1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-19 09:14:22 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2024-09-22 08:35:05 +00:00
parent 00043a5bc7
commit df5314a7d3
1045 changed files with 1337 additions and 503 deletions

View File

@ -2,6 +2,7 @@
title: Contributors title: Contributors
hide: hide:
- toc - toc
description: A complete list of contributors who have collectively made an enormous impact on the Privacy Guides project.
--- ---
<!-- Do NOT manually edit this file, please add yourself to the .all-contributorsrc file instead. See our GitHub Issues for more details --> <!-- Do NOT manually edit this file, please add yourself to the .all-contributorsrc file instead. See our GitHub Issues for more details -->

View File

@ -1,5 +1,6 @@
--- ---
title: General Criteria title: General Criteria
description: A list of general priorities we consider for all submissions to Privacy Guides.
--- ---
Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion. Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.

View File

@ -1,5 +1,6 @@
--- ---
title: Donate title: Donate
description: The charitable mission of Privacy Guides relies on contributions from visitors like yourself. Anything you can do to support the project is hugely appreciated.
--- ---
<!-- markdownlint-disable MD036 --> <!-- markdownlint-disable MD036 -->

View File

@ -1,5 +1,6 @@
--- ---
title: Executive Policy title: Executive Policy
description: These are policies formally adopted by our executive committee, and take precedence over all other statements expressed on this website.
--- ---
These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website.

View File

@ -1,5 +1,6 @@
--- ---
title: Job Openings title: Job Openings
description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here.
--- ---
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our staff members are listed [here](../about.md#staff). Please consider [donating](donate.md) to support our cause. Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our staff members are listed [here](../about.md#staff). Please consider [donating](donate.md) to support our cause.

View File

@ -1,5 +1,6 @@
--- ---
title: "Notices and Disclaimers" title: "Notices and Disclaimers"
description: Information about our website license, acceptable use policy, and other important details.
--- ---
## Legal Disclaimer ## Legal Disclaimer

View File

@ -1,5 +1,6 @@
--- ---
title: "سياسة الخصوصية" title: "Privacy Policy"
description: We do not sell or share your data with any third-parties.
--- ---
Privacy Guides is a community project operated by a number of active volunteer contributors. The public list of team members [can be found on GitHub](https://github.com/orgs/privacyguides/people). Privacy Guides is a community project operated by a number of active volunteer contributors. The public list of team members [can be found on GitHub](https://github.com/orgs/privacyguides/people).

View File

@ -1,5 +1,6 @@
--- ---
title: "PrivacyTools FAQ" title: "PrivacyTools FAQ"
description: The real story behind the team transition from privacytools.io to privacyguides.org
--- ---
In September 2021, every active contributor unanimously agreed to move from PrivacyTools to work on this site: Privacy Guides. This decision was made because PrivacyTools founder and controller of the domain name had disappeared for an extended period of time and could not be contacted. In September 2021, every active contributor unanimously agreed to move from PrivacyTools to work on this site: Privacy Guides. This decision was made because PrivacyTools founder and controller of the domain name had disappeared for an extended period of time and could not be contacted.

View File

@ -1,3 +1,7 @@
- - -
description: We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects.
- - -
# Privacy Guides Services # Privacy Guides Services
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below. We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.

View File

@ -1,5 +1,6 @@
--- ---
title: Traffic Statistics title: Traffic Statistics
description: We self-host Umami to create a nice visualization of our traffic statistics, which are made public here.
--- ---
<!-- markdownlint-disable MD051 --> <!-- markdownlint-disable MD051 -->

View File

@ -1,6 +1,7 @@
--- ---
title: Private Payments title: Private Payments
icon: material/hand-coin icon: material/hand-coin
description: Your buying habits are the holy grail of ad targeting, but you still have plenty of options when it comes to making payments privately.
--- ---
There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately. There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.

View File

@ -1,5 +1,6 @@
--- ---
title: General Apps title: General Apps
description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
schema: schema:
- "@context": http://schema.org - "@context": http://schema.org
"@type": WebPage "@type": WebPage

View File

@ -1,5 +1,6 @@
--- ---
title: Android title: Android
description: Our advice for replacing privacy-invasive default Android features with private and secure alternatives.
icon: simple/android icon: simple/android
cover: android.webp cover: android.webp
schema: schema:

View File

@ -1,5 +1,6 @@
--- ---
title: Obtaining Applications title: Obtaining Applications
description: We recommend these methods for obtaining applications on Android without interacting with Google Play Services.
--- ---
There are many ways to obtain Android apps privately, even from the Play Store, without interacting with Google Play Services. We recommend the following methods of obtaining applications on Android, listed in order of preference. There are many ways to obtain Android apps privately, even from the Play Store, without interacting with Google Play Services. We recommend the following methods of obtaining applications on Android, listed in order of preference.

View File

@ -1,6 +1,7 @@
--- ---
title: "Why Privacy Matters" title: "Why Privacy Matters"
icon: 'material/shield-account' icon: 'material/shield-account'
description: In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not.
--- ---
In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands.
@ -43,7 +44,7 @@ All of these concepts overlap, but it is possible to have any combination of the
A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong.
==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. هذا لأنك تريد الخصوصية وليس السريَّة. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. ==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets.
## Is Privacy About Control? ## Is Privacy About Control?

View File

@ -1,5 +1,6 @@
--- ---
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
description: Unlike most cryptocurrencies, these ones provide transaction privacy by default. Monero is our top choice for obfuscating transaction information.
title: Cryptocurrency title: Cryptocurrency
icon: material/bank-circle icon: material/bank-circle
cover: cryptocurrency.webp cover: cryptocurrency.webp

View File

@ -2,6 +2,7 @@
title: Financial Services title: Financial Services
icon: material/bank icon: material/bank
cover: financial-services.webp cover: financial-services.webp
description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today.
--- ---
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@ -1,6 +1,6 @@
--- ---
meta_title: "Privacy Guides: Independent Privacy & Security Resources" meta_title: "Privacy Guides: Independent Privacy & Security Resources"
description: "Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life. Ad & affiliate free, high quality reviews." description: "Established in 2021, Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life."
template: home.html template: home.html
social: social:
cards_layout: home cards_layout: home

View File

@ -1,5 +1,6 @@
--- ---
title: Admonitions title: Admonitions
description: A guide for website contributors on creating admonitions.
--- ---
**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. **Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow.

View File

@ -1,5 +1,6 @@
--- ---
title: Branding Guidelines title: Branding Guidelines
description: A guide for journalists and website contributors on proper branding of the Privacy Guides wordmark and logo.
--- ---
The name of the website is **Privacy Guides** and should **not** be changed to: The name of the website is **Privacy Guides** and should **not** be changed to:

View File

@ -1,5 +1,6 @@
--- ---
title: Commit Messages title: Commit Messages
description: A guide for website contributors on using useful Git commit messages when making website change requests.
--- ---
For our commit messages we follow the style provided by [Conventional Commits](https://conventionalcommits.org). Not all of those suggestions are appropriate for Privacy Guides, so the main ones we use are: For our commit messages we follow the style provided by [Conventional Commits](https://conventionalcommits.org). Not all of those suggestions are appropriate for Privacy Guides, so the main ones we use are:

View File

@ -1,5 +1,6 @@
--- ---
title: Git Recommendations title: Git Recommendations
description: A guide for website contributors on using Git effectively.
--- ---
If you make changes to this website on GitHub.com's web editor directly, you shouldn't have to worry about this. If you are developing locally and/or are a long-term website editor (who should probably be developing locally!), consider these recommendations. If you make changes to this website on GitHub.com's web editor directly, you shouldn't have to worry about this. If you are developing locally and/or are a long-term website editor (who should probably be developing locally!), consider these recommendations.

View File

@ -1,5 +1,6 @@
--- ---
title: Translations title: Translations
description: A guide for website contributors on adding translations to our website.
--- ---
Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site.

View File

@ -1,5 +1,6 @@
--- ---
title: Uploading Images title: Uploading Images
description: A guide for website contributors on uploading images in the proper format and location.
--- ---
If you make changes to this website that involve adding new images or replacing existing ones, here are a couple of general recommendations: If you make changes to this website that involve adding new images or replacing existing ones, here are a couple of general recommendations:

View File

@ -1,5 +1,6 @@
--- ---
title: Writing Style title: Writing Style
description: Our official writing style handbook for website contributors.
--- ---
Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt.

View File

@ -1,5 +1,5 @@
--- ---
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides" meta_title: "Privacy Respecting Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers" title: "Mobile Browsers"
icon: material/cellphone-information icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.

View File

@ -1,7 +1,7 @@
--- ---
title: Mobile Phones title: Mobile Phones
icon: material/cellphone-check icon: material/cellphone-check
description: These mobile devices have proper Android Verified Boot support for custom operating systems. description: These mobile devices provide the best hardware security support for custom Android operating systems.
cover: android.webp cover: android.webp
schema: schema:
- "@context": http://schema.org - "@context": http://schema.org

View File

@ -1,5 +1,6 @@
--- ---
title: Operating Systems title: Operating Systems
description: An overview of our operating system-related recommendations for all major computing hardware.
--- ---
We publish configuration guides for the major operating systems, because you can generally improve the amount of data that is collected about you on any option, especially if you use privacy tools like our [recommended web browsers](../desktop-browsers.md) in place of native tools where appropriate. However, some operating systems will be more privacy-respecting inherently, and it will be much harder to achieve an equivalent level of privacy on other choices. We publish configuration guides for the major operating systems, because you can generally improve the amount of data that is collected about you on any option, especially if you use privacy tools like our [recommended web browsers](../desktop-browsers.md) in place of native tools where appropriate. However, some operating systems will be more privacy-respecting inherently, and it will be much harder to achieve an equivalent level of privacy on other choices.

