diff --git a/i18n/ar/about/statistics.md b/i18n/ar/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/ar/about/statistics.md +++ b/i18n/ar/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/ar/advanced/tor-overview.md b/i18n/ar/advanced/tor-overview.md index cc7a2fad..5ff717f9 100644 --- a/i18n/ar/advanced/tor-overview.md +++ b/i18n/ar/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![شعار تور](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. فكون اتصالات تور صعبة الحظر والتتبع يجعل تور أداةً فعَّالةً لتجاوز الرقابة. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. يلبِّس هذا أصل الاتصال، وليس بوسع أي خادم في سبيل الاتصال رؤيته من بدايته لمقصده، مما يعني أن حتى الخوادم المستخدمة للاتصال لا تنتهك مجهوليتك. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/ar/alternative-networks.md b/i18n/ar/alternative-networks.md new file mode 100644 index 00000000..0f6a4f0b --- /dev/null +++ b/i18n/ar/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. ويمكن للأفراد والمؤسسات مشاركة المعلومات عبرها باستخدام «خدمات .onion الخفية»، وذلك دون نهك خصوصيتهم. فكون اتصالات تور صعبة الحظر والتتبع يجعل تور أداةً فعَّالةً لتجاوز الرقابة. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/ar/cloud.md b/i18n/ar/cloud.md index 4993581a..eb374f23 100644 --- a/i18n/ar/cloud.md +++ b/i18n/ar/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/ar/email-aliasing.md b/i18n/ar/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/ar/email-aliasing.md +++ b/i18n/ar/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/ar/mobile-browsers.md b/i18n/ar/mobile-browsers.md index 2b914ea9..3de9d6f4 100644 --- a/i18n/ar/mobile-browsers.md +++ b/i18n/ar/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/ar/passwords.md b/i18n/ar/passwords.md index b4cfa754..b91c9311 100644 --- a/i18n/ar/passwords.md +++ b/i18n/ar/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/ar/search-engines.md b/i18n/ar/search-engines.md index faaf4aa3..6b21affd 100644 --- a/i18n/ar/search-engines.md +++ b/i18n/ar/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/ar/tools.md b/i18n/ar/tools.md index eac1dc52..36bec402 100644 --- a/i18n/ar/tools.md +++ b/i18n/ar/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/ar/tor.md b/i18n/ar/tor.md index 6bc3759f..48d00543 100644 --- a/i18n/ar/tor.md +++ b/i18n/ar/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Tor Network" -icon: simple/torproject +title: "متصفِّح تور" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![شعار تور](assets/img/self-contained-networks/tor.svg){ align=right } - -شبكة **تور** هي خوادم يديرها متطوِّعون تتيح لك الاتصال بها مجَّانًا وتحسِّن خصوصيتك وأمنك في الإنترنت. ويمكن للأفراد والمؤسسات مشاركة المعلومات عبرها باستخدام «خدمات .onion الخفية»، وذلك دون نهك خصوصيتهم. فكون اتصالات تور صعبة الحظر والتتبع يجعل تور أداةً فعَّالةً لتجاوز الرقابة. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -يعمل تور عن طريق توجيه اتصالاتك عبر خوادم المتطوِّعين، وذلك بدلًا من الاتصال بالموقع الذي تريد مباشرةً. يلبِّس هذا أصل الاتصال، وليس بوسع أي خادم في سبيل الاتصال رؤيته من بدايته لمقصده، مما يعني أن حتى الخوادم المستخدمة للاتصال لا تنتهك مجهوليتك. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. ويمكن للأفراد والمؤسسات مشاركة المعلومات عبرها باستخدام «خدمات .onion الخفية»، وذلك دون نهك خصوصيتهم. فكون اتصالات تور صعبة الحظر والتتبع يجعل تور أداةً فعَّالةً لتجاوز الرقابة. [نظرة عامة شاملة عن تور :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## الاتصال بتور -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### متصفِّح تور +## متصفِّح تور
@@ -90,7 +78,7 @@ If more complete anonymity is paramount to your situation, you should **only** b In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### أُربوت +## أُربوت
@@ -128,7 +116,7 @@ We previously recommended enabling the *Isolate Destination Address* preference
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ We previously recommended enabling the *Isolate Destination Address* preference
- -## المرحِّلات والجسور - -### سنوفليك - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=left } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=left } - -يتيح لك **سنوفليك** أن تساهم بشيء من حيِّز نطاقك في مشروع تور، ويكون ذلك عبر تشغيل «وسيط سنوفليك» ضمن متصفِّحك. - -يستطيع من يخضع للرقابة أن يستعمل وسطاء سنوفليك ليتَّصل بشبكة تور. ييسِّر سنوفليك المساهمة في شبكة تور، فلا تحتاج لمعلومات تقنية لتشغِّل مرحِّل تور أو جسرًا له. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -لا يفيد سنوفليك في تحسين خصوصيتك أبدًا، وليس سبيلًا لاتصال بشبكة تور داخل متصفِّحك. ولكن إن كان اتصالك بالإنترنت لا يخضع لرقابة فتخيَّر تشغيله لتعين من يستعمل شبكات تخضع لها في تحسين خصوصيتهم. ولا تقلق حيال أيِّ صفحات يزورها من يستخدم وسيطك، ﻷن عنوان IP لهم يطابق ذاك التابع لعقدة مخرج تور، لا عقدتك. - -إن تشغيل وسيط سنوفليك ليس منذرًا بالخطر، بل أقلُّ خطرًا من تشغيل مرحِّل تور أو جسر له، وهذا ليس بذاك الخطر أصلًا. ولكنه يوسِّط الاتصالات عبر شبكتك، ولعلَّ لهذا تبعات، خاصَّةً إن كانت شبكتك محدودةً. عليك تمعُّن [سبيل عمل سنوفليك](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) قبل أن تقرِّر تشغيل وسيط. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/bn-IN/about/statistics.md b/i18n/bn-IN/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/bn-IN/about/statistics.md +++ b/i18n/bn-IN/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/bn-IN/advanced/tor-overview.md b/i18n/bn-IN/advanced/tor-overview.md index cc7a2fad..b3a2ba63 100644 --- a/i18n/bn-IN/advanced/tor-overview.md +++ b/i18n/bn-IN/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/bn-IN/alternative-networks.md b/i18n/bn-IN/alternative-networks.md new file mode 100644 index 00000000..1b36f2c6 --- /dev/null +++ b/i18n/bn-IN/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/bn-IN/cloud.md b/i18n/bn-IN/cloud.md index 4993581a..eb374f23 100644 --- a/i18n/bn-IN/cloud.md +++ b/i18n/bn-IN/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/bn-IN/email-aliasing.md b/i18n/bn-IN/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/bn-IN/email-aliasing.md +++ b/i18n/bn-IN/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/bn-IN/mobile-browsers.md b/i18n/bn-IN/mobile-browsers.md index 6705cab2..27f20129 100644 --- a/i18n/bn-IN/mobile-browsers.md +++ b/i18n/bn-IN/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/bn-IN/passwords.md b/i18n/bn-IN/passwords.md index 9ee6a6cd..d9d70c3b 100644 --- a/i18n/bn-IN/passwords.md +++ b/i18n/bn-IN/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/bn-IN/search-engines.md b/i18n/bn-IN/search-engines.md index faaf4aa3..6b21affd 100644 --- a/i18n/bn-IN/search-engines.md +++ b/i18n/bn-IN/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/bn-IN/tools.md b/i18n/bn-IN/tools.md index eac1dc52..36bec402 100644 --- a/i18n/bn-IN/tools.md +++ b/i18n/bn-IN/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/bn-IN/tor.md b/i18n/bn-IN/tor.md index d0ac4665..f1693dd5 100644 --- a/i18n/bn-IN/tor.md +++ b/i18n/bn-IN/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Tor Network" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Connecting to Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ The Tor Browser is designed to prevent fingerprinting, or identifying you based In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/bn/about/statistics.md b/i18n/bn/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/bn/about/statistics.md +++ b/i18n/bn/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/bn/advanced/tor-overview.md b/i18n/bn/advanced/tor-overview.md index cc7a2fad..b3a2ba63 100644 --- a/i18n/bn/advanced/tor-overview.md +++ b/i18n/bn/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/bn/alternative-networks.md b/i18n/bn/alternative-networks.md new file mode 100644 index 00000000..1b36f2c6 --- /dev/null +++ b/i18n/bn/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/bn/cloud.md b/i18n/bn/cloud.md index 4993581a..eb374f23 100644 --- a/i18n/bn/cloud.md +++ b/i18n/bn/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/bn/email-aliasing.md b/i18n/bn/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/bn/email-aliasing.md +++ b/i18n/bn/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/bn/mobile-browsers.md b/i18n/bn/mobile-browsers.md index 2b914ea9..3de9d6f4 100644 --- a/i18n/bn/mobile-browsers.md +++ b/i18n/bn/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/bn/passwords.md b/i18n/bn/passwords.md index b4cfa754..b91c9311 100644 --- a/i18n/bn/passwords.md +++ b/i18n/bn/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/bn/search-engines.md b/i18n/bn/search-engines.md index faaf4aa3..6b21affd 100644 --- a/i18n/bn/search-engines.md +++ b/i18n/bn/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/bn/tools.md b/i18n/bn/tools.md index eac1dc52..36bec402 100644 --- a/i18n/bn/tools.md +++ b/i18n/bn/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/bn/tor.md b/i18n/bn/tor.md index 6b8a0163..cd061203 100644 --- a/i18n/bn/tor.md +++ b/i18n/bn/tor.md @@ -1,7 +1,7 @@ --- meta_title: "টর ব্রাউজার ও নেটওয়ার্ক: বেনামী ওয়েব পরিব্রাজন - প্রাইভেসি গাইডস" -title: "টর নেটওয়ার্ক" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Connecting to Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ The Tor Browser is designed to prevent fingerprinting, or identifying you based In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## রিলে এবং ব্রিজ - -### স্নোফ্লেক - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/cs/about/statistics.md b/i18n/cs/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/cs/about/statistics.md +++ b/i18n/cs/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/cs/advanced/tor-overview.md b/i18n/cs/advanced/tor-overview.md index cc7a2fad..b3a2ba63 100644 --- a/i18n/cs/advanced/tor-overview.md +++ b/i18n/cs/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/cs/alternative-networks.md b/i18n/cs/alternative-networks.md new file mode 100644 index 00000000..1b36f2c6 --- /dev/null +++ b/i18n/cs/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/cs/cloud.md b/i18n/cs/cloud.md index 4993581a..eb374f23 100644 --- a/i18n/cs/cloud.md +++ b/i18n/cs/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/cs/email-aliasing.md b/i18n/cs/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/cs/email-aliasing.md +++ b/i18n/cs/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/cs/mobile-browsers.md b/i18n/cs/mobile-browsers.md index 2b914ea9..3de9d6f4 100644 --- a/i18n/cs/mobile-browsers.md +++ b/i18n/cs/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/cs/passwords.md b/i18n/cs/passwords.md index b4cfa754..b91c9311 100644 --- a/i18n/cs/passwords.md +++ b/i18n/cs/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/cs/search-engines.md b/i18n/cs/search-engines.md index faaf4aa3..6b21affd 100644 --- a/i18n/cs/search-engines.md +++ b/i18n/cs/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/cs/tools.md b/i18n/cs/tools.md index eac1dc52..36bec402 100644 --- a/i18n/cs/tools.md +++ b/i18n/cs/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/cs/tor.md b/i18n/cs/tor.md index 3c240ddc..19234d4c 100644 --- a/i18n/cs/tor.md +++ b/i18n/cs/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Tor Network" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Connecting to Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ The Tor Browser is designed to prevent fingerprinting, or identifying you based In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/de/about/statistics.md b/i18n/de/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/de/about/statistics.md +++ b/i18n/de/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/de/advanced/tor-overview.md b/i18n/de/advanced/tor-overview.md index cc7a2fad..a5e6174e 100644 --- a/i18n/de/advanced/tor-overview.md +++ b/i18n/de/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Da der Tor-Verkehr schwer zu blockieren und zurückzuverfolgen ist, ist Tor ein effektives Werkzeug zur Zensur Umgehung. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Dadurch wird verschleiert, woher der Datenverkehr kommt, und kein Server im Verbindungspfad ist in der Lage, den vollständigen Pfad zu sehen, woher der Datenverkehr kommt und wohin er geht, was bedeutet, dass selbst die Server, die du für die Verbindung verwendest, deiner Anonymität nichts anhaben können. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/de/alternative-networks.md b/i18n/de/alternative-networks.md new file mode 100644 index 00000000..28631b45 --- /dev/null +++ b/i18n/de/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Einzelpersonen und Organisationen können auch Informationen über das Tor-Netzwerk mit ".onion versteckten Diensten" austauschen, ohne ihre Privatsphäre zu gefährden. Da der Tor-Verkehr schwer zu blockieren und zurückzuverfolgen ist, ist Tor ein effektives Werkzeug zur Zensur Umgehung. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/de/cloud.md b/i18n/de/cloud.md index 4993581a..eb374f23 100644 --- a/i18n/de/cloud.md +++ b/i18n/de/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/de/email-aliasing.md b/i18n/de/email-aliasing.md index 1c799218..c3fb9ae9 100644 --- a/i18n/de/email-aliasing.md +++ b/i18n/de/email-aliasing.md @@ -89,7 +89,7 @@ Bemerkenswerte kostenlose Funktionen: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/de/mobile-browsers.md b/i18n/de/mobile-browsers.md index 91f557b2..c0ed241f 100644 --- a/i18n/de/mobile-browsers.md +++ b/i18n/de/mobile-browsers.md @@ -151,13 +151,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/de/passwords.md b/i18n/de/passwords.md index b4cfa754..b91c9311 100644 --- a/i18n/de/passwords.md +++ b/i18n/de/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/de/search-engines.md b/i18n/de/search-engines.md index 9ef857fc..28ee45b8 100644 --- a/i18n/de/search-engines.md +++ b/i18n/de/search-engines.md @@ -100,7 +100,7 @@ Wenn du eine SearXNG-Instanz verwendest, beachte unbedingt deren Datenschutzbest Startpage hat seinen Sitz in den Niederlanden. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. Sie protokollieren weder die IP-Adresse noch Suchanfragen oder andere personenbezogene Daten. -Der Mehrheitsaktionär von Startpage ist System1, ein Werbeunternehmen. Wir glauben nicht, dass dies ein Problem ist, da sie gesonderte Datenschutzbestimmungen haben. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Der Mehrheitsaktionär von Startpage ist System1, ein Werbeunternehmen. Wir glauben nicht, dass dies ein Problem ist, da sie gesonderte Datenschutzbestimmungen haben. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/de/tools.md b/i18n/de/tools.md index e11500d1..eae9fe69 100644 --- a/i18n/de/tools.md +++ b/i18n/de/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/de/tor.md b/i18n/de/tor.md index 3d49d978..83c08268 100644 --- a/i18n/de/tor.md +++ b/i18n/de/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser und Netzwerk: Anonymes Surfen im Internet - Privacy Guides" -title: "Tor-Netzwerk" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Schütze dein Surfen im Internet vor neugierigen Blicken, indem du das Tor-Netzwerk nutzt, ein sicheres Netzwerk, das die Zensur umgeht. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -Das **Tor** Netzwerk besteht aus von freiwillig betriebenen Servern, die es ermöglichen, kostenlos die eigene Privatsphäre und Sicherheit im Internet zu verbessern. Einzelpersonen und Organisationen können auch Informationen über das Tor-Netzwerk mit ".onion versteckten Diensten" austauschen, ohne ihre Privatsphäre zu gefährden. Da der Tor-Verkehr schwer zu blockieren und zurückzuverfolgen ist, ist Tor ein effektives Werkzeug zur Zensur Umgehung. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor funktioniert, indem es deinen Internetverkehr über diese von Freiwilligen betriebenen Server leitet, anstatt eine direkte Verbindung zu der Website herzustellen, die du besuchen willst. Dadurch wird verschleiert, woher der Datenverkehr kommt, und kein Server im Verbindungspfad ist in der Lage, den vollständigen Pfad zu sehen, woher der Datenverkehr kommt und wohin er geht, was bedeutet, dass selbst die Server, die du für die Verbindung verwendest, deiner Anonymität nichts anhaben können. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Einzelpersonen und Organisationen können auch Informationen über das Tor-Netzwerk mit ".onion versteckten Diensten" austauschen, ohne ihre Privatsphäre zu gefährden. Da der Tor-Verkehr schwer zu blockieren und zurückzuverfolgen ist, ist Tor ein effektives Werkzeug zur Zensur Umgehung. [Detaillierte Tor-Übersicht :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Verbinden mit Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ Der Tor-Browser wurde entwickelt, um Fingerprinting zu verhindern, oder um dich In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -115,7 +103,7 @@ In addition to installing Tor Browser on your computer directly, there are also
-Wir haben bereits empfohlen, die Einstellung *Isolate Destination Address* in den Orbot-Einstellungen zu aktivieren. Während diese Einstellung theoretisch die Privatsphäre verbessern kann, indem sie für jede IP-Adresse, mit der du dich verbindest, eine andere Schaltung erzwingt, bietet sie für die meisten Anwendungen (vor allem für das Surfen im Internet) keinen praktischen Vorteil, kann mit einem erheblichen Leistungsverlust einhergehen und erhöht die Belastung des Tor-Netzwerks. Es wird nicht mehr empfohlen, diese Einstellung vom Standardwert abzuweichen, es sei denn, du weißt, dass dass du das tun musst.[^1] +Wir haben bereits empfohlen, die Einstellung *Isolate Destination Address* in den Orbot-Einstellungen zu aktivieren. Während diese Einstellung theoretisch die Privatsphäre verbessern kann, indem sie für jede IP-Adresse, mit der du dich verbindest, eine andere Schaltung erzwingt, bietet sie für die meisten Anwendungen (vor allem für das Surfen im Internet) keinen praktischen Vorteil, kann mit einem erheblichen Leistungsverlust einhergehen und erhöht die Belastung des Tor-Netzwerks. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]

