md
index c183901f..2cb1d9e8 100644
--- a/i18n/zh/data-redaction.md
+++ b/i18n/zh/data-redaction.md
@@ -1,4 +1,5 @@
---
+meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "日历/联系人同步"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
diff --git a/i18n/zh/desktop-browsers.md b/i18n/zh/desktop-browsers.md
index bef4f7d4..897ba6c8 100644
--- a/i18n/zh/desktop-browsers.md
+++ b/i18n/zh/desktop-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "电脑浏览器"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
diff --git a/i18n/zh/email.md b/i18n/zh/email.md
index 0f06b98f..00aec09b 100644
--- a/i18n/zh/email.md
+++ b/i18n/zh/email.md
@@ -1,4 +1,5 @@
---
+meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
-Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
+Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security
diff --git a/i18n/zh/encryption.md b/i18n/zh/encryption.md
index 3774d182..e9e9b93e 100644
--- a/i18n/zh/encryption.md
+++ b/i18n/zh/encryption.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "加密软件"
icon: material/file-lock
description: 对数据进行加密是控制谁能访问数据的唯一方法。 These tools allow you to encrypt your emails and any other files.
diff --git a/i18n/zh/index.md b/i18n/zh/index.md
index 93e7ce78..412cbb9d 100644
--- a/i18n/zh/index.md
+++ b/i18n/zh/index.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.zh.html
hide:
- navigation
diff --git a/i18n/zh/mobile-browsers.md b/i18n/zh/mobile-browsers.md
index 32a53e73..9d7eaa26 100644
--- a/i18n/zh/mobile-browsers.md
+++ b/i18n/zh/mobile-browsers.md
@@ -1,4 +1,5 @@
---
+meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "移动浏览器"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
diff --git a/i18n/zh/multi-factor-authentication.md b/i18n/zh/multi-factor-authentication.md
index 08f876fb..7dd60e29 100644
--- a/i18n/zh/multi-factor-authentication.md
+++ b/i18n/zh/multi-factor-authentication.md
@@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! 推荐
- While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
+ While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! 推荐
diff --git a/i18n/zh/passwords.md b/i18n/zh/passwords.md
index 49c0b4f0..cf3920d2 100644
--- a/i18n/zh/passwords.md
+++ b/i18n/zh/passwords.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "生产力工具"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
diff --git a/i18n/zh/real-time-communication.md b/i18n/zh/real-time-communication.md
index 242944ad..b522ef9d 100644
--- a/i18n/zh/real-time-communication.md
+++ b/i18n/zh/real-time-communication.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "实时通讯"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
diff --git a/i18n/zh/search-engines.md b/i18n/zh/search-engines.md
index 992127f4..c951d016 100644
--- a/i18n/zh/search-engines.md
+++ b/i18n/zh/search-engines.md
@@ -1,4 +1,5 @@
---
+meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
diff --git a/i18n/zh/tools.md b/i18n/zh/tools.md
index 0501c800..e00fff13 100644
--- a/i18n/zh/tools.md
+++ b/i18n/zh/tools.md
@@ -1,4 +1,5 @@
---
+meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "隐私工具"
icon: 资料/工具
hide:
diff --git a/i18n/zh/tor.md b/i18n/zh/tor.md
index a8c0ff72..b37a618c 100644
--- a/i18n/zh/tor.md
+++ b/i18n/zh/tor.md
@@ -1,7 +1,25 @@
---
+meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "桌面端浏览器"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
+schema:
+ -
+ "@context": http://schema.org
+ "@type": SoftwareApplication
+ name: Tor浏览器
+ image: /assets/img/browsers/tor.svg
+ url: https://www.torproject.org
+ sameAs: https://en.wikipedia.org/wiki/Tor_(network)
+ applicationCategory: Web Browser
+ operatingSystem:
+ - Windows 系统
+ - mac系统
+ - Linux系统
+ - 安卓
+ subjectOf:
+ "@type": WebPage
+ url: "./"
---
{ align=right }
diff --git a/i18n/zh/vpn.md b/i18n/zh/vpn.md
index 02927b04..684a5260 100644
--- a/i18n/zh/vpn.md
+++ b/i18n/zh/vpn.md
@@ -1,4 +1,5 @@
---
+meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: 资料/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