View File

@ -1,5 +1,6 @@
--- ---
title: Group Policy Settings title: Group Policy Settings
description: A quick guide to configuring Group Policy to make Windows a bit more privacy respecting.
--- ---
Outside of modifying the registry itself, the **Local Group Policy Editor** is the most powerful way to change many aspects of your system without installing third-party tools. Changing these settings requires [Pro Edition](index.md#windows-editions) or better. Outside of modifying the registry itself, the **Local Group Policy Editor** is the most powerful way to change many aspects of your system without installing third-party tools. Changing these settings requires [Pro Edition](index.md#windows-editions) or better.

View File

@ -1,6 +1,7 @@
--- ---
title: Windows Overview title: Windows Overview
icon: material/microsoft-windows icon: material/microsoft-windows
description: Microsoft Windows is a common operating system which is extremely non-private out of the box. Our guide covers making some improvements to your computer without replacing your OS.
--- ---
**Microsoft Windows** is a common OS shipped with many PCs by default. The following guides aim to provide some ways to improve privacy and reduce the default telemetry and data stored by disabling some unnecessary features. Over time, Microsoft adds features to the OS which can sometimes rely on cloud-based services. These features will often require certain types of [optional data](https://privacy.microsoft.com/data-collection-windows) that is sometimes sent to remote servers for processing. **Microsoft Windows** is a common OS shipped with many PCs by default. The following guides aim to provide some ways to improve privacy and reduce the default telemetry and data stored by disabling some unnecessary features. Over time, Microsoft adds features to the OS which can sometimes rely on cloud-based services. These features will often require certain types of [optional data](https://privacy.microsoft.com/data-collection-windows) that is sometimes sent to remote servers for processing.

View File

@ -2,7 +2,7 @@
meta_title: "The Best Private Instant Messengers - Privacy Guides" meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication" title: "Real-Time Communication"
icon: material/chat-processing icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them. description: Encrypted messengers like Signal and SimpleX keep your sensitive communications secure from prying eyes.
cover: real-time-communication.webp cover: real-time-communication.webp
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: "Router Firmware" title: "Router Firmware"
icon: material/router-wireless icon: material/router-wireless
description: These alternative operating systems can be used to secure your router or Wi-Fi access point. description: Alternative operating systems for securing your router or Wi-Fi access point.
cover: router.webp cover: router.webp
--- ---

View File

@ -2,7 +2,7 @@
meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides" meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines" title: "Search Engines"
icon: material/search-web icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches. description: Privacy-respecting search engines which don't build an advertising profile based on your searches.
cover: search-engines.webp cover: search-engines.webp
global: global:
- -

View File

@ -1,7 +1,7 @@
--- ---
title: Security Keys title: Security Keys
icon: material/key-chain icon: material/key-chain
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. description: Secure your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
cover: multi-factor-authentication.webp cover: multi-factor-authentication.webp
--- ---

View File

@ -1,10 +1,10 @@
--- ---
meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides" meta_title: "Ad-Free Privacy Tool/Service Recommendations - Privacy Guides"
title: "Privacy Tools" title: "Privacy Tools"
icon: material/tools icon: material/tools
hide: hide:
- toc - toc
description: Privacy Guides is the most transparent and reliable website for finding software, apps, and services that protect your personal data from mass surveillance programs and other internet threats. description: A complete list of the privacy tools, services, software, and hardware recommended by the Privacy Guides community.
--- ---
If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs.

View File

@ -2,7 +2,7 @@
meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides" meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "خِدْمَات شبكة خاصة افتراضية" title: "خِدْمَات شبكة خاصة افتراضية"
icon: material/vpn icon: material/vpn
description: هذه هي أفضل خِدْمَات شبكة خاصة افتراضية للمحافظة خصوصيتك وأمانك على الإنترنت. اعثر على مزود للخدمة هنا ليس يريد التجسس عليك. description: The best VPN services for protecting your privacy and security online. اعثر على مزود للخدمة هنا ليس يريد التجسس عليك.
cover: vpn.webp cover: vpn.webp
global: global:
- -

View File

@ -2,6 +2,7 @@
title: Contributors title: Contributors
hide: hide:
- toc - toc
description: A complete list of contributors who have collectively made an enormous impact on the Privacy Guides project.
--- ---
<!-- Do NOT manually edit this file, please add yourself to the .all-contributorsrc file instead. See our GitHub Issues for more details --> <!-- Do NOT manually edit this file, please add yourself to the .all-contributorsrc file instead. See our GitHub Issues for more details -->

View File

@ -1,5 +1,6 @@
--- ---
title: General Criteria title: General Criteria
description: A list of general priorities we consider for all submissions to Privacy Guides.
--- ---
Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion. Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.

