1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-18 16:54:21 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2024-09-22 08:35:05 +00:00
parent 00043a5bc7
commit df5314a7d3
1045 changed files with 1337 additions and 503 deletions

View File

@ -2,6 +2,7 @@
title: Contributors
hide:
- toc
description: A complete list of contributors who have collectively made an enormous impact on the Privacy Guides project.
---
<!-- Do NOT manually edit this file, please add yourself to the .all-contributorsrc file instead. See our GitHub Issues for more details -->

View File

@ -1,5 +1,6 @@
---
title: General Criteria
description: A list of general priorities we consider for all submissions to Privacy Guides.
---
Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.

View File

@ -1,5 +1,6 @@
---
title: Donate
description: The charitable mission of Privacy Guides relies on contributions from visitors like yourself. Anything you can do to support the project is hugely appreciated.
---
<!-- markdownlint-disable MD036 -->

View File

@ -1,5 +1,6 @@
---
title: Executive Policy
description: These are policies formally adopted by our executive committee, and take precedence over all other statements expressed on this website.
---
These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website.

View File

@ -1,5 +1,6 @@
---
title: Job Openings
description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here.
---
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our staff members are listed [here](../about.md#staff). Please consider [donating](donate.md) to support our cause.

View File

@ -1,5 +1,6 @@
---
title: "Notices and Disclaimers"
description: Information about our website license, acceptable use policy, and other important details.
---
## Legal Disclaimer

View File

@ -1,5 +1,6 @@
---
title: "سياسة الخصوصية"
title: "Privacy Policy"
description: We do not sell or share your data with any third-parties.
---
Privacy Guides is a community project operated by a number of active volunteer contributors. The public list of team members [can be found on GitHub](https://github.com/orgs/privacyguides/people).

View File

@ -1,5 +1,6 @@
---
title: "PrivacyTools FAQ"
description: The real story behind the team transition from privacytools.io to privacyguides.org
---
In September 2021, every active contributor unanimously agreed to move from PrivacyTools to work on this site: Privacy Guides. This decision was made because PrivacyTools founder and controller of the domain name had disappeared for an extended period of time and could not be contacted.

View File

@ -1,3 +1,7 @@
- - -
description: We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects.
- - -
# Privacy Guides Services
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.

View File

@ -1,5 +1,6 @@
---
title: Traffic Statistics
description: We self-host Umami to create a nice visualization of our traffic statistics, which are made public here.
---
<!-- markdownlint-disable MD051 -->

View File

@ -1,6 +1,7 @@
---
title: Private Payments
icon: material/hand-coin
description: Your buying habits are the holy grail of ad targeting, but you still have plenty of options when it comes to making payments privately.
---
There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.

View File

@ -1,5 +1,6 @@
---
title: General Apps
description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
schema:
- "@context": http://schema.org
"@type": WebPage

View File

@ -1,5 +1,6 @@
---
title: Android
description: Our advice for replacing privacy-invasive default Android features with private and secure alternatives.
icon: simple/android
cover: android.webp
schema:

View File

@ -1,5 +1,6 @@
---
title: Obtaining Applications
description: We recommend these methods for obtaining applications on Android without interacting with Google Play Services.
---
There are many ways to obtain Android apps privately, even from the Play Store, without interacting with Google Play Services. We recommend the following methods of obtaining applications on Android, listed in order of preference.

View File

@ -1,6 +1,7 @@
---
title: "Why Privacy Matters"
icon: 'material/shield-account'
description: In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not.
---
In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands.
@ -43,7 +44,7 @@ All of these concepts overlap, but it is possible to have any combination of the
A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong.
==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. هذا لأنك تريد الخصوصية وليس السريَّة. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets.
==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets.
## Is Privacy About Control?

View File

@ -1,5 +1,6 @@
---
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
description: Unlike most cryptocurrencies, these ones provide transaction privacy by default. Monero is our top choice for obfuscating transaction information.
title: Cryptocurrency
icon: material/bank-circle
cover: cryptocurrency.webp

View File

@ -2,6 +2,7 @@
title: Financial Services
icon: material/bank
cover: financial-services.webp
description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today.
---
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Independent Privacy & Security Resources"
description: "Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life. Ad & affiliate free, high quality reviews."
description: "Established in 2021, Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life."
template: home.html
social:
cards_layout: home

View File

@ -1,5 +1,6 @@
---
title: Admonitions
description: A guide for website contributors on creating admonitions.
---
**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow.

