1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-26 04:32:35 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2023-04-16 04:04:17 +00:00
parent c1037c7482
commit d3ca121958
118 changed files with 432 additions and 432 deletions

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -102,9 +102,9 @@ Proton Mail doesn't offer a digital legacy feature.
!!! recommendation
![Mailbox.org logo](assets/img/email/mailboxorg.svg){ align=right }
![Mailbox.org-Logo](assets/img/email/mailboxorg.svg){ align=right }
**Mailbox.org** is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with 2 GB of storage, which can be upgraded as needed.
**Mailbox.org** ist ein E-Mail-Dienst, mit dem Ziel sicher und werbefrei zu sein und der mit 100 % erneuerbaren Energien betrieben wird. Er ist 2014 gestartet. Mailbox.org hat seinen Sitz in Berlin, Deutschland. Der günstigste Tarif beginnt mit 2 GB Speicherplatz, der je nach Bedarf erweitert werden kann.
[:octicons-home-16: Homepage](https://mailbox.org){ .md-button .md-button--primary }
[:octicons-eye-16:](https://mailbox.org/en/data-protection-privacy-policy){ .card-link title="Privacy Policy" }
@ -114,19 +114,19 @@ Proton Mail doesn't offer a digital legacy feature.
- [:octicons-browser-16: Web](https://login.mailbox.org)
#### :material-check:{ .pg-green } Custom Domains and Aliases
#### :material-check:{ .pg-green } Eigene Domains und Aliase
Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain.
Bei Mailbox.org kannst du deine eigene Domain verwenden, und sie unterstützen [Catch-All](https://kb.mailbox.org/de/privat/e-mail-mit-eigener-domain/eine-eigene-domain-mit-catch-all-benutzen) Adressen. Mailbox.org unterstützt auch die [Subadressierung/Aliasse](https://kb.mailbox.org/de/privat/e-mail-artikel/was-sind-aliasse-und-wie-nutze-ich-sie), was hilfreich ist, wenn du keine Domain kaufen möchtest.
#### :material-check:{ .pg-green } Private Payment Methods
#### :material-check:{ .pg-green } Diskrete Zahlungsmöglichkeiten
Mailbox.org doesn't accept any cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofortüberweisung.
Mailbox.org akzeptiert keine Kryptowährungen, da deren Zahlungsanbieter BitPay seinen Betrieb in Deutschland eingestellt hat. Sie akzeptieren jedoch Bargeld per Post, Barzahlung auf ein Bankkonto, Banküberweisung, Kreditkarte, PayPal und einige Deutschland spezifische Anbieter: paydirekt und Sofortüberweisung.
#### :material-check:{ .pg-green } Account Security
#### :material-check:{ .pg-green } Kontosicherheit
Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
Mailbox.org unterstützt [Zwei-Faktor-Authentifizierung](https://kb.mailbox.org/de/privat/sicherheit-privatsphaere-artikel/die-zwei-faktor-authentifizierung-einrichten) nur für Webmail. Du kannst entweder TOTP oder einen [YubiKey](https://de.wikipedia.org/wiki/Yubikey) über die [YubiCloud](https://www.yubico.com/products/services-software/yubicloud)verwenden. Webstandards wie [WebAuthn](https://de.wikipedia.org/wiki/WebAuthn) werden noch nicht unterstützt.
#### :material-information-outline:{ .pg-blue } Data Security
#### :material-information-outline:{ .pg-blue } Datensicherheit
Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key.
@ -190,7 +190,7 @@ StartMail accepts Visa, MasterCard, American Express and Paypal. StartMail also
StartMail supports TOTP two factor authentication [for webmail only](https://support.startmail.com/hc/en-us/articles/360006682158-Two-factor-authentication-2FA). They do not allow U2F security key authentication.
#### :material-information-outline:{ .pg-blue } Data Security
#### :material-information-outline:{ .pg-blue } Datensicherheit
StartMail has [zero access encryption at rest](https://www.startmail.com/en/whitepaper/#_Toc458527835), using their "user vault" system. When you log in, the vault is opened, and the email is then moved to the vault out of the queue where it is decrypted by the corresponding private key.

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
meta_title: "Privacy Guides: Deine unabhängige Quelle für Datenschutz und Sicherheit"
template: overrides/home.de.html
hide:
- navigation
@ -40,9 +40,9 @@ schema:
##### "Ich habe nichts zu verbergen. Warum sollte ich mir Sorgen um meine Privatsphäre machen?"
Ähnlich wie das Recht auf gemischtrassige Ehen, das Frauenwahlrecht, das Recht auf freie Meinungsäußerung und viele andere wurde unser Recht auf Privatsphäre nicht immer gewährt. In einigen Diktaturen ist das immer noch der Fall. Generationen vor uns haben für unser Recht auf Privatsphäre gekämpft. ==Privatsphäre ist ein Menschenrecht, das uns allen innewohnt,== auf das wir (ohne Diskriminierung) Anspruch haben.
Ähnlich wie das Recht auf gemischtrassige Ehen, das Frauenwahlrecht, das Recht auf freie Meinungsäußerung und viele andere wurde unser Recht auf Privatsphäre nicht immer gewährt. In einigen Diktaturen ist das immer noch der Fall. Generationen vor uns haben für unser Recht auf Privatsphäre gekämpft. ==Privatsphäre ist ein Menschenrecht, das für uns alle gilt,== auf das jeder (egal welches Alter, Geschlecht, Herkunft, Religion, ...) Anspruch hat.
Privatsphäre sollte nicht mit Geheimhaltung verwechselt werden. Wir wissen, was auf der Toilette passiert, aber machen trotzdem die Tür zu. Das liegt daran, dass wir Privatsphäre wollen, keine Geheimhaltung. **Alle** haben etwas zu schützen. Privatsphäre ist etwas, das uns menschlich macht.
Privatsphäre sollte nicht mit Verheimlichen verwechselt werden. Wir wissen, was auf der Toilette passiert, aber machen trotzdem die Tür zu. Das liegt daran, dass du deine Privatsphäre willst, aber nicht unbedingt alles verheimlichen willst. **Alle** haben etwas zu schützen. Privatsphäre ist etwas, das uns zum Menschen macht.
[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" }

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -1,5 +1,5 @@
---
meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
meta_title: "Recomendaciones Android: GrapheneOS y DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: Puedes sustituir el sistema operativo de tu teléfono Android por estas alternativas seguras y respetuosas con la privacidad.
@ -225,7 +225,7 @@ En este sitio recomendamos una amplia variedad de aplicaciones para Android. Las
![Auditor logo](assets/img/android/auditor.svg#only-light){ align=right }
![Auditor logo](assets/img/android/auditor-dark.svg#only-dark){ align=right }
**Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
**Auditor** es una aplicación que aprovecha las funciones de seguridad del hardware para supervisar la integridad de los dispositivos mediante la validación activa de la identidad de un dispositivo y la integridad de su sistema operativo. Actualmente, sólo funciona con GrapheneOS o con el sistema operativo stock para [dispositivos compatibles](https://attestation.app/about#device-support).
[:octicons-home-16: Página Principal](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Politica de Privacidad" }

View File

@ -1,5 +1,5 @@
---
meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
meta_title: "Cómo Crear Cuentas de Internet Privadas - Privacy Guides"
title: "Creación de cuenta"
icon: 'material/account-plus'
description: Crear cuentas en línea es prácticamente una necesidad en Internet, sigue estos pasos para asegurarte de mantener tu privacidad.

View File

@ -1,5 +1,5 @@
---
meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
meta_title: "Por Qué el Correo Electrónico No es la Mejor Opción para la Privacidad y la Seguridad - Privacy Guides"
title: Seguridad del correo electrónico
icon: material/email
description: El correo electrónico es intrínsecamente inseguro en muchos aspectos, y éstas son algunas de las razones por las que no es nuestra primera opción para las comunicaciones seguras.
@ -23,7 +23,7 @@ Los proveedores de correo electrónico que permiten utilizar protocolos de acces
### ¿Cómo puedo proteger mis claves privadas?
A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. El mensaje es entonces descifrado por la tarjeta inteligente y el contenido descifrado es enviado de vuelta al dispositivo.
Una tarjeta inteligente (como una [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) o una [Nitrokey](https://www.nitrokey.com)) funciona recibiendo un mensaje de correo electrónico cifrado desde un dispositivo (teléfono, tableta, ordenador, etc.) que ejecuta un cliente de correo electrónico/correo web. El mensaje es entonces descifrado por la tarjeta inteligente y el contenido descifrado es enviado de vuelta al dispositivo.
Es ventajoso que el descifrado ocurra en la tarjeta inteligente para evitar la posible exposición de tu clave privada a un dispositivo comprometido.

View File

@ -1,8 +1,8 @@
---
meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
meta_title: "Modelado de Amenazas: El Primer Paso en el Camino hacia la Privacidad - Privacy Guides"
title: "¿Qué son los modelos de amenaza?"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
description: Equilibrar la seguridad, privacidad y usabilidad es una de las primeras y más difíciles tareas a las que te enfrentarás en tu camino a la privacidad.
---
Equilibrar la seguridad, privacidad y usabilidad es una de las primeras y más difíciles tareas a las que te enfrentarás en tu camino de privacidad. Todo es un intercambio: Entre más seguro algo es, más restrictivo o inconveniente suele ser, etc. A menudo, gente encuentra que el problema con las herramientas que ven recomendadas es que son demasiado difíciles de comenzar a usar!

View File

@ -1,5 +1,5 @@
---
meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
meta_title: "¿Cómo Protegen Tu Privacidad las VPN? Nuestra Vista General de las VPN - Privacy Guides"
title: Vista general de VPN
icon: material/vpn
description: Las Redes Privadas Virtuales desplazan el riesgo de tu proveedor de Internet a un tercero quien confías. Debes tener en cuenta estas cosas.

View File

@ -1,5 +1,5 @@
---
meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
meta_title: "Los Mejores Proveedores de Almacenamiento en la Nube Privado y Seguro - Privacy Guides"
title: "Almacenamiento en la Nube"
icon: material/file-cloud
description: Muchos proveedores de almacenamiento en la nube exigen que confíes plenamente en que no mirarán tus archivos. Estas son alternativas privadas.

View File

@ -1,5 +1,5 @@
---
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
meta_title: "Blockchains Privadas de Criptomonedas - Privacy Guides"
title: Criptomonedas
icon: material/bank-circle
---

View File

@ -1,5 +1,5 @@
---
meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
meta_title: "Eliminar PII con Depuradores de Metadatos y Herramientas de Edición de Datos - Privacy Guides"
title: "Redacción de Datos y Metadatos"
icon: material/tag-remove
description: Utiliza estas herramientas para eliminar metadatos como la ubicación GPS y otros datos identificativos de las fotos y archivos que compartas.

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
meta_title: "Navegadores Web para PC y Mac que Respetan la Privacidad - Privacy Guides"
title: "Navegadores de Escritorio"
icon: material/laptop
description: Estos navegadores web ofrecen protecciones de privacidad más sólidas que Google Chrome.

View File

@ -1,5 +1,5 @@
---
meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
meta_title: "Recomendaciones de Correo Electrónico Privado Cifrado - Privacy Guides"
title: "Servicios de Correo Electrónico"
icon: material/email
description: Estos proveedores de correo electrónico ofrecen un lugar estupendo para almacenar tus correos de forma segura, y muchos ofrecen encriptación OpenPGP inter operable con otros proveedores.
@ -124,7 +124,7 @@ Mailbox.org no acepta criptomonedas debido a que su procesador de pagos BitPay s
#### :material-check:{ .pg-green } Seguridad de Cuenta
Mailbox.org soporta [autenticación de doble factor](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo para su correo web. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Estándares web como [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) aún no son soportados.
Mailbox.org soporta [autenticación de doble factor](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo para su correo web. Puede utilizar TOTP o una [YubiKey](https://en.wikipedia.org/wiki/YubiKey) a través de [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Estándares web como [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) aún no son soportados.
#### :material-information-outline:{ .pg-blue } Seguridad de Datos

View File

@ -1,5 +1,5 @@
---
meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
meta_title: "Software de Cifrado Recomendado:: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Software de Cifrado"
icon: material/file-lock
description: El cifrado de los datos es la única forma de controlar quién puede acceder a ellos. Estas herramientas le permiten cifrar sus correos electrónicos y cualquier otro archivo.