Tips for Android

@@ -128,7 +116,7 @@ Alle Versionen sind mit der gleichen Signatur versehen, sodass sie miteinander k
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ Alle Versionen sind mit der gleichen Signatur versehen, sodass sie miteinander k
- -## Relays und Bridges - -### Snowflake - -
- -![Snowflake-Logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake-Logo](assets/img/browsers/schneeflocken-dunkel.svg#nur-dunkel){ align=right } - -**Snowflake** ermöglicht es dir, Bandbreite an das Tor-Projekt zu spenden, indem du einen "Snowflake-Proxy" in deinem Browser betreibst. - -Menschen, die zensiert werden, können Snowflake-Proxys benutzen, um sich mit dem Tor-Netzwerk zu verbinden. Snowflake ist eine großartige Möglichkeit, zum Netzwerk beizutragen, auch wenn du nicht das technische Know-how hast, um einen Tor-Relay oder eine Bridge zu betreiben. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -Du kannst Snowflake in deinem Browser aktivieren, indem du es in einem anderen Tab öffnest und den Schalter aktivierst. Du kannst es es im Hintergrund laufen lassen, während du surfst, um Ihre Verbindung zu spenden. Wir raten davon ab, Snowflake als Browser-Erweiterung zu installieren; das Hinzufügen von Erweiterungen von Drittanbietern kann deine Angriffsfläche vergrößern. - -[Führe Snowflake in deinem Browser aus :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake erhöht in keiner Weise deine Privatsphäre und wird auch nicht für die Verbindung mit dem Tor-Netzwerk in deinem persönlichen Browser verwendet. Wenn deine Internetverbindung jedoch unzensiert ist, solltest du in Erwägung ziehen, es zu betreiben, um Menschen in zensierten Netzen zu helfen, ihre Privatsphäre besser zu schützen. Du brauchst dir keine Sorgen darüber zu machen, auf welche Webseiten die Leute über deinen Proxy zugreifen - deine sichtbare IP-Adresse wird mit der ihres Tor-Exit-Knotens übereinstimmen, nicht mit deiner. - -Der Betrieb eines Snowflake-Proxys ist risikoarm, sogar risikoärmer als der Betrieb eines Tor-Relays oder einer Tor-Bridge, die ohnehin keine besonders riskanten Unternehmungen sind. Dennoch wird der Datenverkehr durch dein Netzwerk geleitet, was gewisse Auswirkungen haben kann, insbesondere wenn dein Netzwerk eine begrenzte Bandbreite hat. Vergewissere dich, dass du verstehst, [wie Snowflake funktioniert](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home), bevor du dich für die Verwendung eines Proxys entscheidest. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/el/about/statistics.md b/i18n/el/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/el/about/statistics.md +++ b/i18n/el/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/el/advanced/tor-overview.md b/i18n/el/advanced/tor-overview.md index cc7a2fad..b3a2ba63 100644 --- a/i18n/el/advanced/tor-overview.md +++ b/i18n/el/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/el/alternative-networks.md b/i18n/el/alternative-networks.md new file mode 100644 index 00000000..1b36f2c6 --- /dev/null +++ b/i18n/el/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/el/cloud.md b/i18n/el/cloud.md index 4993581a..eb374f23 100644 --- a/i18n/el/cloud.md +++ b/i18n/el/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/el/email-aliasing.md b/i18n/el/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/el/email-aliasing.md +++ b/i18n/el/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/el/mobile-browsers.md b/i18n/el/mobile-browsers.md index 01e8c8a7..e94a835f 100644 --- a/i18n/el/mobile-browsers.md +++ b/i18n/el/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/el/passwords.md b/i18n/el/passwords.md index b4cfa754..b91c9311 100644 --- a/i18n/el/passwords.md +++ b/i18n/el/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/el/search-engines.md b/i18n/el/search-engines.md index faaf4aa3..6b21affd 100644 --- a/i18n/el/search-engines.md +++ b/i18n/el/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/el/tools.md b/i18n/el/tools.md index 751be822..65888cfc 100644 --- a/i18n/el/tools.md +++ b/i18n/el/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/el/tor.md b/i18n/el/tor.md index 3c240ddc..19234d4c 100644 --- a/i18n/el/tor.md +++ b/i18n/el/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Tor Network" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Connecting to Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ The Tor Browser is designed to prevent fingerprinting, or identifying you based In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/eo/about/statistics.md b/i18n/eo/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/eo/about/statistics.md +++ b/i18n/eo/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/eo/advanced/tor-overview.md b/i18n/eo/advanced/tor-overview.md index cc7a2fad..b3a2ba63 100644 --- a/i18n/eo/advanced/tor-overview.md +++ b/i18n/eo/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/eo/alternative-networks.md b/i18n/eo/alternative-networks.md new file mode 100644 index 00000000..1b36f2c6 --- /dev/null +++ b/i18n/eo/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/eo/cloud.md b/i18n/eo/cloud.md index 4993581a..eb374f23 100644 --- a/i18n/eo/cloud.md +++ b/i18n/eo/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/eo/email-aliasing.md b/i18n/eo/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/eo/email-aliasing.md +++ b/i18n/eo/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/eo/mobile-browsers.md b/i18n/eo/mobile-browsers.md index 2b914ea9..3de9d6f4 100644 --- a/i18n/eo/mobile-browsers.md +++ b/i18n/eo/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/eo/passwords.md b/i18n/eo/passwords.md index b4cfa754..b91c9311 100644 --- a/i18n/eo/passwords.md +++ b/i18n/eo/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/eo/search-engines.md b/i18n/eo/search-engines.md index faaf4aa3..6b21affd 100644 --- a/i18n/eo/search-engines.md +++ b/i18n/eo/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/eo/tools.md b/i18n/eo/tools.md index eac1dc52..36bec402 100644 --- a/i18n/eo/tools.md +++ b/i18n/eo/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/eo/tor.md b/i18n/eo/tor.md index 3c240ddc..19234d4c 100644 --- a/i18n/eo/tor.md +++ b/i18n/eo/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Tor Network" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Connecting to Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ The Tor Browser is designed to prevent fingerprinting, or identifying you based In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/es/about/statistics.md b/i18n/es/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/es/about/statistics.md +++ b/i18n/es/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/es/advanced/tor-overview.md b/i18n/es/advanced/tor-overview.md index cb09c522..16adf829 100644 --- a/i18n/es/advanced/tor-overview.md +++ b/i18n/es/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor es una red descentralizada y gratuita diseñada para utilizar Internet con la mayor privacidad posible. --- -Tor es una red descentralizada y gratuita diseñada para utilizar Internet con la mayor privacidad posible. Si se utiliza correctamente, la red permite la navegación y las comunicaciones privadas y anónimas. +![Logotipo de Tor](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Si se utiliza correctamente, la red permite la navegación y las comunicaciones privadas y anónimas. Debido a que el tráfico de Tor es difícil de bloquear y rastrear, Tor es una herramienta eficaz para eludir la censura. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Esto ofusca de dónde viene el tráfico, y ningún servidor en la ruta de conexión es capaz de ver la ruta completa de dónde viene y a dónde va el tráfico, lo que significa que incluso los servidores a los que te estás conectando no pueden romper tu anonimato. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Página Principal } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Servicio Onion" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentación} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Código Fuente" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribuir } ## Conectarse a Tor de Forma Segura -Antes de conectarte a [Tor](../tor.md), deberías considerar cuidadosamente qué estás buscando conseguir usando Tor en primer lugar, y a quién estás intentando ocultar tu actividad en la red. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. Si vives en un país libre, accedes a contenido mundano a través de Tor, no te preocupa que tu ISP o los administradores de tu red local sepan que estás usando Tor, y quieres ayudar a [a desestigmatizar](https://2019.www.torproject.org/about/torusers.html.en) el uso de Tor, probablemente puedes conectarte a Tor directamente a través de medios estándar como [Tor Browser](../tor.md) sin preocuparte. diff --git a/i18n/es/alternative-networks.md b/i18n/es/alternative-networks.md new file mode 100644 index 00000000..35287325 --- /dev/null +++ b/i18n/es/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuos y organizaciones también pueden compartir información a través de la red Tor con los "servicios ocultos .onion" sin comprometer su privacidad. Debido a que el tráfico de Tor es difícil de bloquear y rastrear, Tor es una herramienta eficaz para eludir la censura. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads "Descargas" + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/es/cloud.md b/i18n/es/cloud.md index 8f78db32..6dfbc2eb 100644 --- a/i18n/es/cloud.md +++ b/i18n/es/cloud.md @@ -93,10 +93,10 @@ También han recibido el Digital Trust Label, una certificación de la [Swiss Di **Peergos** es un protocolo descentralizado y una plataforma de código abierto para almacenamiento, redes sociales y aplicaciones. Proporciona un espacio seguro y privado donde los usuarios pueden almacenar, compartir y ver sus fotos, vídeos, documentos, etc. Peergos protege tus archivos con cifrado cuántico resistente de extremo a extremo y garantiza que todos los datos sobre tus archivos permanezcan privados. Está construido sobre [IPFS (InterPlanetary File System)](https://ipfs.tech). -[:octicons-home-16: Página Principal](https://peergos.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentación" } -[:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } +[:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
Downloads "Descargas" diff --git a/i18n/es/email-aliasing.md b/i18n/es/email-aliasing.md index 7f837d50..4532b4e5 100644 --- a/i18n/es/email-aliasing.md +++ b/i18n/es/email-aliasing.md @@ -89,7 +89,7 @@ Funciones gratuitas destacables: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/es/mobile-browsers.md b/i18n/es/mobile-browsers.md index 49d271f1..451db4e1 100644 --- a/i18n/es/mobile-browsers.md +++ b/i18n/es/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/es/passwords.md b/i18n/es/passwords.md index 54dc9fc0..b3474463 100644 --- a/i18n/es/passwords.md +++ b/i18n/es/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/es/search-engines.md b/i18n/es/search-engines.md index f13d6472..19489643 100644 --- a/i18n/es/search-engines.md +++ b/i18n/es/search-engines.md @@ -100,7 +100,7 @@ Cuando utilice una instancia de SearXNG, asegúrese de leer su política de priv Startpage tiene su sede en los Países Bajos. Según su [política de privacidad](https://startpage.com/en/privacy-policy), registran datos como: sistema operativo, tipo de navegador e idioma. No registran su dirección IP, consultas de búsqueda u otra información de identificación personal. -El accionista mayoritario de Startpage es System1, una empresa de tecnología publicitaria. No creemos que eso sea un problema, ya que tienen una [política de privacidad](https://system1.com/terms/privacy-policy) claramente separada. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +El accionista mayoritario de Startpage es System1, una empresa de tecnología publicitaria. No creemos que eso sea un problema, ya que tienen una [política de privacidad](https://system1.com/terms/privacy-policy) claramente separada. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/es/tools.md b/i18n/es/tools.md index 4bf33a54..8765a61a 100644 --- a/i18n/es/tools.md +++ b/i18n/es/tools.md @@ -483,6 +483,15 @@ Para cifrar la unidad de su sistema operativo, normalmente recomendamos utilizar Estas herramientas pueden ser útiles para determinadas personas. Proporcionan funcionalidades de las que la mayoría de la gente no necesita preocuparse, y a menudo requieren conocimientos técnicos más profundos para utilizarlas con eficacia. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Verificación de Integridad del Dispositivo
diff --git a/i18n/es/tor.md b/i18n/es/tor.md index 9cd4f192..685fe501 100644 --- a/i18n/es/tor.md +++ b/i18n/es/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Navegador y Red Tor: Navegación Web Anónima - Privacy Guides" -title: "Red Tor" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protege tu navegación por Internet de miradas intrusas utilizando la red Tor, una red segura que elude la censura. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Logotipo de Tor](assets/img/self-contained-networks/tor.svg){ align=right } - -La red **Tor** es un grupo de servidores operados por voluntarios que te permite conectarte gratuitamente y mejorar tu privacidad y seguridad en Internet. Individuos y organizaciones también pueden compartir información a través de la red Tor con los "servicios ocultos .onion" sin comprometer su privacidad. Debido a que el tráfico de Tor es difícil de bloquear y rastrear, Tor es una herramienta eficaz para eludir la censura. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Página Principal } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Servicio Onion" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentación} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribuir } - -Tor funciona enrutando tu tráfico de Internet a través de esos servidores operados por voluntarios, en lugar de hacer una conexión directa con el sitio que estás tratando de visitar. Esto ofusca de dónde viene el tráfico, y ningún servidor en la ruta de conexión es capaz de ver la ruta completa de dónde viene y a dónde va el tráfico, lo que significa que incluso los servidores a los que te estás conectando no pueden romper tu anonimato. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuos y organizaciones también pueden compartir información a través de la red Tor con los "servicios ocultos .onion" sin comprometer su privacidad. Debido a que el tráfico de Tor es difícil de bloquear y rastrear, Tor es una herramienta eficaz para eludir la censura. [Descripción detallada de Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Conectándote a Tor -

Consejo

@@ -52,7 +40,7 @@ Algunas de estas aplicaciones son mejores que otras y, una vez más, la decisió Si un anonimato más completo es primordial para tu situación, deberías **solo** usar el cliente de escritorio de Tor Browser, idealmente en una configuración [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os). Los navegadores móviles son menos comunes en Tor (y más susceptibles de huellas digitales como resultado), y otras configuraciones no se prueban tan rigurosamente contra la desanonimización. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ El navegador Tor está diseñado para evitar la toma de huellas digirtales o tu Además de instalar Tor Browser en tu ordenador directamente, también hay sistemas operativos diseñados específicamente para conectarse a la red Tor como [Whonix](desktop.md#whonix) en [Qubes OS](desktop.md#qubes-os), que proporcionan incluso mayor seguridad y protecciones que el Navegador Tor estándar por sí solo. -### Orbot +## Orbot
@@ -115,7 +103,7 @@ Además de instalar Tor Browser en tu ordenador directamente, también hay siste
-Anteriormente recomendamos activar la preferencia *Aislar direcciones de destino* en los ajustes de Orbot. Aunque esta configuración puede mejorar teóricamente la privacidad forzando el uso de un circuito diferente para cada dirección IP a la que se conecte, no proporciona una ventaja práctica para la mayoría de las aplicaciones (especialmente navegación web), puede conllevar una penalización significativa del rendimiento, y aumenta la carga en la red Tor. Ya no recomendamos ajustar esta configuración desde su valor predeterminado a menos que sepa que lo necesita.[^1] +Anteriormente recomendamos activar la preferencia *Aislar direcciones de destino* en los ajustes de Orbot. Aunque esta configuración puede mejorar teóricamente la privacidad forzando el uso de un circuito diferente para cada dirección IP a la que se conecte, no proporciona una ventaja práctica para la mayoría de las aplicaciones (especialmente navegación web), puede conllevar una penalización significativa del rendimiento, y aumenta la carga en la red Tor. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]

Consejos para Android

@@ -128,7 +116,7 @@ Todas las versiones están firmadas con la misma firma, por lo que deberían ser
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ Todas las versiones están firmadas con la misma firma, por lo que deberían ser
- -## Repetidores y puentes - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** te permite donar ancho de banda al Proyecto Tor operando un "proxy Snowflake" dentro de tu navegador. - -Las personas censuradas pueden utilizar proxies Snowflake para conectarse a la red Tor. Snowflake es una gran forma de contribuir a la red incluso si no tienes los conocimientos técnicos para dirigir un repetidor o puente Tor. - -[:octicons-home-16: Página Principal](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentación} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribuir } - - - -
- -Puede activar Snowflake en tu navegador abriéndolo en otra pestaña y activando el interruptor. Puedes dejarlo corriendo en segundo plano mientras navegas para contribuir a tu conexión. No recomendamos instalar Snowflake como extensión del navegador; añadir extensiones de terceros puede aumentar la posibilidad de un ataque. - -[Ejecute Snowflake en su navegador :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake no aumenta tu privacidad de ninguna manera, ni se utiliza para conectarte a la red Tor dentro de tu navegador personal. Sin embargo, si tu conexión a Internet no está censurada, deberías ejecutarlo para ayudar a las personas en redes censuradas a conseguir mejor privacidad. No hay necesidad de preocuparte por los sitios web a los que la gente accede a través de tu proxy-su dirección IP de navegación visible coincidirá con su nodo de salida Tor, no con el tuyo. - -Ejecutar un proxy Snowflake es de bajo riesgo, incluso más que ejecutar un relé Tor o un puente ya que no son esfuerzos particularmente arriesgados. Sin embargo, no deja de ser un proxy de tráfico a través de tu red, lo que puede tener consecuencias en algunos aspectos, especialmente si tu red tiene un ancho de banda limitado. Asegúrate de que entiendes [cómo funciona Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) antes de decidir si ejecutas un proxy. - -[^1]: El ajuste `IsolateDestAddr` se discute en la [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) y en [Documentación sobre Stream Isolation de Whonix](https://whonix.org/wiki/Stream_Isolation), donde ambos proyectos sugieren que normalmente no es un buen enfoque para la mayoría de la gente. diff --git a/i18n/fa/about/statistics.md b/i18n/fa/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/fa/about/statistics.md +++ b/i18n/fa/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/fa/advanced/tor-overview.md b/i18n/fa/advanced/tor-overview.md index cc7a2fad..b3a2ba63 100644 --- a/i18n/fa/advanced/tor-overview.md +++ b/i18n/fa/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/fa/alternative-networks.md b/i18n/fa/alternative-networks.md new file mode 100644 index 00000000..ca3ddd1f --- /dev/null +++ b/i18n/fa/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### شبکه تور + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/fa/cloud.md b/i18n/fa/cloud.md index 4993581a..eb374f23 100644 --- a/i18n/fa/cloud.md +++ b/i18n/fa/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/fa/email-aliasing.md b/i18n/fa/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/fa/email-aliasing.md +++ b/i18n/fa/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/fa/mobile-browsers.md b/i18n/fa/mobile-browsers.md index 68306c45..885d79e4 100644 --- a/i18n/fa/mobile-browsers.md +++ b/i18n/fa/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/fa/passwords.md b/i18n/fa/passwords.md index b4cfa754..b91c9311 100644 --- a/i18n/fa/passwords.md +++ b/i18n/fa/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/fa/search-engines.md b/i18n/fa/search-engines.md index faaf4aa3..6b21affd 100644 --- a/i18n/fa/search-engines.md +++ b/i18n/fa/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/fa/tools.md b/i18n/fa/tools.md index eac1dc52..36bec402 100644 --- a/i18n/fa/tools.md +++ b/i18n/fa/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/fa/tor.md b/i18n/fa/tor.md index 3c240ddc..19234d4c 100644 --- a/i18n/fa/tor.md +++ b/i18n/fa/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Tor Network" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Connecting to Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ The Tor Browser is designed to prevent fingerprinting, or identifying you based In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/fr/about/statistics.md b/i18n/fr/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/fr/about/statistics.md +++ b/i18n/fr/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/fr/advanced/tor-overview.md b/i18n/fr/advanced/tor-overview.md index 378779ab..40a2dc5a 100644 --- a/i18n/fr/advanced/tor-overview.md +++ b/i18n/fr/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor est un réseau décentralisé, gratuit, conçu pour utiliser Internet avec le plus de confidentialité possible. --- -Tor est un réseau décentralisé, gratuit, conçu pour utiliser Internet avec le plus de confidentialité possible. S'il est utilisé correctement, le réseau permet une navigation et des communications privées et anonymes. +![Logo Tor](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. S'il est utilisé correctement, le réseau permet une navigation et des communications privées et anonymes. Parce que le trafic Tor est difficile à bloquer et à tracer, Tor est un outil efficace pour contourner la censure. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Cela permet de masquer la provenance du trafic, et aucun serveur sur le chemin de la connexion n'est en mesure de voir le chemin complet de la provenance et de la destination du trafic, ce qui signifie que même les serveurs que vous utilisez pour vous connecter ne peuvent pas briser votre anonymat. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Se connecter en toute sécurité à Tor -Avant de vous connecter à [Tor](../tor.md), vous devriez soigneusement réfléchir à ce que vous cherchez à accomplir en utilisant Tor, et à qui vous essayez de cacher votre activité sur le réseau. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. Si vous vivez dans un pays libre, que vous accédez à du contenu banal via Tor, que vous ne craignez pas que votre FAI ou vos administrateurs de réseau local sachent que vous utilisez Tor, et que vous voulez aider [à déstigmatiser](https://2019.www.torproject.org/about/torusers.html.en) l'utilisation de Tor, vous pouvez probablement vous connecter à Tor directement via des moyens standards comme le [Navigateur Tor](../tor.md) sans inquiétude. diff --git a/i18n/fr/alternative-networks.md b/i18n/fr/alternative-networks.md new file mode 100644 index 00000000..4f9f53b4 --- /dev/null +++ b/i18n/fr/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Les particuliers et les organisations peuvent également partager des informations sur le réseau Tor avec des "services cachés .onion" sans compromettre leur vie privée. Parce que le trafic Tor est difficile à bloquer et à tracer, Tor est un outil efficace pour contourner la censure. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Téléchargements + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/fr/cloud.md b/i18n/fr/cloud.md index 7c7dc443..7267ec17 100644 --- a/i18n/fr/cloud.md +++ b/i18n/fr/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/fr/email-aliasing.md b/i18n/fr/email-aliasing.md index 2b840dd1..03f1eeed 100644 --- a/i18n/fr/email-aliasing.md +++ b/i18n/fr/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/fr/mobile-browsers.md b/i18n/fr/mobile-browsers.md index 3aa1a7d5..a4e02f36 100644 --- a/i18n/fr/mobile-browsers.md +++ b/i18n/fr/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/fr/passwords.md b/i18n/fr/passwords.md index 0cb9b915..d87e0099 100644 --- a/i18n/fr/passwords.md +++ b/i18n/fr/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/fr/search-engines.md b/i18n/fr/search-engines.md index 72cbdb95..1571c5e3 100644 --- a/i18n/fr/search-engines.md +++ b/i18n/fr/search-engines.md @@ -100,7 +100,7 @@ Lorsque vous utilisez une instance SearXNG, assurez-vous d'aller lire sa politiq Startpage est basée aux Pays-Bas. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. Ils n'enregistrent pas votre adresse IP, vos requêtes de recherche ou d'autres informations à caractère personnel. -L'actionnaire majoritaire de Startpage est System1 qui est une société de technologie publicitaire. Nous ne pensons pas que ce soit un problème car ils ont une [politique de confidentialité](https://system1.com/terms/privacy-policy)distincte. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +L'actionnaire majoritaire de Startpage est System1 qui est une société de technologie publicitaire. Nous ne pensons pas que ce soit un problème car ils ont une [politique de confidentialité](https://system1.com/terms/privacy-policy)distincte. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/fr/tools.md b/i18n/fr/tools.md index bfced500..9f2a3f9e 100644 --- a/i18n/fr/tools.md +++ b/i18n/fr/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Vérification de l'intégrité d'un appareil
diff --git a/i18n/fr/tor.md b/i18n/fr/tor.md index 9930ef24..30bab1f3 100644 --- a/i18n/fr/tor.md +++ b/i18n/fr/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Navigateur et réseau Tor : navigation web anonyme - Privacy Guides" -title: "Réseau Tor" -icon: simple/torproject +title: "Navigateur Tor" +icon: simple/torbrowser description: Protégez votre navigation sur internet des regards indiscrets en utilisant le réseau Tor, un réseau sécurisé qui contourne la censure. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Logo Tor](assets/img/self-contained-networks/tor.svg){ align=right } - -Le réseau **Tor** est un groupe de serveurs gérés par des bénévoles qui vous permet de vous connecter gratuitement et d'améliorer votre confidentialité et votre sécurité sur Internet. Les particuliers et les organisations peuvent également partager des informations sur le réseau Tor avec des "services cachés .onion" sans compromettre leur vie privée. Parce que le trafic Tor est difficile à bloquer et à tracer, Tor est un outil efficace pour contourner la censure. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor fonctionne en acheminant votre trafic Internet via ces serveurs gérés par des volontaires, au lieu d'établir une connexion directe avec le site que vous essayez de visiter. Cela permet de masquer la provenance du trafic, et aucun serveur sur le chemin de la connexion n'est en mesure de voir le chemin complet de la provenance et de la destination du trafic, ce qui signifie que même les serveurs que vous utilisez pour vous connecter ne peuvent pas briser votre anonymat. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Les particuliers et les organisations peuvent également partager des informations sur le réseau Tor avec des "services cachés .onion" sans compromettre leur vie privée. Parce que le trafic Tor est difficile à bloquer et à tracer, Tor est un outil efficace pour contourner la censure. [Introduction détaillée de Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Se connecter à Tor -

Tip

@@ -52,7 +40,7 @@ Certaines de ces applications sont meilleures que d'autres et, une fois encore, Si un anonymat plus complet est primordial dans votre situation, vous devriez **uniquement** utiliser le client bureau du Navigateur Tor, idéalement dans une configuration [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os). Les navigateurs mobiles sont moins courants sur Tor (et donc plus facilement identifiables), et d'autres configurations ne sont pas aussi rigoureusement testées contre la désanonymisation. -### Navigateur Tor +## Navigateur Tor
@@ -90,7 +78,7 @@ Le Navigateur Tor est conçu pour empêcher la prise d'empreintes numérique, ou Outre installer le Navigateur Tor sur votre ordinateur, il existe également des systèmes d'exploitation conçus spécifiquement pour se connecter au réseau Tor tels que [Whonix](desktop.md#whonix) sur [Qubes OS](desktop.md#qubes-os), qui offrent une sécurité et des protections encore plus importantes que le Navigateur Tor standard. -### Orbot +## Orbot
@@ -115,7 +103,7 @@ Outre installer le Navigateur Tor sur votre ordinateur, il existe également des
-Nous avons précédemment recommandé d'activer la préférence *Isolate Destination Address* dans les paramètres d'Orbot. Bien que ce paramètre puisse théoriquement améliorer la confidentialité en imposant l'utilisation d'un circuit différent pour chaque adresse IP à laquelle vous vous connectez, il n'offre pas d'avantage pratique pour la plupart des applications (en particulier la navigation sur le web), peut s'accompagner d'une pénalité de performance significative et augmente la charge sur le réseau Tor. Nous ne recommandons plus d'ajuster ce paramètre par rapport à sa valeur par défaut, sauf si vous savez que vous en avez besoin.[^1] +Nous avons précédemment recommandé d'activer la préférence *Isolate Destination Address* dans les paramètres d'Orbot. Bien que ce paramètre puisse théoriquement améliorer la confidentialité en imposant l'utilisation d'un circuit différent pour chaque adresse IP à laquelle vous vous connectez, il n'offre pas d'avantage pratique pour la plupart des applications (en particulier la navigation sur le web), peut s'accompagner d'une pénalité de performance significative et augmente la charge sur le réseau Tor. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]