View File

@ -1,5 +1,6 @@
--- ---
title: Donate title: Donate
description: The charitable mission of Privacy Guides relies on contributions from visitors like yourself. Anything you can do to support the project is hugely appreciated.
--- ---
<!-- markdownlint-disable MD036 --> <!-- markdownlint-disable MD036 -->

View File

@ -1,5 +1,6 @@
--- ---
title: Executive Policy title: Executive Policy
description: These are policies formally adopted by our executive committee, and take precedence over all other statements expressed on this website.
--- ---
These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website.

View File

@ -1,5 +1,6 @@
--- ---
title: Job Openings title: Job Openings
description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here.
--- ---
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our staff members are listed [here](../about.md#staff). Please consider [donating](donate.md) to support our cause. Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our staff members are listed [here](../about.md#staff). Please consider [donating](donate.md) to support our cause.

View File

@ -1,5 +1,6 @@
--- ---
title: "Notices and Disclaimers" title: "Notices and Disclaimers"
description: Information about our website license, acceptable use policy, and other important details.
--- ---
## Legal Disclaimer ## Legal Disclaimer

View File

@ -1,5 +1,6 @@
--- ---
title: "Privacy Policy" title: "Privacy Policy"
description: We do not sell or share your data with any third-parties.
--- ---
Privacy Guides is a community project operated by a number of active volunteer contributors. The public list of team members [can be found on GitHub](https://github.com/orgs/privacyguides/people). Privacy Guides is a community project operated by a number of active volunteer contributors. The public list of team members [can be found on GitHub](https://github.com/orgs/privacyguides/people).

View File

@ -1,5 +1,6 @@
--- ---
title: "PrivacyTools FAQ" title: "PrivacyTools FAQ"
description: The real story behind the team transition from privacytools.io to privacyguides.org
--- ---
In September 2021, every active contributor unanimously agreed to move from PrivacyTools to work on this site: Privacy Guides. This decision was made because PrivacyTools founder and controller of the domain name had disappeared for an extended period of time and could not be contacted. In September 2021, every active contributor unanimously agreed to move from PrivacyTools to work on this site: Privacy Guides. This decision was made because PrivacyTools founder and controller of the domain name had disappeared for an extended period of time and could not be contacted.

View File

@ -1,3 +1,7 @@
- - -
description: We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects.
- - -
# Privacy Guides Services # Privacy Guides Services
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below. We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.

View File

@ -1,5 +1,6 @@
--- ---
title: Traffic Statistics title: Traffic Statistics
description: We self-host Umami to create a nice visualization of our traffic statistics, which are made public here.
--- ---
<!-- markdownlint-disable MD051 --> <!-- markdownlint-disable MD051 -->

View File

@ -1,6 +1,7 @@
--- ---
title: Private Payments title: Private Payments
icon: material/hand-coin icon: material/hand-coin
description: Your buying habits are the holy grail of ad targeting, but you still have plenty of options when it comes to making payments privately.
--- ---
There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately. There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.

View File

@ -1,5 +1,6 @@
--- ---
title: General Apps title: General Apps
description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
schema: schema:
- "@context": http://schema.org - "@context": http://schema.org
"@type": WebPage "@type": WebPage
@ -9,17 +10,17 @@ schema:
"@type": MobileApplication "@type": MobileApplication
name: Shelter name: Shelter
applicationCategory: Utilities applicationCategory: Utilities
operatingSystem: অ্যান্ড্রয়েড operatingSystem: Android
- "@context": http://schema.org - "@context": http://schema.org
"@type": MobileApplication "@type": MobileApplication
name: Secure Camera name: Secure Camera
applicationCategory: Utilities applicationCategory: Utilities
operatingSystem: অ্যান্ড্রয়েড operatingSystem: Android
- "@context": http://schema.org - "@context": http://schema.org
"@type": MobileApplication "@type": MobileApplication
name: Secure PDF Viewer name: Secure PDF Viewer
applicationCategory: Utilities applicationCategory: Utilities
operatingSystem: অ্যান্ড্রয়েড operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large robots: nofollow, max-snippet:-1, max-image-preview:large
--- ---

View File

@ -1,5 +1,6 @@
--- ---
title: অ্যান্ড্রয়েড title: Android
description: Our advice for replacing privacy-invasive default Android features with private and secure alternatives.
icon: simple/android icon: simple/android
cover: android.webp cover: android.webp
schema: schema:
@ -9,7 +10,7 @@ schema:
url: ./ url: ./
- "@context": http://schema.org - "@context": http://schema.org
"@type": CreativeWork "@type": CreativeWork
name: অ্যান্ড্রয়েড name: Android
image: /assets/img/android/android.svg image: /assets/img/android/android.svg
url: https://source.android.com/ url: https://source.android.com/
sameAs: https://en.wikipedia.org/wiki/Android_(operating_system) sameAs: https://en.wikipedia.org/wiki/Android_(operating_system)

View File

@ -1,5 +1,6 @@
--- ---
title: Obtaining Applications title: Obtaining Applications
description: We recommend these methods for obtaining applications on Android without interacting with Google Play Services.
--- ---
There are many ways to obtain Android apps privately, even from the Play Store, without interacting with Google Play Services. We recommend the following methods of obtaining applications on Android, listed in order of preference. There are many ways to obtain Android apps privately, even from the Play Store, without interacting with Google Play Services. We recommend the following methods of obtaining applications on Android, listed in order of preference.

