From d4ad37e6ea02f7fc12ed5c175f39fcfbaf9be2b6 Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Wed, 11 Oct 2023 16:36:08 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/ar/android.md | 2 +- i18n/ar/calendar.md | 2 +- i18n/ar/cloud.md | 2 +- i18n/ar/cryptocurrency.md | 2 +- i18n/ar/data-redaction.md | 2 +- i18n/ar/desktop-browsers.md | 2 +- i18n/ar/desktop.md | 2 +- i18n/ar/dns.md | 2 +- i18n/ar/email-clients.md | 2 +- i18n/ar/email.md | 2 +- i18n/ar/encryption.md | 2 +- i18n/ar/file-sharing.md | 2 +- i18n/ar/financial-services.md | 2 +- i18n/ar/frontends.md | 2 +- i18n/ar/mobile-browsers.md | 2 +- i18n/ar/multi-factor-authentication.md | 2 +- i18n/ar/news-aggregators.md | 2 +- i18n/ar/notebooks.md | 2 +- i18n/ar/os/macos-overview.md | 20 ++++++++--------- i18n/ar/passwords.md | 2 +- i18n/ar/productivity.md | 2 +- i18n/ar/real-time-communication.md | 2 +- i18n/ar/router.md | 2 +- i18n/ar/search-engines.md | 2 +- i18n/ar/tor.md | 2 +- i18n/ar/vpn.md | 2 +- i18n/bn/android.md | 2 +- i18n/bn/calendar.md | 2 +- i18n/bn/cloud.md | 2 +- i18n/bn/cryptocurrency.md | 2 +- i18n/bn/data-redaction.md | 2 +- i18n/bn/desktop-browsers.md | 2 +- i18n/bn/desktop.md | 2 +- i18n/bn/dns.md | 2 +- i18n/bn/email-clients.md | 2 +- i18n/bn/email.md | 2 +- i18n/bn/encryption.md | 2 +- i18n/bn/file-sharing.md | 2 +- i18n/bn/financial-services.md | 2 +- i18n/bn/frontends.md | 2 +- i18n/bn/mobile-browsers.md | 2 +- i18n/bn/multi-factor-authentication.md | 2 +- i18n/bn/news-aggregators.md | 2 +- i18n/bn/notebooks.md | 2 +- i18n/bn/os/macos-overview.md | 20 ++++++++--------- i18n/bn/passwords.md | 2 +- i18n/bn/productivity.md | 2 +- i18n/bn/real-time-communication.md | 2 +- i18n/bn/router.md | 2 +- i18n/bn/search-engines.md | 2 +- i18n/bn/tor.md | 2 +- i18n/bn/vpn.md | 2 +- i18n/cs/android.md | 2 +- i18n/cs/calendar.md | 2 +- i18n/cs/cloud.md | 2 +- i18n/cs/cryptocurrency.md | 2 +- i18n/cs/data-redaction.md | 2 +- i18n/cs/desktop-browsers.md | 2 +- i18n/cs/desktop.md | 2 +- i18n/cs/dns.md | 2 +- i18n/cs/email-clients.md | 2 +- i18n/cs/email.md | 2 +- i18n/cs/encryption.md | 2 +- i18n/cs/file-sharing.md | 2 +- i18n/cs/financial-services.md | 2 +- i18n/cs/frontends.md | 2 +- i18n/cs/mobile-browsers.md | 2 +- i18n/cs/multi-factor-authentication.md | 2 +- i18n/cs/news-aggregators.md | 2 +- i18n/cs/notebooks.md | 2 +- i18n/cs/os/macos-overview.md | 20 ++++++++--------- i18n/cs/passwords.md | 2 +- i18n/cs/productivity.md | 2 +- i18n/cs/real-time-communication.md | 2 +- i18n/cs/router.md | 2 +- i18n/cs/search-engines.md | 2 +- i18n/cs/tor.md | 2 +- i18n/cs/vpn.md | 2 +- i18n/de/android.md | 2 +- i18n/de/calendar.md | 2 +- i18n/de/cloud.md | 2 +- i18n/de/cryptocurrency.md | 2 +- i18n/de/data-redaction.md | 2 +- i18n/de/desktop-browsers.md | 2 +- i18n/de/desktop.md | 2 +- i18n/de/dns.md | 2 +- i18n/de/email-clients.md | 2 +- i18n/de/email.md | 2 +- i18n/de/encryption.md | 2 +- i18n/de/file-sharing.md | 2 +- i18n/de/financial-services.md | 2 +- i18n/de/frontends.md | 2 +- i18n/de/mobile-browsers.md | 2 +- i18n/de/multi-factor-authentication.md | 2 +- i18n/de/news-aggregators.md | 2 +- i18n/de/notebooks.md | 2 +- i18n/de/os/macos-overview.md | 20 ++++++++--------- i18n/de/passwords.md | 2 +- i18n/de/productivity.md | 2 +- i18n/de/real-time-communication.md | 2 +- i18n/de/router.md | 2 +- i18n/de/search-engines.md | 2 +- i18n/de/tor.md | 2 +- i18n/de/vpn.md | 2 +- i18n/el/android.md | 2 +- i18n/el/calendar.md | 2 +- i18n/el/cloud.md | 2 +- i18n/el/cryptocurrency.md | 2 +- i18n/el/data-redaction.md | 2 +- i18n/el/desktop-browsers.md | 2 +- i18n/el/desktop.md | 2 +- i18n/el/dns.md | 2 +- i18n/el/email-clients.md | 2 +- i18n/el/email.md | 2 +- i18n/el/encryption.md | 2 +- i18n/el/file-sharing.md | 2 +- i18n/el/financial-services.md | 2 +- i18n/el/frontends.md | 2 +- i18n/el/mobile-browsers.md | 2 +- i18n/el/multi-factor-authentication.md | 2 +- i18n/el/news-aggregators.md | 2 +- i18n/el/notebooks.md | 2 +- i18n/el/os/macos-overview.md | 20 ++++++++--------- i18n/el/passwords.md | 2 +- i18n/el/productivity.md | 2 +- i18n/el/real-time-communication.md | 2 +- i18n/el/router.md | 2 +- i18n/el/search-engines.md | 2 +- i18n/el/tor.md | 2 +- i18n/el/vpn.md | 2 +- i18n/eo/android.md | 2 +- i18n/eo/calendar.md | 2 +- i18n/eo/cloud.md | 2 +- i18n/eo/cryptocurrency.md | 2 +- i18n/eo/data-redaction.md | 2 +- i18n/eo/desktop-browsers.md | 2 +- i18n/eo/desktop.md | 2 +- i18n/eo/dns.md | 2 +- i18n/eo/email-clients.md | 2 +- i18n/eo/email.md | 2 +- i18n/eo/encryption.md | 2 +- i18n/eo/file-sharing.md | 2 +- i18n/eo/financial-services.md | 2 +- i18n/eo/frontends.md | 2 +- i18n/eo/mobile-browsers.md | 2 +- i18n/eo/multi-factor-authentication.md | 2 +- i18n/eo/news-aggregators.md | 2 +- i18n/eo/notebooks.md | 2 +- i18n/eo/os/macos-overview.md | 20 ++++++++--------- i18n/eo/passwords.md | 2 +- i18n/eo/productivity.md | 2 +- i18n/eo/real-time-communication.md | 2 +- i18n/eo/router.md | 2 +- i18n/eo/search-engines.md | 2 +- i18n/eo/tor.md | 2 +- i18n/eo/vpn.md | 2 +- i18n/es/android.md | 2 +- i18n/es/calendar.md | 2 +- i18n/es/cloud.md | 2 +- i18n/es/cryptocurrency.md | 2 +- i18n/es/data-redaction.md | 2 +- i18n/es/desktop-browsers.md | 2 +- i18n/es/desktop.md | 2 +- i18n/es/dns.md | 2 +- i18n/es/email-clients.md | 2 +- i18n/es/email.md | 2 +- i18n/es/encryption.md | 2 +- i18n/es/file-sharing.md | 2 +- i18n/es/financial-services.md | 2 +- i18n/es/frontends.md | 2 +- i18n/es/mobile-browsers.md | 2 +- i18n/es/multi-factor-authentication.md | 2 +- i18n/es/news-aggregators.md | 2 +- i18n/es/notebooks.md | 2 +- i18n/es/os/macos-overview.md | 24 ++++++++++----------- i18n/es/passwords.md | 2 +- i18n/es/productivity.md | 2 +- i18n/es/real-time-communication.md | 2 +- i18n/es/router.md | 2 +- i18n/es/search-engines.md | 2 +- i18n/es/tor.md | 2 +- i18n/es/vpn.md | 2 +- i18n/fa/android.md | 2 +- i18n/fa/calendar.md | 2 +- i18n/fa/cloud.md | 2 +- i18n/fa/cryptocurrency.md | 2 +- i18n/fa/data-redaction.md | 2 +- i18n/fa/desktop-browsers.md | 2 +- i18n/fa/desktop.md | 2 +- i18n/fa/dns.md | 2 +- i18n/fa/email-clients.md | 2 +- i18n/fa/email.md | 2 +- i18n/fa/encryption.md | 2 +- i18n/fa/file-sharing.md | 2 +- i18n/fa/financial-services.md | 2 +- i18n/fa/frontends.md | 2 +- i18n/fa/mobile-browsers.md | 2 +- i18n/fa/multi-factor-authentication.md | 2 +- i18n/fa/news-aggregators.md | 2 +- i18n/fa/notebooks.md | 2 +- i18n/fa/os/macos-overview.md | 20 ++++++++--------- i18n/fa/passwords.md | 2 +- i18n/fa/productivity.md | 2 +- i18n/fa/real-time-communication.md | 2 +- i18n/fa/router.md | 2 +- i18n/fa/search-engines.md | 2 +- i18n/fa/tor.md | 2 +- i18n/fa/vpn.md | 2 +- i18n/fr/android.md | 2 +- i18n/fr/calendar.md | 2 +- i18n/fr/cloud.md | 2 +- i18n/fr/cryptocurrency.md | 2 +- i18n/fr/data-redaction.md | 2 +- i18n/fr/desktop-browsers.md | 2 +- i18n/fr/desktop.md | 2 +- i18n/fr/dns.md | 2 +- i18n/fr/email-clients.md | 2 +- i18n/fr/email.md | 2 +- i18n/fr/encryption.md | 2 +- i18n/fr/file-sharing.md | 2 +- i18n/fr/financial-services.md | 2 +- i18n/fr/frontends.md | 2 +- i18n/fr/mobile-browsers.md | 2 +- i18n/fr/multi-factor-authentication.md | 2 +- i18n/fr/news-aggregators.md | 2 +- i18n/fr/notebooks.md | 2 +- i18n/fr/os/macos-overview.md | 24 ++++++++++----------- i18n/fr/passwords.md | 2 +- i18n/fr/productivity.md | 2 +- i18n/fr/real-time-communication.md | 2 +- i18n/fr/router.md | 2 +- i18n/fr/search-engines.md | 2 +- i18n/fr/tor.md | 2 +- i18n/fr/vpn.md | 2 +- i18n/he/android.md | 2 +- i18n/he/calendar.md | 2 +- i18n/he/cloud.md | 2 +- i18n/he/cryptocurrency.md | 2 +- i18n/he/data-redaction.md | 2 +- i18n/he/desktop-browsers.md | 2 +- i18n/he/desktop.md | 2 +- i18n/he/dns.md | 2 +- i18n/he/email-clients.md | 2 +- i18n/he/email.md | 2 +- i18n/he/encryption.md | 2 +- i18n/he/file-sharing.md | 2 +- i18n/he/financial-services.md | 2 +- i18n/he/frontends.md | 2 +- i18n/he/mobile-browsers.md | 2 +- i18n/he/multi-factor-authentication.md | 2 +- i18n/he/news-aggregators.md | 2 +- i18n/he/notebooks.md | 2 +- i18n/he/os/macos-overview.md | 24 ++++++++++----------- i18n/he/passwords.md | 2 +- i18n/he/productivity.md | 2 +- i18n/he/real-time-communication.md | 2 +- i18n/he/router.md | 2 +- i18n/he/search-engines.md | 2 +- i18n/he/tor.md | 2 +- i18n/he/vpn.md | 2 +- i18n/hi/android.md | 2 +- i18n/hi/calendar.md | 2 +- i18n/hi/cloud.md | 2 +- i18n/hi/cryptocurrency.md | 2 +- i18n/hi/data-redaction.md | 2 +- i18n/hi/desktop-browsers.md | 2 +- i18n/hi/desktop.md | 2 +- i18n/hi/dns.md | 2 +- i18n/hi/email-clients.md | 2 +- i18n/hi/email.md | 2 +- i18n/hi/encryption.md | 2 +- i18n/hi/file-sharing.md | 2 +- i18n/hi/financial-services.md | 2 +- i18n/hi/frontends.md | 2 +- i18n/hi/mobile-browsers.md | 2 +- i18n/hi/multi-factor-authentication.md | 2 +- i18n/hi/news-aggregators.md | 2 +- i18n/hi/notebooks.md | 2 +- i18n/hi/os/macos-overview.md | 20 ++++++++--------- i18n/hi/passwords.md | 2 +- i18n/hi/productivity.md | 2 +- i18n/hi/real-time-communication.md | 2 +- i18n/hi/router.md | 2 +- i18n/hi/search-engines.md | 2 +- i18n/hi/tor.md | 2 +- i18n/hi/vpn.md | 2 +- i18n/hu/android.md | 2 +- i18n/hu/calendar.md | 2 +- i18n/hu/cloud.md | 2 +- i18n/hu/cryptocurrency.md | 2 +- i18n/hu/data-redaction.md | 2 +- i18n/hu/desktop-browsers.md | 2 +- i18n/hu/desktop.md | 2 +- i18n/hu/dns.md | 2 +- i18n/hu/email-clients.md | 2 +- i18n/hu/email.md | 2 +- i18n/hu/encryption.md | 2 +- i18n/hu/file-sharing.md | 2 +- i18n/hu/financial-services.md | 2 +- i18n/hu/frontends.md | 2 +- i18n/hu/mobile-browsers.md | 2 +- i18n/hu/multi-factor-authentication.md | 2 +- i18n/hu/news-aggregators.md | 2 +- i18n/hu/notebooks.md | 2 +- i18n/hu/os/macos-overview.md | 20 ++++++++--------- i18n/hu/passwords.md | 2 +- i18n/hu/productivity.md | 2 +- i18n/hu/real-time-communication.md | 2 +- i18n/hu/router.md | 2 +- i18n/hu/search-engines.md | 2 +- i18n/hu/tor.md | 2 +- i18n/hu/vpn.md | 2 +- i18n/id/android.md | 2 +- i18n/id/calendar.md | 2 +- i18n/id/cloud.md | 2 +- i18n/id/cryptocurrency.md | 2 +- i18n/id/data-redaction.md | 2 +- i18n/id/desktop-browsers.md | 2 +- i18n/id/desktop.md | 2 +- i18n/id/dns.md | 2 +- i18n/id/email-clients.md | 2 +- i18n/id/email.md | 2 +- i18n/id/encryption.md | 2 +- i18n/id/file-sharing.md | 2 +- i18n/id/financial-services.md | 2 +- i18n/id/frontends.md | 2 +- i18n/id/mobile-browsers.md | 2 +- i18n/id/multi-factor-authentication.md | 2 +- i18n/id/news-aggregators.md | 2 +- i18n/id/notebooks.md | 2 +- i18n/id/os/macos-overview.md | 20 ++++++++--------- i18n/id/passwords.md | 2 +- i18n/id/productivity.md | 2 +- i18n/id/real-time-communication.md | 2 +- i18n/id/router.md | 2 +- i18n/id/search-engines.md | 2 +- i18n/id/tor.md | 2 +- i18n/id/vpn.md | 2 +- i18n/it/android.md | 2 +- i18n/it/calendar.md | 2 +- i18n/it/cloud.md | 2 +- i18n/it/cryptocurrency.md | 2 +- i18n/it/data-redaction.md | 2 +- i18n/it/desktop-browsers.md | 2 +- i18n/it/desktop.md | 2 +- i18n/it/dns.md | 2 +- i18n/it/email-clients.md | 2 +- i18n/it/email.md | 2 +- i18n/it/encryption.md | 2 +- i18n/it/file-sharing.md | 2 +- i18n/it/financial-services.md | 2 +- i18n/it/frontends.md | 2 +- i18n/it/mobile-browsers.md | 2 +- i18n/it/multi-factor-authentication.md | 2 +- i18n/it/news-aggregators.md | 2 +- i18n/it/notebooks.md | 2 +- i18n/it/os/macos-overview.md | 24 ++++++++++----------- i18n/it/passwords.md | 2 +- i18n/it/productivity.md | 2 +- i18n/it/real-time-communication.md | 2 +- i18n/it/router.md | 2 +- i18n/it/search-engines.md | 2 +- i18n/it/tor.md | 2 +- i18n/it/vpn.md | 2 +- i18n/ja/android.md | 2 +- i18n/ja/calendar.md | 2 +- i18n/ja/cloud.md | 2 +- i18n/ja/cryptocurrency.md | 2 +- i18n/ja/data-redaction.md | 2 +- i18n/ja/desktop-browsers.md | 2 +- i18n/ja/desktop.md | 2 +- i18n/ja/dns.md | 2 +- i18n/ja/email-clients.md | 2 +- i18n/ja/email.md | 2 +- i18n/ja/encryption.md | 2 +- i18n/ja/file-sharing.md | 2 +- i18n/ja/financial-services.md | 2 +- i18n/ja/frontends.md | 2 +- i18n/ja/mobile-browsers.md | 2 +- i18n/ja/multi-factor-authentication.md | 2 +- i18n/ja/news-aggregators.md | 2 +- i18n/ja/notebooks.md | 2 +- i18n/ja/os/macos-overview.md | 20 ++++++++--------- i18n/ja/passwords.md | 2 +- i18n/ja/productivity.md | 2 +- i18n/ja/real-time-communication.md | 2 +- i18n/ja/router.md | 2 +- i18n/ja/search-engines.md | 2 +- i18n/ja/tor.md | 2 +- i18n/ja/vpn.md | 2 +- i18n/ko/android.md | 2 +- i18n/ko/calendar.md | 2 +- i18n/ko/cloud.md | 2 +- i18n/ko/cryptocurrency.md | 2 +- i18n/ko/data-redaction.md | 2 +- i18n/ko/desktop-browsers.md | 2 +- i18n/ko/desktop.md | 2 +- i18n/ko/dns.md | 2 +- i18n/ko/email-clients.md | 2 +- i18n/ko/email.md | 2 +- i18n/ko/encryption.md | 2 +- i18n/ko/file-sharing.md | 2 +- i18n/ko/financial-services.md | 2 +- i18n/ko/frontends.md | 2 +- i18n/ko/mobile-browsers.md | 2 +- i18n/ko/multi-factor-authentication.md | 2 +- i18n/ko/news-aggregators.md | 2 +- i18n/ko/notebooks.md | 2 +- i18n/ko/os/macos-overview.md | 20 ++++++++--------- i18n/ko/passwords.md | 2 +- i18n/ko/productivity.md | 2 +- i18n/ko/real-time-communication.md | 2 +- i18n/ko/router.md | 2 +- i18n/ko/search-engines.md | 2 +- i18n/ko/tor.md | 2 +- i18n/ko/vpn.md | 2 +- i18n/ku-IQ/android.md | 2 +- i18n/ku-IQ/calendar.md | 2 +- i18n/ku-IQ/cloud.md | 2 +- i18n/ku-IQ/cryptocurrency.md | 2 +- i18n/ku-IQ/data-redaction.md | 2 +- i18n/ku-IQ/desktop-browsers.md | 2 +- i18n/ku-IQ/desktop.md | 2 +- i18n/ku-IQ/dns.md | 2 +- i18n/ku-IQ/email-clients.md | 2 +- i18n/ku-IQ/email.md | 2 +- i18n/ku-IQ/encryption.md | 2 +- i18n/ku-IQ/file-sharing.md | 2 +- i18n/ku-IQ/financial-services.md | 2 +- i18n/ku-IQ/frontends.md | 2 +- i18n/ku-IQ/mobile-browsers.md | 2 +- i18n/ku-IQ/multi-factor-authentication.md | 2 +- i18n/ku-IQ/news-aggregators.md | 2 +- i18n/ku-IQ/notebooks.md | 2 +- i18n/ku-IQ/os/macos-overview.md | 20 ++++++++--------- i18n/ku-IQ/passwords.md | 2 +- i18n/ku-IQ/productivity.md | 2 +- i18n/ku-IQ/real-time-communication.md | 2 +- i18n/ku-IQ/router.md | 2 +- i18n/ku-IQ/search-engines.md | 2 +- i18n/ku-IQ/tor.md | 2 +- i18n/ku-IQ/vpn.md | 2 +- i18n/nl/android.md | 2 +- i18n/nl/calendar.md | 2 +- i18n/nl/cloud.md | 2 +- i18n/nl/cryptocurrency.md | 2 +- i18n/nl/data-redaction.md | 2 +- i18n/nl/desktop-browsers.md | 2 +- i18n/nl/desktop.md | 2 +- i18n/nl/dns.md | 2 +- i18n/nl/email-clients.md | 2 +- i18n/nl/email.md | 2 +- i18n/nl/encryption.md | 2 +- i18n/nl/file-sharing.md | 2 +- i18n/nl/financial-services.md | 2 +- i18n/nl/frontends.md | 2 +- i18n/nl/mobile-browsers.md | 2 +- i18n/nl/multi-factor-authentication.md | 2 +- i18n/nl/news-aggregators.md | 2 +- i18n/nl/notebooks.md | 2 +- i18n/nl/os/macos-overview.md | 20 ++++++++--------- i18n/nl/passwords.md | 2 +- i18n/nl/productivity.md | 2 +- i18n/nl/real-time-communication.md | 2 +- i18n/nl/router.md | 2 +- i18n/nl/search-engines.md | 2 +- i18n/nl/tor.md | 2 +- i18n/nl/vpn.md | 2 +- i18n/pl/android.md | 2 +- i18n/pl/calendar.md | 2 +- i18n/pl/cloud.md | 2 +- i18n/pl/cryptocurrency.md | 2 +- i18n/pl/data-redaction.md | 2 +- i18n/pl/desktop-browsers.md | 2 +- i18n/pl/desktop.md | 2 +- i18n/pl/dns.md | 2 +- i18n/pl/email-clients.md | 2 +- i18n/pl/email.md | 2 +- i18n/pl/encryption.md | 2 +- i18n/pl/file-sharing.md | 2 +- i18n/pl/financial-services.md | 2 +- i18n/pl/frontends.md | 2 +- i18n/pl/mobile-browsers.md | 2 +- i18n/pl/multi-factor-authentication.md | 2 +- i18n/pl/news-aggregators.md | 2 +- i18n/pl/notebooks.md | 2 +- i18n/pl/os/macos-overview.md | 20 ++++++++--------- i18n/pl/passwords.md | 2 +- i18n/pl/productivity.md | 2 +- i18n/pl/real-time-communication.md | 2 +- i18n/pl/router.md | 2 +- i18n/pl/search-engines.md | 2 +- i18n/pl/tor.md | 2 +- i18n/pl/vpn.md | 2 +- i18n/pt-BR/android.md | 2 +- i18n/pt-BR/calendar.md | 2 +- i18n/pt-BR/cloud.md | 2 +- i18n/pt-BR/cryptocurrency.md | 2 +- i18n/pt-BR/data-redaction.md | 2 +- i18n/pt-BR/desktop-browsers.md | 2 +- i18n/pt-BR/desktop.md | 2 +- i18n/pt-BR/dns.md | 2 +- i18n/pt-BR/email-clients.md | 2 +- i18n/pt-BR/email.md | 2 +- i18n/pt-BR/encryption.md | 2 +- i18n/pt-BR/file-sharing.md | 2 +- i18n/pt-BR/financial-services.md | 2 +- i18n/pt-BR/frontends.md | 2 +- i18n/pt-BR/mobile-browsers.md | 2 +- i18n/pt-BR/multi-factor-authentication.md | 2 +- i18n/pt-BR/news-aggregators.md | 2 +- i18n/pt-BR/notebooks.md | 2 +- i18n/pt-BR/os/macos-overview.md | 20 ++++++++--------- i18n/pt-BR/passwords.md | 2 +- i18n/pt-BR/productivity.md | 2 +- i18n/pt-BR/real-time-communication.md | 2 +- i18n/pt-BR/router.md | 2 +- i18n/pt-BR/search-engines.md | 2 +- i18n/pt-BR/tor.md | 2 +- i18n/pt-BR/vpn.md | 2 +- i18n/pt/android.md | 2 +- i18n/pt/calendar.md | 2 +- i18n/pt/cloud.md | 2 +- i18n/pt/cryptocurrency.md | 2 +- i18n/pt/data-redaction.md | 2 +- i18n/pt/desktop-browsers.md | 2 +- i18n/pt/desktop.md | 2 +- i18n/pt/dns.md | 2 +- i18n/pt/email-clients.md | 2 +- i18n/pt/email.md | 2 +- i18n/pt/encryption.md | 2 +- i18n/pt/file-sharing.md | 2 +- i18n/pt/financial-services.md | 2 +- i18n/pt/frontends.md | 2 +- i18n/pt/mobile-browsers.md | 2 +- i18n/pt/multi-factor-authentication.md | 2 +- i18n/pt/news-aggregators.md | 2 +- i18n/pt/notebooks.md | 2 +- i18n/pt/os/macos-overview.md | 20 ++++++++--------- i18n/pt/passwords.md | 2 +- i18n/pt/productivity.md | 2 +- i18n/pt/real-time-communication.md | 2 +- i18n/pt/router.md | 2 +- i18n/pt/search-engines.md | 2 +- i18n/pt/tor.md | 2 +- i18n/pt/vpn.md | 2 +- i18n/ru/android.md | 2 +- i18n/ru/calendar.md | 2 +- i18n/ru/cloud.md | 2 +- i18n/ru/cryptocurrency.md | 2 +- i18n/ru/data-redaction.md | 2 +- i18n/ru/desktop-browsers.md | 2 +- i18n/ru/desktop.md | 2 +- i18n/ru/dns.md | 2 +- i18n/ru/email-clients.md | 2 +- i18n/ru/email.md | 2 +- i18n/ru/encryption.md | 2 +- i18n/ru/file-sharing.md | 2 +- i18n/ru/financial-services.md | 2 +- i18n/ru/frontends.md | 2 +- i18n/ru/mobile-browsers.md | 2 +- i18n/ru/multi-factor-authentication.md | 2 +- i18n/ru/news-aggregators.md | 2 +- i18n/ru/notebooks.md | 2 +- i18n/ru/os/macos-overview.md | 20 ++++++++--------- i18n/ru/passwords.md | 2 +- i18n/ru/productivity.md | 2 +- i18n/ru/real-time-communication.md | 2 +- i18n/ru/router.md | 2 +- i18n/ru/search-engines.md | 2 +- i18n/ru/tor.md | 2 +- i18n/ru/vpn.md | 2 +- i18n/sv/android.md | 2 +- i18n/sv/calendar.md | 2 +- i18n/sv/cloud.md | 2 +- i18n/sv/cryptocurrency.md | 2 +- i18n/sv/data-redaction.md | 2 +- i18n/sv/desktop-browsers.md | 2 +- i18n/sv/desktop.md | 2 +- i18n/sv/dns.md | 2 +- i18n/sv/email-clients.md | 2 +- i18n/sv/email.md | 2 +- i18n/sv/encryption.md | 2 +- i18n/sv/file-sharing.md | 2 +- i18n/sv/financial-services.md | 2 +- i18n/sv/frontends.md | 2 +- i18n/sv/mobile-browsers.md | 2 +- i18n/sv/multi-factor-authentication.md | 2 +- i18n/sv/news-aggregators.md | 2 +- i18n/sv/notebooks.md | 2 +- i18n/sv/os/macos-overview.md | 20 ++++++++--------- i18n/sv/passwords.md | 2 +- i18n/sv/productivity.md | 2 +- i18n/sv/real-time-communication.md | 2 +- i18n/sv/router.md | 2 +- i18n/sv/search-engines.md | 2 +- i18n/sv/tor.md | 2 +- i18n/sv/vpn.md | 2 +- i18n/tr/android.md | 2 +- i18n/tr/calendar.md | 2 +- i18n/tr/cloud.md | 2 +- i18n/tr/cryptocurrency.md | 2 +- i18n/tr/data-redaction.md | 2 +- i18n/tr/desktop-browsers.md | 2 +- i18n/tr/desktop.md | 2 +- i18n/tr/dns.md | 2 +- i18n/tr/email-clients.md | 2 +- i18n/tr/email.md | 2 +- i18n/tr/encryption.md | 2 +- i18n/tr/file-sharing.md | 2 +- i18n/tr/financial-services.md | 2 +- i18n/tr/frontends.md | 2 +- i18n/tr/mobile-browsers.md | 2 +- i18n/tr/multi-factor-authentication.md | 2 +- i18n/tr/news-aggregators.md | 2 +- i18n/tr/notebooks.md | 2 +- i18n/tr/os/macos-overview.md | 20 ++++++++--------- i18n/tr/passwords.md | 2 +- i18n/tr/productivity.md | 2 +- i18n/tr/real-time-communication.md | 2 +- i18n/tr/router.md | 2 +- i18n/tr/search-engines.md | 2 +- i18n/tr/tor.md | 2 +- i18n/tr/vpn.md | 2 +- i18n/uk/android.md | 2 +- i18n/uk/calendar.md | 2 +- i18n/uk/cloud.md | 2 +- i18n/uk/cryptocurrency.md | 2 +- i18n/uk/data-redaction.md | 2 +- i18n/uk/desktop-browsers.md | 2 +- i18n/uk/desktop.md | 2 +- i18n/uk/dns.md | 2 +- i18n/uk/email-clients.md | 2 +- i18n/uk/email.md | 2 +- i18n/uk/encryption.md | 2 +- i18n/uk/file-sharing.md | 2 +- i18n/uk/financial-services.md | 2 +- i18n/uk/frontends.md | 2 +- i18n/uk/mobile-browsers.md | 2 +- i18n/uk/multi-factor-authentication.md | 2 +- i18n/uk/news-aggregators.md | 2 +- i18n/uk/notebooks.md | 2 +- i18n/uk/os/macos-overview.md | 20 ++++++++--------- i18n/uk/passwords.md | 2 +- i18n/uk/productivity.md | 2 +- i18n/uk/real-time-communication.md | 2 +- i18n/uk/router.md | 2 +- i18n/uk/search-engines.md | 2 +- i18n/uk/tor.md | 2 +- i18n/uk/vpn.md | 2 +- i18n/vi/android.md | 2 +- i18n/vi/calendar.md | 2 +- i18n/vi/cloud.md | 2 +- i18n/vi/cryptocurrency.md | 2 +- i18n/vi/data-redaction.md | 2 +- i18n/vi/desktop-browsers.md | 2 +- i18n/vi/desktop.md | 2 +- i18n/vi/dns.md | 2 +- i18n/vi/email-clients.md | 2 +- i18n/vi/email.md | 2 +- i18n/vi/encryption.md | 2 +- i18n/vi/file-sharing.md | 2 +- i18n/vi/financial-services.md | 2 +- i18n/vi/frontends.md | 2 +- i18n/vi/mobile-browsers.md | 2 +- i18n/vi/multi-factor-authentication.md | 2 +- i18n/vi/news-aggregators.md | 2 +- i18n/vi/notebooks.md | 2 +- i18n/vi/os/macos-overview.md | 20 ++++++++--------- i18n/vi/passwords.md | 2 +- i18n/vi/productivity.md | 2 +- i18n/vi/real-time-communication.md | 2 +- i18n/vi/router.md | 2 +- i18n/vi/search-engines.md | 2 +- i18n/vi/tor.md | 2 +- i18n/vi/vpn.md | 2 +- i18n/zh-Hant/android.md | 2 +- i18n/zh-Hant/calendar.md | 2 +- i18n/zh-Hant/cloud.md | 2 +- i18n/zh-Hant/cryptocurrency.md | 2 +- i18n/zh-Hant/data-redaction.md | 2 +- i18n/zh-Hant/desktop-browsers.md | 2 +- i18n/zh-Hant/desktop.md | 2 +- i18n/zh-Hant/dns.md | 2 +- i18n/zh-Hant/email-clients.md | 2 +- i18n/zh-Hant/email.md | 2 +- i18n/zh-Hant/encryption.md | 2 +- i18n/zh-Hant/file-sharing.md | 2 +- i18n/zh-Hant/financial-services.md | 2 +- i18n/zh-Hant/frontends.md | 2 +- i18n/zh-Hant/mobile-browsers.md | 2 +- i18n/zh-Hant/multi-factor-authentication.md | 2 +- i18n/zh-Hant/news-aggregators.md | 2 +- i18n/zh-Hant/notebooks.md | 2 +- i18n/zh-Hant/os/macos-overview.md | 24 ++++++++++----------- i18n/zh-Hant/passwords.md | 2 +- i18n/zh-Hant/productivity.md | 2 +- i18n/zh-Hant/real-time-communication.md | 2 +- i18n/zh-Hant/router.md | 2 +- i18n/zh-Hant/search-engines.md | 2 +- i18n/zh-Hant/tor.md | 2 +- i18n/zh-Hant/vpn.md | 2 +- i18n/zh/android.md | 2 +- i18n/zh/calendar.md | 2 +- i18n/zh/cloud.md | 2 +- i18n/zh/cryptocurrency.md | 2 +- i18n/zh/data-redaction.md | 2 +- i18n/zh/desktop-browsers.md | 2 +- i18n/zh/desktop.md | 2 +- i18n/zh/dns.md | 2 +- i18n/zh/email-clients.md | 2 +- i18n/zh/email.md | 2 +- i18n/zh/encryption.md | 2 +- i18n/zh/file-sharing.md | 2 +- i18n/zh/financial-services.md | 2 +- i18n/zh/frontends.md | 2 +- i18n/zh/mobile-browsers.md | 2 +- i18n/zh/multi-factor-authentication.md | 2 +- i18n/zh/news-aggregators.md | 2 +- i18n/zh/notebooks.md | 2 +- i18n/zh/os/macos-overview.md | 20 ++++++++--------- i18n/zh/passwords.md | 2 +- i18n/zh/productivity.md | 2 +- i18n/zh/real-time-communication.md | 2 +- i18n/zh/router.md | 2 +- i18n/zh/search-engines.md | 2 +- i18n/zh/tor.md | 2 +- i18n/zh/vpn.md | 2 +- 728 files changed, 962 insertions(+), 1018 deletions(-) diff --git a/i18n/ar/android.md b/i18n/ar/android.md index 6e484416..400d1a6c 100644 --- a/i18n/ar/android.md +++ b/i18n/ar/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/ar/calendar.md b/i18n/ar/calendar.md index e87d6851..2f3a4aa0 100644 --- a/i18n/ar/calendar.md +++ b/i18n/ar/calendar.md @@ -2,7 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/ar/cloud.md b/i18n/ar/cloud.md index 98a52da7..080217e7 100644 --- a/i18n/ar/cloud.md +++ b/i18n/ar/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/ar/cryptocurrency.md b/i18n/ar/cryptocurrency.md index 5db3fcd9..0678ce8d 100644 --- a/i18n/ar/cryptocurrency.md +++ b/i18n/ar/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ar/data-redaction.md b/i18n/ar/data-redaction.md index 4dd9a4d0..5e8cc4ad 100644 --- a/i18n/ar/data-redaction.md +++ b/i18n/ar/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/ar/desktop-browsers.md b/i18n/ar/desktop-browsers.md index 05918fef..9cca60f5 100644 --- a/i18n/ar/desktop-browsers.md +++ b/i18n/ar/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "متصفحات ويب تحترم الخصوصية للحاسوب ا title: "متصفحات الحاسوب المكتبي" icon: material/laptop description: متصفحات الويب هذه تقدم حماية أكبر للخصوصية من Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/ar/desktop.md b/i18n/ar/desktop.md index 4d7724ba..79c52e75 100644 --- a/i18n/ar/desktop.md +++ b/i18n/ar/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/ar/dns.md b/i18n/ar/dns.md index 8bd6440d..6a68a96d 100644 --- a/i18n/ar/dns.md +++ b/i18n/ar/dns.md @@ -2,7 +2,7 @@ title: "محلِّلات أنظمة أسماء النطاقات (DNS)" icon: material/dns description: هنا بعض موفِّري خدمة أنظمة أسماء النطاقات المعمَّاة لتستبدل ما ضبطه لك موفِّر خدمة الإنترنت. -cover: dns.png +cover: dns.webp --- ينبغي استخدام أنظمة أسماء النطاقات المعمَّاة الموجودة في خوادم جهات خارجية فقط لتجاوز [حظرها](https://en.wikipedia.org/wiki/DNS_blocking)، وذلك إن تيقَّنت من أن ذلك ليست له عواقب. لن يخفي استخدام نظام أسماء نطاق معمًّى ما تتصفَّح. diff --git a/i18n/ar/email-clients.md b/i18n/ar/email-clients.md index 94cf798b..c02dae71 100644 --- a/i18n/ar/email-clients.md +++ b/i18n/ar/email-clients.md @@ -2,7 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/ar/email.md b/i18n/ar/email.md index f9bc6f82..e946540a 100644 --- a/i18n/ar/email.md +++ b/i18n/ar/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "البُرُد الإلكترونية" icon: material/email description: توفِّر الجهات المذكورة مخزنًا آمنًا لرسائلك، والكثير منهم يدعم تعمية أوبن‌بي‌جي‌بي مع جهات أخرى. -cover: email.png +cover: email.webp --- حتَّى ولو كان البريد الإلكتروني حاجةً لتستخدم أيَّ خدمة إنترنت فإننا لا نوصي به للتحادث. تأمَّل استخدام خدمة اتصال مباشر تدعم السرية المستقبلية لتحادث الناس بدلًا من استخدام بريد إلكتروني. diff --git a/i18n/ar/encryption.md b/i18n/ar/encryption.md index ea033fa7..61fc1aa1 100644 --- a/i18n/ar/encryption.md +++ b/i18n/ar/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/ar/file-sharing.md b/i18n/ar/file-sharing.md index e6e5f1a9..b174e67f 100644 --- a/i18n/ar/file-sharing.md +++ b/i18n/ar/file-sharing.md @@ -2,7 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. -cover: file-sharing.png +cover: file-sharing.webp --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/ar/financial-services.md b/i18n/ar/financial-services.md index 117ac80a..6cedefcb 100644 --- a/i18n/ar/financial-services.md +++ b/i18n/ar/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ar/frontends.md b/i18n/ar/frontends.md index 7f7c1654..20c7c858 100644 --- a/i18n/ar/frontends.md +++ b/i18n/ar/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/ar/mobile-browsers.md b/i18n/ar/mobile-browsers.md index b6f68ae4..8d7b0e9e 100644 --- a/i18n/ar/mobile-browsers.md +++ b/i18n/ar/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/ar/multi-factor-authentication.md b/i18n/ar/multi-factor-authentication.md index 2a6d7b73..fa0ab916 100644 --- a/i18n/ar/multi-factor-authentication.md +++ b/i18n/ar/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/ar/news-aggregators.md b/i18n/ar/news-aggregators.md index 8342bfde..fdcd5166 100644 --- a/i18n/ar/news-aggregators.md +++ b/i18n/ar/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/ar/notebooks.md b/i18n/ar/notebooks.md index 18e86a22..fa318b5c 100644 --- a/i18n/ar/notebooks.md +++ b/i18n/ar/notebooks.md @@ -2,7 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/ar/os/macos-overview.md b/i18n/ar/os/macos-overview.md index eba51f28..6a38f1f1 100644 --- a/i18n/ar/os/macos-overview.md +++ b/i18n/ar/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Security - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/ar/passwords.md b/i18n/ar/passwords.md index e440789c..3cc11265 100644 --- a/i18n/ar/passwords.md +++ b/i18n/ar/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/ar/productivity.md b/i18n/ar/productivity.md index 929aab4b..de2ce413 100644 --- a/i18n/ar/productivity.md +++ b/i18n/ar/productivity.md @@ -2,7 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/ar/real-time-communication.md b/i18n/ar/real-time-communication.md index 6cb03489..9500ff07 100644 --- a/i18n/ar/real-time-communication.md +++ b/i18n/ar/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/ar/router.md b/i18n/ar/router.md index 834c59f6..bfa8d0a3 100644 --- a/i18n/ar/router.md +++ b/i18n/ar/router.md @@ -2,7 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/ar/search-engines.md b/i18n/ar/search-engines.md index c2286c08..ea5b4db9 100644 --- a/i18n/ar/search-engines.md +++ b/i18n/ar/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/ar/tor.md b/i18n/ar/tor.md index 55e4f5ba..a0e236e7 100644 --- a/i18n/ar/tor.md +++ b/i18n/ar/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/ar/vpn.md b/i18n/ar/vpn.md index 3fb0483e..077f242e 100644 --- a/i18n/ar/vpn.md +++ b/i18n/ar/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "خِدْمَات شبكة خاصة افتراضية" icon: material/vpn description: هذه هي أفضل خِدْمَات شبكة خاصة افتراضية للمحافظة خصوصيتك وأمانك على الإنترنت. اعثر على مزود للخدمة هنا ليس يريد التجسس عليك. -cover: vpn.png +cover: vpn.webp --- إذا كنت تبحث عن **خصوصية** إضافية من مزود خدمة الإنترنت لك، أو عندما تتصل بشبكة واي-فاي عامة، أو في أثناء استخدامك لشبكة تورنت، قد يكون استخدام شبكة خاصة افتراضية هو الحل بالنسبة لك ما دمت على دراية بالمخاطر المترتبة على ذلك. نعتقد بأن هؤلاء هم أفضل المزودين: diff --git a/i18n/bn/android.md b/i18n/bn/android.md index ba210856..037e61ba 100644 --- a/i18n/bn/android.md +++ b/i18n/bn/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "অ্যান্ড্রয়েড" icon: 'ফন্টঅ্যাওসাম/ ব্র্যান্ড / অ্যান্ড্রয়েড' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/bn/calendar.md b/i18n/bn/calendar.md index e87d6851..2f3a4aa0 100644 --- a/i18n/bn/calendar.md +++ b/i18n/bn/calendar.md @@ -2,7 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/bn/cloud.md b/i18n/bn/cloud.md index 98a52da7..080217e7 100644 --- a/i18n/bn/cloud.md +++ b/i18n/bn/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/bn/cryptocurrency.md b/i18n/bn/cryptocurrency.md index 5db3fcd9..0678ce8d 100644 --- a/i18n/bn/cryptocurrency.md +++ b/i18n/bn/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/bn/data-redaction.md b/i18n/bn/data-redaction.md index 4dd9a4d0..5e8cc4ad 100644 --- a/i18n/bn/data-redaction.md +++ b/i18n/bn/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/bn/desktop-browsers.md b/i18n/bn/desktop-browsers.md index e8e13b05..0a2da32c 100644 --- a/i18n/bn/desktop-browsers.md +++ b/i18n/bn/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/bn/desktop.md b/i18n/bn/desktop.md index 4d7724ba..79c52e75 100644 --- a/i18n/bn/desktop.md +++ b/i18n/bn/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/bn/dns.md b/i18n/bn/dns.md index 875e277e..cddaed4a 100644 --- a/i18n/bn/dns.md +++ b/i18n/bn/dns.md @@ -2,7 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. -cover: dns.png +cover: dns.webp --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/bn/email-clients.md b/i18n/bn/email-clients.md index 94cf798b..c02dae71 100644 --- a/i18n/bn/email-clients.md +++ b/i18n/bn/email-clients.md @@ -2,7 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/bn/email.md b/i18n/bn/email.md index 3a538647..b618dc09 100644 --- a/i18n/bn/email.md +++ b/i18n/bn/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. -cover: email.png +cover: email.webp --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/bn/encryption.md b/i18n/bn/encryption.md index ea033fa7..61fc1aa1 100644 --- a/i18n/bn/encryption.md +++ b/i18n/bn/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/bn/file-sharing.md b/i18n/bn/file-sharing.md index e6e5f1a9..b174e67f 100644 --- a/i18n/bn/file-sharing.md +++ b/i18n/bn/file-sharing.md @@ -2,7 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. -cover: file-sharing.png +cover: file-sharing.webp --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/bn/financial-services.md b/i18n/bn/financial-services.md index 117ac80a..6cedefcb 100644 --- a/i18n/bn/financial-services.md +++ b/i18n/bn/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/bn/frontends.md b/i18n/bn/frontends.md index 7f7c1654..20c7c858 100644 --- a/i18n/bn/frontends.md +++ b/i18n/bn/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/bn/mobile-browsers.md b/i18n/bn/mobile-browsers.md index 408537bd..6e1ab86e 100644 --- a/i18n/bn/mobile-browsers.md +++ b/i18n/bn/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/bn/multi-factor-authentication.md b/i18n/bn/multi-factor-authentication.md index 2a6d7b73..fa0ab916 100644 --- a/i18n/bn/multi-factor-authentication.md +++ b/i18n/bn/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/bn/news-aggregators.md b/i18n/bn/news-aggregators.md index 8342bfde..fdcd5166 100644 --- a/i18n/bn/news-aggregators.md +++ b/i18n/bn/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/bn/notebooks.md b/i18n/bn/notebooks.md index 18e86a22..fa318b5c 100644 --- a/i18n/bn/notebooks.md +++ b/i18n/bn/notebooks.md @@ -2,7 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/bn/os/macos-overview.md b/i18n/bn/os/macos-overview.md index eba51f28..6a38f1f1 100644 --- a/i18n/bn/os/macos-overview.md +++ b/i18n/bn/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Security - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/bn/passwords.md b/i18n/bn/passwords.md index 180bc4b9..7defe823 100644 --- a/i18n/bn/passwords.md +++ b/i18n/bn/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/bn/productivity.md b/i18n/bn/productivity.md index 929aab4b..de2ce413 100644 --- a/i18n/bn/productivity.md +++ b/i18n/bn/productivity.md @@ -2,7 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/bn/real-time-communication.md b/i18n/bn/real-time-communication.md index 6cb03489..9500ff07 100644 --- a/i18n/bn/real-time-communication.md +++ b/i18n/bn/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/bn/router.md b/i18n/bn/router.md index 834c59f6..bfa8d0a3 100644 --- a/i18n/bn/router.md +++ b/i18n/bn/router.md @@ -2,7 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/bn/search-engines.md b/i18n/bn/search-engines.md index c2286c08..ea5b4db9 100644 --- a/i18n/bn/search-engines.md +++ b/i18n/bn/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/bn/tor.md b/i18n/bn/tor.md index 3455cc55..e1c674b0 100644 --- a/i18n/bn/tor.md +++ b/i18n/bn/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/bn/vpn.md b/i18n/bn/vpn.md index 4af1203a..6538a869 100644 --- a/i18n/bn/vpn.md +++ b/i18n/bn/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/cs/android.md b/i18n/cs/android.md index 6e484416..400d1a6c 100644 --- a/i18n/cs/android.md +++ b/i18n/cs/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/cs/calendar.md b/i18n/cs/calendar.md index e87d6851..2f3a4aa0 100644 --- a/i18n/cs/calendar.md +++ b/i18n/cs/calendar.md @@ -2,7 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/cs/cloud.md b/i18n/cs/cloud.md index 98a52da7..080217e7 100644 --- a/i18n/cs/cloud.md +++ b/i18n/cs/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/cs/cryptocurrency.md b/i18n/cs/cryptocurrency.md index 5db3fcd9..0678ce8d 100644 --- a/i18n/cs/cryptocurrency.md +++ b/i18n/cs/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/cs/data-redaction.md b/i18n/cs/data-redaction.md index 4dd9a4d0..5e8cc4ad 100644 --- a/i18n/cs/data-redaction.md +++ b/i18n/cs/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/cs/desktop-browsers.md b/i18n/cs/desktop-browsers.md index 1f29c401..6f165e08 100644 --- a/i18n/cs/desktop-browsers.md +++ b/i18n/cs/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Webové prohlížeče respektující soukromí pro PC a Mac - Priva title: "Prohlížeče pro počítače" icon: material/laptop description: Tyto webové prohlížeče nabízejí lepší ochranu soukromí než Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/cs/desktop.md b/i18n/cs/desktop.md index 4d7724ba..79c52e75 100644 --- a/i18n/cs/desktop.md +++ b/i18n/cs/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/cs/dns.md b/i18n/cs/dns.md index eee12c94..30669b3c 100644 --- a/i18n/cs/dns.md +++ b/i18n/cs/dns.md @@ -2,7 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. -cover: dns.png +cover: dns.webp --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/cs/email-clients.md b/i18n/cs/email-clients.md index 94cf798b..c02dae71 100644 --- a/i18n/cs/email-clients.md +++ b/i18n/cs/email-clients.md @@ -2,7 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/cs/email.md b/i18n/cs/email.md index 3a538647..b618dc09 100644 --- a/i18n/cs/email.md +++ b/i18n/cs/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. -cover: email.png +cover: email.webp --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/cs/encryption.md b/i18n/cs/encryption.md index ea033fa7..61fc1aa1 100644 --- a/i18n/cs/encryption.md +++ b/i18n/cs/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/cs/file-sharing.md b/i18n/cs/file-sharing.md index e6e5f1a9..b174e67f 100644 --- a/i18n/cs/file-sharing.md +++ b/i18n/cs/file-sharing.md @@ -2,7 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. -cover: file-sharing.png +cover: file-sharing.webp --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/cs/financial-services.md b/i18n/cs/financial-services.md index 117ac80a..6cedefcb 100644 --- a/i18n/cs/financial-services.md +++ b/i18n/cs/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/cs/frontends.md b/i18n/cs/frontends.md index 7f7c1654..20c7c858 100644 --- a/i18n/cs/frontends.md +++ b/i18n/cs/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/cs/mobile-browsers.md b/i18n/cs/mobile-browsers.md index b6f68ae4..8d7b0e9e 100644 --- a/i18n/cs/mobile-browsers.md +++ b/i18n/cs/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/cs/multi-factor-authentication.md b/i18n/cs/multi-factor-authentication.md index 2a6d7b73..fa0ab916 100644 --- a/i18n/cs/multi-factor-authentication.md +++ b/i18n/cs/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/cs/news-aggregators.md b/i18n/cs/news-aggregators.md index 8342bfde..fdcd5166 100644 --- a/i18n/cs/news-aggregators.md +++ b/i18n/cs/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/cs/notebooks.md b/i18n/cs/notebooks.md index 18e86a22..fa318b5c 100644 --- a/i18n/cs/notebooks.md +++ b/i18n/cs/notebooks.md @@ -2,7 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/cs/os/macos-overview.md b/i18n/cs/os/macos-overview.md index eba51f28..6a38f1f1 100644 --- a/i18n/cs/os/macos-overview.md +++ b/i18n/cs/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Security - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/cs/passwords.md b/i18n/cs/passwords.md index e440789c..3cc11265 100644 --- a/i18n/cs/passwords.md +++ b/i18n/cs/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/cs/productivity.md b/i18n/cs/productivity.md index 929aab4b..de2ce413 100644 --- a/i18n/cs/productivity.md +++ b/i18n/cs/productivity.md @@ -2,7 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/cs/real-time-communication.md b/i18n/cs/real-time-communication.md index 6cb03489..9500ff07 100644 --- a/i18n/cs/real-time-communication.md +++ b/i18n/cs/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/cs/router.md b/i18n/cs/router.md index 834c59f6..bfa8d0a3 100644 --- a/i18n/cs/router.md +++ b/i18n/cs/router.md @@ -2,7 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/cs/search-engines.md b/i18n/cs/search-engines.md index c2286c08..ea5b4db9 100644 --- a/i18n/cs/search-engines.md +++ b/i18n/cs/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/cs/tor.md b/i18n/cs/tor.md index 3dcaca70..6be15141 100644 --- a/i18n/cs/tor.md +++ b/i18n/cs/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/cs/vpn.md b/i18n/cs/vpn.md index 4af1203a..6538a869 100644 --- a/i18n/cs/vpn.md +++ b/i18n/cs/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/de/android.md b/i18n/de/android.md index 4f954954..262d5586 100644 --- a/i18n/de/android.md +++ b/i18n/de/android.md @@ -3,7 +3,7 @@ meta_title: "Android-Empfehlungen: GrapheneOS und DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Du kannst das Betriebssystem deines Android-Handys mit diesen sicheren und Privatsphäre-freundlichen Alternativen ersetzen. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/de/calendar.md b/i18n/de/calendar.md index e87d6851..2f3a4aa0 100644 --- a/i18n/de/calendar.md +++ b/i18n/de/calendar.md @@ -2,7 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/de/cloud.md b/i18n/de/cloud.md index 98a52da7..080217e7 100644 --- a/i18n/de/cloud.md +++ b/i18n/de/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/de/cryptocurrency.md b/i18n/de/cryptocurrency.md index 5db3fcd9..0678ce8d 100644 --- a/i18n/de/cryptocurrency.md +++ b/i18n/de/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/de/data-redaction.md b/i18n/de/data-redaction.md index 4dd9a4d0..5e8cc4ad 100644 --- a/i18n/de/data-redaction.md +++ b/i18n/de/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/de/desktop-browsers.md b/i18n/de/desktop-browsers.md index d04ba26c..817969c0 100644 --- a/i18n/de/desktop-browsers.md +++ b/i18n/de/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Datenschutzfreundliche Webbrowser für PC und Mac - Privacy Guides" title: "Desktop Browser" icon: material/laptop description: Diese Webbrowser bieten einen stärkeren Schutz der Privatsphäre als Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/de/desktop.md b/i18n/de/desktop.md index 4d7724ba..79c52e75 100644 --- a/i18n/de/desktop.md +++ b/i18n/de/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/de/dns.md b/i18n/de/dns.md index 259be44c..923d0eaa 100644 --- a/i18n/de/dns.md +++ b/i18n/de/dns.md @@ -2,7 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. -cover: dns.png +cover: dns.webp --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Verschlüsseltes DNS hilft dir nicht dabei, deine Browsing-Aktivitäten zu verbergen. diff --git a/i18n/de/email-clients.md b/i18n/de/email-clients.md index 6f4f6fda..916ed4ce 100644 --- a/i18n/de/email-clients.md +++ b/i18n/de/email-clients.md @@ -2,7 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/de/email.md b/i18n/de/email.md index 59bd1800..7559fde2 100644 --- a/i18n/de/email.md +++ b/i18n/de/email.md @@ -3,7 +3,7 @@ meta_title: "Empfehlungen für verschlüsselte private E-Mail-Dienste - Privacy title: "E-Mail Dienste" icon: material/email description: Diese E-Mail-Dienstleister speichern deine E-Mails sicher und viele davon bieten auch interoperable OpenPGP-Verschlüsselung mit anderen Anbietern. -cover: email.png +cover: email.webp --- E-Mail ist praktisch eine Voraussetzung für die Nutzung aller Online-Dienste, wir empfehlen sie jedoch nicht zur Kommunikation von Mensch zu Mensch. Anstatt E-Mails für die Kontaktaufnahme mit anderen Personen zu verwenden, überleg ob du einen Instant Messenger benutzen kannst, der Forward Secrecy (auf Deutsch etwa "vorwärts gerichtete Geheimhaltung") unterstützt. diff --git a/i18n/de/encryption.md b/i18n/de/encryption.md index ea033fa7..61fc1aa1 100644 --- a/i18n/de/encryption.md +++ b/i18n/de/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/de/file-sharing.md b/i18n/de/file-sharing.md index e6e5f1a9..b174e67f 100644 --- a/i18n/de/file-sharing.md +++ b/i18n/de/file-sharing.md @@ -2,7 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. -cover: file-sharing.png +cover: file-sharing.webp --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/de/financial-services.md b/i18n/de/financial-services.md index 117ac80a..6cedefcb 100644 --- a/i18n/de/financial-services.md +++ b/i18n/de/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/de/frontends.md b/i18n/de/frontends.md index 7f7c1654..20c7c858 100644 --- a/i18n/de/frontends.md +++ b/i18n/de/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/de/mobile-browsers.md b/i18n/de/mobile-browsers.md index 3ee459e7..33d4c7e8 100644 --- a/i18n/de/mobile-browsers.md +++ b/i18n/de/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Mobile Browser für Android und iOS, welche die Privatsphäre respe title: "Mobile Browser" icon: material/cellphone-information description: Wir empfehlen aktuell diese mobilen Browser für normales bzw. nicht anonymes Surfen im Internet. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/de/multi-factor-authentication.md b/i18n/de/multi-factor-authentication.md index 2a6d7b73..fa0ab916 100644 --- a/i18n/de/multi-factor-authentication.md +++ b/i18n/de/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/de/news-aggregators.md b/i18n/de/news-aggregators.md index e535f224..6903c0e9 100644 --- a/i18n/de/news-aggregators.md +++ b/i18n/de/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/de/notebooks.md b/i18n/de/notebooks.md index 18e86a22..fa318b5c 100644 --- a/i18n/de/notebooks.md +++ b/i18n/de/notebooks.md @@ -2,7 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/de/os/macos-overview.md b/i18n/de/os/macos-overview.md index aa8a16ed..b4ce915b 100644 --- a/i18n/de/os/macos-overview.md +++ b/i18n/de/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Sicherheit - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/de/passwords.md b/i18n/de/passwords.md index e440789c..3cc11265 100644 --- a/i18n/de/passwords.md +++ b/i18n/de/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/de/productivity.md b/i18n/de/productivity.md index 929aab4b..de2ce413 100644 --- a/i18n/de/productivity.md +++ b/i18n/de/productivity.md @@ -2,7 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/de/real-time-communication.md b/i18n/de/real-time-communication.md index 6cb03489..9500ff07 100644 --- a/i18n/de/real-time-communication.md +++ b/i18n/de/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/de/router.md b/i18n/de/router.md index ab8a377f..7806baf3 100644 --- a/i18n/de/router.md +++ b/i18n/de/router.md @@ -2,7 +2,7 @@ title: "Router-Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Nachstehend sind ein paar alternative Betriebssysteme gelistet, die auf Routern, WLAN-Zugangspunkten usw. eingesetzt werden können. diff --git a/i18n/de/search-engines.md b/i18n/de/search-engines.md index c2286c08..ea5b4db9 100644 --- a/i18n/de/search-engines.md +++ b/i18n/de/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/de/tor.md b/i18n/de/tor.md index f86518ec..18075be4 100644 --- a/i18n/de/tor.md +++ b/i18n/de/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser und Netzwerk: Anonymes Surfen im Internet - Privacy Gui title: "Tor-Netzwerk" icon: simple/torproject description: Schütze dein Surfen im Internet vor neugierigen Blicken, indem du das Tor-Netzwerk nutzt, ein sicheres Netzwerk, das die Zensur umgeht. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/de/vpn.md b/i18n/de/vpn.md index 5d95e6c5..34cc00d8 100644 --- a/i18n/de/vpn.md +++ b/i18n/de/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN-Anbieter Empfehlungen und Vergleiche, kein Sponsoring u title: "VPN Anbieter" icon: material/vpn description: Dies sind die besten VPN-Anbieter zum Schutz deiner Privatsphäre und Sicherheit im Internet. Hier findest du einen Anbieter, der nicht darauf aus ist, dich auszuspionieren. -cover: vpn.png +cover: vpn.webp --- Wenn du auf der Suche nach zusätzlicher **Privatsphäre** vor deinem ISP, in einem öffentlichen Wi-Fi-Netzwerk oder beim Torrenting von Dateien bist, kann ein VPN die Lösung für dich sein, solange du die damit verbundenen Risiken verstehst. Wir sind der Meinung, dass diese Anbieter über den Rest hinausragen: diff --git a/i18n/el/android.md b/i18n/el/android.md index 6e484416..400d1a6c 100644 --- a/i18n/el/android.md +++ b/i18n/el/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/el/calendar.md b/i18n/el/calendar.md index e87d6851..2f3a4aa0 100644 --- a/i18n/el/calendar.md +++ b/i18n/el/calendar.md @@ -2,7 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/el/cloud.md b/i18n/el/cloud.md index 98a52da7..080217e7 100644 --- a/i18n/el/cloud.md +++ b/i18n/el/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/el/cryptocurrency.md b/i18n/el/cryptocurrency.md index 5db3fcd9..0678ce8d 100644 --- a/i18n/el/cryptocurrency.md +++ b/i18n/el/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/el/data-redaction.md b/i18n/el/data-redaction.md index 4dd9a4d0..5e8cc4ad 100644 --- a/i18n/el/data-redaction.md +++ b/i18n/el/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/el/desktop-browsers.md b/i18n/el/desktop-browsers.md index 97d865dd..2cf026a4 100644 --- a/i18n/el/desktop-browsers.md +++ b/i18n/el/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Περιηγητές ιστού, οι οποίοι σέβονται title: "Περιηγητές Επιφάνειας Εργασίας" icon: material/laptop description: Αυτοί οι περιηγητές ιστού προασπίζουν την ιδιωτικότητα σε σημαντικότερο βαθμό από το Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/el/desktop.md b/i18n/el/desktop.md index 4d7724ba..79c52e75 100644 --- a/i18n/el/desktop.md +++ b/i18n/el/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/el/dns.md b/i18n/el/dns.md index 9ee5d3d6..61f4a228 100644 --- a/i18n/el/dns.md +++ b/i18n/el/dns.md @@ -2,7 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. -cover: dns.png +cover: dns.webp --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/el/email-clients.md b/i18n/el/email-clients.md index 94cf798b..c02dae71 100644 --- a/i18n/el/email-clients.md +++ b/i18n/el/email-clients.md @@ -2,7 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/el/email.md b/i18n/el/email.md index 3a538647..b618dc09 100644 --- a/i18n/el/email.md +++ b/i18n/el/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. -cover: email.png +cover: email.webp --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/el/encryption.md b/i18n/el/encryption.md index ea033fa7..61fc1aa1 100644 --- a/i18n/el/encryption.md +++ b/i18n/el/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/el/file-sharing.md b/i18n/el/file-sharing.md index e6e5f1a9..b174e67f 100644 --- a/i18n/el/file-sharing.md +++ b/i18n/el/file-sharing.md @@ -2,7 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. -cover: file-sharing.png +cover: file-sharing.webp --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/el/financial-services.md b/i18n/el/financial-services.md index 117ac80a..6cedefcb 100644 --- a/i18n/el/financial-services.md +++ b/i18n/el/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/el/frontends.md b/i18n/el/frontends.md index 7f7c1654..20c7c858 100644 --- a/i18n/el/frontends.md +++ b/i18n/el/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/el/mobile-browsers.md b/i18n/el/mobile-browsers.md index b6f68ae4..8d7b0e9e 100644 --- a/i18n/el/mobile-browsers.md +++ b/i18n/el/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/el/multi-factor-authentication.md b/i18n/el/multi-factor-authentication.md index 2a6d7b73..fa0ab916 100644 --- a/i18n/el/multi-factor-authentication.md +++ b/i18n/el/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/el/news-aggregators.md b/i18n/el/news-aggregators.md index 8342bfde..fdcd5166 100644 --- a/i18n/el/news-aggregators.md +++ b/i18n/el/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/el/notebooks.md b/i18n/el/notebooks.md index 18e86a22..fa318b5c 100644 --- a/i18n/el/notebooks.md +++ b/i18n/el/notebooks.md @@ -2,7 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/el/os/macos-overview.md b/i18n/el/os/macos-overview.md index eba51f28..6a38f1f1 100644 --- a/i18n/el/os/macos-overview.md +++ b/i18n/el/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Security - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/el/passwords.md b/i18n/el/passwords.md index e440789c..3cc11265 100644 --- a/i18n/el/passwords.md +++ b/i18n/el/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/el/productivity.md b/i18n/el/productivity.md index 929aab4b..de2ce413 100644 --- a/i18n/el/productivity.md +++ b/i18n/el/productivity.md @@ -2,7 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/el/real-time-communication.md b/i18n/el/real-time-communication.md index 6cb03489..9500ff07 100644 --- a/i18n/el/real-time-communication.md +++ b/i18n/el/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/el/router.md b/i18n/el/router.md index 2139f91f..ffdab028 100644 --- a/i18n/el/router.md +++ b/i18n/el/router.md @@ -2,7 +2,7 @@ title: "Υλικολογισμικό Δρομολογητή" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Παρακάτω είναι μερικά εναλλακτικά λειτουργικά συστήματα τα οποία μπορούν να χρησιμοποιηθούν σε δρομολογητές, σημεία πρόσβασης Wi-Fi, κλπ. diff --git a/i18n/el/search-engines.md b/i18n/el/search-engines.md index c2286c08..ea5b4db9 100644 --- a/i18n/el/search-engines.md +++ b/i18n/el/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/el/tor.md b/i18n/el/tor.md index 3dcaca70..6be15141 100644 --- a/i18n/el/tor.md +++ b/i18n/el/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/el/vpn.md b/i18n/el/vpn.md index aa9d53fc..2defd0df 100644 --- a/i18n/el/vpn.md +++ b/i18n/el/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/eo/android.md b/i18n/eo/android.md index 6e484416..400d1a6c 100644 --- a/i18n/eo/android.md +++ b/i18n/eo/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/eo/calendar.md b/i18n/eo/calendar.md index e87d6851..2f3a4aa0 100644 --- a/i18n/eo/calendar.md +++ b/i18n/eo/calendar.md @@ -2,7 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/eo/cloud.md b/i18n/eo/cloud.md index 98a52da7..080217e7 100644 --- a/i18n/eo/cloud.md +++ b/i18n/eo/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/eo/cryptocurrency.md b/i18n/eo/cryptocurrency.md index 5db3fcd9..0678ce8d 100644 --- a/i18n/eo/cryptocurrency.md +++ b/i18n/eo/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/eo/data-redaction.md b/i18n/eo/data-redaction.md index 4dd9a4d0..5e8cc4ad 100644 --- a/i18n/eo/data-redaction.md +++ b/i18n/eo/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/eo/desktop-browsers.md b/i18n/eo/desktop-browsers.md index e8e13b05..0a2da32c 100644 --- a/i18n/eo/desktop-browsers.md +++ b/i18n/eo/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/eo/desktop.md b/i18n/eo/desktop.md index 4d7724ba..79c52e75 100644 --- a/i18n/eo/desktop.md +++ b/i18n/eo/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/eo/dns.md b/i18n/eo/dns.md index 9ee5d3d6..61f4a228 100644 --- a/i18n/eo/dns.md +++ b/i18n/eo/dns.md @@ -2,7 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. -cover: dns.png +cover: dns.webp --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/eo/email-clients.md b/i18n/eo/email-clients.md index 94cf798b..c02dae71 100644 --- a/i18n/eo/email-clients.md +++ b/i18n/eo/email-clients.md @@ -2,7 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/eo/email.md b/i18n/eo/email.md index 3a538647..b618dc09 100644 --- a/i18n/eo/email.md +++ b/i18n/eo/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. -cover: email.png +cover: email.webp --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/eo/encryption.md b/i18n/eo/encryption.md index ea033fa7..61fc1aa1 100644 --- a/i18n/eo/encryption.md +++ b/i18n/eo/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/eo/file-sharing.md b/i18n/eo/file-sharing.md index e6e5f1a9..b174e67f 100644 --- a/i18n/eo/file-sharing.md +++ b/i18n/eo/file-sharing.md @@ -2,7 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. -cover: file-sharing.png +cover: file-sharing.webp --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/eo/financial-services.md b/i18n/eo/financial-services.md index 117ac80a..6cedefcb 100644 --- a/i18n/eo/financial-services.md +++ b/i18n/eo/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/eo/frontends.md b/i18n/eo/frontends.md index 7f7c1654..20c7c858 100644 --- a/i18n/eo/frontends.md +++ b/i18n/eo/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/eo/mobile-browsers.md b/i18n/eo/mobile-browsers.md index b6f68ae4..8d7b0e9e 100644 --- a/i18n/eo/mobile-browsers.md +++ b/i18n/eo/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/eo/multi-factor-authentication.md b/i18n/eo/multi-factor-authentication.md index 2a6d7b73..fa0ab916 100644 --- a/i18n/eo/multi-factor-authentication.md +++ b/i18n/eo/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/eo/news-aggregators.md b/i18n/eo/news-aggregators.md index 8342bfde..fdcd5166 100644 --- a/i18n/eo/news-aggregators.md +++ b/i18n/eo/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/eo/notebooks.md b/i18n/eo/notebooks.md index 18e86a22..fa318b5c 100644 --- a/i18n/eo/notebooks.md +++ b/i18n/eo/notebooks.md @@ -2,7 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/eo/os/macos-overview.md b/i18n/eo/os/macos-overview.md index eba51f28..6a38f1f1 100644 --- a/i18n/eo/os/macos-overview.md +++ b/i18n/eo/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Security - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/eo/passwords.md b/i18n/eo/passwords.md index e440789c..3cc11265 100644 --- a/i18n/eo/passwords.md +++ b/i18n/eo/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/eo/productivity.md b/i18n/eo/productivity.md index 929aab4b..de2ce413 100644 --- a/i18n/eo/productivity.md +++ b/i18n/eo/productivity.md @@ -2,7 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/eo/real-time-communication.md b/i18n/eo/real-time-communication.md index 6cb03489..9500ff07 100644 --- a/i18n/eo/real-time-communication.md +++ b/i18n/eo/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/eo/router.md b/i18n/eo/router.md index 834c59f6..bfa8d0a3 100644 --- a/i18n/eo/router.md +++ b/i18n/eo/router.md @@ -2,7 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/eo/search-engines.md b/i18n/eo/search-engines.md index c2286c08..ea5b4db9 100644 --- a/i18n/eo/search-engines.md +++ b/i18n/eo/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/eo/tor.md b/i18n/eo/tor.md index 3dcaca70..6be15141 100644 --- a/i18n/eo/tor.md +++ b/i18n/eo/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/eo/vpn.md b/i18n/eo/vpn.md index 4af1203a..6538a869 100644 --- a/i18n/eo/vpn.md +++ b/i18n/eo/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/es/android.md b/i18n/es/android.md index 4407a57c..7ea2ff8d 100644 --- a/i18n/es/android.md +++ b/i18n/es/android.md @@ -3,7 +3,7 @@ meta_title: "Recomendaciones Android: GrapheneOS y DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Puedes sustituir el sistema operativo de tu teléfono Android por estas alternativas seguras y respetuosas con la privacidad. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/es/calendar.md b/i18n/es/calendar.md index 39583b2f..abc4241d 100644 --- a/i18n/es/calendar.md +++ b/i18n/es/calendar.md @@ -2,7 +2,7 @@ title: "Sincronización de Calendario" icon: material/calendar description: Calendarios contienen algunos de tus datos más sensibles; usa productos que apliquen el cifrado en reposo. -cover: calendar.png +cover: calendar.webp --- Los calendarios contienen algunos de sus datos más sensibles; utilice productos que implementen E2EE en reposo para evitar que un proveedor pueda leerlos. diff --git a/i18n/es/cloud.md b/i18n/es/cloud.md index 39e6e0b9..032c64cb 100644 --- a/i18n/es/cloud.md +++ b/i18n/es/cloud.md @@ -3,7 +3,7 @@ meta_title: "Los Mejores Proveedores de Almacenamiento en la Nube Privado y Segu title: "Almacenamiento en la Nube" icon: material/file-cloud description: Muchos proveedores de almacenamiento en la nube exigen que confíes plenamente en que no mirarán tus archivos. Estas son alternativas privadas. -cover: cloud.png +cover: cloud.webp --- Muchos proveedores de almacenamiento en la nube exigen que confíes plenamente en que no mirarán tus archivos. Las alternativas enumeradas a continuación eliminan la necesidad de confianza mediante la implementación de E2EE seguros. diff --git a/i18n/es/cryptocurrency.md b/i18n/es/cryptocurrency.md index 129ff955..53ae92d0 100644 --- a/i18n/es/cryptocurrency.md +++ b/i18n/es/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Blockchains Privadas de Criptomonedas - Privacy Guides" title: Criptomonedas icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Realizar pagos en línea es uno de los principales desafíos para la privacidad. Estas criptomonedas le brindan privacidad a sus transacciones (algo que **no** está garantizado por la mayoría de las criptomonedas), permitiéndole tener una alta comprensión de cómo hacer pagos privados correctamente. Le recomendamos encarecidamente que primero lea nuestro apartado de pagos antes de realizar cualquier compra: diff --git a/i18n/es/data-redaction.md b/i18n/es/data-redaction.md index cafd07a1..7ccfc860 100644 --- a/i18n/es/data-redaction.md +++ b/i18n/es/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Eliminar PII con Depuradores de Metadatos y Herramientas de Edició title: "Redacción de Datos y Metadatos" icon: material/tag-remove description: Utiliza estas herramientas para eliminar metadatos como la ubicación GPS y otros datos identificativos de las fotos y archivos que compartas. -cover: data-redaction.png +cover: data-redaction.webp --- Cuando compartas archivos, asegúrate de remover los metadatos asociados. Archivos de imagen comúnmente incluyen datos [Exif](https://en.wikipedia.org/wiki/Exif). Fotos a veces incluyen hasta coordenadas GPS en los metadatos del archivo. diff --git a/i18n/es/desktop-browsers.md b/i18n/es/desktop-browsers.md index 4015492c..ca15a5c4 100644 --- a/i18n/es/desktop-browsers.md +++ b/i18n/es/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Navegadores Web para PC y Mac que Respetan la Privacidad - Privacy title: "Navegadores de Escritorio" icon: material/laptop description: Estos navegadores web ofrecen protecciones de privacidad más sólidas que Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/es/desktop.md b/i18n/es/desktop.md index a8682351..d1f9ef01 100644 --- a/i18n/es/desktop.md +++ b/i18n/es/desktop.md @@ -2,7 +2,7 @@ title: "Escritorio/PC" icon: simple/linux description: Las distribuciones de Linux se recomiendan comúnmente para la protección de la privacidad y la libertad del software. -cover: desktop.png +cover: desktop.webp --- Las distribuciones de Linux se recomiendan comúnmente para la protección de la privacidad y la libertad del software. Si aún no utiliza Linux, a continuación le sugerimos que pruebe algunas distribuciones, así como algunos consejos generales para mejorar la privacidad y la seguridad que son aplicables a muchas distribuciones de Linux. diff --git a/i18n/es/dns.md b/i18n/es/dns.md index 142dc59c..39929923 100644 --- a/i18n/es/dns.md +++ b/i18n/es/dns.md @@ -2,7 +2,7 @@ title: "Resolvedores de DNS" icon: material/dns description: Estos son algunos proveedores de DNS cifrado a los que recomendamos cambiar para reemplazar la configuración por defecto de tu proveedor de servicios de internet. -cover: dns.png +cover: dns.webp --- Un DNS encriptado con servidores de terceros solo debe utilizarse para evitar el [bloqueo de DNS básico](https://en.wikipedia.org/wiki/DNS_blocking) cuándo puedas estar seguro de que no habrá ningunas consecuencias. Un DNS encriptado no te ayudará a esconder ninguna de tu actividad en línea. diff --git a/i18n/es/email-clients.md b/i18n/es/email-clients.md index d458f92c..837e5958 100644 --- a/i18n/es/email-clients.md +++ b/i18n/es/email-clients.md @@ -2,7 +2,7 @@ title: "Clientes de Correo Electrónico" icon: material/email-open description: Estos clientes de correo electrónico respetan la privacidad y admiten el cifrado de correo electrónico OpenPGP. -cover: email-clients.png +cover: email-clients.webp --- Nuestra lista de recomendaciones contiene clientes de correo electrónico que soportan [OpenPGP](encryption.md#openpgp) y una autenticación fuerte como [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth le permite utilizar la [Autenticación Multifactor](basics/multi-factor-authentication.md) y previene el robo de cuentas. diff --git a/i18n/es/email.md b/i18n/es/email.md index 08b3aa5f..d82db985 100644 --- a/i18n/es/email.md +++ b/i18n/es/email.md @@ -3,7 +3,7 @@ meta_title: "Recomendaciones de Correo Electrónico Privado Cifrado - Privacy Gu title: "Servicios de Correo Electrónico" icon: material/email description: Estos proveedores de correo electrónico ofrecen un lugar estupendo para almacenar tus correos de forma segura, y muchos ofrecen encriptación OpenPGP inter operable con otros proveedores. -cover: email.png +cover: email.webp --- Correo electrónico es prácticamente una necesidad para utilizar cualquier servicio en línea, sin embargo, no lo recomendamos para las conversaciones de persona a persona. En vez de utilizar el correo electrónico para comunicarte con otras personas, considera utilizar un servicio de mensajería instantánea que soporte el secreto hacia adelante. diff --git a/i18n/es/encryption.md b/i18n/es/encryption.md index f635bd3e..a285686a 100644 --- a/i18n/es/encryption.md +++ b/i18n/es/encryption.md @@ -3,7 +3,7 @@ meta_title: "Software de Cifrado Recomendado:: VeraCrypt, Cryptomator, PicoCrypt title: "Software de Cifrado" icon: material/file-lock description: El cifrado de los datos es la única forma de controlar quién puede acceder a ellos. Estas herramientas le permiten cifrar sus correos electrónicos y cualquier otro archivo. -cover: encryption.png +cover: encryption.webp --- El cifrado de los datos es la única forma de controlar quién puede acceder a ellos. Si actualmente no está utilizando software de cifrado para su disco duro, correos electrónicos o archivos, debería elegir una opción aquí. diff --git a/i18n/es/file-sharing.md b/i18n/es/file-sharing.md index a49646aa..4aabf9ea 100644 --- a/i18n/es/file-sharing.md +++ b/i18n/es/file-sharing.md @@ -2,7 +2,7 @@ title: "Compartir y sincronizar archivos" icon: material/share-variant description: Descubra cómo puede compartir de manera privada sus archivos entre sus dispositivos, con sus amigos y familia, o de manera anónima en línea. -cover: file-sharing.png +cover: file-sharing.webp --- Descubra cómo puede compartir de manera privada sus archivos entre sus dispositivos, con sus amigos y familia, o de manera anónima en línea. diff --git a/i18n/es/financial-services.md b/i18n/es/financial-services.md index 799117cd..b2e507f9 100644 --- a/i18n/es/financial-services.md +++ b/i18n/es/financial-services.md @@ -1,7 +1,7 @@ --- title: Servicios Financieros icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Realizar pagos en línea es uno de los principales desafíos para la privacidad. Estos servicios pueden ayudarle a proteger su privacidad frente a los comercios y otros rastreadores, siempre que conozca bien cómo realizar pagos privados de forma eficaz. Le recomendamos encarecidamente que primero lea nuestro apartado de pagos antes de realizar cualquier compra: diff --git a/i18n/es/frontends.md b/i18n/es/frontends.md index 64be96bb..df4c8e4d 100644 --- a/i18n/es/frontends.md +++ b/i18n/es/frontends.md @@ -2,7 +2,7 @@ title: "Interfaces de usuario" icon: material/flip-to-front description: Estas interfaces de código abierto para diversos servicios de Internet le permiten acceder a los contenidos sin JavaScript ni otras molestias. -cover: frontends.png +cover: frontends.webp --- A veces, los servicios intentarán obligarle a registrarse mediante el bloqueo al acceso a los contenidos con molestas ventanas emergentes. También pueden fallar si no se activa JavaScript. Estas interfaces pueden permitirle eludir estas restricciones. diff --git a/i18n/es/mobile-browsers.md b/i18n/es/mobile-browsers.md index 714a783a..fb5c4fb4 100644 --- a/i18n/es/mobile-browsers.md +++ b/i18n/es/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Navegadores Móviles para Android e iOS que Respetan la Privacidad title: "Navegadores Móviles" icon: material/cellphone-information description: Estos navegadores son los que recomendamos actualmente para la navegación estándar/no anónima por Internet en su teléfono. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/es/multi-factor-authentication.md b/i18n/es/multi-factor-authentication.md index e474b721..3a90b2a3 100644 --- a/i18n/es/multi-factor-authentication.md +++ b/i18n/es/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Autenticadores de Múltiples Factores" icon: 'material/two-factor-authentication' description: Estas herramientas le ayudan a proteger sus cuentas de Internet con la autenticación multifactor sin enviar sus secretos a terceros. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Llaves de Seguridad diff --git a/i18n/es/news-aggregators.md b/i18n/es/news-aggregators.md index 1d154753..4d1ffeb9 100644 --- a/i18n/es/news-aggregators.md +++ b/i18n/es/news-aggregators.md @@ -2,7 +2,7 @@ title: "Lectores de noticias" icon: material/rss description: Estos clientes para la lectura de noticias le permiten estar al día con sus páginas de noticias favoritas, utilizando estándares de Internet como RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una manera de estar al día con sus páginas de noticias favoritas. diff --git a/i18n/es/notebooks.md b/i18n/es/notebooks.md index 88c5c896..d017b595 100644 --- a/i18n/es/notebooks.md +++ b/i18n/es/notebooks.md @@ -2,7 +2,7 @@ title: "Blocs de Notas" icon: material/notebook-edit-outline description: Estas aplicaciones encriptadas para tomar notas te permiten hacer un seguimiento de tus apuntes sin cedérselos a terceros. -cover: notebooks.png +cover: notebooks.webp --- Mantén el control de tus notas y diarios sin darlos a un tercero. diff --git a/i18n/es/os/macos-overview.md b/i18n/es/os/macos-overview.md index 1ace0030..e0706a81 100644 --- a/i18n/es/os/macos-overview.md +++ b/i18n/es/os/macos-overview.md @@ -118,39 +118,37 @@ Decide si quieres anuncios personalizados en función de tu uso. - [ ] Desactiva **Anuncios Personalizados** -##### Seguridad - -Las aplicaciones de la App Store están sujetas a directrices de seguridad más estrictas, como un aislamiento más estricto. Si las únicas aplicaciones que necesitas están disponibles en el App Store, cambia el ajuste **Permitir apps descargadas de** a **App Store** para evitar ejecutar accidentalmente otras aplicaciones. Esta es una buena opción, sobre todo si estás configurando una máquina para otros usuarios menos técnicos, como los niños. - -Si decides permitir también aplicaciones de desarrolladores identificados, ten cuidado con las aplicaciones que ejecutas y dónde las obtienes. - ##### FileVault En dispositivos modernos con un Secure Enclave (Chip de Seguridad T2 de Apple, Apple Silicon), tus datos siempre están cifrados, pero son descifrados automáticamente por una clave de hardware si tu dispositivo no detecta que ha sido manipulado. Activar FileVault requiere además tu contraseña para descifrar tus datos, lo que mejora enormemente la seguridad, especialmente cuando está apagado o antes del primer inicio de sesión después de encenderlo. En los ordenadores Mac basados en Intel más antiguos, FileVault es la única forma de cifrado de disco disponible por defecto, y debería estar siempre activada. -- [x] Haz clic en **Activar** +- [x] Click **Turn On** ##### Modo hermético El [modo hermético](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) desactiva algunas características para mejorar la seguridad. Algunas aplicaciones o características funcionan diferente, a comparación de cuando se encuentra desactivado. Por ejemplo, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) y [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) son desactivados en Safari con el modo hermético activado. Recomendamos activar el modo hermético y comprobar si este afecta significativamente su uso, porque muchos de los cambios que este hace son fáciles de manejar. -- [x] Haz clic en **Activar** +- [x] Click **Turn On** ### Aleatorización de direcciones Mac -A diferencia de iOS, macOS no proveé una opción para aleatorizar tu dirección MAC en los ajustes, por lo que debes hacerlo con un comando o un script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -Puedes abrir la Terminal e ingresar este comando para aleatorizar tu dirección MAC: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 es el nombre de la interfaz a la que le estás cambiando la dirección MAC. Puede que esto no sea correcto en todos los Mac, así que para comprobarlo puedes mantener presionada la tecla Opción y seleccionar el símbolo de Wi-Fi en la parte superior derecha de la pantalla. +`en0` is the name of the interface you're changing the MAC address for. Puede que esto no sea correcto en todos los Mac, así que para comprobarlo puedes mantener presionada la tecla Opción y seleccionar el símbolo de Wi-Fi en la parte superior derecha de la pantalla. "Interface name" should be displayed at the top of the dropdown menu. -Esto se restablecerá al reiniciar. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. Esto se restablecerá al reiniciar. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Protecciones de seguridad diff --git a/i18n/es/passwords.md b/i18n/es/passwords.md index c5f52d60..3815977d 100644 --- a/i18n/es/passwords.md +++ b/i18n/es/passwords.md @@ -3,7 +3,7 @@ meta_title: "Los Mejores Administradores de Contraseñas para Proteger su Privac title: "Administradores de Contraseñas" icon: material/form-textbox-password description: Los administradores de contraseñas le permiten almacenar y administrar de forma segura contraseñas y otras credenciales. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/es/productivity.md b/i18n/es/productivity.md index 84004f46..fa1921d4 100644 --- a/i18n/es/productivity.md +++ b/i18n/es/productivity.md @@ -2,7 +2,7 @@ title: "Herramientas de Productividad" icon: material/file-sign description: La mayoría de las paquetes de ofimática en línea no admiten E2EE, lo que significa que el proveedor de la nube tiene acceso a todo lo que usted hace. -cover: productivity.png +cover: productivity.webp --- La mayoría de las paquetes de ofimática en línea no admiten E2EE, lo que significa que el proveedor de la nube tiene acceso a todo lo que usted hace. La política de privacidad puede proteger legalmente sus derechos, pero no establece limitaciones técnicas de acceso. diff --git a/i18n/es/real-time-communication.md b/i18n/es/real-time-communication.md index 8c2486d3..2694ae26 100644 --- a/i18n/es/real-time-communication.md +++ b/i18n/es/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "Los Mejores Servicios de Mensajería Instantánea - Privacy Guides" title: "Comunicación en Tiempo Real" icon: material/chat-processing description: Otros servicios de mensajería instantánea ponen todas sus conversaciones privadas a disposición de la empresa que los gestiona. -cover: real-time-communication.png +cover: real-time-communication.webp --- Estas son nuestras recomendaciones para la comunicación cifrada en tiempo real. diff --git a/i18n/es/router.md b/i18n/es/router.md index 65b8f6da..98fcabc9 100644 --- a/i18n/es/router.md +++ b/i18n/es/router.md @@ -2,7 +2,7 @@ title: "Firmware del Router" icon: material/router-wireless description: Estos sistemas operativos alternativos pueden utilizarse para proteger tu router o punto de acceso Wi-Fi. -cover: router.png +cover: router.webp --- A continuación se presentan algunos sistemas operativos alternativos, que pueden utilizarse en routers, puntos de acceso Wi-Fi, etc. diff --git a/i18n/es/search-engines.md b/i18n/es/search-engines.md index 984d9d82..ac681f6d 100644 --- a/i18n/es/search-engines.md +++ b/i18n/es/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Motores de Búsqueda Recomendados: Alternativas Anónimas a Google title: "Motores de Búsqueda" icon: material/search-web description: Estos motores de búsqueda respetuosos con la privacidad no construyen un perfil publicitario basado en sus búsquedas. -cover: search-engines.png +cover: search-engines.webp --- Utilice un motor de búsqueda que no construya un perfil publicitario basado en sus búsquedas. diff --git a/i18n/es/tor.md b/i18n/es/tor.md index 960e3e3b..4e1ef8c5 100644 --- a/i18n/es/tor.md +++ b/i18n/es/tor.md @@ -3,7 +3,7 @@ meta_title: "Navegador y Red Tor: Navegación Web Anónima - Privacy Guides" title: "Red Tor" icon: simple/torproject description: Protege tu navegación por Internet de miradas intrusas utilizando la red Tor, una red segura que elude la censura. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/es/vpn.md b/i18n/es/vpn.md index 1e1d36a8..974b3c24 100644 --- a/i18n/es/vpn.md +++ b/i18n/es/vpn.md @@ -3,7 +3,7 @@ meta_title: "Recomendaciones y Comparación de Servicios VPN Privados, Sin Patro title: "Servicios de VPN" icon: material/vpn description: Estos son los mejores servicios VPN para proteger tu privacidad y seguridad en línea. Encuentra un proveedor aquí que no esté para espiarte. -cover: vpn.png +cover: vpn.webp --- Si buscas **privacidad** adicional de tu proveedor de servicios de internet, en una red wifi pública o mientras descargando archivos Torrent, una VPN puede ser la solución para ti, siempre y cuando entiendas los riesgos que conlleva. Creemos que estos proveedores están por encima de los demás: diff --git a/i18n/fa/android.md b/i18n/fa/android.md index 6e484416..400d1a6c 100644 --- a/i18n/fa/android.md +++ b/i18n/fa/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/fa/calendar.md b/i18n/fa/calendar.md index e87d6851..2f3a4aa0 100644 --- a/i18n/fa/calendar.md +++ b/i18n/fa/calendar.md @@ -2,7 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/fa/cloud.md b/i18n/fa/cloud.md index b0b6af86..43f340d5 100644 --- a/i18n/fa/cloud.md +++ b/i18n/fa/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/fa/cryptocurrency.md b/i18n/fa/cryptocurrency.md index 5db3fcd9..0678ce8d 100644 --- a/i18n/fa/cryptocurrency.md +++ b/i18n/fa/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/fa/data-redaction.md b/i18n/fa/data-redaction.md index 4dd9a4d0..5e8cc4ad 100644 --- a/i18n/fa/data-redaction.md +++ b/i18n/fa/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/fa/desktop-browsers.md b/i18n/fa/desktop-browsers.md index 13a382ff..3328d150 100644 --- a/i18n/fa/desktop-browsers.md +++ b/i18n/fa/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "مرورگرهای دسکتاپ" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/fa/desktop.md b/i18n/fa/desktop.md index 4d7724ba..79c52e75 100644 --- a/i18n/fa/desktop.md +++ b/i18n/fa/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/fa/dns.md b/i18n/fa/dns.md index 9ee5d3d6..61f4a228 100644 --- a/i18n/fa/dns.md +++ b/i18n/fa/dns.md @@ -2,7 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. -cover: dns.png +cover: dns.webp --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/fa/email-clients.md b/i18n/fa/email-clients.md index 4ab3f1f4..7c932a12 100644 --- a/i18n/fa/email-clients.md +++ b/i18n/fa/email-clients.md @@ -2,7 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/fa/email.md b/i18n/fa/email.md index bbff7d0a..f825140a 100644 --- a/i18n/fa/email.md +++ b/i18n/fa/email.md @@ -3,7 +3,7 @@ meta_title: "توصیه های ایمیل خصوصی رمزگذاری شده - P title: "سرویس‌های ایمیل" icon: material/email description: این ارائه دهندگان ایمیل فضایی عالی برای ذخیره ایمن ایمیل‌های شما ارائه می دهند، و بسیاری از آنها رمزگذاری OpenPGP با سایر ارائه دهندگان ایمیل را ارائه می دهند. -cover: email.png +cover: email.webp --- ایمیل عملاً برای استفاده از هر سرویس آنلاین ضروری است، اما ما آن را برای مکالمات فرد به فرد توصیه نمی کنیم. به جای استفاده از ایمیل برای تماس با افراد دیگر، از یک پیام‌رسان استفاده کنید که از محرمانگی رو به جلو (forward secrecy) پشتیبانی می‌کند. diff --git a/i18n/fa/encryption.md b/i18n/fa/encryption.md index ea033fa7..61fc1aa1 100644 --- a/i18n/fa/encryption.md +++ b/i18n/fa/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/fa/file-sharing.md b/i18n/fa/file-sharing.md index e6e5f1a9..b174e67f 100644 --- a/i18n/fa/file-sharing.md +++ b/i18n/fa/file-sharing.md @@ -2,7 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. -cover: file-sharing.png +cover: file-sharing.webp --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/fa/financial-services.md b/i18n/fa/financial-services.md index 117ac80a..6cedefcb 100644 --- a/i18n/fa/financial-services.md +++ b/i18n/fa/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/fa/frontends.md b/i18n/fa/frontends.md index 7f7c1654..20c7c858 100644 --- a/i18n/fa/frontends.md +++ b/i18n/fa/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/fa/mobile-browsers.md b/i18n/fa/mobile-browsers.md index d549d8b8..ce51f730 100644 --- a/i18n/fa/mobile-browsers.md +++ b/i18n/fa/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/fa/multi-factor-authentication.md b/i18n/fa/multi-factor-authentication.md index 2a6d7b73..fa0ab916 100644 --- a/i18n/fa/multi-factor-authentication.md +++ b/i18n/fa/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/fa/news-aggregators.md b/i18n/fa/news-aggregators.md index 8342bfde..fdcd5166 100644 --- a/i18n/fa/news-aggregators.md +++ b/i18n/fa/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/fa/notebooks.md b/i18n/fa/notebooks.md index 079983cb..ab8b3f4f 100644 --- a/i18n/fa/notebooks.md +++ b/i18n/fa/notebooks.md @@ -2,7 +2,7 @@ title: "یادداشت" icon: material/notebook-edit-outline description: این برنامه های یادداشت برداری رمزگذاری شده به شما امکان می دهد یادداشت های خود را بدون دادن آنها به شخص ثالث پیگیری کنید. -cover: notebooks.png +cover: notebooks.webp --- یادداشت ها و ژورنال های خود را بدون دادن به شخص ثالث پیگیری کنید. diff --git a/i18n/fa/os/macos-overview.md b/i18n/fa/os/macos-overview.md index 0294d8ec..54c33e22 100644 --- a/i18n/fa/os/macos-overview.md +++ b/i18n/fa/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Security - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/fa/passwords.md b/i18n/fa/passwords.md index e440789c..3cc11265 100644 --- a/i18n/fa/passwords.md +++ b/i18n/fa/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/fa/productivity.md b/i18n/fa/productivity.md index 929aab4b..de2ce413 100644 --- a/i18n/fa/productivity.md +++ b/i18n/fa/productivity.md @@ -2,7 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/fa/real-time-communication.md b/i18n/fa/real-time-communication.md index 6cb03489..9500ff07 100644 --- a/i18n/fa/real-time-communication.md +++ b/i18n/fa/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/fa/router.md b/i18n/fa/router.md index 834c59f6..bfa8d0a3 100644 --- a/i18n/fa/router.md +++ b/i18n/fa/router.md @@ -2,7 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/fa/search-engines.md b/i18n/fa/search-engines.md index c2286c08..ea5b4db9 100644 --- a/i18n/fa/search-engines.md +++ b/i18n/fa/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/fa/tor.md b/i18n/fa/tor.md index 3dcaca70..6be15141 100644 --- a/i18n/fa/tor.md +++ b/i18n/fa/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/fa/vpn.md b/i18n/fa/vpn.md index c15b71fa..4c923228 100644 --- a/i18n/fa/vpn.md +++ b/i18n/fa/vpn.md @@ -3,7 +3,7 @@ meta_title: "توصیه ها و مقایسه سرویس VPN خصوصی، بدو title: "سرویس‌های VPN" icon: material/vpn description: اینها بهترین خدمات VPN برای محافظت از حریم خصوصی و امنیت آنلاین شما هستند. ارائه دهنده ای را در اینجا پیدا کنید که قصد جاسوسی از شما را نداشته باشد. -cover: vpn.png +cover: vpn.webp --- اگر به دنبال **حریم خصوصی** از ISP خود، در یک شبکه Wi-Fi عمومی، یا هنگام استفاده از تورنت هستید، VPN ممکن است راه حلی برای شما باشد تا زمانی که شما خطرات موجود را درک می کنید. ما فکر می کنیم این ارائه دهندگان بهتر از بقیه هستند: diff --git a/i18n/fr/android.md b/i18n/fr/android.md index b9220c19..41ae0383 100644 --- a/i18n/fr/android.md +++ b/i18n/fr/android.md @@ -3,7 +3,7 @@ meta_title: "Recommandations Android : GrapheneOS et DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Vous pouvez remplacer le système d'exploitation de votre téléphone Android par ces alternatives sécurisées et respectueuses de la vie privée. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/fr/calendar.md b/i18n/fr/calendar.md index 879af7eb..880168b3 100644 --- a/i18n/fr/calendar.md +++ b/i18n/fr/calendar.md @@ -2,7 +2,7 @@ title: "Synchronisation de calendrier" icon: material/calendar description: Les calendriers contiennent certaines de vos données les plus sensibles ; utilisez des produits qui implémentent le chiffrement au repos. -cover: calendar.png +cover: calendar.webp --- Les calendriers contiennent certaines de vos données les plus sensibles ; utilisez des produits qui mettent en œuvre l'E2EE au repos pour empêcher un fournisseur de les lire. diff --git a/i18n/fr/cloud.md b/i18n/fr/cloud.md index 64a6de59..af3d9a12 100644 --- a/i18n/fr/cloud.md +++ b/i18n/fr/cloud.md @@ -3,7 +3,7 @@ meta_title: "Les meilleurs services de stockage cloud privés et sécurisés - P title: "Stockage cloud" icon: material/file-cloud description: De nombreux fournisseurs de stockage cloud nécessitent que vous leur fassiez confiance pour ne pas consulter vos fichiers. Voici des alternatives privées ! -cover: cloud.png +cover: cloud.webp --- De nombreux fournisseurs de stockage cloud nécessitent que vous leur fassiez entièrement confiance pour ne pas consulter vos fichiers. Les alternatives énumérées ci-dessous éliminent le besoin de confiance en mettant en œuvre un E2EE sécurisé. diff --git a/i18n/fr/cryptocurrency.md b/i18n/fr/cryptocurrency.md index 203d7cb0..6076d7c8 100644 --- a/i18n/fr/cryptocurrency.md +++ b/i18n/fr/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Chaînes de blocs de crypto-monnaies privées - Privacy Guides" title: Crypto-monnaie icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Effectuer des paiements en ligne est l'un des plus grands défis en matière de protection de la vie privée. Ces crypto-monnaies garantissent par défaut la confidentialité des transactions (ce qui n'est **pas** garanti par la majorité des crypto-monnaies), à condition que vous ayez une bonne compréhension de la façon d'effectuer des paiements privés de manière efficace. Nous vous encourageons vivement à lire notre article sur les paiements avant d'effectuer tout achat : diff --git a/i18n/fr/data-redaction.md b/i18n/fr/data-redaction.md index 0678230a..d9773f00 100644 --- a/i18n/fr/data-redaction.md +++ b/i18n/fr/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Supprimer les DCP à l'aide de nettoyeurs de métadonnées et d'out title: "Rédaction de données et de métadonnées" icon: material/tag-remove description: Utilisez ces outils pour supprimer les métadonnées telles que la position GPS et d'autres informations d'identification des photos et des fichiers que vous partagez. -cover: data-redaction.png +cover: data-redaction.webp --- Lorsque vous partagez des fichiers, veillez à supprimer les métadonnées associées. Les fichiers d'image comprennent généralement des données [Exif](https://en.wikipedia.org/wiki/Exif) . Les photos comportent parfois même des coordonnées GPS dans les métadonnées du fichier. diff --git a/i18n/fr/desktop-browsers.md b/i18n/fr/desktop-browsers.md index de7b1a2c..9acb33fd 100644 --- a/i18n/fr/desktop-browsers.md +++ b/i18n/fr/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Navigateurs web respectueux de la vie privée pour PC et Mac - Priv title: "Navigateurs de bureau" icon: material/laptop description: Ces navigateurs web offrent des protections de la vie privée plus solides que Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/fr/desktop.md b/i18n/fr/desktop.md index 4e00e54c..94d77e01 100644 --- a/i18n/fr/desktop.md +++ b/i18n/fr/desktop.md @@ -2,7 +2,7 @@ title: "Bureau/PC" icon: simple/linux description: Les distributions Linux sont généralement recommandées pour la protection de la vie privée et la liberté logicielle. -cover: desktop.png +cover: desktop.webp --- Les distributions Linux sont généralement recommandées pour la protection de la vie privée et la liberté logicielle. Si vous n'utilisez pas encore Linux, vous trouverez ci-dessous quelques distributions que nous vous suggérons d'essayer, ainsi que des conseils généraux d'amélioration de la sécurité et de la confidentialité qui s'appliquent à de nombreuses distributions Linux. diff --git a/i18n/fr/dns.md b/i18n/fr/dns.md index 6ef526d8..d8d2960c 100644 --- a/i18n/fr/dns.md +++ b/i18n/fr/dns.md @@ -2,7 +2,7 @@ title: "Résolveurs DNS" icon: material/dns description: Voici quelques fournisseurs de DNS chiffrés que nous vous recommandons d'utiliser pour remplacer la configuration par défaut de votre FAI. -cover: dns.png +cover: dns.webp --- Les DNS chiffrés avec des serveurs tiers ne doivent être utilisés que pour contourner le [blocage DNS](https://en.wikipedia.org/wiki/DNS_blocking) de base lorsque vous pouvez être sûr qu'il n'y aura pas de conséquences. Le DNS chiffré ne vous aidera pas à dissimuler vos activités de navigation. diff --git a/i18n/fr/email-clients.md b/i18n/fr/email-clients.md index 905a2b2b..fc96a3e7 100644 --- a/i18n/fr/email-clients.md +++ b/i18n/fr/email-clients.md @@ -2,7 +2,7 @@ title: "Clients d'e-mail" icon: material/email-open description: Ces clients d'e-mail respectent la vie privée et prennent en charge le chiffrement OpenPGP. -cover: email-clients.png +cover: email-clients.webp --- Notre liste de recommandations contient des clients d'e-mail qui prennent en charge à la fois [OpenPGP](encryption.md#openpgp) et l'authentification forte telle que [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth vous permet d'utiliser l'[Authentification à Multi-Facteurs](multi-factor-authentication) et d'empêcher le vol de compte. diff --git a/i18n/fr/email.md b/i18n/fr/email.md index 26ac6566..6bdca15e 100644 --- a/i18n/fr/email.md +++ b/i18n/fr/email.md @@ -3,7 +3,7 @@ meta_title: "Recommandations de fournisseurs d'e-mail privés et chiffrés - Pri title: "Services d'e-mail" icon: material/email description: Ces fournisseurs d'e-mail constituent un excellent moyen de stocker vos e-mails en toute sécurité, et nombre d'entre eux proposent un système de chiffrement OpenPGP interopérable avec d'autres fournisseurs. -cover: email.png +cover: email.webp --- L'e-mail est pratiquement une nécessité pour utiliser n'importe quel service en ligne, mais nous ne le recommandons pas pour les conversations de particulier à particulier. Plutôt que d'utiliser l'e-mail pour contacter d'autres personnes, envisagez d'utiliser un support de messagerie instantanée qui prend en charge la confidentialité persistante. diff --git a/i18n/fr/encryption.md b/i18n/fr/encryption.md index 7624226a..48c50f2a 100644 --- a/i18n/fr/encryption.md +++ b/i18n/fr/encryption.md @@ -3,7 +3,7 @@ meta_title: "Logiciels de chiffrement recommandés : VeraCrypt, Cryptomator, Pic title: "Logiciels de chiffrement" icon: material/file-lock description: Le chiffrement des données est le seul moyen de contrôler qui peut y accéder. Ces outils vous permettent de chiffrer vos emails et tout autre fichier. -cover: encryption.png +cover: encryption.webp --- Le chiffrement des données est le seul moyen de contrôler qui peut y accéder. Si vous n'utilisez pas actuellement de logiciel de chiffrement pour votre disque dur, vos e-mails ou vos fichiers, vous devriez choisir une option ici. diff --git a/i18n/fr/file-sharing.md b/i18n/fr/file-sharing.md index 31f8a95e..abcb6c20 100644 --- a/i18n/fr/file-sharing.md +++ b/i18n/fr/file-sharing.md @@ -2,7 +2,7 @@ title: "Partage et synchronisation de fichiers" icon: material/share-variant description: Découvrez comment partager vos fichiers en toute confidentialité entre vos appareils, avec vos amis et votre famille, ou de manière anonyme en ligne. -cover: file-sharing.png +cover: file-sharing.webp --- Découvrez comment partager vos fichiers en toute confidentialité entre vos appareils, avec vos amis et votre famille, ou de manière anonyme en ligne. diff --git a/i18n/fr/financial-services.md b/i18n/fr/financial-services.md index 4f5c9640..27c777c7 100644 --- a/i18n/fr/financial-services.md +++ b/i18n/fr/financial-services.md @@ -1,7 +1,7 @@ --- title: Services financiers icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Effectuer des paiements en ligne est l'un des plus grands défis en matière de protection de la vie privée. Ces services peuvent vous aider à protéger votre vie privée contre les marchands et autres traqueurs, à condition que vous ayez une bonne compréhension de la façon d'effectuer des paiements privés de manière efficace. Nous vous encourageons vivement à lire notre article sur les paiements avant d'effectuer tout achat : diff --git a/i18n/fr/frontends.md b/i18n/fr/frontends.md index fdd79d72..818c3826 100644 --- a/i18n/fr/frontends.md +++ b/i18n/fr/frontends.md @@ -2,7 +2,7 @@ title: "Clients applicatifs" icon: material/flip-to-front description: Ces clients applicatifs open source pour divers services internet vous permettent d'accéder au contenu sans JavaScript ou d'autres inconvénients. -cover: frontends.png +cover: frontends.webp --- Parfois, des services tentent de vous obliger à créer un compte en bloquant l'accès au contenu par des fenêtres pop-up gênantes. Ils peuvent également ne pas fonctionner sans JavaScript activé. Ces interfaces client peuvent vous permettre de contourner ces restrictions. diff --git a/i18n/fr/mobile-browsers.md b/i18n/fr/mobile-browsers.md index de4edc36..b3fe4885 100644 --- a/i18n/fr/mobile-browsers.md +++ b/i18n/fr/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Navigateurs web respectueux de la vie privée pour Android et iOS - title: "Navigateurs mobiles" icon: material/cellphone-information description: Ces navigateurs sont ceux que nous recommandons actuellement pour la navigation internet standard/non anonyme sur votre téléphone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/fr/multi-factor-authentication.md b/i18n/fr/multi-factor-authentication.md index ec9fd374..15969174 100644 --- a/i18n/fr/multi-factor-authentication.md +++ b/i18n/fr/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Outils d'authentification multi-facteurs" icon: 'material/two-factor-authentication' description: Ces outils vous aident à sécuriser vos comptes internet grâce à l'authentification multifactorielle sans transmettre vos secrets à un tiers. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Clés de sécurité matérielles diff --git a/i18n/fr/news-aggregators.md b/i18n/fr/news-aggregators.md index efe1671e..e3159ca9 100644 --- a/i18n/fr/news-aggregators.md +++ b/i18n/fr/news-aggregators.md @@ -2,7 +2,7 @@ title: "Agrégateurs d'actualités" icon: material/rss description: Ces clients agrégateurs d'actualités vous permettent de suivre vos blogs et sites d'information préférés en utilisant des normes internet telles que RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- Un [agrégateur d'actualités](https://en.wikipedia.org/wiki/News_aggregator) est un moyen de suivre vos blogs et sites d'actualités préférés. diff --git a/i18n/fr/notebooks.md b/i18n/fr/notebooks.md index db36e1f2..5253355d 100644 --- a/i18n/fr/notebooks.md +++ b/i18n/fr/notebooks.md @@ -2,7 +2,7 @@ title: "Bloc-notes" icon: material/notebook-edit-outline description: Ces applications de prise de notes chiffrées vous permettent de garder une trace de vos notes sans les transmettre à un tiers. -cover: notebooks.png +cover: notebooks.webp --- Gardez une trace de vos notes et de vos journaux sans les donner à un tiers. diff --git a/i18n/fr/os/macos-overview.md b/i18n/fr/os/macos-overview.md index 052d92e5..4bf8ccad 100644 --- a/i18n/fr/os/macos-overview.md +++ b/i18n/fr/os/macos-overview.md @@ -118,39 +118,37 @@ Décidez si vous souhaitez des publicités personnalisées en fonction de votre - [ ] Décochez **Annonces personnalisées** -##### Sécurité - -Les applications de l'App Store sont soumises à des règles de sécurité plus strictes, telles que le sandboxing. Si les seules applications dont vous avez besoin sont disponibles dans l'App Store, modifiez le paramètre **Autoriser les applications téléchargées à partir de** en **App Store** pour éviter d'exécuter accidentellement d'autres applications. C'est une bonne option, en particulier si vous configurez une machine pour d'autres utilisateurs, moins techniques, tels que des enfants. - -Si vous choisissez d'autoriser également les applications de développeurs identifiés, faites attention aux applications que vous exécutez et à l'endroit où vous les obtenez. - ##### FileVault Sur les appareils modernes dotés d'une Secure Enclave (puce de sécurité T2 d'Apple, Apple silicium), vos données sont toujours chiffrées, mais elles sont déchiffrées automatiquement par une clé matérielle si votre appareil ne détecte pas qu'il a été altéré. L'activation de FileVault requiert en outre votre mot de passe pour déchiffrer vos données, ce qui améliore considérablement la sécurité, en particulier lorsque l'ordinateur est éteint ou avant la première connexion après la mise sous tension. Sur les anciens ordinateurs Mac à processeur Intel, FileVault est la seule forme de chiffrement de disque disponible par défaut et doit toujours être activé. -- [x] Cliquez sur **Activer** +- [x] Click **Turn On** ##### Mode Isolement Le [mode Isolement](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) désactive certaines fonctionnalités afin d'améliorer la sécurité. Certaines applications ou fonctionnalités ne fonctionneront pas de la même manière que lorsqu'il est désactivé. Par exemple, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) et [WASM](https://developer.mozilla.org/fr/docs/WebAssembly) sont désactivés dans Safari lorsque le mode Isolement est activé. Nous vous recommandons d'activer le mode Isolement et de voir s'il a un impact significatif sur votre utilisation, car la plupart des changements qu'il apporte sont faciles à vivre. -- [x] Cliquez sur **Activer** +- [x] Click **Turn On** ### Adresse MAC aléatoire -Contrairement à iOS, macOS ne propose pas d'option pour randomiser votre adresse MAC dans les paramètres, vous devrez donc le faire à l'aide d'une commande ou d'un script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -Vous ouvrez votre Terminal et entrez cette commande pour randomiser votre adresse MAC : +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 est le nom de l'interface dont vous modifiez l'adresse MAC. Il se peut que ce ne soit pas la bonne sur tous les Mac, donc pour vérifier, vous pouvez maintenir la touche option et cliquer sur le symbole Wi-Fi en haut à droite de votre écran. +`en0` is the name of the interface you're changing the MAC address for. Il se peut que ce ne soit pas la bonne sur tous les Mac, donc pour vérifier, vous pouvez maintenir la touche option et cliquer sur le symbole Wi-Fi en haut à droite de votre écran. "Interface name" should be displayed at the top of the dropdown menu. -Cela sera réinitialisé lors du redémarrage. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. Cela sera réinitialisé lors du redémarrage. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Protections de sécurité diff --git a/i18n/fr/passwords.md b/i18n/fr/passwords.md index 64494bdd..33c266e8 100644 --- a/i18n/fr/passwords.md +++ b/i18n/fr/passwords.md @@ -3,7 +3,7 @@ meta_title: "Les meilleurs gestionnaires de mots de passe pour protéger votre v title: "Gestionnaires de mots de passe" icon: material/form-textbox-password description: Les gestionnaires de mots de passe vous permettent de stocker et de gérer en toute sécurité des mots de passe et autres informations d'identification. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/fr/productivity.md b/i18n/fr/productivity.md index 9a704eb7..3de39bec 100644 --- a/i18n/fr/productivity.md +++ b/i18n/fr/productivity.md @@ -2,7 +2,7 @@ title: "Outils de productivité" icon: material/file-sign description: La plupart des suites bureautiques en ligne ne prennent pas en charge l'E2EE, ce qui signifie que le fournisseur de cloud a accès à tout ce que vous faites. -cover: productivity.png +cover: productivity.webp --- La plupart des suites bureautiques en ligne ne prennent pas en charge l'E2EE, ce qui signifie que le fournisseur de cloud a accès à tout ce que vous faites. La politique de confidentialité peut protéger légalement vos droits, mais elle ne fournit pas de contraintes techniques d'accès. diff --git a/i18n/fr/real-time-communication.md b/i18n/fr/real-time-communication.md index f9767a8a..27744f87 100644 --- a/i18n/fr/real-time-communication.md +++ b/i18n/fr/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "Les meilleures messageries instantanées privées - Privacy Guides" title: "Communication en temps réel" icon: material/chat-processing description: Les autres messageries instantanées mettent toutes vos conversations privées à la disposition de la société qui les gère. -cover: real-time-communication.png +cover: real-time-communication.webp --- Voici nos recommandations pour de la communication en temps réel chiffrée. diff --git a/i18n/fr/router.md b/i18n/fr/router.md index eb5fa371..086cf9a1 100644 --- a/i18n/fr/router.md +++ b/i18n/fr/router.md @@ -2,7 +2,7 @@ title: "Micrologiciel de routeur" icon: material/router-wireless description: Ces systèmes d'exploitation alternatifs peuvent être utilisés pour sécuriser votre routeur ou votre point d'accès Wi-Fi. -cover: router.png +cover: router.webp --- Vous trouverez ci-dessous quelques systèmes d'exploitation alternatifs, qui peuvent être utilisés sur des routeurs, des points d'accès Wi-Fi, etc. diff --git a/i18n/fr/search-engines.md b/i18n/fr/search-engines.md index ec6fa1ed..ddf2cd4f 100644 --- a/i18n/fr/search-engines.md +++ b/i18n/fr/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Moteurs de recherche recommandés : alternatives anonymes à Google title: "Moteurs de recherche" icon: material/search-web description: Ces moteurs de recherche respectueux de la vie privée n'établissent pas de profil publicitaire sur la base de vos recherches. -cover: search-engines.png +cover: search-engines.webp --- Utilisez un moteur de recherche qui ne construit pas un profil publicitaire en fonction de vos recherches. diff --git a/i18n/fr/tor.md b/i18n/fr/tor.md index e1c7b363..cc63657a 100644 --- a/i18n/fr/tor.md +++ b/i18n/fr/tor.md @@ -3,7 +3,7 @@ meta_title: "Navigateur et réseau Tor : navigation web anonyme - Privacy Guides title: "Réseau Tor" icon: simple/torproject description: Protégez votre navigation sur internet des regards indiscrets en utilisant le réseau Tor, un réseau sécurisé qui contourne la censure. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/fr/vpn.md b/i18n/fr/vpn.md index 53bf669c..f1a7d385 100644 --- a/i18n/fr/vpn.md +++ b/i18n/fr/vpn.md @@ -3,7 +3,7 @@ meta_title: "Recommandations et comparaison de services VPN privés, sans sponso title: "Services VPN" icon: material/vpn description: Voici les meilleurs services VPN pour protéger votre vie privée et votre sécurité en ligne. Trouvez ici un fournisseur qui ne cherche pas à vous espionner. -cover: vpn.png +cover: vpn.webp --- Si vous recherchez à protéger votre **vie privée** vis-à-vis de votre FAI, sur un réseau Wi-Fi public ou lorsque vous téléchargez des fichiers en torrent, un VPN peut être la solution pour vous, à condition que vous compreniez les risques encourus. Nous pensons que ces fournisseurs se distinguent des autres : diff --git a/i18n/he/android.md b/i18n/he/android.md index 1fa88606..b6482052 100644 --- a/i18n/he/android.md +++ b/i18n/he/android.md @@ -3,7 +3,7 @@ meta_title: "המלצות אנדרואיד: GrapheneOS ו-DivestOS - מדריכ title: "אנדרואיד" icon: 'simple/android' description: אתה יכול להחליף את מערכת ההפעלה בטלפון האנדרואיד שלך בחלופות מאובטחות ומכבדות פרטיות אלה. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/he/calendar.md b/i18n/he/calendar.md index 47c68ed2..5fd2e919 100644 --- a/i18n/he/calendar.md +++ b/i18n/he/calendar.md @@ -2,7 +2,7 @@ title: "סנכרון לוח שנה" icon: material/calendar description: לוחות שנה מכילים חלק מהנתונים הרגישים ביותר שלך; השתמש במוצרים המטמיעים הצפנה במנוחה. -cover: calendar.png +cover: calendar.webp --- לוחות שנה מכילים חלק מהנתונים הרגישים ביותר שלך; השתמש במוצרים המיישמים E2EE ב - מנוחה כדי למנוע מספק לקרוא אותם. diff --git a/i18n/he/cloud.md b/i18n/he/cloud.md index 571daffb..618dcb7f 100644 --- a/i18n/he/cloud.md +++ b/i18n/he/cloud.md @@ -3,7 +3,7 @@ meta_title: "ספקי אחסון הענן הפרטיים והמאובטחים ה title: "אחסון בענן" icon: material/file-cloud description: ספקי אחסון בענן רבים דורשים את האמון שלך שהם לא יסתכלו על הקבצים שלך. אלו חלופות פרטיות! -cover: cloud.png +cover: cloud.webp --- ספקי אחסון ענן רבים דורשים את האמון המלא שלך בכך שהם לא יסתכלו על הקבצים שלך. החלופות המפורטות להלן מבטלות את הצורך באמון על ידי הטמעת E2EE מאובטחת. diff --git a/i18n/he/cryptocurrency.md b/i18n/he/cryptocurrency.md index d988220f..63353d0b 100644 --- a/i18n/he/cryptocurrency.md +++ b/i18n/he/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "בלוקצ'יין פרטי של מטבעות קריפטו - Privacy Guides" title: מטבעות קריפטוגרפיים icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- ביצוע תשלומים אונליין הוא אחד האתגרים הגדולים ביותר לפרטיות. מטבעות קריפטוגרפיים אלו מספקים פרטיות עסקאות כברירת מחדל (דבר ש**לא** מובטח על ידי רוב מטבעות הקריפטו), בתנאי שיש לך הבנה טובה כיצד לבצע תשלומים פרטיים ביעילות. אנו ממליצים בחום שתקרא תחילה את מאמר סקירת התשלומים שלנו לפני ביצוע רכישות כלשהן: diff --git a/i18n/he/data-redaction.md b/i18n/he/data-redaction.md index 97e028a9..3657bab6 100644 --- a/i18n/he/data-redaction.md +++ b/i18n/he/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "הסר PII עם מגרדי מטא נתונים וכלי פירוק title: "הפחתת נתונים ומטא נתונים" icon: material/tag-remove description: השתמש בכלים אלה כדי להסיר מטא נתונים כמו מיקום GPS ומידע מזהה אחר מתמונות וקבצים שאתה משתף. -cover: data-redaction.png +cover: data-redaction.webp --- בעת שיתוף קבצים, הקפד להסיר מטא נתונים משויכים. קבצי תמונה כוללים בדרך כלל [נתוני Exif](https://en.wikipedia.org/wiki/Exif). תמונות לפעמים אפילו כוללות קואורדינטות GPS במטא-נתונים של הקובץ. diff --git a/i18n/he/desktop-browsers.md b/i18n/he/desktop-browsers.md index 28aa4043..13c163fc 100644 --- a/i18n/he/desktop-browsers.md +++ b/i18n/he/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "דפדפני אינטרנט המכבדים פרטיות עבור מ title: "דפדפנים שולחניים" icon: material/laptop description: דפדפני אינטרנט אלה מספקים הגנת פרטיות חזקה יותר מאשר Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/he/desktop.md b/i18n/he/desktop.md index 9d9da7fc..b7df2f5f 100644 --- a/i18n/he/desktop.md +++ b/i18n/he/desktop.md @@ -2,7 +2,7 @@ title: "שולחן עבודה/מחשב אישי" icon: simple/linux description: הפצות לינוקס מומלצות בדרך כלל להגנה על פרטיות וחופש תוכנה. -cover: desktop.png +cover: desktop.webp --- הפצות לינוקס מומלצות בדרך כלל להגנה על פרטיות וחופש תוכנה. אם אינך משתמש עדיין בלינוקס, להלן כמה הפצות שאנו מציעים לנסות, כמו גם כמה טיפים כלליים לשיפור פרטיות ואבטחה החלים על הפצות לינוקס רבות. diff --git a/i18n/he/dns.md b/i18n/he/dns.md index f394dd69..910442e3 100644 --- a/i18n/he/dns.md +++ b/i18n/he/dns.md @@ -2,7 +2,7 @@ title: "ספקי DNS" icon: material/dns description: אלו הם כמה ספקי DNS מוצפנים שאנו ממליצים לעבור אליהם, כדי להחליף את תצורת ברירת המחדל של ספק שירותי האינטרנט שלך. -cover: dns.png +cover: dns.webp --- יש להשתמש ב-DNS מוצפן עם שרתי צד שלישי רק כדי לעקוף [חסימת DNS](https://en.wikipedia.org/wiki/DNS_blocking) בסיסית כאשר אתה יכול להיות בטוח שלא יהיו השלכות. DNS מוצפן לא יעזור לך להסתיר את פעילות הגלישה שלך. diff --git a/i18n/he/email-clients.md b/i18n/he/email-clients.md index 29ac95df..8612cf2a 100644 --- a/i18n/he/email-clients.md +++ b/i18n/he/email-clients.md @@ -2,7 +2,7 @@ title: "לקוחות אימייל" icon: material/email-open description: לקוחות אימייל אלה מכבדים פרטיות ותומכים בהצפנת אימייל OpenPGP. -cover: email-clients.png +cover: email-clients.webp --- רשימת ההמלצות שלנו מכילה לקוחות אימייל התומכים הן ב[OpenPGP](encryption.md#openpgp) והן באימות חזק כגון [הרשאת פתוחה ](https://en.wikipedia.org/wiki/OAuth)(OAuth). OAuth מאפשר לך להשתמש ב - [אימות רב - גורמי](basics/multi-factor-authentication.md) ולמנוע גניבת חשבון. diff --git a/i18n/he/email.md b/i18n/he/email.md index 3dd01a5c..40913307 100644 --- a/i18n/he/email.md +++ b/i18n/he/email.md @@ -3,7 +3,7 @@ meta_title: "המלצות אימייל פרטי מוצפן - Privacy Guides" title: "שירותי אימייל" icon: material/email description: ספקי אימייל אלה מציעים מקום מצוין לאחסן את המיילים שלך בצורה מאובטחת, ורבים מציעים הצפנת OpenPGP הניתנת להפעלה הדדית עם ספקים אחרים. -cover: email.png +cover: email.webp --- אימייל הוא למעשה הכרח לשימוש בכל שירות מקוון, אולם איננו ממליצים עליו לשיחות מאדם לאדם. דואר אלקטרוני הוא למעשה הכרח שימוש בכל שירות מקוון, אולם איננו ממליצים עליו לשיחות מאדם לאדם. diff --git a/i18n/he/encryption.md b/i18n/he/encryption.md index 1ae02ee3..e0184c0e 100644 --- a/i18n/he/encryption.md +++ b/i18n/he/encryption.md @@ -3,7 +3,7 @@ meta_title: "תוכנות הצפנה מומלצות: VeraCrypt, Cryptomator, Pic title: "תוכנת הצפנה" icon: material/file-lock description: הצפנה של נתונים היא הדרך היחידה לשלוט מי יכול לגשת אליו. כלים אלה מאפשרים לך להצפין את המיילים שלך וכל קובץ אחר. -cover: encryption.png +cover: encryption.webp --- הצפנה של נתונים היא הדרך היחידה לשלוט מי יכול לגשת אליו. אם אינך משתמש כעת בתוכנת הצפנה עבור הדיסק הקשיח, הודעות הדוא"ל או הקבצים שלך, עליך לבחור אפשרות כאן. diff --git a/i18n/he/file-sharing.md b/i18n/he/file-sharing.md index 9935d682..de960ef5 100644 --- a/i18n/he/file-sharing.md +++ b/i18n/he/file-sharing.md @@ -2,7 +2,7 @@ title: "שיתוף וסנכרון קבצים" icon: material/share-variant description: גלה כיצד לשתף את הקבצים שלך באופן פרטי בין המכשירים שלך, עם החברים והמשפחה שלך, או באופן אנונימי באינטרנט. -cover: file-sharing.png +cover: file-sharing.webp --- גלה כיצד לשתף את הקבצים שלך באופן פרטי בין המכשירים שלך, עם החברים והמשפחה שלך, או באופן אנונימי באינטרנט. diff --git a/i18n/he/financial-services.md b/i18n/he/financial-services.md index a8ec1229..8567615d 100644 --- a/i18n/he/financial-services.md +++ b/i18n/he/financial-services.md @@ -1,7 +1,7 @@ --- title: שירותים פיננסיים icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- ביצוע תשלומים אונליין הוא אחד האתגרים הגדולים ביותר לפרטיות. שירותים אלה יכולים לסייע לך בהגנה על פרטיותך מפני סוחרים ועוקבים אחרים, בתנאי שיש לך הבנה טובה כיצד לבצע תשלומים פרטיים ביעילות. אנו ממליצים בחום שתקרא תחילה את מאמר סקירת התשלומים שלנו לפני ביצוע רכישות כלשהן: diff --git a/i18n/he/frontends.md b/i18n/he/frontends.md index 873f76b4..c61f05b0 100644 --- a/i18n/he/frontends.md +++ b/i18n/he/frontends.md @@ -2,7 +2,7 @@ title: "חזיתות" icon: material/flip-to-front description: ממשקי קוד פתוח אלה לשירותי אינטרנט שונים מאפשרים לך לגשת לתוכן ללא JavaScript או מטרדים אחרים. -cover: frontends.png +cover: frontends.webp --- לפעמים שירותים ינסו לאלץ אותך להירשם לחשבון על ידי חסימת גישה לתוכן עם חלונות קופצים מעצבנים. הם יכולים להישבר גם ללא הפעלת JavaScript. חזיתות אלה יכולות לאפשר לך לעקוף את ההגבלות הללו. diff --git a/i18n/he/mobile-browsers.md b/i18n/he/mobile-browsers.md index 2d79bffd..61a34963 100644 --- a/i18n/he/mobile-browsers.md +++ b/i18n/he/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "פרטיות כיבוד דפדפני אינטרנט ניידים ע title: "דפדפני אינטרנט לנייד" icon: material/cellphone-information description: דפדפנים אלו הם מה שאנו ממליצים כיום עבור גלישה רגילה/לא אנונימית באינטרנט בטלפון שלך. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/he/multi-factor-authentication.md b/i18n/he/multi-factor-authentication.md index 79a831a5..4ef05dda 100644 --- a/i18n/he/multi-factor-authentication.md +++ b/i18n/he/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "מאמתים מרובי גורמים" icon: 'material/two-factor-authentication' description: כלים אלה מסייעים לך באבטחת חשבונות האינטרנט שלך באמצעות אימות רב-גורמי מבלי לשלוח את הסודות שלך לצד שלישי. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## מפתחות אבטחה של חומרה diff --git a/i18n/he/news-aggregators.md b/i18n/he/news-aggregators.md index 3d5aa932..c657761a 100644 --- a/i18n/he/news-aggregators.md +++ b/i18n/he/news-aggregators.md @@ -2,7 +2,7 @@ title: "צוברי חדשות" icon: material/rss description: לקוחות צוברי חדשות אלה מאפשרים לך להתעדכן בבלוגים ובאתרי החדשות האהובים עליך באמצעות תקני אינטרנט כמו RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- [צובר חדשות](https://en.wikipedia.org/wiki/News_aggregator) הוא דרך להתעדכן בבלוגים ובאתרי החדשות המועדפים עליך. diff --git a/i18n/he/notebooks.md b/i18n/he/notebooks.md index 932a9031..4e723130 100644 --- a/i18n/he/notebooks.md +++ b/i18n/he/notebooks.md @@ -2,7 +2,7 @@ title: "פנקס רשימות" icon: material/notebook-edit-outline description: אפליקציות רישום רשימות-מוצפנות אלו מאפשרות לך לעקוב אחר הרשימות שלך מבלי לתת אותן לצד שלישי. -cover: notebooks.png +cover: notebooks.webp --- עקוב אחר ההערות והיומנים שלך מבלי למסור אותם לצד שלישי. diff --git a/i18n/he/os/macos-overview.md b/i18n/he/os/macos-overview.md index 74f2e343..9414fd9b 100644 --- a/i18n/he/os/macos-overview.md +++ b/i18n/he/os/macos-overview.md @@ -118,39 +118,37 @@ macOS מבצעת בדיקות מקוונות כאשר אתה פותח אפליק - [ ] בטל את הסימון של **מודעות מותאמות אישית** -##### אבטחה - -אפליקציות מ-App Store כפופות להנחיות אבטחה מחמירות יותר, כגון ארגז חול מחמיר. אם האפליקציות היחידות שאתה צריך זמינות מ-App Store, שנה את ההגדרה **אפשר הורדה של יישומים מ** ל**App Store** כדי למנוע הפעלת אפליקציות אחרות בטעות. זוהי אפשרות טובה במיוחד אם אתה מגדיר מכונה עבור משתמשים אחרים, פחות טכניים כגון ילדים. - -אם תבחר לאפשר גם אפליקציות ממפתחים מזוהים, היזהר לגבי האפליקציות שאתה מפעיל והיכן אתה משיג אותן. - ##### FileVault במכשירים מודרניים עם מובלעת מאובטחת (Apple T2 Security Chip, Apple Silicon), הנתונים שלך תמיד מוצפנים, אך מפוענחים אוטומטית על ידי מפתח חומרה אם המכשיר שלך לא מזהה שטופלו בהם. הפעלת FileVault מחייבת בנוסף את הסיסמה שלך כדי לפענח את הנתונים שלך, מה שמשפר מאוד את האבטחה, במיוחד כאשר הוא כיבוי או לפני הכניסה הראשונה לאחר ההפעלה. במחשבי Mac ישנים יותר מבוססי אינטל, FileVault היא הצורה היחידה של הצפנת דיסקים הזמינה כברירת מחדל, וצריכה להיות מופעלת תמיד. -- [x] לחץ על **הפעל** +- [x] Click **Turn On** ##### מצב נעילה [מצב נעילה](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) משבית תכונות מסוימות כדי לשפר בִּטָחוֹן. אפליקציות או תכונות מסוימות לא יפעלו כמו שהם פועלים כשהם כבויים, לדוגמה, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in -time-jit-compilers/) ו-[WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) מושבתים ב-Safari עם נעילה מצב מופעל. אנו ממליצים להפעיל את מצב הנעילה ולראות אם זה משפיע באופן משמעותי על השימוש שלך, הרבה מהשינויים שהוא עושה קלים לחיות איתם. -- [x] לחץ על **הפעל** +- [x] Click **Turn On** ### כתובת MAC אקראית -בניגוד ל-macOS, iOS לא נותן לך אפשרות לעשות אקראי את כתובת ה-MAC שלך בהגדרות, אז תצטרך לעשות זאת עם פקודה או סקריפט. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -אתה פותח את המסוף שלך ומזין את הפקודה הזו כדי להפוך את כתובת ה-MAC שלך באקראי: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 הוא שם הממשק שעבורו אתה משנה את כתובת ה-MAC. ייתכן שזה לא המתאים בכל Mac, אז כדי לבדוק אתה יכול להחזיק את מקש האפשרות וללחוץ על סמל ה- Wi-Fi בפינה השמאלית העליונה של המסך. +`en0` is the name of the interface you're changing the MAC address for. ייתכן שזה לא המתאים בכל Mac, אז כדי לבדוק אתה יכול להחזיק את מקש האפשרות וללחוץ על סמל ה- Wi-Fi בפינה השמאלית העליונה של המסך. "Interface name" should be displayed at the top of the dropdown menu. -זה יאופס עם אתחול מחדש. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. זה יאופס עם אתחול מחדש. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## הגנות אבטחה diff --git a/i18n/he/passwords.md b/i18n/he/passwords.md index bd62fd1f..7898c5ce 100644 --- a/i18n/he/passwords.md +++ b/i18n/he/passwords.md @@ -3,7 +3,7 @@ meta_title: "מנהלי הסיסמאות הטובים ביותר להגנה על title: "מנהלי סיסמאות" icon: material/form-textbox-password description: מנהלי סיסמאות מאפשרים לך לאחסן ולנהל בצורה מאובטחת סיסמאות ואישורים אחרים. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/he/productivity.md b/i18n/he/productivity.md index 21abc4e6..e11a00d8 100644 --- a/i18n/he/productivity.md +++ b/i18n/he/productivity.md @@ -2,7 +2,7 @@ title: "כלי פרודוקטיביות" icon: material/file-sign description: רוב חבילות המשרד המקוונות אינן תומכות ב-E2EE, כלומר לספק הענן יש גישה לכל מה שאתה עושה. -cover: productivity.png +cover: productivity.webp --- רוב חבילות המשרד המקוונות אינן תומכות ב-E2EE, כלומר לספק הענן יש גישה לכל מה שאתה עושה. מדיניות הפרטיות עשויה להגן על זכויותיך באופן חוקי, אך היא אינה מספקת אילוצי גישה טכניים. diff --git a/i18n/he/real-time-communication.md b/i18n/he/real-time-communication.md index 6c3af2d2..59f46434 100644 --- a/i18n/he/real-time-communication.md +++ b/i18n/he/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "ההודעות המיידיות הפרטיות הטובות ביו title: "תקשורת בזמן אמת" icon: material/chat-processing description: מסנג'רים אחרים הופכים את כל השיחות הפרטיות שלך לזמינות לחברה שמנהלת אותן. -cover: real-time-communication.png +cover: real-time-communication.webp --- אלו ההמלצות שלנו לתקשורת מוצפנת בזמן אמת. diff --git a/i18n/he/router.md b/i18n/he/router.md index d3a1ac67..d11ef552 100644 --- a/i18n/he/router.md +++ b/i18n/he/router.md @@ -2,7 +2,7 @@ title: "קושחת הנתב" icon: material/router-wireless description: ניתן להשתמש במערכות הפעלה חלופיות אלה כדי לאבטח את הנתב או נקודת הגישה ל-Wi-Fi. -cover: router.png +cover: router.webp --- להלן מספר מערכות הפעלה חלופיות, שניתן להשתמש בהן בנתבים, נקודות גישה ל-Wi-Fi וכו'. diff --git a/i18n/he/search-engines.md b/i18n/he/search-engines.md index 9c67cfac..4b256e4d 100644 --- a/i18n/he/search-engines.md +++ b/i18n/he/search-engines.md @@ -3,7 +3,7 @@ meta_title: "מנועי חיפוש מומלצים: חלופות גוגל אנו title: "מנועי חיפוש" icon: material/search-web description: מנועי החיפוש המכבדים את הפרטיות אינם בונים פרופיל פרסום על סמך החיפושים שלך. -cover: search-engines.png +cover: search-engines.webp --- השתמש במנוע חיפוש שאינו בונה פרופיל פרסום על סמך החיפושים שלך. diff --git a/i18n/he/tor.md b/i18n/he/tor.md index 43a882c3..4a55c892 100644 --- a/i18n/he/tor.md +++ b/i18n/he/tor.md @@ -3,7 +3,7 @@ meta_title: "דפדפן ורשת Tor: גלישה אנונימית באינטרנ title: "רשת טור (Tor Network)" icon: simple/torproject description: הגן על הגלישה שלך באינטרנט מעיניים סקרניות על ידי שימוש ברשת Tor, רשת מאובטחת שעוקפת צנזורה. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/he/vpn.md b/i18n/he/vpn.md index 4320a45f..9555a842 100644 --- a/i18n/he/vpn.md +++ b/i18n/he/vpn.md @@ -3,7 +3,7 @@ meta_title: "המלצות והשוואה שירותי VPN פרטיים, ללא title: "שירותי VPN" icon: material/vpn description: אלו הם שירותי ה-VPN הטובים ביותר להגנה על הפרטיות והאבטחה שלך באינטרנט. מצא כאן ספק שאינו מעוניין לרגל אחריך. -cover: vpn.png +cover: vpn.webp --- אם אתה מחפש **פרטיות** נוספת מ-ISP שלך, ברשת Wi-Fi ציבורית, או תוך כדי טורנט קבצים, VPN עשוי להיות הפתרון עבורך כל עוד אתה מבין את הסיכונים הכרוכים בכך. אנו חושבים שהספקים האלה הם חתך מעל השאר: diff --git a/i18n/hi/android.md b/i18n/hi/android.md index 6e484416..400d1a6c 100644 --- a/i18n/hi/android.md +++ b/i18n/hi/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/hi/calendar.md b/i18n/hi/calendar.md index e87d6851..2f3a4aa0 100644 --- a/i18n/hi/calendar.md +++ b/i18n/hi/calendar.md @@ -2,7 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/hi/cloud.md b/i18n/hi/cloud.md index 98a52da7..080217e7 100644 --- a/i18n/hi/cloud.md +++ b/i18n/hi/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/hi/cryptocurrency.md b/i18n/hi/cryptocurrency.md index 5db3fcd9..0678ce8d 100644 --- a/i18n/hi/cryptocurrency.md +++ b/i18n/hi/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/hi/data-redaction.md b/i18n/hi/data-redaction.md index 4dd9a4d0..5e8cc4ad 100644 --- a/i18n/hi/data-redaction.md +++ b/i18n/hi/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/hi/desktop-browsers.md b/i18n/hi/desktop-browsers.md index e8e13b05..0a2da32c 100644 --- a/i18n/hi/desktop-browsers.md +++ b/i18n/hi/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/hi/desktop.md b/i18n/hi/desktop.md index 4d7724ba..79c52e75 100644 --- a/i18n/hi/desktop.md +++ b/i18n/hi/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/hi/dns.md b/i18n/hi/dns.md index 9ee5d3d6..61f4a228 100644 --- a/i18n/hi/dns.md +++ b/i18n/hi/dns.md @@ -2,7 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. -cover: dns.png +cover: dns.webp --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/hi/email-clients.md b/i18n/hi/email-clients.md index 94cf798b..c02dae71 100644 --- a/i18n/hi/email-clients.md +++ b/i18n/hi/email-clients.md @@ -2,7 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/hi/email.md b/i18n/hi/email.md index 3a538647..b618dc09 100644 --- a/i18n/hi/email.md +++ b/i18n/hi/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. -cover: email.png +cover: email.webp --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/hi/encryption.md b/i18n/hi/encryption.md index ea033fa7..61fc1aa1 100644 --- a/i18n/hi/encryption.md +++ b/i18n/hi/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/hi/file-sharing.md b/i18n/hi/file-sharing.md index e6e5f1a9..b174e67f 100644 --- a/i18n/hi/file-sharing.md +++ b/i18n/hi/file-sharing.md @@ -2,7 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. -cover: file-sharing.png +cover: file-sharing.webp --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/hi/financial-services.md b/i18n/hi/financial-services.md index 117ac80a..6cedefcb 100644 --- a/i18n/hi/financial-services.md +++ b/i18n/hi/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/hi/frontends.md b/i18n/hi/frontends.md index 7f7c1654..20c7c858 100644 --- a/i18n/hi/frontends.md +++ b/i18n/hi/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/hi/mobile-browsers.md b/i18n/hi/mobile-browsers.md index b6f68ae4..8d7b0e9e 100644 --- a/i18n/hi/mobile-browsers.md +++ b/i18n/hi/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/hi/multi-factor-authentication.md b/i18n/hi/multi-factor-authentication.md index 2a6d7b73..fa0ab916 100644 --- a/i18n/hi/multi-factor-authentication.md +++ b/i18n/hi/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/hi/news-aggregators.md b/i18n/hi/news-aggregators.md index 8342bfde..fdcd5166 100644 --- a/i18n/hi/news-aggregators.md +++ b/i18n/hi/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/hi/notebooks.md b/i18n/hi/notebooks.md index 18e86a22..fa318b5c 100644 --- a/i18n/hi/notebooks.md +++ b/i18n/hi/notebooks.md @@ -2,7 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/hi/os/macos-overview.md b/i18n/hi/os/macos-overview.md index eba51f28..6a38f1f1 100644 --- a/i18n/hi/os/macos-overview.md +++ b/i18n/hi/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Security - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/hi/passwords.md b/i18n/hi/passwords.md index e440789c..3cc11265 100644 --- a/i18n/hi/passwords.md +++ b/i18n/hi/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/hi/productivity.md b/i18n/hi/productivity.md index 929aab4b..de2ce413 100644 --- a/i18n/hi/productivity.md +++ b/i18n/hi/productivity.md @@ -2,7 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/hi/real-time-communication.md b/i18n/hi/real-time-communication.md index 6cb03489..9500ff07 100644 --- a/i18n/hi/real-time-communication.md +++ b/i18n/hi/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/hi/router.md b/i18n/hi/router.md index 834c59f6..bfa8d0a3 100644 --- a/i18n/hi/router.md +++ b/i18n/hi/router.md @@ -2,7 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/hi/search-engines.md b/i18n/hi/search-engines.md index c2286c08..ea5b4db9 100644 --- a/i18n/hi/search-engines.md +++ b/i18n/hi/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/hi/tor.md b/i18n/hi/tor.md index 3dcaca70..6be15141 100644 --- a/i18n/hi/tor.md +++ b/i18n/hi/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/hi/vpn.md b/i18n/hi/vpn.md index 4af1203a..6538a869 100644 --- a/i18n/hi/vpn.md +++ b/i18n/hi/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/hu/android.md b/i18n/hu/android.md index 919e75d1..05f4b18e 100644 --- a/i18n/hu/android.md +++ b/i18n/hu/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/hu/calendar.md b/i18n/hu/calendar.md index 21185dac..84d28333 100644 --- a/i18n/hu/calendar.md +++ b/i18n/hu/calendar.md @@ -2,7 +2,7 @@ title: "Naptár Szinkronizálás" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- A naptárak a legérzékenyebb adataidat tartalmazzák; használj at rest End-to-End titkosítást megvalósító termékeket, hogy megakadályozd, hogy a szolgáltató elolvassa ezeket. diff --git a/i18n/hu/cloud.md b/i18n/hu/cloud.md index 2c48683c..1bcf5992 100644 --- a/i18n/hu/cloud.md +++ b/i18n/hu/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Felhőtárhely" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Sok felhőalapú tárhelyszolgáltatónak elvárása a teljes bizalmad abban, hogy nem fogják megnézni a fájljaidat. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/hu/cryptocurrency.md b/i18n/hu/cryptocurrency.md index 02d3e635..2a3f47c6 100644 --- a/i18n/hu/cryptocurrency.md +++ b/i18n/hu/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/hu/data-redaction.md b/i18n/hu/data-redaction.md index e6f84418..3afee72f 100644 --- a/i18n/hu/data-redaction.md +++ b/i18n/hu/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Adat és Metaadat Visszatartás" icon: material/tag-remove description: Ezekkel az eszközökkel eltávolíthatod a metaadatokat, például a GPS-helyadatokat és más azonosító információkat a megosztott fényképekről és fájlokról. -cover: data-redaction.png +cover: data-redaction.webp --- Fájlok megosztásakor ügyelj a kapcsolódó metaadatok eltávolítsára. A képfájlok gyakran tartalmaznak [Exif](https://en.wikipedia.org/wiki/Exif) adatokat. A fényképek időnként még GPS-koordinátákat is tartalmaznak a fájl metaadataiban. diff --git a/i18n/hu/desktop-browsers.md b/i18n/hu/desktop-browsers.md index 034d280b..fcc76f8c 100644 --- a/i18n/hu/desktop-browsers.md +++ b/i18n/hu/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/hu/desktop.md b/i18n/hu/desktop.md index 13942b2b..bf509dc3 100644 --- a/i18n/hu/desktop.md +++ b/i18n/hu/desktop.md @@ -2,7 +2,7 @@ title: "Asztal/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/hu/dns.md b/i18n/hu/dns.md index 46da5321..06078212 100644 --- a/i18n/hu/dns.md +++ b/i18n/hu/dns.md @@ -2,7 +2,7 @@ title: "DNS Resolverek" icon: material/dns description: Ezekre a titkosított DNS-szolgáltatókra való átállást javasoljuk, hogy lecseréld az internetszolgáltatód alapértelmezett konfigurációját. -cover: dns.png +cover: dns.webp --- Titkosított DNS-t harmadik féltől származó szerverekkel csak alapvető [DNS-blokkolás](https://en.wikipedia.org/wiki/DNS_blocking) megkerülésére kellene használni, ha biztos vagy benne, hogy annak nem lesz semmilyen következménye. A titkosított DNS nem fog segíteni elrejteni a böngészési tevékenységedet. diff --git a/i18n/hu/email-clients.md b/i18n/hu/email-clients.md index 581bc577..81ad0e46 100644 --- a/i18n/hu/email-clients.md +++ b/i18n/hu/email-clients.md @@ -2,7 +2,7 @@ title: "Email kliensek" icon: material/email-open description: Ezek az e-mail kliensek tiszteletben tartják a magánéletet és támogatják az OpenPGP email titkosítást. -cover: email-clients.png +cover: email-clients.webp --- Ajánlási listánk olyan e-mail klienseket tartalmaz, amelyek támogatják mind az [OpenPGP](encryption.md#openpgp)-t és az erős hitelesítést, például az [Open Authorization-t (OAuth-ot)](https://en.wikipedia.org/wiki/OAuth). Az OAuth lehetővé teszi a [többlépcsős hitelesítés használatát](basics/multi-factor-authentication.md) és a fiók ellopásának megelőzését. diff --git a/i18n/hu/email.md b/i18n/hu/email.md index 6dd6101d..303c63bb 100644 --- a/i18n/hu/email.md +++ b/i18n/hu/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email szolgáltatások" icon: material/email description: Ezek az e-mail szolgáltatók nagyszerű helyet kínálnak az e-mailek biztonságos tárolására, és sokan kínálnak más szolgáltatókkal együttműködő OpenPGP titkosítást. -cover: email.png +cover: email.webp --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/hu/encryption.md b/i18n/hu/encryption.md index 545220ae..3990dd5b 100644 --- a/i18n/hu/encryption.md +++ b/i18n/hu/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Titkosító Szoftverek" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/hu/file-sharing.md b/i18n/hu/file-sharing.md index f1a79fd3..fef52b8f 100644 --- a/i18n/hu/file-sharing.md +++ b/i18n/hu/file-sharing.md @@ -2,7 +2,7 @@ title: "Fájlmegosztás és Szinkronizálás" icon: material/share-variant description: Fedezd fel, hogyan oszthatod meg fájljaid privát módon készülékek között, barátaiddal és családtagjaiddal vagy névtelenül online. -cover: file-sharing.png +cover: file-sharing.webp --- Fedezd fel, hogyan oszthatod meg fájljaid privát módon készülékek között, barátaiddal és családtagjaiddal vagy névtelenül online. diff --git a/i18n/hu/financial-services.md b/i18n/hu/financial-services.md index f55625a0..6d7c4dff 100644 --- a/i18n/hu/financial-services.md +++ b/i18n/hu/financial-services.md @@ -1,7 +1,7 @@ --- title: Pénzügyi Szolgáltatások icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/hu/frontends.md b/i18n/hu/frontends.md index 2773422f..c78e7fda 100644 --- a/i18n/hu/frontends.md +++ b/i18n/hu/frontends.md @@ -2,7 +2,7 @@ title: "Frontendek" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/hu/mobile-browsers.md b/i18n/hu/mobile-browsers.md index 94ee87fc..000581fc 100644 --- a/i18n/hu/mobile-browsers.md +++ b/i18n/hu/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/hu/multi-factor-authentication.md b/i18n/hu/multi-factor-authentication.md index fd1c5780..19fcd29a 100644 --- a/i18n/hu/multi-factor-authentication.md +++ b/i18n/hu/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/hu/news-aggregators.md b/i18n/hu/news-aggregators.md index fb44a381..d5dfc5b0 100644 --- a/i18n/hu/news-aggregators.md +++ b/i18n/hu/news-aggregators.md @@ -2,7 +2,7 @@ title: "Híraggregátorok" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/hu/notebooks.md b/i18n/hu/notebooks.md index 2fe34fdf..0eee8bf2 100644 --- a/i18n/hu/notebooks.md +++ b/i18n/hu/notebooks.md @@ -2,7 +2,7 @@ title: "Jegyzetfüzetek" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Kövesd nyomon jegyzeteid és naplóid anélkül, hogy harmadik félnek adnád át azokat. diff --git a/i18n/hu/os/macos-overview.md b/i18n/hu/os/macos-overview.md index 32a6baf9..6a38f1f1 100644 --- a/i18n/hu/os/macos-overview.md +++ b/i18n/hu/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Adatbiztonság - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/hu/passwords.md b/i18n/hu/passwords.md index c59166af..32e1dd1c 100644 --- a/i18n/hu/passwords.md +++ b/i18n/hu/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Jelszókezelők" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/hu/productivity.md b/i18n/hu/productivity.md index ecf7edad..568d77da 100644 --- a/i18n/hu/productivity.md +++ b/i18n/hu/productivity.md @@ -2,7 +2,7 @@ title: "Produktivitás Eszközök" icon: material/file-sign description: A legtöbb online irodai programcsomag nem támogatja az End-to-End titkosítást, ami azt jelenti, hogy a felhőszolgáltató hozzáfér mindenhez, amit csinálsz. -cover: productivity.png +cover: productivity.webp --- A legtöbb online irodai programcsomag nem támogatja az End-to-End titkosítást, ami azt jelenti, hogy a felhőszolgáltató hozzáfér mindenhez, amit csinálsz. Az adatvédelmi tájékoztató törvényileg védheti a jogaidat, de nem biztosít technikai hozzáférési korlátokat. diff --git a/i18n/hu/real-time-communication.md b/i18n/hu/real-time-communication.md index 68232580..a448e239 100644 --- a/i18n/hu/real-time-communication.md +++ b/i18n/hu/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Videó streamelő kliensek" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/hu/router.md b/i18n/hu/router.md index c2a486ab..4c1bf9ed 100644 --- a/i18n/hu/router.md +++ b/i18n/hu/router.md @@ -2,7 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Lejjebb bemutatunk néhány alternatív operációs rendszert, amelyek használhatók routereken, Wi-Fi hozzáférési pontokon, stb. diff --git a/i18n/hu/search-engines.md b/i18n/hu/search-engines.md index 8292949b..90b32197 100644 --- a/i18n/hu/search-engines.md +++ b/i18n/hu/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Keresőmotorok" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/hu/tor.md b/i18n/hu/tor.md index 8bcaccd1..a92ada53 100644 --- a/i18n/hu/tor.md +++ b/i18n/hu/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Böngésző és Hálózat: Névtelen Webes Böngészés - Priva title: "Tor Hálózat" icon: simple/torproject description: Védd meg internetes böngészésed a kíváncsi szemek elől a Tor hálózat, egy biztonságos hálózat használatával, amely megkerüli a cenzúrát. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/hu/vpn.md b/i18n/hu/vpn.md index 70e6171f..9a15b1f5 100644 --- a/i18n/hu/vpn.md +++ b/i18n/hu/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Szolgáltatások" icon: material/vpn description: Ezek a legjobb VPN-szolgáltatások az online magánéleted és biztonságod megvédéséhez. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/id/android.md b/i18n/id/android.md index ffe7d99a..2539071a 100644 --- a/i18n/id/android.md +++ b/i18n/id/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/id/calendar.md b/i18n/id/calendar.md index 393e6176..fe40cc31 100644 --- a/i18n/id/calendar.md +++ b/i18n/id/calendar.md @@ -2,7 +2,7 @@ title: "Sinkronisasi Kalender" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/id/cloud.md b/i18n/id/cloud.md index d2b23c44..21f520a7 100644 --- a/i18n/id/cloud.md +++ b/i18n/id/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Penyimpanan Cloud" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/id/cryptocurrency.md b/i18n/id/cryptocurrency.md index 872e144a..7f0bb888 100644 --- a/i18n/id/cryptocurrency.md +++ b/i18n/id/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Mata Uang Kripto icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Melakukan pembayaran secara daring adalah salah satu tantangan terbesar bagi privasi. Mata uang kripto di bawah ini menyediakan privasi transaksi secara bawaan (sesuatu yang **tidak** dijamin oleh sebagian besar mata uang kripto), asalkan Anda memiliki pemahaman yang kuat tentang cara melakukan pembayaran pribadi secara efektif. Kami sangat menyarankan Anda untuk membaca artikel ikhtisar pembayaran kami terlebih dahulu sebelum melakukan pembelian: diff --git a/i18n/id/data-redaction.md b/i18n/id/data-redaction.md index dc6d8f93..bc4c1201 100644 --- a/i18n/id/data-redaction.md +++ b/i18n/id/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Hapus PII dengan Penghapus Metadata dan Alat Peyunting Data - Priva title: "Penyuntingan Data dan Metadata" icon: material/tag-remove description: Gunakan alat bantu ini untuk menghapus metadata seperti lokasi GPS dan informasi identifikasi lainnya dari foto dan file yang Anda bagikan. -cover: data-redaction.png +cover: data-redaction.webp --- Saat berbagi file, pastikan untuk menghapus metadata terkait. File gambar biasanya menyertakan data [Exif](https://en.wikipedia.org/wiki/Exif). Foto terkadang bahkan menyertakan koordinat GPS dalam metadata file. diff --git a/i18n/id/desktop-browsers.md b/i18n/id/desktop-browsers.md index c4786fc5..dbd9213d 100644 --- a/i18n/id/desktop-browsers.md +++ b/i18n/id/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Browser Web yang Menghargai Privasi untuk PC dan Mac - Privacy Guid title: "Browser Dekstop" icon: material/laptop description: Browser web ini memberikan perlindungan privasi yang lebih kuat daripada Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/id/desktop.md b/i18n/id/desktop.md index 387de8c1..3e0be69a 100644 --- a/i18n/id/desktop.md +++ b/i18n/id/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/id/dns.md b/i18n/id/dns.md index 06fc546c..a3dcc66c 100644 --- a/i18n/id/dns.md +++ b/i18n/id/dns.md @@ -2,7 +2,7 @@ title: "Penyelesai DNS" icon: material/dns description: Berikut ini adalah beberapa penyedia DNS terenkripsi yang kami sarankan yang bisa digunakan untuk menggantikan konfigurasi bawaan ISP Anda. -cover: dns.png +cover: dns.webp --- DNS terenkripsi dengan server pihak ketiga sebaiknya hanya digunakan untuk mengatasi pemblokiran [DNS dasar](https://en.wikipedia.org/wiki/DNS_blocking) ketika Anda yakin tidak akan ada konsekuensi apa pun. DNS yang terenkripsi tidak akan membantu menyembunyikan aktivitas penjelajahan Anda. diff --git a/i18n/id/email-clients.md b/i18n/id/email-clients.md index 549dc550..09874207 100644 --- a/i18n/id/email-clients.md +++ b/i18n/id/email-clients.md @@ -2,7 +2,7 @@ title: "Klien Email" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/id/email.md b/i18n/id/email.md index 189b6f3f..b12e198d 100644 --- a/i18n/id/email.md +++ b/i18n/id/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Layanan Surel" icon: material/email description: Penyedia surel ini menawarkan tempat yang baik untuk menyimpan surel Anda dengan aman, dan banyak yang menawarkan enkripsi OpenPGP yang dapat dioperasikan dengan penyedia lain. -cover: email.png +cover: email.webp --- Surel bisa dibilang merupakan kebutuhan untuk menggunakan layanan daring apa pun, namun kami tidak merekomendasikannya untuk percakapan antar orang. Daripada menggunakan surel untuk menghubungi orang lain, pertimbangkan untuk menggunakan media pesan instan yang mendukung kerahasiaan penerusan. diff --git a/i18n/id/encryption.md b/i18n/id/encryption.md index 7978ebf0..e217dcdb 100644 --- a/i18n/id/encryption.md +++ b/i18n/id/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Perangkat Lunak Enkripsi" icon: material/file-lock description: Enkripsi data adalah satu-satunya cara untuk mengendalikan siapa saja yang dapat mengaksesnya. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Enkripsi data adalah satu-satunya cara untuk mengendalikan siapa saja yang dapat mengaksesnya. Jika saat ini Anda tidak menggunakan perangkat lunak enkripsi untuk perangkat penyimpanan, surel, atau berkas Anda, Anda seharusnya memilih opsi di sini. diff --git a/i18n/id/file-sharing.md b/i18n/id/file-sharing.md index e8fa1eaa..14536473 100644 --- a/i18n/id/file-sharing.md +++ b/i18n/id/file-sharing.md @@ -2,7 +2,7 @@ title: "Berbagi dan Sinkronisasi File" icon: material/share-variant description: Temukan cara berbagi file secara pribadi di antara perangkat Anda, dengan teman dan keluarga, atau secara anonim secara online. -cover: file-sharing.png +cover: file-sharing.webp --- Temukan cara berbagi file secara pribadi di antara perangkat Anda, dengan teman dan keluarga, atau secara anonim secara online. diff --git a/i18n/id/financial-services.md b/i18n/id/financial-services.md index e9b0f09b..4e0e5bad 100644 --- a/i18n/id/financial-services.md +++ b/i18n/id/financial-services.md @@ -1,7 +1,7 @@ --- title: Jasa Keuangan icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/id/frontends.md b/i18n/id/frontends.md index 1cdd5457..f3445c0b 100644 --- a/i18n/id/frontends.md +++ b/i18n/id/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/id/mobile-browsers.md b/i18n/id/mobile-browsers.md index a9efe84b..1bf7a9bf 100644 --- a/i18n/id/mobile-browsers.md +++ b/i18n/id/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Peramban Seluler" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/id/multi-factor-authentication.md b/i18n/id/multi-factor-authentication.md index 7c954721..e2323a81 100644 --- a/i18n/id/multi-factor-authentication.md +++ b/i18n/id/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/id/news-aggregators.md b/i18n/id/news-aggregators.md index 980e5a44..a90985f2 100644 --- a/i18n/id/news-aggregators.md +++ b/i18n/id/news-aggregators.md @@ -2,7 +2,7 @@ title: "Agregator Berita" icon: material/rss description: Klien agregator berita ini memungkinkan Anda mengikuti blog dan situs berita favorit Anda menggunakan standar internet seperti RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- [Agregator berita](https://en.wikipedia.org/wiki/News_aggregator) adalah cara untuk mengikuti blog dan situs berita favorit Anda. diff --git a/i18n/id/notebooks.md b/i18n/id/notebooks.md index 316adcab..48d59374 100644 --- a/i18n/id/notebooks.md +++ b/i18n/id/notebooks.md @@ -2,7 +2,7 @@ title: "Buku Catatan" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/id/os/macos-overview.md b/i18n/id/os/macos-overview.md index 9f99fa77..5f97bb10 100644 --- a/i18n/id/os/macos-overview.md +++ b/i18n/id/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Keamanan - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/id/passwords.md b/i18n/id/passwords.md index dbda7893..6d304dee 100644 --- a/i18n/id/passwords.md +++ b/i18n/id/passwords.md @@ -3,7 +3,7 @@ meta_title: "Pengelola Kata Sandi Terbaik untuk Melindungi Privasi dan Keamanan title: "Pengelola Kata Sandi" icon: material/form-textbox-password description: Pengelola kata sandi memungkinkan Anda menyimpan dan mengelola kata sandi dan kredensial lainnya dengan aman. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/id/productivity.md b/i18n/id/productivity.md index ccbf69d8..67938b90 100644 --- a/i18n/id/productivity.md +++ b/i18n/id/productivity.md @@ -2,7 +2,7 @@ title: "Alat Produktivitas" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/id/real-time-communication.md b/i18n/id/real-time-communication.md index 2079bcf9..3785ff13 100644 --- a/i18n/id/real-time-communication.md +++ b/i18n/id/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Komunikasi Real-Time" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/id/router.md b/i18n/id/router.md index 24b75ac8..852d6904 100644 --- a/i18n/id/router.md +++ b/i18n/id/router.md @@ -2,7 +2,7 @@ title: "Firmware Router" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/id/search-engines.md b/i18n/id/search-engines.md index 4ba9c543..3b9ed5ec 100644 --- a/i18n/id/search-engines.md +++ b/i18n/id/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Mesin Pencari" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/id/tor.md b/i18n/id/tor.md index 5ffbdb76..9dabfcb4 100644 --- a/i18n/id/tor.md +++ b/i18n/id/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Jaringan Tor" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/id/vpn.md b/i18n/id/vpn.md index 9f2f420b..bff801ce 100644 --- a/i18n/id/vpn.md +++ b/i18n/id/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "Layanan VPN" icon: material/vpn description: Ini adalah layanan VPN terbaik untuk melindungi privasi dan keamanan daring Anda. Temukan penyedia di sini yang tidak memata-matai Anda. -cover: vpn.png +cover: vpn.webp --- Jika Anda mencari **privasi tambahan** dari ISP Anda, pada jaringan Wi-Fi publik, atau saat melakukan torrent file, VPN bisa jadi solusi untuk Anda selama Anda memahami risiko yang ada. Menurut kami, penyedia layanan ini adalah yang terbaik di antara yang lain: diff --git a/i18n/it/android.md b/i18n/it/android.md index 2debd3de..41cd17f0 100644 --- a/i18n/it/android.md +++ b/i18n/it/android.md @@ -3,7 +3,7 @@ meta_title: "Consigli su Android: GrapheneOS e DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Puoi sostituire il sistema operativo sul tuo telefono Android con queste alternative sicure e rispettose della privacy. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/it/calendar.md b/i18n/it/calendar.md index f710bfb8..55872a65 100644 --- a/i18n/it/calendar.md +++ b/i18n/it/calendar.md @@ -2,7 +2,7 @@ title: "Sincronizzazione del calendario" icon: material/calendar description: I calendari contengono alcuni dei tuoi dati più sensibili; utilizza prodotti che implementino la crittografia a riposo. -cover: calendar.png +cover: calendar.webp --- I calendari contengono alcuni dei tuoi dati più sensibili; utilizza prodotti che implementino l'E2EE a riposo, per impedire al fornitore di leggerli. diff --git a/i18n/it/cloud.md b/i18n/it/cloud.md index 8e9536de..5a2a9bda 100644 --- a/i18n/it/cloud.md +++ b/i18n/it/cloud.md @@ -3,7 +3,7 @@ meta_title: "I migliori fornitori di archiviazione su cloud privati e sicuri - P title: "Archiviazione su Cloud" icon: material/file-cloud description: Molti fornitori di spazio d'archiviazione su cloud richiedono ti richiedono di affidarti al fatto che non guarderanno i tuoi file. Queste sono alternative private! -cover: cloud.png +cover: cloud.webp --- Molti fornitori di spazio di archiviazione su cloud richiedono la tua totale fiducia sul fatto che non guarderanno i tuoi file. Le alternative elencate di seguito eliminano la necessità di fiducia implementando l'E2EE. diff --git a/i18n/it/cryptocurrency.md b/i18n/it/cryptocurrency.md index 90cf0e01..c516b326 100644 --- a/i18n/it/cryptocurrency.md +++ b/i18n/it/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Blockchain di criptovalute private - Privacy Guides" title: Criptovalute icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Effettuare pagamenti online è una delle maggiori sfide per la privacy. Queste criptovalute offrono la privacy delle transazioni di default (cosa che **non** è garantita dalla maggior parte delle criptovalute), a condizione che si abbia una buona conoscenza di come effettuare pagamenti privati in modo efficace. Ti consigliamo vivamente di leggere prima il nostro articolo panoramico sui pagamenti prima di effettuare qualsiasi acquisto: diff --git a/i18n/it/data-redaction.md b/i18n/it/data-redaction.md index 24386261..3a62672f 100644 --- a/i18n/it/data-redaction.md +++ b/i18n/it/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Rimuovere le PII cancellando i metadati e con gli strumenti di reda title: "Rimozione di dati e metadati" icon: material/tag-remove description: Utilizza questi strumenti per rimuovere metadati come la posizione GPS e altre informazioni identificative dalle foto e dai file che condividi. -cover: data-redaction.png +cover: data-redaction.webp --- Condividendo dei file, assicurati di rimuovere i metadati associati. I file immagine includono comunemente dati [Exif](https://en.wikipedia.org/wiki/Exif). I metadata delle foto, a volte, includono anche le coordinate GPS. diff --git a/i18n/it/desktop-browsers.md b/i18n/it/desktop-browsers.md index 942817ae..10fd23dd 100644 --- a/i18n/it/desktop-browsers.md +++ b/i18n/it/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Browser web che rispettano la privacy per PC e Mac - Privacy Guides title: "Browser desktop" icon: material/laptop description: Questi browser web offrono una maggiore protezione della privacy rispetto a Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/it/desktop.md b/i18n/it/desktop.md index facecbe0..411a6bfe 100644 --- a/i18n/it/desktop.md +++ b/i18n/it/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Le distribuzioni di Linux sono consigliate per la protezione della privcy e la libertà dei software. -cover: desktop.png +cover: desktop.webp --- Le distribuzioni di Linux sono comunemente consigliate per la protezione della privacy e la libertà dei software. Se non utilizzi già Linux, seguono alcune distribuzioni che suggeriamo di provare, nonché consigli generali sul miglioramento della privacy e della sicurezza, applicabili a molte distribuzioni di Linux. diff --git a/i18n/it/dns.md b/i18n/it/dns.md index 01f02189..e27cb7c2 100644 --- a/i18n/it/dns.md +++ b/i18n/it/dns.md @@ -2,7 +2,7 @@ title: "Risolutori DNS" icon: material/dns description: Questi sono alcuni dei fornitori DNS crittografati cui consigliamo di passare, per sostituire la configurazione predefinita del tuo ISP. -cover: dns.png +cover: dns.webp --- I DNS crittografati con server di terze parti dovrebbero essere utilizzati soltanto per aggirare il [blocco DNS](https://en.wikipedia.org/wiki/DNS_blocking) di base, quando si può esser certi che non vi sarà alcuna conseguenza. Il DNS crittografato non ti aiuterà a nascondere alcuna tua attività di navigazione. diff --git a/i18n/it/email-clients.md b/i18n/it/email-clients.md index 9fa3cbac..70102188 100644 --- a/i18n/it/email-clients.md +++ b/i18n/it/email-clients.md @@ -2,7 +2,7 @@ title: "Client Email" icon: material/email-open description: Questi client email rispettano la privacy e supportano la crittografia OpenPGP. -cover: email-clients.png +cover: email-clients.webp --- Il nostro elenco di consigli contiene i client email che supportano sia [OpenPGP](encryption.md#openpgp) che l'autenticazione forte, come [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth consente di utilizzare l'[autenticazione a più fattori](basics/multi-factor-authentication.md) e di prevenire il furto del profilo. diff --git a/i18n/it/email.md b/i18n/it/email.md index bef01c62..07db1b9b 100644 --- a/i18n/it/email.md +++ b/i18n/it/email.md @@ -3,7 +3,7 @@ meta_title: "Email Private Crittografate Consigliate - Privacy Guides" title: "Servizi Email" icon: material/email description: Questi fornitori di email offrono un luogo ideale per memorizzare in sicurezza le tue email e, molti, offrono crittografia OpenPGP interoperabile con altri fornitori. -cover: email.png +cover: email.webp --- L'email è praticamente una necessità per utilizzare qualsiasi servizio online, tuttavia, la sconsigliamo per le conversazioni personali. Piuttosto di utilizzare una e-mail per contattare altre persona, considera un mezzo di messaggistica istantanea che supporti la \['forward secrecy'\](https://it.wikipedia.org/wiki/Forward_secrecy). diff --git a/i18n/it/encryption.md b/i18n/it/encryption.md index cced4d05..11f303fa 100644 --- a/i18n/it/encryption.md +++ b/i18n/it/encryption.md @@ -3,7 +3,7 @@ meta_title: "Software di crittografia consigliati: VeraCrypt, Cryptomator, PicoC title: "Software di Crittografia" icon: material/file-lock description: La crittografia dei dati è il solo modo per controllare chi possa accedervi. Questi strumenti ti consentono di crittografare le tue email e qualsiasi altro file. -cover: encryption.png +cover: encryption.webp --- La crittografia dei dati è l'unico modo per controllare chi può accedervi. Se, al momento, non stai utilizzando alcun software di crittografia per il tuo disco rigido, le tue email o file, dovresti selezionare un'opzione qui. diff --git a/i18n/it/file-sharing.md b/i18n/it/file-sharing.md index 4eddcc3d..f3f842bd 100644 --- a/i18n/it/file-sharing.md +++ b/i18n/it/file-sharing.md @@ -2,7 +2,7 @@ title: "Condivisione e sincronizzazione dei file" icon: material/share-variant description: Scopri come condividere privatamente i tuoi file tra i tuoi dispositivi, con i tuoi amici e familiari, o anonimamente online. -cover: file-sharing.png +cover: file-sharing.webp --- Scopri come condividere privatamente i tuoi file tra i tuoi dispositivi, con i tuoi amici e familiari, o anonimamente online. diff --git a/i18n/it/financial-services.md b/i18n/it/financial-services.md index 9ce38b12..165fec43 100644 --- a/i18n/it/financial-services.md +++ b/i18n/it/financial-services.md @@ -1,7 +1,7 @@ --- title: Servizi finanziari icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Effettuare pagamenti online è una delle maggiori sfide per la privacy. Questi servizi possono assisterti nel proteggere la tua privacy da commercianti e altri tracciatori, ammesso che tu abbia una buona comprensione di come effettuare efficientemente i pagamenti privati. Ti incoraggiamo vivamente a leggere prima il nostro articolo di panoramica sui pagamenti, prima di effettuare qualsiasi acquisto: diff --git a/i18n/it/frontends.md b/i18n/it/frontends.md index 71044a68..6a7a4952 100644 --- a/i18n/it/frontends.md +++ b/i18n/it/frontends.md @@ -2,7 +2,7 @@ title: "Frontend" icon: material/flip-to-front description: Questi frontend open source per vari servizi in Internet ti consentono di accedere ai contenuti senza JavaScript o altri fastidi. -cover: frontends.png +cover: frontends.webp --- Talvolta, i servizi, proveranno a forzarti a iscriverti per un profilo, bloccando l'accesso ai contenuti con dei fastidiosi popup. Potrebbero anche corrompersi, se JavaScript è disabilitato. Questi frontend possono consentirti di aggirare queste restrizioni. diff --git a/i18n/it/mobile-browsers.md b/i18n/it/mobile-browsers.md index 3239a332..58608e71 100644 --- a/i18n/it/mobile-browsers.md +++ b/i18n/it/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Browser web che rispettano la privacy per Android e iOS - Privacy G title: "Browser mobile" icon: material/cellphone-information description: Questi sono i browser consigliati al momento per la navigazione standard/non anonima sul tuo telefono. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/it/multi-factor-authentication.md b/i18n/it/multi-factor-authentication.md index f31635da..e64d630d 100644 --- a/i18n/it/multi-factor-authentication.md +++ b/i18n/it/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Autenticatori a più fattori" icon: 'material/two-factor-authentication' description: Questi strumenti ti assistano nella protezione dei tuoi profili Internet con l'Autenticazione a Più Fattori, senza inviare i tuoi codici segreti a terze parti. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Chiavi di Sicurezza Hardware diff --git a/i18n/it/news-aggregators.md b/i18n/it/news-aggregators.md index 592dec48..55855ff9 100644 --- a/i18n/it/news-aggregators.md +++ b/i18n/it/news-aggregators.md @@ -2,7 +2,7 @@ title: "Aggregatori di Notizie" icon: material/rss description: Questi client d'aggregazione delle notizie, consentono di mantenerti aggiornato con i tuoi blog e siti di notizie preferiti, utilizzando gli standard di Internet, come RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- Un [aggregatore di notizie](https://en.wikipedia.org/wiki/News_aggregator) consente di mantenerti aggiornato con i tuoi blog e siti di notizie preferiti. diff --git a/i18n/it/notebooks.md b/i18n/it/notebooks.md index 7a3b31b6..47fe386f 100644 --- a/i18n/it/notebooks.md +++ b/i18n/it/notebooks.md @@ -2,7 +2,7 @@ title: "Appunti" icon: material/notebook-edit-outline description: Queste app crittografate per prendere appunti ti consentono di monitorare le tue note, senza darle a terze parti. -cover: notebooks.png +cover: notebooks.webp --- Monitora le tue note e i tuoi diari senza doverli dare a una terza parte. diff --git a/i18n/it/os/macos-overview.md b/i18n/it/os/macos-overview.md index c80f3dc7..022078f7 100644 --- a/i18n/it/os/macos-overview.md +++ b/i18n/it/os/macos-overview.md @@ -118,39 +118,37 @@ Decidi se desideri annunci personalizzati secondo il tuo utilizzo. - [ ] Rimuovi la spunta da **Annunci Personalizzati** -##### Sicurezza - -Le app dall'Apple Store sono soggette a linee guida di sicurezza più rigide, come un sandboxing più rigido. Se le sole app che necessiti sono disponibili dall'App Store, cambia l'impostazione **Consenti applicazioni scaricate da** ad **App Store**, per impedire l'esecuzione accidentale di altre app. Questa è una buona opzione, in particolare se stai configurando una macchina per altri utenti meno tecnici, come bambini. - -Inoltre, se scegli di consentire le applicazioni da sviluppatori identificati, sii cauto sulle app che esegui e da dove le ottieni. - ##### FileVault Sui dispositivi moderni con una Zona Franca Sicura (Chip di Sicurezza Apple T2, Apple silicon), i tuoi dati sono sempre crittografati, ma sono automaticamente decrittografati da una chiave hardware, se il tuo dispositivo non rileva di esser stato manomesso. Abilitare FileVault richiede inoltre la tua password per decrittografare i tuoi dati, migliorando ampiamente la sicurezza, specialmente quando spento o prima del primo accesso all'accensione. Sui vecchi computer Mac basati su Intel, FileVault è la sola forma di crittografia del disco disponibile di default, e dovrebbe sempre essere abilitata. -- [x] Clicca su **Attiva** +- [x] Click **Turn On** ##### Modalità Lockdown La [Modalità Lockdown](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disabilita alcune funzionalità per poter migliorare la sicurezza. Alcune app o funzionalità non funzioneranno allo stesso modo di quanto sono disattivate, ad esempio, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) e [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) sono disabilitate su Safari, con la Modalità di Lockdown abilitata. Consigliamo di abilitare la Modalità di Lockdown e di scoprire se impatta significativamente sul tuo utilizzo: è facile convivere con molte delle modifiche che effettua. -- [x] Clicca su **Attiva** +- [x] Click **Turn On** ### Randomizzazione dell'indirizzo MAC -A differenza di iOS, macOS non ti dà un'opzione per rendere casuale il tuo indirizzo MAC nelle impostazioni, quindi, dovrai farlo con un comando o uno script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -Apri il tuo Terminale e inserisci questo comando per casualizzare il tuo indirizzo MAC: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 è il nome dell'interfaccia per cui stai modificando l'indirizzo MAC. Questo potrebbe non essere quello corretto su ogni Mac, quindi, per verificare, puoi tenere premuto il tasto opzioni e cliccare sul simbolo della Wi-Fi nella parte superiore destra della tua schermata. +`en0` is the name of the interface you're changing the MAC address for. Questo potrebbe non essere quello corretto su ogni Mac, quindi, per verificare, puoi tenere premuto il tasto opzioni e cliccare sul simbolo della Wi-Fi nella parte superiore destra della tua schermata. "Interface name" should be displayed at the top of the dropdown menu. -Questo sarà ripristinato al riavvio. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. Questo sarà ripristinato al riavvio. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Protezioni di Sicurezza diff --git a/i18n/it/passwords.md b/i18n/it/passwords.md index 295e999a..027a899c 100644 --- a/i18n/it/passwords.md +++ b/i18n/it/passwords.md @@ -3,7 +3,7 @@ meta_title: "I migliori gestori di password per proteggere la tua privacy e sicu title: "Gestori di password" icon: material/form-textbox-password description: I gestori di password ti consentono di memorizzare e gestire in sicurezza le password e altre credenziali. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/it/productivity.md b/i18n/it/productivity.md index 928a8b93..cc5c2d5c 100644 --- a/i18n/it/productivity.md +++ b/i18n/it/productivity.md @@ -2,7 +2,7 @@ title: "Strumenti per la produttività" icon: material/file-sign description: Gran parte delle suite da ufficio non supportano l'E2EE, a significare che il fornitore del cloud ha accesso a tutto ciò che fai. -cover: productivity.png +cover: productivity.webp --- Gran parte delle suite da ufficio non supportano l'E2EE, a significare che il fornitore del cloud ha accesso a tutto ciò che fai. La politica sulla privacy potrebbe proteggere legalmente i tuoi diritti, ma non fornisce vincoli tecnici di accesso. diff --git a/i18n/it/real-time-communication.md b/i18n/it/real-time-communication.md index c457d149..22f9f911 100644 --- a/i18n/it/real-time-communication.md +++ b/i18n/it/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "Le migliori app di messaggistica istantanea private - Privacy Guide title: "Comunicazione in tempo reale" icon: material/chat-processing description: Le altre app di messaggistica istantanea rendono disponibili tutte le tue conversazioni private, all'azienda che le gestisce. -cover: real-time-communication.png +cover: real-time-communication.webp --- Questi sono i nostri consigli per le comunicazioni crittografate in tempo reale. diff --git a/i18n/it/router.md b/i18n/it/router.md index 5ea8a98b..ec4e5d57 100644 --- a/i18n/it/router.md +++ b/i18n/it/router.md @@ -2,7 +2,7 @@ title: "Firmware per router" icon: material/router-wireless description: Questi sistemi operativi alternativi sono utilizzabili per proteggere il tuo router o il punto d'accesso del Wi-Fi. -cover: router.png +cover: router.webp --- Di seguito sono elencati alcuni sistemi operativi alternativi, utilizzabili sui router, punti d'accesso della Wi-Fi, etc. diff --git a/i18n/it/search-engines.md b/i18n/it/search-engines.md index a21bcb60..f21c4c03 100644 --- a/i18n/it/search-engines.md +++ b/i18n/it/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Motori di ricerca consigliati: alternative anonime a Google - Priva title: "Motori di ricerca" icon: material/search-web description: Questi motori di ricerca che rispettano la privacy, non costruiscono un profilo pubblicitario secondo le tue ricerche. -cover: search-engines.png +cover: search-engines.webp --- Utilizza un motore di ricerca che non costruisca un profilo pubblicitario secondo le tue ricerche. diff --git a/i18n/it/tor.md b/i18n/it/tor.md index 4dfc2f5f..7e205817 100644 --- a/i18n/it/tor.md +++ b/i18n/it/tor.md @@ -3,7 +3,7 @@ meta_title: "Browser e Rete Tor: Navigazione Web Anonima - Privacy Guides" title: "Rete Tor" icon: simple/torproject description: Proteggi la tua navigazione su Internet da occhi indiscreti, utilizzando la rete Tor, una rete sicura che elude la censura. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/it/vpn.md b/i18n/it/vpn.md index f35c0bf6..42b44760 100644 --- a/i18n/it/vpn.md +++ b/i18n/it/vpn.md @@ -3,7 +3,7 @@ meta_title: "Consigli e confronto sui servizi VPN privati, senza sponsor o pubbl title: "Servizi VPN" icon: material/vpn description: Questi sono i migliori servizi VPN per proteggere la tua privacy e sicurezza online. Trovate un fornitore che non ti spii. -cover: vpn.png +cover: vpn.webp --- Se desideri ulteriore **privacy** dal tuo ISP, su una rete Wi-Fi pubblica, o durante torrenting di file, una VPN potrebbe essere la soluzione per te, purché tu comprenda i rischi associati. Riteniamo che questi provider siano una spanna sopra gli altri: diff --git a/i18n/ja/android.md b/i18n/ja/android.md index 0325487e..36e88b5b 100644 --- a/i18n/ja/android.md +++ b/i18n/ja/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/ja/calendar.md b/i18n/ja/calendar.md index 407e3a10..e64ad4d7 100644 --- a/i18n/ja/calendar.md +++ b/i18n/ja/calendar.md @@ -2,7 +2,7 @@ title: "カレンダー同期" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/ja/cloud.md b/i18n/ja/cloud.md index 62527c63..5f9e2566 100644 --- a/i18n/ja/cloud.md +++ b/i18n/ja/cloud.md @@ -3,7 +3,7 @@ meta_title: "最高のプライベートで安全なクラウドストレージ title: "クラウドストレージ" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. これらはプライベートな選択肢です! -cover: cloud.png +cover: cloud.webp --- 多くのクラウドストレージプロバイダーは、あなたのファイルを見ないことを完全に信頼する必要があります。 以下に示す選択肢は、安全なE2EEを実装することにより、信頼の必要性を排除します。 diff --git a/i18n/ja/cryptocurrency.md b/i18n/ja/cryptocurrency.md index 3f6fe633..5c4d06a8 100644 --- a/i18n/ja/cryptocurrency.md +++ b/i18n/ja/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: 暗号通貨 icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ja/data-redaction.md b/i18n/ja/data-redaction.md index d0c2d87b..9f7fba0f 100644 --- a/i18n/ja/data-redaction.md +++ b/i18n/ja/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "データとメタデータの編集" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/ja/desktop-browsers.md b/i18n/ja/desktop-browsers.md index b0a09dbf..cdcb1f57 100644 --- a/i18n/ja/desktop-browsers.md +++ b/i18n/ja/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "プライバシーを尊重したPCとMac向けウェブブラウ title: "デスクトップブラウザ" icon: material/laptop description: これらのウェブブラウザは、Google Chromeよりも強力なプライバシー保護を提供します。 -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/ja/desktop.md b/i18n/ja/desktop.md index 06332cd8..41c8fdc8 100644 --- a/i18n/ja/desktop.md +++ b/i18n/ja/desktop.md @@ -2,7 +2,7 @@ title: "デスクトップ/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/ja/dns.md b/i18n/ja/dns.md index ee4d749b..c572a490 100644 --- a/i18n/ja/dns.md +++ b/i18n/ja/dns.md @@ -2,7 +2,7 @@ title: "DNSリゾルバ" icon: material/dns description: これらは、ISPのデフォルト設定を置き換えるために推奨する暗号化DNSプロバイダです。 -cover: dns.png +cover: dns.webp --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/ja/email-clients.md b/i18n/ja/email-clients.md index c78b5dd9..629efa7e 100644 --- a/i18n/ja/email-clients.md +++ b/i18n/ja/email-clients.md @@ -2,7 +2,7 @@ title: "メールクライアント" icon: material/email-open description: これらの電子メールクライアントはプライバシーを尊重し、OpenPGP電子メール暗号化をサポートしています。 -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/ja/email.md b/i18n/ja/email.md index a77611c1..1dfc65b9 100644 --- a/i18n/ja/email.md +++ b/i18n/ja/email.md @@ -3,7 +3,7 @@ meta_title: "暗号化プライベートメールの推奨事項 - Privacy Guide title: "メールサービス" icon: material/email description: これらの電子メールプロバイダはメールを安全に保存するのに最適な場所で、多くは他のプロバイダと相互運用可能なOpenPGP暗号化を提供しています。 -cover: email.png +cover: email.webp --- 実質的に、電子メールはどんなオンラインサービスを使うにも必要ですが、個人間での会話にはお勧めしません。 他人との連絡には電子メールを使うよりも、前方秘匿性のあるインスタントメッセンジャの使用を検討してください。 diff --git a/i18n/ja/encryption.md b/i18n/ja/encryption.md index 3fe8e796..e25ad42d 100644 --- a/i18n/ja/encryption.md +++ b/i18n/ja/encryption.md @@ -3,7 +3,7 @@ meta_title: "おすすめの暗号化ソフトウェア: VeraCrypt、Cryptomator title: "暗号化ソフトウェア" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/ja/file-sharing.md b/i18n/ja/file-sharing.md index 66aaaff1..9834facc 100644 --- a/i18n/ja/file-sharing.md +++ b/i18n/ja/file-sharing.md @@ -2,7 +2,7 @@ title: "ファイル共有と同期" icon: material/share-variant description: デバイス間や、友人や家族、または匿名でオンライン上でファイルをプライベートに共有する方法をご紹介します。 -cover: file-sharing.png +cover: file-sharing.webp --- デバイス間、友人や家族、または匿名でオンライン上でファイルをプライベートに共有する方法をご紹介します。 diff --git a/i18n/ja/financial-services.md b/i18n/ja/financial-services.md index 6e945ab9..4a61851c 100644 --- a/i18n/ja/financial-services.md +++ b/i18n/ja/financial-services.md @@ -1,7 +1,7 @@ --- title: 金融サービス icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ja/frontends.md b/i18n/ja/frontends.md index 6fefa508..91f86dcb 100644 --- a/i18n/ja/frontends.md +++ b/i18n/ja/frontends.md @@ -2,7 +2,7 @@ title: "フロントエンド" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/ja/mobile-browsers.md b/i18n/ja/mobile-browsers.md index 60e94b92..ea9fc70d 100644 --- a/i18n/ja/mobile-browsers.md +++ b/i18n/ja/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "プライバシーを尊重するAndroidとiOS向けモバイルウ title: "モバイルブラウザ" icon: material/cellphone-information description: これらのブラウザは、現在お使いの携帯電話の標準/非匿名のインターネットブラウジングに推奨されています。 -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/ja/multi-factor-authentication.md b/i18n/ja/multi-factor-authentication.md index 13f5c9b4..4d5a7398 100644 --- a/i18n/ja/multi-factor-authentication.md +++ b/i18n/ja/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "多要素認証" icon: 'material/two-factor-authentication' description: これらのツールは、あなたの秘密をサードパーティに送信することなく、多要素認証であなたのインターネットアカウントを保護することを支援します。 -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## ハードウェアセキュリティ diff --git a/i18n/ja/news-aggregators.md b/i18n/ja/news-aggregators.md index c89c2278..e51199a5 100644 --- a/i18n/ja/news-aggregators.md +++ b/i18n/ja/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/ja/notebooks.md b/i18n/ja/notebooks.md index a525adb9..ba701c3e 100644 --- a/i18n/ja/notebooks.md +++ b/i18n/ja/notebooks.md @@ -2,7 +2,7 @@ title: "ノート" icon: material/notebook-edit-outline description: 暗号化ノートアプリで、第三者による閲覧を防止しながらメモを管理できます。 -cover: notebooks.png +cover: notebooks.webp --- 第三者による閲覧を防止しながら、メモや日記を保存できます。 diff --git a/i18n/ja/os/macos-overview.md b/i18n/ja/os/macos-overview.md index 1368a9d0..4b878e8f 100644 --- a/i18n/ja/os/macos-overview.md +++ b/i18n/ja/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### セキュリティ - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/ja/passwords.md b/i18n/ja/passwords.md index 419173e3..50c505df 100644 --- a/i18n/ja/passwords.md +++ b/i18n/ja/passwords.md @@ -3,7 +3,7 @@ meta_title: "プライバシーとセキュリティーを守る最高のパス title: "パスワードマネージャー" icon: material/form-textbox-password description: パスワードマネージャーは、パスワードやその他の情報を安全に保存および管理できます。 -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/ja/productivity.md b/i18n/ja/productivity.md index 74d13a77..3958de55 100644 --- a/i18n/ja/productivity.md +++ b/i18n/ja/productivity.md @@ -2,7 +2,7 @@ title: "生産性向上ツール" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/ja/real-time-communication.md b/i18n/ja/real-time-communication.md index d4ed6635..84e8f580 100644 --- a/i18n/ja/real-time-communication.md +++ b/i18n/ja/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "リアルタイムコミュニケーション" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/ja/router.md b/i18n/ja/router.md index ec9b6adb..5648cfed 100644 --- a/i18n/ja/router.md +++ b/i18n/ja/router.md @@ -2,7 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/ja/search-engines.md b/i18n/ja/search-engines.md index 0fe65ada..1941d9a2 100644 --- a/i18n/ja/search-engines.md +++ b/i18n/ja/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "検索エンジン" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/ja/tor.md b/i18n/ja/tor.md index 4f9feaef..40ad1559 100644 --- a/i18n/ja/tor.md +++ b/i18n/ja/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browserとネットワーク: 匿名のウェブブラウジン title: "Torネットワーク" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/ja/vpn.md b/i18n/ja/vpn.md index 82ad9ab5..54940b0f 100644 --- a/i18n/ja/vpn.md +++ b/i18n/ja/vpn.md @@ -3,7 +3,7 @@ meta_title: "プライベートVPNサービスの推奨事項と比較、スポ title: "VPNサービス" icon: material/vpn description: これらは、あなたのプライバシーとセキュリティをオンラインで保護するための最高のVPNサービスです。 ここで、あなたを監視しようとしないプロバイダーを見つけてください。 -cover: vpn.png +cover: vpn.webp --- ISPや公共Wi-Fiネットワーク、またはファイルのTorrent中の、追加の**プライバシー保護**手段をお探しの場合で、リスクを理解している場合は、VPNはあなたにとっての解決策になるかもしれません。 以下のプロバイダは他のプロバイダと比較して洗練されていると、私たちは考えています。 diff --git a/i18n/ko/android.md b/i18n/ko/android.md index aa79a6c4..0eb8b3f9 100644 --- a/i18n/ko/android.md +++ b/i18n/ko/android.md @@ -3,7 +3,7 @@ meta_title: "Android 권장 사항: GrapheneOS, DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Android 휴대폰의 운영 체제를 보다 안전하고 프라이버시를 중시하는 대체제로 변경할 수 있습니다. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/ko/calendar.md b/i18n/ko/calendar.md index 78dd7077..2b672955 100644 --- a/i18n/ko/calendar.md +++ b/i18n/ko/calendar.md @@ -2,7 +2,7 @@ title: "캘린더 동기화" icon: material/calendar description: 캘린더에는 여러분의 가장 민감한 데이터가 담겨 있습니다. 암호화가 적용된 서비스를 사용하세요. -cover: calendar.png +cover: calendar.webp --- 캘린더에는 여러분의 가장 민감한 데이터가 담겨 있습니다. 제공 업체가 여러분의 데이터를 읽지 못하도록 E2EE 암호화가 적용된 서비스를 사용하세요. diff --git a/i18n/ko/cloud.md b/i18n/ko/cloud.md index 3e297708..b801727d 100644 --- a/i18n/ko/cloud.md +++ b/i18n/ko/cloud.md @@ -3,7 +3,7 @@ meta_title: "최고의 비공개 및 보안 클라우드 스토리지 제공 업 title: "클라우드 스토리지" icon: material/file-cloud description: 대부분의 클라우드 스토리지 제공 업체는, 업체가 사용자의 파일을 보지 않을 것이라는 믿음이 필수적입니다. 프라이버시 보호 대체제를 소개합니다! -cover: cloud.png +cover: cloud.webp --- 대부분의 클라우드 스토리지 서비스에서, 사용자는 그저 '제공 업체가 사용자의 파일을 함부로 열람하지 않을 것'이라고 전적으로 신뢰해야 할 뿐입니다. 아래에 제시된 대안은 E2EE 보안을 구현하여 '신뢰'의 필요성을 처음부터 제거합니다. diff --git a/i18n/ko/cryptocurrency.md b/i18n/ko/cryptocurrency.md index 2b527136..5608d14a 100644 --- a/i18n/ko/cryptocurrency.md +++ b/i18n/ko/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "프라이버시 암호화폐 블록체인 - Privacy Guides" title: 암호화폐 icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- 온라인 결제는 프라이버시에 있어서 매우 큰 문제입니다. 다음과 같은 암호화폐는 여러분이 프라이버시를 보호하면서 결제를 하는 방법에 대해 충분한 이해를 갖춘 경우, 거래 프라이버시를 기본적으로 제공합니다.(대부분의 암호화폐는 거래 프라이버시를 보장하지 **않습니다**.) 무엇인가를 구매하기에 앞서, Privacy Guides에서 결제 개요 문서를 읽어보실 것을 강력히 권장드립니다: diff --git a/i18n/ko/data-redaction.md b/i18n/ko/data-redaction.md index 3a104ccb..1d3a16ac 100644 --- a/i18n/ko/data-redaction.md +++ b/i18n/ko/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "메타데이터 정리 및 데이터 편집 툴을 통한 개인 title: "데이터 및 메타데이터 제거" icon: material/tag-remove description: 공유할 이미지 및 파일에서 GPS 위치 및 기타 식별 정보 등의 메타데이터를 제거할 수 있습니다. -cover: data-redaction.png +cover: data-redaction.webp --- 파일을 공유할 때에는 관련 메타데이터를 제거해야 합니다. 이미지 파일에는 보통 [Exif](https://en.wikipedia.org/wiki/Exif) 데이터가 포함되어 있습니다. 사진 파일 메타데이터에는 GPS 좌표가 포함될 때도 있습니다. diff --git a/i18n/ko/desktop-browsers.md b/i18n/ko/desktop-browsers.md index d6489081..d70a67b2 100644 --- a/i18n/ko/desktop-browsers.md +++ b/i18n/ko/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "프라이버시 중점 PC, Mac용 웹 브라우저 - Privacy Guides title: "데스크톱 브라우저" icon: material/laptop description: Google Chrome보다 강력한 프라이버시 보호 기능을 제공하는 브라우저 목록입니다. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/ko/desktop.md b/i18n/ko/desktop.md index 2d21b90c..8534d7f6 100644 --- a/i18n/ko/desktop.md +++ b/i18n/ko/desktop.md @@ -2,7 +2,7 @@ title: "데스크톱/PC" icon: simple/linux description: 프라이버시 보호와 자유 소프트웨어를 이유로, 일반적으로 Linux 배포판이 권장됩니다. -cover: desktop.png +cover: desktop.webp --- 프라이버시 보호와 자유 소프트웨어를 이유로, 일반적으로 Linux 배포판이 권장됩니다. 아직 Linux를 사용하지 않는 분을 위해, 사용해볼 만한 몇 가지 배포판을 추천드립니다. 대부분의 Linux 배포판에 적용 가능한 기본 프라이버시 및 보안 개선 안내도 찾아보실 수 있습니다. diff --git a/i18n/ko/dns.md b/i18n/ko/dns.md index 0075191d..7d260ec1 100644 --- a/i18n/ko/dns.md +++ b/i18n/ko/dns.md @@ -2,7 +2,7 @@ title: "DNS 리졸버" icon: material/dns description: ISP 기본 구성을 대체하여 전환할 용도로 권장하는 암호화 DNS 제공 업체 목록입니다. -cover: dns.png +cover: dns.webp --- 제3자 서버를 사용하는 암호화 DNS는 기본적인 [DNS 차단](https://en.wikipedia.org/wiki/DNS_blocking)을 우회하는 용도로만, 그리고 아무런 문제가 발생하지 않을 것이라고 확신할 수 있는 경우에만 사용해야 합니다. 암호화 DNS는 여러분의 브라우저 탐색 활동을 숨기는 데에 전혀 도움이 되지 않습니다. diff --git a/i18n/ko/email-clients.md b/i18n/ko/email-clients.md index 01fe46c0..2c96803d 100644 --- a/i18n/ko/email-clients.md +++ b/i18n/ko/email-clients.md @@ -2,7 +2,7 @@ title: "이메일 클라이언트" icon: material/email-open description: 프라이버시 중점적이며 OpenPGP 이메일 암호화를 지원하는 이메일 클라이언트 목록입니다. -cover: email-clients.png +cover: email-clients.webp --- 본 권장 목록의 이메일 클라이언트는 [OpenPGP](encryption.md#openpgp) 및 [OAuth(Open Authorization)](https://en.wikipedia.org/wiki/OAuth) 같은 강력한 인증을 모두 지원합니다. OAuth를 이용하면 [다중 인증](basics/multi-factor-authentication.md)으로 계정을 보호할 수 있습니다. diff --git a/i18n/ko/email.md b/i18n/ko/email.md index 2ae56f3e..223f4bfb 100644 --- a/i18n/ko/email.md +++ b/i18n/ko/email.md @@ -3,7 +3,7 @@ meta_title: "비공개 암호화 이메일 서비스 권장 목록 - Privacy Gui title: "이메일 서비스" icon: material/email description: 이러한 이메일 제공 업체는 여러분의 이메일을 안전하게 보관하기에 적합합니다. 대부분이 OpenPGP 암호화를 제공하여 다른 이메일 서비스와도 호환됩니다. -cover: email.png +cover: email.webp --- 이메일은 모든 온라인 서비스 이용에 사실상 필수적이지만, 개인 간 대화에는 권장드리지 않습니다. 다른 사람에게 연락할 때는 이메일보다는 순방향 비밀성을 지원하는 메신저를 사용하는 것이 좋습니다. diff --git a/i18n/ko/encryption.md b/i18n/ko/encryption.md index 549bbfe0..8bfcc9dd 100644 --- a/i18n/ko/encryption.md +++ b/i18n/ko/encryption.md @@ -3,7 +3,7 @@ meta_title: "암호화 소프트웨어 권장 목록: VeraCrypt, Cryptomator, Pi title: "암호화 소프트웨어" icon: material/file-lock description: 데이터 암호화는 데이터에 접근 가능한 사람을 통제하는 유일한 방법입니다. 암호화 툴로 이메일이나 각종 파일을 암호화하세요. -cover: encryption.png +cover: encryption.webp --- 데이터 암호화는 데이터에 접근 가능한 사람을 통제하는 유일한 방법입니다. 만약 아직 하드 디스크, 이메일, 파일들을 암호화하지 않았다면 여기에 있는 프로그램을 사용하는것을 추천합니다. diff --git a/i18n/ko/file-sharing.md b/i18n/ko/file-sharing.md index 48405cb6..cecf7120 100644 --- a/i18n/ko/file-sharing.md +++ b/i18n/ko/file-sharing.md @@ -2,7 +2,7 @@ title: "파일 공유 및 동기화" icon: material/share-variant description: 기기 간에, 친구 및 가족과, 혹은 익명으로 온라인 상에서 파일을 개인적으로 공유하는 방법을 알아보세요. -cover: file-sharing.png +cover: file-sharing.webp --- 기기 간에, 친구 및 가족과, 혹은 익명으로 온라인 상에서 파일을 개인적으로 공유하는 방법을 알아보세요. diff --git a/i18n/ko/financial-services.md b/i18n/ko/financial-services.md index e66eb47d..98121b76 100644 --- a/i18n/ko/financial-services.md +++ b/i18n/ko/financial-services.md @@ -1,7 +1,7 @@ --- title: 금융 서비스 icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ko/frontends.md b/i18n/ko/frontends.md index c8d43cae..4d8c3018 100644 --- a/i18n/ko/frontends.md +++ b/i18n/ko/frontends.md @@ -2,7 +2,7 @@ title: "프론트엔드" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/ko/mobile-browsers.md b/i18n/ko/mobile-browsers.md index 3a62df8e..70e3b649 100644 --- a/i18n/ko/mobile-browsers.md +++ b/i18n/ko/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "프라이버시 중점 모바일(Android, iOS) 웹 브라우저 - P title: "모바일 브라우저" icon: material/cellphone-information description: 현재 휴대폰에서 표준/비익명 인터넷 탐색 용도로 권장되는 브라우저 목록입니다. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/ko/multi-factor-authentication.md b/i18n/ko/multi-factor-authentication.md index 2d936d51..bae51324 100644 --- a/i18n/ko/multi-factor-authentication.md +++ b/i18n/ko/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## 하드웨어 보안 키 diff --git a/i18n/ko/news-aggregators.md b/i18n/ko/news-aggregators.md index ca42ecde..c5f54a93 100644 --- a/i18n/ko/news-aggregators.md +++ b/i18n/ko/news-aggregators.md @@ -2,7 +2,7 @@ title: "뉴스 애그리게이터" icon: material/rss description: 뉴스 애그리게이터 클라이언트를 이용해 즐겨 찾는 블로그와 뉴스 사이트의 최신 글을 RSS 등의 표준 기술을 통해 받아볼 수 있습니다. -cover: news-aggregators.png +cover: news-aggregators.webp --- [뉴스 애그리게이터(News Aggregator)](https://ko.wikipedia.org/wiki/%EB%89%B4%EC%8A%A4_%EC%95%A0%EA%B7%B8%EB%A6%AC%EA%B2%8C%EC%9D%B4%ED%84%B0)를 이용하면 즐겨 찾는 블로그와 뉴스 사이트의 최신 글을 받아볼 수 있습니다. diff --git a/i18n/ko/notebooks.md b/i18n/ko/notebooks.md index d9f962f5..cef90f91 100644 --- a/i18n/ko/notebooks.md +++ b/i18n/ko/notebooks.md @@ -2,7 +2,7 @@ title: "노트 작성" icon: material/notebook-edit-outline description: 여러분의 노트 내용을 제3자에게 보여주지 않고 관리하기 위해서는 암호화 노트 작성 앱을 사용해야 합니다. -cover: notebooks.png +cover: notebooks.webp --- 여러분의 노트 내용이나 일기를 제3자가 볼 수 없도록 관리하세요. diff --git a/i18n/ko/os/macos-overview.md b/i18n/ko/os/macos-overview.md index 85c04425..648597af 100644 --- a/i18n/ko/os/macos-overview.md +++ b/i18n/ko/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### 보안 - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/ko/passwords.md b/i18n/ko/passwords.md index 7b0cda71..38e71d9f 100644 --- a/i18n/ko/passwords.md +++ b/i18n/ko/passwords.md @@ -3,7 +3,7 @@ meta_title: "프라이버시 및 보안을 지키기에 가장 적합한 비밀 title: "비밀번호 관리자" icon: material/form-textbox-password description: 비밀번호 관리자를 사용하여 비밀번호를 비롯한 기타 자격 증명을 안전하게 저장 및 관리할 수 있습니다. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/ko/productivity.md b/i18n/ko/productivity.md index 4f8fad57..a6ec5a08 100644 --- a/i18n/ko/productivity.md +++ b/i18n/ko/productivity.md @@ -2,7 +2,7 @@ title: "생산성 툴" icon: material/file-sign description: 온라인 오피스 프로그램은 대부분 E2EE를 제공하지 않으며, 여러분의 작업 파일을 클라우드 제공 업체가 볼 수 있습니다. -cover: productivity.png +cover: productivity.webp --- 온라인 오피스 프로그램은 대부분 E2EE를 제공하지 않으며, 여러분의 작업 파일을 클라우드 제공 업체가 볼 수 있습니다. 여러분의 권리는 프라이버시 정책에 의해 법적으로 보호되지만, 기술적으로 클라우드 제공 업체의 접근을 방지하지는 않습니다. diff --git a/i18n/ko/real-time-communication.md b/i18n/ko/real-time-communication.md index ec54a43e..0be19cda 100644 --- a/i18n/ko/real-time-communication.md +++ b/i18n/ko/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "프라이버시 중점 메신저 - Privacy Guides" title: "실시간 커뮤니케이션" icon: material/chat-processing description: 일반적인 메신저는 사용자의 개인적인 대화를 해당 메신저 운영 회사에서 모두 살펴볼 수 있습니다. -cover: real-time-communication.png +cover: real-time-communication.webp --- 본 내용은 실시간 커뮤니케이션 용도로 권장드리는 암호화 메신저 목록입니다. diff --git a/i18n/ko/router.md b/i18n/ko/router.md index a6d179a2..4bf93b77 100644 --- a/i18n/ko/router.md +++ b/i18n/ko/router.md @@ -2,7 +2,7 @@ title: "공유기 펌웨어" icon: material/router-wireless description: 이러한 대체 운영 체제로 여러분의 공유기(라우터) 및 Wi-Fi 액세스 포인트를 보호할 수 있습니다. -cover: router.png +cover: router.webp --- 본 내용은 공유기(라우터), Wi-Fi 액세스 포인트 장치 등에서 대체하여 사용할 수 있는 운영 체제 목록입니다. diff --git a/i18n/ko/search-engines.md b/i18n/ko/search-engines.md index 5e6ac9da..b7a306e7 100644 --- a/i18n/ko/search-engines.md +++ b/i18n/ko/search-engines.md @@ -3,7 +3,7 @@ meta_title: "검색 엔진 권장 목록: Google 검색 대체제 익명 서비 title: "검색 엔진" icon: material/search-web description: 프라이버시 중점 검색 엔진은 여러분의 검색 내용을 기반으로 광고 프로필을 구축하지 않습니다. -cover: search-engines.png +cover: search-engines.webp --- 여러분의 검색 내용을 기반으로 광고 프로필을 구축하지 않는 검색 엔진을 사용하세요. diff --git a/i18n/ko/tor.md b/i18n/ko/tor.md index 04e71a34..f1938914 100644 --- a/i18n/ko/tor.md +++ b/i18n/ko/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor 브라우저 및 네트워크: 익명 웹 탐색 - Privacy Guid title: "Tor 네트워크" icon: simple/torproject description: 검열 우회 보안 네트워크인 Tor 네트워크를 사용해 여러분의 인터넷 탐색이 감시당하지 않도록 보호하세요. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/ko/vpn.md b/i18n/ko/vpn.md index fdc8d904..fb1ed6b1 100644 --- a/i18n/ko/vpn.md +++ b/i18n/ko/vpn.md @@ -3,7 +3,7 @@ meta_title: "비공개 VPN 서비스 권장 목록 및 각 서비스 비교 (스 title: "VPN 서비스" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- ISP로부터의 **프라이버시**가 필요하거나, 공용 Wi-Fi에 연결되어 있거나, 토렌트를 사용하는 중이라면 VPN이 알맞는 해결책이 될 수 있습니다. 다만, VPN의 단점들을 인지하고 있어야 합니다. We think these providers are a cut above the rest: diff --git a/i18n/ku-IQ/android.md b/i18n/ku-IQ/android.md index 2659b23d..c8e45258 100644 --- a/i18n/ku-IQ/android.md +++ b/i18n/ku-IQ/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "ئەندرۆید" icon: 'simple/android' description: 'دەتوانیت سیستەمی کارپێکردن سەر تەلەفۆنی ئەندرۆیدەکەت بگۆڕیت بۆ ئەم جێگرەوانەی، کە پارێزراو و ڕێزگرن لە تایبەتمەندێتی.' -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/ku-IQ/calendar.md b/i18n/ku-IQ/calendar.md index e87d6851..2f3a4aa0 100644 --- a/i18n/ku-IQ/calendar.md +++ b/i18n/ku-IQ/calendar.md @@ -2,7 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/ku-IQ/cloud.md b/i18n/ku-IQ/cloud.md index 98a52da7..080217e7 100644 --- a/i18n/ku-IQ/cloud.md +++ b/i18n/ku-IQ/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/ku-IQ/cryptocurrency.md b/i18n/ku-IQ/cryptocurrency.md index 5db3fcd9..0678ce8d 100644 --- a/i18n/ku-IQ/cryptocurrency.md +++ b/i18n/ku-IQ/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ku-IQ/data-redaction.md b/i18n/ku-IQ/data-redaction.md index 4dd9a4d0..5e8cc4ad 100644 --- a/i18n/ku-IQ/data-redaction.md +++ b/i18n/ku-IQ/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/ku-IQ/desktop-browsers.md b/i18n/ku-IQ/desktop-browsers.md index e8e13b05..0a2da32c 100644 --- a/i18n/ku-IQ/desktop-browsers.md +++ b/i18n/ku-IQ/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/ku-IQ/desktop.md b/i18n/ku-IQ/desktop.md index 4d7724ba..79c52e75 100644 --- a/i18n/ku-IQ/desktop.md +++ b/i18n/ku-IQ/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/ku-IQ/dns.md b/i18n/ku-IQ/dns.md index 88b70ec5..24dfd1ae 100644 --- a/i18n/ku-IQ/dns.md +++ b/i18n/ku-IQ/dns.md @@ -2,7 +2,7 @@ title: "چارەسەرکەرانی DNS" icon: material/dns description: ئەمانە هەندێک لە دابینکەرانی DNSـی شفرکراون، کە پێشنیاری بەکارهێنانیان دەکەین. بۆ ڕزگارت بوون لە شێوەپێدراوە بنەڕەتیکانی ISPـیەکەت. -cover: dns.png +cover: dns.webp --- DNSـی شفرکراو تەنها دەبێت بەکار بهێنرێت لەگەڵ ڕاژەکاری لایەنی سێیەم بۆ تێپەڕاندنی [قەدەغەکردنێکی DNSـی](https://en.wikipedia.org/wiki/DNS_blocking) سادە. کاتێک دڵنیا دەبیت کە هیچ دەرئەنجامێک نابێت. DNSـی شفرکراو یارمەتیت نادات لە شاردنەوەی هیچ یەکێک لە چالاکیەکانی گەڕانت. diff --git a/i18n/ku-IQ/email-clients.md b/i18n/ku-IQ/email-clients.md index 94cf798b..c02dae71 100644 --- a/i18n/ku-IQ/email-clients.md +++ b/i18n/ku-IQ/email-clients.md @@ -2,7 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/ku-IQ/email.md b/i18n/ku-IQ/email.md index 8b075508..c1ed73b4 100644 --- a/i18n/ku-IQ/email.md +++ b/i18n/ku-IQ/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "خزمەتگوزاری پۆستەی ئەلکتڕۆنی" icon: material/email description: ئەم دابینکەرانەی پۆستەی ئەلکتڕۆنی شوێنێکی نایاب پێشکەش دەکەن بۆ کۆکردنەوەی پۆستەکان بە پارێزراوی. -cover: email.png +cover: email.webp --- پۆستەی ئەلکتڕۆنی بەتایبەتی گرنگە بۆ بەکارهێنانی هەر خزمەتگوزاریەکی سەرهێڵ، بەڵام ئێمە پێشنیاری ناکەین بۆ گفتوفۆی دوو کەسی. لەجیاتی بەکارهێنانی پۆستەی ئەلکتڕۆنی بۆ پەیوەندی کردن بە کەسانی تر، ڕەچاوی بەکارهێنانی ئامرازێکی نامەبەری دەستبەجێ بکە، کە پشتگیری لە نهێنیکردنی بەردەوام دەکات. diff --git a/i18n/ku-IQ/encryption.md b/i18n/ku-IQ/encryption.md index ea033fa7..61fc1aa1 100644 --- a/i18n/ku-IQ/encryption.md +++ b/i18n/ku-IQ/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/ku-IQ/file-sharing.md b/i18n/ku-IQ/file-sharing.md index e6e5f1a9..b174e67f 100644 --- a/i18n/ku-IQ/file-sharing.md +++ b/i18n/ku-IQ/file-sharing.md @@ -2,7 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. -cover: file-sharing.png +cover: file-sharing.webp --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/ku-IQ/financial-services.md b/i18n/ku-IQ/financial-services.md index 117ac80a..6cedefcb 100644 --- a/i18n/ku-IQ/financial-services.md +++ b/i18n/ku-IQ/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/ku-IQ/frontends.md b/i18n/ku-IQ/frontends.md index 7f7c1654..20c7c858 100644 --- a/i18n/ku-IQ/frontends.md +++ b/i18n/ku-IQ/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/ku-IQ/mobile-browsers.md b/i18n/ku-IQ/mobile-browsers.md index b6f68ae4..8d7b0e9e 100644 --- a/i18n/ku-IQ/mobile-browsers.md +++ b/i18n/ku-IQ/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/ku-IQ/multi-factor-authentication.md b/i18n/ku-IQ/multi-factor-authentication.md index 2a6d7b73..fa0ab916 100644 --- a/i18n/ku-IQ/multi-factor-authentication.md +++ b/i18n/ku-IQ/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/ku-IQ/news-aggregators.md b/i18n/ku-IQ/news-aggregators.md index 8342bfde..fdcd5166 100644 --- a/i18n/ku-IQ/news-aggregators.md +++ b/i18n/ku-IQ/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/ku-IQ/notebooks.md b/i18n/ku-IQ/notebooks.md index 18e86a22..fa318b5c 100644 --- a/i18n/ku-IQ/notebooks.md +++ b/i18n/ku-IQ/notebooks.md @@ -2,7 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/ku-IQ/os/macos-overview.md b/i18n/ku-IQ/os/macos-overview.md index eba51f28..6a38f1f1 100644 --- a/i18n/ku-IQ/os/macos-overview.md +++ b/i18n/ku-IQ/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Security - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/ku-IQ/passwords.md b/i18n/ku-IQ/passwords.md index e440789c..3cc11265 100644 --- a/i18n/ku-IQ/passwords.md +++ b/i18n/ku-IQ/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/ku-IQ/productivity.md b/i18n/ku-IQ/productivity.md index 929aab4b..de2ce413 100644 --- a/i18n/ku-IQ/productivity.md +++ b/i18n/ku-IQ/productivity.md @@ -2,7 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/ku-IQ/real-time-communication.md b/i18n/ku-IQ/real-time-communication.md index 6cb03489..9500ff07 100644 --- a/i18n/ku-IQ/real-time-communication.md +++ b/i18n/ku-IQ/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/ku-IQ/router.md b/i18n/ku-IQ/router.md index 834c59f6..bfa8d0a3 100644 --- a/i18n/ku-IQ/router.md +++ b/i18n/ku-IQ/router.md @@ -2,7 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/ku-IQ/search-engines.md b/i18n/ku-IQ/search-engines.md index c2286c08..ea5b4db9 100644 --- a/i18n/ku-IQ/search-engines.md +++ b/i18n/ku-IQ/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/ku-IQ/tor.md b/i18n/ku-IQ/tor.md index 3dcaca70..6be15141 100644 --- a/i18n/ku-IQ/tor.md +++ b/i18n/ku-IQ/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/ku-IQ/vpn.md b/i18n/ku-IQ/vpn.md index 4b1573c5..1a09a323 100644 --- a/i18n/ku-IQ/vpn.md +++ b/i18n/ku-IQ/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/nl/android.md b/i18n/nl/android.md index f2e0fc79..9832b0c4 100644 --- a/i18n/nl/android.md +++ b/i18n/nl/android.md @@ -3,7 +3,7 @@ meta_title: "Android-aanbevelingen: GrapheneOS en DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Je kunt het besturingssysteem op jouw Android-telefoon vervangen door deze veilige en privacy respecterende alternatieven. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/nl/calendar.md b/i18n/nl/calendar.md index c57f2a93..593cd051 100644 --- a/i18n/nl/calendar.md +++ b/i18n/nl/calendar.md @@ -2,7 +2,7 @@ title: "Kalendersynchronisatie" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Kalenders en contactpersonen bevatten enkele van jouw gevoeligste gegevens; gebruik producten die E2EE in rust implementeren om te voorkomen dat een provider ze kan lezen. diff --git a/i18n/nl/cloud.md b/i18n/nl/cloud.md index 457e6cf1..e631c9b9 100644 --- a/i18n/nl/cloud.md +++ b/i18n/nl/cloud.md @@ -3,7 +3,7 @@ meta_title: "De beste aanbieders van privé- en veilige cloud-opslag - Privacy G title: "Cloud opslag" icon: material/file-cloud description: Veel aanbieders van cloud-opslag eisen jouw volledige vertrouwen dat zij niet in jouw bestanden zullen kijken. Dit zijn de privé alternatieven! -cover: cloud.png +cover: cloud.webp --- Veel aanbieders van cloud-opslag eisen jouw volledige vertrouwen dat zij niet in jouw bestanden zullen kijken. De onderstaande alternatieven elimineren de noodzaak van vertrouwen door veilige E2EE te implementeren. diff --git a/i18n/nl/cryptocurrency.md b/i18n/nl/cryptocurrency.md index 6b4e99ad..20b4fd8f 100644 --- a/i18n/nl/cryptocurrency.md +++ b/i18n/nl/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Online betalen is een van de grootste uitdagingen voor privacy. Deze cryptocurrencies bieden standaard transactieprivacy (iets wat door de meeste cryptocurrencies **niet** wordt gegarandeerd), mits je goed begrijpt hoe je private betalingen effectief kunt uitvoeren. Wij raden je sterk aan eerst ons overzichtsartikel over betalingen te lezen voordat je aankopen doet: diff --git a/i18n/nl/data-redaction.md b/i18n/nl/data-redaction.md index 52ea90a9..9c20af98 100644 --- a/i18n/nl/data-redaction.md +++ b/i18n/nl/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Verwijder PII met Metadata Scrubbers en Data Redaction Tools - Priv title: "Redactie van gegevens en metagegevens" icon: material/tag-remove description: Gebruik deze hulpmiddelen om metadata zoals GPS-locatie en andere identificerende informatie te verwijderen uit foto's en bestanden die je deelt. -cover: data-redaction.png +cover: data-redaction.webp --- Wanneer je bestanden deelt, is het belangrijk om de bijbehorende metadata te verwijderen. Afbeeldingsbestanden bevatten vaak [Exif](https://en.wikipedia.org/wiki/Exif) data. Foto's bevatten soms zelfs GPS-coördinaten in de metadata van het bestand. diff --git a/i18n/nl/desktop-browsers.md b/i18n/nl/desktop-browsers.md index 2ef2724b..a50b6030 100644 --- a/i18n/nl/desktop-browsers.md +++ b/i18n/nl/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy respecterende webbrowsers voor PC en Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: Deze webbrowsers bieden sterkere privacybescherming dan Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/nl/desktop.md b/i18n/nl/desktop.md index 57cfaf01..f2270ebb 100644 --- a/i18n/nl/desktop.md +++ b/i18n/nl/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux-distributies worden algemeen aanbevolen voor privacybescherming en softwarevrijheid. -cover: desktop.png +cover: desktop.webp --- Linux-distributies worden algemeen aanbevolen voor privacybescherming en softwarevrijheid. Als je nog geen Linux gebruikt, zijn hieronder enkele distributies die we aanraden om uit te proberen, evenals enkele algemene tips om je privacy en veiligheid te verbeteren die op veel Linux-distributies van toepassing zijn. diff --git a/i18n/nl/dns.md b/i18n/nl/dns.md index b552500f..2864973d 100644 --- a/i18n/nl/dns.md +++ b/i18n/nl/dns.md @@ -2,7 +2,7 @@ title: "DNS-resolvers" icon: material/dns description: Dit zijn enkele versleutelde DNS-providers die wij aanbevelen, ter vervanging van de standaardconfiguratie van jouw ISP. -cover: dns.png +cover: dns.webp --- Versleutelde DNS met servers van derden zou alleen moeten worden gebruikt om simpele [DNS-blokkering](https://en.wikipedia.org/wiki/DNS_blocking) te omzeilen en als je er zeker van bent dat er geen gevolgen zullen zijn. Versleutelde DNS zal je niet helpen jouw surfactiviteiten te verbergen. diff --git a/i18n/nl/email-clients.md b/i18n/nl/email-clients.md index f2d0b12c..11f2fc1a 100644 --- a/i18n/nl/email-clients.md +++ b/i18n/nl/email-clients.md @@ -2,7 +2,7 @@ title: "Email clients" icon: material/email-open description: Deze e-mailclients respecteren de privacy en ondersteunen OpenPGP e-mail versleuteling. -cover: email-clients.png +cover: email-clients.webp --- Onze aanbevelingslijst bevat e-mailcliënten die zowel [OpenPGP](encryption.md#openpgp) als sterke authenticatie ondersteunen, zoals [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). Met OAuth kunt u [Multi-Factor Authentication](basics/multi-factor-authentication.md) gebruiken en accountdiefstal voorkomen. diff --git a/i18n/nl/email.md b/i18n/nl/email.md index 6476d6a3..0da3e34c 100644 --- a/i18n/nl/email.md +++ b/i18n/nl/email.md @@ -3,7 +3,7 @@ meta_title: "Aanbevelingen voor versleutelde privé e-mail - Privacy Guides" title: "Email Diensten" icon: material/email description: Deze e-mailproviders bieden een uitstekende plaats om jouw e-mails veilig op te slaan, en vele bieden interoperabele OpenPGP versleuteling met andere providers. -cover: email.png +cover: email.webp --- E-mail is bijna een noodzaak voor het gebruik van elke online dienst, maar wij raden het niet aan voor gesprekken van persoon tot persoon. In plaats van e-mail te gebruiken om andere mensen te contacteren, kunt u overwegen een instant messenger te gebruiken die forward secrecy ondersteunt. diff --git a/i18n/nl/encryption.md b/i18n/nl/encryption.md index bac863af..7162f988 100644 --- a/i18n/nl/encryption.md +++ b/i18n/nl/encryption.md @@ -3,7 +3,7 @@ meta_title: "Aanbevolen encryptiesoftware: VeraCrypt, Cryptomator, PicoCrypt en title: "Versleutelingssoftware" icon: material/file-lock description: Encryptie van gegevens is de enige manier om te controleren wie er toegang toe heeft. Met deze tools kun je jouw e-mails en andere bestanden versleutelen. -cover: encryption.png +cover: encryption.webp --- Encryptie van gegevens is de enige manier om te controleren wie er toegang toe heeft. Als je momenteel geen encryptiesoftware gebruikt voor jouw harde schijf, e-mails of bestanden, moet je hier een optie kiezen. diff --git a/i18n/nl/file-sharing.md b/i18n/nl/file-sharing.md index a031e01e..2f3307f6 100644 --- a/i18n/nl/file-sharing.md +++ b/i18n/nl/file-sharing.md @@ -2,7 +2,7 @@ title: "Bestanden delen en synchroniseren" icon: material/share-variant description: Ontdek hoe je jouw bestanden privé kunt delen tussen jouw apparaten, met jouw vrienden en familie, of anoniem online. -cover: file-sharing.png +cover: file-sharing.webp --- Ontdek hoe je jouw bestanden privé kunt delen tussen jouw apparaten, met jouw vrienden en familie, of anoniem online. diff --git a/i18n/nl/financial-services.md b/i18n/nl/financial-services.md index ac7ffe1e..900570a0 100644 --- a/i18n/nl/financial-services.md +++ b/i18n/nl/financial-services.md @@ -1,7 +1,7 @@ --- title: Financiële diensten icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Online betalen is een van de grootste uitdagingen voor privacy. Deze diensten kunnen je helpen jouw privacy te beschermen tegen handelaren en andere trackers, op voorwaarde dat je goed weet hoe je privébetalingen doeltreffend kunt verrichten. Wij raden je sterk aan eerst ons overzichtsartikel over betalingen te lezen voordat je aankopen doet: diff --git a/i18n/nl/frontends.md b/i18n/nl/frontends.md index ee6e8eb7..eca09f6a 100644 --- a/i18n/nl/frontends.md +++ b/i18n/nl/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: Deze open-source frontends voor verschillende internetdiensten geven je toegang tot inhoud zonder JavaScript of andere ergernissen. -cover: frontends.png +cover: frontends.webp --- Soms proberen diensten je te dwingen zich aan te melden voor een account door de toegang tot inhoud te blokkeren met vervelende popups. Ze kunnen ook breken zonder JavaScript. Met deze frontends kunt je deze beperkingen omzeilen. diff --git a/i18n/nl/mobile-browsers.md b/i18n/nl/mobile-browsers.md index 35eaef94..7e3d8f48 100644 --- a/i18n/nl/mobile-browsers.md +++ b/i18n/nl/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy respecterende mobiele webbrowsers voor Android en iOS - Pri title: "Mobiele browsers" icon: material/cellphone-information description: Deze browsers zijn wat we momenteel aanbevelen voor standaard/niet-anoniem internetten op jouw telefoon. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/nl/multi-factor-authentication.md b/i18n/nl/multi-factor-authentication.md index 30b25102..0a316239 100644 --- a/i18n/nl/multi-factor-authentication.md +++ b/i18n/nl/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: Deze tools helpen je jouw internetaccounts te beveiligen met Multi-Factor Authentication zonder jouw geheimen naar een derde partij te sturen. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Veiligheidssleutels diff --git a/i18n/nl/news-aggregators.md b/i18n/nl/news-aggregators.md index 6ab5b8d2..706fb498 100644 --- a/i18n/nl/news-aggregators.md +++ b/i18n/nl/news-aggregators.md @@ -2,7 +2,7 @@ title: "Nieuws Aggregators" icon: material/rss description: Met deze news aggregator clients kunt je op de hoogte blijven van jouw favoriete blogs en nieuwssites via internetstandaarden zoals RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- Een [nieuwsaggregator](https://en.wikipedia.org/wiki/News_aggregator) is een manier om op de hoogte te blijven van jouw favoriete blogs en nieuwssites. diff --git a/i18n/nl/notebooks.md b/i18n/nl/notebooks.md index 961fe693..1b8079f7 100644 --- a/i18n/nl/notebooks.md +++ b/i18n/nl/notebooks.md @@ -2,7 +2,7 @@ title: "Notitieboekjes" icon: material/notebook-edit-outline description: Met deze versleutelde notitie-apps kun je je notities bijhouden zonder ze aan derden te geven. -cover: notebooks.png +cover: notebooks.webp --- Houd jouw notities en aantekeningen bij zonder ze aan derden te geven. diff --git a/i18n/nl/os/macos-overview.md b/i18n/nl/os/macos-overview.md index b9b61dfc..ffce9f25 100644 --- a/i18n/nl/os/macos-overview.md +++ b/i18n/nl/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Veiligheid - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC-adres randomisatie -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/nl/passwords.md b/i18n/nl/passwords.md index dcb87741..0baa3684 100644 --- a/i18n/nl/passwords.md +++ b/i18n/nl/passwords.md @@ -3,7 +3,7 @@ meta_title: "De beste wachtwoordbeheerders om jouw privacy en veiligheid te besc title: "Wachtwoord managers" icon: material/form-textbox-password description: Met wachtwoord Managers kunt je wachtwoorden en andere geheimen veilig opslaan en beheren met behulp van een hoofdwachtwoord. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/nl/productivity.md b/i18n/nl/productivity.md index 408a532d..dbe42fec 100644 --- a/i18n/nl/productivity.md +++ b/i18n/nl/productivity.md @@ -2,7 +2,7 @@ title: "Productiviteitshulpmiddelen" icon: material/file-sign description: De meeste online office suites ondersteunen geen E2EE, wat betekent dat de cloud provider toegang heeft tot alles wat je doet. -cover: productivity.png +cover: productivity.webp --- De meeste online office suites ondersteunen geen E2EE, wat betekent dat de cloud provider toegang heeft tot alles wat je doet. Het privacybeleid kan jouw rechten wettelijk beschermen, maar het voorziet niet in technische toegangsbeperkingen. diff --git a/i18n/nl/real-time-communication.md b/i18n/nl/real-time-communication.md index 704c9e40..5c00fc06 100644 --- a/i18n/nl/real-time-communication.md +++ b/i18n/nl/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "De beste privé instant messengers - Privacy Guides" title: "Real-Time Communicatie" icon: material/chat-processing description: Andere instant messengers maken al je privégesprekken beschikbaar voor het bedrijf dat ze beheert. -cover: real-time-communication.png +cover: real-time-communication.webp --- Dit zijn onze aanbevelingen voor versleutelde real-time communicatie. diff --git a/i18n/nl/router.md b/i18n/nl/router.md index 9336a514..efd98fbf 100644 --- a/i18n/nl/router.md +++ b/i18n/nl/router.md @@ -2,7 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: Deze alternatieve besturingssystemen kunnen worden gebruikt om jouw router of Wi-Fi-toegangspunt te beveiligen. -cover: router.png +cover: router.webp --- Hieronder staan een paar alternatieve besturingssystemen, die gebruikt kunnen worden op routers, Wi-Fi access points, enz. diff --git a/i18n/nl/search-engines.md b/i18n/nl/search-engines.md index d5527be5..9e3df353 100644 --- a/i18n/nl/search-engines.md +++ b/i18n/nl/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Aanbevolen zoekmachines: Anonieme Google Alternatieven - Privacy Gu title: "Zoekmachines" icon: material/search-web description: Deze privacy respecterende zoekmachines bouwen geen advertentieprofiel op basis van jouw zoekopdrachten. -cover: search-engines.png +cover: search-engines.webp --- Gebruik een zoekmachine die geen advertentieprofiel opbouwt op basis van jouw zoekopdrachten. diff --git a/i18n/nl/tor.md b/i18n/nl/tor.md index 9b498266..3eec6ceb 100644 --- a/i18n/nl/tor.md +++ b/i18n/nl/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor-browser en -netwerk: Anoniem surfen op het web - Privacy Guides title: "Tor Netwerk" icon: simple/torproject description: Bescherm je surf gedrag tegen pottenkijkers door gebruik te maken van het Tor netwerk, een beveiligd netwerk dat censuur omzeilt. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/nl/vpn.md b/i18n/nl/vpn.md index b735eb45..1aab19b2 100644 --- a/i18n/nl/vpn.md +++ b/i18n/nl/vpn.md @@ -3,7 +3,7 @@ meta_title: "Privé VPN Service Aanbevelingen en Vergelijkingen, Geen Sponsors o title: "VPN-diensten" icon: material/vpn description: Dit zijn de beste VPN-diensten om jouw privacy en veiligheid online te beschermen. Vind hier een provider die er niet op uit is om je te bespioneren. -cover: vpn.png +cover: vpn.webp --- Als je op zoek bent naar extra **privacy** van uw ISP, op een openbaar Wi-Fi-netwerk, of tijdens het torrenten van bestanden, kan een VPN de oplossing voor je zijn, zolang je de risico's ervan begrijpt. Wij denken dat deze aanbieders een stuk beter zijn dan de rest: diff --git a/i18n/pl/android.md b/i18n/pl/android.md index 5cc0b94d..4132fac4 100644 --- a/i18n/pl/android.md +++ b/i18n/pl/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'fontawesome/brands/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/pl/calendar.md b/i18n/pl/calendar.md index 6343a7ee..974d4842 100644 --- a/i18n/pl/calendar.md +++ b/i18n/pl/calendar.md @@ -2,7 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/pl/cloud.md b/i18n/pl/cloud.md index e69f2149..280bcfca 100644 --- a/i18n/pl/cloud.md +++ b/i18n/pl/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/pl/cryptocurrency.md b/i18n/pl/cryptocurrency.md index 9b64376b..b3a43fe8 100644 --- a/i18n/pl/cryptocurrency.md +++ b/i18n/pl/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/pl/data-redaction.md b/i18n/pl/data-redaction.md index a2f67fa9..907e9754 100644 --- a/i18n/pl/data-redaction.md +++ b/i18n/pl/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/pl/desktop-browsers.md b/i18n/pl/desktop-browsers.md index 5eeb4ce8..b966e320 100644 --- a/i18n/pl/desktop-browsers.md +++ b/i18n/pl/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Przeglądarki internetowe na PC i Mac respektujące prywatność - title: "Przeglądarki desktopowe" icon: material/laptop description: Przeglądarki te zapewniają silniejszą ochronę prywatności niż Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/pl/desktop.md b/i18n/pl/desktop.md index 7617ba88..72a2c572 100644 --- a/i18n/pl/desktop.md +++ b/i18n/pl/desktop.md @@ -2,7 +2,7 @@ title: "Magazyny chmurowe" icon: fontawesome/brands/linux description: Dystrybucje systemu Linux są powszechnie polecane, jeśli chodzi o ochronę prywatności oraz wolne oprogramowanie. -cover: desktop.png +cover: desktop.webp --- Dystrybucje systemu Linux są powszechnie polecane, jeśli chodzi o ochronę prywatności oraz wolne oprogramowanie. Jeśli nie korzystasz jeszcze z systemu Linux, poniżej znajdziesz kilka dystrybucji, które polecamy wypróbować oraz kilka ogólnych porad dotyczących lepszej prywatności i bezpieczeństwa, które mają zastosowanie dla wielu dystrybucji systemu Linux. diff --git a/i18n/pl/dns.md b/i18n/pl/dns.md index cf028b12..baf87418 100644 --- a/i18n/pl/dns.md +++ b/i18n/pl/dns.md @@ -2,7 +2,7 @@ title: "Rekursywne serwery nazw" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. -cover: dns.png +cover: dns.webp --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Szyfrowany DNS nie pomoże Ci w ukryciu jakiejkolwiek aktywności w Internecie. diff --git a/i18n/pl/email-clients.md b/i18n/pl/email-clients.md index 6274e2e1..43afca76 100644 --- a/i18n/pl/email-clients.md +++ b/i18n/pl/email-clients.md @@ -2,7 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/pl/email.md b/i18n/pl/email.md index 9854c9f7..b3c47b82 100644 --- a/i18n/pl/email.md +++ b/i18n/pl/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. -cover: email.png +cover: email.webp --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/pl/encryption.md b/i18n/pl/encryption.md index 7bfc0c81..65eaa810 100644 --- a/i18n/pl/encryption.md +++ b/i18n/pl/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Oprogramowanie szyfrujące" icon: material/file-lock description: Szyfrowanie danych to jedyny sposób na kontrolowanie tego, kto ma do nich dostęp. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Szyfrowanie danych to jedyny sposób na kontrolowanie tego, kto ma do nich dostęp. Jeśli obecnie nie używasz oprogramowania szyfrującego dla swojego dysku, e-maili lub plików, możesz wybrać jedną z tych opcji. diff --git a/i18n/pl/file-sharing.md b/i18n/pl/file-sharing.md index fa86b3c3..b6492bdb 100644 --- a/i18n/pl/file-sharing.md +++ b/i18n/pl/file-sharing.md @@ -2,7 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Dowiedz się, jak prywatnie udostępniać piki pomiędzy swoimi urządzeniami, ze znajomymi lub rodziną lub anonimowo w sieci. -cover: file-sharing.png +cover: file-sharing.webp --- Dowiedz się, jak prywatnie udostępniać piki pomiędzy swoimi urządzeniami, ze znajomymi lub rodziną lub anonimowo w sieci. diff --git a/i18n/pl/financial-services.md b/i18n/pl/financial-services.md index 88c64835..6d7c9cf0 100644 --- a/i18n/pl/financial-services.md +++ b/i18n/pl/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/pl/frontends.md b/i18n/pl/frontends.md index a9325ee3..ffa29cb8 100644 --- a/i18n/pl/frontends.md +++ b/i18n/pl/frontends.md @@ -2,7 +2,7 @@ title: "Menedżery haseł" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/pl/mobile-browsers.md b/i18n/pl/mobile-browsers.md index faa9f0fa..6fb1f0e0 100644 --- a/i18n/pl/mobile-browsers.md +++ b/i18n/pl/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Przeglądarki mobilne" icon: octicons/device-mobile-16 description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/pl/multi-factor-authentication.md b/i18n/pl/multi-factor-authentication.md index a59adc58..3fa980ad 100644 --- a/i18n/pl/multi-factor-authentication.md +++ b/i18n/pl/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/pl/news-aggregators.md b/i18n/pl/news-aggregators.md index b3ae43ea..0ee226a6 100644 --- a/i18n/pl/news-aggregators.md +++ b/i18n/pl/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/pl/notebooks.md b/i18n/pl/notebooks.md index d719a2d8..e52413e0 100644 --- a/i18n/pl/notebooks.md +++ b/i18n/pl/notebooks.md @@ -2,7 +2,7 @@ title: "Notatniki" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Prowadź swoje notatniki i dzienniki bez udostępniania ich stronom trzecim. diff --git a/i18n/pl/os/macos-overview.md b/i18n/pl/os/macos-overview.md index 66e1cd9b..18646a87 100644 --- a/i18n/pl/os/macos-overview.md +++ b/i18n/pl/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Security - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/pl/passwords.md b/i18n/pl/passwords.md index 67574361..9f0d6131 100644 --- a/i18n/pl/passwords.md +++ b/i18n/pl/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/pl/productivity.md b/i18n/pl/productivity.md index bca14039..cf365d70 100644 --- a/i18n/pl/productivity.md +++ b/i18n/pl/productivity.md @@ -2,7 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/pl/real-time-communication.md b/i18n/pl/real-time-communication.md index 1f9f3dab..c2b7a665 100644 --- a/i18n/pl/real-time-communication.md +++ b/i18n/pl/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/pl/router.md b/i18n/pl/router.md index ebed3e06..1aa0b66a 100644 --- a/i18n/pl/router.md +++ b/i18n/pl/router.md @@ -2,7 +2,7 @@ title: "Oprogramowanie routera" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Poniżej wymieniono kilka alternatywnych systemów operacyjnych, które możesz zainstalować na swoim routerze, punkcie dostępowym Wi-Fi itp. diff --git a/i18n/pl/search-engines.md b/i18n/pl/search-engines.md index 5990b7ef..d66f9ec1 100644 --- a/i18n/pl/search-engines.md +++ b/i18n/pl/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/pl/tor.md b/i18n/pl/tor.md index 59dc33ca..d148799d 100644 --- a/i18n/pl/tor.md +++ b/i18n/pl/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/pl/vpn.md b/i18n/pl/vpn.md index f426465d..a6f3c2ab 100644 --- a/i18n/pl/vpn.md +++ b/i18n/pl/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/pt-BR/android.md b/i18n/pt-BR/android.md index 26324872..9b6163cf 100644 --- a/i18n/pt-BR/android.md +++ b/i18n/pt-BR/android.md @@ -3,7 +3,7 @@ meta_title: "Recomendações para Android: GrapheneOS e DivestOS — Privacy Gui title: "Android" icon: 'simple/android' description: Você pode substituir o sistema operacional do seu celular Android por essas alternativas seguras e que respeitam a privacidade. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/pt-BR/calendar.md b/i18n/pt-BR/calendar.md index 51699d2d..d579a0b5 100644 --- a/i18n/pt-BR/calendar.md +++ b/i18n/pt-BR/calendar.md @@ -2,7 +2,7 @@ title: "Agenda/Calendário Sincronizado" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Os calendários contêm alguns de seus dados mais confidenciais; use produtos que implementem E2EE em repouso para impedir que um provedor os leia. diff --git a/i18n/pt-BR/cloud.md b/i18n/pt-BR/cloud.md index d79eca03..e5998d41 100644 --- a/i18n/pt-BR/cloud.md +++ b/i18n/pt-BR/cloud.md @@ -3,7 +3,7 @@ meta_title: "Melhores Fornecedores Privados e Seguros de Armazenamento em Nuvem title: "Armazenamento em nuvem" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/pt-BR/cryptocurrency.md b/i18n/pt-BR/cryptocurrency.md index fad65f85..b518d4fe 100644 --- a/i18n/pt-BR/cryptocurrency.md +++ b/i18n/pt-BR/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Criptomoedas icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/pt-BR/data-redaction.md b/i18n/pt-BR/data-redaction.md index 4dd9a4d0..5e8cc4ad 100644 --- a/i18n/pt-BR/data-redaction.md +++ b/i18n/pt-BR/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/pt-BR/desktop-browsers.md b/i18n/pt-BR/desktop-browsers.md index 43b38021..9ff3dec1 100644 --- a/i18n/pt-BR/desktop-browsers.md +++ b/i18n/pt-BR/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Navegadores de Internet que Respeitam a Privacidade para PC e Mac title: "Navegadores Desktop" icon: material/laptop description: Estes navegadores de internet dão uma proteção à privacidade mais forte do que o Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/pt-BR/desktop.md b/i18n/pt-BR/desktop.md index b8f0acdc..d10d63b2 100644 --- a/i18n/pt-BR/desktop.md +++ b/i18n/pt-BR/desktop.md @@ -2,7 +2,7 @@ title: "Computador/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/pt-BR/dns.md b/i18n/pt-BR/dns.md index c64b57a9..f36f85aa 100644 --- a/i18n/pt-BR/dns.md +++ b/i18n/pt-BR/dns.md @@ -2,7 +2,7 @@ title: "Introdução ao DNS" icon: material/dns description: Estes são alguns provedores de DNS criptografados para os quais recomendamos mudar, para substituir a configuração padrão de seu ISP. -cover: dns.png +cover: dns.webp --- DNS criptografado com servidores de terceiros só deve ser usado para contornar o [bloqueio básico de DNS](https://en.wikipedia.org/wiki/DNS_blocking) quando você pode ter certeza de que não haverá nenhuma consequência. DNS criptografado não ajudará você a esconder nenhuma de suas atividades de navegação. diff --git a/i18n/pt-BR/email-clients.md b/i18n/pt-BR/email-clients.md index a5339667..0380ba9e 100644 --- a/i18n/pt-BR/email-clients.md +++ b/i18n/pt-BR/email-clients.md @@ -2,7 +2,7 @@ title: "Clientes de Email" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/pt-BR/email.md b/i18n/pt-BR/email.md index e07918af..3e54bca0 100644 --- a/i18n/pt-BR/email.md +++ b/i18n/pt-BR/email.md @@ -3,7 +3,7 @@ meta_title: "Recomendações de E-mail Privado Criptografado — Privacy Guides" title: "Serviços de Email" icon: material/email description: Esses provedores de email oferecem um ótimo lugar para armazenar seus emails de forma segura, e muitos oferecem criptografia OpenPGP compatível com outros provedores. -cover: email.png +cover: email.webp --- O "email" é praticamente uma necessidade para usar qualquer serviço “online”, contudo não o recomendamos para conversas pessoais. Ao invés de utilizar email para falar com outras pessoas, considere utilizar um meio de mensagens instantâneas que suporte sigilo encaminhado. diff --git a/i18n/pt-BR/encryption.md b/i18n/pt-BR/encryption.md index fdfc825e..b4049ce9 100644 --- a/i18n/pt-BR/encryption.md +++ b/i18n/pt-BR/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Softwares de Criptografia" icon: material/file-lock description: A criptografia de dados é a única maneira de controlar quem pode acessá-los. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- A criptografia de dados é a única maneira de controlar quem pode acessá-los. Se você atualmente não está usando “software” de criptografia para seu disco rígido, e-mails ou arquivos, você deve escolher uma opção aqui. diff --git a/i18n/pt-BR/file-sharing.md b/i18n/pt-BR/file-sharing.md index 8cdb5ad3..cf62be09 100644 --- a/i18n/pt-BR/file-sharing.md +++ b/i18n/pt-BR/file-sharing.md @@ -2,7 +2,7 @@ title: "Compartilhamento e Sincronização de Arquivos" icon: material/share-variant description: Descubra como compartilhar seus arquivos de forma privada entre seus dispositivos, com seus amigos e familiares ou de forma anônima on-line. -cover: file-sharing.png +cover: file-sharing.webp --- Descubra como compartilhar seus arquivos de forma privada entre seus dispositivos, com seus amigos e familiares ou de forma anônima on-line. diff --git a/i18n/pt-BR/financial-services.md b/i18n/pt-BR/financial-services.md index 1470648e..c19446ed 100644 --- a/i18n/pt-BR/financial-services.md +++ b/i18n/pt-BR/financial-services.md @@ -1,7 +1,7 @@ --- title: Serviços Financeiros icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/pt-BR/frontends.md b/i18n/pt-BR/frontends.md index dc846732..17389b86 100644 --- a/i18n/pt-BR/frontends.md +++ b/i18n/pt-BR/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/pt-BR/mobile-browsers.md b/i18n/pt-BR/mobile-browsers.md index 90250691..c0e514b4 100644 --- a/i18n/pt-BR/mobile-browsers.md +++ b/i18n/pt-BR/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/pt-BR/multi-factor-authentication.md b/i18n/pt-BR/multi-factor-authentication.md index d7c20577..0f9baeac 100644 --- a/i18n/pt-BR/multi-factor-authentication.md +++ b/i18n/pt-BR/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/pt-BR/news-aggregators.md b/i18n/pt-BR/news-aggregators.md index 502caf72..18dae6b3 100644 --- a/i18n/pt-BR/news-aggregators.md +++ b/i18n/pt-BR/news-aggregators.md @@ -2,7 +2,7 @@ title: "Agregadores de Notícias" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/pt-BR/notebooks.md b/i18n/pt-BR/notebooks.md index 472404bc..0bcd967d 100644 --- a/i18n/pt-BR/notebooks.md +++ b/i18n/pt-BR/notebooks.md @@ -2,7 +2,7 @@ title: "Blocos de Notas" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Mantenha o controle de suas anotações e registros de atividades sem entregá-los a terceiros. diff --git a/i18n/pt-BR/os/macos-overview.md b/i18n/pt-BR/os/macos-overview.md index f897b5a9..10b5c92f 100644 --- a/i18n/pt-BR/os/macos-overview.md +++ b/i18n/pt-BR/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Segurança - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/pt-BR/passwords.md b/i18n/pt-BR/passwords.md index 469417cf..31e4b0d3 100644 --- a/i18n/pt-BR/passwords.md +++ b/i18n/pt-BR/passwords.md @@ -3,7 +3,7 @@ meta_title: "Os Melhores Gerenciadores de Senhas para Proteger sua Privacidade e title: "Gerenciadores de Senhas" icon: material/form-textbox-password description: Gerenciadores de senhas permitem que você armazene e gerencie com segurança senhas e outras credenciais. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/pt-BR/productivity.md b/i18n/pt-BR/productivity.md index 823d3f1c..6d0b6de5 100644 --- a/i18n/pt-BR/productivity.md +++ b/i18n/pt-BR/productivity.md @@ -2,7 +2,7 @@ title: "Ferramentas de Produtividade" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/pt-BR/real-time-communication.md b/i18n/pt-BR/real-time-communication.md index 212e5288..c9d20981 100644 --- a/i18n/pt-BR/real-time-communication.md +++ b/i18n/pt-BR/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "Melhores Mensageiros Instantâneos Privados — Privacy Guides" title: "Comunicação em Tempo Real" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/pt-BR/router.md b/i18n/pt-BR/router.md index a2be3290..f6c52303 100644 --- a/i18n/pt-BR/router.md +++ b/i18n/pt-BR/router.md @@ -2,7 +2,7 @@ title: "Firmware para Roteadores" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Abaixo estão alguns sistemas operacionais alternativos, que podem ser usados em roteadores, pontos de acesso Wi-Fi, etc. diff --git a/i18n/pt-BR/search-engines.md b/i18n/pt-BR/search-engines.md index 30f6e4d2..85034f4e 100644 --- a/i18n/pt-BR/search-engines.md +++ b/i18n/pt-BR/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Mecanismos de Pesquisa Recomendados: Alternativas Anônimas ao Goog title: "Motores de busca" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/pt-BR/tor.md b/i18n/pt-BR/tor.md index 709ac1c4..2cb2c460 100644 --- a/i18n/pt-BR/tor.md +++ b/i18n/pt-BR/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Rede Tor" icon: simple/torproject description: Proteja a sua navegação na Internet de olhares curiosos utilizando a rede Tor, uma rede segura que contorna a censura. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/pt-BR/vpn.md b/i18n/pt-BR/vpn.md index 2c010dc6..a59b18da 100644 --- a/i18n/pt-BR/vpn.md +++ b/i18n/pt-BR/vpn.md @@ -3,7 +3,7 @@ meta_title: "Recomendações e Comparação de Serviços VPN Privados, Sem Patro title: "Serviços de VPN" icon: material/vpn description: Estes são os melhores serviços VPN para proteger sua privacidade e segurança on-line. Encontre aqui um provedor que não tem como objetivo espionar você. -cover: vpn.png +cover: vpn.webp --- Se você está procurando mais **privacidade** do seu provedor de internet (ISP), ou em uma rede Wi-Fi pública, ou ao fazer torrent de arquivos, uma VPN pode ser a solução para você, desde que entenda os riscos envolvidos. Nós entendemos que estes provedores estão acima dos demais: diff --git a/i18n/pt/android.md b/i18n/pt/android.md index f4862f24..b7067509 100644 --- a/i18n/pt/android.md +++ b/i18n/pt/android.md @@ -3,7 +3,7 @@ meta_title: "Recomendações para Android: GrapheneOS e DivestOS - Privacy Guide title: "Android" icon: 'simple/android' description: Pode substituir o sistema operativo do seu telemóvel Android por estas alternativas seguras e respeitadoras de privacidade. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/pt/calendar.md b/i18n/pt/calendar.md index c4fdc73e..21f3d82e 100644 --- a/i18n/pt/calendar.md +++ b/i18n/pt/calendar.md @@ -2,7 +2,7 @@ title: "Sincronização do calendário" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/pt/cloud.md b/i18n/pt/cloud.md index 49bcf043..2a6f7acd 100644 --- a/i18n/pt/cloud.md +++ b/i18n/pt/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Armazenamento em nuvem" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/pt/cryptocurrency.md b/i18n/pt/cryptocurrency.md index 741f23ae..5ff2a039 100644 --- a/i18n/pt/cryptocurrency.md +++ b/i18n/pt/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Criptomoeda icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/pt/data-redaction.md b/i18n/pt/data-redaction.md index d11450f1..88b7f27a 100644 --- a/i18n/pt/data-redaction.md +++ b/i18n/pt/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Ferramentas de encriptação" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- Ao partilhar ficheiros, certifique-se de que remove os metadados associados. Os arquivos de imagem geralmente incluem [EXIF](https://en.wikipedia.org/wiki/Exif) dados. As fotos às vezes até incluem [GPS](https://en.wikipedia.org/wiki/Global_Positioning_System) coordenadas nos metadados do arquivo. diff --git a/i18n/pt/desktop-browsers.md b/i18n/pt/desktop-browsers.md index 2369c35a..8b2f777a 100644 --- a/i18n/pt/desktop-browsers.md +++ b/i18n/pt/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Web Browsers para PC e Mac que respeitam a privacidade - Privacy Gu title: "Browsers para Desktop" icon: material/laptop description: Estes browsers protegem muito mais a sua privacidade do que o Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/pt/desktop.md b/i18n/pt/desktop.md index 2959f308..e379c803 100644 --- a/i18n/pt/desktop.md +++ b/i18n/pt/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: fontawesome/brands/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/pt/dns.md b/i18n/pt/dns.md index 8769bdd1..0c673c1c 100644 --- a/i18n/pt/dns.md +++ b/i18n/pt/dns.md @@ -2,7 +2,7 @@ title: "Introdução ao DNS" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. -cover: dns.png +cover: dns.webp --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. DNS criptografado não o ajudará a ocultar qualquer atividade de navegação. diff --git a/i18n/pt/email-clients.md b/i18n/pt/email-clients.md index 462edc44..7704bf77 100644 --- a/i18n/pt/email-clients.md +++ b/i18n/pt/email-clients.md @@ -2,7 +2,7 @@ title: "Clientes de e-mail" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Nossa lista de recomendações contém clientes de e-mail que suportam tanto [OpenPGP](/encryption/#openpgp) e autenticação forte como [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth permite-lhe utilizar [Multi-Factor Authentication](/multi-factor-authentication) e prevenir o roubo de contas. diff --git a/i18n/pt/email.md b/i18n/pt/email.md index 4896835d..93089bf3 100644 --- a/i18n/pt/email.md +++ b/i18n/pt/email.md @@ -3,7 +3,7 @@ meta_title: "Recomendações de Correio Eletrónico Privado Encriptado - Privacy title: "Serviços de Correio Eletrónico" icon: material/email description: Estes fornecedores de correio eletrónico são um excelente local para armazenar as suas mensagens eletrónicas em segurança e muitos oferecem encriptação OpenPGP interoperável com outros fornecedores. -cover: email.png +cover: email.webp --- O correio eletrónico é praticamente uma necessidade para subscrever qualquer serviço online, mas não o recomendamos para conversas pessoais. Em vez de utilizar o correio eletrónico para contactar outras pessoas, considere a possibilidade de utilizar uma aplicação de mensagens instantâneas que suporte encaminhamento sigiloso. diff --git a/i18n/pt/encryption.md b/i18n/pt/encryption.md index d4361bd0..33d374aa 100644 --- a/i18n/pt/encryption.md +++ b/i18n/pt/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Software de encriptação" icon: material/file-lock description: A encriptação de dados é a única forma de controlar quem pode acessá-los. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- A encriptação de dados é a única forma de controlar quem pode acessá-los. Se você não estiver usando software de criptografia para o seu disco rígido, e-mails ou arquivos, você deve escolher uma opção aqui. diff --git a/i18n/pt/file-sharing.md b/i18n/pt/file-sharing.md index 24eef964..8dd2c366 100644 --- a/i18n/pt/file-sharing.md +++ b/i18n/pt/file-sharing.md @@ -2,7 +2,7 @@ title: "Partilha e Sincronização de Ficheiros" icon: material/share-variant description: Descubra como partilhar os seus ficheiros em privado entre os seus dispositivos, com os seus amigos e família, ou anonimamente online. -cover: file-sharing.png +cover: file-sharing.webp --- Descubra como partilhar os seus ficheiros em privado entre os seus dispositivos, com os seus amigos e família, ou anonimamente online. diff --git a/i18n/pt/financial-services.md b/i18n/pt/financial-services.md index 2dc7465d..7f42290f 100644 --- a/i18n/pt/financial-services.md +++ b/i18n/pt/financial-services.md @@ -1,7 +1,7 @@ --- title: Serviços financeiros icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/pt/frontends.md b/i18n/pt/frontends.md index 11001fcc..54c6b1f9 100644 --- a/i18n/pt/frontends.md +++ b/i18n/pt/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: Estes frontends de código aberto para vários serviços da Internet permitem-lhe aceder a conteúdos sem JavaScript ou outro tipo de inconvenientes. -cover: frontends.png +cover: frontends.webp --- Por vezes, os serviços tentam forçá-lo a criar uma conta, bloqueando o acesso a conteúdos com popups irritantes. Também podem não funcionar como pretendido se o JavaScript não for ativado. Estes frontends existem para permitir contornar estas restrições. diff --git a/i18n/pt/mobile-browsers.md b/i18n/pt/mobile-browsers.md index 9a8dc5fc..34287fec 100644 --- a/i18n/pt/mobile-browsers.md +++ b/i18n/pt/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Navegadores para Android e iOS que respeitam a privacidade - Privac title: "Navegadores para dispositivos móveis" icon: material/cellphone-information description: Estes navegadores são os que recomendamos atualmente para a navegação normal/não anónima na Internet no seu telemóvel. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/pt/multi-factor-authentication.md b/i18n/pt/multi-factor-authentication.md index c1552f91..d1684dd6 100644 --- a/i18n/pt/multi-factor-authentication.md +++ b/i18n/pt/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Autenticadores Multifator" icon: 'O uso de AMF forte pode parar mais de 99% dos acessos não autorizados à conta, e é fácil de configurar nos serviços que você já usa.' description: Estas ferramentas ajudam-no a proteger as suas contas na Internet com a Autenticação Multifator, sem que sejam enviados os seus segredos a terceiros. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Chaves de Segurança de Hardware diff --git a/i18n/pt/news-aggregators.md b/i18n/pt/news-aggregators.md index dd1b4720..eefec61d 100644 --- a/i18n/pt/news-aggregators.md +++ b/i18n/pt/news-aggregators.md @@ -2,7 +2,7 @@ title: "Agregadores de notícias" icon: material/rss description: Estes clientes agregadores de notícias funcionam com base em normas da Internet como o RSS, e permitem-lhe manter-se a par dos seus blogues e sites de notícias favoritos. -cover: news-aggregators.png +cover: news-aggregators.webp --- Um [agregador de notícias](https://en.wikipedia.org/wiki/News_aggregator) é uma forma de se manter a par dos seus blogues e sites de notícias favoritos. diff --git a/i18n/pt/notebooks.md b/i18n/pt/notebooks.md index ce605ddb..69df6457 100644 --- a/i18n/pt/notebooks.md +++ b/i18n/pt/notebooks.md @@ -2,7 +2,7 @@ title: "Aplicações de Notas" icon: material/notebook-edit-outline description: Estas aplicações de notas encriptadas permitem-lhe manter um registo das suas notas sem as ceder a terceiros. -cover: notebooks.png +cover: notebooks.webp --- Mantenha um registo das suas notas e diários sem os entregar a terceiros. diff --git a/i18n/pt/os/macos-overview.md b/i18n/pt/os/macos-overview.md index a6c723ac..89a9feb0 100644 --- a/i18n/pt/os/macos-overview.md +++ b/i18n/pt/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Segurança - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/pt/passwords.md b/i18n/pt/passwords.md index 6d9b524a..45cd866f 100644 --- a/i18n/pt/passwords.md +++ b/i18n/pt/passwords.md @@ -3,7 +3,7 @@ meta_title: "Os melhores gestores de palavras-passe para proteger a sua privacid title: "Gestores de palavras-passe" icon: material/form-textbox-password description: Os gestores de palavras-passe permitem-lhe armazenar e gerir de forma segura as suas palavras-passe e outras credenciais. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/pt/productivity.md b/i18n/pt/productivity.md index ef00949d..af057e14 100644 --- a/i18n/pt/productivity.md +++ b/i18n/pt/productivity.md @@ -2,7 +2,7 @@ title: "Ferramentas de Produtividade" icon: material/file-sign description: A maioria das suítes de escritório online não suporta E2EE, o que significa que o fornecedor da nuvem tem acesso a tudo o que faz. -cover: productivity.png +cover: productivity.webp --- A maioria das suítes de escritório online não suporta E2EE, o que significa que o fornecedor da nuvem tem acesso a tudo o que faz. A política de privacidade pode proteger legalmente os seus direitos, mas não prevê restrições técnicas de acesso. diff --git a/i18n/pt/real-time-communication.md b/i18n/pt/real-time-communication.md index f2762020..b9fbc9ef 100644 --- a/i18n/pt/real-time-communication.md +++ b/i18n/pt/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "As melhores aplicações de mensagens instantâneas com foco na pri title: "Comunicação em tempo real" icon: material/chat-processing description: Outras aplicações de mensagens instantâneas disponibilizam todas as suas conversas privadas à empresa que as gere. -cover: real-time-communication.png +cover: real-time-communication.webp --- Estas são as nossas recomendações para comunicação encriptada em tempo real. diff --git a/i18n/pt/router.md b/i18n/pt/router.md index 07f661bf..752e45de 100644 --- a/i18n/pt/router.md +++ b/i18n/pt/router.md @@ -2,7 +2,7 @@ title: "Firmware do router" icon: material/router-wireless description: Estes sistemas operativos alternativos podem ser utilizados para proteger o seu router ou ponto de acesso Wi-Fi. -cover: router.png +cover: router.webp --- Apresentamos alguns sistemas operativos alternativos, que podem ser usados em routers, access points Wi-Fi, etc. diff --git a/i18n/pt/search-engines.md b/i18n/pt/search-engines.md index d625794e..6720541c 100644 --- a/i18n/pt/search-engines.md +++ b/i18n/pt/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Motores de pesquisa recomendados: alternativas anónimas ao Google title: "Motores de Busca" icon: material/search-web description: Estes motores de busca, que respeitam a privacidade, não criam um perfil de marketing com base nas suas pesquisas. -cover: search-engines.png +cover: search-engines.webp --- Utilize um motor de busca que não crie um perfil de marketing com base nas suas pesquisas. diff --git a/i18n/pt/tor.md b/i18n/pt/tor.md index 0a4679cc..6e7b7979 100644 --- a/i18n/pt/tor.md +++ b/i18n/pt/tor.md @@ -3,7 +3,7 @@ meta_title: "Navegador e rede Tor: navegação anónima na Web - Privacy Guides" title: "Rede Tor" icon: simple/torproject description: Proteja a sua navegação na Internet de olhares curiosos utilizando a rede Tor, uma rede segura que contorna a censura. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/pt/vpn.md b/i18n/pt/vpn.md index da64f55b..9cb1537f 100644 --- a/i18n/pt/vpn.md +++ b/i18n/pt/vpn.md @@ -3,7 +3,7 @@ meta_title: "Recomendações e comparações de serviços de privacidade VPN, se title: "Serviços VPN" icon: material/vpn description: Estes são os melhores serviços VPN para proteger a sua privacidade e segurança online. Encontrará aqui fornecedores de Vpn que não o espiam. -cover: vpn.png +cover: vpn.webp --- Se procura privacidade adicional **** para o seu ISP, quando usa uma rede Wi-Fi pública ou enquanto faz torrenting de ficheiros, uma VPN pode ser a solução para si, desde que compreenda os riscos envolvidos. Consideramos que estes fornecedores estão um passo à frente dos restantes: diff --git a/i18n/ru/android.md b/i18n/ru/android.md index a54339c9..ff0159b8 100644 --- a/i18n/ru/android.md +++ b/i18n/ru/android.md @@ -3,7 +3,7 @@ meta_title: "Рекомендации по Android: GrapheneOS и DivestOS - Pri title: "Android" icon: 'simple/android' description: Вы можете заменить операционную систему на своем Android на эти безопасные и конфиденциальные альтернативы. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/ru/calendar.md b/i18n/ru/calendar.md index c5b7fad1..1170fe63 100644 --- a/i18n/ru/calendar.md +++ b/i18n/ru/calendar.md @@ -2,7 +2,7 @@ title: "Синхронизация календаря" icon: material/calendar description: Календари хранят часть ваших самых конфиденциальных данных; используйте приложения, которые хранят ваши данные в зашифрованном виде. -cover: calendar.png +cover: calendar.webp --- Ваши события в календаре - одни из самых конфиденциальных данных. Используйте продукты с поддержкой автоматического E2EE, чтобы предотвратить их чтение провайдером. diff --git a/i18n/ru/cloud.md b/i18n/ru/cloud.md index a8363046..9774954e 100644 --- a/i18n/ru/cloud.md +++ b/i18n/ru/cloud.md @@ -3,7 +3,7 @@ meta_title: "Лучшие приватные и безопасные облач title: "Облачное хранилище" icon: material/file-cloud description: Многие облачные хранилища требуют от вас полностью им доверять, что они не будут просматривать ваши файлы. Это приватные альтернативы! -cover: cloud.png +cover: cloud.webp --- Многие облачные хранилища требуют от вас полностью им доверять, что они не будут просматривать ваши файлы. Альтернативы, перечисленные ниже, устраняют необходимость в доверии путем внедрения безопасного E2EE. diff --git a/i18n/ru/cryptocurrency.md b/i18n/ru/cryptocurrency.md index 17cfa070..bd961c83 100644 --- a/i18n/ru/cryptocurrency.md +++ b/i18n/ru/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Приватные криптовалютные блокчейны - Privacy Guides" title: Криптовалюта icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Платежи в интернете - одна из самых серьезных проблем, связанных с конфиденциальностью. Эти криптовалюты по умолчанию обеспечивают конфиденциальность транзакций (что **не** гарантируется большинством криптовалют), при условии, что вы хорошо понимаете, как эффективно осуществлять приватные платежи. Мы настоятельно рекомендуем вам сначала прочитать нашу обзорную статью о платежах, прежде чем совершать какие-либо покупки: diff --git a/i18n/ru/data-redaction.md b/i18n/ru/data-redaction.md index f5ee228f..5137fa18 100644 --- a/i18n/ru/data-redaction.md +++ b/i18n/ru/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Удаление ПД с помощью инструментов у title: "Редактирование данных и метаданных" icon: material/tag-remove description: Используйте эти инструменты для удаления метаданных, таких как местоположение GPS и другой идентифицирующей информации, с фотографий и файлов, которыми вы делитесь. -cover: data-redaction.png +cover: data-redaction.webp --- Когда вы делитесь с кем-то файлами, то не забудьте удалить связанные с ними метаданные. Файлы изображений обычно содержат [данные EXIF](https://ru.wikipedia.org/wiki/Exif). Иногда фотографии даже содержат ваши GPS координаты в метаданных файла. diff --git a/i18n/ru/desktop-browsers.md b/i18n/ru/desktop-browsers.md index 36223652..9276514a 100644 --- a/i18n/ru/desktop-browsers.md +++ b/i18n/ru/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Интернет браузеры соблюдающие конфи title: "Браузеры для настольных компьютеров" icon: material/laptop description: Эти браузеры обеспечивают более надежную защиту конфиденциальности, чем Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/ru/desktop.md b/i18n/ru/desktop.md index 88e6e7c8..79496a53 100644 --- a/i18n/ru/desktop.md +++ b/i18n/ru/desktop.md @@ -2,7 +2,7 @@ title: "Персональный компьютер" icon: simple/linux description: Дистрибутивы Linux часто рекомендуются для защиты конфиденциальности и свободы пользователей. -cover: desktop.png +cover: desktop.webp --- Дистрибутивы Linux часто рекомендуются для защиты конфиденциальности и свободы пользователей. Если вы еще не используете Linux, ниже приведены некоторые дистрибутивы, которые мы рекомендуем попробовать, а также несколько общих советов по улучшению конфиденциальности и безопасности, которые применимы ко многим дистрибутивам Linux. diff --git a/i18n/ru/dns.md b/i18n/ru/dns.md index ce66907f..704fb509 100644 --- a/i18n/ru/dns.md +++ b/i18n/ru/dns.md @@ -2,7 +2,7 @@ title: "DNS-провайдеры" icon: material/dns description: Здесь показаны некоторые DNS-провайдеры с поддержкой шифрования, к которым мы рекомендуем вам перейти, заменив конфигурацию вашего интернет-провайдера по умолчанию. -cover: dns.png +cover: dns.webp --- Зашифрованный DNS со сторонними серверами следует использовать только для обхода базовой [блокировки DNS](https://en.wikipedia.org/wiki/DNS_blocking), если вы уверены, что это не повлечет за собой никаких последствий. Зашифрованный DNS не поможет вам скрыть какую-либо активность в интернете. diff --git a/i18n/ru/email-clients.md b/i18n/ru/email-clients.md index 6d3e5029..d62e7d1f 100644 --- a/i18n/ru/email-clients.md +++ b/i18n/ru/email-clients.md @@ -2,7 +2,7 @@ title: "Почтовые клиенты" icon: material/email-open description: Эти почтовые клиенты соблюдают конфиденциальность и поддерживают шифрование электронной почты OpenPGP. -cover: email-clients.png +cover: email-clients.webp --- Наш список рекомендаций содержит только почтовые клиенты, которые поддерживают [OpenPGP](/encryption/#openpgp) и безопасную аутентификацию (например, [OAuth](https://ru.wikipedia.org/wiki/OAuth)). OAuth позволяет использовать [многофакторную аутентификацию](basics/multi-factor-authentication.md) и предотвратить кражу учетных записей. diff --git a/i18n/ru/email.md b/i18n/ru/email.md index 66fb8032..9d90065b 100644 --- a/i18n/ru/email.md +++ b/i18n/ru/email.md @@ -3,7 +3,7 @@ meta_title: "Рекомендации по шифрованной конфиде title: "Электронная почта" icon: material/email description: Эти провайдеры электронной почты предлагают отличное место для безопасного хранения ваших писем. Многие из них предлагают еще и совместимое с другими провайдерами шифрование OpenPGP. -cover: email.png +cover: email.webp --- Электронная почта практически всегда необходима для использования любого онлайн-сервиса, однако мы не рекомендуем использовать её для общения с людьми. Вместо того, чтобы использовать электронную почту для связи с другими людьми, мы советуем использовать мессенджеры, которые поддерживают прямую секретность. diff --git a/i18n/ru/encryption.md b/i18n/ru/encryption.md index 1b57963a..26b22971 100644 --- a/i18n/ru/encryption.md +++ b/i18n/ru/encryption.md @@ -3,7 +3,7 @@ meta_title: "Рекомендуемые программы для шифрова title: "Программы для шифрования" icon: material/file-lock description: Шифрование данных - единственный способ контролировать доступ к ним. Эти программы позволяют шифровать электронную почту и любые другие файлы. -cover: encryption.png +cover: encryption.webp --- Шифрование данных - единственный способ контролировать доступ к ним. Если вы еще не используете какие-либо инструменты шифрования диска, электронной почты или файлов, то вы можете выбрать один из них тут. diff --git a/i18n/ru/file-sharing.md b/i18n/ru/file-sharing.md index 8221f9fe..09e26be0 100644 --- a/i18n/ru/file-sharing.md +++ b/i18n/ru/file-sharing.md @@ -2,7 +2,7 @@ title: "Синхронизация и обмен файлами" icon: material/share-variant description: Узнайте, как конфиденциально обмениваться файлами между устройствами, с друзьями и родственниками или анонимно в Интернете. -cover: file-sharing.png +cover: file-sharing.webp --- Узнайте, как конфиденциально обмениваться файлами между устройствами, с друзьями и родственниками или анонимно в Интернете. diff --git a/i18n/ru/financial-services.md b/i18n/ru/financial-services.md index 387a605b..5c9ca518 100644 --- a/i18n/ru/financial-services.md +++ b/i18n/ru/financial-services.md @@ -1,7 +1,7 @@ --- title: Финансовые услуги icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Платежи в интернете - одно из самых больших испытаний для конфиденциальности. Эти службы могут помочь вам защитить вашу конфиденциальность от продавцов и других отслеживающих устройств, если вы хорошо понимаете, как эффективно осуществлять приватные платежи. Мы настоятельно рекомендуем вам сначала прочитать нашу обзорную статью о платежах, прежде чем совершать какие-либо покупки: diff --git a/i18n/ru/frontends.md b/i18n/ru/frontends.md index 49698cc8..7c5d7264 100644 --- a/i18n/ru/frontends.md +++ b/i18n/ru/frontends.md @@ -2,7 +2,7 @@ title: "Фронтенды" icon: material/flip-to-front description: Эти фронтенды с открытым исходным кодом для различных интернет-сервисов позволяют получить доступ к содержимому без JavaScript или других раздражающих факторов. -cover: frontends.png +cover: frontends.webp --- Иногда сервисы пытаются заставить вас создать аккаунт, блокируя доступ к контенту с помощью назойливых всплывающих окон. Они также могут не работать без включенного JavaScript. Эти фронтенды могут позволить вам обойти эти ограничения. diff --git a/i18n/ru/mobile-browsers.md b/i18n/ru/mobile-browsers.md index 6c647fd9..c7221a08 100644 --- a/i18n/ru/mobile-browsers.md +++ b/i18n/ru/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Мобильные браузеры для Android и iOS, собл title: "Мобильные браузеры" icon: material/cellphone-information description: Мы рекомендуем эти браузеры для обычного/неанонимного браузинга в интернете на вашем телефоне. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/ru/multi-factor-authentication.md b/i18n/ru/multi-factor-authentication.md index c8613f42..d3e6525e 100644 --- a/i18n/ru/multi-factor-authentication.md +++ b/i18n/ru/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Многофакторная аутентификация" icon: 'material/two-factor-authentication' description: Эти инструменты помогут вам защитить ваши учетные записи в интернете с помощью многофакторной аутентификации без передачи ваших секретов третьим лицам. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Аппаратные ключи безопасности diff --git a/i18n/ru/news-aggregators.md b/i18n/ru/news-aggregators.md index ad333085..7e5bac3e 100644 --- a/i18n/ru/news-aggregators.md +++ b/i18n/ru/news-aggregators.md @@ -2,7 +2,7 @@ title: "Агрегаторы новостей" icon: material/rss description: Эти агрегаторы новостей позволяют вам следить за любимыми блогами и новостными сайтами, используя такие интернет-стандарты, как RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- [Новостные агрегаторы](https://en.wikipedia.org/wiki/News_aggregator) - это простой способ следить за любимыми блогами и новостными сайтами. diff --git a/i18n/ru/notebooks.md b/i18n/ru/notebooks.md index 1316a6ce..8300c0b4 100644 --- a/i18n/ru/notebooks.md +++ b/i18n/ru/notebooks.md @@ -2,7 +2,7 @@ title: "Заметки" icon: material/notebook-edit-outline description: Эти приложения позволяют вести заметки в зашифрованном виде без передачи данных третьим лицам. -cover: notebooks.png +cover: notebooks.webp --- Сохраняйте свои заметки и дневники, не передавая их третьим лицам. diff --git a/i18n/ru/os/macos-overview.md b/i18n/ru/os/macos-overview.md index 098f220a..8ce2a3ae 100644 --- a/i18n/ru/os/macos-overview.md +++ b/i18n/ru/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Безопасность - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### Рандомизация MAC-адресов -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/ru/passwords.md b/i18n/ru/passwords.md index 0b186a95..18a78b75 100644 --- a/i18n/ru/passwords.md +++ b/i18n/ru/passwords.md @@ -3,7 +3,7 @@ meta_title: "Лучшие менеджеры паролей для защиты title: "Менеджеры паролей" icon: material/form-textbox-password description: Менеджеры паролей позволяют безопасно хранить и управлять не только паролями, но и другими данными аккаунтов. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/ru/productivity.md b/i18n/ru/productivity.md index 2cbc7170..3180d804 100644 --- a/i18n/ru/productivity.md +++ b/i18n/ru/productivity.md @@ -2,7 +2,7 @@ title: "Инструменты для продуктивности" icon: material/file-sign description: Большинство онлайновых офисных пакетов не поддерживают E2EE, что означает, что поставщик облачных услуг имеет доступ ко всему, что вы делаете. -cover: productivity.png +cover: productivity.webp --- Большинство онлайновых офисных пакетов не поддерживают E2EE, что означает, что поставщик облачных услуг имеет доступ ко всему, что вы делаете. Политика конфиденциальности может юридически защитить ваши права, но она не обеспечивает технических ограничений доступа. diff --git a/i18n/ru/real-time-communication.md b/i18n/ru/real-time-communication.md index b7ff07ad..58c5efae 100644 --- a/i18n/ru/real-time-communication.md +++ b/i18n/ru/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "Лучшие приватные мессенджеры - Privacy Gu title: "Мессенджеры" icon: material/chat-processing description: Другие мессенджеры делают все ваши личные переписки доступными для компании, которые этими мессенджерами управляют. -cover: real-time-communication.png +cover: real-time-communication.webp --- Это наши рекомендации по зашифрованному общению в режиме реального времени. diff --git a/i18n/ru/router.md b/i18n/ru/router.md index b1ec517c..5f24bd53 100644 --- a/i18n/ru/router.md +++ b/i18n/ru/router.md @@ -2,7 +2,7 @@ title: "Прошивки для роутера" icon: material/router-wireless description: Эти альтернативные операционные системы могут использоваться для защиты маршрутизатора или точки доступа Wi-Fi. -cover: router.png +cover: router.webp --- Ниже приведены альтернативные операционные системы, которые могут использоваться на роутерах, точках доступа Wi-Fi и т. п. diff --git a/i18n/ru/search-engines.md b/i18n/ru/search-engines.md index dfed892d..c8e9abd7 100644 --- a/i18n/ru/search-engines.md +++ b/i18n/ru/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Рекомендуемые поисковые системы: ан title: "Поисковые системы" icon: material/search-web description: Эти поисковые системы, уважающие конфиденциальность, не строят рекламный профиль на основе ваших поисковых запросов. -cover: search-engines.png +cover: search-engines.webp --- Используйте поисковую систему, которая не строит рекламный профиль на основе ваших запросов. diff --git a/i18n/ru/tor.md b/i18n/ru/tor.md index e8aa6081..e164d3a0 100644 --- a/i18n/ru/tor.md +++ b/i18n/ru/tor.md @@ -3,7 +3,7 @@ meta_title: "Браузер и сеть Tor: Анонимный браузинг title: "Сеть Tor" icon: simple/torproject description: Защити свой интернет-сёрфинг от посторонних глаз, используя сеть Tor - безопасную сеть, обходящую цензуру. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/ru/vpn.md b/i18n/ru/vpn.md index 5ed442a4..41791825 100644 --- a/i18n/ru/vpn.md +++ b/i18n/ru/vpn.md @@ -3,7 +3,7 @@ meta_title: "Рекомендации и сравнение приватных V title: "VPN сервисы" icon: material/vpn description: Это лучшие VPN-сервисы для защиты вашей конфиденциальности и безопасности в Интернете. Найдите провайдера, который не будет шпионить за вами. -cover: vpn.png +cover: vpn.webp --- Если вам нужна дополнительная **приватность** от своего провайдера, при подключении к публичным сетям Wi-Fi или во время скачивания торрентов, VPN может быть правильным решением для вас, если вы понимаете связанные с этим риски. Мы считаем, что эти VPN-провайдеры на голову выше остальных: diff --git a/i18n/sv/android.md b/i18n/sv/android.md index aad8923e..88c1aa29 100644 --- a/i18n/sv/android.md +++ b/i18n/sv/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/sv/calendar.md b/i18n/sv/calendar.md index c71f20c2..e90c9d3a 100644 --- a/i18n/sv/calendar.md +++ b/i18n/sv/calendar.md @@ -2,7 +2,7 @@ title: "Kalendersynkronisering" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/sv/cloud.md b/i18n/sv/cloud.md index 60004af2..349bf53f 100644 --- a/i18n/sv/cloud.md +++ b/i18n/sv/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Molnlagring" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Många molnlagringsleverantörer kräver ditt fulla förtroende för att de inte kommer att titta på dina filer. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/sv/cryptocurrency.md b/i18n/sv/cryptocurrency.md index dd268334..b9a7b7b6 100644 --- a/i18n/sv/cryptocurrency.md +++ b/i18n/sv/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/sv/data-redaction.md b/i18n/sv/data-redaction.md index bc64f5fd..f56df7b5 100644 --- a/i18n/sv/data-redaction.md +++ b/i18n/sv/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Redigering av data och metadata" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- När du delar filer ska du se till att ta bort tillhörande metadata. Bildfiler innehåller vanligtvis [Exif](https://en.wikipedia.org/wiki/Exif) data. Foton innehåller ibland även GPS-koordinater i filmetadata. diff --git a/i18n/sv/desktop-browsers.md b/i18n/sv/desktop-browsers.md index ba695206..762640a0 100644 --- a/i18n/sv/desktop-browsers.md +++ b/i18n/sv/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/sv/desktop.md b/i18n/sv/desktop.md index 66be26af..a3bb8217 100644 --- a/i18n/sv/desktop.md +++ b/i18n/sv/desktop.md @@ -2,7 +2,7 @@ title: "Skrivbord" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/sv/dns.md b/i18n/sv/dns.md index 25c27f2e..0e169225 100644 --- a/i18n/sv/dns.md +++ b/i18n/sv/dns.md @@ -2,7 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. -cover: dns.png +cover: dns.webp --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/sv/email-clients.md b/i18n/sv/email-clients.md index 53af9817..f815317c 100644 --- a/i18n/sv/email-clients.md +++ b/i18n/sv/email-clients.md @@ -2,7 +2,7 @@ title: "E-postklienter" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/sv/email.md b/i18n/sv/email.md index bf066c07..06eb123c 100644 --- a/i18n/sv/email.md +++ b/i18n/sv/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. -cover: email.png +cover: email.webp --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/sv/encryption.md b/i18n/sv/encryption.md index e9f0f55a..7cfc72ca 100644 --- a/i18n/sv/encryption.md +++ b/i18n/sv/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Programvara för kryptering" icon: material/file-lock description: Kryptering av data är det enda sättet att kontrollera vem som har tillgång till dem. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Kryptering av data är det enda sättet att kontrollera vem som har tillgång till dem. Om du för närvarande inte använder krypteringsprogram för din hårddisk, e-post eller filer bör du välja ett alternativ här. diff --git a/i18n/sv/file-sharing.md b/i18n/sv/file-sharing.md index 5c519259..9854b2ea 100644 --- a/i18n/sv/file-sharing.md +++ b/i18n/sv/file-sharing.md @@ -2,7 +2,7 @@ title: "Fildelning och synkronisering" icon: material/share-variant description: Upptäck hur du kan dela dina filer privat mellan dina enheter, med vänner och familj eller anonymt på nätet. -cover: file-sharing.png +cover: file-sharing.webp --- Upptäck hur du kan dela dina filer privat mellan dina enheter, med vänner och familj eller anonymt på nätet. diff --git a/i18n/sv/financial-services.md b/i18n/sv/financial-services.md index 9e413db6..d314979a 100644 --- a/i18n/sv/financial-services.md +++ b/i18n/sv/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/sv/frontends.md b/i18n/sv/frontends.md index b4a935f2..786111fd 100644 --- a/i18n/sv/frontends.md +++ b/i18n/sv/frontends.md @@ -2,7 +2,7 @@ title: "Frontend" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/sv/mobile-browsers.md b/i18n/sv/mobile-browsers.md index 26de645b..9eac81ef 100644 --- a/i18n/sv/mobile-browsers.md +++ b/i18n/sv/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobila webbläsare" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/sv/multi-factor-authentication.md b/i18n/sv/multi-factor-authentication.md index d0195705..fb833632 100644 --- a/i18n/sv/multi-factor-authentication.md +++ b/i18n/sv/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/sv/news-aggregators.md b/i18n/sv/news-aggregators.md index 0885e51c..deb10580 100644 --- a/i18n/sv/news-aggregators.md +++ b/i18n/sv/news-aggregators.md @@ -2,7 +2,7 @@ title: "Nyhetsaggregatorer" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/sv/notebooks.md b/i18n/sv/notebooks.md index 66b13f45..90e63433 100644 --- a/i18n/sv/notebooks.md +++ b/i18n/sv/notebooks.md @@ -2,7 +2,7 @@ title: "Anteckningsböcker" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Håll koll på dina anteckningar och dagboksanteckningar utan att ge dem till tredje part. diff --git a/i18n/sv/os/macos-overview.md b/i18n/sv/os/macos-overview.md index f14eedf4..e36af8fe 100644 --- a/i18n/sv/os/macos-overview.md +++ b/i18n/sv/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Security - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### Randomisering av MAC-adresser -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/sv/passwords.md b/i18n/sv/passwords.md index a79b9987..8eb9d1cd 100644 --- a/i18n/sv/passwords.md +++ b/i18n/sv/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Lösenordshanterare" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/sv/productivity.md b/i18n/sv/productivity.md index eb78f174..ee114ce0 100644 --- a/i18n/sv/productivity.md +++ b/i18n/sv/productivity.md @@ -2,7 +2,7 @@ title: "Produktivitetsverktyg" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/sv/real-time-communication.md b/i18n/sv/real-time-communication.md index f5c501e5..674d55d6 100644 --- a/i18n/sv/real-time-communication.md +++ b/i18n/sv/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Realtidskommunikation" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/sv/router.md b/i18n/sv/router.md index 73d37b56..608e60da 100644 --- a/i18n/sv/router.md +++ b/i18n/sv/router.md @@ -2,7 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Nedan följer några alternativa operativsystem som kan användas på routrar, Wi-Fi-accesspunkter osv. diff --git a/i18n/sv/search-engines.md b/i18n/sv/search-engines.md index b9549791..2b182b91 100644 --- a/i18n/sv/search-engines.md +++ b/i18n/sv/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Sökmotorer" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/sv/tor.md b/i18n/sv/tor.md index 49cb05f4..1355b9f0 100644 --- a/i18n/sv/tor.md +++ b/i18n/sv/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor-nätverket" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/sv/vpn.md b/i18n/sv/vpn.md index 6f76c4da..1b349283 100644 --- a/i18n/sv/vpn.md +++ b/i18n/sv/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/tr/android.md b/i18n/tr/android.md index ca8666db..645566c6 100644 --- a/i18n/tr/android.md +++ b/i18n/tr/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/tr/calendar.md b/i18n/tr/calendar.md index 1991b6f2..ab4b640e 100644 --- a/i18n/tr/calendar.md +++ b/i18n/tr/calendar.md @@ -2,7 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/tr/cloud.md b/i18n/tr/cloud.md index cda77f39..8d661e96 100644 --- a/i18n/tr/cloud.md +++ b/i18n/tr/cloud.md @@ -3,7 +3,7 @@ meta_title: "En İyi Gizli ve Güvenli Bulut Depolama Sağlayıcıları - Privac title: "Bulut depolama" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. Aşağıda listelenen alternatifler güvenli uçtan uca şifreleme uygulayarak güven ihtiyacını ortadan kaldırır. diff --git a/i18n/tr/cryptocurrency.md b/i18n/tr/cryptocurrency.md index 1b727c6b..387245a2 100644 --- a/i18n/tr/cryptocurrency.md +++ b/i18n/tr/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/tr/data-redaction.md b/i18n/tr/data-redaction.md index f52314e3..3d4e74f2 100644 --- a/i18n/tr/data-redaction.md +++ b/i18n/tr/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/tr/desktop-browsers.md b/i18n/tr/desktop-browsers.md index 6df39cbb..b4e982c8 100644 --- a/i18n/tr/desktop-browsers.md +++ b/i18n/tr/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "PC ve Mac için Mahremiyete Saygı Gösteren Web Tarayıcıları - title: "Masaüstü Tarayıcıları" icon: material/laptop description: Bu web tarayıcıları Google Chrome'dan daha iyi mahremiyet sağlar. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/tr/desktop.md b/i18n/tr/desktop.md index e4310510..c085e848 100644 --- a/i18n/tr/desktop.md +++ b/i18n/tr/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/tr/dns.md b/i18n/tr/dns.md index 49d6713d..1d7d4dbf 100644 --- a/i18n/tr/dns.md +++ b/i18n/tr/dns.md @@ -2,7 +2,7 @@ title: "DNS Çözümleyicileri" icon: material/dns description: Bunlar, İSS'nizin varsayılan yapılandırmasını değiştirmek için geçiş yapmanızı önerdiğimiz bazı şifreli DNS sağlayıcılarıdır. -cover: dns.png +cover: dns.webp --- Üçüncü taraf sunucularla şifrelenmiş DNS, yalnızca herhangi bir sonucu olmayacağından emin olduğunuzda temel [DNS Engellemesini](https://en.wikipedia.org/wiki/DNS_blocking) aşmak için kullanılmalıdır. Şifrelenmiş DNS internet faaliyetlerinizi gizlemenize yardımcı olmaz. diff --git a/i18n/tr/email-clients.md b/i18n/tr/email-clients.md index 3fc8d007..56b63f1c 100644 --- a/i18n/tr/email-clients.md +++ b/i18n/tr/email-clients.md @@ -2,7 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/tr/email.md b/i18n/tr/email.md index a1e3bb02..b9aa976d 100644 --- a/i18n/tr/email.md +++ b/i18n/tr/email.md @@ -3,7 +3,7 @@ meta_title: "Şifrelenmiş Gizli E-posta Önerileri - Privacy Guides" title: "E-posta Hizmetleri" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. -cover: email.png +cover: email.webp --- E-posta, herhangi bir çevrimiçi hizmeti kullanmak için pratikte bir gerekliliktir, ancak bireysel görüşmeler için e-posta kullanılmasını önermiyoruz. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/tr/encryption.md b/i18n/tr/encryption.md index 3d2b0589..8feac571 100644 --- a/i18n/tr/encryption.md +++ b/i18n/tr/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/tr/file-sharing.md b/i18n/tr/file-sharing.md index 122c2a13..a949e85e 100644 --- a/i18n/tr/file-sharing.md +++ b/i18n/tr/file-sharing.md @@ -2,7 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. -cover: file-sharing.png +cover: file-sharing.webp --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/tr/financial-services.md b/i18n/tr/financial-services.md index 424e9768..eb929f90 100644 --- a/i18n/tr/financial-services.md +++ b/i18n/tr/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/tr/frontends.md b/i18n/tr/frontends.md index 28a93c96..0088089c 100644 --- a/i18n/tr/frontends.md +++ b/i18n/tr/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/tr/mobile-browsers.md b/i18n/tr/mobile-browsers.md index ef51b3ac..166eac4f 100644 --- a/i18n/tr/mobile-browsers.md +++ b/i18n/tr/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobil Tarayıcılar" icon: material/cellphone-information description: Bu tarayıcılar telefonunuzda yaptığınız standart internet taraması için önerdiğimiz tarayıcılardır. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/tr/multi-factor-authentication.md b/i18n/tr/multi-factor-authentication.md index 7db4e194..fc8c4d5a 100644 --- a/i18n/tr/multi-factor-authentication.md +++ b/i18n/tr/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/tr/news-aggregators.md b/i18n/tr/news-aggregators.md index 8f6046eb..1b074e28 100644 --- a/i18n/tr/news-aggregators.md +++ b/i18n/tr/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/tr/notebooks.md b/i18n/tr/notebooks.md index 14a63447..a663462a 100644 --- a/i18n/tr/notebooks.md +++ b/i18n/tr/notebooks.md @@ -2,7 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/tr/os/macos-overview.md b/i18n/tr/os/macos-overview.md index 49dac39a..4a154d6a 100644 --- a/i18n/tr/os/macos-overview.md +++ b/i18n/tr/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Security - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/tr/passwords.md b/i18n/tr/passwords.md index f92f755f..deb77f55 100644 --- a/i18n/tr/passwords.md +++ b/i18n/tr/passwords.md @@ -3,7 +3,7 @@ meta_title: "Gizliliğinizi ve Güvenliğinizi Korumanız için En İyi Parola Y title: "Parola yöneticileri" icon: material/form-textbox-password description: Parola yöneticileri, parolaları ve diğer kimlik bilgilerini güvenli bir şekilde saklayabilir ve yönetebilirsiniz. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/tr/productivity.md b/i18n/tr/productivity.md index 4f9979c9..d35b1b5a 100644 --- a/i18n/tr/productivity.md +++ b/i18n/tr/productivity.md @@ -2,7 +2,7 @@ title: "Üretkenlik Araçları" icon: material/file-sign description: Çoğu çevrimiçi ofis uygulmaları uçtan uca şifrelemeyi desteklemez, bu da bulut sağlayıcısının yaptığınız her şeye erişebileceği anlamına gelir. -cover: productivity.png +cover: productivity.webp --- Çoğu çevrimiçi ofis uygulmaları uçtan uca şifrelemeyi desteklemez, bu da bulut sağlayıcısının yaptığınız her şeye erişebileceği anlamına gelir. Gizlilik politikası haklarınızı yasal olarak koruyabilir, ancak teknik erişim kısıtlamaları sağlamaz. diff --git a/i18n/tr/real-time-communication.md b/i18n/tr/real-time-communication.md index 8d412d2d..3206c16a 100644 --- a/i18n/tr/real-time-communication.md +++ b/i18n/tr/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Gerçek Zamanlı İletişim" icon: material/chat-processing description: Diğer anlık mesajlaşma uygulamaları, tüm özel konuşmalarınızı kendilerini işleten şirketin kullanımına sunuyor. -cover: real-time-communication.png +cover: real-time-communication.webp --- Bunlar, şifrelenmiş gerçek zamanlı iletişim için önerilerimizdir. diff --git a/i18n/tr/router.md b/i18n/tr/router.md index 97be0a33..36fc5aba 100644 --- a/i18n/tr/router.md +++ b/i18n/tr/router.md @@ -2,7 +2,7 @@ title: "Yönlendirici Yazılımı" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Aşağıda; yönlendiricilerde, Wi-Fi erişim noktalarında vb. kullanılabilecek birkaç alternatif işletim sistemi bulunmaktadır. diff --git a/i18n/tr/search-engines.md b/i18n/tr/search-engines.md index 0fb070f7..0a9e93e6 100644 --- a/i18n/tr/search-engines.md +++ b/i18n/tr/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/tr/tor.md b/i18n/tr/tor.md index 0990e4eb..729091ed 100644 --- a/i18n/tr/tor.md +++ b/i18n/tr/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/tr/vpn.md b/i18n/tr/vpn.md index c3cb0623..3e4a0989 100644 --- a/i18n/tr/vpn.md +++ b/i18n/tr/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/uk/android.md b/i18n/uk/android.md index 8db8a3b5..192c8df0 100644 --- a/i18n/uk/android.md +++ b/i18n/uk/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/uk/calendar.md b/i18n/uk/calendar.md index e0d5631e..f84309b1 100644 --- a/i18n/uk/calendar.md +++ b/i18n/uk/calendar.md @@ -2,7 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/uk/cloud.md b/i18n/uk/cloud.md index ffa6dffe..cda806a8 100644 --- a/i18n/uk/cloud.md +++ b/i18n/uk/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/uk/cryptocurrency.md b/i18n/uk/cryptocurrency.md index 85ca98f2..79690cd7 100644 --- a/i18n/uk/cryptocurrency.md +++ b/i18n/uk/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/uk/data-redaction.md b/i18n/uk/data-redaction.md index 46d778ba..cc38aea1 100644 --- a/i18n/uk/data-redaction.md +++ b/i18n/uk/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/uk/desktop-browsers.md b/i18n/uk/desktop-browsers.md index 6c237840..bd4a2ea3 100644 --- a/i18n/uk/desktop-browsers.md +++ b/i18n/uk/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/uk/desktop.md b/i18n/uk/desktop.md index 8033f0dd..ac1b6d40 100644 --- a/i18n/uk/desktop.md +++ b/i18n/uk/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/uk/dns.md b/i18n/uk/dns.md index 3ae36384..475fae90 100644 --- a/i18n/uk/dns.md +++ b/i18n/uk/dns.md @@ -2,7 +2,7 @@ title: "Розв'язувачі DNS" icon: material/dns description: Ось кілька провайдерів зашифрованих DNS, на яких ми рекомендуємо перейти, щоб замінити конфігурацію за замовчуванням вашого Інтернет-провайдера. -cover: dns.png +cover: dns.webp --- Зашифрований DNS на сторонніх серверах слід використовувати, щоб обійти базове [блокування за DNS](https://en.wikipedia.org/wiki/DNS_blocking) лише тоді, коли ви впевнені, що це не матиме жодних наслідків. Зашифрований DNS не допоможе вам приховати будь-яку вашу веб-активність. diff --git a/i18n/uk/email-clients.md b/i18n/uk/email-clients.md index 542bb012..5674c3fc 100644 --- a/i18n/uk/email-clients.md +++ b/i18n/uk/email-clients.md @@ -2,7 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/uk/email.md b/i18n/uk/email.md index 83ce1d30..1c351d06 100644 --- a/i18n/uk/email.md +++ b/i18n/uk/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Сервіси електронної пошти" icon: material/email description: Ці провайдери електронної пошти пропонують чудове місце для безпечного зберігання ваших листів, а багато з них пропонують сумісне з іншими провайдерами шифрування OpenPGP. -cover: email.png +cover: email.webp --- Електронна пошта це практично необхідність для користування будь-яким онлайн-сервісом, проте ми не рекомендуємо використовувати її для особистих розмов. Замість того, щоб використовувати електронну пошту для зв'язку з іншими людьми, розгляньте можливість використання засобів обміну повідомленнями, які підтримують таємницю. diff --git a/i18n/uk/encryption.md b/i18n/uk/encryption.md index 9a99a6b0..9d449483 100644 --- a/i18n/uk/encryption.md +++ b/i18n/uk/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/uk/file-sharing.md b/i18n/uk/file-sharing.md index ffb99267..988bc7c2 100644 --- a/i18n/uk/file-sharing.md +++ b/i18n/uk/file-sharing.md @@ -2,7 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. -cover: file-sharing.png +cover: file-sharing.webp --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/uk/financial-services.md b/i18n/uk/financial-services.md index b784fb35..3d415bfd 100644 --- a/i18n/uk/financial-services.md +++ b/i18n/uk/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/uk/frontends.md b/i18n/uk/frontends.md index 26ffafc6..ea86ec82 100644 --- a/i18n/uk/frontends.md +++ b/i18n/uk/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/uk/mobile-browsers.md b/i18n/uk/mobile-browsers.md index 807f432e..5568566e 100644 --- a/i18n/uk/mobile-browsers.md +++ b/i18n/uk/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/uk/multi-factor-authentication.md b/i18n/uk/multi-factor-authentication.md index 7d7af2a3..4fa4bf6a 100644 --- a/i18n/uk/multi-factor-authentication.md +++ b/i18n/uk/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/uk/news-aggregators.md b/i18n/uk/news-aggregators.md index 12612107..244e30b6 100644 --- a/i18n/uk/news-aggregators.md +++ b/i18n/uk/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/uk/notebooks.md b/i18n/uk/notebooks.md index f4479d72..c7faf7cf 100644 --- a/i18n/uk/notebooks.md +++ b/i18n/uk/notebooks.md @@ -2,7 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/uk/os/macos-overview.md b/i18n/uk/os/macos-overview.md index 53365570..6de57b9a 100644 --- a/i18n/uk/os/macos-overview.md +++ b/i18n/uk/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Security - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/uk/passwords.md b/i18n/uk/passwords.md index 5cf16256..cc095a28 100644 --- a/i18n/uk/passwords.md +++ b/i18n/uk/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/uk/productivity.md b/i18n/uk/productivity.md index ee2a7ef1..5af49df7 100644 --- a/i18n/uk/productivity.md +++ b/i18n/uk/productivity.md @@ -2,7 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/uk/real-time-communication.md b/i18n/uk/real-time-communication.md index 0d79091a..a5a3d321 100644 --- a/i18n/uk/real-time-communication.md +++ b/i18n/uk/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/uk/router.md b/i18n/uk/router.md index 8802ebdf..ffeb21d1 100644 --- a/i18n/uk/router.md +++ b/i18n/uk/router.md @@ -2,7 +2,7 @@ title: "Прошивка роутера" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Нижче наведено кілька альтернативних операційних систем, які можна використовувати на маршрутизаторах, точках доступу Wi-Fi тощо. diff --git a/i18n/uk/search-engines.md b/i18n/uk/search-engines.md index 1d945d51..969023e4 100644 --- a/i18n/uk/search-engines.md +++ b/i18n/uk/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/uk/tor.md b/i18n/uk/tor.md index 6a5abacb..569eceab 100644 --- a/i18n/uk/tor.md +++ b/i18n/uk/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/uk/vpn.md b/i18n/uk/vpn.md index dc533d6d..9ccb63ec 100644 --- a/i18n/uk/vpn.md +++ b/i18n/uk/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/vi/android.md b/i18n/vi/android.md index 7a6e7c0f..f06be281 100644 --- a/i18n/vi/android.md +++ b/i18n/vi/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "Android" icon: 'fontawesome/brands/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/vi/calendar.md b/i18n/vi/calendar.md index 2f074674..637fdb74 100644 --- a/i18n/vi/calendar.md +++ b/i18n/vi/calendar.md @@ -2,7 +2,7 @@ title: "Calendar Sync" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them. diff --git a/i18n/vi/cloud.md b/i18n/vi/cloud.md index 80d24ca0..1804aeff 100644 --- a/i18n/vi/cloud.md +++ b/i18n/vi/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "Cloud Storage" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/vi/cryptocurrency.md b/i18n/vi/cryptocurrency.md index 6d243160..c9dd6c03 100644 --- a/i18n/vi/cryptocurrency.md +++ b/i18n/vi/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/vi/data-redaction.md b/i18n/vi/data-redaction.md index 1de61fb9..aefdea89 100644 --- a/i18n/vi/data-redaction.md +++ b/i18n/vi/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "Data and Metadata Redaction" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/vi/desktop-browsers.md b/i18n/vi/desktop-browsers.md index 6cbbb9a4..d8c3a4b3 100644 --- a/i18n/vi/desktop-browsers.md +++ b/i18n/vi/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "Desktop Browsers" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/vi/desktop.md b/i18n/vi/desktop.md index c848e907..d7df802c 100644 --- a/i18n/vi/desktop.md +++ b/i18n/vi/desktop.md @@ -2,7 +2,7 @@ title: "Desktop/PC" icon: simple/linux description: Linux distributions are commonly recommended for privacy protection and software freedom. -cover: desktop.png +cover: desktop.webp --- Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/vi/dns.md b/i18n/vi/dns.md index b4e5b996..a214cb60 100644 --- a/i18n/vi/dns.md +++ b/i18n/vi/dns.md @@ -2,7 +2,7 @@ title: "DNS Resolvers" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. -cover: dns.png +cover: dns.webp --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/vi/email-clients.md b/i18n/vi/email-clients.md index 4f4839a7..7948a22b 100644 --- a/i18n/vi/email-clients.md +++ b/i18n/vi/email-clients.md @@ -2,7 +2,7 @@ title: "Email Clients" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/vi/email.md b/i18n/vi/email.md index cbced98e..1103369b 100644 --- a/i18n/vi/email.md +++ b/i18n/vi/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. -cover: email.png +cover: email.webp --- Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. diff --git a/i18n/vi/encryption.md b/i18n/vi/encryption.md index ff24cd8b..7ba137e4 100644 --- a/i18n/vi/encryption.md +++ b/i18n/vi/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "Encryption Software" icon: material/file-lock description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here. diff --git a/i18n/vi/file-sharing.md b/i18n/vi/file-sharing.md index a37a6423..4aaa50c9 100644 --- a/i18n/vi/file-sharing.md +++ b/i18n/vi/file-sharing.md @@ -2,7 +2,7 @@ title: "File Sharing and Sync" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. -cover: file-sharing.png +cover: file-sharing.webp --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/vi/financial-services.md b/i18n/vi/financial-services.md index 639e903d..1f1533e6 100644 --- a/i18n/vi/financial-services.md +++ b/i18n/vi/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/vi/frontends.md b/i18n/vi/frontends.md index a01d2b14..4143e29d 100644 --- a/i18n/vi/frontends.md +++ b/i18n/vi/frontends.md @@ -2,7 +2,7 @@ title: "Frontends" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions. diff --git a/i18n/vi/mobile-browsers.md b/i18n/vi/mobile-browsers.md index ed1d918a..e50478f4 100644 --- a/i18n/vi/mobile-browsers.md +++ b/i18n/vi/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "Mobile Browsers" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/vi/multi-factor-authentication.md b/i18n/vi/multi-factor-authentication.md index f808fb94..466063a6 100644 --- a/i18n/vi/multi-factor-authentication.md +++ b/i18n/vi/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: 'material/two-factor-authentication' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## Hardware Security Keys diff --git a/i18n/vi/news-aggregators.md b/i18n/vi/news-aggregators.md index cac40eed..494e2b61 100644 --- a/i18n/vi/news-aggregators.md +++ b/i18n/vi/news-aggregators.md @@ -2,7 +2,7 @@ title: "News Aggregators" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/vi/notebooks.md b/i18n/vi/notebooks.md index 4643eeb3..100657ea 100644 --- a/i18n/vi/notebooks.md +++ b/i18n/vi/notebooks.md @@ -2,7 +2,7 @@ title: "Sổ Ghi Chép" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Theo dõi các ghi chú và nhật ký của bạn mà không đưa chúng cho bên thứ ba. diff --git a/i18n/vi/os/macos-overview.md b/i18n/vi/os/macos-overview.md index eba51f28..6a38f1f1 100644 --- a/i18n/vi/os/macos-overview.md +++ b/i18n/vi/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### Security - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC Address Randomization -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/vi/passwords.md b/i18n/vi/passwords.md index 7ac8bd93..3f62a1a8 100644 --- a/i18n/vi/passwords.md +++ b/i18n/vi/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "Password Managers" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/vi/productivity.md b/i18n/vi/productivity.md index d0f8b474..34391f0d 100644 --- a/i18n/vi/productivity.md +++ b/i18n/vi/productivity.md @@ -2,7 +2,7 @@ title: "Productivity Tools" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/vi/real-time-communication.md b/i18n/vi/real-time-communication.md index d706c1c2..92f2dbe6 100644 --- a/i18n/vi/real-time-communication.md +++ b/i18n/vi/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "Real-Time Communication" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- These are our recommendations for encrypted real-time communication. diff --git a/i18n/vi/router.md b/i18n/vi/router.md index ba90b19b..49203a50 100644 --- a/i18n/vi/router.md +++ b/i18n/vi/router.md @@ -2,7 +2,7 @@ title: "Firmware Bộ định tuyến" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Dưới đây là một số hệ điều hành thay thế, có thể được sử dụng trên bộ định tuyến, điểm truy cập Wi-Fi, v.v. diff --git a/i18n/vi/search-engines.md b/i18n/vi/search-engines.md index 4d2fa327..f40c1e05 100644 --- a/i18n/vi/search-engines.md +++ b/i18n/vi/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/vi/tor.md b/i18n/vi/tor.md index 2734fcd6..187fe1c4 100644 --- a/i18n/vi/tor.md +++ b/i18n/vi/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "Tor Network" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/vi/vpn.md b/i18n/vi/vpn.md index a46299ca..d1c65ec2 100644 --- a/i18n/vi/vpn.md +++ b/i18n/vi/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: material/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: diff --git a/i18n/zh-Hant/android.md b/i18n/zh-Hant/android.md index aa25dd74..fd76b109 100644 --- a/i18n/zh-Hant/android.md +++ b/i18n/zh-Hant/android.md @@ -3,7 +3,7 @@ meta_title: "Android 推薦: GrapheneOS 與 DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Android 手機可考慮使用這些更為安全與尊重隱私的作業系統。 -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/zh-Hant/calendar.md b/i18n/zh-Hant/calendar.md index ed9a82d4..c9486a1a 100644 --- a/i18n/zh-Hant/calendar.md +++ b/i18n/zh-Hant/calendar.md @@ -2,7 +2,7 @@ title: "行事曆同步" icon: material/calendar description: 行事曆包含一些您最敏感的資料,使用實現靜態加密的產品。 -cover: calendar.png +cover: calendar.webp --- 行事曆包含一些您最敏感的資料;請使用未存取時執行 E2EE 的產品,以防止供應商讀取這些資料。 diff --git a/i18n/zh-Hant/cloud.md b/i18n/zh-Hant/cloud.md index be7aa374..f8fb36a6 100644 --- a/i18n/zh-Hant/cloud.md +++ b/i18n/zh-Hant/cloud.md @@ -3,7 +3,7 @@ meta_title: "最佳私有和安全的雲端儲存服務提供商 - Privacy Guide title: "雲端儲存" icon: material/file-cloud description: 許多雲端儲存服務供應商需要您相信他們不會查看您的檔案。 這些都是私密替代品! -cover: cloud.png +cover: cloud.webp --- 許多雲端儲存服務供應商需要您完全信任他們不會查看您的檔案。 下面列出的替代方案通過實施安全的 E2EE,消除了對信任的需要。 diff --git a/i18n/zh-Hant/cryptocurrency.md b/i18n/zh-Hant/cryptocurrency.md index d3579827..faf56c2e 100644 --- a/i18n/zh-Hant/cryptocurrency.md +++ b/i18n/zh-Hant/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "私密加密貨幣區塊錬 - Privacy Guides" title: 加密貨幣 icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- 線上支付是隱私面臨的最大挑戰之一。 下列加密貨幣預設提供交易隱私(大多數加密貨幣**並未保證**如此 ),前提是您對如何有效地進行私人支付有深入了解。 我們強烈建議您在網路購買前先閱讀本站私密付款之介紹: diff --git a/i18n/zh-Hant/data-redaction.md b/i18n/zh-Hant/data-redaction.md index bee74fe5..ba3cdae6 100644 --- a/i18n/zh-Hant/data-redaction.md +++ b/i18n/zh-Hant/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "使用中繼資料洗滌器和數據編輯工具移除個人識別 title: "資料和中繼資料處理" icon: material/tag-remove description: 使用這些工具來移除所分享的相片和文件中的GPS定位和其他識別資訊等中繼資料。 -cover: data-redaction.png +cover: data-redaction.webp --- 分享檔案時,請務必移除相關的中繼資料。 映像文件通常包含 [Exif](https://en.wikipedia.org/wiki/Exif) 數據。 照片有時甚至在文件元數據中包含GPS坐標。 diff --git a/i18n/zh-Hant/desktop-browsers.md b/i18n/zh-Hant/desktop-browsers.md index a08ddeec..f7758335 100644 --- a/i18n/zh-Hant/desktop-browsers.md +++ b/i18n/zh-Hant/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "PC 和 Mac上隱私權尊重網頁瀏覽器的 - Privacy Guides" title: "桌面瀏覽器" icon: material/laptop description: 這些網頁瀏覽器提供比 Google Chrome 更強大的隱私保護。 -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/zh-Hant/desktop.md b/i18n/zh-Hant/desktop.md index 6321a41b..78da1c0f 100644 --- a/i18n/zh-Hant/desktop.md +++ b/i18n/zh-Hant/desktop.md @@ -2,7 +2,7 @@ title: "桌上型電腦" icon: simple/linux description: 因為隱私保護和軟體自由,通常建議用 Linux發行版。 -cover: desktop.png +cover: desktop.webp --- 基於隱私保護和軟體自由,通常建議用 Linux 發行版。 如果您還不曾用過 Linux ,以下是我們建議可試試的發行版,以及一些 Linux發行版的隱私和安全提升技巧。 diff --git a/i18n/zh-Hant/dns.md b/i18n/zh-Hant/dns.md index 083ba79b..24c37136 100644 --- a/i18n/zh-Hant/dns.md +++ b/i18n/zh-Hant/dns.md @@ -2,7 +2,7 @@ title: "DNS解析器" icon: material/dns description: 我們建議切換到這些加密 DNS 提供商,以取代您 ISP 所預設的配置。 -cover: dns.png +cover: dns.webp --- 使用第三方伺服器的加密 DNS 只能避開基本的 [DNS 封鎖](https://en.wikipedia.org/wiki/DNS_blocking) ,當您確定不會有不良後果時。 加密的 DNS 無法為您隱藏瀏覽活動。 diff --git a/i18n/zh-Hant/email-clients.md b/i18n/zh-Hant/email-clients.md index a62cfb7b..902383c9 100644 --- a/i18n/zh-Hant/email-clients.md +++ b/i18n/zh-Hant/email-clients.md @@ -2,7 +2,7 @@ title: "電子郵件客戶端程式" icon: material/email-open description: 這些電子郵件客戶端尊重隱私並支持OpenPGP電子郵件加密。 -cover: email-clients.png +cover: email-clients.webp --- 我們的推薦清單包含支援 [OpenPGP](encryption.md#openpgp) 和如[Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth)強認證的電子郵件用戶端 。 OAuth允許您使用 [多因素驗證](basics/multi-factor-authentication.md) 並防止帳戶被盜。 diff --git a/i18n/zh-Hant/email.md b/i18n/zh-Hant/email.md index 80fe50af..d265f47d 100644 --- a/i18n/zh-Hant/email.md +++ b/i18n/zh-Hant/email.md @@ -3,7 +3,7 @@ meta_title: "加密私人電子郵件建議 - Privacy Guides" title: "電子郵件服務" icon: material/email description: 這些電子郵件提供商提供了一個好地方來安全地存儲您的電子郵件,也有不少能與其他供應商相互操作的 OpenPGP 加密。 -cover: email.png +cover: email.webp --- 電子郵件實際上是使用任何線上服務的必需品,但我們不建議把它應用於人與人之間的對話。 與其使用電子郵件聯繫他人,不如考慮使用支援前向保密的即時通訊媒介。 diff --git a/i18n/zh-Hant/encryption.md b/i18n/zh-Hant/encryption.md index ba0e0e32..2fa06acb 100644 --- a/i18n/zh-Hant/encryption.md +++ b/i18n/zh-Hant/encryption.md @@ -3,7 +3,7 @@ meta_title: "推薦的加密軟件: VeraCrypt, Cryptomat, PicoCrypt 和 OpenPG title: "加密軟體" icon: material/file-lock description: 數據加密是控制誰可以訪問它的唯一方法。 這些工具允許您加密電子郵件和任何其他檔案。 -cover: encryption.png +cover: encryption.webp --- 數據加密是控制誰可以訪問它的唯一方法。 如果您目前沒有為您的硬盤,電子郵件或文件使用加密軟件,您應該在這裡選擇一個選項。 diff --git a/i18n/zh-Hant/file-sharing.md b/i18n/zh-Hant/file-sharing.md index 4476b5d2..19563a22 100644 --- a/i18n/zh-Hant/file-sharing.md +++ b/i18n/zh-Hant/file-sharing.md @@ -2,7 +2,7 @@ title: "文件共享和同步" icon: material/share-variant description: 探索如何在不同裝置、與朋友和家人私下分享檔案,或匿名上線。 -cover: file-sharing.png +cover: file-sharing.webp --- 探索如何在裝置之間、與朋友和家人私下分享檔案,或匿名上線。 diff --git a/i18n/zh-Hant/financial-services.md b/i18n/zh-Hant/financial-services.md index 29aa63e4..d086defb 100644 --- a/i18n/zh-Hant/financial-services.md +++ b/i18n/zh-Hant/financial-services.md @@ -1,7 +1,7 @@ --- title: 金融服務 icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- 在線支付是隱私面臨的最大挑戰之一。 這些服務可以幫助您保護隱私,免受商家和其他追蹤者的影響,前提是您對如何有效地進行私人付款有深入的了解。 我們強烈建議您在網路購買前先閱讀本站私密付款之介紹: diff --git a/i18n/zh-Hant/frontends.md b/i18n/zh-Hant/frontends.md index 3b9692a8..7ca62e7a 100644 --- a/i18n/zh-Hant/frontends.md +++ b/i18n/zh-Hant/frontends.md @@ -2,7 +2,7 @@ title: "前端" icon: material/flip-to-front description: 這些用在各式網際網路服務的開源前端,可讓您訪問內容而無需 JavaScript 或其他干援。 -cover: frontends.png +cover: frontends.webp --- 有時,某些服務會以煩人的彈出窗口來封鎖訪問內容,強迫訪客須註冊帳戶。 如果不啓用JavaScript ,也可能會中斷。 這些前端可以讓您避開這些限制。 diff --git a/i18n/zh-Hant/mobile-browsers.md b/i18n/zh-Hant/mobile-browsers.md index 86c49866..3b298eff 100644 --- a/i18n/zh-Hant/mobile-browsers.md +++ b/i18n/zh-Hant/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Android 和 iOS 行動版尊隱私的網頁瀏覽器的-Privacy Gui title: "行動瀏覽器" icon: material/cellphone-information description: 這些瀏覽器是我們目前推薦在手機使用的標準/非匿名互聯網瀏覽器。 -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/zh-Hant/multi-factor-authentication.md b/i18n/zh-Hant/multi-factor-authentication.md index eb7c56fe..7e18c492 100644 --- a/i18n/zh-Hant/multi-factor-authentication.md +++ b/i18n/zh-Hant/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "多重因素驗證" icon: 'material/two-factor-authentication' description: 這些工具可協助您透過多重身份驗證保護網路帳戶,而無需將您的祕密傳送給第三方。 -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## 安全金鑰硬體 diff --git a/i18n/zh-Hant/news-aggregators.md b/i18n/zh-Hant/news-aggregators.md index a967588c..fb4d940d 100644 --- a/i18n/zh-Hant/news-aggregators.md +++ b/i18n/zh-Hant/news-aggregators.md @@ -2,7 +2,7 @@ title: "新聞聚合器" icon: material/rss description: 這些新聞聚合器客戶端可利使用 RSS 等網際網路標準來訂閱追蹤您最喜愛的部落格和新聞網站。 -cover: news-aggregators.png +cover: news-aggregators.webp --- [新聞聚合器](https://en.wikipedia.org/wiki/News_aggregator) 是一種訂閱最喜愛的部落格和新聞網站的追蹤方式。 diff --git a/i18n/zh-Hant/notebooks.md b/i18n/zh-Hant/notebooks.md index 6a9f7165..0b682c0b 100644 --- a/i18n/zh-Hant/notebooks.md +++ b/i18n/zh-Hant/notebooks.md @@ -2,7 +2,7 @@ title: "記事本" icon: material/notebook-edit-outline description: 這些加密的筆記錄應用程式可讓您跟進記錄,而無需將它們提供給第三方。 -cover: notebooks.png +cover: notebooks.webp --- 保存記錄您的筆記和日誌,不要將它們提供給第三方。 diff --git a/i18n/zh-Hant/os/macos-overview.md b/i18n/zh-Hant/os/macos-overview.md index 64020b4d..6abc256c 100644 --- a/i18n/zh-Hant/os/macos-overview.md +++ b/i18n/zh-Hant/os/macos-overview.md @@ -118,39 +118,37 @@ Apple 產品的大多數隱私和安全問題與其*雲服務*有關,而不是 - [ ] 取消勾選 **個人化的廣告** -##### 安全 - -App Store 中的應用程式須遵守更嚴格的安全準則,例如更嚴格的沙盒。 如果需要的應用程式只能從 App Store 獲取,請將**允許從以下位置下載應用程式**設置更改為**App Store** 防止不小心執行其他應用程式。 這是一個不錯的選擇,特別是當您為其他技術能力較低的用戶(例如兒童)設定電腦時。 - -如果選擇允許某些認定開發者的應用程序,請注意所運行的應用程式以及從何處取得這些應用。 - ##### FileVault 在具有安全隔離區(Apple T2 安全晶片、Apple 晶片)的現代設備上,您的數據會保持加密。如果設備未檢測到數據遭篡改,則會通過硬體密鑰自動解密。 啟用 FileVault 還需要輪入密碼來解密資料,大大提高了安全性,尤其是在關機時或開機後首次登錄時。 在較舊的 Intel 的 Mac 電腦,FileVault 是預設唯一可用的磁盤加密形式,應始終啟用。 -- [x] 點擊 **開啟** +- [x] Click **Turn On** ##### 封閉模式 [封閉模式](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) 禁用某些功能以提高安全性。 某些應用程式或功能在封閉時將無法正常工作,例如 [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in -time-jit- compilers/) 和[WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) 在封閉模式下會被Safari 關閉。 建議啟用封閉模式看看它是否會顯著影響您的使用,它所做的許多更改都很容易接受。 -- [x] 點擊 **開啟** +- [x] Click **Turn On** ### MAC 地址隨機化 -與 iOS 不同,macOS 不提供在設置中隨機化 MAC 地址的選項,因此您需要使用命令或腳本來執行此操作。 +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -打開終端並輸入以下命令來隨機化 MAC 地址: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 將要更改其 MAC 地址的接口名稱。 這可能並不適合每台 Mac,因此要進行檢查,可以按住 option 鍵並單擊螢幕右上角的 Wi-Fi 符號。 +`en0` is the name of the interface you're changing the MAC address for. 這可能並不適合每台 Mac,因此要進行檢查,可以按住 option 鍵並單擊螢幕右上角的 Wi-Fi 符號。 "Interface name" should be displayed at the top of the dropdown menu. -這將在重新開機時重置。 +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. 這將在重新開機時重置。 + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## 安全保護 diff --git a/i18n/zh-Hant/passwords.md b/i18n/zh-Hant/passwords.md index 8d479f5e..fe94a165 100644 --- a/i18n/zh-Hant/passwords.md +++ b/i18n/zh-Hant/passwords.md @@ -3,7 +3,7 @@ meta_title: "保護您的隱私和安全的最佳密碼管理器 - Privacy Guide title: "密碼管理器。" icon: material/form-textbox-password description: 密碼管理員允許您安全地存儲和管理密碼和其他憑證。 -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/zh-Hant/productivity.md b/i18n/zh-Hant/productivity.md index 03662a09..4f539b27 100644 --- a/i18n/zh-Hant/productivity.md +++ b/i18n/zh-Hant/productivity.md @@ -2,7 +2,7 @@ title: "工作效率工具" icon: material/file-sign description: 大多數線上辦公套件不支持 E2EE ,這意味著雲提供商可以存取您所做的一切。 -cover: productivity.png +cover: productivity.webp --- 大多數線上辦公套件不支持 E2EE ,這意味著雲提供商可以存取您所做的一切。 隱私權政策可在法律上保護您的權利,但不提供技術存取限制。 diff --git a/i18n/zh-Hant/real-time-communication.md b/i18n/zh-Hant/real-time-communication.md index 936537c7..699580e4 100644 --- a/i18n/zh-Hant/real-time-communication.md +++ b/i18n/zh-Hant/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "最好的私人即時通訊軟體 - Privacy Guides" title: "即時通訊軟體" icon: material/chat-processing description: 其他即時通訊則會讓您所有的私人對話被該軟體公司取得。 -cover: real-time-communication.png +cover: real-time-communication.webp --- 這些是我們所推薦的加密實時通訊軟體。 diff --git a/i18n/zh-Hant/router.md b/i18n/zh-Hant/router.md index 2edaeac1..deb91a1d 100644 --- a/i18n/zh-Hant/router.md +++ b/i18n/zh-Hant/router.md @@ -2,7 +2,7 @@ title: "路由器軔體" icon: material/router-wireless description: 這些替代作業系統可用於保護您的路由器或Wi-Fi接入點。 -cover: router.png +cover: router.webp --- 以下是一些替代操作系統,可用於路由器, Wi-Fi接入點等。 diff --git a/i18n/zh-Hant/search-engines.md b/i18n/zh-Hant/search-engines.md index c910b6e6..e176fa35 100644 --- a/i18n/zh-Hant/search-engines.md +++ b/i18n/zh-Hant/search-engines.md @@ -3,7 +3,7 @@ meta_title: "推薦搜尋引擎: 匿名的 Google 替代方案 - Privacy Guides" title: "搜尋引擎" icon: material/search-web description: 這些尊重隱私的搜尋引擎不會根據您的搜尋建立廣告剖繪。 -cover: search-engines.png +cover: search-engines.webp --- 這些尊重隱私的搜尋引擎不會根據您的搜尋建立廣告剖繪。 diff --git a/i18n/zh-Hant/tor.md b/i18n/zh-Hant/tor.md index 276d68ac..8611f14c 100644 --- a/i18n/zh-Hant/tor.md +++ b/i18n/zh-Hant/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor瀏覽器與網絡:匿名網頁瀏覽 - Privacy Guides" title: "Tor 網絡" icon: simple/torproject description: 透過Tor 網絡來保護您的網際網路瀏覽免受窺探, Tor 網絡是一個規避審查的安全網絡。 -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/zh-Hant/vpn.md b/i18n/zh-Hant/vpn.md index e874decc..57284c61 100644 --- a/i18n/zh-Hant/vpn.md +++ b/i18n/zh-Hant/vpn.md @@ -3,7 +3,7 @@ meta_title: "私密 VPN 服務建議和比較,沒有贊助商或廣告-Privacy title: "VPN 服務" icon: material/vpn description: 這些是保護您線上隱私和安全的最佳 VPN 服務。 在這裡找一個不會監視您的供應商。 -cover: vpn.png +cover: vpn.webp --- 連接到網際網路連線供應商、公共Wi-Fi 網路或下載文件時,如何能有更好的 **隱私**保護 ,只要了解所涉及的風險, VPN 可能是您的解決方案。 我們認為這些供應商高於其他供應商: diff --git a/i18n/zh/android.md b/i18n/zh/android.md index ce4d44cf..2cdf2980 100644 --- a/i18n/zh/android.md +++ b/i18n/zh/android.md @@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" title: "安卓" icon: 'simple/android' description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. -cover: android.png +cover: android.webp schema: - "@context": http://schema.org diff --git a/i18n/zh/calendar.md b/i18n/zh/calendar.md index eb13ad4a..7021750e 100644 --- a/i18n/zh/calendar.md +++ b/i18n/zh/calendar.md @@ -2,7 +2,7 @@ title: "VPN供应商" icon: material/calendar description: Calendars contain some of your most sensitive data; use products that implement encryption at rest. -cover: calendar.png +cover: calendar.webp --- 日历包含一些最敏感的数据;使用静态实现E2EE的产品,以防止提供商读取它们。 diff --git a/i18n/zh/cloud.md b/i18n/zh/cloud.md index e8fdb18f..1d7078e9 100644 --- a/i18n/zh/cloud.md +++ b/i18n/zh/cloud.md @@ -3,7 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide title: "路由器固件" icon: material/file-cloud description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives! -cover: cloud.png +cover: cloud.webp --- 许多云存储供应商需要你完全信任他们不会查看你的文件。 The alternatives listed below eliminate the need for trust by implementing secure E2EE. diff --git a/i18n/zh/cryptocurrency.md b/i18n/zh/cryptocurrency.md index 6a8e6a6b..70781695 100644 --- a/i18n/zh/cryptocurrency.md +++ b/i18n/zh/cryptocurrency.md @@ -2,7 +2,7 @@ meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" title: Cryptocurrency icon: material/bank-circle -cover: cryptocurrency.png +cover: cryptocurrency.webp --- Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/zh/data-redaction.md b/i18n/zh/data-redaction.md index 1f717459..1c6e84cf 100644 --- a/i18n/zh/data-redaction.md +++ b/i18n/zh/data-redaction.md @@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva title: "日历/联系人同步" icon: material/tag-remove description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share. -cover: data-redaction.png +cover: data-redaction.webp --- 共享文件时,请务必删除关联的元数据。 图像文件通常包括 [Exif](https://en.wikipedia.org/wiki/Exif) 数据。 照片有时甚至包括文件元数据中的GPS坐标。 diff --git a/i18n/zh/desktop-browsers.md b/i18n/zh/desktop-browsers.md index 5fa57df9..d9f49017 100644 --- a/i18n/zh/desktop-browsers.md +++ b/i18n/zh/desktop-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" title: "电脑浏览器" icon: material/laptop description: These web browsers provide stronger privacy protections than Google Chrome. -cover: desktop-browsers.png +cover: desktop-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/zh/desktop.md b/i18n/zh/desktop.md index c632acbf..c1bc7006 100644 --- a/i18n/zh/desktop.md +++ b/i18n/zh/desktop.md @@ -2,7 +2,7 @@ title: "Android 应用" icon: simple/linux description: 由于隐私保护和软件自由,Linux发行版被普遍推荐。 -cover: desktop.png +cover: desktop.webp --- 由于隐私保护和软件自由,Linux发行版被普遍推荐。 如果你还没有使用Linux,下面是我们建议尝试的一些发行版,以及一些适用于许多Linux发行版的一般隐私和安全改进提示。 diff --git a/i18n/zh/dns.md b/i18n/zh/dns.md index 998785a5..bddec1fa 100644 --- a/i18n/zh/dns.md +++ b/i18n/zh/dns.md @@ -2,7 +2,7 @@ title: "DNS解析器" icon: material/dns description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration. -cover: dns.png +cover: dns.webp --- Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. 加密的DNS不会帮助你隐藏任何浏览活动。 diff --git a/i18n/zh/email-clients.md b/i18n/zh/email-clients.md index c970a169..6a428594 100644 --- a/i18n/zh/email-clients.md +++ b/i18n/zh/email-clients.md @@ -2,7 +2,7 @@ title: "笔记" icon: material/email-open description: These email clients are privacy-respecting and support OpenPGP email encryption. -cover: email-clients.png +cover: email-clients.webp --- Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft. diff --git a/i18n/zh/email.md b/i18n/zh/email.md index aa4af947..a4f3b9d3 100644 --- a/i18n/zh/email.md +++ b/i18n/zh/email.md @@ -3,7 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides" title: "Email Services" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. -cover: email.png +cover: email.webp --- 电子邮件实际上是使用任何在线服务的必需品,但我们不建议使用它进行人与人之间的对话。 与其使用电子邮件与他人联系,不如考虑使用支持前向保密的即时通讯媒介。 diff --git a/i18n/zh/encryption.md b/i18n/zh/encryption.md index ba5ab852..e4846b5e 100644 --- a/i18n/zh/encryption.md +++ b/i18n/zh/encryption.md @@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, title: "加密软件" icon: material/file-lock description: 对数据进行加密是控制谁能访问数据的唯一方法。 These tools allow you to encrypt your emails and any other files. -cover: encryption.png +cover: encryption.webp --- 对数据进行加密是控制谁能访问数据的唯一方法。 如果你目前没有对你的硬盘、电子邮件或文件使用加密软件,你应该在这里挑选一个选项。 diff --git a/i18n/zh/file-sharing.md b/i18n/zh/file-sharing.md index 5d722539..9affe29d 100644 --- a/i18n/zh/file-sharing.md +++ b/i18n/zh/file-sharing.md @@ -2,7 +2,7 @@ title: "加密软件" icon: material/share-variant description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online. -cover: file-sharing.png +cover: file-sharing.webp --- Discover how to privately share your files between your devices, with your friends and family, or anonymously online. diff --git a/i18n/zh/financial-services.md b/i18n/zh/financial-services.md index 117ac80a..6cedefcb 100644 --- a/i18n/zh/financial-services.md +++ b/i18n/zh/financial-services.md @@ -1,7 +1,7 @@ --- title: Financial Services icon: material/bank -cover: financial-services.png +cover: financial-services.webp --- Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/zh/frontends.md b/i18n/zh/frontends.md index 059272fa..c6cb01c3 100644 --- a/i18n/zh/frontends.md +++ b/i18n/zh/frontends.md @@ -2,7 +2,7 @@ title: "文件共享" icon: material/flip-to-front description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances. -cover: frontends.png +cover: frontends.webp --- 有时,一些服务会用烦人的弹窗阻止你访问内容,以此来强迫你注册账户。 此时如果停用JavaScript网站也会崩溃。 这些前端应用可以帮助你绕过这些限制。 diff --git a/i18n/zh/mobile-browsers.md b/i18n/zh/mobile-browsers.md index ba7b02d3..fb15e8a3 100644 --- a/i18n/zh/mobile-browsers.md +++ b/i18n/zh/mobile-browsers.md @@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac title: "移动浏览器" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. -cover: mobile-browsers.png +cover: mobile-browsers.webp schema: - "@context": http://schema.org diff --git a/i18n/zh/multi-factor-authentication.md b/i18n/zh/multi-factor-authentication.md index 7d43d8da..17addce2 100644 --- a/i18n/zh/multi-factor-authentication.md +++ b/i18n/zh/multi-factor-authentication.md @@ -2,7 +2,7 @@ title: "Multi-Factor Authenticators" icon: '资料/双因认证' description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. -cover: multi-factor-authentication.png +cover: multi-factor-authentication.webp --- ## 硬件安全密钥 diff --git a/i18n/zh/news-aggregators.md b/i18n/zh/news-aggregators.md index 378ac9c2..c3b897c5 100644 --- a/i18n/zh/news-aggregators.md +++ b/i18n/zh/news-aggregators.md @@ -2,7 +2,7 @@ title: "多因素认证工具" icon: material/rss description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS. -cover: news-aggregators.png +cover: news-aggregators.webp --- A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites. diff --git a/i18n/zh/notebooks.md b/i18n/zh/notebooks.md index 18e86a22..fa318b5c 100644 --- a/i18n/zh/notebooks.md +++ b/i18n/zh/notebooks.md @@ -2,7 +2,7 @@ title: "Notebooks" icon: material/notebook-edit-outline description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party. -cover: notebooks.png +cover: notebooks.webp --- Keep track of your notes and journalings without giving them to a third-party. diff --git a/i18n/zh/os/macos-overview.md b/i18n/zh/os/macos-overview.md index f3e7ee4f..1e48f4db 100644 --- a/i18n/zh/os/macos-overview.md +++ b/i18n/zh/os/macos-overview.md @@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage. - [ ] Uncheck **Personalized Ads** -##### 安全性 - -Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children. - -If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them. - ##### FileVault On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on. @@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ### MAC地址随机化 -Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script. +macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. -You open up your Terminal and enter this command to randomize your MAC address: +Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address: ``` zsh -openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether +openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether ``` -en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. +`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu. -This will be reset on reboot. +This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other. + +When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot. + +Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names. ## Security Protections diff --git a/i18n/zh/passwords.md b/i18n/zh/passwords.md index a9ecb823..d8154d1f 100644 --- a/i18n/zh/passwords.md +++ b/i18n/zh/passwords.md @@ -3,7 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P title: "生产力工具" icon: material/form-textbox-password description: Password managers allow you to securely store and manage passwords and other credentials. -cover: passwords.png +cover: passwords.webp schema: - "@context": http://schema.org diff --git a/i18n/zh/productivity.md b/i18n/zh/productivity.md index 9b1cda12..206cc93d 100644 --- a/i18n/zh/productivity.md +++ b/i18n/zh/productivity.md @@ -2,7 +2,7 @@ title: "实时通讯" icon: material/file-sign description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. -cover: productivity.png +cover: productivity.webp --- Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints. diff --git a/i18n/zh/real-time-communication.md b/i18n/zh/real-time-communication.md index 714e3518..3c7e91b1 100644 --- a/i18n/zh/real-time-communication.md +++ b/i18n/zh/real-time-communication.md @@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides" title: "实时通讯" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. -cover: real-time-communication.png +cover: real-time-communication.webp --- 这些是我们对加密实时通讯的建议。 diff --git a/i18n/zh/router.md b/i18n/zh/router.md index 903e3f36..2772ea8d 100644 --- a/i18n/zh/router.md +++ b/i18n/zh/router.md @@ -2,7 +2,7 @@ title: "Router Firmware" icon: material/router-wireless description: These alternative operating systems can be used to secure your router or Wi-Fi access point. -cover: router.png +cover: router.webp --- Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/zh/search-engines.md b/i18n/zh/search-engines.md index 211f9901..65665357 100644 --- a/i18n/zh/search-engines.md +++ b/i18n/zh/search-engines.md @@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy title: "Search Engines" icon: material/search-web description: These privacy-respecting search engines don't build an advertising profile based on your searches. -cover: search-engines.png +cover: search-engines.webp --- Use a search engine that doesn't build an advertising profile based on your searches. diff --git a/i18n/zh/tor.md b/i18n/zh/tor.md index e1273509..450c5216 100644 --- a/i18n/zh/tor.md +++ b/i18n/zh/tor.md @@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" title: "桌面端浏览器" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. -cover: tor.png +cover: tor.webp schema: - "@context": http://schema.org diff --git a/i18n/zh/vpn.md b/i18n/zh/vpn.md index 751ba77c..9c9545de 100644 --- a/i18n/zh/vpn.md +++ b/i18n/zh/vpn.md @@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or title: "VPN Services" icon: 资料/vpn description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you. -cover: vpn.png +cover: vpn.webp --- If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: