diff --git a/i18n/ar/about/criteria.md b/i18n/ar/about/criteria.md
index ccb7e87d..d7a6af77 100644
--- a/i18n/ar/about/criteria.md
+++ b/i18n/ar/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## General Guidelines
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/ar/index.md b/i18n/ar/index.md
index 55de3a50..30fd60d5 100644
--- a/i18n/ar/index.md
+++ b/i18n/ar/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
-template: overrides/home.ar.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ schema:
==هذه العملية لتحديد التهديدات وتحديد الإجراءات المضادة تسمى **نَمذَجَةُ التَّهدِيد**==، وهي تشكل الأساس لكل خِطَّة أمان وخصوصية جيدة.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## نحتاجُك! إليك كيفية المشاركة:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-من المهم أن يُحدَّث موقع ويب مثل إرشادات الخصوصية بشكل مستمر. نحتاج إلى أن يراقب جمهورنا تحديثات برمجيات التطبيقات المدرجة على موقعنا ومتابعة آخر الأخبار حول مقدمي الخدمة الذين نوصي بهم. من الصعب مواكبة الوتيرة السريعة للإنترنت، لكننا نبذل قصارى جهدنا. إذا اكتشفت خطأً، اعتقدت أنه لا يجب إدراج مقدم خدمة، لاحظت اختفاء مزود مؤهَّل، اعتقدت أن المكون الإضافي للمتصفح لم يعد هو الخيار الأفضل، أو اكتشفت أي مشكلة أخرى، يرجى إبلاغنا بذلك.
diff --git a/i18n/bn-IN/about/criteria.md b/i18n/bn-IN/about/criteria.md
index ccb7e87d..d7a6af77 100644
--- a/i18n/bn-IN/about/criteria.md
+++ b/i18n/bn-IN/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## General Guidelines
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/bn-IN/index.md b/i18n/bn-IN/index.md
index d39e5c81..69c6beb7 100644
--- a/i18n/bn-IN/index.md
+++ b/i18n/bn-IN/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
-template: overrides/home.bn.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Trying to protect all your data from everyone all the time is impractical, expen
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## We need you! Here's how to get involved:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
diff --git a/i18n/bn/about/criteria.md b/i18n/bn/about/criteria.md
index ccb7e87d..d7a6af77 100644
--- a/i18n/bn/about/criteria.md
+++ b/i18n/bn/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## General Guidelines
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/bn/index.md b/i18n/bn/index.md
index f5cfc944..321f3dab 100644
--- a/i18n/bn/index.md
+++ b/i18n/bn/index.md
@@ -1,6 +1,6 @@
---
meta_title: "প্রাইভেসি গাইড: তোমার স্বাধীন গোপনীয়তা ও নিরাপত্তা বিষয়ক তথ্যভাণ্ডার"
-template: overrides/home.bn.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Trying to protect all your data from everyone all the time is impractical, expen
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## We need you! Here's how to get involved:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
diff --git a/i18n/cs/about/criteria.md b/i18n/cs/about/criteria.md
index ccb7e87d..d7a6af77 100644
--- a/i18n/cs/about/criteria.md
+++ b/i18n/cs/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## General Guidelines
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/cs/index.md b/i18n/cs/index.md
index 2ea199dc..4701bbb6 100644
--- a/i18n/cs/index.md
+++ b/i18n/cs/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
-template: overrides/home.cs.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Snažit se neustále chránit všechna data před všemi je nepraktické, nákla
==Tento proces identifikace hrozeb a vytváření protiopatření se nazývá **threat modeling**== a tvoří základ každého dobrého plánu pro bezpečnost a ochranu soukromí.
[:material-book-outline: Další informace o threat modelingu](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## Potřebujeme vás! Zde je návod, jak začít:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-Pro webové stránky jako je Privacy Guides je důležité, aby byly vždy aktuální. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
diff --git a/i18n/de/about/criteria.md b/i18n/de/about/criteria.md
index 623e0a45..da935787 100644
--- a/i18n/de/about/criteria.md
+++ b/i18n/de/about/criteria.md
@@ -1,31 +1,20 @@
---
-title: Allgemeine Kriterien
+title: General Criteria
---
-
-
In Arbeit
+Below are some general priorities we consider for all submissions to Privacy Guides. Für jede Kategorie gelten zusätzliche Anforderungen für die Aufnahme.
-An dieser Seite wird im Moment noch gearbeitet; sie spiegelt derzeit nicht die vollständigen Kriterien für unsere Empfehlungen wieder. Frühere Diskussion zu diesem Thema: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Nachfolgend sind einige Punkte aufgeführt, die für alle Einsendungen an Privacy Guides zutreffen müssen. Für jede Kategorie gelten zusätzliche Anforderungen für die Aufnahme.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Verfügbarkeit des Quellcodes**: Open-Source-Projekte werden meist gegenüber gleichwertigen proprietären Alternativen bevorzugt.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Aktive Entwicklung**: Die von uns empfohlenen Tools sollten aktiv weiterentwickelt werden, nicht gewartete Projekte werden in den meisten Fällen entfernt.
+- **Benutzerfreundlichkeit**: Die Tools sollten für die meisten Computerbenutzer zugänglich sein, ein übermäßig technischer Hintergrund sollte nicht erforderlich sein.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Finanz-Offenlegung
Wir verdienen kein Geld mit Empfehlungen bestimmter Produkte, wir verwenden keine Affiliate-Links, und wir gewähren keine besondere Gegenleistung für Projektspender.
-## Allgemeine Richtlinien
-
-Wir wenden diese Prioritäten beim Prüfen neuer Empfehlungen an:
-
-- **Sicher**: Tools sollten, wo möglich, bewährte Sicherheitspraktiken anwenden.
-- **Verfügbarkeit des Quellcodes**: Open-Source-Projekte werden meist gegenüber gleichwertigen proprietären Alternativen bevorzugt.
-- **Plattformübergreifend**: Wir bevorzugen Empfehlungen die plattformübergreifend sind, um eine Herstellerbindung zu vermeiden.
-- **Aktive Entwicklung**: Die von uns empfohlenen Tools sollten aktiv weiterentwickelt werden, nicht gewartete Projekte werden in den meisten Fällen entfernt.
-- **Benutzerfreundlichkeit**: Die Tools sollten für die meisten Computerbenutzer zugänglich sein, ein übermäßig technischer Hintergrund sollte nicht erforderlich sein.
-- **Dokumentiert**: Die Werkzeuge sollten über eine klare und ausführliche Dokumentation zum Gebrauch verfügen.
-
## Selbsteinreichungen von Entwicklern
Wir haben diese Anforderungen an Entwickler, die eigene Projekt oder Software zur Prüfung einreichen möchten.
diff --git a/i18n/de/index.md b/i18n/de/index.md
index 1a98b0fe..32e58f1f 100644
--- a/i18n/de/index.md
+++ b/i18n/de/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Deine unabhängige Quelle für Datenschutz und Sicherheit"
-template: overrides/home.de.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Der Versuch, alle unsere Daten ständig vor allen zu schützen, ist unpraktisch,
== Dieser Prozess der Identifizierung von Bedrohungen und der Festlegung von Gegenmaßnahmen wird als **Bedrohungsanalyse** bezeichnet== und bildet die Grundlage für jeden guten Sicherheits- und Datenschutzplan.
[:material-book-outline: Lerne mehr zur Bedrohungsanalyse ](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## Wir brauchen dich! So kannst du mitmachen:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Treten Sie unserem Forum bei" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Folgen Sie uns auf Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Zu dieser Website beitragen" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Helfen Sie bei der Übersetzung dieser Website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chatten Sie mit uns auf Matrix" }
-[:material-information-outline:](about/index.md){ title="Erfahren Sie mehr über uns" }
-[:material-hand-coin-outline:](about/donate.md){ title="Unterstützen Sie das Projekt" }
-
-Es ist wichtig, dass eine Website wie Privacy Guides immer auf dem neuesten Stand bleibt. Wir brauchen unser Publikum um Software-Updates für die auf unserer Website aufgeführten Anwendungen im Auge zu behalten und die neuesten Nachrichten über die von uns empfohlenen Anbieter zu verfolgen. Es ist schwer, mit der Schnelllebigkeit des Internets Schritt zu halten, aber wir versuchen unser Bestes. Solltest du einen Fehler entdecken, der Meinung sein, dass ein Anbieter nicht aufgelistet sein sollte, ein qualifizierter Anbieter fehlt, ein Browser-Plugin nicht mehr die beste Wahl ist oder du ein anderes Problem finden, lass es uns bitte wissen.
diff --git a/i18n/el/about/criteria.md b/i18n/el/about/criteria.md
index ccb7e87d..d7a6af77 100644
--- a/i18n/el/about/criteria.md
+++ b/i18n/el/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## General Guidelines
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/el/index.md b/i18n/el/index.md
index 7962ac34..569fdf1b 100644
--- a/i18n/el/index.md
+++ b/i18n/el/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
-template: overrides/home.el.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ schema:
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## We need you! Here's how to get involved:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
diff --git a/i18n/eo/about/criteria.md b/i18n/eo/about/criteria.md
index ccb7e87d..d7a6af77 100644
--- a/i18n/eo/about/criteria.md
+++ b/i18n/eo/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## General Guidelines
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/eo/index.md b/i18n/eo/index.md
index 3cc976cf..69c6beb7 100644
--- a/i18n/eo/index.md
+++ b/i18n/eo/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
-template: overrides/home.eo.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Trying to protect all your data from everyone all the time is impractical, expen
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## We need you! Here's how to get involved:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
diff --git a/i18n/es/about/criteria.md b/i18n/es/about/criteria.md
index 4265131d..ce42fd2d 100644
--- a/i18n/es/about/criteria.md
+++ b/i18n/es/about/criteria.md
@@ -1,31 +1,20 @@
---
-title: Criterios Generales
+title: General Criteria
---
-
-
Trabajo en Progreso
+Below are some general priorities we consider for all submissions to Privacy Guides. Cada categoría puede tener requisitos adicionales.
-La siguiente página se encuentra en construcción, y no refleja todos los criterios para nuestras recomendaciones en este momento. Discusión anterior sobre este tema: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Abajo se encuentran algunos aspectos que deben cumplir todos los envíos a Privacy Guides. Cada categoría puede tener requisitos adicionales.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Disponibilidad del código**: Proyectos de código abierto son preferibles sobre alternativas similares de código cerrado.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Desarrollo activo**: Las herramientas que recomendamos deben ser desarrolladas activamente, los proyectos no mantenidos serán eliminados en la mayoría de los casos.
+- **Usabilidad**: Las herramientas deben ser accesibles para la mayoría de los usuarios de ordenador, no debe exigirse una formación demasiado técnica.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Información financiera
No obtenemos dinero al recomendar ciertos productos, nosotros no utilizamos enlaces de afiliados, y no realizamos alguna consideración especial a los patrocinadores del proyecto.
-## Lineamientos generales
-
-Aplicamos estas prioridades al considerar nuevas recomendaciones:
-
-- Herramientas **seguras**: Las herramientas deben seguir las mejores prácticas de seguridad cuando sea necesario.
-- **Disponibilidad del código**: Proyectos de código abierto son preferibles sobre alternativas similares de código cerrado.
-- **Multiplataforma**: Preferimos que las recomendaciones sean multiplataforma para evitar la dependencia de un sistema.
-- **Desarrollo activo**: Las herramientas que recomendamos deben ser desarrolladas activamente, los proyectos no mantenidos serán eliminados en la mayoría de los casos.
-- **Usabilidad**: Las herramientas deben ser accesibles para la mayoría de los usuarios de ordenador, no debe exigirse una formación demasiado técnica.
-- **Documentado**: Las herramientas deben tener una documentación de uso clara y extensa.