View File

@ -1,6 +1,7 @@
--- ---
title: "Why Privacy Matters" title: "Why Privacy Matters"
icon: 'material/shield-account' icon: 'material/shield-account'
description: In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not.
--- ---
In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands.

View File

@ -1,5 +1,6 @@
--- ---
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
description: Unlike most cryptocurrencies, these ones provide transaction privacy by default. Monero is our top choice for obfuscating transaction information.
title: Cryptocurrency title: Cryptocurrency
icon: material/bank-circle icon: material/bank-circle
cover: cryptocurrency.webp cover: cryptocurrency.webp

View File

@ -2,6 +2,7 @@
title: Financial Services title: Financial Services
icon: material/bank icon: material/bank
cover: financial-services.webp cover: financial-services.webp
description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today.
--- ---
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@ -1,6 +1,6 @@
--- ---
meta_title: "Privacy Guides: Independent Privacy & Security Resources" meta_title: "Privacy Guides: Independent Privacy & Security Resources"
description: "Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life. Ad & affiliate free, high quality reviews." description: "Established in 2021, Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life."
template: home.html template: home.html
social: social:
cards_layout: home cards_layout: home

View File

@ -1,5 +1,6 @@
--- ---
title: Admonitions title: Admonitions
description: A guide for website contributors on creating admonitions.
--- ---
**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. **Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow.

View File

@ -1,5 +1,6 @@
--- ---
title: Branding Guidelines title: Branding Guidelines
description: A guide for journalists and website contributors on proper branding of the Privacy Guides wordmark and logo.
--- ---
The name of the website is **Privacy Guides** and should **not** be changed to: The name of the website is **Privacy Guides** and should **not** be changed to:

View File

@ -1,5 +1,6 @@
--- ---
title: Commit Messages title: Commit Messages
description: A guide for website contributors on using useful Git commit messages when making website change requests.
--- ---
For our commit messages we follow the style provided by [Conventional Commits](https://conventionalcommits.org). Not all of those suggestions are appropriate for Privacy Guides, so the main ones we use are: For our commit messages we follow the style provided by [Conventional Commits](https://conventionalcommits.org). Not all of those suggestions are appropriate for Privacy Guides, so the main ones we use are:

View File

@ -1,5 +1,6 @@
--- ---
title: Git Recommendations title: Git Recommendations
description: A guide for website contributors on using Git effectively.
--- ---
If you make changes to this website on GitHub.com's web editor directly, you shouldn't have to worry about this. If you are developing locally and/or are a long-term website editor (who should probably be developing locally!), consider these recommendations. If you make changes to this website on GitHub.com's web editor directly, you shouldn't have to worry about this. If you are developing locally and/or are a long-term website editor (who should probably be developing locally!), consider these recommendations.

View File

@ -1,5 +1,6 @@
--- ---
title: Translations title: Translations
description: A guide for website contributors on adding translations to our website.
--- ---
Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site.

View File

@ -1,5 +1,6 @@
--- ---
title: Uploading Images title: Uploading Images
description: A guide for website contributors on uploading images in the proper format and location.
--- ---
If you make changes to this website that involve adding new images or replacing existing ones, here are a couple of general recommendations: If you make changes to this website that involve adding new images or replacing existing ones, here are a couple of general recommendations:

View File

@ -1,5 +1,6 @@
--- ---
title: Writing Style title: Writing Style
description: Our official writing style handbook for website contributors.
--- ---
Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt.

View File

@ -1,5 +1,5 @@
--- ---
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides" meta_title: "Privacy Respecting Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers" title: "Mobile Browsers"
icon: material/cellphone-information icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.

View File

@ -1,7 +1,7 @@
--- ---
title: Mobile Phones title: Mobile Phones
icon: material/cellphone-check icon: material/cellphone-check
description: These mobile devices have proper Android Verified Boot support for custom operating systems. description: These mobile devices provide the best hardware security support for custom Android operating systems.
cover: android.webp cover: android.webp
schema: schema:
- "@context": http://schema.org - "@context": http://schema.org

View File

@ -1,5 +1,6 @@
--- ---
title: Operating Systems title: Operating Systems
description: An overview of our operating system-related recommendations for all major computing hardware.
--- ---
We publish configuration guides for the major operating systems, because you can generally improve the amount of data that is collected about you on any option, especially if you use privacy tools like our [recommended web browsers](../desktop-browsers.md) in place of native tools where appropriate. However, some operating systems will be more privacy-respecting inherently, and it will be much harder to achieve an equivalent level of privacy on other choices. We publish configuration guides for the major operating systems, because you can generally improve the amount of data that is collected about you on any option, especially if you use privacy tools like our [recommended web browsers](../desktop-browsers.md) in place of native tools where appropriate. However, some operating systems will be more privacy-respecting inherently, and it will be much harder to achieve an equivalent level of privacy on other choices.