Tips for Android

@@ -128,7 +116,7 @@ Toutes les versions sont signées en utilisant la même signature, elles devraie
-### Navigateur Onion +## Navigateur Onion
@@ -150,35 +138,3 @@ Toutes les versions sont signées en utilisant la même signature, elles devraie
- -## Relais et ponts - -### Snowflake - -
- -![Logo Snowflake](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Logo Snowflake](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** vous permet de donner de la bande passante au Projet Tor en faisant fonctionner un "proxy Snowflake" dans votre navigateur. - -Les personnes censurées peuvent utiliser les proxys Snowflake pour se connecter au réseau Tor. Snowflake est un excellent moyen de contribuer au réseau même si vous n'avez pas le savoir-faire technique pour gérer un relais ou un pont Tor. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -Vous pouvez activer Snowflake dans votre navigateur en l'ouvrant dans un autre onglet et en activant l'interrupteur. Vous pouvez le laisser fonctionner en arrière-plan pendant que vous naviguez pour contribuer avec votre connexion. Nous ne recommandons pas d'installer Snowflake en tant qu'extension de navigateur ; l'ajout d'extensions tierces peut augmenter votre surface d'attaque. - -[Exécutez Snowflake dans votre navigateur :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake n'améliore en rien votre vie privée et n'est pas utilisé pour se connecter au réseau Tor dans votre navigateur personnel. Toutefois, si votre connexion Internet n'est pas censurée, vous devriez envisager de l'utiliser pour aider les personnes se trouvant sur des réseaux censurés à améliorer elles-mêmes leur vie privée. Il n'y a pas besoin de s'inquiéter des sites web auxquels les gens accèdent via votre proxy - leur adresse IP de navigation visible correspondra à leur nœud de sortie Tor, pas à la vôtre. - -Faire fonctionner un proxy Snowflake est peu risqué, encore moins que de faire fonctionner un relais ou un pont Tor qui ne sont déjà pas des entreprises particulièrement risquées. Toutefois, il achemine le trafic par le biais de votre réseau, ce qui peut avoir un impact à certains égards, surtout si votre réseau a une bande passante limitée. Assurez-vous de comprendre [le fonctionnement de Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) avant de décider de faire tourner un proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/he/about/statistics.md b/i18n/he/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/he/about/statistics.md +++ b/i18n/he/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/he/advanced/tor-overview.md b/i18n/he/advanced/tor-overview.md index 39cbec21..b606c02c 100644 --- a/i18n/he/advanced/tor-overview.md +++ b/i18n/he/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor היא רשת מבוזרת בחינם לשימוש המיועדת לשימוש באינטרנט עם כמה שיותר פרטיות. --- -Tor היא רשת מבוזרת בחינם לשימוש המיועדת לשימוש באינטרנט עם כמה שיותר פרטיות. בשימוש נכון, הרשת מאפשרת גלישה ותקשורת פרטית ואנונימית. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. בשימוש נכון, הרשת מאפשרת גלישה ותקשורת פרטית ואנונימית. מכיוון שקשה לחסום ולעקוב אחר תעבורת Tor, Tor הוא כלי יעיל לעקוף צנזורה. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. זה מטשטש מהיכן מגיעה התעבורה, ואף שרת בנתיב החיבור לא מסוגל לראות את הנתיב המלא של המקום ממנו מגיעה התנועה והולכת, כלומר אפילו השרתים שבהם אתה משתמש כדי להתחבר לא יכולים לשבור את האנונימיות שלך. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/he/alternative-networks.md b/i18n/he/alternative-networks.md new file mode 100644 index 00000000..9b14e316 --- /dev/null +++ b/i18n/he/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. אנשים וארגונים יכולים גם לשתף מידע על גבי רשת Tor עם ".onion hidden services" מבלי לפגוע בפרטיותם. מכיוון שקשה לחסום ולעקוב אחר תעבורת Tor, Tor הוא כלי יעיל לעקוף צנזורה. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/he/cloud.md b/i18n/he/cloud.md index 18d2b0b7..56973bb9 100644 --- a/i18n/he/cloud.md +++ b/i18n/he/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/he/email-aliasing.md b/i18n/he/email-aliasing.md index 23ab1300..5dc02099 100644 --- a/i18n/he/email-aliasing.md +++ b/i18n/he/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/he/mobile-browsers.md b/i18n/he/mobile-browsers.md index b09e5c37..ee7ba879 100644 --- a/i18n/he/mobile-browsers.md +++ b/i18n/he/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/he/passwords.md b/i18n/he/passwords.md index 265cdb2d..2fe64d11 100644 --- a/i18n/he/passwords.md +++ b/i18n/he/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/he/search-engines.md b/i18n/he/search-engines.md index 6a96aaee..d2284147 100644 --- a/i18n/he/search-engines.md +++ b/i18n/he/search-engines.md @@ -100,7 +100,7 @@ SearXNG הוא פרוקסי בינך לבין מנועי החיפוש שמהם Startpage מבוסס בהולנד. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. הם לא רושמים את כתובת ה-IP שלך, שאילתות חיפוש או מידע אישי מזהה אחר. -בעלת המניות הרוב של Startpage היא System1 שהיא חברת adtech. אנחנו לא מאמינים שזו בעיה מכיוון שיש להם [מדיניות פרטיות](https://system1.com/terms/privacy-policy) נפרדת באופן מובהק. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +בעלת המניות הרוב של Startpage היא System1 שהיא חברת adtech. אנחנו לא מאמינים שזו בעיה מכיוון שיש להם [מדיניות פרטיות](https://system1.com/terms/privacy-policy) נפרדת באופן מובהק. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/he/tools.md b/i18n/he/tools.md index 246a5635..87e91aff 100644 --- a/i18n/he/tools.md +++ b/i18n/he/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### אימות תקינות המכשיר
diff --git a/i18n/he/tor.md b/i18n/he/tor.md index aea23b7a..52a7109d 100644 --- a/i18n/he/tor.md +++ b/i18n/he/tor.md @@ -1,7 +1,7 @@ --- meta_title: "דפדפן ורשת Tor: גלישה אנונימית באינטרנט - Privacy Guides" -title: "רשת טור (Tor Network)" -icon: simple/torproject +title: "דפדפן Tor" +icon: simple/torbrowser description: הגן על הגלישה שלך באינטרנט מעיניים סקרניות על ידי שימוש ברשת Tor, רשת מאובטחת שעוקפת צנזורה. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -הרשת **Tor** היא קבוצה של שרתים המופעלים בהתנדבות המאפשרת לך להתחבר בחינם ולשפר את הפרטיות והאבטחה שלך באינטרנט. אנשים וארגונים יכולים גם לשתף מידע על גבי רשת Tor עם ".onion hidden services" מבלי לפגוע בפרטיותם. מכיוון שקשה לחסום ולעקוב אחר תעבורת Tor, Tor הוא כלי יעיל לעקוף צנזורה. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor פועלת על ידי ניתוב תעבורת האינטרנט שלך דרך אותם שרתים המופעלים על ידי מתנדבים, במקום ליצור חיבור ישיר לאתר שבו אתה מנסה לבקר. זה מטשטש מהיכן מגיעה התעבורה, ואף שרת בנתיב החיבור לא מסוגל לראות את הנתיב המלא של המקום ממנו מגיעה התנועה והולכת, כלומר אפילו השרתים שבהם אתה משתמש כדי להתחבר לא יכולים לשבור את האנונימיות שלך. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. אנשים וארגונים יכולים גם לשתף מידע על גבי רשת Tor עם ".onion hidden services" מבלי לפגוע בפרטיותם. מכיוון שקשה לחסום ולעקוב אחר תעבורת Tor, Tor הוא כלי יעיל לעקוף צנזורה. [סקירת Tor מפורטת :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## התחברות ל - Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### דפדפן Tor +## דפדפן Tor
@@ -90,7 +78,7 @@ If more complete anonymity is paramount to your situation, you should **only** b In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -115,7 +103,7 @@ In addition to installing Tor Browser on your computer directly, there are also
-המלצנו בעבר להפעיל את העדפת *בודד כתובת יעד* בהגדרות Orbot. בעוד שהגדרה זו יכולה לשפר באופן תיאורטי את הפרטיות על ידי אכיפת השימוש במעגל אחר עבור כל כתובת IP שאתה מתחבר אליה, היא אינה מספקת יתרון מעשי לרוב היישומים (במיוחד גלישה באינטרנט), עלולה לבוא עם עונש משמעותי בביצועים ומגבירה העומס על רשת Tor. אנחנו לא ממליצים עוד לשנות הגדרה זו מערך ברירת המחדל שלה, אלא אם כן אתה יודע שצריך.[^1] +המלצנו בעבר להפעיל את העדפת *בודד כתובת יעד* בהגדרות Orbot. בעוד שהגדרה זו יכולה לשפר באופן תיאורטי את הפרטיות על ידי אכיפת השימוש במעגל אחר עבור כל כתובת IP שאתה מתחבר אליה, היא אינה מספקת יתרון מעשי לרוב היישומים (במיוחד גלישה באינטרנט), עלולה לבוא עם עונש משמעותי בביצועים ומגבירה העומס על רשת Tor. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]

Tips for Android

@@ -128,7 +116,7 @@ Orbot מיושן לעתים קרובות ב[מאגר F-Droid](https://guardianpr
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ Orbot מיושן לעתים קרובות ב[מאגר F-Droid](https://guardianpr
- -## ממסרים וגשרים - -### Snowflake - -
- -![Snowflake לוגו](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake לוגו](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** מאפשר לך לתרום רוחב פס לפרויקט Tor על ידי הפעלת "Snowflake proxy" בתוך הדפדפן שלך. - -אנשים שמצונזרים יכולים להשתמש בפרוקסי של Snowflake כדי להתחבר לרשת Tor. Snowflake היא דרך מצוינת לתרום לרשת גם אם אין לך את הידע הטכני להפעיל ממסר Tor או גשר. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -אתה יכול לאפשר Snowflake בדפדפן שלך על ידי פתיחתו בכרטיסייה אחרת והפעלת המתג. אתה יכול להשאיר אותו פועל ברקע בזמן שאתה גולש כדי לתרום את החיבור שלך. אנו לא ממליצים להתקין Snowflake כהרחבה של דפדפן; הוספת הרחבות של צד שלישי יכולה להגדיל את משטח ההתקפה שלך. - -[הפעל Snowflake בדפדפן שלך :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake אינו מגדיל את פרטיותך בשום צורה, ואינו משמש לחיבור לרשת Tor בתוך הדפדפן האישי שלך. עם זאת, אם חיבור האינטרנט שלך אינו מצונזר, עליך לשקול להפעיל אותו כדי לעזור לאנשים ברשתות מצונזרות להשיג פרטיות טובה יותר בעצמם. אין צורך לדאוג לאילו אתרים אנשים ניגשים דרך ה-proxy שלך - כתובת ה-IP הגלויה של הגלישה שלהם תתאים לצומת היציאה של Tor, לא שלך. - -הפעלת פרוקסי של Snowflake היא בסיכון נמוך, אפילו יותר מהפעלת ממסר Tor או גשר שהם כבר מאמצים לא מסוכנים במיוחד. עם זאת, היא עדיין עושה תעבורת פרוקסי דרך הרשת שלך, מה שיכול להשפיע במובנים מסוימים, במיוחד אם הרשת שלך מוגבלת ברוחב הפס. ודא שאתה מבין [איך Snowflake עובד](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) לפני שתחליט אם להפעיל פרוקסי. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/hi/about/statistics.md b/i18n/hi/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/hi/about/statistics.md +++ b/i18n/hi/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/hi/advanced/tor-overview.md b/i18n/hi/advanced/tor-overview.md index cc7a2fad..b3a2ba63 100644 --- a/i18n/hi/advanced/tor-overview.md +++ b/i18n/hi/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/hi/alternative-networks.md b/i18n/hi/alternative-networks.md new file mode 100644 index 00000000..1b36f2c6 --- /dev/null +++ b/i18n/hi/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/hi/cloud.md b/i18n/hi/cloud.md index 4993581a..eb374f23 100644 --- a/i18n/hi/cloud.md +++ b/i18n/hi/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/hi/email-aliasing.md b/i18n/hi/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/hi/email-aliasing.md +++ b/i18n/hi/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/hi/mobile-browsers.md b/i18n/hi/mobile-browsers.md index 2b914ea9..3de9d6f4 100644 --- a/i18n/hi/mobile-browsers.md +++ b/i18n/hi/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/hi/passwords.md b/i18n/hi/passwords.md index b4cfa754..b91c9311 100644 --- a/i18n/hi/passwords.md +++ b/i18n/hi/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/hi/search-engines.md b/i18n/hi/search-engines.md index faaf4aa3..6b21affd 100644 --- a/i18n/hi/search-engines.md +++ b/i18n/hi/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/hi/tools.md b/i18n/hi/tools.md index eac1dc52..36bec402 100644 --- a/i18n/hi/tools.md +++ b/i18n/hi/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/hi/tor.md b/i18n/hi/tor.md index 3c240ddc..19234d4c 100644 --- a/i18n/hi/tor.md +++ b/i18n/hi/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Tor Network" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Connecting to Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ The Tor Browser is designed to prevent fingerprinting, or identifying you based In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/hu/about/statistics.md b/i18n/hu/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/hu/about/statistics.md +++ b/i18n/hu/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/hu/advanced/tor-overview.md b/i18n/hu/advanced/tor-overview.md index 2193d843..40735f21 100644 --- a/i18n/hu/advanced/tor-overview.md +++ b/i18n/hu/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Mivel a Tor forgalmat nehéz blokkolni és nyomon követni, a Tor hatékony eszköz a cenzúra megkerülésére. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Ez elrejti, hogy honnan érkezik a forgalom, és a kapcsolat útvonalában egyetlen szerver sem látja a teljes útvonalat, ahonnan a forgalom érkezik és ahová tart, ami azt jelenti, hogy még az általad csatlakozásra használt szerverek sem tudják megtörni az anonimitásodat. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Honlap} +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion szolgáltatás" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Dokumentáció} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Forráskód" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Közreműködés } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/hu/alternative-networks.md b/i18n/hu/alternative-networks.md new file mode 100644 index 00000000..b6dc1c9f --- /dev/null +++ b/i18n/hu/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. A magánszemélyek és szervezetek a Tor-hálózaton keresztül a ".onion rejtett szolgáltatásokkal" is megoszthatnak információkat anélkül, hogy veszélyeztetnék a magánéletüket. Mivel a Tor forgalmat nehéz blokkolni és nyomon követni, a Tor hatékony eszköz a cenzúra megkerülésére. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/hu/cloud.md b/i18n/hu/cloud.md index 011970ec..352355ac 100644 --- a/i18n/hu/cloud.md +++ b/i18n/hu/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/hu/email-aliasing.md b/i18n/hu/email-aliasing.md index 8e9c4c12..c9be1f14 100644 --- a/i18n/hu/email-aliasing.md +++ b/i18n/hu/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/hu/mobile-browsers.md b/i18n/hu/mobile-browsers.md index d5a1977b..c6ddab08 100644 --- a/i18n/hu/mobile-browsers.md +++ b/i18n/hu/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/hu/passwords.md b/i18n/hu/passwords.md index 5402a6d5..43d1af66 100644 --- a/i18n/hu/passwords.md +++ b/i18n/hu/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/hu/search-engines.md b/i18n/hu/search-engines.md index 128016d5..18c07d44 100644 --- a/i18n/hu/search-engines.md +++ b/i18n/hu/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/hu/tools.md b/i18n/hu/tools.md index ecf29ec5..2c2f1da6 100644 --- a/i18n/hu/tools.md +++ b/i18n/hu/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/hu/tor.md b/i18n/hu/tor.md index 91864519..eef3ca80 100644 --- a/i18n/hu/tor.md +++ b/i18n/hu/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor böngésző és hálózat: névtelen webes böngészés – Privacy Guides" -title: "Tor hálózat" -icon: simple/torproject +title: "Tor Böngésző" +icon: simple/torbrowser description: Védd meg internetes böngészésed a kíváncsi szemek elől egy biztonságos hálózat, a Tor használatával, amely megkerüli a cenzúrát. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -A **Tor** hálózat egy önkéntesek által üzemeltetett szerverekből álló csoport, amely lehetővé teszi, hogy ingyenesen csatlakozhass, és javíts a magánéleteden, valamint a biztonságodon az Interneten. A magánszemélyek és szervezetek a Tor-hálózaton keresztül a ".onion rejtett szolgáltatásokkal" is megoszthatnak információkat anélkül, hogy veszélyeztetnék a magánéletüket. Mivel a Tor forgalmat nehéz blokkolni és nyomon követni, a Tor hatékony eszköz a cenzúra megkerülésére. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Honlap} -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion szolgáltatás" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Dokumentáció} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Forráskód" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Közreműködés } - -A Tor úgy működik, hogy az internetes forgalmadat önkéntesek által üzemeltetett szervereken keresztül irányítja át, ahelyett, hogy közvetlen kapcsolatot létesítene a meglátogatni kívánt oldallal. Ez elrejti, hogy honnan érkezik a forgalom, és a kapcsolat útvonalában egyetlen szerver sem látja a teljes útvonalat, ahonnan a forgalom érkezik és ahová tart, ami azt jelenti, hogy még az általad csatlakozásra használt szerverek sem tudják megtörni az anonimitásodat. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. A magánszemélyek és szervezetek a Tor-hálózaton keresztül a ".onion rejtett szolgáltatásokkal" is megoszthatnak információkat anélkül, hogy veszélyeztetnék a magánéletüket. Mivel a Tor forgalmat nehéz blokkolni és nyomon követni, a Tor hatékony eszköz a cenzúra megkerülésére. [Részletes Tor áttekintés :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Csatlakozás a Torhoz -

Tanács

@@ -52,7 +40,7 @@ Néhány ilyen alkalmazás jobb, mint mások, a választás a fenyegetettségi s Ha a teljes anonimitás a legfontosabb számodra, akkor **csak** az asztali Tor Browser klienst használd, ideális esetben egy [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) konfigurációban. A mobil böngészők kevésbé elterjedtek a Toron (emiatt könnyebben lehet ujjlenyomatolni azokat), és más konfigurációkat nem tesztelnek olyan szigorúan a deanonimizálás ellen. -### Tor Böngésző +## Tor Böngésző
@@ -90,7 +78,7 @@ A Tor böngészőt úgy tervezték, hogy megakadályozza az ujjlenyomatolást, v A Tor Böngésző közvetlen számítógépre telepítése mellett vannak olyan operációs rendszerek is, amelyeket kifejezetten a Tor-hálózathoz való csatlakozásra terveztek, mint például a [Whonix](desktop.md#whonix) a [Qubes OS-en](desktop.md#qubes-os), amelyek még nagyobb biztonságot és védelmet nyújtanak, mint a hagyományos Tor Browser önmagában. -### Orbot +## Orbot
@@ -115,7 +103,7 @@ Az **Orbot** egy ingyenes Tor VPN okostelefonokhoz, amely a Tor hálózaton kere
-Korábban ajánlottuk az *Célcím elszigetelése* beállítás engedélyezését az Orbot beállításaiban. Bár ez a beállítás elméletileg javíthatja az adatvédelmet azáltal, hogy minden egyes IP-címhez más-más áramkör használatát kényszeríti, a legtöbb alkalmazásnál (különösen webböngészésnél) nem nyújt gyakorlati előnyt, jelentős teljesítménycsökkenéssel járhat, és növeli a Tor hálózat terhelését. Többé már nem javasoljuk, hogy ezt a beállítást az alapértelmezett értékétől eltérően módosítsd, kivéve, ha tudod, hogy szükséged van rá.[^1] +Korábban ajánlottuk az *Célcím elszigetelése* beállítás engedélyezését az Orbot beállításaiban. Bár ez a beállítás elméletileg javíthatja az adatvédelmet azáltal, hogy minden egyes IP-címhez más-más áramkör használatát kényszeríti, a legtöbb alkalmazásnál (különösen webböngészésnél) nem nyújt gyakorlati előnyt, jelentős teljesítménycsökkenéssel járhat, és növeli a Tor hálózat terhelését. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]