View File

@ -76,7 +76,7 @@ Estos servicios le permiten comprar tarjetas de regalo para una gran variedad de
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (disponible en EE.UU., Canadá y Reino Unido) le permite comprar tarjetas regalo para una gran variedad de comercios.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Página Principal](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Política de Privacidad" }

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
meta_title: "Privacy Guides: Tu Recurso Independiente sobre Privacidad y Seguridad"
template: overrides/home.es.html
hide:
- navigation

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
meta_title: "Navegadores Móviles para Android e iOS que Respetan la Privacidad - Privacy Guides"
title: "Navegadores Móviles"
icon: material/cellphone-information
description: Estos navegadores son los que recomendamos actualmente para la navegación estándar/no anónima por Internet en su teléfono.

View File

@ -49,7 +49,7 @@ Para los modelos que admiten HOTP y TOTP, hay 3 ranuras para HOTP y 15 para TOTP
!!! warning "Advertencia"
Aunque las Nitrokeys no revelan los secretos HOTP/TOTP al dispositivo al que están conectadas, el almacenamiento HOTP y TOTP **no** está cifrado y es vulnerable a ataques físicos. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
Aunque las Nitrokeys no revelan los secretos HOTP/TOTP al dispositivo al que están conectadas, el almacenamiento HOTP y TOTP **no** está cifrado y es vulnerable a ataques físicos. Si desea almacenar con HOTP o TOTP estos secretos, le recomendamos encarecidamente que utilice un YubiKey en su lugar.
!!! warning "Advertencia"

View File

@ -1,5 +1,5 @@
---
meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
meta_title: "Los Mejores Administradores de Contraseñas para Proteger su Privacidad y Seguridad - Privacy Guides"
title: "Administradores de Contraseñas"
icon: material/form-textbox-password
description: Los administradores de contraseñas le permiten almacenar y administrar de forma segura contraseñas y otras credenciales.

View File

@ -1,5 +1,5 @@
---
meta_title: "The Best Private Instant Messengers - Privacy Guides"
meta_title: "Los Mejores Servicios de Mensajería Instantánea - Privacy Guides"
title: "Comunicación en Tiempo Real"
icon: material/chat-processing
description: Otros servicios de mensajería instantánea ponen todas sus conversaciones privadas a disposición de la empresa que los gestiona.

View File

@ -1,5 +1,5 @@
---
meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
meta_title: "Motores de Búsqueda Recomendados: Alternativas Anónimas a Google - Privacy Guides"
title: "Motores de Búsqueda"
icon: material/search-web
description: Estos motores de búsqueda respetuosos con la privacidad no construyen un perfil publicitario basado en sus búsquedas.

View File

@ -1,5 +1,5 @@
---
meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
meta_title: "Las Mejores Herramientas de Privacidad, Servicios y Recomendaciones Sin Publicidad - Privacy Guides"
title: "Herramientas de Privacidad"
icon: material/tools
hide:

View File

@ -1,5 +1,5 @@
---
meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
meta_title: "Navegador y Red Tor: Navegación Web Anónima - Privacy Guides"
title: "Red Tor"
icon: simple/torproject
description: Protege tu navegación por Internet de miradas intrusas utilizando la red Tor, una red segura que elude la censura.
@ -10,8 +10,8 @@ schema:
name: Tor Browser
image: /assets/img/browsers/tor.svg
url: https://www.torproject.org
sameAs: https://en.wikipedia.org/wiki/Tor_(network)
applicationCategory: Web Browser
sameAs: https://es.wikipedia.org/wiki/Tor_(red_de_anonimato)
applicationCategory: Navegador Web
operatingSystem:
- Windows
- macOS

View File

@ -1,5 +1,5 @@
---
meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
meta_title: "Recomendaciones y Comparación de Servicios VPN Privados, Sin Patrocinadores Ni Anuncios - Privacy Guides"
title: "Servicios de VPN"
icon: material/vpn
description: Estos son los mejores servicios VPN para proteger tu privacidad y seguridad en línea. Encuentra un proveedor aquí que no esté para espiarte.

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -1,5 +1,5 @@
---
meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
meta_title: "Recommandations Android : GrapheneOS et DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: Vous pouvez remplacer le système d'exploitation de votre téléphone Android par ces alternatives sécurisées et respectueuses de la vie privée.
@ -222,10 +222,10 @@ Nous recommandons une grande variété d'applications Android sur ce site. Les a
!!! recommendation
![Auditor logo](assets/img/android/auditor.svg#only-light){ align=right }
![Auditor logo](assets/img/android/auditor-dark.svg#only-dark){ align=right }
![Logo d'Auditor](assets/img/android/auditor.svg#only-light){ align=right }
![Logo d'Auditor](assets/img/android/auditor-dark.svg#only-dark){ align=right }
**Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
**Auditor** est une application qui exploite les fonctions de sécurité matérielle pour assurer le contrôle de l'intégrité d'un appareil en validant activement son identité et l'intégrité de son système d'exploitation. Actuellement, elle ne fonctionne qu'avec GrapheneOS ou le système d'exploitation de base pour les [appareils pris en charge](https://attestation.app/about#device-support).
[:octicons-home-16: Page d'accueil](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Politique de confidentialité" }

View File

@ -1,5 +1,5 @@
---
meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
meta_title: "Comment créer des comptes internet de façon privée - Privacy Guides"
title: "Création de compte"
icon: 'material/account-plus'
description: La création de comptes en ligne est pratiquement une nécessité sur internet, prenez ces mesures pour vous assurer de rester privé.

View File

@ -1,5 +1,5 @@
---
meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
meta_title: "Pourquoi le courrier électronique n'est pas le meilleur choix en matière de protection de la vie privée et de sécurité - Privacy Guides"
title: Sécurité des emails
icon: material/email
description: L'email est intrinsèquement peu sûr à bien des égards, et voici quelques-unes des raisons pour lesquelles il n'est pas notre premier choix en matière de communications sécurisées.
@ -23,7 +23,7 @@ Les fournisseurs d'emails qui vous permettent d'utiliser les protocoles d'accès
### Comment Puis-Je Protéger Mes Clés Privées?
A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Le message est ensuite déchiffré par la carte à puce et le contenu déchiffré est renvoyé à l'appareil.
Une carte à puce (telle qu'une [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) ou [Nitrokey](https://www.nitrokey.com)) fonctionne en recevant un email chiffré d'un appareil (téléphone, tablette, ordinateur, etc.) exécutant un client mail/webmail. Le message est ensuite déchiffré par la carte à puce et le contenu déchiffré est renvoyé à l'appareil.
Il est avantageux que le déchiffrement se fasse sur la carte à puce afin d'éviter d'exposer votre clé privée à un dispositif compromis.

View File

@ -1,11 +1,11 @@
---
meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
meta_title: "Modélisation des menaces : la première étape de votre parcours en matière de protection de la vie privée - Privacy Guides"
title: "Modélisation des menaces"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
description: Trouver le bon équilibre entre la sécurité, la confidentialité et la commodité est l'une des premières et plus difficiles tâches que vous aurez à accomplir dans votre parcours pour regagner votre vie privée en ligne.
---
Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Tout est une histoire de compromis : plus quelque chose est sécurisé, plus il est limité ou peu pratique, etc. Souvent, les gens trouvent que le problème avec les outils qui leurs sont recommandés est qu'ils sont trop difficiles à utiliser !
Trouver le bon équilibre entre la sécurité, la confidentialité et la commodité est l'une des premières et plus difficiles tâches que vous aurez à accomplir dans votre parcours pour regagner votre vie privée en ligne. Tout est une histoire de compromis : plus quelque chose est sécurisé, plus il est limité ou peu pratique, etc. Souvent, les gens trouvent que le problème avec les outils qui leurs sont recommandés est qu'ils sont trop difficiles à utiliser !
Si vous vouliez utiliser les outils les **plus** sécurisés actuellement disponibles, vous devriez sacrifier *beaucoup* de commodité. Et même dans ce cas, ==rien n'est jamais totalement sécurisé.== On parle de sécurité **élevée**, mais jamais de sécurité **totale**. C'est pourquoi les modèles de menace sont importants.
@ -41,7 +41,7 @@ Selon l'identité de vos adversaires, dans certaines circonstances, cette liste
### Quelle est la probabilité que je doive le protéger ?
==Le risque est la probabilité qu'une menace particulière contre un actif particulier se produise réellement. Il va de pair avec la capacité. Si votre opérateur de téléphonie mobile a la capacité d'accéder à toutes vos données, le risque qu'il publie vos données privées en ligne pour nuire à votre réputation est faible.
==Le risque est la probabilité qu'une menace particulière contre un actif particulier se produise réellement.== Il va de pair avec la capacité. Si votre opérateur de téléphonie mobile a la capacité d'accéder à toutes vos données, le risque qu'il publie vos données privées en ligne pour nuire à votre réputation est faible.
Il est important de faire la distinction entre ce qui pourrait se produire et la probabilité que cela se produise. Par exemple, votre bâtiment risque de s'effondrer, mais le risque que cela se produise est bien plus grand à San Francisco (où les tremblements de terre sont fréquents) qu'à Stockholm (où ils ne le sont pas).

View File

@ -1,5 +1,5 @@
---
meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
meta_title: "Comment les VPNs protègent-ils votre vie privée ? Notre introduction aux VPNs - Privacy Guides"
title: Introduction aux VPNs
icon: material/vpn
description: Les réseaux privés virtuels déplacent le risque de votre FAI à un tiers en qui vous avez confiance. Vous devriez garder ces éléments à l'esprit.

View File

@ -1,5 +1,5 @@
---
meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
meta_title: "Les meilleurs services de stockage cloud privés et sécurisés - Privacy Guides"
title: "Stockage cloud"
icon: material/file-cloud
description: De nombreux fournisseurs de stockage cloud nécessitent que vous leur fassiez confiance pour ne pas consulter vos fichiers. Voici des alternatives privées !

View File

@ -1,5 +1,5 @@
---
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
meta_title: "Chaînes de blocs de crypto-monnaies privées - Privacy Guides"
title: Crypto-monnaie
icon: material/bank-circle
---

View File

@ -1,5 +1,5 @@
---
meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
meta_title: "Supprimer les DCP à l'aide de nettoyeurs de métadonnées et d'outils de suppression des données - Privacy Guides"
title: "Rédaction de données et de métadonnées"
icon: material/tag-remove
description: Utilisez ces outils pour supprimer les métadonnées telles que la position GPS et d'autres informations d'identification des photos et des fichiers que vous partagez.