View File

@ -1,5 +1,6 @@
--- ---
title: Group Policy Settings title: Group Policy Settings
description: A quick guide to configuring Group Policy to make Windows a bit more privacy respecting.
--- ---
Outside of modifying the registry itself, the **Local Group Policy Editor** is the most powerful way to change many aspects of your system without installing third-party tools. Changing these settings requires [Pro Edition](index.md#windows-editions) or better. Outside of modifying the registry itself, the **Local Group Policy Editor** is the most powerful way to change many aspects of your system without installing third-party tools. Changing these settings requires [Pro Edition](index.md#windows-editions) or better.

View File

@ -1,6 +1,7 @@
--- ---
title: Windows Overview title: Windows Overview
icon: material/microsoft-windows icon: material/microsoft-windows
description: Microsoft Windows is a common operating system which is extremely non-private out of the box. Our guide covers making some improvements to your computer without replacing your OS.
--- ---
**Microsoft Windows** is a common OS shipped with many PCs by default. The following guides aim to provide some ways to improve privacy and reduce the default telemetry and data stored by disabling some unnecessary features. Over time, Microsoft adds features to the OS which can sometimes rely on cloud-based services. These features will often require certain types of [optional data](https://privacy.microsoft.com/data-collection-windows) that is sometimes sent to remote servers for processing. **Microsoft Windows** is a common OS shipped with many PCs by default. The following guides aim to provide some ways to improve privacy and reduce the default telemetry and data stored by disabling some unnecessary features. Over time, Microsoft adds features to the OS which can sometimes rely on cloud-based services. These features will often require certain types of [optional data](https://privacy.microsoft.com/data-collection-windows) that is sometimes sent to remote servers for processing.

View File

@ -2,7 +2,7 @@
meta_title: "The Best Private Instant Messengers - Privacy Guides" meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication" title: "Real-Time Communication"
icon: material/chat-processing icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them. description: Encrypted messengers like Signal and SimpleX keep your sensitive communications secure from prying eyes.
cover: real-time-communication.webp cover: real-time-communication.webp
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: "Router Firmware" title: "Router Firmware"
icon: material/router-wireless icon: material/router-wireless
description: These alternative operating systems can be used to secure your router or Wi-Fi access point. description: Alternative operating systems for securing your router or Wi-Fi access point.
cover: router.webp cover: router.webp
--- ---

View File

@ -2,7 +2,7 @@
meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides" meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines" title: "Search Engines"
icon: material/search-web icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches. description: Privacy-respecting search engines which don't build an advertising profile based on your searches.
cover: search-engines.webp cover: search-engines.webp
global: global:
- -

View File

@ -1,7 +1,7 @@
--- ---
title: Security Keys title: Security Keys
icon: material/key-chain icon: material/key-chain
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. description: Secure your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
cover: multi-factor-authentication.webp cover: multi-factor-authentication.webp
--- ---

View File

@ -1,10 +1,10 @@
--- ---
meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides" meta_title: "Ad-Free Privacy Tool/Service Recommendations - Privacy Guides"
title: "Privacy Tools" title: "Privacy Tools"
icon: material/tools icon: material/tools
hide: hide:
- toc - toc
description: Privacy Guides is the most transparent and reliable website for finding software, apps, and services that protect your personal data from mass surveillance programs and other internet threats. description: A complete list of the privacy tools, services, software, and hardware recommended by the Privacy Guides community.
--- ---
If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs.

View File

@ -2,7 +2,7 @@
meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides" meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services" title: "VPN Services"
icon: material/vpn icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isnt out to spy on you. description: The best VPN services for protecting your privacy and security online. Find a provider here that isnt out to spy on you.
cover: vpn.webp cover: vpn.webp
global: global:
- -

View File

@ -2,6 +2,7 @@
title: Contributors title: Contributors
hide: hide:
- toc - toc
description: A complete list of contributors who have collectively made an enormous impact on the Privacy Guides project.
--- ---
<!-- Do NOT manually edit this file, please add yourself to the .all-contributorsrc file instead. See our GitHub Issues for more details --> <!-- Do NOT manually edit this file, please add yourself to the .all-contributorsrc file instead. See our GitHub Issues for more details -->

View File

@ -1,5 +1,6 @@
--- ---
title: General Criteria title: General Criteria
description: A list of general priorities we consider for all submissions to Privacy Guides.
--- ---
Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion. Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.