diff --git a/includes/abbreviations.de.txt b/includes/abbreviations.de.txt
index 09f63a6c..66aba6d3 100644
--- a/includes/abbreviations.de.txt
+++ b/includes/abbreviations.de.txt
@@ -15,7 +15,7 @@
*[DoQ]: DNS über QUIC
*[DoH3]: DNS über HTTP/3
*[DoT]: DNS über TLS
-*[E2EE]: End-to-End-Verschlüsselung/Verschlüsselt
+*[E2EE]: Ende-zu-Ende-Verschlüsselung/Verschlüsselt
*[ECS]: EDNS Client Subnet
*[EEA]: Europäischer Wirtschaftsraum
*[entropy]: Ein Maß dafür, wie unvorhersehbar etwas ist
diff --git a/includes/abbreviations.ja.txt b/includes/abbreviations.ja.txt
index 2553f881..a4de6762 100644
--- a/includes/abbreviations.ja.txt
+++ b/includes/abbreviations.ja.txt
@@ -1,4 +1,4 @@
-*[2FA]: 2-Factor Authentication
+*[2FA]: 二要素認証 (2-Factor Authentication)
*[ADB]: Android Debug Bridge
*[AOSP]: Android Open Source Project
*[ATA]: Advanced Technology Attachment
@@ -15,7 +15,7 @@
*[DoQ]: DNS over QUIC
*[DoH3]: DNS over HTTP/3
*[DoT]: DNS over TLS
-*[E2EE]: End-to-End Encryption/Encrypted
+*[E2EE]: エンドツーエンド暗号化 (End-to-End Encryption/Encrypted)
*[ECS]: EDNS Client Subnet
*[EEA]: European Economic Area
*[entropy]: A measurement of how unpredictable something is
@@ -25,7 +25,7 @@
*[FDE]: Full Disk Encryption
*[FIDO]: Fast IDentity Online
*[fork]: A new software project created by copying an existing project and adding to it independently
-*[GDPR]: General Data Protection Regulation
+*[GDPR]: EU一般データ保護規則 (General Data Protection Regulation)
*[GPG]: GNU Privacy Guard (PGP implementation)
*[GPS]: Global Positioning System
*[GUI]: Graphical User Interface
@@ -50,7 +50,7 @@
*[MAC]: Media Access Control
*[MDAG]: Microsoft Defender Application Guard
*[MEID]: Mobile Equipment Identifier
-*[MFA]: Multi-Factor Authentication
+*[MFA]: 多要素認証 (Multi-Factor Authentication)
*[NVMe]: Nonvolatile Memory Express
*[NTP]: Network Time Protocol
*[OCI]: Open Container Initiative
@@ -65,7 +65,7 @@
*[PAM]: Linux Pluggable Authentication Modules
*[POP3]: Post Office Protocol 3
*[PGP]: Pretty Good Privacy (see OpenPGP)
-*[PII]: Personally Identifiable Information
+*[PII]: 個人を特定できる情報 (Personally Identifiable Information)
*[QNAME]: Qualified Name
*[rolling release]: Updates which are released frequently rather than set intervals
*[RSS]: Really Simple Syndication
@@ -83,7 +83,7 @@
*[TCP]: Transmission Control Protocol
*[TEE]: Trusted Execution Environment
*[TLS]: Transport Layer Security
-*[ToS]: Terms of Service
+*[ToS]: 利用規約 (Terms of Service)
*[TOTP]: Time-based One-Time Password
*[TPM]: Trusted Platform Module
*[U2F]: Universal 2nd Factor
diff --git a/includes/abbreviations.ko.txt b/includes/abbreviations.ko.txt
index 123109fc..d72f9f45 100644
--- a/includes/abbreviations.ko.txt
+++ b/includes/abbreviations.ko.txt
@@ -1,8 +1,8 @@
-*[2FA]: 2-Factor Authentication
+*[2FA]: 2단계 인증
*[ADB]: Android 디버그 브리지
*[AOSP]: Android 오픈소스 프로젝트
*[ATA]: 고급 기술 결합(Advanced Technology Attachment)
-*[attack surface]: The total number of possible entry points for unauthorized access to a system
+*[공격 표면]: 시스템에 무단으로 진입할 수 있는 총 경로의 수
*[AVB]: Android 자체 검사 부팅
*[cgroups]: Control Groups
*[CLI]: 명령어 인터페이스
@@ -19,7 +19,7 @@
*[ECS]: EDNS Client Subnet
*[EEA]: European Economic Area
*[entropy]: A measurement of how unpredictable something is
-*[EOL]: End-of-Life
+*[EOL]: 지원 종료
*[Exif]: 교환 이미지 파일 형식(Exchangeable image file format)
*[FCM]: Firebase 클라우드 메시징
*[FDE]: 전체 디스크 암호화
@@ -45,7 +45,7 @@
*[ISP]: 인터넷 서비스 제공자(Internet Service Provider)
*[ISPs]: Internet Service Providers
*[JNI]: Java Native Interface
-*[KYC]: Know Your Customer
+*[KYC]: 고객 확인 제도
*[LUKS]: Linux Unified Key Setup (Full-Disk Encryption)
*[MAC]: Media Access Control
*[MDAG]: Microsoft Defender Application Guard
diff --git a/includes/strings.ar.yml b/includes/strings.ar.yml
index a0bd4c88..50743ef1 100644
--- a/includes/strings.ar.yml
+++ b/includes/strings.ar.yml
@@ -5,13 +5,13 @@ config:
copyright:
-
1: |
- Privacy Guides is a non-profit, socially motivated website that provides information for protecting your data security and privacy.
+ Privacy Guides هو موقع غير ربحي ذو دوافع اجتماعية يوفر معلومات لحماية بياناتك وخصوصيتك.
-
2: |
- We do not make money from recommending certain products, and we do not use affiliate links.
+ لا نكسب مالاً من التوصية بمنتجات معينة، ولا نستخدم الروابط التسويقية.
-
3: |
- Privacy Guides and contributors.
+ Privacy Guides والمساهمين.
-
4: |
Content licensed under CC BY-ND 4.0.
diff --git a/includes/strings.de.yml b/includes/strings.de.yml
index 4aaa89fe..c9732383 100644
--- a/includes/strings.de.yml
+++ b/includes/strings.de.yml
@@ -5,47 +5,47 @@ config:
copyright:
-
1: |
- Privacy Guides is a non-profit, socially motivated website that provides information for protecting your data security and privacy.
+ Privacy Guides ist eine nicht Profit orientierte, sozial motivierte Webseite, die Informationen zum Schutz deiner Privatsphäre und Datensicherheit bereitstellt.
-
2: |
- We do not make money from recommending certain products, and we do not use affiliate links.
+ Wir verdienen kein Geld mit der Empfehlung bestimmter Produkte, und wir verwenden keine Affiliate-Links.
-
3: |
- Privacy Guides and contributors.
+ Privacy Guides und Mitwirkende.
-
4: |
- Content licensed under CC BY-ND 4.0.
+ Inhalt lizenziert unter CC BY-ND 4.0.
feedback:
- question: Was this page helpful?
- yes: This page was helpful
- yes-note: Thanks for your feedback!
- no: This page could be improved
+ question: War diese Seite hilfreich?
+ yes: Diese Seite war hilfreich
+ yes-note: Vielen Dank für dein Feedback!
+ no: Diese Seite könnte verbessert werden
no-note: |
- Thanks for your feedback! Help us improve this page by opening a discussion on our forum.
+ Hilf uns, diese Seite zu verbessern, indem du eine Diskussion in unserem Forum eröffnest.
theme:
- dark: Switch to dark mode
- light: Switch to light mode
- system: Switch to system theme
+ dark: Dunklen Design verwenden
+ light: Hellen Design verwenden
+ system: Gerätedesign verwenden
nav:
- Home: Home
- Knowledge Base: Knowledge Base
- Technology Essentials: Technology Essentials
- Operating Systems: Operating Systems
- Advanced Topics: Advanced Topics
- Recommendations: Recommendations
- Internet Browsing: Internet Browsing
- Providers: Providers
+ Home: Startseite
+ Knowledge Base: Wissensdatenbank
+ Technology Essentials: Technische Grundlagen
+ Operating Systems: Betriebssysteme
+ Advanced Topics: Fortgeschrittene Themen
+ Recommendations: Empfehlungen
+ Internet Browsing: Surfen im Internet
+ Providers: Anbieter
Software: Software
- About: About
+ About: Über uns
Community: Community
- Online Services: Online Services
- Code of Conduct: Code of Conduct
- Contributing: Contributing
- Writing Guide: Writing Guide
- Technical Guides: Technical Guides
- Changelog: Changelog
+ Online Services: Onlinedienste
+ Code of Conduct: Verhaltensgrundsätze
+ Contributing: Mitmachen
+ Writing Guide: Schreibleitfaden
+ Technical Guides: Technische Anleitungen
+ Changelog: Änderungsprotokoll
Forum: Forum
Blog: Blog
site:
translation: |
- You're viewing the English copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!
+ Du siehst die deutsche Version der Datenschutzrichtlinie, übersetzt von unserem fantastischen Sprachteam auf Crowdin. Wenn du einen Fehler oder unübersetzte Abschnitte auf dieser Seite finden solltest, hilf uns bitte weiter!
diff --git a/theme/overrides/home.de.html b/theme/overrides/home.de.html
index 1c764c4b..cf8c2134 100644
--- a/theme/overrides/home.de.html
+++ b/theme/overrides/home.de.html
@@ -33,7 +33,7 @@
Der Leitfaden zur Wiederherstellung Ihrer Online-Privatsphäre.
-
Riesige Unternehmen überwachen Ihre Online-Aktivitäten. Privacy Guides ist deine zentrale Informationsquelle für Datenschutz und Sicherheit, um dich online zu schützen.
+
Große Konzerne überwachen deine Onlineaktivitäten. Privacy Guides ist deine zentrale Informationsquelle für Datenschutz und Sicherheit, um dich online zu schützen.
Beginne Deine Reise zur Privatsphäre