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
meta_title: "Navigateurs web respectueux de la vie privée pour PC et Mac - Privacy Guides"
title: "Navigateurs de bureau"
icon: material/laptop
description: Ces navigateurs web offrent des protections de la vie privée plus solides que Google Chrome.
@ -79,13 +79,13 @@ Si vous avez besoin de naviguer anonymement sur Internet, vous devriez plutôt u
- [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos)
- [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux)
Comme le [Navigateur Tor](tor.md), le Navigateur Mullvad est conçu pour empêcher la prise d'empreintes numérique en rendant l'empreinte numérique de votre navigateur identique à celle de tous les autres utilisateurs du Navigateur Mullvad, et il inclut des paramètres par défaut et des extensions qui sont automatiquement configurés par les niveaux de sécurité par défaut : *Standard*, *Safer* et *Safest*. Il est donc impératif de ne pas modifier le navigateur mis à part l'ajustement des [niveaux de sécurité](https://tb-manual.torproject.org/security-settings/) par défaut. D'autres modifications rendraient votre empreinte numérique unique, ce qui irait à l'encontre de l'objectif poursuivi par l'utilisation de ce navigateur. Si vous souhaitez configurer votre navigateur de manière plus poussée et que la prise d'empreintes numérique ne vous préoccupe pas, nous vous recommandons plutôt [Firefox](#firefox).
Comme le [Navigateur Tor](tor.md), le Navigateur Mullvad est conçu pour empêcher la prise d'empreintes numériques en rendant l'empreinte numérique de votre navigateur identique à celle de tous les autres utilisateurs du Navigateur Mullvad, et il inclut des paramètres par défaut et des extensions qui sont automatiquement configurés par les niveaux de sécurité par défaut : *Standard*, *Safer* et *Safest*. Il est donc impératif de ne pas modifier le navigateur mis à part l'ajustement des [niveaux de sécurité](https://tb-manual.torproject.org/security-settings/) par défaut. D'autres modifications rendraient votre empreinte numérique unique, ce qui irait à l'encontre de l'objectif poursuivi par l'utilisation de ce navigateur. Si vous souhaitez configurer votre navigateur de manière plus poussée et que la prise d'empreintes numériques ne vous préoccupe pas, nous vous recommandons plutôt [Firefox](#firefox).
### Système anti-empreintes numériques
**Sans** utiliser un [VPN](vpn.md), le Navigateur Mullvad offre les mêmes protections contre [les scripts d'empreintes numérique naïfs](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) que d'autres navigateurs privés comme Firefox+[Arkenfox](#arkenfox-advanced) ou [Brave](#brave). Le Navigateur Mullvad fournit ces protections dès le départ, au détriment d'une certaine flexibilité et d'une commodité que d'autres navigateurs privés peuvent offrir.
**Sans** utiliser un [VPN](vpn.md), le Navigateur Mullvad offre les mêmes protections contre [les scripts d'empreintes numériques naïfs](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) que d'autres navigateurs privés comme Firefox+[Arkenfox](#arkenfox-advanced) ou [Brave](#brave). Le Navigateur Mullvad fournit ces protections dès le départ, au détriment d'une certaine flexibilité et d'une commodité que d'autres navigateurs privés peuvent offrir.
==Pour une protection anti-empreintes numérique optimale, nous recommandons d'utiliser le Navigateur Mullvad en conjonction **avec** un VPN==, qu'il s'agisse de Mullvad ou d'un autre fournisseur de VPN recommandé. Lorsque vous utilisez un VPN avec le Navigateur Mullvad, vous partagez une empreinte numérique et un ensemble d'adresses IP avec de nombreux autres utilisateurs, ce qui vous permet de vous fondre dans la "foule". Cette stratégie est le seul moyen de contrecarrer les scripts de pistage avancés, et c'est la même technique anti-empreintes numérique utilisée par le Navigateur Tor.
==Pour une protection anti-empreintes numériques optimale, nous recommandons d'utiliser le Navigateur Mullvad en conjonction **avec** un VPN==, qu'il s'agisse de Mullvad ou d'un autre fournisseur de VPN recommandé. Lorsque vous utilisez un VPN avec le Navigateur Mullvad, vous partagez une empreinte numérique et un ensemble d'adresses IP avec de nombreux autres utilisateurs, ce qui vous permet de vous fondre dans la "foule". Cette stratégie est le seul moyen de contrecarrer les scripts de pistage avancés, et c'est la même technique anti-empreintes numériques utilisée par le Navigateur Tor.
Notez que si vous pouvez utiliser le Navigateur Mullvad avec n'importe quel fournisseur de VPN, d'autres personnes sur ce VPN doivent également utiliser le Navigateur Mullvad pour que cette "foule" existe, ce qui est plus probable sur le VPN Mullvad par rapport à d'autres fournisseurs, en particulier si peu de temps après le lancement du Navigateur Mullvad. Le Navigateur Mullvad ne dispose pas d'une connectivité VPN intégrée et ne vérifie pas non plus si vous utilisez un VPN avant de naviguer ; votre connexion VPN doit être configurée et gérée séparément.

View File

@ -1,5 +1,5 @@
---
meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
meta_title: "Recommandations de fournisseurs d'email privés et chiffrés - Privacy Guides"
title: "Services d'email"
icon: material/email
description: Ces fournisseurs d'email constituent un excellent moyen de stocker vos emails en toute sécurité, et nombre d'entre eux proposent un système de chiffrement OpenPGP interopérable avec d'autres fournisseurs.
@ -124,7 +124,7 @@ Mailbox.org n'accepte aucune crypto-monnaie en raison de la suspension des activ
#### :material-check:{ .pg-green } Sécurité du compte
Mailbox.org prend en charge l'[authentification à deux facteurs](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) pour son webmail uniquement. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Les normes web telles que [WebAuthn](https://fr.wikipedia.org/wiki/WebAuthn) ne sont pas encore prises en charge.
Mailbox.org prend en charge l'[authentification à deux facteurs](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) pour son webmail uniquement. Vous pouvez utiliser soit TOTP, soit une [YubiKey](https://fr.wikipedia.org/wiki/YubiKey) via le [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Les normes web telles que [WebAuthn](https://fr.wikipedia.org/wiki/WebAuthn) ne sont pas encore prises en charge.
#### :material-information-outline:{ .pg-blue } Sécurité des données

View File

@ -1,5 +1,5 @@
---
meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
meta_title: "Logiciels de chiffrement recommandés : VeraCrypt, Cryptomator, PicoCrypt et OpenPGP - Privacy Guides"
title: "Logiciels de chiffrement"
icon: material/file-lock
description: Le chiffrement des données est le seul moyen de contrôler qui peut y accéder. Ces outils vous permettent de chiffrer vos emails et tout autre fichier.

View File

@ -74,9 +74,9 @@ Ces services vous permettent d'acheter des cartes-cadeaux pour une variété de
!!! recommendation
![Logo CakePay](assets/img/financial-services/coincards.svg){ align=right }
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (disponible aux États-Unis, au Canada et au Royaume-Uni) vous permet d'acheter des cartes-cadeaux auprès d'un grand nombre de commerçants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Page d'accueil](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Politique de confidentialité" }

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
meta_title: "Privacy Guides : votre ressource indépendante en matière de protection de la vie privée et de sécuritéPrivacy Guides"
template: overrides/home.fr.html
hide:
- navigation

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
meta_title: "Navigateurs web respectueux de la vie privée pour Android et iOS - Privacy Guides"
title: "Navigateurs mobiles"
icon: material/cellphone-information
description: Ces navigateurs sont ceux que nous recommandons actuellement pour la navigation internet standard/non anonyme sur votre téléphone.

View File

@ -49,7 +49,7 @@ Pour les modèles qui supportent HOTP et TOTP, il y a 3 emplacements pour HOTP e
!!! warning "Avertissement"
Bien que les Nitrokeys ne divulguent pas les secrets HOTP/TOTP à l'appareil auquel ils sont connectés, le stockage HOTP et TOTP n'est **pas** chiffré et est vulnérable aux attaques physiques. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
Bien que les Nitrokeys ne divulguent pas les secrets HOTP/TOTP à l'appareil auquel ils sont connectés, le stockage HOTP et TOTP n'est **pas** chiffré et est vulnérable aux attaques physiques. Si vous cherchez à stocker ces secrets HOTP ou TOTP, nous vous recommandons vivement d'utiliser plutôt un YubiKey.
!!! warning "Avertissement"

View File

@ -1,5 +1,5 @@
---
meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
meta_title: "Les meilleurs gestionnaires de mots de passe pour protéger votre vie privée et votre sécurité - Privacy Guides"
title: "Gestionnaires de mots de passe"
icon: material/form-textbox-password
description: Les gestionnaires de mots de passe vous permettent de stocker et de gérer en toute sécurité des mots de passe et autres informations d'identification.

View File

@ -1,5 +1,5 @@
---
meta_title: "The Best Private Instant Messengers - Privacy Guides"
meta_title: "Les meilleures messageries instantanées privées - Privacy Guides"
title: "Communication en temps réel"
icon: material/chat-processing
description: Les autres messageries instantanées mettent toutes vos conversations privées à la disposition de la société qui les gère.

View File

@ -1,5 +1,5 @@
---
meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
meta_title: "Moteurs de recherche recommandés : alternatives anonymes à Google - Privacy Guides"
title: "Moteurs de recherche"
icon: material/search-web
description: Ces moteurs de recherche respectueux de la vie privée n'établissent pas de profil publicitaire sur la base de vos recherches.

View File

@ -1,5 +1,5 @@
---
meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
meta_title: "Les meilleurs outils, services, et recommandations sans publicité de protection de la vie privée - Privacy Guides"
title: "Outils de protection de la vie privée"
icon: material/tools
hide:

View File

@ -1,5 +1,5 @@
---
meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
meta_title: "Navigateur et réseau Tor : navigation web anonyme - Privacy Guides"
title: "Réseau Tor"
icon: simple/torproject
description: Protégez votre navigation sur internet des regards indiscrets en utilisant le réseau Tor, un réseau sécurisé qui contourne la censure.
@ -10,7 +10,7 @@ schema:
name: Navigateur Tor
image: /assets/img/browsers/tor.svg
url: https://www.torproject.org
sameAs: https://en.wikipedia.org/wiki/Tor_(network)
sameAs: https://fr.m.wikipedia.org/wiki/Tor_(r%C3%A9seau)
applicationCategory: Web Browser
operatingSystem:
- Windows

View File

@ -1,5 +1,5 @@
---
meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
meta_title: "Recommandations et comparaison de services VPN privés, sans sponsors ni publicités - Privacy Guides"
title: "Services VPN"
icon: material/vpn
description: Voici les meilleurs services VPN pour protéger votre vie privée et votre sécurité en ligne. Trouvez ici un fournisseur qui ne cherche pas à vous espionner.

View File

@ -74,9 +74,9 @@ Privacy.com מספק מידע על הסוחרים מהם אתה רוכש לבנ
!!! recommendation
![CakePay לוגו](assets/img/financial-services/coincards.svg){ align=right }
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (זמין בארה"ב, קנדה ובריטניה) מאפשר לך לרכוש כרטיסי מתנה עבור מגוון גדול של סוחרים.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: דף הבית](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="מדיניות פרטיות" }

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -1,6 +1,6 @@
---
title: "About Privacy Guides"
description: Privacy Guides is a socially motivated website that provides information for protecting your data security and privacy.
title: "Informazioni su Privacy Guides"
description: Privacy Guides è un sito web a motivazione sociale che fornisce informazioni per proteggere la sicurezza e la privacy dei dati.
schema:
"@context": https://schema.org
"@type": Organization
@ -19,7 +19,7 @@ schema:
![Privacy Guides logo](../assets/brand/png/square/pg-yellow.png){ align=right }
**Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers.
**Privacy Guides** è un sito web a sfondo sociale che fornisce [informazioni](/kb) per proteggere la sicurezza e la privacy dei dati. La nostra missione è informare il pubblico sul valore della privacy digitale e sulle iniziative governative globali che mirano a monitorare la vostra attività online. Siamo un collettivo senza scopo di lucro gestito interamente da [membri del team](https://discuss.privacyguides.net/g/team) e collaboratori volontari. Il nostro sito è privo di pubblicità e non è affiliato a nessuno dei fornitori elencati.
[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage }
[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" }
@ -43,16 +43,16 @@ In 2022, we completed the transition of our main website framework from Jekyll t
We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms.
So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry.
So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). Intendiamo continuare a portare avanti la nostra missione di sensibilizzazione ed educazione, trovando il modo di evidenziare più chiaramente i pericoli di una mancanza di consapevolezza della privacy nell'era digitale moderna e la prevalenza e i danni delle violazioni della sicurezza nel settore tecnologico.
## Our Team
## Il nostro team
??? person "@jonah"
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/jonah)
- [:simple-github: GitHub](https://github.com/jonaharagon "@jonaharagon")
- [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@jonah "@jonah@neat.computer"){rel=me}
- [:fontawesome-solid-house: Homepage](https://www.jonaharagon.com)
- [:fontawesome-solid-house: Pagina iniziale](https://www.jonaharagon.com)
??? person "@niek-de-wilde"
@ -65,21 +65,21 @@ So far in 2023 we've launched international translations of our website in [Fren
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/dngray)
- [:simple-github: GitHub](https://github.com/dngray "@dngray")
- [:simple-mastodon: Mastodon](https://mastodon.social/@dngray "@dngray@mastodon.social"){rel=me}
- [:fontawesome-solid-envelope: Email](mailto:dngray@privacyguides.org)
- [:fontawesome-solid-envelope: E-Mail](mailto:dngray@privacyguides.org)
??? person "@freddy"
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/freddy)
- [:simple-github: GitHub](https://github.com/freddy-m "@freddy-m")
- [:simple-mastodon: Mastodon](https://social.lol/@freddy "@freddy@social.lol"){rel=me}
- [:fontawesome-solid-envelope: Email](mailto:freddy@privacyguides.org)
- [:fontawesome-solid-house: Homepage](https://freddy.omg.lol)
- [:fontawesome-solid-envelope: E-Mail](mailto:freddy@privacyguides.org)
- [:fontawesome-solid-house: Pagina iniziale](https://freddy.omg.lol)
??? person "@mfwmyfacewhen"
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/mfwmyfacewhen)
- [:simple-github: GitHub](https://github.com/mfwmyfacewhen "@mfwmyfacewhen")
- [:fontawesome-solid-house: Homepage](https://mfw.omg.lol)
- [:fontawesome-solid-house: Pagina iniziale](https://mfw.omg.lol)
??? person "@olivia"
@ -89,14 +89,14 @@ So far in 2023 we've launched international translations of our website in [Fren
Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides).
Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States.
I membri del nostro team controllano tutte le modifiche apportate al sito e si occupano di mansioni amministrative come l'hosting web e le finanze, ma non traggono alcun profitto personale dai contributi apportati al sito. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Le donazioni a Privacy Guides sono generalmente deducibili dalle tasse negli Stati Uniti.
## Site License
## Licenza del sito
!!! danger ""
The following is a human-readable summary of (and not a substitute for) the [license](/license).
Quanto segue è un riassunto scritto in formato leggibile di (e non un sostituto di) [licenza](/licenza).
:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. **Non è possibile** utilizzare il marchio Privacy Guides nel proprio progetto senza l'esplicita approvazione da questo progetto. If you remix, transform, or build upon the content of this website, you may not distribute the modified material.
:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. **Non è possibile** utilizzare il marchio Privacy Guides nel proprio progetto senza l'esplicita approvazione da questo progetto. Se si remixa, si trasforma o si basa sul contenuto di questo sito web, non si può distribuire il materiale modificato.
This license is in place to prevent people from sharing our work without giving proper credit, and to prevent people from modifying our work in a way that could be used to mislead people. If you find the terms of this license too restrictive for the project you're working on, please reach out to us at `jonah@privacyguides.org`. We are happy to provide alternative licensing options for well-intentioned projects in the privacy space!
Questa licenza è stata istituita per evitare che le persone condividano il nostro lavoro senza dare il giusto credito e per evitare che le persone modifichino il nostro lavoro in un modo che potrebbe essere usato per ingannare le persone. If you find the terms of this license too restrictive for the project you're working on, please reach out to us at `jonah@privacyguides.org`. Siamo lieti di fornire opzioni di licenza alternative per progetti ben intenzionati nel settore della privacy!