Tippek Androidhoz

@@ -128,7 +116,7 @@ Minden verzió ugyanazzal az aláírással van aláírva, így kompatibilisnek k
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ Az **Onion Browser** egy nyílt forráskódú böngésző, amely lehetővé tesz
- -## Elosztók and hidak - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -A **Snowflake** lehetővé teszi, hogy sávszélességet adományozz a Tor projektnek azáltal, hogy egy "Snowflake proxy"-t működtetsz a böngésződben. - -Azok, akiket cenzúráznak, Snowflake proxykat használhatnak a Tor-hálózathoz való csatlakozáshoz. A Snowflake egy nagyszerű módja annak, hogy hozzájárulj a hálózathoz, még akkor is, ha nincs meg a technikai tudásod egy Tor elosztó vagy híd üzemeltetéséhez. - -[:octicons-home-16: Honlap](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Dokumentáció} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Forráskód" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Támogatás} - - - -
- -A Snowflake-et engedélyezheted a böngésződben úgy, hogy megnyitod azt egy másik lapon, és aktiválod a kapcsolót. Futni hagyhatod a háttérben, hogy hozzájárulj a kapcsolatoddal böngészés közben. Nem javasoljuk a Snowflake böngésző bővítményként való telepítését; harmadik féltől származó bővítmények hozzáadása növelheti a támadási felületet. - -[A Snowflake futtatása böngészőben :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -A Snowflake semmilyen módon nem növeli az magánéletedet, és a személyes böngésződön keresztül a Tor-hálózathoz kapcsolódni sem használatos. Ha azonban az internetkapcsolatod nincs cenzúrázva, érdemes megfontolni a futtatását, hogy segíts cenzúrázott hálózatokon lévő személyeknek jobb magánéletet elérni. Nem kell aggódnod amiatt, hogy személyek milyen weboldalakhoz férnek hozzá a proxydon keresztül – a látható böngészési IP-címük a Tor kilépő csomópontjukkal egyezik majd meg, nem pedig tieddel. - -Egy Snowflake proxy futtatása alacsony kockázatú, még inkább, mint egy Tor elosztó vagy híd futtatása, amelyek már eleve sem különösebben kockázatos vállalkozások. Ugyanakkor a hálózaton keresztül történő forgalom átvitelére is képes, ami bizonyos szempontból hatással lehet, különösen, ha a hálózat sávszélessége korlátozott. Győződj meg róla, hogy érted [hogyan működik a Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home), mielőtt eldöntöd, hogy futtatsz-e proxyt. - -[^1]: Az `IsolateDestAddr` beállításról a [Tor levelezési listán](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) és a [Whonix Stream Isolation dokumentációjában](https://whonix.org/wiki/Stream_Isolation) is szó esik, ahol mindkét projekt azt javasolja, hogy ez általában nem jó megközelítés a legtöbb ember számára. diff --git a/i18n/id/about/statistics.md b/i18n/id/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/id/about/statistics.md +++ b/i18n/id/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/id/advanced/tor-overview.md b/i18n/id/advanced/tor-overview.md index 7c970ffa..a5f8e6af 100644 --- a/i18n/id/advanced/tor-overview.md +++ b/i18n/id/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor adalah jaringan terdesentralisasi yang gratis untuk digunakan, dan dirancang untuk penggunaan internet seprivat mungkin. --- -Tor adalah jaringan terdesentralisasi yang gratis untuk digunakan, dan dirancang untuk penggunaan internet seprivat mungkin. Jika digunakan dengan benar, jaringan ini memungkinkan penjelajahan dan komunikasi secara privat dan anonim. +![Logo Tor](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Jika digunakan dengan benar, jaringan ini memungkinkan penjelajahan dan komunikasi secara privat dan anonim. Karena lalu lintas Tor sulit diblokir dan dilacak, Tor merupakan alat pengelabuan sensor yang efektif. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Hal ini mengaburkan dari mana lalu lintas berasal, dan tidak ada server di jalur koneksi yang dapat melihat jalur penuh dari mana lalu lintas berasal dan pergi, yang berarti bahkan server yang Anda gunakan untuk terhubung tidak dapat merusak anonimitas Anda. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/id/alternative-networks.md b/i18n/id/alternative-networks.md new file mode 100644 index 00000000..3a3cab8a --- /dev/null +++ b/i18n/id/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individu dan organisasi juga dapat berbagi informasi melalui jaringan Tor dengan "layanan tersembunyi .onion" tanpa mengorbankan privasi mereka. Karena lalu lintas Tor sulit diblokir dan dilacak, Tor merupakan alat pengelabuan sensor yang efektif. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/id/cloud.md b/i18n/id/cloud.md index 6bfb5da5..8a1c4aeb 100644 --- a/i18n/id/cloud.md +++ b/i18n/id/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/id/email-aliasing.md b/i18n/id/email-aliasing.md index 2d1420cb..0b4e4099 100644 --- a/i18n/id/email-aliasing.md +++ b/i18n/id/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/id/mobile-browsers.md b/i18n/id/mobile-browsers.md index 09eae420..cca0e714 100644 --- a/i18n/id/mobile-browsers.md +++ b/i18n/id/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/id/passwords.md b/i18n/id/passwords.md index cc95f82e..76bd3e1f 100644 --- a/i18n/id/passwords.md +++ b/i18n/id/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/id/search-engines.md b/i18n/id/search-engines.md index 313d5dd7..74a036fa 100644 --- a/i18n/id/search-engines.md +++ b/i18n/id/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/id/tools.md b/i18n/id/tools.md index 4f9a2e33..e1da43ac 100644 --- a/i18n/id/tools.md +++ b/i18n/id/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/id/tor.md b/i18n/id/tor.md index c7d14c21..44519f7e 100644 --- a/i18n/id/tor.md +++ b/i18n/id/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Peramban dan Jaringan Tor: Penjelajahan Web Anonim - Privacy Guides" -title: "Jaringan Tor" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Lindungi penjelajahan internet Anda dari pengintaian dengan menggunakan jaringan Tor, sebuah jaringan aman yang dapat menghindari penyensoran. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Logo Tor](assets/img/self-contained-networks/tor.svg){ align=right } - -Jaringan **Tor** adalah sekelompok server yang dioperasikan secara sukarela yang memungkinkan Anda terhubung secara gratis dan meningkatkan privasi dan keamanan Anda di Internet. Individu dan organisasi juga dapat berbagi informasi melalui jaringan Tor dengan "layanan tersembunyi .onion" tanpa mengorbankan privasi mereka. Karena lalu lintas Tor sulit diblokir dan dilacak, Tor merupakan alat pengelabuan sensor yang efektif. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor bekerja dengan merutekan lalu lintas internet Anda melalui server yang dioperasikan secara sukarela, daripada membuat koneksi langsung ke situs yang Anda coba kunjungi. Hal ini mengaburkan dari mana lalu lintas berasal, dan tidak ada server di jalur koneksi yang dapat melihat jalur penuh dari mana lalu lintas berasal dan pergi, yang berarti bahkan server yang Anda gunakan untuk terhubung tidak dapat merusak anonimitas Anda. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individu dan organisasi juga dapat berbagi informasi melalui jaringan Tor dengan "layanan tersembunyi .onion" tanpa mengorbankan privasi mereka. Karena lalu lintas Tor sulit diblokir dan dilacak, Tor merupakan alat pengelabuan sensor yang efektif. [Ikhtisar Tor Terperinci :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Menghubungkan ke Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ Tor Browser dirancang untuk mencegah sidik jari, atau mengidentifikasi Anda berd In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -115,7 +103,7 @@ In addition to installing Tor Browser on your computer directly, there are also
-Kami sebelumnya merekomendasikan untuk mengaktifkan preferensi *Isolasi Alamat Tujuan* di pengaturan Orbot. Walaupun pengaturan ini secara teoritis dapat meningkatkan privasi dengan memaksakan penggunaan sirkuit yang berbeda untuk setiap alamat IP yang Anda sambungkan, pengaturan ini tidak memberikan keuntungan praktis untuk sebagian besar aplikasi (terutama penelusuran web), dapat menimbulkan dampak buruk signifikan terhadap kinerja, dan meningkatkan beban pada jaringan Tor. Kami tidak lagi menyarankan untuk menyesuaikan pengaturan ini dari nilai bawaannya kecuali jika Anda memang membutuhkannya.[^1] +Kami sebelumnya merekomendasikan untuk mengaktifkan preferensi *Isolasi Alamat Tujuan* di pengaturan Orbot. Walaupun pengaturan ini secara teoritis dapat meningkatkan privasi dengan memaksakan penggunaan sirkuit yang berbeda untuk setiap alamat IP yang Anda sambungkan, pengaturan ini tidak memberikan keuntungan praktis untuk sebagian besar aplikasi (terutama penelusuran web), dapat menimbulkan dampak buruk signifikan terhadap kinerja, dan meningkatkan beban pada jaringan Tor. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]

Tips for Android

@@ -128,7 +116,7 @@ Semua versi ditandatangani menggunakan tanda tangan yang sama sehingga seharusny
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ Semua versi ditandatangani menggunakan tanda tangan yang sama sehingga seharusny
- -## Relai dan Jembatan - -### Snowflake - -
- -![Logo Snowflake](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Logo Snowflake](assets/img/browsers/snowflake-gelap.svg#only-dark){ align=right } - -**Snowflake** memungkinkan Anda untuk menyumbangkan bandwidth ke Proyek Tor dengan mengoperasikan "proksi Snowflake" di dalam peramban Anda. - -Orang-orang yang disensor bisa menggunakan proksi Snowflake untuk menyambung ke jaringan Tor. Snowflake adalah cara yang bagus untuk berkontribusi pada jaringan bahkan jika Anda tidak memiliki pengetahuan teknis untuk menjalankan relai atau jembatan Tor. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -Anda dapat mengaktifkan Snowflake di peramban Anda dengan membukanya di tab lain dan mengaktifkan tombolnya. Anda dapat membiarkannya berjalan di latar belakang saat Anda menjelajah untuk menyumbangkan koneksi Anda. Kami tidak menyarankan untuk memasang Snowflake sebagai ekstensi peramban; menambahkan ekstensi pihak ketiga dapat meningkatkan permukaan serangan Anda. - -[Jalankan Snowflake di Peramban Anda :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake tidak meningkatkan privasi Anda dengan cara apa pun, juga tidak digunakan untuk terhubung ke jaringan Tor dalam peramban pribadi Anda. Namun, jika koneksi internet Anda tidak disensor, Anda sebaiknya mempertimbangkan untuk menjalankannya untuk membantu orang-orang di jaringan yang disensor untuk mencapai privasi yang lebih baik. Tidak perlu khawatir tentang situs web mana yang diakses orang melalui proksi Anda—alamat IP penjelajahan mereka yang terlihat akan cocok dengan node keluar Tor mereka, bukan milik Anda. - -Menjalankan proksi Snowflake berisiko rendah, bahkan lebih rendah daripada menjalankan relai Tor atau jembatan yang sudah tidak terlalu berisiko. Namun, itu masih memproksi lalu lintas melalui jaringan Anda yang dapat berdampak pada beberapa hal, terutama jika jaringan Anda memiliki bandwidth terbatas. Pastikan Anda memahami [cara kerja Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) sebelum memutuskan apakah akan menjalankan proksi. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/it/about/statistics.md b/i18n/it/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/it/about/statistics.md +++ b/i18n/it/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/it/advanced/tor-overview.md b/i18n/it/advanced/tor-overview.md index 801f39ad..7ba06209 100644 --- a/i18n/it/advanced/tor-overview.md +++ b/i18n/it/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor è una rete decentralizzata e libera, progettata per utilizzare Internet con quanta più privacy possibile. --- -Tor è una rete decentralizzata e libera, progettata per utilizzare Internet con quanta più privacy possibile. Se utilizzata adeguatamente, la rete consente navigazione e comunicazioni private e anonime. +![Logo di Tor](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Se utilizzata adeguatamente, la rete consente navigazione e comunicazioni private e anonime. Poiché il traffico di Tor è difficile da bloccare e tracciare, è un efficace strumento di elusione della censura. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. In questo modo si offusca la provenienza del traffico e nessun server nel percorso di connessione è in grado di vedere il percorso completo del traffico proveniente e diretto, il che significa che nemmeno i server utilizzati per connettersi possono violare l'anonimato. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Connettersi in sicurezza a Tor -Prima di connetterti a [Tor](../tor.md), dovresti considerare attentamente cosa vuoi ottenere utilizzando Tor e a chi vuoi nascondere la tua attività in rete. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. Se vivi in un Paese libero, accedi a contenuti banali tramite Tor, non sei preoccupato che il tuo ISP o gli amministratori della rete locale sappiano che stai usando Tor e vuoi aiutare [a de-stigmatizzare](https://2019.www.torproject.org/about/torusers.html.en) l'uso di Tor, puoi probabilmente connetterti a Tor direttamente tramite mezzi standard come [Tor Browser](../tor.md) senza preoccupazioni. diff --git a/i18n/it/alternative-networks.md b/i18n/it/alternative-networks.md new file mode 100644 index 00000000..a2f34131 --- /dev/null +++ b/i18n/it/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individui e organizzazioni possono inoltre condividere le informazioni tramite la rete Tor con i "servizi nascosti .onion", senza comprometterne la privacy. Poiché il traffico di Tor è difficile da bloccare e tracciare, è un efficace strumento di elusione della censura. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Scarica + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/it/cloud.md b/i18n/it/cloud.md index f22b7f27..fbd4d4b7 100644 --- a/i18n/it/cloud.md +++ b/i18n/it/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/it/email-aliasing.md b/i18n/it/email-aliasing.md index f16b2b7f..f56f8571 100644 --- a/i18n/it/email-aliasing.md +++ b/i18n/it/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/it/mobile-browsers.md b/i18n/it/mobile-browsers.md index 14611f0c..5d9bc983 100644 --- a/i18n/it/mobile-browsers.md +++ b/i18n/it/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/it/passwords.md b/i18n/it/passwords.md index e7b51a92..d46ac187 100644 --- a/i18n/it/passwords.md +++ b/i18n/it/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/it/search-engines.md b/i18n/it/search-engines.md index a16cb2a7..b239d32e 100644 --- a/i18n/it/search-engines.md +++ b/i18n/it/search-engines.md @@ -100,7 +100,7 @@ Utilizzando un'istanza di SearXNG, assicurati di leggere la loro politica sulla Startpage ha sede nei Paesi Bassi. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. Non registrano il tuo indirizzo IP, le richieste di ricerca o altre informazioni personalmente identificabili. -L'azionista di maggioranza di Startpage è System1, un'azienda di tecnologie inserzionistiche. Non crediamo che ciò sia un problema, dato che seguono una [politica sull privacy](https://system1.com/terms/privacy-policy) distintamente separata. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +L'azionista di maggioranza di Startpage è System1, un'azienda di tecnologie inserzionistiche. Non crediamo che ciò sia un problema, dato che seguono una [politica sull privacy](https://system1.com/terms/privacy-policy) distintamente separata. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/it/tools.md b/i18n/it/tools.md index 67a1dea6..aab1b744 100644 --- a/i18n/it/tools.md +++ b/i18n/it/tools.md @@ -483,6 +483,15 @@ Per crittografare l'unità del sistema operativo, in genere si consiglia di util Questi strumenti possono essere utili per alcuni individui. Forniscono funzionalità di cui gran parte delle persone non devono preoccuparsi e spesso richiedono una conoscenza tecnologica più approfondita per un utilizzo efficace. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Verifica dell'Integrità del Dispositivo
diff --git a/i18n/it/tor.md b/i18n/it/tor.md index a0751049..23fdce6d 100644 --- a/i18n/it/tor.md +++ b/i18n/it/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Browser e Rete Tor: Navigazione Web Anonima - Privacy Guides" -title: "Rete Tor" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Proteggi la tua navigazione su Internet da occhi indiscreti, utilizzando la rete Tor, una rete sicura che elude la censura. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Logo di Tor](assets/img/self-contained-networks/tor.svg){ align=right } - -La rete di **Tor** è un gruppo di server gestiti da volontari che ti consente di connetterti gratuitamente e migliora la tua privacy e sicurezza su Internet. Individui e organizzazioni possono inoltre condividere le informazioni tramite la rete Tor con i "servizi nascosti .onion", senza comprometterne la privacy. Poiché il traffico di Tor è difficile da bloccare e tracciare, è un efficace strumento di elusione della censura. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor funziona instradando il traffico tramite questi server gestiti da volontari, invece di effettuare una connessione diretta al sito che stai provando a visitare. In questo modo si offusca la provenienza del traffico e nessun server nel percorso di connessione è in grado di vedere il percorso completo del traffico proveniente e diretto, il che significa che nemmeno i server utilizzati per connettersi possono violare l'anonimato. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individui e organizzazioni possono inoltre condividere le informazioni tramite la rete Tor con i "servizi nascosti .onion", senza comprometterne la privacy. Poiché il traffico di Tor è difficile da bloccare e tracciare, è un efficace strumento di elusione della censura. [Panoramica dettagliata di Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Connessione a Tor -

Suggerimento

@@ -52,7 +40,7 @@ Alcune di queste app sono migliori di altre e, anche in questo caso, la scelta d Se l'anonimato più completo è fondamentale per la tua situazione, dovresti utilizzare **soltanto** il client del Browser Tor per desktop, idealmente in una configurazione [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os). I browser per mobile sono meno comuni su Tor (e, di conseguenza, più rilevabili), e altre configurazioni non sono altrrettanto testate contro la deanonimizzazione. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ Tor Browser è progettato per impedire il fingerprinting, o la tua identificazio Oltre a installare Tor Browser direttamente sul tuo computer, esistono inoltre dei sistemi operativi specificamente progettati per connettersi alla rete di Tor, come [Whonix](desktop.md#whonix) su [Qubes OS](desktop.md#qubes-os), che forniscono sicurezza e protezioni persino maggiori, rispetto al solo Tor Browser standard. -### Orbot +## Orbot
@@ -115,7 +103,7 @@ Oltre a installare Tor Browser direttamente sul tuo computer, esistono inoltre d
-Abbiamo precedentemente consiglito di abilitare la preferenza *Isola Indirizzo di Destinazione* nelle impostazioni di Orbot. Sebbene quest'impostazione possa teoricamente migliorare la privacy, imponendo l'utilizzo di un circuito differente per ogni indirizzo IP cui ti connetti, non fornisce un vantaggio pratico per gran parte delle applicazioni (specialmente per la navigazione web), può comportare una significativa riduzione delle prestazioni e incrementa il carico sulla rete di Tor. Non consigliamo più la regolazione di quest'impostazione dal suo valore predefinito, a meno che non sia necessario.[^1] +Abbiamo precedentemente consiglito di abilitare la preferenza *Isola Indirizzo di Destinazione* nelle impostazioni di Orbot. Sebbene quest'impostazione possa teoricamente migliorare la privacy, imponendo l'utilizzo di un circuito differente per ogni indirizzo IP cui ti connetti, non fornisce un vantaggio pratico per gran parte delle applicazioni (specialmente per la navigazione web), può comportare una significativa riduzione delle prestazioni e incrementa il carico sulla rete di Tor. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]

Suggerimenti per Android

@@ -128,7 +116,7 @@ Tutte le versioni sono firmate utilizzando la medesima firma, quindi, dovrebbero
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ Tutte le versioni sono firmate utilizzando la medesima firma, quindi, dovrebbero
- -## Relay e Bridge - -### Snowflake - -
- -![Logo di Snowflake](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Logo di Snowflake](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** ti consente di donare larghezza di banda a Tor Project, operando un "proxy di Snowflake" nel tuo browser. - -Gli individui sottoposti a censura possono utilizzare i proxy di Snowflake per connettersi alla rete di Tor. Snowflake è un ottimo modo per contribuire alla rete, anche senza le conoscenze tecniche per eseguire un relé o ponte di Tor. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -Puoi abilitare Snowflake nel tuo browser aprendolo in un'altra scheda e attivando l'interruttore. Puoi lasciarlo in esecuzione in background mentre navighi per contribuire alla tua connessione. Sconsigliamo di installare Snowflake come un'estensione del browser; aggiungere estensioni di terze parti può incrementare la superficie di attacco. - -[Esegui Snowflake nel tuo browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake non incrementa la tua privacy in alcun modo, né è utilizzato per connettersi alla rete di Tor sul tuo browser personale. Tuttavia, se la tua connessione a Internet non è censurata, dovresti considerarne l'esecuzione per aiutare le persone su reti sottoposte a censura ad ottenere un migliore privacy. Non è necessario preoccuparsi di quali siti web siano acceduti dalle persone tramite il tuo proxy: il loro indirizzo IP di navigazione visibile corrisponderà al loro nodo d'uscita di Tor, non al tuo. - -L'esecuzione di un proxy di Snowflake è a basso rischio, persino di più della gestione di un relé o ponte di Tor, che già non sono attività particolarmente rischiose. Tuttavia, comunque, delega il traffico attraverso la tua rete, il che può avere un certo impatto, specialmente se la rete ha una larghezza di banda limitata. Assicurati di comprendere [il funzionamento di Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) prima di decidere se gestire un proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/ja/about/statistics.md b/i18n/ja/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/ja/about/statistics.md +++ b/i18n/ja/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/ja/advanced/tor-overview.md b/i18n/ja/advanced/tor-overview.md index 64507f5a..0884c254 100644 --- a/i18n/ja/advanced/tor-overview.md +++ b/i18n/ja/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Torは、可能な限りプライバシーを守ってインターネットを利用するために設計された、自由に利用できる分散型ネットワークです。 --- -Torは、可能な限りプライバシーを守ってインターネットを利用するために設計された、自由に利用できる分散型ネットワークです。 適切に使用すれば、プライベートで匿名のブラウジングや通信を行うことができます。 +![Torのロゴ](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. 適切に使用すれば、プライベートで匿名のブラウジングや通信を行うことができます。 Torトラフィックはブロックや追跡が困難であるため、Torは効果的な検閲回避ツールです。 + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Torへの安全な接続 -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/ja/alternative-networks.md b/i18n/ja/alternative-networks.md new file mode 100644 index 00000000..9f16d05a --- /dev/null +++ b/i18n/ja/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 個人や組織は、プライバシーを損なうことなく、Torネットワーク上で「.onion 秘匿サービス」による情報共有が可能です。 Torトラフィックはブロックや追跡が困難であるため、Torは効果的な検閲回避ツールです。 + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/ja/cloud.md b/i18n/ja/cloud.md index c80d7b04..12040e1d 100644 --- a/i18n/ja/cloud.md +++ b/i18n/ja/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/ja/email-aliasing.md b/i18n/ja/email-aliasing.md index be518d8c..c32de634 100644 --- a/i18n/ja/email-aliasing.md +++ b/i18n/ja/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/ja/mobile-browsers.md b/i18n/ja/mobile-browsers.md index eed47da4..f90ea9bb 100644 --- a/i18n/ja/mobile-browsers.md +++ b/i18n/ja/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/ja/passwords.md b/i18n/ja/passwords.md index ff8ada64..a4c08a4d 100644 --- a/i18n/ja/passwords.md +++ b/i18n/ja/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/ja/search-engines.md b/i18n/ja/search-engines.md index 8bc216f2..2ad39b16 100644 --- a/i18n/ja/search-engines.md +++ b/i18n/ja/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/ja/tools.md b/i18n/ja/tools.md index 07a6db67..7342965e 100644 --- a/i18n/ja/tools.md +++ b/i18n/ja/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/ja/tor.md b/i18n/ja/tor.md index 738639bb..c244518d 100644 --- a/i18n/ja/tor.md +++ b/i18n/ja/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browserとネットワーク: 匿名のウェブブラウジング - Privacy Guides" -title: "Torネットワーク" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Torのロゴ](assets/img/self-contained-networks/tor.svg){ align=right } - -**Tor**ネットワークは、ボランティアが運営するサーバ群で、無料で接続でき、インターネット上でのプライバシーとセキュリティの確保に役立ちます。 個人や組織は、プライバシーを損なうことなく、Torネットワーク上で「.onion 秘匿サービス」による情報共有が可能です。 Torトラフィックはブロックや追跡が困難であるため、Torは効果的な検閲回避ツールです。 - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 個人や組織は、プライバシーを損なうことなく、Torネットワーク上で「.onion 秘匿サービス」による情報共有が可能です。 Torトラフィックはブロックや追跡が困難であるため、Torは効果的な検閲回避ツールです。 [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Torへの接続 -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ Tor Browserはフィンガープリントを防止するよう設計されてお In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## リレーとブリッジ - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[ブラウザでSnowflakeを実行 :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflakeはあなたのプライバシーを高めるものではなく、また、あなたのブラウザーでTorネットワークに接続するために使用されるものでもありません。 However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. プロキシーを設置するかどうかを決定する前に、 [Snowflakeがどのように動作するか](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home)について理解しておきましょう。 - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/ko/about/statistics.md b/i18n/ko/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/ko/about/statistics.md +++ b/i18n/ko/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/ko/advanced/tor-overview.md b/i18n/ko/advanced/tor-overview.md index 4ee8ed67..98b8f99f 100644 --- a/i18n/ko/advanced/tor-overview.md +++ b/i18n/ko/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor는 무료로 이용 가능한 탈중앙화 네트워크입니다. 최대한 프라이버시를 보호하면서 인터넷을 이용할 수 있도록 설계되었습니다. --- -Tor는 무료로 이용 가능한 탈중앙화 네트워크입니다. 최대한 프라이버시를 보호하면서 인터넷을 이용할 수 있도록 설계되었습니다. Tor 네트워크를 올바르게 사용하면 비공개 및 익명 웹 탐색과 커뮤니케이션이 가능합니다. +![Tor 로고](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Tor 네트워크를 올바르게 사용하면 비공개 및 익명 웹 탐색과 커뮤니케이션이 가능합니다. Tor 트래픽은 차단 및 추적이 어렵기 때문에 검열 우회에 효과적입니다. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. 이러한 방식을 통해 트래픽의 출처를 알 수 없게 만들고, 연결 경로상의 서버 또한 트래픽의 전체 경로는 볼 수 없으므로, 연결에 사용한 서버조차도 여러분의 익명성을 깨트릴 수 없습니다. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/ko/alternative-networks.md b/i18n/ko/alternative-networks.md new file mode 100644 index 00000000..3f2d351a --- /dev/null +++ b/i18n/ko/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 개인 및 단체는 'Onion hidden 서비스'를 통해, 프라이버시를 침해받는 일 없이 Tor 네트워크에서 정보를 공유할 수 있습니다. Tor 트래픽은 차단 및 추적이 어렵기 때문에 검열 우회에 효과적입니다. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/ko/cloud.md b/i18n/ko/cloud.md index 362be6f0..de29a63f 100644 --- a/i18n/ko/cloud.md +++ b/i18n/ko/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/ko/email-aliasing.md b/i18n/ko/email-aliasing.md index 9eb341af..48bf6be6 100644 --- a/i18n/ko/email-aliasing.md +++ b/i18n/ko/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/ko/mobile-browsers.md b/i18n/ko/mobile-browsers.md index 8d485148..7474a6cc 100644 --- a/i18n/ko/mobile-browsers.md +++ b/i18n/ko/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/ko/passwords.md b/i18n/ko/passwords.md index 44751f3d..753bbc4c 100644 --- a/i18n/ko/passwords.md +++ b/i18n/ko/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/ko/search-engines.md b/i18n/ko/search-engines.md index f82663a1..ae330e2e 100644 --- a/i18n/ko/search-engines.md +++ b/i18n/ko/search-engines.md @@ -100,7 +100,7 @@ SearXNG 인스턴스를 사용하는 경우에는 해당 인스턴스의 프라 Startpage 본사는 네덜란드에 위치하고 있습니다. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. IP 주소, 검색 쿼리 및 그 외 개인 식별 정보는 기록하지 않습니다. -Startpage 대주주는 System1이라는 애드테크 회사입니다. 별도의 [프라이버시 정책](https://system1.com/terms/privacy-policy)을 가지고 있으므로 문제가 되지는 않을 것으로 판단됩니다. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage 대주주는 System1이라는 애드테크 회사입니다. 별도의 [프라이버시 정책](https://system1.com/terms/privacy-policy)을 가지고 있으므로 문제가 되지는 않을 것으로 판단됩니다. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/ko/tools.md b/i18n/ko/tools.md index 8245f8ea..8b9019bd 100644 --- a/i18n/ko/tools.md +++ b/i18n/ko/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/ko/tor.md b/i18n/ko/tor.md index 2e6206b4..4944a378 100644 --- a/i18n/ko/tor.md +++ b/i18n/ko/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor 브라우저 및 네트워크: 익명 웹 탐색 - Privacy Guides" -title: "Tor 네트워크" -icon: simple/torproject +title: "Tor 브라우저" +icon: simple/torbrowser description: 검열 우회 보안 네트워크인 Tor 네트워크를 사용해 여러분의 인터넷 탐색이 감시당하지 않도록 보호하세요. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor 로고](assets/img/self-contained-networks/tor.svg){ align=right } - -**Tor** 네트워크는 자원 봉사 형태로 운영되는 서버 그룹으로, 무료로 연결하여 인터넷에서 프라이버시와 보안을 향상시킬 수 있습니다. 개인 및 단체는 'Onion hidden 서비스'를 통해, 프라이버시를 침해받는 일 없이 Tor 네트워크에서 정보를 공유할 수 있습니다. Tor 트래픽은 차단 및 추적이 어렵기 때문에 검열 우회에 효과적입니다. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor는 방문하려는 사이트에 직접 연결하는 방식이 아닌, 자원 봉사자가 운영하는 서버를 통해 인터넷 트래픽을 전송합니다. 이러한 방식을 통해 트래픽의 출처를 알 수 없게 만들고, 연결 경로상의 서버 또한 트래픽의 전체 경로는 볼 수 없으므로, 연결에 사용한 서버조차도 여러분의 익명성을 깨트릴 수 없습니다. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 개인 및 단체는 'Onion hidden 서비스'를 통해, 프라이버시를 침해받는 일 없이 Tor 네트워크에서 정보를 공유할 수 있습니다. Tor 트래픽은 차단 및 추적이 어렵기 때문에 검열 우회에 효과적입니다. [자세한 Tor 개요 :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Tor 연결하기 -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor 브라우저 +## Tor 브라우저
@@ -90,7 +78,7 @@ Tor 브라우저는 핑거프린팅 및 브라우저 설정 기반 사용자 식 Tor Browser를 컴퓨터에 설치해서 연결하는 방법도 있지만, [Qubes OS](desktop.md#qubes-os)의 [Whonix](desktop.md#whonix)처럼 Tor 네트워크에 연결하기 위한 용도로 만들어진 운영 체제도 있습니다. 이러한 연결 방식은 Tor Browser를 사용하는 것보다 더 강력한 보안을 제공합니다. -### Orbot +## Orbot
@@ -115,7 +103,7 @@ Tor Browser를 컴퓨터에 설치해서 연결하는 방법도 있지만, [Qube
-이전에는 Orbot 설정에서 *Isolate Destination Address* 옵션을 활성화하도록 권장했었습니다. 이론적으로, 이 옵션은 연결이 발생하는 모든 IP 주소마다 다른 경로를 사용하도록 하여 프라이버시를 향상시킬 수 있습니다. 하지만 대부분의 애플리케이션(특히 웹 브라우저)에 실질적인 이점을 제공하지 않으며, 상당한 성능 저하를 초래하고 Tor 네트워크의 부하를 증가시킵니다. 반드시 필요한 경우가 아니라면, 이 옵션을 수정하지 않는 것을 더 이상 권장드리지 않습니다.[^1] +이전에는 Orbot 설정에서 *Isolate Destination Address* 옵션을 활성화하도록 권장했었습니다. 이론적으로, 이 옵션은 연결이 발생하는 모든 IP 주소마다 다른 경로를 사용하도록 하여 프라이버시를 향상시킬 수 있습니다. 하지만 대부분의 애플리케이션(특히 웹 브라우저)에 실질적인 이점을 제공하지 않으며, 상당한 성능 저하를 초래하고 Tor 네트워크의 부하를 증가시킵니다. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]