-
## Autoenvíos del desarrollador
Estos son los requisitos que exigimos a los desarrolladores que deseen presentar su proyecto o programa informático.
diff --git a/i18n/es/index.md b/i18n/es/index.md
index 9c78bd01..be03987b 100644
--- a/i18n/es/index.md
+++ b/i18n/es/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Tu Recurso Independiente sobre Privacidad y Seguridad"
-template: overrides/home.es.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Intentar proteger todos tus datos de todo el mundo y en todo momento es impráct
==Este proceso de identificación de amenazas y definición de contramedidas se llama **modelado de amenazas**==, y constituye la base de todo buen plan de seguridad y privacidad.
[:material-book-outline: Más Información sobre el Modelado de Amenazas](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## ¡Te necesitamos! Aquí te indicamos cómo involucrarse:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Únete a Nuestro Foro" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Síguenos en Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribuye a este sitio web" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Ayuda a traducir este sitio web" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chatea con nosotros en Matrix" }
-[:material-information-outline:](about/index.md){ title="Más información sobre nosotros" }
-[:material-hand-coin-outline:](about/donate.md){ title="Apoya el proyecto" }
-
-Es importante que un sitio web como Privacy Guides se mantenga siempre actualizado. Necesitamos que nuestra audiencia vigile las actualizaciones de software para las aplicaciones listadas en nuestro sitio y también sigan las últimas noticias sobre proveedores que recomendamos. Es difícil mantenerse al día con el ritmo rápido de Internet, pero intentamos lo mejor. Si detectas un error, crees que un proveedor no debe ser listado, notas que falta un proveedor calificado, crees que un plugin de navegador ya no es la mejor opción, o descubres cualquier otro problema, por favor háznoslo saber.
diff --git a/i18n/fa/about/criteria.md b/i18n/fa/about/criteria.md
index ccb7e87d..d7a6af77 100644
--- a/i18n/fa/about/criteria.md
+++ b/i18n/fa/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## General Guidelines
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/fa/index.md b/i18n/fa/index.md
index 3d43419a..3e7362a3 100644
--- a/i18n/fa/index.md
+++ b/i18n/fa/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: منبع مستقل حریم خصوصی و امنیت شما"
-template: overrides/home.fa.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ schema:
==این فرآیند شناسایی تهدیدات و تعریف اقدامات متقابل، به نام **مدلسازی تهدید** شناخته میشود و اساس هر برنامه امنیت و حریم خصوصی خوب را تشکیل میدهد.==.
[:material-book-outline: یادگیری بیشتر درباره مدلسازی تهدید](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## ما به کمک شما نیاز داریم! اینطوری میتوانید مشارکت کنید:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-برای یک وبسایت مانند Privacy Guides، مهم است که همواره بهروز باشد. ما نیاز داریم که مخاطبانمان به بروزرسانیهای نرمافزاری برای برنامههای لیست شده در وبسایت، دقت کنند و اخبار جدید مربوط به ارائهدهندگانی که ما توصیه میکنیم را دنبال کنند. سخت است با سرعت بالای اینترنت هماهنگ شد، اما ما تلاش خود را بهترین شکل ممکن انجام میدهیم. اگر خطایی را مشاهده کردید، فکر میکنید که یک ارائهدهنده باید در لیست وجود نداشته باشد، یا متوجه شدید که یک ارائهدهنده متخصص حذف شده است، باور دارید که یک افزونه مرورگر دیگر بهترین انتخاب نیست یا هر مشکل دیگری را کشف کردید، لطفاً به ما اطلاع دهید.
diff --git a/i18n/fr/about/criteria.md b/i18n/fr/about/criteria.md
index 5d2fc4bd..60f15e36 100644
--- a/i18n/fr/about/criteria.md
+++ b/i18n/fr/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Chaque catégorie aura des exigences supplémentaires pour être incluse.
-La page suivante est inachevée et ne reflète pas l'ensemble des critères de nos recommandations à l'heure actuelle. Discussion antérieure sur ce sujet : [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Vous trouverez ci-dessous certains éléments qui doivent s'appliquer à toutes les soumissions à Privacy Guides. Chaque catégorie aura des exigences supplémentaires pour être incluse.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Disponibilité des sources** : les projets open source sont généralement préférés aux solutions propriétaires équivalentes.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Développement actif** : les outils que nous recommandons doivent être activement maintenus. Les projets non maintenus seront, dans la plupart des cas, supprimés.
+- **Facilité d'utilisation** : les outils doivent être accessibles à la plupart des utilisateurs d'ordinateurs, sans qu'un bagage trop technique soit nécessaire.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Divulgation financière
Nous ne gagnons pas d'argent en recommandant certains produits, nous n'utilisons pas de liens affiliés et nous n'accordons pas de considération particulière aux donateurs du projet.
-## Directives générales
-
-Nous appliquons ces priorités lorsque nous envisageons de nouvelles recommandations :
-
-- **Sécurisé** : les outils doivent respecter les bonnes pratiques en matière de sécurité, le cas échéant.
-- **Disponibilité des sources** : les projets open source sont généralement préférés aux solutions propriétaires équivalentes.
-- **Multiplateforme** : nous préférons généralement que les recommandations soient multiplateformes, afin d'éviter d'être coincé chez un fournisseur.
-- **Développement actif** : les outils que nous recommandons doivent être activement maintenus. Les projets non maintenus seront, dans la plupart des cas, supprimés.
-- **Facilité d'utilisation** : les outils doivent être accessibles à la plupart des utilisateurs d'ordinateurs, sans qu'un bagage trop technique soit nécessaire.
-- **Documenté** : ses outils doivent disposer d'une documentation claire et complète pour leur utilisation.
-
## Soumissions par les développeurs
Nous avons ces exigences à l'égard des développeurs qui souhaitent soumettre leur projet ou logiciel pour examen.
diff --git a/i18n/fr/index.md b/i18n/fr/index.md
index d1dab893..c393bf5c 100644
--- a/i18n/fr/index.md
+++ b/i18n/fr/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides : votre ressource indépendante en matière de protection de la vie privée et de sécuritéPrivacy Guides"
-template: overrides/home.fr.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Essayer de protéger toutes vos données contre tout le monde, tout le temps, es
==Ce processus d'identification des menaces et de définition des contre-mesures est appelé la **modélisation des menaces**==, et constitue la base de tout bon plan de sécurité et de vie privée.
[:material-book-outline: En savoir plus sur la modélisation des menaces](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## On a besoin de vous ! Voici comment vous pouvez vous impliquer :
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-Il est important pour un site web comme Privacy Guides de toujours rester à jour. Nous avons besoin que notre public garde un œil sur les mises à jour logicielles des applications répertoriées sur notre site et suive l'actualité récente des fournisseurs que nous recommandons. Internet évolue à une vitesse telle, qu'il est difficile de suivre le rythme, mais nous faisons de notre mieux. Si vous repérez une erreur, que vous pensez qu'un fournisseur ne devrait pas figurer dans la liste, remarquez l'absence d'un fournisseur qualifié, pensez qu'un plugin de navigateur n'est plus le meilleur choix ou si vous découvrez tout autre problème, veuillez nous en informer.
diff --git a/i18n/he/about/criteria.md b/i18n/he/about/criteria.md
index da5444e2..5f088942 100644
--- a/i18n/he/about/criteria.md
+++ b/i18n/he/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. לכל קטגוריה יהיו דרישות נוספות להכללה.
-העמוד הבא הוא עבודה בתהליך ואינו משקף את הקריטריונים המלאים להמלצות שלנו בשלב זה. דיון עבר בנושא זה: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-להלן כמה דברים שחייבים לחול על כל ההגשות ל-Privacy Guides. לכל קטגוריה יהיו דרישות נוספות להכללה.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **זמינות מקור**: פרויקטים בקוד פתוח מועדפים בדרך כלל על פני חלופות קנייניות שוות.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **פיתוח פעיל**: את הכלים שאנו ממליצים עליהם לפתח באופן פעיל, פרויקטים לא מתוחזקים יוסרו ברוב המקרים.
+- **שימושיות**: כלים צריכים להיות נגישים לרוב משתמשי המחשב, אין צורך ברקע טכני יתר על המידה.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## גילוי פיננסי נאות
איננו מרוויחים כסף מהמלצה על מוצרים מסוימים, איננו משתמשים בקישורי שותפים, ואיננו נותנים התחשבות מיוחדת לתורמי הפרויקט.