View File

@ -12,13 +12,13 @@ Privacy Guides è un progetto open source a cui si contribuisce sotto licenze ch
Privacy Guides inoltre non garantisce che questo sito sarà costantemente disponibile, o disponibile affatto.
## Licensing Overview
## Panoramica sulle licenze
!!! danger ""
The following is a human-readable summary of (and not a substitute for) the [license](/license).
Quanto segue è un riassunto scritto in formato leggibile di (e non un sostituto di) [licenza](/licenza).
Unless otherwise noted, all **content** on this website is made available under the terms of the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). The underlying **source code** used to generate this website and display that content is released under the [MIT License](https://github.com/privacyguides/privacyguides.org/tree/main/LICENSE-CODE).
Se non diversamente indicato, tutti i **contenuti** di questo sito web sono resi disponibili secondo i termini della [Licenza Creative Commons Attribuzione-Non opere derivate 4.0 Internazionale](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). The underlying **source code** used to generate this website and display that content is released under the [MIT License](https://github.com/privacyguides/privacyguides.org/tree/main/LICENSE-CODE).
Questo non include codice di terze parti incorporato in questo repository, o codice dove una licenza sostitutiva è altrimenti indicata. I seguenti sono esempi degni di nota, ma questa lista potrebbe non essere onnicomprensiva:

View File

@ -10,7 +10,7 @@ Esistono diverse architetture di rete comunemente usate per trasmettere messaggi
## Reti centralizzate
![Centralized networks diagram](../assets/img/layout/network-centralized.svg){ align=left }
![Diagramma reti centralizzate](../assets/img/layout/network-centralized.svg){ align=left }
I servizi di messaggistica centralizzati sono quelli in cui tutti i partecipanti si trovano sullo stesso server o rete di server controllati dalla stessa organizzazione.
@ -33,7 +33,7 @@ Alcuni servizi di messaggistica self-hosted consentono di configurare il proprio
## Reti federate
![Federated networks diagram](../assets/img/layout/network-decentralized.svg){ align=left }
![Diagramma reti federate](../assets/img/layout/network-decentralized.svg){ align=left }
I servizi di messaggistica federati usano più server indipendenti e decentralizzati, i quali sono in grado di comunicare l'uno con l'altro (la posta elettronica è un esempio di servizio federato). La federazione permette agli amministratori di sistema di controllare i loro server e far comunque parte di una rete di comunicazione più ampia.
@ -41,63 +41,63 @@ Quando "self-hostati", i membri di un server federato possono scoprire e comunic
**Vantaggi:**
- Allows for greater control over your own data when running your own server.
- Allows you to choose whom to trust your data with by choosing between multiple "public" servers.
- Often allows for third-party clients which can provide a more native, customized, or accessible experience.
- Server software can be verified that it matches public source code, assuming you have access to the server or you trust the person who does (e.g., a family member).
- Consente un maggiore controllo sui propri dati quando si gestisce un proprio server.
- Permette di scegliere a chi affidare i propri dati, scegliendo tra più server "pubblici".
- Spesso consente di utilizzare client di terze parti che possono fornire un'esperienza più nativa, personalizzata o accessibile.
- È possibile verificare che il software del server corrisponda al codice sorgente pubblico, a condizione che si abbia accesso al server o che ci si fidi della persona che lo possiede (ad esempio, un familiare).
**Svantaggi:**
- Adding new features is more complex because these features need to be standardized and tested to ensure they work with all servers on the network.
- Due to the previous point, features can be lacking, or incomplete or working in unexpected ways compared to centralized platforms, such as message relay when offline or message deletion.
- Some metadata may be available (e.g., information like "who is talking to whom," but not actual message content if E2EE is used).
- Federated servers generally require trusting your server's administrator. They may be a hobbyist or otherwise not a "security professional," and may not serve standard documents like a privacy policy or terms of service detailing how your data is used.
- Server administrators sometimes choose to block other servers, which are a source of unmoderated abuse or break general rules of accepted behavior. This will hinder your ability to communicate with members of those servers.
- L'aggiunta di nuove funzionalità è più complessa perché queste devono essere standardizzate e testate per garantire il funzionamento con tutti i server della rete.
- A causa del punto precedente, le funzionalità possono essere carenti, incomplete o funzionare in modo inaspettato rispetto alle piattaforme centralizzate, come ad esempio il trasferimento dei messaggi quando sono offline o la loro cancellazione.
- Alcuni metadati possono essere disponibili (ad esempio, informazioni come "chi sta parlando con chi", ma non il contenuto effettivo del messaggio se si utilizza E2EE).
- I server federati richiedono generalmente la fiducia dell'amministratore del server. Può trattarsi di un appassionato o comunque non di un "professionista della sicurezza" e potrebbe non servire documenti standard come l'informativa sulla privacy o i termini di servizio che descrivono in dettaglio l'utilizzo dei vostri dati.
- Gli amministratori dei server scelgono talvolta di bloccare altri server che sono fonte di abusi non moderati o che violano le regole generali di comportamento accettate. Questo ostacolerà la vostra capacità di comunicare con i membri di quei server.
## Reti peer-to-peer
![P2P diagram](../assets/img/layout/network-distributed.svg){ align=left }
![Diagramma P2P](../assets/img/layout/network-distributed.svg){ align=left }
P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server.
I messaggeri P2P si collegano a una [rete distribuita](https://en.wikipedia.org/wiki/Distributed_networking) di nodi per trasmettere un messaggio al destinatario senza l'ausilio di un server di terze parti.
Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol).
I client (peer) di solito si trovano l'un l'altro attraverso l'uso di una rete [computazionale distribuita](https://en.wikipedia.org/wiki/Distributed_computing). Ne sono un esempio le [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), utilizzate ad esempio da [torrent](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) e [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System). Un altro approccio è quello delle reti di prossimità, in cui si stabilisce una connessione tramite WiFi o Bluetooth (ad esempio, Briar o il protocollo di social network [Scuttlebutt](https://www.scuttlebutt.nz)).
Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient.
Una volta che un peer ha trovato un percorso verso il suo contatto attraverso uno di questi metodi, viene stabilita una connessione diretta tra i due. Sebbene i messaggi siano solitamente criptati, un osservatore può comunque dedurre la posizione e l'identità del mittente e del destinatario.
P2P networks do not use servers, as peers communicate directly between each other and hence cannot be self-hosted. However, some additional services may rely on centralized servers, such as user discovery or relaying offline messages, which can benefit from self-hosting.
Le reti P2P non utilizzano server, poiché i peer comunicano direttamente tra loro e quindi non possono essere auto-ospitati. Tuttavia, alcuni servizi aggiuntivi possono dipendere da server centralizzati, come la scoperta degli utenti o la trasmissione di messaggi offline, che possono trarre vantaggio dall'auto-ospitalità.
**Vantaggi:**
- Minimal information is exposed to third-parties.
- Modern P2P platforms implement E2EE by default. There are no servers that could potentially intercept and decrypt your transmissions, unlike centralized and federated models.
- Le informazioni esposte a terzi sono minime.
- Le moderne piattaforme P2P implementano E2EE per impostazione predefinita. A differenza dei modelli centralizzati e federati, non ci sono server che possano intercettare e decriptare le trasmissioni.
**Svantaggi:**
- Reduced feature set:
- Messages can only be sent when both peers are online, however, your client may store messages locally to wait for the contact to return online.
- Generally increases battery usage on mobile devices, because the client must stay connected to the distributed network to learn about who is online.
- Some common messenger features may not be implemented or incompletely, such as message deletion.
- Your IP address and that of the contacts you're communicating with may be exposed if you do not use the software in conjunction with a [VPN](../vpn.md) or [Tor](../tor.md). Many countries have some form of mass surveillance and/or metadata retention.
- Set di funzioni ridotto:
- I messaggi possono essere inviati solo quando entrambi i peer sono online; tuttavia, il client può memorizzare i messaggi in locale per attendere che il contatto torni online.
- In genere aumenta l'utilizzo della batteria sui dispositivi mobili, perché il client deve rimanere connesso alla rete distribuita per sapere chi è online.
- Alcune funzioni comuni del messenger potrebbero non essere implementate o essere incomplete, come l'eliminazione dei messaggi.
- Il vostro indirizzo IP e quello dei contatti con cui state comunicando possono essere esposti se non utilizzate il software insieme a una [VPN](../vpn.md) o a [Tor](../tor.md). In molti Paesi esiste una forma di sorveglianza di massa e/o di conservazione dei metadati.
## Instradamento anonimo
![Anonymous routing diagram](../assets/img/layout/network-anonymous-routing.svg){ align=left }
![Diagramma d'instradamento anonimo](../assets/img/layout/network-anonymous-routing.svg){ align=left }
A messenger using [anonymous routing](https://doi.org/10.1007/978-1-4419-5906-5_628) hides either the identity of the sender, the receiver, or evidence that they have been communicating. Ideally, a messenger should hide all three.
Un messaggero che utilizza il [routing anonimo](https://doi.org/10.1007/978-1-4419-5906-5_628) nasconde l'identità del mittente, del destinatario o l'evidenza della comunicazione. Idealmente, un messaggero dovrebbe nascondere tutte e tre le cose.
There are [many](https://doi.org/10.1145/3182658) different ways to implement anonymous routing. One of the most famous is [onion routing](https://en.wikipedia.org/wiki/Onion_routing) (i.e. [Tor](tor-overview.md)), which communicates encrypted messages through a virtual [overlay network](https://en.wikipedia.org/wiki/Overlay_network) that hides the location of each node as well as the recipient and sender of each message. The sender and recipient never interact directly and only meet through a secret rendezvous node so that there is no leak of IP addresses nor physical location. Nodes cannot decrypt messages, nor the final destination; only the recipient can. Each intermediary node can only decrypt a part that indicates where to send the still encrypted message next, until it arrives at the recipient who can fully decrypt it, hence the "onion layers."
Esistono [molti](https://doi.org/10.1145/3182658) modi diversi per implementare il routing anonimo. Uno dei più famosi è l'[onion routing](https://en.wikipedia.org/wiki/Onion_routing) (cioè [Tor](tor-overview.md)), che comunica messaggi crittografati attraverso una [rete di overlay](https://en.wikipedia.org/wiki/Overlay_network) virtuale che nasconde la posizione di ogni nodo, nonché il destinatario e il mittente di ogni messaggio. Il mittente e il destinatario non interagiscono mai direttamente e si incontrano solo attraverso un nodo d'incontro segreto, in modo che non vi sia alcuna fuga d'indirizzi IP o di posizione fisica. I nodi non possono decrittare i messaggi, né la destinazione finale; solo il destinatario può farlo. Ogni nodo intermedio può decifrare solo una parte che indica dove inviare successivamente il messaggio ancora criptato, finché non arriva al destinatario che può decifrarlo completamente, da cui gli "strati a cipolla".
Self-hosting a node in an anonymous routing network does not provide the hoster with additional privacy benefits, but rather contributes to the whole network's resilience against identification attacks for everyone's benefit.
L'auto-ospitazione di un nodo in una rete di routing anonimo non fornisce al proprietario ulteriori vantaggi in termini di privacy, ma piuttosto contribuisce alla resilienza dell'intera rete contro gli attacchi d'identificazione, a vantaggio di tutti.
**Vantaggi:**
- Minimal to no information is exposed to other parties.
- Messages can be relayed in a decentralized manner even if one of the parties is offline.
- Le informazioni esposte ad altre parti sono minime o nulle.
- I messaggi possono essere trasmessi in modo decentralizzato anche se una delle parti è offline.
**Svantaggi:**
- Slow message propagation.
- Often limited to fewer media types, mostly text, since the network is slow.
- Less reliable if nodes are selected by randomized routing, some nodes may be very far from the sender and receiver, adding latency or even failing to transmit messages if one of the nodes goes offline.
- More complex to get started, as the creation and secured backup of a cryptographic private key is required.
- Just like other decentralized platforms, adding features is more complex for developers than on a centralized platform. Hence, features may be lacking or incompletely implemented, such as offline message relaying or message deletion.
- Propagazione lenta dei messaggi.
- Spesso limitato a pochi tipi di media, soprattutto testo, perché la rete è lenta.
- Meno affidabile se i nodi sono selezionati con un routing randomizzato, alcuni nodi possono essere molto lontani dal mittente e dal destinatario, aggiungendo latenza o addirittura non riuscendo a trasmettere i messaggi se uno dei nodi va offline.
- È più complesso iniziare, poiché è necessaria la creazione e il backup sicuro di una chiave privata crittografica.
- Come per altre piattaforme decentralizzate, l'aggiunta di funzionalità è più complessa per gli sviluppatori rispetto a una piattaforma centralizzata. Di conseguenza, potrebbero mancare o essere implementate in modo incompleto alcune funzioni, come la trasmissione dei messaggi offline o la cancellazione dei messaggi.