Tips for Android

@@ -128,7 +116,7 @@ Guardian Project [F-Droid 저장소](https://guardianproject.info/fdroid), [Goog
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ Guardian Project [F-Droid 저장소](https://guardianproject.info/fdroid), [Goog
- -## 릴레이 및 브리지 - -### Snowflake - -
- -![Snowflake 로고](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake 로고](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake**는 여러분의 브라우저 내에서 'Snowflake 프록시'를 작동시켜 Tor 프로젝트에 대역폭을 기부합니다. - -검열을 받고 있는 사람들은 Snowflake 프록시를 사용해 Tor 네트워크에 접속할 수 있습니다. Snowflake는 Tor 릴레이나 브리지를 운영할 기술적 노하우가 없더라도 네트워크에 기여할 수 있는 좋은 방법입니다. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -여러분이 사용하는 브라우저의 다른 탭에 Snowflake를 열고, 활성화 스위치를 켜면 Snowflake를 활성화할 수 있습니다. 브라우저를 사용하는 동안 백그라운드에서 실행시켜 두는 것만으로도 대역폭 기여가 가능합니다. Snowflake 브라우저 확장 프로그램도 존재하지만, Privacy Guides는 여러분의 공격 표면이 늘어날 가능성을 최소화하기 위해 브라우저 확장 프로그램 설치는 권장드리지 않습니다. - -[브라우저에서 Snowflake 실행 :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake는 어떤 방식으로도 여러분의 프라이버시를 침해하지 않으며, 여러분이 사용하는 브라우저를 Tor 네트워크에 연결해 주지도 않습니다. 그러나, 여러분이 인터넷 연결을 검열받고 있지 않은 상황에 계신 경우, 네트워크를 검열받고 있는 사람들이 프라이버시를 강화할 수 있도록 돕는 걸 고려해주시기 바랍니다. 다른 사람들이 여러분의 프록시를 통해 어떤 사이트에 접근할지 걱정하지 않으셔도 됩니다. 사람들의 IP 주소는 Tor 출구 노드로 표시되며, 프록시 주소로 표시되지 않습니다. - -Snowflake 프록시 구동의 위험성은 매우 낮습니다. Tor 릴레이/브리지 구동(이 또한 특별히 위험하지 않습니다)보다도 훨씬 위험성이 낮습니다. 물론 여러분의 네트워크를 통해 프록시 트래픽이 전달되기 때문에, 네트워크 대역폭이 제한된 경우 등에는 여러분에게 영향을 끼칠 수 있습니다. 프록시 구동 여부를 결정하기 전에 [Snowflake 작동 방식](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home)을 이해해 두세요. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/ku-IQ/about/statistics.md b/i18n/ku-IQ/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/ku-IQ/about/statistics.md +++ b/i18n/ku-IQ/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/ku-IQ/advanced/tor-overview.md b/i18n/ku-IQ/advanced/tor-overview.md index cc7a2fad..b3a2ba63 100644 --- a/i18n/ku-IQ/advanced/tor-overview.md +++ b/i18n/ku-IQ/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/ku-IQ/alternative-networks.md b/i18n/ku-IQ/alternative-networks.md new file mode 100644 index 00000000..1b36f2c6 --- /dev/null +++ b/i18n/ku-IQ/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/ku-IQ/cloud.md b/i18n/ku-IQ/cloud.md index 4993581a..eb374f23 100644 --- a/i18n/ku-IQ/cloud.md +++ b/i18n/ku-IQ/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/ku-IQ/email-aliasing.md b/i18n/ku-IQ/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/ku-IQ/email-aliasing.md +++ b/i18n/ku-IQ/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/ku-IQ/mobile-browsers.md b/i18n/ku-IQ/mobile-browsers.md index 2b914ea9..3de9d6f4 100644 --- a/i18n/ku-IQ/mobile-browsers.md +++ b/i18n/ku-IQ/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/ku-IQ/passwords.md b/i18n/ku-IQ/passwords.md index b4cfa754..b91c9311 100644 --- a/i18n/ku-IQ/passwords.md +++ b/i18n/ku-IQ/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/ku-IQ/search-engines.md b/i18n/ku-IQ/search-engines.md index faaf4aa3..6b21affd 100644 --- a/i18n/ku-IQ/search-engines.md +++ b/i18n/ku-IQ/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/ku-IQ/tools.md b/i18n/ku-IQ/tools.md index eac1dc52..36bec402 100644 --- a/i18n/ku-IQ/tools.md +++ b/i18n/ku-IQ/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/ku-IQ/tor.md b/i18n/ku-IQ/tor.md index 3c240ddc..19234d4c 100644 --- a/i18n/ku-IQ/tor.md +++ b/i18n/ku-IQ/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Tor Network" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Connecting to Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ The Tor Browser is designed to prevent fingerprinting, or identifying you based In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/nl/about/statistics.md b/i18n/nl/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/nl/about/statistics.md +++ b/i18n/nl/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/nl/advanced/tor-overview.md b/i18n/nl/advanced/tor-overview.md index 03dc37be..2357ee73 100644 --- a/i18n/nl/advanced/tor-overview.md +++ b/i18n/nl/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is een gratis te gebruiken, gedecentraliseerd netwerk dat is ontworpen om het internet met zoveel mogelijk privacy te gebruiken. --- -Tor is een gratis te gebruiken, gedecentraliseerd netwerk dat is ontworpen om het internet met zoveel mogelijk privacy te gebruiken. Bij correct gebruik maakt het netwerk privé en anoniem browsen en communicatie mogelijk. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Bij correct gebruik maakt het netwerk privé en anoniem browsen en communicatie mogelijk. Omdat Tor-verkeer moeilijk te blokkeren en te traceren is, is Tor een effectief middel om censuur te omzeilen. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Dit versluiert waar het verkeer vandaan komt, en geen enkele server in het verbindingspad kan het volledige pad zien van waar het verkeer vandaan komt en naartoe gaat, wat betekent dat zelfs de servers die je gebruikt om verbinding te maken jouw anonimiteit niet kunnen doorbreken. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/nl/alternative-networks.md b/i18n/nl/alternative-networks.md new file mode 100644 index 00000000..94e02107 --- /dev/null +++ b/i18n/nl/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuen en organisaties kunnen ook informatie delen via het Tor-netwerk met ".onion hidden services" zonder hun privacy in gevaar te brengen. Omdat Tor-verkeer moeilijk te blokkeren en te traceren is, is Tor een effectief middel om censuur te omzeilen. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/nl/cloud.md b/i18n/nl/cloud.md index 09e3b6b3..4cbc9167 100644 --- a/i18n/nl/cloud.md +++ b/i18n/nl/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/nl/email-aliasing.md b/i18n/nl/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/nl/email-aliasing.md +++ b/i18n/nl/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/nl/mobile-browsers.md b/i18n/nl/mobile-browsers.md index 3d192c81..bb38ed0b 100644 --- a/i18n/nl/mobile-browsers.md +++ b/i18n/nl/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/nl/passwords.md b/i18n/nl/passwords.md index 2f52c3e4..72733ee8 100644 --- a/i18n/nl/passwords.md +++ b/i18n/nl/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/nl/search-engines.md b/i18n/nl/search-engines.md index 2de24243..fbf0e7e1 100644 --- a/i18n/nl/search-engines.md +++ b/i18n/nl/search-engines.md @@ -100,7 +100,7 @@ Wanneer je een SearXNG-instantie gebruikt, moet je zeker hun privacybeleid lezen Startpage is gevestigd in Nederland. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. Zij slaan jouw IP-adres, zoekopdrachten of andere persoonlijk identificeerbare informatie niet op. -Startpage's meerderheidsaandeelhouder is System1, een adtech bedrijf. Wij denken niet dat dit een probleem is, aangezien zij een duidelijk gescheiden [privacybeleid hebben](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's meerderheidsaandeelhouder is System1, een adtech bedrijf. Wij denken niet dat dit een probleem is, aangezien zij een duidelijk gescheiden [privacybeleid hebben](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/nl/tools.md b/i18n/nl/tools.md index 6fb1fc08..9ef6384d 100644 --- a/i18n/nl/tools.md +++ b/i18n/nl/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/nl/tor.md b/i18n/nl/tor.md index e84f9c2a..f31ed9c0 100644 --- a/i18n/nl/tor.md +++ b/i18n/nl/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor-browser en -netwerk: Anoniem surfen op het web - Privacy Guides" -title: "Tor Netwerk" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Bescherm je surf gedrag tegen pottenkijkers door gebruik te maken van het Tor netwerk, een beveiligd netwerk dat censuur omzeilt. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -Het **Tor** netwerk is een groep servers beheerd door vrijwilligers waarmee je gratis verbinding kunt maken en je privacy en veiligheid op het internet kunt verbeteren. Individuen en organisaties kunnen ook informatie delen via het Tor-netwerk met ".onion hidden services" zonder hun privacy in gevaar te brengen. Omdat Tor-verkeer moeilijk te blokkeren en te traceren is, is Tor een effectief middel om censuur te omzeilen. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor werkt door je internetverkeer om te leiden via deze door vrijwilligers beheerde servers, in plaats van een directe verbinding te maken met de site die je probeert te bezoeken. Dit versluiert waar het verkeer vandaan komt, en geen enkele server in het verbindingspad kan het volledige pad zien van waar het verkeer vandaan komt en naartoe gaat, wat betekent dat zelfs de servers die je gebruikt om verbinding te maken jouw anonimiteit niet kunnen doorbreken. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuen en organisaties kunnen ook informatie delen via het Tor-netwerk met ".onion hidden services" zonder hun privacy in gevaar te brengen. Omdat Tor-verkeer moeilijk te blokkeren en te traceren is, is Tor een effectief middel om censuur te omzeilen. [Gedetailleerd Tor-overzicht :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Verbinding maken met Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ De Tor Browser is ontworpen om fingerprinting, of het identificeren van jou op b In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -115,7 +103,7 @@ In addition to installing Tor Browser on your computer directly, there are also
-Wij hebben eerder aanbevolen *Isolate Destination Address* in de Orbot instellingen in te schakelen. Hoewel deze instelling theoretisch de privacy kan verbeteren door het gebruik van een ander circuit af te dwingen voor elk IP adres waarmee je verbinding maakt, biedt het geen praktisch voordeel voor de meeste toepassingen (vooral web browsen), kan het gepaard gaan met een aanzienlijke prestatievermindering en verhoogt het de belasting van het Tor netwerk. Wij raden je niet langer aan deze instelling te wijzigen ten opzichte van de standaardwaarde, tenzij je weet dat het nodig is.[^1] +Wij hebben eerder aanbevolen *Isolate Destination Address* in de Orbot instellingen in te schakelen. Hoewel deze instelling theoretisch de privacy kan verbeteren door het gebruik van een ander circuit af te dwingen voor elk IP adres waarmee je verbinding maakt, biedt het geen praktisch voordeel voor de meeste toepassingen (vooral web browsen), kan het gepaard gaan met een aanzienlijke prestatievermindering en verhoogt het de belasting van het Tor netwerk. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]

Tips for Android

@@ -128,7 +116,7 @@ Alle versies zijn ondertekend met dezelfde handtekening, zodat ze onderling comp
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ Alle versies zijn ondertekend met dezelfde handtekening, zodat ze onderling comp
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Met Snowflake** kun je bandbreedte doneren aan het Tor Project door een "Snowflake proxy" in je browser te gebruiken. - -Mensen die gecensureerd worden kunnen Snowflake proxies gebruiken om verbinding te maken met het Tor-netwerk. Snowflake is een geweldige manier om bij te dragen aan het netwerk, zelfs als je niet de technische know-how hebt om een Tor relay of bridge te runnen. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -Je kunt Snowflake inschakelen in je browser door deze in een ander tabblad te openen en de schakelaar aan te zetten. Je kunt het op de achtergrond laten werken tijdens het browsen om een bijdrage te leveren met jouw verbinding. We raden het installeren van Snowflake niet aan als een browserextensie; het toevoegen van extensies van derden kan je aanvalsoppervlak vergroten. - -[Snowflake uitvoeren in je browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake verhoogt jouw privacy op geen enkele manier, en wordt ook niet gebruikt om verbinding te maken met het Tor-netwerk binnen jouw persoonlijke browser. Als jouw internetverbinding echter ongecensureerd is, zou je moeten overwegen het te gebruiken om mensen in gecensureerde netwerken te helpen zelf betere privacy te krijgen. Je hoeft je geen zorgen te maken over welke websites mensen via je proxy bezoeken- hun zichtbare surf IP adres zal overeenkomen met hun Tor exit node, niet met die van jou. - -Het runnen van een Snowflake proxy is weinig riskant, zelfs meer dan het runnen van een Tor relay of bridge, wat al geen bijzonder riskante onderneming is. Het stuurt echter nog steeds verkeer door jouw netwerk, wat in sommige opzichten gevolgen kan hebben, vooral als jouw netwerk een beperkte bandbreedte heeft. Zorg ervoor dat je [begrijpt hoe Snowflake werkt](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) voordat je beslist of je een proxy wilt gebruiken. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/pl/about/statistics.md b/i18n/pl/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/pl/about/statistics.md +++ b/i18n/pl/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/pl/advanced/tor-overview.md b/i18n/pl/advanced/tor-overview.md index abe0b57a..65a5f8b7 100644 --- a/i18n/pl/advanced/tor-overview.md +++ b/i18n/pl/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/pl/alternative-networks.md b/i18n/pl/alternative-networks.md new file mode 100644 index 00000000..1b36f2c6 --- /dev/null +++ b/i18n/pl/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/pl/cloud.md b/i18n/pl/cloud.md index 4993581a..eb374f23 100644 --- a/i18n/pl/cloud.md +++ b/i18n/pl/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/pl/email-aliasing.md b/i18n/pl/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/pl/email-aliasing.md +++ b/i18n/pl/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/pl/mobile-browsers.md b/i18n/pl/mobile-browsers.md index d9c2badb..951cb1a9 100644 --- a/i18n/pl/mobile-browsers.md +++ b/i18n/pl/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/pl/passwords.md b/i18n/pl/passwords.md index 6f1221d1..7a7a090a 100644 --- a/i18n/pl/passwords.md +++ b/i18n/pl/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/pl/search-engines.md b/i18n/pl/search-engines.md index faaf4aa3..6b21affd 100644 --- a/i18n/pl/search-engines.md +++ b/i18n/pl/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/pl/tools.md b/i18n/pl/tools.md index 0168ba0a..65bcbb32 100644 --- a/i18n/pl/tools.md +++ b/i18n/pl/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/pl/tor.md b/i18n/pl/tor.md index b42cc5f1..19234d4c 100644 --- a/i18n/pl/tor.md +++ b/i18n/pl/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Tor Network" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -Sieć **Tor** to grupa serwerów dostarczanych przez wolontariuszy, która umożliwia bezpłatne łączenie się z Internetem oraz wzmacnia prywatność i bezpieczeństwo. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Connecting to Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ The Tor Browser is designed to prevent fingerprinting, or identifying you based In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/pt-BR/about/statistics.md b/i18n/pt-BR/about/statistics.md index d8c3834a..44547b28 100644 --- a/i18n/pt-BR/about/statistics.md +++ b/i18n/pt-BR/about/statistics.md @@ -2,7 +2,9 @@ title: Traffic Statistics --- -Nós hospedamos o [Umami] (https://umami.is) para criar uma boa visualização de nossas estatísticas de tráfego, que são públicas no link abaixo. With this process: + + +We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control - Your personal data is never saved, we only collect data in aggregate diff --git a/i18n/pt-BR/advanced/tor-overview.md b/i18n/pt-BR/advanced/tor-overview.md index 2c1b2200..d4608ec7 100644 --- a/i18n/pt-BR/advanced/tor-overview.md +++ b/i18n/pt-BR/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor é uma rede descentralizada de uso gratuito, projetada para usar a Internet com o máximo de privacidade possível. --- -Tor é uma rede descentralizada de uso gratuito, projetada para usar a Internet com o máximo de privacidade possível. Se usada corretamente, a rede permite navegação e comunicações privadas e anônimas. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Se usada corretamente, a rede permite navegação e comunicações privadas e anônimas. Como o tráfego do Tor é difícil de bloquear e rastrear, o Tor é uma ferramenta eficaz para contornar a censura. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Isto esconde de onde vem o tráfego, e nenhum servidor no caminho de conexão consegue ver toda a trajetória de onde o tráfego vem e para onde vai, isto significa que mesmo os servidores que você está usando para conectar não podem quebrar seu anonimato. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/pt-BR/alternative-networks.md b/i18n/pt-BR/alternative-networks.md new file mode 100644 index 00000000..b5b9c75e --- /dev/null +++ b/i18n/pt-BR/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Os indivíduos e organizações também podem compartilhar informações através da rede Tor com "serviços ocultos .onion", sem comprometer sua privacidade. Como o tráfego do Tor é difícil de bloquear e rastrear, o Tor é uma ferramenta eficaz para contornar a censura. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/pt-BR/cloud.md b/i18n/pt-BR/cloud.md index 3517ca05..77db68bf 100644 --- a/i18n/pt-BR/cloud.md +++ b/i18n/pt-BR/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/pt-BR/email-aliasing.md b/i18n/pt-BR/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/pt-BR/email-aliasing.md +++ b/i18n/pt-BR/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/pt-BR/mobile-browsers.md b/i18n/pt-BR/mobile-browsers.md index 24e590a4..34220f75 100644 --- a/i18n/pt-BR/mobile-browsers.md +++ b/i18n/pt-BR/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/pt-BR/passwords.md b/i18n/pt-BR/passwords.md index ba794ba6..92dae7b1 100644 --- a/i18n/pt-BR/passwords.md +++ b/i18n/pt-BR/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/pt-BR/search-engines.md b/i18n/pt-BR/search-engines.md index 26a3ed53..3033c9cc 100644 --- a/i18n/pt-BR/search-engines.md +++ b/i18n/pt-BR/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/pt-BR/tools.md b/i18n/pt-BR/tools.md index 92313a34..235eb3c0 100644 --- a/i18n/pt-BR/tools.md +++ b/i18n/pt-BR/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/pt-BR/tor.md b/i18n/pt-BR/tor.md index 005c210b..cdd933ee 100644 --- a/i18n/pt-BR/tor.md +++ b/i18n/pt-BR/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Rede Tor" -icon: simple/torproject +title: "Navegador Tor" +icon: simple/torbrowser description: Proteja a sua navegação na Internet de olhares curiosos utilizando a rede Tor, uma rede segura que contorna a censura. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -A rede **Tor** é um grupo de servidores operados por voluntários que permite que você se conecte gratuitamente para melhorar a sua privacidade e segurança na Internet. Os indivíduos e organizações também podem compartilhar informações através da rede Tor com "serviços ocultos .onion", sem comprometer sua privacidade. Como o tráfego do Tor é difícil de bloquear e rastrear, o Tor é uma ferramenta eficaz para contornar a censura. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -O Tor funciona roteando seu tráfego de internet através desses servidores operados por voluntários, em vez de fazer uma conexão direta com o site que você está tentando visitar. Isto esconde de onde vem o tráfego, e nenhum servidor no caminho de conexão consegue ver toda a trajetória de onde o tráfego vem e para onde vai, isto significa que mesmo os servidores que você está usando para conectar não podem quebrar seu anonimato. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Os indivíduos e organizações também podem compartilhar informações através da rede Tor com "serviços ocultos .onion", sem comprometer sua privacidade. Como o tráfego do Tor é difícil de bloquear e rastrear, o Tor é uma ferramenta eficaz para contornar a censura. [Detalhes do Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Conectando-se ao Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Navegador Tor +## Navegador Tor
@@ -96,7 +84,7 @@ Este navegador dá acesso às Pontes Tor (Tor Bridges) e a \[Rede Tor\](https:// In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -121,7 +109,7 @@ In addition to installing Tor Browser on your computer directly, there are also
-Antes, recomendávamos habilitar a opção *"Isolar os endereços de destino"* (Isolate Destination Address) nas configurações do Orbot. Embora essa configuração possa, teoricamente, melhorar a privacidade, impondo o uso de um circuito diferente para cada endereço IP ao qual você se conecta, ela não fornece uma vantagem prática para a maioria dos aplicativos (especialmente a navegação na Internet), podendo vir com uma significativa perda de desempenho, e aumento da sobrecarga na rede Tor. Nós não mais recomendamos que você mude esta configuração do seu valor padrão, a menos que você saiba que precisa disso.[^1] +Antes, recomendávamos habilitar a opção *"Isolar os endereços de destino"* (Isolate Destination Address) nas configurações do Orbot. Embora essa configuração possa, teoricamente, melhorar a privacidade, impondo o uso de um circuito diferente para cada endereço IP ao qual você se conecta, ela não fornece uma vantagem prática para a maioria dos aplicativos (especialmente a navegação na Internet), podendo vir com uma significativa perda de desempenho, e aumento da sobrecarga na rede Tor. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]