View File

@ -1,5 +1,6 @@
---
title: Branding Guidelines
description: A guide for journalists and website contributors on proper branding of the Privacy Guides wordmark and logo.
---
The name of the website is **Privacy Guides** and should **not** be changed to:

View File

@ -1,5 +1,6 @@
---
title: Commit Messages
description: A guide for website contributors on using useful Git commit messages when making website change requests.
---
For our commit messages we follow the style provided by [Conventional Commits](https://conventionalcommits.org). Not all of those suggestions are appropriate for Privacy Guides, so the main ones we use are:

View File

@ -1,5 +1,6 @@
---
title: Git Recommendations
description: A guide for website contributors on using Git effectively.
---
If you make changes to this website on GitHub.com's web editor directly, you shouldn't have to worry about this. If you are developing locally and/or are a long-term website editor (who should probably be developing locally!), consider these recommendations.

View File

@ -1,5 +1,6 @@
---
title: Translations
description: A guide for website contributors on adding translations to our website.
---
Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site.

View File

@ -1,5 +1,6 @@
---
title: Uploading Images
description: A guide for website contributors on uploading images in the proper format and location.
---
If you make changes to this website that involve adding new images or replacing existing ones, here are a couple of general recommendations:

View File

@ -1,5 +1,6 @@
---
title: Writing Style
description: Our official writing style handbook for website contributors.
---
Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt.

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
meta_title: "Privacy Respecting Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.

View File

@ -1,7 +1,7 @@
---
title: Mobile Phones
icon: material/cellphone-check
description: These mobile devices have proper Android Verified Boot support for custom operating systems.
description: These mobile devices provide the best hardware security support for custom Android operating systems.
cover: android.webp
schema:
- "@context": http://schema.org

View File

@ -1,5 +1,6 @@
---
title: Operating Systems
description: An overview of our operating system-related recommendations for all major computing hardware.
---
We publish configuration guides for the major operating systems, because you can generally improve the amount of data that is collected about you on any option, especially if you use privacy tools like our [recommended web browsers](../desktop-browsers.md) in place of native tools where appropriate. However, some operating systems will be more privacy-respecting inherently, and it will be much harder to achieve an equivalent level of privacy on other choices.

View File

@ -1,5 +1,6 @@
---
title: Group Policy Settings
description: A quick guide to configuring Group Policy to make Windows a bit more privacy respecting.
---
Outside of modifying the registry itself, the **Local Group Policy Editor** is the most powerful way to change many aspects of your system without installing third-party tools. Changing these settings requires [Pro Edition](index.md#windows-editions) or better.

View File

@ -1,6 +1,7 @@
---
title: Windows Overview
icon: material/microsoft-windows
description: Microsoft Windows is a common operating system which is extremely non-private out of the box. Our guide covers making some improvements to your computer without replacing your OS.
---
**Microsoft Windows** is a common OS shipped with many PCs by default. The following guides aim to provide some ways to improve privacy and reduce the default telemetry and data stored by disabling some unnecessary features. Over time, Microsoft adds features to the OS which can sometimes rely on cloud-based services. These features will often require certain types of [optional data](https://privacy.microsoft.com/data-collection-windows) that is sometimes sent to remote servers for processing.

View File

@ -2,7 +2,7 @@
meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
description: Encrypted messengers like Signal and SimpleX keep your sensitive communications secure from prying eyes.
cover: real-time-communication.webp
---

View File

@ -1,7 +1,7 @@
---
title: "Router Firmware"
icon: material/router-wireless
description: These alternative operating systems can be used to secure your router or Wi-Fi access point.
description: Alternative operating systems for securing your router or Wi-Fi access point.
cover: router.webp
---

View File

@ -2,7 +2,7 @@
meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
description: Privacy-respecting search engines which don't build an advertising profile based on your searches.
cover: search-engines.webp
global:
-

View File

@ -1,7 +1,7 @@
---
title: Security Keys
icon: material/key-chain
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
description: Secure your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
cover: multi-factor-authentication.webp
---

View File

@ -1,10 +1,10 @@
---
meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
meta_title: "Ad-Free Privacy Tool/Service Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
- toc
description: Privacy Guides is the most transparent and reliable website for finding software, apps, and services that protect your personal data from mass surveillance programs and other internet threats.
description: A complete list of the privacy tools, services, software, and hardware recommended by the Privacy Guides community.
---
If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs.