View File

@ -1,5 +1,5 @@
---
meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
meta_title: "Consigli Android: GrapheneOS e DivestOS - Privacy Guides"
title: "Android"
icon: 'fontawesome/brands/android'
description: Puoi sostituire il sistema operativo del tuo telefono Android con queste alternative sicure e rispettose della privacy.
@ -222,10 +222,10 @@ In questo sito raccomandiamo un'ampia gamma di applicazioni per Android. Le app
!!! recommendation
![Auditor logo](assets/img/android/auditor.svg#only-light){ align=right }
![Auditor logo](assets/img/android/auditor-dark.svg#only-dark){ align=right }
![Logo Auditor](assets/img/android/auditor.svg#only-light){ align=right }
![Logo Auditor](assets/img/android/auditor-dark.svg#only-dark){ align=right }
**Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
**Auditor * * è un'app che sfrutta le funzionalità di sicurezza hardware per fornire il monitoraggio dell'integrità del dispositivo convalidando attivamente l'identità di un dispositivo e l'integrità del suo sistema operativo. Attualmente funziona solo con GrapheneOS o con il sistema operativo stock per i [dispositivi supportati](https://attestation.app/about#device-support).
[:octicons-home-16: Pagina principale](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Informativa sulla privacy" }

View File

@ -1,5 +1,5 @@
---
meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
meta_title: "Come creare account internet in maniera privata - Privacy Guides"
title: "Creazione account"
icon: 'material/account-plus'
description: La creazione di account online è praticamente una necessità di internet, adottate questi accorgimenti per assicurarvi di rimanere privati.

View File

@ -1,5 +1,5 @@
---
meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
meta_title: "Perché l'email non è la scelta migliore per la privacy e la sicurezza - Privacy Guides"
title: Sicurezza Email
icon: material/email
description: La posta elettronica è intrinsecamente insicura sotto molti punti di vista e questi sono alcuni dei motivi per cui non è la nostra scelta principale per le comunicazioni sicure.
@ -23,7 +23,7 @@ I provider di posta elettronica che consentono di utilizzare protocolli di acces
### Come proteggo la mia chiave privata?
A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Il messaggio viene quindi decifrato dalla smartcard e il contenuto decifrato viene inviato al dispositivo.
Una smartcard (come una [ YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) o [Nitrokey](https://www.nitrokey.com)) funziona ricevendo un messaggio email criptato da un dispositivo (telefono, tablet, computer, ecc.) con un client email/webmail. Il messaggio viene quindi decifrato dalla smartcard e il contenuto decifrato viene inviato al dispositivo.
È preferibile che la decodifica avvenga sulla smartcard, per evitare di esporre la chiave privata a un dispositivo compromesso.

View File

@ -1,11 +1,11 @@
---
meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
meta_title: "Modello di minaccia: Il primo passo nel viaggio verso la privacy - Privacy Guides"
title: "Modelli di minaccia"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
description: Bilanciare sicurezza, privacy e usabilità è uno dei primi e più difficili obiettivi che dovrete affrontare nel vostro viaggio verso la privacy.
---
Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Tutto è un compromesso: più qualcosa è sicuro, più è restrittivo o scomodo in generale, ecc. Spesso, le persone scoprono che il problema con gli strumenti che vedono raccomandati è che sono troppo difficili da iniziare a usare!
Bilanciare sicurezza, privacy e usabilità è uno dei primi e più difficili obiettivi che dovrete affrontare nel vostro viaggio verso la privacy. Tutto è un compromesso: più qualcosa è sicuro, più è restrittivo o scomodo in generale, ecc. Spesso, le persone scoprono che il problema con gli strumenti che vedono raccomandati è che sono troppo difficili da iniziare a usare!
Se si vogliono utilizzare gli strumenti **più** sicuri a disposizione, è necessario sacrificare *molto* in termini di usabilità. E, anche allora, ==nulla è mai completamente sicuro.== C'è un alta **sicurezza**, ma mai una completa **sicurezza**. È per questo che i modelli di minaccia sono importanti.

View File

@ -1,5 +1,5 @@
---
meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
meta_title: "Come le VPN proteggono la tua privacy? La nostra panoramica sulle VPN - Privacy Guides"
title: Panoramica VPN
icon: material/vpn
description: Le reti virtuali private spostano il rischio dal vostro ISP a una terza parte di cui vi fidate. Dovresti tenere a mente questi aspetti.

View File

@ -1,5 +1,5 @@
---
meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
meta_title: "Rimuovere le PII con i metadata scrubber e gli strumenti di riduzione dei dati - Privacy Guides"
title: "Rimozione di dati e metadati"
icon: material/tag-remove
description: Utilizza questi strumenti per rimuovere metadati come la posizione GPS e altre informazioni identificative dalle foto e dai file che condividete.

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
meta_title: "Browser web che rispettano la privacy per PC e Mac - Privacy Guides"
title: "Browser desktop"
icon: material/laptop
description: Questi browser web offrono una maggiore protezione della privacy rispetto a Google Chrome.

View File

@ -1,5 +1,5 @@
---
meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
meta_title: "Email Private Criptate consigliate - Privacy Guides"
title: "Servizi mail"
icon: material/email
description: Questi provider di posta elettronica offrono un luogo ideale per archiviare le tue mail in modo sicuro e molti offrono la crittografia OpenPGP interoperabile con altri provider.
@ -124,7 +124,7 @@ Mailbox.org non accetta criptovalute a causa della sospensione delle attività d
#### :material-check:{ .pg-green } Sicurezza dell'account
Mailbox.org supporta l'[autenticazione a due fattori](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo per la loro webmail. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Gli standard Web come [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) non sono ancora supportati.
Mailbox.org supporta l'[autenticazione a due fattori](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo per la loro webmail. Puoi usare o TOTP o una [YubiKey](https://en.wikipedia.org/wiki/YubiKey) utilizzando [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Gli standard Web come [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) non sono ancora supportati.
#### :material-information-outline:{ .pg-blue } Sicurezza dei dati

View File

@ -1,5 +1,5 @@
---
meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
meta_title: "Software di crittografia consigliati: VeraCrypt, Cryptomator, PicoCrypt e OpenPGP - Privacy Guides"
title: "Software di crittografia"
icon: material/file-lock
description: La crittografia dei dati è l'unico modo per controllare chi può accedervi. Questi strumenti ti consentono di crittografare le tue email e qualsiasi altro file.

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
meta_title: "Privacy Guides: La vostra risorsa indipendente per la privacy e la sicurezza"
template: overrides/home.it.html
hide:
- navigation

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
meta_title: "Browser Web che rispettano la privacy per Android e iOS - Privacy Guides"
title: "Browser mobile"
icon: octicons/device-mobile-16
description: Questi browser sono quelli che attualmente consigliamo per la navigazione Internet standard/non anonima sul tuo telefono.

View File

@ -49,7 +49,7 @@ Per i modelli che supportano HOTP e TOTP, ci sono 3 slot per HOTP e 15 per TOTP.
!!! warning
Sebbene le Nitrokey non rilascino i segreti HOTP/TOTP al dispositivo a cui sono collegati, la memoria HOTP e TOTP non è crittografata ed è vulnerabile agli attacchi fisici. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
Sebbene le Nitrokey non rilascino i segreti HOTP/TOTP al dispositivo a cui sono collegati, la memoria HOTP e TOTP non è crittografata ed è vulnerabile agli attacchi fisici. Se vuoi memorizzare le chiavi segrete HOTP o TOTP, si consiglia vivamente di utilizzare una YubiKey.
!!! warning

View File

@ -1,5 +1,5 @@
---
meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
meta_title: "I migliori gestori di password per proteggere la tua privacy e sicurezza - Privacy Guides"
title: "Gestori di password"
icon: material/form-textbox-password
description: I gestori delle password permettono di archiviare e gestire con sicurezza le password e altre credenziali.

View File

@ -1,5 +1,5 @@
---
meta_title: "The Best Private Instant Messengers - Privacy Guides"
meta_title: "Le migliori app di messaggistica istantanea private - Privacy Guides"
title: "Comunicazione in tempo reale"
icon: material/chat-processing
description: Altre app di messaggistica istantanea rendono disponibili tutte le tue conversazioni private alla società che le gestisce.

View File

@ -1,5 +1,5 @@
---
meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
meta_title: "Motori di ricerca consigliati: Alternative anonime a Google - Privacy Guides"
title: "Motori di ricerca"
icon: material/search-web
description: Questi motori di ricerca, che rispettano la privacy, non costruiscono un profilo pubblicitario basato sulle vostre ricerche.

View File

@ -1,5 +1,5 @@
---
meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
meta_title: "I migliori strumenti, consigli e servizi senza pubblicità per la privacy - Privacy Guides"
title: "Strumenti per la privacy"
icon: material/tools
hide:

View File

@ -1,24 +1,24 @@
---
meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
meta_title: "Browser e rete Tor: Navigazione Web Anonima - Privacy Guides"
title: "Rete Tor"
icon: simple/torproject
description: Proteggi la tua navigazione internet da occhi indiscreti utilizzando la rete Tor, una rete sicura che elude la censura.
schema:
-
"@context": http://schema.org
"@type": SoftwareApplication
"@type": Applicazione Software
name: Tor Browser
image: /assets/img/browsers/tor.svg
url: https://www.torproject.org
sameAs: https://en.wikipedia.org/wiki/Tor_(network)
applicationCategory: Web Browser
sameAs: https://it.wikipedia.org/wiki/Tor_(software)
applicationCategory: Browser Web
operatingSystem:
- Windows
- macOS
- Linux
- Android
subjectOf:
"@type": WebPage
"@type": Pagina Web
url: "./"
---

View File

@ -1,5 +1,5 @@
---
meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
meta_title: "Suggerimenti e confronto tra servizi VPN privati, no sponsor o pubblicità - Privacy Guides"
title: "Servizi VPN"
icon: material/vpn
description: Questi sono i migliori servizi VPN per proteggere la tua privacy e sicurezza online. Trovate un fornitore che non ti spii.

View File

@ -1,37 +1,37 @@
---
meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
meta_title: "脅威モデリング: プライバシー保護の最初のステップ - Privacy Guides"
title: "脅威モデリング"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
description: セキュリティ、プライバシー、使いやすさのバランスを取ることは、プライバシー保護を考える際に最初に直面する難しい課題の一つです。
---
Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
セキュリティ、プライバシー、使いやすさのバランスを取ることは、プライバシー保護を考える際に最初に直面する難しい課題の一つです。 一般的に、安全性を高めるほど制限が増え、不便になるというトレードオフが発生します。 多くの場合、おすすめされたツールの問題は、使い始めるのが難しすぎることです。
If you wanted to use the **most** secure tools available, you'd have to sacrifice *a lot* of usability. And, even then, ==nothing is ever fully secure.== There's **high** security, but never **full** security. That's why threat models are important.
**最も**安全なツールを使うには、*多くの*使いやすさを犠牲にする必要があります。 そして、それでも、==完全に安全にはなりません。==**高レベル**のセキュリティはあっても、**完全な**セキュリティはありません。 だからこそ、脅威モデルが重要なのです。
**So, what are these threat models, anyway?**
**脅威モデルとは何ですか?**
==A threat model is a list of the most probable threats to your security and privacy endeavors.== Since it's impossible to protect yourself against **every** attack(er), you should focus on the **most probable** threats. In computer security, a threat is an event that could undermine your efforts to stay private and secure.
Focusing on the threats that matter to you narrows down your thinking about the protection you need, so you can choose the tools that are right for the job.
あなたにとって重大な脅威に焦点を当てることで、必要な保護を絞り込み、必要なツールを選ぶことができます。
## Creating Your Threat Model
## 脅威モデルの作成
To identify what could happen to the things you value and determine from whom you need to protect them, you should answer these five questions:
あなたの大切なものに何が起こる可能性があるかを特定し、誰から守るべきかを判断するために、以下の5つの質問を確認しましょう:
1. What do I want to protect?
2. Who do I want to protect it from?
3. How likely is it that I will need to protect it?
4. How bad are the consequences if I fail?
5. How much trouble am I willing to go through to try to prevent potential consequences?
1. 何を守りたいか?
2. 誰から守りたいか?
3. 守る必要がどの程度あるか?
4. 守れなかった場合、どんな悪影響があるか?
5. 守るためにどの程度なら苦労していいか?
### What do I want to protect?
### 何を守りたいか?
An “asset” is something you value and want to protect. In the context of digital security, ==an asset is usually some kind of information.== For example, your emails, contact lists, instant messages, location, and files are all possible assets. Your devices themselves may also be assets.
「資産」とは、あなたが大切にしているもの、守りたいものです。 情報セキュリティにおいては、==資産とは通常、何らかの情報です。==例えば、メール、連絡帳、インスタントメッセージ、位置情報、ファイルなどはすべて資産です。 また、デバイスが資産に含まれる場合もあります。
*Make a list of your assets: data that you keep, where it's kept, who has access to it, and what stops others from accessing it.*
*あなたの資産の一覧を作成しましょう。一覧には、あなたが保管しているデータ、その保管場所、それにアクセスできる人、他人によるアクセスを防止する方法を記載します。*
### Who do I want to protect it from?
### 誰から守りたいか?
To answer this question, it's important to identify who might want to target you or your information. ==A person or entity that poses a threat to your assets is an “adversary”.== Examples of potential adversaries are your boss, your former partner, your business competition, your government, or a hacker on a public network.
@ -39,7 +39,7 @@ To answer this question, it's important to identify who might want to target you
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
### How likely is it that I will need to protect it?
### 守る必要がどの程度あるか?
==Risk is the likelihood that a particular threat against a particular asset will actually occur.== It goes hand-in-hand with capability. While your mobile phone provider has the capability to access all of your data, the risk of them posting your private data online to harm your reputation is low.
@ -49,7 +49,7 @@ Assessing risks is both a personal and subjective process. Many people find cert
*Write down which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about.*
### How bad are the consequences if I fail?
### 守れなかった場合、どんな悪影響があるか?
There are many ways that an adversary could gain access to your data. For example, an adversary can read your private communications as they pass through the network, or they can delete or corrupt your data.
@ -59,7 +59,7 @@ Security planning involves understanding how bad the consequences could be if an
*Write down what your adversary might want to do with your private data.*
### How much trouble am I willing to go through to try to prevent potential consequences?
### 守るためにどの程度なら苦労していいか?
==There is no perfect option for security.== Not everyone has the same priorities, concerns, or access to resources. Your risk assessment will allow you to plan the right strategy for you, balancing convenience, cost, and privacy.
@ -106,6 +106,6 @@ For people looking to increase their privacy and security online, we've compiled
- [Common Goals and Threats :material-arrow-right-drop-circle:](common-threats.md)
## Sources
## ソース
- [EFF Surveillance Self Defense: Your Security Plan](https://ssd.eff.org/en/module/your-security-plan)

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -1,5 +1,5 @@
---
title: KB Archive
title: 知識ベースのアーカイブ
icon: material/archive
description: Some pages that used to be in our knowledge base can now be found on our blog.
---

View File

@ -1,5 +1,5 @@
---
meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
meta_title: "Tor Browserとネットワーク: 匿名のウェブブラウジング - Privacy Guides"
title: "Torネットワーク"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
@ -11,7 +11,7 @@ schema:
image: /assets/img/browsers/tor.svg
url: https://www.torproject.org
sameAs: https://en.wikipedia.org/wiki/Tor_(network)
applicationCategory: Web Browser
applicationCategory: ウェブブラウザ
operatingSystem:
- Windows
- macOS
@ -99,7 +99,7 @@ We previously recommended enabling the *Isolate Destination Address* preference
All versions are signed using the same signature so they should be compatible with each other.
## Relays and Bridges
## リレーとブリッジ
### Snowflake

View File

@ -1,5 +1,5 @@
---
meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
meta_title: "이메일이 프라이버시, 보안 면에서 최선의 선택이 아닌 이유 - Privacy Guides"
title: 이메일 보안
icon: material/email
description: 이메일은 태생적으로 여러 가지 면에서 안전하지 않습니다. 따라서 안전한 통신을 위한 최선의 선택은 아닙니다.
@ -17,26 +17,26 @@ description: 이메일은 태생적으로 여러 가지 면에서 안전하지
OpenPGP를 사용하더라도 [순방향 비밀성(Forward secrecy)](https://en.wikipedia.org/wiki/Forward_secrecy)을 지원하지 않으므로, 본인 혹은 수신자의 개인 키가 도난당할 경우 해당 키로 암호화된 이전 메시지가 전부 노출됩니다. 따라서, 개인 간 의사소통에는 이메일보다는 순방향 비밀성이 구현된 [인스턴트 메신저](../real-time-communication.md) 이용을 권장합니다.
### What Email Clients Support E2EE?
### E2EE 지원 이메일 클라이언트는 무엇인가요?
Email providers which allow you to use standard access protocols like IMAP and SMTP can be used with any of the [email clients we recommend](../email-clients.md). Depending on the authentication method, this may lead to the decrease security if either the provider or the email client does not support OATH or a bridge application as [multi-factor authentication](multi-factor-authentication.md) is not possible with plain password authentication.
IMAP, SMTP 등 표준 접속 프로토콜을 사용할 수 있는 이메일 제공 업체는 [권장 이메일 클라이언트](../email-clients.md)와 함께 사용할 수 있습니다. 인증 방법에 따라서, 이메일 제공 업체/클라이언트가 OATH를 지원하지 않거나 브리지 애플리케이션을 지원하지 않는 경우, 단순 비밀번호 인증으로는 [다중 인증](multi-factor-authentication.md)이 불가능하므로 보안이 저하될 수 있습니다.
### How Do I Protect My Private Keys?
### 개인 키를 어떻게 보호해야 하나요?
A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
스마트카드([YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP), [Nitrokey](https://www.nitrokey.com) 등)는 기기(스마트폰, 태블릿, PC 등)에서 실행하는 이메일/웹메일 클라이언트가 암호화된 메일을 수신했을 때 작동합니다. 암호화된 메일 내용은 스마트카드에서 복호화되며, 복호화된 내용이 스마트카드로부터 기기로 전달됩니다.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
스마트카드에서 복호화를 수행함으로써, 기기의 보안이 손상됐을 경우에도 개인 키가 노출되는 것을 방지할 수 있습니다.
## 이메일 메타데이터 개요
이메일 메타데이터는 이메일 메시지의 [메시지 헤더](https://en.wikipedia.org/wiki/Email#Message_header)에 저장됩니다. 이메일 메타데이터에는 여러분이 봐왔을 `To`(받는사람), `From`(보낸사람), `Cc`(참조), `Date`(보낸 날짜), `Subject`(제목) 등이 포함됩니다. 이외에도 여러 숨겨진 헤더가 이메일 클라이언트 및 제공 업체로부터 추가되며, 이러한 정보는 여러분의 계정에 대한 정보를 노출시킬 수 있습니다.
Client software may use email metadata to show who a message is from and what time it was received. Servers may use it to determine where an email message must be sent, among [other purposes](https://en.wikipedia.org/wiki/Email#Message_header) which are not always transparent.
클라이언트 소프트웨어는 이메일 메타데이터를 사용해 메시지의 발신자와 수신 시간을 표시할 수 있습니다. 서버는 항상 투명하지만은 않은 [다른 목적지](https://en.wikipedia.org/wiki/Email#Message_header) 중 어디에 이메일을 보내야 할지 결정하는 데에 메타데이터를 활용할 수 있습니다.
### Who Can View Email Metadata?
### 이메일 메타데이터는 누가 볼 수 있나요?
Email metadata is protected from outside observers with [Opportunistic TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS) protecting it from outside observers, but it is still able to be seen by your email client software (or webmail) and any servers relaying the message from you to any recipients including your email provider. Sometimes email servers will also use third-party services to protect against spam, which generally also have access to your messages.
이메일 메타데이터는 [Opportunistic TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS)를 통해 외부 관찰자로부터 보호됩니다. 하지만 여러분이 사용하는 이메일 클라이언트 소프트웨어나 웹메일은 메타데이터를 볼 수 있습니다. 또한 여러분의 이메일 제공 업체를 포함한, 여러분과 상대 수신자 사이의 모든 메시지 전달 서버 역시 메타데이터를 볼 수 있습니다. 이메일 서버 중에는 스팸 차단 목적으로 타사 서비스를 사용하기도 하는데, 보통 이런 타사 서비스도 여러분의 메시지에 접근할 수 있습니다.
### Why Can't Metadata be E2EE?
### 메타데이터는 종단 간 암호화를 적용할 수 없나요?
Email metadata is crucial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into the email protocols originally, instead requiring add-on software like OpenPGP. Because OpenPGP messages still have to work with traditional email providers, it cannot encrypt email metadata, only the message body itself. That means that even when using OpenPGP, outside observers can see lots of information about your messages, such as who you're emailing, the subject lines, when you're emailing, etc.
이메일 메타데이터는 이메일의 가장 기본적인 기능(어디에서 왔는지, 어디로 가야하는지 등)에 매우 중요한 역할을 합니다. 이메일 프로토콜에는 본래 E2EE가 내장되지 않았기 때문에, OpenPGP 등의 애드온 소프트웨어가 필요합니다. 그러나 OpenPGP 메시지는 여전히 기존 이메일 제공 업체와도 작동해야 합니다. 따라서 메시지 본문은 암호화할 수 있으나, 메타데이터는 암호화할 수 없습니다. 따라서, OpenPGP를 사용하더라도 외부 관찰자는 이메일 수신자, 제목, 이메일 작성 시간 등 여러 정보를 볼 수 있습니다.