View File

@ -1,5 +1,6 @@
--- ---
title: Donate title: Donate
description: The charitable mission of Privacy Guides relies on contributions from visitors like yourself. Anything you can do to support the project is hugely appreciated.
--- ---
<!-- markdownlint-disable MD036 --> <!-- markdownlint-disable MD036 -->

View File

@ -1,5 +1,6 @@
--- ---
title: Executive Policy title: Executive Policy
description: These are policies formally adopted by our executive committee, and take precedence over all other statements expressed on this website.
--- ---
These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website.

View File

@ -1,5 +1,6 @@
--- ---
title: Job Openings title: Job Openings
description: Privacy Guides has a small, remote team of privacy researchers and advocates. Any open positions we may have in the future will be posted here.
--- ---
Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our staff members are listed [here](../about.md#staff). Please consider [donating](donate.md) to support our cause. Privacy Guides has a small, remote team of privacy researchers and advocates working to further our mission of protecting free expression and promoting privacy-respecting technology. As a non-profit, we are expanding very slowly to ensure the project is sustainable in the long term. All of our staff members are listed [here](../about.md#staff). Please consider [donating](donate.md) to support our cause.

View File

@ -1,5 +1,6 @@
--- ---
title: "Notices and Disclaimers" title: "Notices and Disclaimers"
description: Information about our website license, acceptable use policy, and other important details.
--- ---
## Legal Disclaimer ## Legal Disclaimer

View File

@ -1,5 +1,6 @@
--- ---
title: "Privacy Policy" title: "Privacy Policy"
description: We do not sell or share your data with any third-parties.
--- ---
Privacy Guides is a community project operated by a number of active volunteer contributors. The public list of team members [can be found on GitHub](https://github.com/orgs/privacyguides/people). Privacy Guides is a community project operated by a number of active volunteer contributors. The public list of team members [can be found on GitHub](https://github.com/orgs/privacyguides/people).

View File

@ -1,5 +1,6 @@
--- ---
title: "PrivacyTools FAQ" title: "PrivacyTools FAQ"
description: The real story behind the team transition from privacytools.io to privacyguides.org
--- ---
In September 2021, every active contributor unanimously agreed to move from PrivacyTools to work on this site: Privacy Guides. This decision was made because PrivacyTools founder and controller of the domain name had disappeared for an extended period of time and could not be contacted. In September 2021, every active contributor unanimously agreed to move from PrivacyTools to work on this site: Privacy Guides. This decision was made because PrivacyTools founder and controller of the domain name had disappeared for an extended period of time and could not be contacted.

View File

@ -1,3 +1,7 @@
- - -
description: We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects.
- - -
# Privacy Guides Services # Privacy Guides Services
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below. We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.

View File

@ -1,5 +1,6 @@
--- ---
title: Traffic Statistics title: Traffic Statistics
description: We self-host Umami to create a nice visualization of our traffic statistics, which are made public here.
--- ---
<!-- markdownlint-disable MD051 --> <!-- markdownlint-disable MD051 -->

View File

@ -1,6 +1,7 @@
--- ---
title: Private Payments title: Private Payments
icon: material/hand-coin icon: material/hand-coin
description: Your buying habits are the holy grail of ad targeting, but you still have plenty of options when it comes to making payments privately.
--- ---
There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately. There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.

View File

@ -1,5 +1,6 @@
--- ---
title: General Apps title: General Apps
description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
schema: schema:
- "@context": http://schema.org - "@context": http://schema.org
"@type": WebPage "@type": WebPage

View File

@ -1,5 +1,6 @@
--- ---
title: Android title: Android
description: Our advice for replacing privacy-invasive default Android features with private and secure alternatives.
icon: simple/android icon: simple/android
cover: android.webp cover: android.webp
schema: schema:

View File

@ -1,5 +1,6 @@
--- ---
title: Obtaining Applications title: Obtaining Applications
description: We recommend these methods for obtaining applications on Android without interacting with Google Play Services.
--- ---
There are many ways to obtain Android apps privately, even from the Play Store, without interacting with Google Play Services. We recommend the following methods of obtaining applications on Android, listed in order of preference. There are many ways to obtain Android apps privately, even from the Play Store, without interacting with Google Play Services. We recommend the following methods of obtaining applications on Android, listed in order of preference.

View File

@ -1,6 +1,7 @@
--- ---
title: "Why Privacy Matters" title: "Why Privacy Matters"
icon: 'material/shield-account' icon: 'material/shield-account'
description: In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not.
--- ---
In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands. In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands.
@ -43,7 +44,7 @@ All of these concepts overlap, but it is possible to have any combination of the
A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong. A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong.
==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. কারণ আমরা ব্যক্তিগত গোপনীয়তা চাই, গুপ্ত ব্যাপার রাখা নয়। There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets. ==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets.
## Is Privacy About Control? ## Is Privacy About Control?