Tips for Android

@@ -134,7 +122,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -156,35 +144,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/pt/about/statistics.md b/i18n/pt/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/pt/about/statistics.md +++ b/i18n/pt/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/pt/advanced/tor-overview.md b/i18n/pt/advanced/tor-overview.md index 3c6102b3..4aa920e7 100644 --- a/i18n/pt/advanced/tor-overview.md +++ b/i18n/pt/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor é uma rede descentralizada e de utilização gratuita, concebida para utilizar a Internet com o máximo de privacidade possível. --- -Tor é uma rede descentralizada e de utilização gratuita, concebida para utilizar a Internet com o máximo de privacidade possível. Se utilizada corretamente, a rede permite a navegação e as comunicações privadas e anónimas. +![Logótipo do Tor](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Se utilizada corretamente, a rede permite a navegação e as comunicações privadas e anónimas. O facto do tráfego do Tor ser difícil de bloquear e rastrear, faz dele uma ferramenta eficaz para contornar a censura. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. A origem do tráfego fica assim ofuscada e nenhum servidor ao longo do caminho da ligação pode saber o caminho completo, o que significa que mesmo os servidores que utiliza para se ligar não conseguem quebrar o seu anonimato. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/pt/alternative-networks.md b/i18n/pt/alternative-networks.md new file mode 100644 index 00000000..f2c3b5e6 --- /dev/null +++ b/i18n/pt/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Os indivíduos e as organizações também podem partilhar informações através da rede Tor com os serviços ocultos ".onion", sem comprometer a sua privacidade. O facto do tráfego do Tor ser difícil de bloquear e rastrear, faz dele uma ferramenta eficaz para contornar a censura. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/pt/cloud.md b/i18n/pt/cloud.md index 7bcf722c..517f4c9d 100644 --- a/i18n/pt/cloud.md +++ b/i18n/pt/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/pt/email-aliasing.md b/i18n/pt/email-aliasing.md index 7eda4eac..70a8c9e6 100644 --- a/i18n/pt/email-aliasing.md +++ b/i18n/pt/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/pt/mobile-browsers.md b/i18n/pt/mobile-browsers.md index daa4e9ec..cf179d99 100644 --- a/i18n/pt/mobile-browsers.md +++ b/i18n/pt/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/pt/passwords.md b/i18n/pt/passwords.md index d78f40c1..9e5138c1 100644 --- a/i18n/pt/passwords.md +++ b/i18n/pt/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/pt/search-engines.md b/i18n/pt/search-engines.md index e5eb6ecf..4c8fe672 100644 --- a/i18n/pt/search-engines.md +++ b/i18n/pt/search-engines.md @@ -100,7 +100,7 @@ Quando estiver a utilizar uma instância do SearXNG, certifique-se de que lê a O Startpage está sediado nos Países Baixos. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. Não registam o seu endereço IP, pesquisas ou outras informações de identificação pessoal. -O acionista maioritário do Startpage é a System1, uma empresa marketing tecnológico. Não acreditamos que isso constitua um problema, uma vez que têm uma [ política de privacidade](https://system1.com/terms/privacy-policy) separada. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +O acionista maioritário do Startpage é a System1, uma empresa marketing tecnológico. Não acreditamos que isso constitua um problema, uma vez que têm uma [ política de privacidade](https://system1.com/terms/privacy-policy) separada. The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/pt/tools.md b/i18n/pt/tools.md index 282fa75b..638fcb38 100644 --- a/i18n/pt/tools.md +++ b/i18n/pt/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/pt/tor.md b/i18n/pt/tor.md index a73fbd6b..d6ada7b3 100644 --- a/i18n/pt/tor.md +++ b/i18n/pt/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Navegador e rede Tor: navegação anónima na Web - Privacy Guides" -title: "Rede Tor" -icon: simple/torproject +title: "Browser Tor" +icon: simple/torbrowser description: Proteja a sua navegação na Internet de olhares curiosos utilizando a rede Tor, uma rede segura que contorna a censura. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Logótipo do Tor](assets/img/self-contained-networks/tor.svg){ align=right } - -A rede **Tor** é um grupo de servidores operados por voluntários que pode utilizar gratuitamente para melhorar a sua privacidade e segurança na Internet. Os indivíduos e as organizações também podem partilhar informações através da rede Tor com os serviços ocultos ".onion", sem comprometer a sua privacidade. O facto do tráfego do Tor ser difícil de bloquear e rastrear, faz dele uma ferramenta eficaz para contornar a censura. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -O Tor encaminha o seu tráfego de Internet através destes servidores operados por voluntários, em vez de estabelecer uma ligação direta ao site que está a tentar visitar. A origem do tráfego fica assim ofuscada e nenhum servidor ao longo do caminho da ligação pode saber o caminho completo, o que significa que mesmo os servidores que utiliza para se ligar não conseguem quebrar o seu anonimato. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Os indivíduos e as organizações também podem partilhar informações através da rede Tor com os serviços ocultos ".onion", sem comprometer a sua privacidade. O facto do tráfego do Tor ser difícil de bloquear e rastrear, faz dele uma ferramenta eficaz para contornar a censura. [Visão detalhada do Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Ligar ao Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Browser Tor +## Navegador Tor
@@ -90,7 +78,7 @@ O Tor foi concebido para evitar a recolha de impressões digitais, ou a sua iden In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -115,7 +103,7 @@ In addition to installing Tor Browser on your computer directly, there are also
-Anteriormente, recomendamos ativar a preferência *Isolar endereço de destino* nas configurações do Orbot. Enquanto esta configuração pode teoricamente melhorar a privacidade ao forçar o uso de um circuito diferente para cada endereço IP ao qual você se conecta, ela não fornece uma vantagem prática para a maioria das aplicações (especialmente navegação na web), pode vir com uma penalidade significativa de desempenho, e aumenta a carga na rede Tor. Não recomendamos mais o ajuste dessa configuração do valor padrão, a menos que saiba que é necessário.[^1] +Anteriormente, recomendamos ativar a preferência *Isolar endereço de destino* nas configurações do Orbot. Enquanto esta configuração pode teoricamente melhorar a privacidade ao forçar o uso de um circuito diferente para cada endereço IP ao qual você se conecta, ela não fornece uma vantagem prática para a maioria das aplicações (especialmente navegação na web), pode vir com uma penalidade significativa de desempenho, e aumenta a carga na rede Tor. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]

Tips for Android

@@ -134,7 +122,7 @@ O Orbot está frequentemente desatualizado no [repositório F-Droid](https://gua
-### Onion Browser +## Onion Browser
@@ -156,35 +144,3 @@ O Orbot está frequentemente desatualizado no [repositório F-Droid](https://gua
- -## Relays e Pontes - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** permite-lhe doar largura de banda ao Projeto Tor através da utilização de um "proxy Snowflake" no seu navegador. - -As pessoas censuradas podem utilizar proxies Snowflake para se ligarem à rede Tor. Snowflake é uma ótima maneira de contribuir para a rede, mesmo que não tenha o conhecimento técnico para executar um retransmissor ou ponte Tor. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -Pode ativar o Snowflake no seu navegador abrindo-o noutro separador e ligando o interrutor. Pode deixá-lo a funcionar em segundo plano enquanto navega para contribuir para a sua ligação. Não recomendamos instalar o Snowflake como uma extensão do navegador; adicionar extensões de terceiros pode aumentar a sua superfície de ataque. - -[Execute o Snowflake no seu navegador :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -O Snowflake não aumenta a sua privacidade de forma alguma, nem é utilizado para ligar à rede Tor no seu navegador pessoal. No entanto, se a sua ligação à Internet não for censurada, deve considerar a possibilidade de o executar para ajudar as pessoas em redes censuradas a obterem uma maior privacidade. Não há necessidade de se preocupar com os sites a que as pessoas acedem através do seu proxy—o endereço IP de navegação visível corresponderá ao nó de saída Tor, não ao seu. - -Executar um proxy Snowflake é de baixo risco, ainda mais do que executar um Relay Tor ou uma ponte, que já não são empreendimentos particularmente arriscados. No entanto, continua a fazer proxy do tráfego através da sua rede, o que pode ter algum impacto, especialmente se a sua rede tiver uma largura de banda limitada. Certifique-se de que compreende [como funciona o Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) antes de decidir se pretende executar um proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/ru/about/statistics.md b/i18n/ru/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/ru/about/statistics.md +++ b/i18n/ru/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/ru/advanced/tor-overview.md b/i18n/ru/advanced/tor-overview.md index 62997614..57d844f3 100644 --- a/i18n/ru/advanced/tor-overview.md +++ b/i18n/ru/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor - это бесплатная в использовании децентрализованная сеть, разработанная для использования интернета с максимально возможной степенью конфиденциальности. --- -Tor - это бесплатная в использовании децентрализованная сеть, разработанная для использования интернета с максимально возможной степенью конфиденциальности. При правильном использовании сеть позволяет осуществлять частный и анонимный браузинг и общение. +![Логотип Tor](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. При правильном использовании сеть позволяет осуществлять частный и анонимный браузинг и общение. Поскольку трафик Tor сложно заблокировать и отследить, Tor является эффективным инструментом обхода цензуры. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Это скрывает, откуда идет трафик, и ни один сервер на пути соединения не может увидеть полный путь того, откуда и куда идет трафик, то есть даже серверы, которые ты используешь для подключения, не могут нарушить твою анонимность. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/ru/alternative-networks.md b/i18n/ru/alternative-networks.md new file mode 100644 index 00000000..118c9d8f --- /dev/null +++ b/i18n/ru/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Частные лица и организации также могут делиться информацией через сеть Tor с помощью "скрытых сервисов .onion" без ущерба для своей конфиденциальности. Поскольку трафик Tor сложно заблокировать и отследить, Tor является эффективным инструментом обхода цензуры. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/ru/cloud.md b/i18n/ru/cloud.md index c3497506..5aabf718 100644 --- a/i18n/ru/cloud.md +++ b/i18n/ru/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/ru/email-aliasing.md b/i18n/ru/email-aliasing.md index 1c0f4325..9e0507a1 100644 --- a/i18n/ru/email-aliasing.md +++ b/i18n/ru/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/ru/mobile-browsers.md b/i18n/ru/mobile-browsers.md index d37246af..334a8424 100644 --- a/i18n/ru/mobile-browsers.md +++ b/i18n/ru/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/ru/passwords.md b/i18n/ru/passwords.md index 164c71ee..b353df67 100644 --- a/i18n/ru/passwords.md +++ b/i18n/ru/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/ru/search-engines.md b/i18n/ru/search-engines.md index 411333eb..af35b654 100644 --- a/i18n/ru/search-engines.md +++ b/i18n/ru/search-engines.md @@ -100,7 +100,7 @@ SearXNG — это прокси между пользователями и по Startpage базируется в Нидерландах. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. Они не хранят ваш IP-адрес, поисковые запросы или другую идентифицирующую вас информацию. -Основным акционером Startpage является компания System1, занимающаяся рекламными технологиями. Мы не считаем это проблемой, поскольку у них есть отдельная [политика конфиденциальности](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Основным акционером Startpage является компания System1, занимающаяся рекламными технологиями. Мы не считаем это проблемой, поскольку у них есть отдельная [политика конфиденциальности](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/ru/tools.md b/i18n/ru/tools.md index c75bb99b..4f9fe8b7 100644 --- a/i18n/ru/tools.md +++ b/i18n/ru/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/ru/tor.md b/i18n/ru/tor.md index 4546c955..99089b6a 100644 --- a/i18n/ru/tor.md +++ b/i18n/ru/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Браузер и сеть Tor: Анонимный браузинг - Privacy Guides" -title: "Сеть Tor" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Защити свой интернет-сёрфинг от посторонних глаз, используя сеть Tor - безопасную сеть, обходящую цензуру. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Логотип Tor](assets/img/self-contained-networks/tor.svg){ align=right } - -Сеть **Tor** - это группа серверов, управляемых волонтёрами, которая позволяет тебе бесплатно подключаться к сети и повышать уровень конфиденциальности и безопасности в интернете. Частные лица и организации также могут делиться информацией через сеть Tor с помощью "скрытых сервисов .onion" без ущерба для своей конфиденциальности. Поскольку трафик Tor сложно заблокировать и отследить, Tor является эффективным инструментом обхода цензуры. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor работает, направляя твой трафик через эти серверы, управляемые волонтёрами, вместо прямого соединения с сайтом, который ты пытаешься посетить. Это скрывает, откуда идет трафик, и ни один сервер на пути соединения не может увидеть полный путь того, откуда и куда идет трафик, то есть даже серверы, которые ты используешь для подключения, не могут нарушить твою анонимность. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Частные лица и организации также могут делиться информацией через сеть Tor с помощью "скрытых сервисов .onion" без ущерба для своей конфиденциальности. Поскольку трафик Tor сложно заблокировать и отследить, Tor является эффективным инструментом обхода цензуры. [Подробный обзор Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Подключение к Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ If more complete anonymity is paramount to your situation, you should **only** b In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -115,7 +103,7 @@ In addition to installing Tor Browser on your computer directly, there are also
-Ранее мы рекомендовали включать *Изолировать адреса назначения* в настройках Orbot. Хотя эта настройка теоретически может улучшить конфиденциальность за счет принудительного использования отдельной схемы для каждого IP-адреса, к которому ты подключаешься, она не дает практического преимущества для большинства приложений (особенно для просмотра веб-страниц), может сопровождаться значительным снижением производительности и увеличивает нагрузку на сеть Tor. Мы больше не рекомендуем изменять этот параметр по сравнению с его значением по умолчанию, если ты не уверен в том, что это необходимо.[^1] +Ранее мы рекомендовали включать *Изолировать адреса назначения* в настройках Orbot. Хотя эта настройка теоретически может улучшить конфиденциальность за счет принудительного использования отдельной схемы для каждого IP-адреса, к которому ты подключаешься, она не дает практического преимущества для большинства приложений (особенно для просмотра веб-страниц), может сопровождаться значительным снижением производительности и увеличивает нагрузку на сеть Tor. We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]

Tips for Android

@@ -128,7 +116,7 @@ Orbot может проксировать отдельные приложени
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ Orbot может проксировать отдельные приложени
- -## Ретрансляторы и Мосты - -### Snowflake - -
- -![Логотип Snowflake](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Логотип Snowflake](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** позволяет вам пожертвовать пропускную способность проекту Tor, используя "прокси Snowflake" в вашем браузере. - -Люди, подвергающиеся цензуре, могут использовать прокси Snowflake для подключения к сети Tor. Snowflake - это отличный способ внести свой вклад в работу сети Tor, даже если у вас нет технических знаний для запуска ретранслятора или моста Tor. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -Вы можете включить Snowflake в своем браузере, открыв его в другой вкладке и включив переключатель. Вы можете оставить его работать в фоновом режиме во время просмотра веб-страниц, чтобы способствовать подключению. Мы не рекомендуем устанавливать Snowflake в качестве расширения браузера; добавление сторонних расширений может увеличить площадь атаки. - -[Запуск "Snowflake" в браузере :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake никоим образом не увеличивает вашу конфиденциальность и не используется для подключения к сети Tor в вашем персональном браузере. Однако если ваше интернет-соединение не подвергается цензуре, вам следует рассмотреть возможность его запуска, чтобы помочь людям в сетях с цензурой добиться большей конфиденциальности. Нет необходимости беспокоиться о том, на какие сайты люди заходят через ваш прокси-сервер - их видимый IP адрес будет соответствовать их выходному узлу Tor, а не вашему. - -Запуск прокси Snowflake не представляет особого риска. Это даже менее рискованно, чем запуск ретранслятора или моста Tor, которые не являются особо рискованными мероприятиями. Тем не менее он все равно проксирует трафик через вашу сеть, что может иметь определенные последствия, особенно если ваша сеть ограничена в пропускной способности. Убедитесь, что вы понимаете [как работает Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home), прежде чем принимать решение о запуске прокси. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/sv/about/statistics.md b/i18n/sv/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/sv/about/statistics.md +++ b/i18n/sv/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/sv/advanced/tor-overview.md b/i18n/sv/advanced/tor-overview.md index 8c837670..52d52b9c 100644 --- a/i18n/sv/advanced/tor-overview.md +++ b/i18n/sv/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor är ett decentraliserat nätverk som är gratis att använda och som är utformat för att använda internet med så mycket integritet som möjligt. --- -Tor är ett decentraliserat nätverk som är gratis att använda och som är utformat för att använda internet med så mycket integritet som möjligt. Om nätverket används på rätt sätt möjliggör det privat och anonym surfning och kommunikation. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. Om nätverket används på rätt sätt möjliggör det privat och anonym surfning och kommunikation. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/sv/alternative-networks.md b/i18n/sv/alternative-networks.md new file mode 100644 index 00000000..1b36f2c6 --- /dev/null +++ b/i18n/sv/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/sv/cloud.md b/i18n/sv/cloud.md index 0e96b7ae..7ec1f570 100644 --- a/i18n/sv/cloud.md +++ b/i18n/sv/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/sv/email-aliasing.md b/i18n/sv/email-aliasing.md index 34d256c4..086c0f62 100644 --- a/i18n/sv/email-aliasing.md +++ b/i18n/sv/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/sv/mobile-browsers.md b/i18n/sv/mobile-browsers.md index a06a734f..58eba936 100644 --- a/i18n/sv/mobile-browsers.md +++ b/i18n/sv/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/sv/passwords.md b/i18n/sv/passwords.md index fa84b10a..592c20e3 100644 --- a/i18n/sv/passwords.md +++ b/i18n/sv/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/sv/search-engines.md b/i18n/sv/search-engines.md index b0267540..8f10f5d6 100644 --- a/i18n/sv/search-engines.md +++ b/i18n/sv/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/sv/tools.md b/i18n/sv/tools.md index 83a28aa8..ab1565d6 100644 --- a/i18n/sv/tools.md +++ b/i18n/sv/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/sv/tor.md b/i18n/sv/tor.md index 86ec2e8c..19234d4c 100644 --- a/i18n/sv/tor.md +++ b/i18n/sv/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Tor-nätverket" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Connecting to Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ The Tor Browser is designed to prevent fingerprinting, or identifying you based In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake ökar inte din integritet på något sätt och används inte heller för att ansluta till Tor-nätverket i din webbläsare. Om din internetanslutning är ocensurerad bör du dock överväga att använda den för att hjälpa människor i censurerade nätverk att själva få bättre integritet. Det finns ingen anledning att oroa sig för vilka webbplatser människor kommer åt via din proxy - deras synliga IP-adress kommer att matcha deras Tor exit-nod, inte din. - -Att driva en Snowflake-proxy är en låg risk, till och med mer än att driva en Tor-relä eller en bro, som redan inte är särskilt riskfyllda verksamheter. Men det gör fortfarande proxy-trafik genom ditt nätverk som kan vara effektiva på vissa sätt, särskilt om ditt nätverk är bandbredd-begränsad. Se till att du förstår [hur Snowflake fungerar](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) innan du bestämmer dig för att köra en proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/tr/about/statistics.md b/i18n/tr/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/tr/about/statistics.md +++ b/i18n/tr/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/tr/advanced/tor-overview.md b/i18n/tr/advanced/tor-overview.md index cc7a2fad..b3a2ba63 100644 --- a/i18n/tr/advanced/tor-overview.md +++ b/i18n/tr/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/tr/alternative-networks.md b/i18n/tr/alternative-networks.md new file mode 100644 index 00000000..1b36f2c6 --- /dev/null +++ b/i18n/tr/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/tr/cloud.md b/i18n/tr/cloud.md index de21d082..89bd9409 100644 --- a/i18n/tr/cloud.md +++ b/i18n/tr/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/tr/email-aliasing.md b/i18n/tr/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/tr/email-aliasing.md +++ b/i18n/tr/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/tr/mobile-browsers.md b/i18n/tr/mobile-browsers.md index e58661d8..9703fc68 100644 --- a/i18n/tr/mobile-browsers.md +++ b/i18n/tr/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/tr/passwords.md b/i18n/tr/passwords.md index 9af938f8..3d1ba562 100644 --- a/i18n/tr/passwords.md +++ b/i18n/tr/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/tr/search-engines.md b/i18n/tr/search-engines.md index faaf4aa3..6b21affd 100644 --- a/i18n/tr/search-engines.md +++ b/i18n/tr/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/tr/tools.md b/i18n/tr/tools.md index 7600aa90..4ad4fb7a 100644 --- a/i18n/tr/tools.md +++ b/i18n/tr/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/tr/tor.md b/i18n/tr/tor.md index 14d83bdb..2a30776f 100644 --- a/i18n/tr/tor.md +++ b/i18n/tr/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Tor Network" -icon: simple/torproject +title: "Tor Tarayıcı" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Connecting to Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Tarayıcı +## Tor Tarayıcı
@@ -90,7 +78,7 @@ The Tor Browser is designed to prevent fingerprinting, or identifying you based In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/uk/about/statistics.md b/i18n/uk/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/uk/about/statistics.md +++ b/i18n/uk/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/uk/advanced/tor-overview.md b/i18n/uk/advanced/tor-overview.md index cc7a2fad..fd0198cf 100644 --- a/i18n/uk/advanced/tor-overview.md +++ b/i18n/uk/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Логотип Tor](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Оскільки трафік Tor важко заблокувати і відстежити, Tor є ефективним інструментом обходу цензури. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. Це приховує, звідки надходить трафік, і жоден сервер у шляху з 'єднання не може побачити повний шлях, звідки надходить трафік, а це означає, що навіть сервери, які ви використовуєте для з' єднання, не можуть порушити вашу анонімність. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/uk/alternative-networks.md b/i18n/uk/alternative-networks.md new file mode 100644 index 00000000..f1735988 --- /dev/null +++ b/i18n/uk/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Приватні особи та організації також можуть обмінюватися інформацією через мережу Tor з "прихованими сервісами .onion" без шкоди для своєї конфіденційності. Оскільки трафік Tor важко заблокувати і відстежити, Tor є ефективним інструментом обходу цензури. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/uk/cloud.md b/i18n/uk/cloud.md index 4993581a..eb374f23 100644 --- a/i18n/uk/cloud.md +++ b/i18n/uk/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/uk/email-aliasing.md b/i18n/uk/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/uk/email-aliasing.md +++ b/i18n/uk/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/uk/mobile-browsers.md b/i18n/uk/mobile-browsers.md index 2b914ea9..3de9d6f4 100644 --- a/i18n/uk/mobile-browsers.md +++ b/i18n/uk/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/uk/passwords.md b/i18n/uk/passwords.md index b4cfa754..b91c9311 100644 --- a/i18n/uk/passwords.md +++ b/i18n/uk/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/uk/search-engines.md b/i18n/uk/search-engines.md index faaf4aa3..6b21affd 100644 --- a/i18n/uk/search-engines.md +++ b/i18n/uk/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/uk/tools.md b/i18n/uk/tools.md index 5ed592e9..479ffb68 100644 --- a/i18n/uk/tools.md +++ b/i18n/uk/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/uk/tor.md b/i18n/uk/tor.md index 5c90acd1..312c1375 100644 --- a/i18n/uk/tor.md +++ b/i18n/uk/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Tor Network" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Логотип Tor](assets/img/self-contained-networks/tor.svg){ align=right } - -Мережа **Tor** - це група серверів, керованих волонтерами, яка дозволяє вам підключатися безкоштовно і покращувати вашу конфіденційність і безпеку в Інтернеті. Приватні особи та організації також можуть обмінюватися інформацією через мережу Tor з "прихованими сервісами .onion" без шкоди для своєї конфіденційності. Оскільки трафік Tor важко заблокувати і відстежити, Tor є ефективним інструментом обходу цензури. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor працює, спрямовуючи ваш інтернет-трафік через ці волонтерські сервери, замість того, щоб встановлювати пряме з'єднання з сайтом, який ви намагаєтесь відвідати. Це приховує, звідки надходить трафік, і жоден сервер у шляху з 'єднання не може побачити повний шлях, звідки надходить трафік, а це означає, що навіть сервери, які ви використовуєте для з' єднання, не можуть порушити вашу анонімність. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Приватні особи та організації також можуть обмінюватися інформацією через мережу Tor з "прихованими сервісами .onion" без шкоди для своєї конфіденційності. Оскільки трафік Tor важко заблокувати і відстежити, Tor є ефективним інструментом обходу цензури. [Детальний огляд Tor :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Підключення до Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -90,7 +78,7 @@ If more complete anonymity is paramount to your situation, you should **only** b In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ Orbot часто застаріває в [F-Droid репозиторії](https:
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ Orbot часто застаріває в [F-Droid репозиторії](https:
- -## Реле та мости - -### Snowflake - -
- -![Логотип Snowflake](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Логотип Snowflake](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** дозволяє вам пожертвувати пропускну здатність для проекту Tor, використовуючи "проксі-сервер Snowflake" у вашому браузері. - -Люди, які зазнають цензури, можуть використовувати проксі-сервери Snowflake для підключення до мережі Tor. Snowflake — це чудовий спосіб зробити внесок у мережу, навіть якщо ви не володієте технічними знаннями для запуску Tor-реле або моста. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake жодним чином не збільшує вашу конфіденційність і не використовується для підключення до мережі Tor у вашому власному браузері. Однак, якщо ваше інтернет-з'єднання не піддається цензурі, вам варто подумати про його використання, щоб допомогти людям, які перебувають у мережах з цензурою, самим досягти кращої конфіденційності. Вам не потрібно турбуватися про те, до яких сайтів люди отримують доступ через ваш проксі — їх видима IP-адреса буде відповідати їх вихідному вузлу з Tor, а не вашій. - -Запуск проксі-сервера Snowflake пов'язаний з навіть меншим ризиком, ніж запуск Tor-реле або моста, які й самі не є особливо ризикованими заходами. Однак він все одно спрямовує трафік проходить через вашу мережу, що може мати певний вплив, особливо якщо ваша мережа має обмежену пропускну здатність. Переконайтеся, що ви розумієте [як працює Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) перед тим, як вирішити, чи запускати проксі. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/vi/about/statistics.md b/i18n/vi/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/vi/about/statistics.md +++ b/i18n/vi/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/vi/advanced/tor-overview.md b/i18n/vi/advanced/tor-overview.md index cc7a2fad..b3a2ba63 100644 --- a/i18n/vi/advanced/tor-overview.md +++ b/i18n/vi/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. --- -Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/vi/alternative-networks.md b/i18n/vi/alternative-networks.md new file mode 100644 index 00000000..1b36f2c6 --- /dev/null +++ b/i18n/vi/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/vi/cloud.md b/i18n/vi/cloud.md index f0190fd1..e3ac21ed 100644 --- a/i18n/vi/cloud.md +++ b/i18n/vi/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/vi/email-aliasing.md b/i18n/vi/email-aliasing.md index 7eda4eac..70a8c9e6 100644 --- a/i18n/vi/email-aliasing.md +++ b/i18n/vi/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/vi/mobile-browsers.md b/i18n/vi/mobile-browsers.md index 17e944e1..ec0b6043 100644 --- a/i18n/vi/mobile-browsers.md +++ b/i18n/vi/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/vi/passwords.md b/i18n/vi/passwords.md index d298959f..30b98fa3 100644 --- a/i18n/vi/passwords.md +++ b/i18n/vi/passwords.md @@ -213,7 +213,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -221,10 +221,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -260,7 +260,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/vi/search-engines.md b/i18n/vi/search-engines.md index 5d2a28a3..d4f1a4ee 100644 --- a/i18n/vi/search-engines.md +++ b/i18n/vi/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/vi/tools.md b/i18n/vi/tools.md index 8f0e961f..8517434c 100644 --- a/i18n/vi/tools.md +++ b/i18n/vi/tools.md @@ -483,6 +483,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/vi/tor.md b/i18n/vi/tor.md index 5af0adc3..9aed5e56 100644 --- a/i18n/vi/tor.md +++ b/i18n/vi/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "Tor Network" -icon: simple/torproject +title: "Tor Browser" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## Connecting to Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor Browser +## Tor Browser
@@ -96,7 +84,7 @@ The Tor Browser is designed to prevent fingerprinting, or identifying you based In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Google Pixel +## Google Pixel
@@ -134,7 +122,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -156,35 +144,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/zh-Hant/about/statistics.md b/i18n/zh-Hant/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/zh-Hant/about/statistics.md +++ b/i18n/zh-Hant/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/zh-Hant/advanced/tor-overview.md b/i18n/zh-Hant/advanced/tor-overview.md index a6df6c92..6d57f8be 100644 --- a/i18n/zh-Hant/advanced/tor-overview.md +++ b/i18n/zh-Hant/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor 是一個免費使用的去中心化網路,其讓用戶在使用網際網路之際盡可能地保護自己的隱私。 --- -Tor 是一個免費使用的去中心化網路,其讓用戶在使用網際網路之際盡可能地保護自己的隱私。 如果使用得當,該網路可以實現私人和匿名瀏覽和通訊。 +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. 如果使用得當,該網路可以實現私人和匿名瀏覽和通訊。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。 + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. 這樣可以混淆流量來源,所連接的伺服器都無法看到流量來去的完整路徑,也意味著即使您連接的伺服器無法破壞您的匿名性。 + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## 正在連接到Tor -在連接到 [Tor](../tor.md) 之前,應先仔細考慮想透過 Tor 實現什麼目的,想要對誰隱藏網路活動資訊。 +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. 在自由的國家,透過 Tor 存取普通內容,無需擔心 ISP 或本地網路管理員知道您正在使用 Tor,反而可能會幫助 [消除Tor 使用污名化](https://2019 .www.torproject. org/about/torusers.html.en),您可以透過標準方式直接連接到Tor,例如 diff --git a/i18n/zh-Hant/alternative-networks.md b/i18n/zh-Hant/alternative-networks.md new file mode 100644 index 00000000..1ff6eefd --- /dev/null +++ b/i18n/zh-Hant/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 個人和組織還可以通過 Tor 網絡與“.onion 隱藏服務”分享資訊,而不會損害他們的隱私。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。 + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads "下載" + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/zh-Hant/cloud.md b/i18n/zh-Hant/cloud.md index c4d710f4..4666f58f 100644 --- a/i18n/zh-Hant/cloud.md +++ b/i18n/zh-Hant/cloud.md @@ -95,7 +95,7 @@ Tresorit 已獲得多項獨立安全稽核: [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/zh-Hant/email-aliasing.md b/i18n/zh-Hant/email-aliasing.md index 8c965e04..0dc12f94 100644 --- a/i18n/zh-Hant/email-aliasing.md +++ b/i18n/zh-Hant/email-aliasing.md @@ -89,7 +89,7 @@ The number of shared aliases (which end in a shared domain like @addy.io) that y - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/zh-Hant/mobile-browsers.md b/i18n/zh-Hant/mobile-browsers.md index 05dd72a3..1c51b013 100644 --- a/i18n/zh-Hant/mobile-browsers.md +++ b/i18n/zh-Hant/mobile-browsers.md @@ -150,13 +150,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/zh-Hant/passwords.md b/i18n/zh-Hant/passwords.md index 9fdd5d31..423cda08 100644 --- a/i18n/zh-Hant/passwords.md +++ b/i18n/zh-Hant/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/zh-Hant/search-engines.md b/i18n/zh-Hant/search-engines.md index 942768f2..6ee7de5f 100644 --- a/i18n/zh-Hant/search-engines.md +++ b/i18n/zh-Hant/search-engines.md @@ -100,7 +100,7 @@ SearXNG 是您和它所聚合的搜尋引擎之間的代理。 您的搜尋查 Startpage位於荷蘭。 根據他們的 [隱私政策](https://startpage.com/en/privacy-policy),他們記錄細節如:作業系統、瀏覽器類型和語言。 他們不會記錄您的IP位址、搜尋查詢或其他個人識別資訊。 -Startpage 大股東是System1,它是一家廣告技術公司。 我們不認為這是問題,因為他們有明顯分開的 [隱私政策](https://system1.com/terms/privacy-policy)。 The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage 大股東是System1,它是一家廣告技術公司。 我們不認為這是問題,因為他們有明顯分開的 [隱私政策](https://system1.com/terms/privacy-policy)。 The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/zh-Hant/tools.md b/i18n/zh-Hant/tools.md index 7a7d7eba..6dc04f5b 100644 --- a/i18n/zh-Hant/tools.md +++ b/i18n/zh-Hant/tools.md @@ -483,6 +483,15 @@ description: Privacy Guides 是最透明和可靠的網站,用於尋找保護 這些工具可能對某些人很實用。 它們提供了多數人用不到的功能,通常需要更深入的技術知識才能有效地利用。 +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### 設備完整性驗證
diff --git a/i18n/zh-Hant/tor.md b/i18n/zh-Hant/tor.md index f6f8e467..119c2dfa 100644 --- a/i18n/zh-Hant/tor.md +++ b/i18n/zh-Hant/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor瀏覽器與網絡:匿名網頁瀏覽 - Privacy Guides" -title: "Tor 網絡" -icon: simple/torproject +title: "Tor 瀏覽器" +icon: simple/torbrowser description: 透過Tor 網絡來保護您的網際網路瀏覽免受窺探, Tor 網絡是一個規避審查的安全網絡。 cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -**Tor** 網絡是一組由志願者操作的伺服器,可讓您免費連線,並改善您的隱私權和安全性。 個人和組織還可以通過 Tor 網絡與“.onion 隱藏服務”分享資訊,而不會損害他們的隱私。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。 - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor 的工作原理是通過志願者運營的服務器來引導您的網際網路路徑,而不是直接連接到您試圖訪問的網站。 這樣可以混淆流量來源,所連接的伺服器都無法看到流量來去的完整路徑,也意味著即使您連接的伺服器無法破壞您的匿名性。 +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 個人和組織還可以通過 Tor 網絡與“.onion 隱藏服務”分享資訊,而不會損害他們的隱私。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。 [詳細的 Tor 總覽 :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## 正在連接到Tor -

溫馨提示

@@ -52,7 +40,7 @@ Tor 的工作原理是通過志願者運營的服務器來引導您的網際網 如果更完全的匿名至關重要,則應 **僅使用** 桌面版的 Tor 客戶端應用,最好再加上[Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) 一起搭配使用。 行動瀏覽器在 Tor 上不太常見(因此更容易識別指紋),且其他配置未經嚴格的去匿名化測試。 -### Tor 瀏覽器 +## Tor Browser
@@ -90,7 +78,7 @@ Tor 瀏覽器旨在防止指紋識別----根據您的瀏覽器配置識別您。 除了直接在電腦安裝 Tor 瀏覽器外,還有專門設計用於連接到 Tor 網絡的操作系統,例如 [Qubes OS 作業系統](desktop.md#qubes-os) [Whonix](desktop.md#whonix),它們提供比標準 Tor 瀏覽器更高的安全性和保護。 -### Orbot +## Orbot
@@ -115,7 +103,7 @@ Tor 瀏覽器旨在防止指紋識別----根據您的瀏覽器配置識別您。
-我們之前建議在 Orbot 設定中啟用 *隔離目標地址* 偏好設定。 雖然從理論上講,此設置可以強制您連接不同 IP地址使用不同的迴路來改善隱私,但它並未為大多數應用程式(特別是 Web瀏覽)提供實際優勢,可能會帶來顯著的效能拖累,增加 Tor 網絡的負載。 我們不再建議您從預設值調整此設定,除非您知道需要調整。[^1] +我們之前建議在 Orbot 設定中啟用 *隔離目標地址* 偏好設定。 雖然從理論上講,此設置可以強制您連接不同 IP地址使用不同的迴路來改善隱私,但它並未為大多數應用程式(特別是 Web瀏覽)提供實際優勢,可能會帶來顯著的效能拖累,增加 Tor 網絡的負載。 We no longer recommend adjusting this setting from its default value unless you know you need to.[^1]

Android 提示

@@ -128,7 +116,7 @@ Guardian Project 的[F-Droid repository](https://guardianproject.info/fdroid)和
-### Onion 瀏覽器 +## Onion 瀏覽器
@@ -150,35 +138,3 @@ Guardian Project 的[F-Droid repository](https://guardianproject.info/fdroid)和
- -## 中繼和橋接 - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** 允許您在瀏覽器中操作「Snowflake proxy」,將網路頻寛捐給 Tor 專案。 - -被審查的人可以使用 Snowflake 代理來連接 Tor 網絡。 Snowflake 是貢獻 Tor 網絡的好方法,即便您沒有運行 Tor 中繼或橋接的技術知識。 - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -要啟用瀏覽器的 Snowflake 請在另一個標籤分頁下開啟其切換開關。 您可讓它在背景下執行而您的瀏覽器會協助其連接。 不建議將 Snowflake 作為瀏覽器附加元件安裝,因為第三方的擴展往往會增加攻擊面。 - -[在瀏覽器執行 Snowflake :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake 無法加強隱私,也不會在您的個人瀏覽器中連接 Tor網絡。 但如果您的網際網路連接沒有被審查的情形,請考慮使用它,幫助受審查網路中的人們能有更好的隱私。 無需擔心人們通過您的代理訪問哪些網站----他們的可見瀏覽 IP 地址將與其 Tor 出口節點相匹配,而不是您的 IP 地址。 - -運行 Snowflake 代理風險很低,甚至低於運行 Tor 中繼或橋接器,而這些中繼器或橋接器已經不算是特別高風險的工作。 但是,它通過您的網路進行代理流量,在某些方面可能會產生影響,特別是您的網路頻寬有限制的話。 在運行代理之前,要確保已清楚了解[ Snowflake 運作方式](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) 。 - -[^1]: `IsolateDestAddr` 設定問題已在 [Tor 郵件群組](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) 中討論過而且在 [Whonix's 串流隔離文檔](https://whonix.org/wiki/Stream_Isolation),兩項專案都認為對大多數人而言它並不是好方法。 diff --git a/i18n/zh/about/statistics.md b/i18n/zh/about/statistics.md index 58f63fdd..44547b28 100644 --- a/i18n/zh/about/statistics.md +++ b/i18n/zh/about/statistics.md @@ -2,6 +2,8 @@ title: Traffic Statistics --- + + We self-host [Umami](https://umami.is) to create a nice visualization of our traffic statistics, which are public at the link below. With this process: - Your information is never shared with a third-party, it stays on servers we control diff --git a/i18n/zh/advanced/tor-overview.md b/i18n/zh/advanced/tor-overview.md index cf0eedcb..3934da7a 100644 --- a/i18n/zh/advanced/tor-overview.md +++ b/i18n/zh/advanced/tor-overview.md @@ -4,11 +4,21 @@ icon: 'simple/torproject' description: Tor是一个免费使用的去中心化网络,专为尽量隐私地使用互联网而设计。 --- -Tor是一个免费使用的去中心化网络,专为尽量隐私地使用互联网而设计。 如果使用得当,该网络可以实现隐私且匿名地浏览和通信。 +![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } + +[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. 如果使用得当,该网络可以实现隐私且匿名地浏览和通信。 由于Tor流量难以阻止和跟踪,因此Tor是一种有效的审查规避工具。 + +Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. 这会混淆流量的来源,并且连接路径中的任何服务器都无法看到流量来自和流向的完整路径,这意味着即使您用于连接的服务器也无法打破您的匿名性。 + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } ## Safely Connecting to Tor -Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. If you live in a free country, are accessing mundane content via Tor, aren't worried about your ISP or local network administrators having the knowledge that you're using Tor, and want to help [de-stigmatize](https://2019.www.torproject.org/about/torusers.html.en) Tor usage, you can likely connect to Tor directly via standard means like [Tor Browser](../tor.md) without worry. diff --git a/i18n/zh/alternative-networks.md b/i18n/zh/alternative-networks.md new file mode 100644 index 00000000..4d00c696 --- /dev/null +++ b/i18n/zh/alternative-networks.md @@ -0,0 +1,107 @@ +--- +title: Alternative Networks +icon: material/vector-polygon +description: These tools allow you to access networks other than the World Wide Web. +cover: alternative-networks.webp +--- + +## Anonymizing Networks + +When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. + +### Tor + +
+ +![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } + +The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 个人和组织也可以通过Tor网络与".onion隐藏服务"分享信息,而不损害其隐私。 由于Tor流量难以阻止和跟踪,因此Tor是一种有效的审查规避工具。 + +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + +
+ +The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: + +[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). + +
+ +#### Snowflake + +
+ +![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } +![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } + +**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. + +People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. + +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } + + + +
+ +You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. + +[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } + +Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. + +Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. + +### I2P (The Invisible Internet Project) + +
+ +![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } +![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } + +**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. + +[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } +[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/i2p/i2p.i2p){ .card-link title="Source Code" } +[:octicons-heart-16:](https://geti2p.net/en/get-involved){ .card-link title=Contribute } + +
+Downloads + +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.i2p.android) +- [:simple-android: Android](https://geti2p.net/en/download#android) +- [:simple-windows11: Windows](https://geti2p.net/en/download#windows) +- [:simple-apple: macOS](https://geti2p.net/en/download#mac) +- [:simple-linux: Linux](https://geti2p.net/en/download#unix) + +
+ +
+ +Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. + +
+

Try it out!