View File

@ -1,5 +1,5 @@
---
title: "Multi-Factor Authentication"
title: "다중 인증"
icon: 'material/two-factor-authentication'
description: MFA is a critical security mechanism for securing your online accounts, but some methods are stronger than others.
---
@ -10,7 +10,7 @@ Normally, if a hacker (or adversary) is able to figure out your password then th
MFA methods vary in security, but are based on the premise that the more difficult it is for an attacker to gain access to your MFA method, the better. Examples of MFA methods (from weakest to strongest) include SMS, Email codes, app push notifications, TOTP, Yubico OTP and FIDO.
## MFA Method Comparison
## MFA 방식 비교
### SMS or Email MFA

View File

@ -6,15 +6,15 @@ description: These are some tips and tricks on how to create the strongest passw
Passwords are an essential part of our everyday digital lives. We use them to protect our accounts, our devices and our secrets. Despite often being the only thing between us and an adversary who's after our private information, not a lot of thought is put into them, which often leads to people using passwords that can be easily guessed or brute-forced.
## Best Practices
## 모범 사례
### Use unique passwords for every service
### 모든 서비스마다 서로 다른 비밀번호 사용하기
Imagine this; you sign up for an account with the same e-mail and password on multiple online services. If one of those service providers is malicious, or their service has a data breach that exposes your password in an unencrypted format, all a bad actor would have to do is try that e-mail and password combination across multiple popular services until they get a hit. It doesn't matter how strong that one password is, because they already have it.
여러분이 여러 온라인 서비스에 똑같은 이메일, 비밀번호로 가입했다고 가정해봅시다. 서비스 제공 업체 중 하나가 악의적이거나, 해당 서비스에서 데이터 유출 사고가 발생해 비밀번호가 암호화되지 않은 형식으로 노출될 경우, 악의적인 공격자는 여러 유명 서비스에서 해당 이메일과 비밀번호 조합을 시도해 성공할 때까지 기다리기만 하면 됩니다. 비밀번호를 이미 알아낸 상태이기 때문에, 비밀번호가 얼마나 강력한지는 중요하지 않습니다.
This is called [credential stuffing](https://en.wikipedia.org/wiki/Credential_stuffing), and it is one of the most common ways that your accounts can be compromised by bad actors. To avoid this, make sure that you never re-use your passwords.
이를 [크리덴셜 스터핑(Credential stuffing)](https://en.wikipedia.org/wiki/Credential_stuffing)이라 하며, 악의적인 공격자가 계정을 탈취하는 굉장히 흔한 방법 중 하나입니다. 이를 방지하려면 비밀번호를 재사용하지 말아야 합니다.
### Use randomly generated passwords
### 무작위로 생성된 비밀번호 사용하기
==You should **never** rely on yourself to come up with a good password.== We recommend using [randomly generated passwords](#passwords) or [diceware passphrases](#diceware-passphrases) with sufficient entropy to protect your accounts and devices.
@ -30,15 +30,15 @@ When it comes to passwords that you don't have to remember (such as passwords st
If your password manager lets you check for compromised passwords, make sure to do so and promptly change any password that may have been exposed in a data breach. Alternatively, you could follow [Have I Been Pwned's Latest Breaches feed](https://feeds.feedburner.com/HaveIBeenPwnedLatestBreaches) with the help of a [news aggregator](../news-aggregators.md).
## Creating strong passwords
## 강력한 비밀번호 만들기
### Passwords
### 패스워드
A lot of services impose certain criteria when it comes to passwords, including a minimum or maximum length, as well as which special characters, if any, can be used. You should use your password manager's built-in password generator to create passwords that are as long and complex as the service will allow by including capitalized and lowercase letters, numbers and special characters.
If you need a password you can memorize, we recommend a [diceware passphrase](#diceware-passphrases).
### Diceware Passphrases
### Diceware 패스프레이즈
Diceware is a method for creating passphrases which are easy to remember, but hard to guess.
@ -90,15 +90,15 @@ To sum it up, diceware passphrases are your best option when you need something
## Storing Passwords
### Password Managers
### 비밀번호 관리자
The best way to store your passwords is by using a password manager. They allow you to store your passwords in a file or in the cloud and protect them with a single master password. That way, you will only have to remember one strong password, which lets you access the rest of them.
비밀번호를 저장하는 가장 좋은 방법은 비밀번호 관리자를 사용하는 것입니다. They allow you to store your passwords in a file or in the cloud and protect them with a single master password. That way, you will only have to remember one strong password, which lets you access the rest of them.
There are many good options to choose from, both cloud-based and local. Choose one of our recommended password managers and use it to establish strong passwords across all of your accounts. We recommend securing your password manager with a [diceware passphrase](#diceware-passphrases) comprised of at least seven words.
[List of recommended password managers](../passwords.md ""){.md-button}
!!! warning "Don't place your passwords and TOTP tokens inside the same password manager"
!!! warning "비밀번호와 TOTP 토큰을 하나의 비밀번호 관리자에 저장하지 마세요"
When using TOTP codes as [multi-factor authentication](../multi-factor-authentication.md), the best security practice is to keep your TOTP codes in a [separate app](../multi-factor-authentication.md#authenticator-apps).
@ -106,6 +106,6 @@ There are many good options to choose from, both cloud-based and local. Choose o
Furthermore, we do not recommend storing single-use recovery codes in your password manager. Those should be stored separately such as in an encrypted container on an offline storage device.
### Backups
### 백업
You should store an [encrypted](../encryption.md) backup of your passwords on multiple storage devices or a cloud storage provider. This can help you access your passwords if something happens to your primary device or the service you are using.
비밀번호를 [암호화하여](../encryption.md) 백업하고 여러 저장 장치 혹은 클라우드 서비스에 저장해야 합니다. 이렇게 함으로써 주로 사용하는 기기나 이용하는 서비스에 문제가 생기더라도 자신의 비밀번호에 접근할 수 있습니다.

View File

@ -11,7 +11,7 @@ Encryption protocols such as HTTPS are commonly used on the internet, so they ma
A VPN can help as it can shift trust to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing into it.
## Should I use a VPN?
## VPN을 사용해야 하나요?
**Yes**, unless you are already using Tor. A VPN does two things: shifting the risks from your Internet Service Provider to itself and hiding your IP from a third-party service.

View File

@ -1,8 +1,8 @@
---
meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
meta_title: "프라이버시 중점 PC, Mac용 웹 브라우저 - Privacy Guides"
title: "데스크톱 브라우저"
icon: material/laptop
description: These web browsers provide stronger privacy protections than Google Chrome.
description: Google Chrome보다 강력한 프라이버시 보호 기능을 제공하는 브라우저 목록입니다.
schema:
-
"@context": http://schema.org
@ -56,30 +56,30 @@ schema:
url: "./"
---
These are our currently recommended desktop web browsers and configurations for standard/non-anonymous browsing. We recommend [Mullvad Browser](#mullvad-browser) if you are focused on strong privacy protections and anti-fingerprinting out of the box, [Firefox](#firefox) for casual internet browsers looking for a good alternative to Google Chrome, and [Brave](#brave) if you need Chromium browser compatibility.
본 내용은 현재 표준/비익명 인터넷 탐색 용도로 권장되는 데스크톱 웹 브라우저 및 관련 설정 목록입니다. 강력한 프라이버시 보호 및 핑거프린팅 방지가 기본 제공되는 브라우저를 원하신다면 [Mullvad Browser](#mullvad-browser)를, 평범한 인터넷 브라우저 중 Google Chrome의 적절한 대체제를 원하신다면 [Firefox](#firefox)를, Chromium 브라우저 호환성이 필요하시다면 [Brave](#brave)를 추천드립니다.
If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. We make some configuration recommendations on this page, but all browsers other than Tor Browser will be traceable by *somebody* in some manner or another.
익명으로 인터넷을 탐색해야 하는 경우라면, [Tor](tor.md)를 사용해야 합니다. 본 내용에서 몇 가지 권장 설정을 알려드리고 있지만, Tor 브라우저를 제외한 모든 브라우저는 *누군가* 어떻게든 추적할 수 있습니다.
## Mullvad Browser
!!! recommendation
![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ align=right }
![Mullvad Browser 로고](assets/img/browsers/mullvad_browser.svg){ align=right }
**Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN.
**Mullvad Browser** [Tor 브라우저](tor.md#tor-browser)에서 Tor 네트워크 통합을 제거한 버전입니다. Tor 브라우저의 핑거프린팅 방지 브라우저 기술을 VPN 사용자에게 제공하는 것을 주된 목적으로 합니다. Tor 프로젝트에서 개발하고 [Mullvad](vpn.md#mullvad)에서 배포합니다. Mullvad VPN 사용이 필수적이지 **않습니다**.
[:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary }
[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation}
[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
[:octicons-home-16: 홈페이지](https://mullvad.net/en/browser){ .md-button .md-button--primary }
[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="프라이버시 정책" }
[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=문서}
[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="소스 코드" }
??? downloads
??? downloads "다운로드"
- [:simple-windows11: Windows](https://mullvad.net/en/download/browser/windows)
- [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos)
- [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux)
Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead.
[Tor 브라우저](tor.md)와 마찬가지로, Mullvad Browser는 브라우저 핑거프린트를 모든 Mullvad Browser 사용자끼리 동일하게 만들어 핑거프린팅을 방지하도록 설계되었습니다. 기본 보안 단계(*Standard*, *Safer*, *Safest*)에 따라 자동으로 설정되는 기본 설정 및 확장 프로그램을 포함하고 있습니다. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead.
### Anti-Fingerprinting
@ -222,9 +222,9 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand
These options can be found in :material-menu: → **Settings**.
#### Settings
#### 설정
##### Shields
##### 보호
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
@ -232,34 +232,34 @@ Shields' options can be downgraded on a per-site basis as needed, but by default
<div class="annotate" markdown>
- [x] Select **Prevent sites from fingerprinting me based on my language preferences**
- [x] Select **Aggressive** under Trackers & ads blocking
- [x] **언어 환경 설정을 기반으로 사이트가 지문을 남기지 못하게 합니다** 활성화
- [x] 추적기 & 광고 차단을 **공격적**으로 설정
??? warning "Use default filter lists"
Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use.
??? warning "기본 필터 목록을 사용하세요"
Brave 브라우저는 `brave://adblock` 내부 페이지에서 추가적인 콘텐츠 필터를 선택할 수 있습니다. 이 기능을 사용하지 말고 기본 필터 목록을 유지할 것을 권장드립니다. 추가적인 목록을 사용하면 다른 Brave 사용자에 비해 더 눈에 띄게 되며, 만약 Brave에 취약점이 존재하고 여러분이 사용하는 규칙 목록에 악성 규칙이 포함될 경우 공격 표면을 증가시킬 수도 있습니다.
- [x] (Optional) Select **Block Scripts** (1)
- [x] Select **Strict, may break sites** under Block fingerprinting
- [x] (선택 사항) **스크립트 차단** 활성화 (1)
- [x] 지문 차단을 **엄격, 사이트가 손상될 수 있음**으로 설정
</div>
1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension.
1. 해당 옵션은 uBlock Origin의 고급 [차단 모드](https://github.com/gorhill/uBlock/wiki/Blocking-mode) [NoScript](https://noscript.net/) 확장 프로그램과 유사한 기능을 제공합니다.
##### Social media blocking
##### 소셜 미디어 차단
- [ ] Uncheck all social media components
- [ ] 모든 소셜 미디어 항목 비활성화
##### Privacy and security
##### 개인 정보 보호 및 보안
<div class="annotate" markdown>
- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc)
- [ ] Uncheck **Use Google services for push messaging**
- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)**
- [ ] Uncheck **Automatically send daily usage ping to Brave**
- [ ] Uncheck **Automatically send diagnostic reports**
- [x] Select **Always use secure connections** in the **Security** menu
- [ ] Uncheck **Private window with Tor** (1)
- [x] [WebRTC IP 처리 방침](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc)에서 **프록시가 아닌 UDP 비활성화하기** 선택
- [ ] **푸시 메시지에 Google 서비스 사용** 비활성화
- [ ] **프라이버시 보호 제품 분석(P3A) 허용** 비활성화
- [ ] **일일 사용 Ping을 Brave에 자동으로 보내기** 비활성화
- [ ] **진단 보고서 자동 전송** 비활성화
- [x] **보안** 메뉴에서 **항상 보안 연결 사용** 활성화
- [ ] **Tor와 함께하는 개인정보 보호 창** 비활성화 (1)
!!! tip "Sanitizing on Close"
@ -269,34 +269,34 @@ Shields' options can be downgraded on a per-site basis as needed, but by default
</div>
1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser).
1. Brave 브라우저의 핑거프린팅 방지 기능은 Tor 브라우저만큼 강력하지 **않습니다**. 또한 Brave에서 Tor를 사용하는 사람은 훨씬 적기 때문에, 더욱 눈에 띄게 됩니다. [강력한 익명성이 필요한 경우라면](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) [Tor 브라우저](tor.md#tor-browser)를 사용해야 합니다.
##### Extensions
##### 확장 프로그램
Disable built-in extensions you do not use in **Extensions**
- [ ] Uncheck **Hangouts**
- [ ] Uncheck **WebTorrent**
- [ ] **Hangouts** 비활성화
- [ ] **WebTorrent** 비활성화
##### Web3
Brave's Web3 features can potentially add to your browser fingerprint and attack surface. Unless you use any of features, they should be disabled.
- [ ] Set **Default Ethereum Wallet** to **None**
- [ ] Set **Default Solana Wallet** to **None**
- [ ] Set **Method to resolve IPFS resources** to **Disabled
- [ ] **기본 이더리움 월렛**을 **없음**으로 설정
- [ ] **기본 Solana 월렛**을 **없음**으로 설정
- [ ] **IPFS 리소스 리졸빙에 사용하는 방법**을 **사용 중지**로 설정
##### System
##### 시스템
<div class="annotate" markdown>
- [ ] Uncheck **Continue running apps when Brave is closed** to disable background apps (1)
- [ ] **Brave 종료 후에도 백그라운드 앱을 계속 실행** 비활성화 (1)
</div>
1. This option is not present on all platforms.
1. 플랫폼에 따라 해당 옵션이 제공되지 않을 수 있습니다.
#### Sync
#### 동기화
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.