View File

@ -1,5 +1,6 @@
--- ---
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
description: Unlike most cryptocurrencies, these ones provide transaction privacy by default. Monero is our top choice for obfuscating transaction information.
title: Cryptocurrency title: Cryptocurrency
icon: material/bank-circle icon: material/bank-circle
cover: cryptocurrency.webp cover: cryptocurrency.webp

View File

@ -2,6 +2,7 @@
title: Financial Services title: Financial Services
icon: material/bank icon: material/bank
cover: financial-services.webp cover: financial-services.webp
description: These services can assist you in protecting your privacy from merchants and other trackers, which is one of the biggest challenges to privacy today.
--- ---
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@ -1,6 +1,6 @@
--- ---
meta_title: "Privacy Guides: Independent Privacy & Security Resources" meta_title: "Privacy Guides: Independent Privacy & Security Resources"
description: "Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life. Ad & affiliate free, high quality reviews." description: "Established in 2021, Privacy Guides is the most popular & trustworthy non-profit resource to find privacy tools and learn about protecting your digital life."
template: home.html template: home.html
social: social:
cards_layout: home cards_layout: home

View File

@ -1,5 +1,6 @@
--- ---
title: Admonitions title: Admonitions
description: A guide for website contributors on creating admonitions.
--- ---
**Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow. **Admonitions** (or "call-outs") are a choice writers can use to include side content in an article without interrupting the document flow.

View File

@ -1,5 +1,6 @@
--- ---
title: Branding Guidelines title: Branding Guidelines
description: A guide for journalists and website contributors on proper branding of the Privacy Guides wordmark and logo.
--- ---
The name of the website is **Privacy Guides** and should **not** be changed to: The name of the website is **Privacy Guides** and should **not** be changed to:

View File

@ -1,5 +1,6 @@
--- ---
title: Commit Messages title: Commit Messages
description: A guide for website contributors on using useful Git commit messages when making website change requests.
--- ---
For our commit messages we follow the style provided by [Conventional Commits](https://conventionalcommits.org). Not all of those suggestions are appropriate for Privacy Guides, so the main ones we use are: For our commit messages we follow the style provided by [Conventional Commits](https://conventionalcommits.org). Not all of those suggestions are appropriate for Privacy Guides, so the main ones we use are:

View File

@ -1,5 +1,6 @@
--- ---
title: Git Recommendations title: Git Recommendations
description: A guide for website contributors on using Git effectively.
--- ---
If you make changes to this website on GitHub.com's web editor directly, you shouldn't have to worry about this. If you are developing locally and/or are a long-term website editor (who should probably be developing locally!), consider these recommendations. If you make changes to this website on GitHub.com's web editor directly, you shouldn't have to worry about this. If you are developing locally and/or are a long-term website editor (who should probably be developing locally!), consider these recommendations.

View File

@ -1,5 +1,6 @@
--- ---
title: Translations title: Translations
description: A guide for website contributors on adding translations to our website.
--- ---
Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site.

View File

@ -1,5 +1,6 @@
--- ---
title: Uploading Images title: Uploading Images
description: A guide for website contributors on uploading images in the proper format and location.
--- ---
If you make changes to this website that involve adding new images or replacing existing ones, here are a couple of general recommendations: If you make changes to this website that involve adding new images or replacing existing ones, here are a couple of general recommendations:

View File

@ -1,5 +1,6 @@
--- ---
title: Writing Style title: Writing Style
description: Our official writing style handbook for website contributors.
--- ---
Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt.

View File

@ -1,5 +1,5 @@
--- ---
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides" meta_title: "Privacy Respecting Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers" title: "Mobile Browsers"
icon: material/cellphone-information icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.

View File

@ -1,7 +1,7 @@
--- ---
title: Mobile Phones title: Mobile Phones
icon: material/cellphone-check icon: material/cellphone-check
description: These mobile devices have proper Android Verified Boot support for custom operating systems. description: These mobile devices provide the best hardware security support for custom Android operating systems.
cover: android.webp cover: android.webp
schema: schema:
- "@context": http://schema.org - "@context": http://schema.org

View File

@ -1,5 +1,6 @@
--- ---
title: Operating Systems title: Operating Systems
description: An overview of our operating system-related recommendations for all major computing hardware.
--- ---
We publish configuration guides for the major operating systems, because you can generally improve the amount of data that is collected about you on any option, especially if you use privacy tools like our [recommended web browsers](../desktop-browsers.md) in place of native tools where appropriate. However, some operating systems will be more privacy-respecting inherently, and it will be much harder to achieve an equivalent level of privacy on other choices. We publish configuration guides for the major operating systems, because you can generally improve the amount of data that is collected about you on any option, especially if you use privacy tools like our [recommended web browsers](../desktop-browsers.md) in place of native tools where appropriate. However, some operating systems will be more privacy-respecting inherently, and it will be much harder to achieve an equivalent level of privacy on other choices.

Some files were not shown because too many files have changed in this diff Show More