View File

@ -2,7 +2,7 @@
meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "خِدْمَات شبكة خاصة افتراضية"
icon: material/vpn
description: هذه هي أفضل خِدْمَات شبكة خاصة افتراضية للمحافظة خصوصيتك وأمانك على الإنترنت. اعثر على مزود للخدمة هنا ليس يريد التجسس عليك.
description: The best VPN services for protecting your privacy and security online. اعثر على مزود للخدمة هنا ليس يريد التجسس عليك.
cover: vpn.webp
global:
-

View File

@ -2,6 +2,7 @@
title: Contributors
hide:
- toc
description: A complete list of contributors who have collectively made an enormous impact on the Privacy Guides project.
---
<!-- Do NOT manually edit this file, please add yourself to the .all-contributorsrc file instead. See our GitHub Issues for more details -->

View File

@ -1,5 +1,6 @@
---
title: General Criteria
description: A list of general priorities we consider for all submissions to Privacy Guides.
---
Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.

View File

@ -1,5 +1,6 @@
---
title: Donate
description: The charitable mission of Privacy Guides relies on contributions from visitors like yourself. Anything you can do to support the project is hugely appreciated.
---
<!-- markdownlint-disable MD036 -->

View File

@ -1,5 +1,6 @@
---
title: Executive Policy
description: These are policies formally adopted by our executive committee, and take precedence over all other statements expressed on this website.
---
These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website.

View File

@ -1,5 +1,6 @@
---
title: Job Openings
description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here.
---
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our staff members are listed [here](../about.md#staff). Please consider [donating](donate.md) to support our cause.

View File

@ -1,5 +1,6 @@
---
title: "Notices and Disclaimers"
description: Information about our website license, acceptable use policy, and other important details.
---
## Legal Disclaimer

View File

@ -1,5 +1,6 @@
---
title: "Privacy Policy"
description: We do not sell or share your data with any third-parties.
---
Privacy Guides is a community project operated by a number of active volunteer contributors. The public list of team members [can be found on GitHub](https://github.com/orgs/privacyguides/people).

View File

@ -1,5 +1,6 @@
---
title: "PrivacyTools FAQ"
description: The real story behind the team transition from privacytools.io to privacyguides.org
---
In September 2021, every active contributor unanimously agreed to move from PrivacyTools to work on this site: Privacy Guides. This decision was made because PrivacyTools founder and controller of the domain name had disappeared for an extended period of time and could not be contacted.

View File

@ -1,3 +1,7 @@
- - -
description: We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects.
- - -
# Privacy Guides Services
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.

View File

@ -1,5 +1,6 @@
---
title: Traffic Statistics
description: We self-host Umami to create a nice visualization of our traffic statistics, which are made public here.
---
<!-- markdownlint-disable MD051 -->

View File

@ -1,6 +1,7 @@
---
title: Private Payments
icon: material/hand-coin
description: Your buying habits are the holy grail of ad targeting, but you still have plenty of options when it comes to making payments privately.
---
There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.

View File

@ -1,5 +1,6 @@
---
title: General Apps
description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
schema:
- "@context": http://schema.org
"@type": WebPage
@ -9,17 +10,17 @@ schema:
"@type": MobileApplication
name: Shelter
applicationCategory: Utilities
operatingSystem: অ্যান্ড্রয়েড
operatingSystem: Android
- "@context": http://schema.org
"@type": MobileApplication
name: Secure Camera
applicationCategory: Utilities
operatingSystem: অ্যান্ড্রয়েড
operatingSystem: Android
- "@context": http://schema.org
"@type": MobileApplication
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: অ্যান্ড্রয়েড
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---

View File

@ -1,5 +1,6 @@
---
title: অ্যান্ড্রয়েড
title: Android
description: Our advice for replacing privacy-invasive default Android features with private and secure alternatives.
icon: simple/android
cover: android.webp
schema:
@ -9,7 +10,7 @@ schema:
url: ./
- "@context": http://schema.org
"@type": CreativeWork
name: অ্যান্ড্রয়েড
name: Android
image: /assets/img/android/android.svg
url: https://source.android.com/
sameAs: https://en.wikipedia.org/wiki/Android_(operating_system)

View File

@ -1,5 +1,6 @@
---
title: Obtaining Applications
description: We recommend these methods for obtaining applications on Android without interacting with Google Play Services.
---
There are many ways to obtain Android apps privately, even from the Play Store, without interacting with Google Play Services. We recommend the following methods of obtaining applications on Android, listed in order of preference.

View File

@ -1,6 +1,7 @@
---
title: "Why Privacy Matters"
icon: 'material/shield-account'
description: In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not.
---
In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands.

View File

@ -1,5 +1,6 @@
---
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
description: Unlike most cryptocurrencies, these ones provide transaction privacy by default. Monero is our top choice for obfuscating transaction information.
title: Cryptocurrency
icon: material/bank-circle
cover: cryptocurrency.webp

View File

@ -2,6 +2,7 @@
title: Financial Services
icon: material/bank
cover: financial-services.webp
description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today.
---
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Independent Privacy & Security Resources"
description: "Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life. Ad & affiliate free, high quality reviews."
description: "Established in 2021, Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life."
template: home.html
social:
cards_layout: home

View File

@ -1,5 +1,6 @@
---
title: Admonitions
description: A guide for website contributors on creating admonitions.
---
**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow.

View File

@ -1,5 +1,6 @@
---
title: Branding Guidelines
description: A guide for journalists and website contributors on proper branding of the Privacy Guides wordmark and logo.
---
The name of the website is **Privacy Guides** and should **not** be changed to:

View File

@ -1,5 +1,6 @@
---
title: Commit Messages
description: A guide for website contributors on using useful Git commit messages when making website change requests.
---
For our commit messages we follow the style provided by [Conventional Commits](https://conventionalcommits.org). Not all of those suggestions are appropriate for Privacy Guides, so the main ones we use are:

View File

@ -1,5 +1,6 @@
---
title: Git Recommendations
description: A guide for website contributors on using Git effectively.
---
If you make changes to this website on GitHub.com's web editor directly, you shouldn't have to worry about this. If you are developing locally and/or are a long-term website editor (who should probably be developing locally!), consider these recommendations.

View File

@ -1,5 +1,6 @@
---
title: Translations
description: A guide for website contributors on adding translations to our website.
---
Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site.

View File

@ -1,5 +1,6 @@
---
title: Uploading Images
description: A guide for website contributors on uploading images in the proper format and location.
---
If you make changes to this website that involve adding new images or replacing existing ones, here are a couple of general recommendations:

View File

@ -1,5 +1,6 @@
---
title: Writing Style
description: Our official writing style handbook for website contributors.
---
Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt.

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
meta_title: "Privacy Respecting Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.

View File

@ -1,7 +1,7 @@
---
title: Mobile Phones
icon: material/cellphone-check
description: These mobile devices have proper Android Verified Boot support for custom operating systems.
description: These mobile devices provide the best hardware security support for custom Android operating systems.
cover: android.webp
schema:
- "@context": http://schema.org

View File

@ -1,5 +1,6 @@
---
title: Operating Systems
description: An overview of our operating system-related recommendations for all major computing hardware.
---
We publish configuration guides for the major operating systems, because you can generally improve the amount of data that is collected about you on any option, especially if you use privacy tools like our [recommended web browsers](../desktop-browsers.md) in place of native tools where appropriate. However, some operating systems will be more privacy-respecting inherently, and it will be much harder to achieve an equivalent level of privacy on other choices.

View File

@ -1,5 +1,6 @@
---
title: Group Policy Settings
description: A quick guide to configuring Group Policy to make Windows a bit more privacy respecting.
---
Outside of modifying the registry itself, the **Local Group Policy Editor** is the most powerful way to change many aspects of your system without installing third-party tools. Changing these settings requires [Pro Edition](index.md#windows-editions) or better.

View File

@ -1,6 +1,7 @@
---
title: Windows Overview
icon: material/microsoft-windows
description: Microsoft Windows is a common operating system which is extremely non-private out of the box. Our guide covers making some improvements to your computer without replacing your OS.
---
**Microsoft Windows** is a common OS shipped with many PCs by default. The following guides aim to provide some ways to improve privacy and reduce the default telemetry and data stored by disabling some unnecessary features. Over time, Microsoft adds features to the OS which can sometimes rely on cloud-based services. These features will often require certain types of [optional data](https://privacy.microsoft.com/data-collection-windows) that is sometimes sent to remote servers for processing.

View File

@ -2,7 +2,7 @@
meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
description: Encrypted messengers like Signal and SimpleX keep your sensitive communications secure from prying eyes.
cover: real-time-communication.webp
---

View File

@ -1,7 +1,7 @@
---
title: "Router Firmware"
icon: material/router-wireless
description: These alternative operating systems can be used to secure your router or Wi-Fi access point.
description: Alternative operating systems for securing your router or Wi-Fi access point.
cover: router.webp
---

View File

@ -2,7 +2,7 @@
meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
description: Privacy-respecting search engines which don't build an advertising profile based on your searches.
cover: search-engines.webp
global:
-

View File

@ -1,7 +1,7 @@
---
title: Security Keys
icon: material/key-chain
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
description: Secure your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
cover: multi-factor-authentication.webp
---

View File

@ -1,10 +1,10 @@
---
meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
meta_title: "Ad-Free Privacy Tool/Service Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:
- toc
description: Privacy Guides is the most transparent and reliable website for finding software, apps, and services that protect your personal data from mass surveillance programs and other internet threats.
description: A complete list of the privacy tools, services, software, and hardware recommended by the Privacy Guides community.
---
If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs.

View File

@ -2,7 +2,7 @@
meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isnt out to spy on you.
description: The best VPN services for protecting your privacy and security online. Find a provider here that isnt out to spy on you.
cover: vpn.webp
global:
-

View File

@ -2,6 +2,7 @@
title: Contributors
hide:
- toc
description: A complete list of contributors who have collectively made an enormous impact on the Privacy Guides project.
---
<!-- Do NOT manually edit this file, please add yourself to the .all-contributorsrc file instead. See our GitHub Issues for more details -->

View File

@ -1,5 +1,6 @@
---
title: General Criteria
description: A list of general priorities we consider for all submissions to Privacy Guides.
---
Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.

View File

@ -1,5 +1,6 @@
---
title: Donate
description: The charitable mission of Privacy Guides relies on contributions from visitors like yourself. Anything you can do to support the project is hugely appreciated.
---
<!-- markdownlint-disable MD036 -->

View File

@ -1,5 +1,6 @@
---
title: Executive Policy
description: These are policies formally adopted by our executive committee, and take precedence over all other statements expressed on this website.
---
These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website.

View File

@ -1,5 +1,6 @@
---
title: Job Openings
description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here.
---
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our staff members are listed [here](../about.md#staff). Please consider [donating](donate.md) to support our cause.

View File

@ -1,5 +1,6 @@
---
title: "Notices and Disclaimers"
description: Information about our website license, acceptable use policy, and other important details.
---
## Legal Disclaimer

View File

@ -1,5 +1,6 @@
---
title: "Privacy Policy"
description: We do not sell or share your data with any third-parties.
---
Privacy Guides is a community project operated by a number of active volunteer contributors. The public list of team members [can be found on GitHub](https://github.com/orgs/privacyguides/people).

View File

@ -1,5 +1,6 @@
---
title: "PrivacyTools FAQ"
description: The real story behind the team transition from privacytools.io to privacyguides.org
---
In September 2021, every active contributor unanimously agreed to move from PrivacyTools to work on this site: Privacy Guides. This decision was made because PrivacyTools founder and controller of the domain name had disappeared for an extended period of time and could not be contacted.

View File

@ -1,3 +1,7 @@
- - -
description: We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects.
- - -
# Privacy Guides Services
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.

View File

@ -1,5 +1,6 @@
---
title: Traffic Statistics
description: We self-host Umami to create a nice visualization of our traffic statistics, which are made public here.
---
<!-- markdownlint-disable MD051 -->

View File

@ -1,6 +1,7 @@
---
title: Private Payments
icon: material/hand-coin
description: Your buying habits are the holy grail of ad targeting, but you still have plenty of options when it comes to making payments privately.
---
There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.

View File

@ -1,5 +1,6 @@
---
title: General Apps
description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
schema:
- "@context": http://schema.org
"@type": WebPage

View File

@ -1,5 +1,6 @@
---
title: Android
description: Our advice for replacing privacy-invasive default Android features with private and secure alternatives.
icon: simple/android
cover: android.webp
schema:

View File

@ -1,5 +1,6 @@
---
title: Obtaining Applications
description: We recommend these methods for obtaining applications on Android without interacting with Google Play Services.
---
There are many ways to obtain Android apps privately, even from the Play Store, without interacting with Google Play Services. We recommend the following methods of obtaining applications on Android, listed in order of preference.

View File

@ -1,6 +1,7 @@
---
title: "Why Privacy Matters"
icon: 'material/shield-account'
description: In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not.
---
In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands.
@ -43,7 +44,7 @@ All of these concepts overlap, but it is possible to have any combination of the
A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong.
==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. কারণ আমরা ব্যক্তিগত গোপনীয়তা চাই, গুপ্ত ব্যাপার রাখা নয়। There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets.
==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets.
## Is Privacy About Control?

View File

@ -1,5 +1,6 @@
---
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
description: Unlike most cryptocurrencies, these ones provide transaction privacy by default. Monero is our top choice for obfuscating transaction information.
title: Cryptocurrency
icon: material/bank-circle
cover: cryptocurrency.webp

View File

@ -2,6 +2,7 @@
title: Financial Services
icon: material/bank
cover: financial-services.webp
description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today.
---
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Independent Privacy & Security Resources"
description: "Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life. Ad & affiliate free, high quality reviews."
description: "Established in 2021, Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life."
template: home.html
social:
cards_layout: home

View File

@ -1,5 +1,6 @@
---
title: Admonitions
description: A guide for website contributors on creating admonitions.
---
**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow.

View File

@ -1,5 +1,6 @@
---
title: Branding Guidelines
description: A guide for journalists and website contributors on proper branding of the Privacy Guides wordmark and logo.
---
The name of the website is **Privacy Guides** and should **not** be changed to:

View File

@ -1,5 +1,6 @@
---
title: Commit Messages
description: A guide for website contributors on using useful Git commit messages when making website change requests.
---
For our commit messages we follow the style provided by [Conventional Commits](https://conventionalcommits.org). Not all of those suggestions are appropriate for Privacy Guides, so the main ones we use are:

View File

@ -1,5 +1,6 @@
---
title: Git Recommendations
description: A guide for website contributors on using Git effectively.
---
If you make changes to this website on GitHub.com's web editor directly, you shouldn't have to worry about this. If you are developing locally and/or are a long-term website editor (who should probably be developing locally!), consider these recommendations.

View File

@ -1,5 +1,6 @@
---
title: Translations
description: A guide for website contributors on adding translations to our website.
---
Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site.

View File

@ -1,5 +1,6 @@
---
title: Uploading Images
description: A guide for website contributors on uploading images in the proper format and location.
---
If you make changes to this website that involve adding new images or replacing existing ones, here are a couple of general recommendations:

View File

@ -1,5 +1,6 @@
---
title: Writing Style
description: Our official writing style handbook for website contributors.
---
Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt.

View File

@ -1,5 +1,5 @@
---
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
meta_title: "Privacy Respecting Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.

View File

@ -1,7 +1,7 @@
---
title: Mobile Phones
icon: material/cellphone-check
description: These mobile devices have proper Android Verified Boot support for custom operating systems.
description: These mobile devices provide the best hardware security support for custom Android operating systems.
cover: android.webp
schema:
- "@context": http://schema.org

View File

@ -1,5 +1,6 @@
---
title: Operating Systems
description: An overview of our operating system-related recommendations for all major computing hardware.
---
We publish configuration guides for the major operating systems, because you can generally improve the amount of data that is collected about you on any option, especially if you use privacy tools like our [recommended web browsers](../desktop-browsers.md) in place of native tools where appropriate. However, some operating systems will be more privacy-respecting inherently, and it will be much harder to achieve an equivalent level of privacy on other choices.

Some files were not shown because too many files have changed in this diff Show More