View File

@ -1,37 +1,37 @@
---
meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
meta_title: "비공개 암호화 이메일 서비스 권장 목록 - Privacy Guides"
title: "이메일 서비스"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
---
Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy.
이메일은 모든 온라인 서비스 이용에 사실상 필수적이지만, 개인 간 대화에는 권장드리지 않습니다. 다른 사람에게 연락할 때는 이메일 대신, 순방향 비밀성을 지원하는 인스턴트 메신저를 사용하는 것이 좋습니다.
[Recommended Instant Messengers](real-time-communication.md ""){.md-button}
For everything else, we recommend a variety of email providers based on sustainable business models and built-in security and privacy features.
- [OpenPGP-Compatible Email Providers :material-arrow-right-drop-circle:](#openpgp-compatible-services)
- [Other Encrypted Providers :material-arrow-right-drop-circle:](#more-providers)
- [Email Aliasing Services :material-arrow-right-drop-circle:](#email-aliasing-services)
- [OpenPGP 호환 이메일 제공 업체 :material-arrow-right-drop-circle:](#openpgp-compatible-services)
- [기타 암호화 이메일 제공 업체 :material-arrow-right-drop-circle:](#more-providers)
- [이메일 별칭 서비스 :material-arrow-right-drop-circle:](#email-aliasing-services)
- [Self-Hosted Options :material-arrow-right-drop-circle:](#self-hosting-email)
## OpenPGP Compatible Services
## OpenPGP 호환 서비스
These providers natively support OpenPGP encryption/decryption and the Web Key Directory (WKD) standard, allowing for provider-agnostic E2EE emails. For example, a Proton Mail user could send an E2EE message to a Mailbox.org user, or you could receive OpenPGP-encrypted notifications from internet services which support it.
다음 제공 업체는 Open PGP 암호화/복호화 및 Web Key Directory(WKD) 표준을 기본적으로 지원하므로, 제공 업체를 가리지 않고 E2EE 이메일 이용이 가능합니다. 예를 들어, Proton Mail 사용자는 Mailbox.org 사용자에게 E2EE 메시지를 보내거나, OpenPGP 지원 인터넷 서비스에서 OpenPGP로 암호화된 알림을 받을 수 있습니다.
<div class="grid cards" markdown>
- ![Proton Mail logo](assets/img/email/protonmail.svg){ .twemoji } [Proton Mail](email.md#proton-mail)
- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .twemoji } [Mailbox.org](email.md#mailboxorg)
- ![Proton Mail 로고](assets/img/email/protonmail.svg){ .twemoji } [Proton Mail](email.md#proton-mail)
- ![Mailbox.org 로고](assets/img/email/mailboxorg.svg){ .twemoji } [Mailbox.org](email.md#mailboxorg)
</div>
!!! warning
!!! warning "경고"
OpenPGP와 같은 종단간 암호화 기술을 사용하더라도 이메일 헤더 일부 메타데이터는 암호화되지 않습니다. Read more about [email metadata](basics/email-security.md#email-metadata-overview).
OpenPGP 등 E2EE 기술을 사용하더라도, 이메일 헤더 일부 메타데이터는 암호화되지 않은 채로 존재합니다. [이메일 메타데이터 개요](basics/email-security.md#email-metadata-overview)를 살펴보세요.
또한, OpenPGP는 순방향 비밀성을 제공하지 않습니다. 따라서 발신자 또는 수신자의 개인 키가 유출된다면 지금까지 같은 키로 암호화된 메세지의 내용 또한 유출됩니다. [개인 키를 보호하려면 어떻게 해야 하나요?](basics/email-security.md#how-do-i-protect-my-private-keys)
또한, OpenPGP는 순방향 비밀성을 지원하지 않습니다. 따라서 본인 혹은 수신자의 개인 키가 유출될 경우, 해당 키로 암호화된 이전 메시지가 전부 노출됩니다. [개인 키를 어떻게 보호해야 하나요?](basics/email-security.md#how-do-i-protect-my-private-keys)
### Proton Mail

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
meta_title: "Privacy Guides: 여러분의 개인 프라이버시, 보안 리소스"
template: overrides/home.ko.html
hide:
- navigation

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
meta_title: "프라이버시 중점 모바일(Android, iOS) 웹 브라우저 - Privacy Guides"
title: "모바일 브라우저"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
@ -36,7 +36,7 @@ schema:
url: "./"
---
These are our currently recommended mobile web browsers and configurations for standard/non-anonymous internet browsing. If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. In general, we recommend keeping extensions to a minimum; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation.
본 내용은 현재 표준/비익명 인터넷 탐색 용도로 권장되는 모바일 웹 브라우저 및 관련 설정 목록입니다. 익명으로 인터넷을 탐색해야 하는 경우라면, [Tor](tor.md)를 사용해야 합니다. In general, we recommend keeping extensions to a minimum; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation.
## Android

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -76,7 +76,7 @@ Met deze diensten kunt je online cadeaubonnen kopen voor verschillende handelare
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
** CoinCards ** (beschikbaar in de VS, Canada en het VK) kunt je cadeaubonnen kopen voor een grote verscheidenheid aan verkopers.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacybeleid" }

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be
### DNS sobre TLS (DoT)
[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls.
[**DNS sobre TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) é outro método para criptografar a comunicação de DNS definido em [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). O suporte foi implementado pela primeira vez no Android 9, iOS 14 e no Linux em [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) na versão 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls.
### DNS sobre HTTPS (DoH)

View File

@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -29,7 +29,7 @@ Se você está procurando mais **privacidade** do seu provedor de internet (ISP)
## Provedores Recomendados
Nossos fornecedores recomendados usam encriptação, aceitam Monero, suportam WireGuard e OpenVPN, e têm uma política de não-rastreamento. Leia nossa [lista completa de requisitos](#criteria) para mais informações.
Nossos provedores recomendados usam criptografia, aceitam Monero, suportam WireGuard & OpenVPN, e têm uma política de não registro. Leia nossa [lista completa de requisitos](#criteria) para mais informações.
### IVPN
@ -197,7 +197,7 @@ Nós também consideramos que é melhor para a segurança das chaves privadas do
#### :material-check:{ .pg-green } Examinado por auditores externos
Em Janeiro de 2020, ProtonVPN foi submetida a uma auditoria independente pela SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com).
Em Janeiro de 2020, ProtonVPN foi submetida a uma auditoria independente pela SEC Consult. A SEC Consult encontrou algumas vulnerabilidades de médio e baixo risco nos aplicativos Windows, Android e iOS da Proton VPN, todos os quais foram "devidamente corrigidos" pela Proton VPN antes que os relatórios fossem publicados. Nenhum dos problemas identificados teria proporcionado acesso remoto ao seu dispositivo ou tráfego. Você pode ver os relatórios individuais para cada plataforma em [protonvpn.com](https://protonvpn.com/blog/open-source/). Em abril de 2022 Proton VPN passou por [outra auditoria](https://protonvpn.com/blog/no-logs-audit/) e o relatório foi [produzido pelo Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). Um [certificado de segurança](https://proton.me/blog/security-audit-all-proton-apps) foi concedido para os aplicativos do Proton Mail em 9 de Novembro de 2021 pela [Securitium](https://research.securitum.com).
#### :material-check:{ .pg-green } Clientes de Código Aberto (Open-Source)

View File

@ -82,7 +82,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
![CakePay logo](assets/img/financial-services/coincards.svg){ align=right }
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }

View File

@ -3,13 +3,13 @@ title: Поддержать нас
---
<!-- markdownlint-disable MD036 -->
Нам нужно много [людей](https://github.com/privacyguides/privacyguides.org/graphs/contributors) и [работы](https://github.com/privacyguides/privacyguides.org/pulse/monthly) чтобы поддерживать Priacy Guides в актуальном состоянии и распространять информацию о безопасности и массовой слежке. If you like what we do, consider getting involved by [editing the site](https://github.com/privacyguides/privacyguides.org) or [contributing translations](https://crowdin.com/project/privacyguides).
Нам нужно много [людей](https://github.com/privacyguides/privacyguides.org/graphs/contributors) и [работы](https://github.com/privacyguides/privacyguides.org/pulse/monthly) чтобы поддерживать Priacy Guides в актуальном состоянии и распространять информацию о безопасности и массовой слежке. Если вам нравится то, что мы делаем, лучший способ помочь - это принять участие [редактируя сайт](https://github.com/privacyguides/privacyguides.org) или [помогая с его переводом](https://crowdin.com/project/privacyguides).
Если вы хотите помочь нам материально, лучшим способом будет пожертвование через Open Collective, ресурс, управляемый нашим фискальным агентом. Open Collective поддерживает оплату через кредитную или дебетовую карту, PayPal, банковские переводы.
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" }
[Пожертвовать на OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" }
Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. После пожертвования вы получите чек от Фонда Open Collective. Privacy Guides не предоставляет финансовых консультаций, и вам следует обратиться к своему налоговому консультанту, чтобы узнать, применимо ли это к вам.
Пожертвования сделанные нам непосредственно через Open Collective не облагаются налогами США, потому что наш фискальный агент (Фонд Open Collective) - зарегистрированная организация 501 (с)3. После пожертвования вы получите чек от Фонда Open Collective. Privacy Guides не предоставляет финансовых консультаций, и вам следует обратиться к своему налоговому консультанту, чтобы узнать, применимо ли это к вам.
Если вы уже пользуетесь спонсорством на GitHub, вы также можете спонсировать нашу организацию там.

View File

@ -1,6 +1,6 @@
---
title: "About Privacy Guides"
description: Privacy Guides is a socially motivated website that provides information for protecting your data security and privacy.
title: "О Privacy Guides"
description: Privacy Guides - это сайт, предоставляющий информацию по защите безопасности и конфиденциальности ваших данных.
schema:
"@context": https://schema.org
"@type": Organization
@ -17,7 +17,7 @@ schema:
- https://mastodon.neat.computer/@privacyguides
---
![Privacy Guides logo](../assets/brand/png/square/pg-yellow.png){ align=right }
![Лого Privacy Guides](../assets/brand/png/square/pg-yellow.png){ align=right }
**Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers.
@ -52,7 +52,7 @@ So far in 2023 we've launched international translations of our website in [Fren
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/jonah)
- [:simple-github: GitHub](https://github.com/jonaharagon "@jonaharagon")
- [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@jonah "@jonah@neat.computer"){rel=me}
- [:fontawesome-solid-house: Homepage](https://www.jonaharagon.com)
- [:fontawesome-solid-house: Домашняя страница](https://www.jonaharagon.com)
??? person "@niek-de-wilde"
@ -73,13 +73,13 @@ So far in 2023 we've launched international translations of our website in [Fren
- [:simple-github: GitHub](https://github.com/freddy-m "@freddy-m")
- [:simple-mastodon: Mastodon](https://social.lol/@freddy "@freddy@social.lol"){rel=me}
- [:fontawesome-solid-envelope: Email](mailto:freddy@privacyguides.org)
- [:fontawesome-solid-house: Homepage](https://freddy.omg.lol)
- [:fontawesome-solid-house: Домашняя страница](https://freddy.omg.lol)
??? person "@mfwmyfacewhen"
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/mfwmyfacewhen)
- [:simple-github: GitHub](https://github.com/mfwmyfacewhen "@mfwmyfacewhen")
- [:fontawesome-solid-house: Homepage](https://mfw.omg.lol)
- [:fontawesome-solid-house: Домашняя страница](https://mfw.omg.lol)
??? person "@olivia"

View File

@ -9,13 +9,13 @@ Privacy Guides - это общественный проект, управляе
Конфиденциальность посетителей нашего сайта очень важна для нас, поэтому мы не отслеживаем конкретных людей. Если вы посетитель нашего сайта:
- Никакая персональная информация о вас не собирается
- No information such as cookies are stored in the browser
- В браузере не сохраняется такая информация, как, например, файлы cookie
- Никакая информация не передаётся третьим лицам
- Никакая информация не передаётся рекламным компаниям
- Никакая информация не собирается для изучения личных и поведенческих тенденций
- Ваша информация не монетизируется
You can view the data we collect on our [statistics](statistics.md) page.
Вы можете ознакомиться с данными, которые мы собираем, на нашей странице [статистики](statistics.md).
Мы используем self-hosted установку [Plausible Analytics](https://plausible.io) для сбора некоторых анонимных данных об использовании в статистических целях. Цель заключается в отслеживании общих тенденций посещаемости нашего сайта, а не в отслеживании отдельных посетителей. Все данные приведены только в агрегированном виде. Никакие личные данные не собираются.

Some files were not shown because too many files have changed in this diff Show More