+ +You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). + +
+ +Also unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. + +There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users, there's no "crowd" to blend in with in that regard. + +Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention), but on the other hand I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. diff --git a/i18n/zh/cloud.md b/i18n/zh/cloud.md index e4163c35..abe90789 100644 --- a/i18n/zh/cloud.md +++ b/i18n/zh/cloud.md @@ -95,7 +95,7 @@ They have also received the Digital Trust Label, a certification from the [Swiss [:octicons-home-16: Homepage](https://peergos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://peergos.net/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://book.peergos.net){ .card-link title="Documentation" } +[:octicons-info-16:](https://book.peergos.org){ .card-link title="Documentation" } [:octicons-code-16:](https://github.com/Peergos/Peergos){ .card-link title="Source Code" }
diff --git a/i18n/zh/email-aliasing.md b/i18n/zh/email-aliasing.md index 3e6e12c6..70499a52 100644 --- a/i18n/zh/email-aliasing.md +++ b/i18n/zh/email-aliasing.md @@ -89,7 +89,7 @@ Notable free features: - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
diff --git a/i18n/zh/mobile-browsers.md b/i18n/zh/mobile-browsers.md index 806a0ea1..3e8892a0 100644 --- a/i18n/zh/mobile-browsers.md +++ b/i18n/zh/mobile-browsers.md @@ -152,13 +152,13 @@ Firefox (Gecko)-based browsers on Android [lack per-site process isolation](http
Downloads -- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos/) +- [:simple-fdroid: F-Droid](https://f-droid.org/en/packages/us.spotco.fennec_dos)
-Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official/) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. +Enable DivestOS's [F-Droid Repo](https://divestos.org/fdroid/official) to receive updates directly from the developer. Downloading Mull from the default F-Droid repo will mean your updates could be delayed by a few days or longer. Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid. diff --git a/i18n/zh/passwords.md b/i18n/zh/passwords.md index d5d87c9e..588bc323 100644 --- a/i18n/zh/passwords.md +++ b/i18n/zh/passwords.md @@ -203,7 +203,7 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b [:octicons-home-16: Homepage](https://proton.me/pass){ .md-button .md-button--primary } [:octicons-eye-16:](https://proton.me/pass/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://proton.me/support/pass){ .card-link title="Documentation"} -[:octicons-code-16:](https://github.com/protonpass/){ .card-link title="Source Code" } +[:octicons-code-16:](https://github.com/protonpass){ .card-link title="Source Code" }
Downloads @@ -211,10 +211,10 @@ Proton Pass is an open-source, end-to-end encrypted password manager developed b - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=proton.android.pass) - [:simple-appstore: App Store](https://apps.apple.com/us/app/proton-pass-password-manager/id6443490629) - [:simple-windows11: Windows](https://proton.me/pass/download) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/proton-pass/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/proton-pass) - [:simple-googlechrome: Chrome](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) - [:simple-microsoftedge: Edge](https://chromewebstore.google.com/detail/proton-pass-free-password/ghmbeldphafepmbegfdlkpapadhbakde) -- [:octicons-globe-16: Web](https://pass.proton.me/) +- [:octicons-globe-16: Web](https://pass.proton.me)
@@ -250,7 +250,7 @@ All issues were addressed and fixed shortly after the [report](https://res.cloud - [:simple-windows11: Windows](https://1password.com/downloads/windows) - [:simple-apple: macOS](https://1password.com/downloads/mac) - [:simple-linux: Linux](https://1password.com/downloads/linux) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/en-US/firefox/addon/1password-x-password-manager/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/1password-x-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/1password-%E2%80%93-password-mana/aeblfdkhhhdcdjpifhhbdiojplfjncoa) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/dppgmdbiimibapkepcbdbmkaabgiofem) - [:simple-safari: Safari](https://apps.apple.com/us/app/1password-for-safari/id1569813296) diff --git a/i18n/zh/search-engines.md b/i18n/zh/search-engines.md index faaf4aa3..6b21affd 100644 --- a/i18n/zh/search-engines.md +++ b/i18n/zh/search-engines.md @@ -100,7 +100,7 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://blog.privacyguides.org/2020/05/03/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service, and we were satisfied with the answers we received. Startpage previously placed limitations on VPN and [Tor](tor.md) users, but they recently created an [official](https://support.startpage.com/hc/en-us/articles/24786602537364-Startpage-s-Tor-onion-service) Tor hidden service, and as of April 2024 we have no longer noticed extra roadblocks for Tor or [VPN](vpn.md) users. diff --git a/i18n/zh/tools.md b/i18n/zh/tools.md index d870a035..7f961e2c 100644 --- a/i18n/zh/tools.md +++ b/i18n/zh/tools.md @@ -491,6 +491,15 @@ For encrypting your operating system drive, we typically recommend using whichev These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively. +### Alternative Networks + +
+ +- ![I2P logo](./assets/img/self-contained-networks/i2p.svg#only-light){ .twemoji } ![I2P logo](./assets/img/self-contained-networks/i2p-dark.svg#only-dark){ .twemoji } [I2P](alternative-networks.md#i2p-the-invisible-internet-project) +- ![Tor logo](./assets/img/self-contained-networks/tor.svg){ .twemoji } [Tor](alternative-networks.md#tor) + +
+ ### Device Integrity Verification
diff --git a/i18n/zh/tor.md b/i18n/zh/tor.md index 4b5c15fd..f5d0d837 100644 --- a/i18n/zh/tor.md +++ b/i18n/zh/tor.md @@ -1,7 +1,7 @@ --- meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" -title: "桌面端浏览器" -icon: simple/torproject +title: "Tor浏览器" +icon: simple/torbrowser description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. cover: tor.webp schema: @@ -23,22 +23,10 @@ schema: url: "./" --- -![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } - -**Tor** 网络是一组由志愿者操作的服务器,允许您免费连接以提高您的互联网的隐私和安全。 个人和组织也可以通过Tor网络与".onion隐藏服务"分享信息,而不损害其隐私。 由于Tor流量难以阻止和跟踪,因此Tor是一种有效的审查规避工具。 - -[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - -Tor的工作原理是通过这些志愿者操作的服务器路由您的互联网流量,而不是直接连接到您试图访问的网站。 这会混淆流量的来源,并且连接路径中的任何服务器都无法看到流量来自和流向的完整路径,这意味着即使您用于连接的服务器也无法打破您的匿名性。 +**Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 个人和组织也可以通过Tor网络与".onion隐藏服务"分享信息,而不损害其隐私。 由于Tor流量难以阻止和跟踪,因此Tor是一种有效的审查规避工具。 [详细的Tor概述 :material-arrow-right-drop-circle:](advanced/tor-overview.md ""){.md-button} -## 连接到Tor -

Tip

@@ -52,7 +40,7 @@ Some of these apps are better than others, and again making a determination come If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization. -### Tor浏览器 +## Tor浏览器
@@ -90,7 +78,7 @@ Tor浏览器旨在防止指纹识别,或根据您的浏览器配置识别您 In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. -### Orbot +## Orbot
@@ -128,7 +116,7 @@ All versions are signed using the same signature so they should be compatible wi
-### Onion Browser +## Onion Browser
@@ -150,35 +138,3 @@ All versions are signed using the same signature so they should be compatible wi
- -## Relays and Bridges - -### Snowflake - -
- -![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } -![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } - -**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. - -People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. - -[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } - - - -
- -You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension; adding third-party extensions can increase your attack surface. - -[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html ""){.md-button} - -Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. - -Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. - -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/includes/strings.ar.env b/includes/strings.ar.env index 882f02ca..80a96a21 100644 --- a/includes/strings.ar.env +++ b/includes/strings.ar.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides هو مصدرك المركزي للخصوصية والأمن لتحمي نفسك على الإنترنت." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.bn-IN.env b/includes/strings.bn-IN.env index d5128652..2d5d49f1 100644 --- a/includes/strings.bn-IN.env +++ b/includes/strings.bn-IN.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="প্রাইভেসী গাইডস হলো আপনার অনলাইন প্রাইভেসী এবং সিকিউরিটি সম্পর্কে জানবার প্রধান জায়গা।" +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.bn.env b/includes/strings.bn.env index bbfa5ea8..aa76e71f 100644 --- a/includes/strings.bn.env +++ b/includes/strings.bn.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="প্রাইভেসি গাইড তোমার অনলাইনে ব্যক্তিগত গোপনীয়তা ও নিরাপত্তা বিষয়ক কেন্দ্রীয় তথ্যভাণ্ডার, যাতে তুমি নিজেকে রক্ষা করতে পারো।" +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.cs.env b/includes/strings.cs.env index ab83bb67..7813ce9c 100644 --- a/includes/strings.cs.env +++ b/includes/strings.cs.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides je vaším hlavním zdrojem informací o ochraně soukromí a bezpečnosti na internetu." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.de.env b/includes/strings.de.env index e784f991..c1866cf4 100644 --- a/includes/strings.de.env +++ b/includes/strings.de.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides ist deine zentrale Informationsquelle für Datenschutz und Sicherheit, um dich online zu schützen." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.el.env b/includes/strings.el.env index 0aaa113f..48724290 100644 --- a/includes/strings.el.env +++ b/includes/strings.el.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Τροφοδοσία ιστολογίου Privacy Guides" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Τελευταία θέματα Forum του Privacy Guides" -LANG="Αγγλικά" -LANG_ENGLISH="Αγγλικά" NAV_ABOUT="Σχετικά με εμάς" NAV_ADVANCED="Για προχωρημένους" NAV_ADVANCED_TOPICS="Θέματα για Προχωρημένους" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Τεχνικοί Οδηγοί" NAV_TECHNOLOGY_ESSENTIALS="Στοιχειώδη τεχνολογίας" NAV_WRITING_GUIDE="Οδηγός Συγγραφής" SITE_DESCRIPTION="Ο οδηγός Privacy Guides είναι η κεντρική πηγή προστασίας του απορρήτου σας και της ασφάλειας στο διαδίκτυο." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Κρυφή υπηρεσία" THEME_AUTO="Εναλλαγή σε θέμα συστήματος" THEME_DARK="Εναλλαγή σε σκοτεινή λειτουργία" THEME_LIGHT="Εναλλαγή σε φωτεινή λειτουργία" -TRANSLATION_NOTICE="Βλέπετε το αντίγραφο $LANG των Privacy Guides, μεταφρασμένο από τη φανταστική ομάδα μετάφρασης στο Crowdin. Αν παρατηρήσετε κάποιο λάθος ή δείτε κάποια αμετάφραστα τμήματα σε αυτή τη σελίδα, παρακαλώ σκεφτείτε να βοηθήσετε!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Επισκεφθείτε το Crowdin" diff --git a/includes/strings.eo.env b/includes/strings.eo.env index 8e8a0dad..7990502f 100644 --- a/includes/strings.eo.env +++ b/includes/strings.eo.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides estas via ĉefa privateca kaj sekureca resurso por protekti vin enrete." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.es.env b/includes/strings.es.env index cce2b76f..c94f0f59 100644 --- a/includes/strings.es.env +++ b/includes/strings.es.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="Inglés" -LANG_ENGLISH="Inglés" NAV_ABOUT="Acerca de" NAV_ADVANCED="Avanzado" NAV_ADVANCED_TOPICS="Temas avanzados" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Guías Técnicas" NAV_TECHNOLOGY_ESSENTIALS="Aspectos Tecnológicos Esenciales" NAV_WRITING_GUIDE="Guía de Redacción" SITE_DESCRIPTION="Privacy Guides es tu recurso central de privacidad y seguridad para protegerte en línea." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Foro" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Servicio oculto" THEME_AUTO="Cambiar al tema del sistema" THEME_DARK="Cambiar a modo oscuro" THEME_LIGHT="Cambiar a modo claro" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.fa.env b/includes/strings.fa.env index d2523341..156444f3 100644 --- a/includes/strings.fa.env +++ b/includes/strings.fa.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="وبسایت Privacy Guides منبع اصلی حریم خصوصی و امنیت شما برای محافظت از خودتان در اینترنت است." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.fr.env b/includes/strings.fr.env index ad5543ef..687ec21a 100644 --- a/includes/strings.fr.env +++ b/includes/strings.fr.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="Français" -LANG_ENGLISH="French" NAV_ABOUT="À propos" NAV_ADVANCED="Avancé" NAV_ADVANCED_TOPICS="Sujets avancés" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Guides techniques" NAV_TECHNOLOGY_ESSENTIALS="Les essentiels de la technologie" NAV_WRITING_GUIDE="Guide de rédaction" SITE_DESCRIPTION="Privacy Guides est votre ressource centrale en matière de vie privée et de sécurité pour vous protéger en ligne." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Basculer vers le thème du système" THEME_DARK="Basculer en mode sombre" THEME_LIGHT="Basculer en mode clair" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.he.env b/includes/strings.he.env index a54b73bc..8197bbc7 100644 --- a/includes/strings.he.env +++ b/includes/strings.he.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides (מדריכי פרטיות) הם משאב הפרטיות והאבטחה המרכזי שלכם כדי להגן על עצמכם באופן מקוון." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="Github" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.hi.env b/includes/strings.hi.env index ed0ac1ae..4e4e6730 100644 --- a/includes/strings.hi.env +++ b/includes/strings.hi.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides is your central privacy and security resource to protect yourself online." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.hu.env b/includes/strings.hu.env index 4dbca1a4..08301f5a 100644 --- a/includes/strings.hu.env +++ b/includes/strings.hu.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="A Privacy Guides a te központi adatvédelmi és adatbiztonsági erőforrásod magad megvédéséhez online." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.id.env b/includes/strings.id.env index a7ce6895..f6ce2781 100644 --- a/includes/strings.id.env +++ b/includes/strings.id.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides adalah sumber daya privasi dan keamanan Anda untuk melindungi Anda secara daring." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.it.env b/includes/strings.it.env index f52d2724..d41937dc 100644 --- a/includes/strings.it.env +++ b/includes/strings.it.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Feed delle Storie Web di Privacy Guides" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Ultimi argomenti del forum Privacy Guides" -LANG="Inglese" -LANG_ENGLISH="Inglese" NAV_ABOUT="Informazioni" NAV_ADVANCED="Avanzato" NAV_ADVANCED_TOPICS="Argomenti avanzati" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Guide tecniche" NAV_TECHNOLOGY_ESSENTIALS="Fondamenti di Tecnologia" NAV_WRITING_GUIDE="Guida alla scrittura" SITE_DESCRIPTION="Privacy Guides è la risorsa centrale per la privacy e la sicurezza per proteggersi online." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Servizio nascosto" THEME_AUTO="Passa al tema di sistema" THEME_DARK="Passa al tema scuro" THEME_LIGHT="Passa al tema chiaro" -TRANSLATION_NOTICE="Stai visualizzando la copia $LANG di Privacy Guides, tradotta dal nostro fantastico team di lingue su Crowdin. Se noti un errore, o vedi eventuali sezioni non tradotte in questa pagina, puoi considerare di aiutarci!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visita Crowdin" diff --git a/includes/strings.ja.env b/includes/strings.ja.env index 72dee98c..b60a524e 100644 --- a/includes/strings.ja.env +++ b/includes/strings.ja.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guidesはあなたがオンラインで自分自身を守るための、プライバシーとセキュリティに関するリソースです。" +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.ko.env b/includes/strings.ko.env index 26e3312f..f559096e 100644 --- a/includes/strings.ko.env +++ b/includes/strings.ko.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides is your central privacy and security resource to protect yourself online." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.ku-IQ.env b/includes/strings.ku-IQ.env index 7162c43c..6d5fc661 100644 --- a/includes/strings.ku-IQ.env +++ b/includes/strings.ku-IQ.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides ناوەندی سەرچاوەی تۆیە بۆ پاراستن و تایبەتێتی شێوازی خۆپاراستن لەسەرهێڵ." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.nl.env b/includes/strings.nl.env index 6aa296da..caa6617a 100644 --- a/includes/strings.nl.env +++ b/includes/strings.nl.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="Dutch" -LANG_ENGLISH="Dutch" NAV_ABOUT="Over" NAV_ADVANCED="Geavanceerd" NAV_ADVANCED_TOPICS="Geavanceerde Onderwerpen" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technische gids" NAV_TECHNOLOGY_ESSENTIALS="Technologie Essenties" NAV_WRITING_GUIDE="Schrijfgids" SITE_DESCRIPTION="Privacy Guides is jouw centrale bron voor privacy en beveiliging om jezelf online te beschermen." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Schakelen naar systeemthema" THEME_DARK="Schakelen naar donker thema" THEME_LIGHT="Schakelen naar licht thema" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.pl.env b/includes/strings.pl.env index 8ec27b51..2b61769a 100644 --- a/includes/strings.pl.env +++ b/includes/strings.pl.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="polski" -LANG_ENGLISH="Polish" NAV_ABOUT="Informacje" NAV_ADVANCED="Zaawansowane" NAV_ADVANCED_TOPICS="Zaawansowane tematy" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Poradniki techniczne" NAV_TECHNOLOGY_ESSENTIALS="Niezbędnik technologiczny" NAV_WRITING_GUIDE="Przewodnik redagowania" SITE_DESCRIPTION="Privacy Guides to centrum dla prywatności oraz bezpieczeństwa, które pomoże Ci chronić siebie w Internecie." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Sieć Tor" THEME_AUTO="Przełącz na tryb systemowy" THEME_DARK="Przełącz na tryb ciemny" THEME_LIGHT="Przełącz na tryb jasny" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.pt-BR.env b/includes/strings.pt-BR.env index be286f40..b6490d05 100644 --- a/includes/strings.pt-BR.env +++ b/includes/strings.pt-BR.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides é sua central de recursos no que diz respeito a privacidade e segurança para se proteger online." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.pt.env b/includes/strings.pt.env index e81e24cf..1edfc541 100644 --- a/includes/strings.pt.env +++ b/includes/strings.pt.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides é o seu centro de recursos sobre privacidade e segurança online." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.ru.env b/includes/strings.ru.env index d8861d7a..f5263bed 100644 --- a/includes/strings.ru.env +++ b/includes/strings.ru.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides - это ваш главный ресурс по конфиденциальности и безопасности для защиты себя в Интернете." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.sv.env b/includes/strings.sv.env index 8fb0b268..8e3d5126 100644 --- a/includes/strings.sv.env +++ b/includes/strings.sv.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="Om" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides är din centrala resurs för integritet och säkerhet för att skydda dig själv på nätet." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Besök Crowdin" diff --git a/includes/strings.tr.env b/includes/strings.tr.env index ed4bcd7e..0878b40d 100644 --- a/includes/strings.tr.env +++ b/includes/strings.tr.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides, kendinizi çevrimiçi olarak korumanız için merkezi gizlilik ve güvenlik kaynağıdır." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.uk.env b/includes/strings.uk.env index 1dc5ebeb..6b0820bc 100644 --- a/includes/strings.uk.env +++ b/includes/strings.uk.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides — ваш головний ресурс для захисту конфіденційності та безпеки в Інтернеті." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.vi.env b/includes/strings.vi.env index 6fb00946..f201b2f4 100644 --- a/includes/strings.vi.env +++ b/includes/strings.vi.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides là tài nguyên bảo mật và quyền riêng tư trung tâm của bạn để bảo vệ bạn khi trực tuyến." +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="OnePlus" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin" diff --git a/includes/strings.zh-Hant.env b/includes/strings.zh-Hant.env index 6698946a..5a7ed048 100644 --- a/includes/strings.zh-Hant.env +++ b/includes/strings.zh-Hant.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides 網路故事 RSS 訂閱" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="最新 Privacy Guides 論壇討論 RSS 訂閱" -LANG="正體中文" -LANG_ENGLISH="英文" NAV_ABOUT="關於" NAV_ADVANCED="進階" NAV_ADVANCED_TOPICS="進階主題" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="技術指南" NAV_TECHNOLOGY_ESSENTIALS="技術要點" NAV_WRITING_GUIDE="撰寫指南" SITE_DESCRIPTION="Privacy Guides 是您重要的網路隱私與安全資源。" +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="論壇" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="隱藏服務" THEME_AUTO="切換至系統主題" THEME_DARK="切換至深色主題" THEME_LIGHT="切換至深色主題" -TRANSLATION_NOTICE="您正在查看 Privacy Guides 的 $LANG 版本,由我們在 Crowdin 上出色的團隊翻譯。如果您發現錯誤,或在此頁面上看到任何未翻譯的部分,請考慮提供幫助!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="訪問 Crowdin" diff --git a/includes/strings.zh.env b/includes/strings.zh.env index 5399f303..52306af3 100644 --- a/includes/strings.zh.env +++ b/includes/strings.zh.env @@ -22,8 +22,6 @@ HOMEPAGE_RSS_STORIES_LINK="https://share.privacyguides.org/web-stories/feed/" HOMEPAGE_RSS_STORIES_TITLE="Privacy Guides web stories feed" HOMEPAGE_RSS_FORUM_LINK="https://discuss.privacyguides.net/latest.rss" HOMEPAGE_RSS_FORUM_TITLE="Latest Privacy Guides forum topics" -LANG="English" -LANG_ENGLISH="English" NAV_ABOUT="About" NAV_ADVANCED="Advanced" NAV_ADVANCED_TOPICS="Advanced Topics" @@ -45,6 +43,8 @@ NAV_TECHNICAL_GUIDES="Technical Guides" NAV_TECHNOLOGY_ESSENTIALS="Technology Essentials" NAV_WRITING_GUIDE="Writing Guide" SITE_DESCRIPTION="Privacy Guides是您保护自己在线隐私的实用资源。" +SITE_LANGUAGE="English" +SITE_LANGUAGE_ENGLISH="English" SITE_NAME="Privacy Guides" SOCIAL_FORUM="Forum" SOCIAL_GITHUB="GitHub" @@ -54,5 +54,5 @@ SOCIAL_TOR_SITE="Hidden service" THEME_AUTO="Switch to system theme" THEME_DARK="Switch to dark mode" THEME_LIGHT="Switch to light mode" -TRANSLATION_NOTICE="You're viewing the $LANG copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" TRANSLATION_NOTICE_CTA="Visit Crowdin"