-## הנחיות כלליות
-
-אנו מיישמים את סדרי העדיפויות הבאים כאשר אנו שוקלים המלצות חדשות:
-
-- **מאובטח**: על הכלים לפעול לפי שיטות אבטחה מומלצות בכל מקום שניתן.
-- **זמינות מקור**: פרויקטים בקוד פתוח מועדפים בדרך כלל על פני חלופות קנייניות שוות.
-- **חוצה פלטפורמות**: בדרך כלל אנו מעדיפים שההמלצות יהיו חוצות פלטפורמות, כדי למנוע נעילת ספקים.
-- **פיתוח פעיל**: את הכלים שאנו ממליצים עליהם לפתח באופן פעיל, פרויקטים לא מתוחזקים יוסרו ברוב המקרים.
-- **שימושיות**: כלים צריכים להיות נגישים לרוב משתמשי המחשב, אין צורך ברקע טכני יתר על המידה.
-- **מתועד**: לכלים צריך להיות תיעוד ברור ונרחב לשימוש.
-
## הגשות עצמיות של מפתחים
יש לנו דרישות אלה לגבי מפתחים שרוצים להגיש את הפרויקט או התוכנה שלהם לשיקול.
diff --git a/i18n/he/index.md b/i18n/he/index.md
index 4396a225..eeeee9fa 100644
--- a/i18n/he/index.md
+++ b/i18n/he/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: משאב הפרטיות והאבטחה העצמאיים שלך"
-template: overrides/home.he.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ schema:
==תהליך זה של זיהוי איומים והגדרת אמצעי נגד נקרא **מידול** (מלשון מודל) ** סיכונים ** ==, והוא מהווה את הבסיס לכל תוכנית אבטחה ופרטיות טובה.
[:material-book-outline: למידע נוסף על מודל איומים](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## אנחנו זקוקים לך! יש כמה דרכים לעזור לנו:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-חשוב שאתר כמו Privacy Guides יישאר תמיד מעודכן. אנחנו צריכים שהקהל שלנו יפקח עין על עדכוני תוכנה עבור היישומים הרשומים באתר שלנו ויעקוב אחר התפתחויות לגבי ספקים שאנחנו ממליצים עליהם. קשה לעמוד בקצב המהיר של האינטרנט, אבל אנחנו מנסים כמיטב יכולתנו. אם אתה מזהה איזו שגיאה, חושב שספק לא צריך להיות רשום, שם לב שחסר ספק מוסמך, מאמין שתוסף דפדפן הוא כבר לא הבחירה הטובה ביותר, או מוצא כל בעיה אחרת, אנא הודיע לנו.
diff --git a/i18n/hi/about/criteria.md b/i18n/hi/about/criteria.md
index ccb7e87d..d7a6af77 100644
--- a/i18n/hi/about/criteria.md
+++ b/i18n/hi/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## General Guidelines
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/hi/index.md b/i18n/hi/index.md
index 2859e87c..69c6beb7 100644
--- a/i18n/hi/index.md
+++ b/i18n/hi/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
-template: overrides/home.hi.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Trying to protect all your data from everyone all the time is impractical, expen
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## We need you! Here's how to get involved:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
diff --git a/i18n/hu/about/criteria.md b/i18n/hu/about/criteria.md
index f723ff41..39527039 100644
--- a/i18n/hu/about/criteria.md
+++ b/i18n/hu/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-Az alábbi oldal egy folyamatban lévő munka, és jelenleg nem tükrözi az ajánlásaink teljes körű követelményeit. Korábbi beszélgetés erről a témáról: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Pénzügyi Nyilatkozat
Nem keresünk pénzt bizonyos termékek ajánlásával, nem használunk affiliate linkeket, és nem nyújtunk különleges bánásmódot a projekt adományozóinak.
-## Általános Irányelvek
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/hu/index.md b/i18n/hu/index.md
index 24faac93..d7d7f82a 100644
--- a/i18n/hu/index.md
+++ b/i18n/hu/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: a független adatvédelmi és adatbiztonsági forrásod"
-template: overrides/home.hu.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Megpróbálni az összes adatodat mindenkitől és mindig megvédeni nem praktik
==A fenyegetések azonosításának és az ellenintézkedések meghatározásának ezt a folyamatát **védelmi modellezésnek**== nevezzük, és ez képezi minden jó biztonsági és adatvédelmi terv alapját.
[:material-book-outline: További információk a védelmi modellekről](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## Szükségünk van rád! Itt van, hogyan tudsz részt venni:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Csatlakozz a fórumunkhoz" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Kövess minket a Mastodonon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Járulj hozzá ehhez a weboldalhoz" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Segíts lefordítani ezt a weboldalt" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Csevegj velünk a Mátrixon" }
-[:material-information-outline:](about/index.md){ title="Tudj meg többet rólunk" }
-[:material-hand-coin-outline:](about/donate.md){ title="Támogasd a projektet" }
-
-Fontos, hogy egy olyan weboldal, mint a Privacy Guides, mindig naprakész maradjon. Szükségünk van arra, hogy a közönségünk figyelemmel kísérje az oldalunkon felsorolt alkalmazások frissítéseit, és kövesse az általunk ajánlott szolgáltatókkal kapcsolatos legújabb híreket. Nehéz lépést tartani az internet gyors tempójával, de mi megteszünk minden tőlünk telhetőt. Ha hibát észlelsz, úgy gondolod, hogy egy szolgáltatónak nem kellene szerepelnie a listán, észreveszed, hogy egy alkalmas szolgáltató hiányzik, úgy véled, hogy egy böngésző bővítmény már nem a legjobb választás, vagy ha bármilyen más problémát észlelsz, kérjük, jelezd nekünk.
diff --git a/i18n/id/about/criteria.md b/i18n/id/about/criteria.md
index 487df715..55d9109c 100644
--- a/i18n/id/about/criteria.md
+++ b/i18n/id/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Setiap kategori akan memiliki persyaratan tambahan untuk dimasukkan.
-Halaman berikut ini masih dalam tahap pengembangan, dan tidak mencerminkan kriteria lengkap untuk rekomendasi kami saat ini. Diskusi sebelumnya tentang topik ini: [#24] (https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Di bawah ini adalah beberapa hal yang harus diterapkan pada semua pengajuan ke Privacy Guides. Setiap kategori akan memiliki persyaratan tambahan untuk dimasukkan.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Ketersediaan Sumber**: Proyek sumber terbuka umumnya lebih disukai daripada alternatif bersumber tertutup yang setara.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Pengembangan Aktif**: Alat yang kami rekomendasikan harus dikembangkan secara aktif, proyek yang tidak terpelihara akan dihapus dalam banyak kasus.
+- **Kegunaan**: Alat bantu harus dapat diakses oleh sebagian besar pengguna komputer, latar belakang yang terlalu teknis tidak diperlukan.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Pengungkapan Keuangan
Kami tidak menghasilkan uang dari merekomendasikan produk tertentu, kami tidak menggunakan tautan afiliasi, dan kami tidak memberikan pertimbangan khusus kepada para donatur proyek.
-## Pedoman Umum
-
-Kami menerapkan prioritas ini ketika mempertimbangkan rekomendasi baru:
-
-- **Aman**: Alat harus mengikuti praktik terbaik keamanan di mana pun berlaku.
-- **Ketersediaan Sumber**: Proyek sumber terbuka umumnya lebih disukai daripada alternatif bersumber tertutup yang setara.
-- **Lintas Platform**: Kami biasanya lebih memilih rekomendasi yang bersifat lintas platform, untuk menghindari penguncian penyedia.
-- **Pengembangan Aktif**: Alat yang kami rekomendasikan harus dikembangkan secara aktif, proyek yang tidak terpelihara akan dihapus dalam banyak kasus.
-- **Kegunaan**: Alat bantu harus dapat diakses oleh sebagian besar pengguna komputer, latar belakang yang terlalu teknis tidak diperlukan.
-- **Terdokumentasi**: Alat harus memiliki dokumentasi yang jelas dan ekstensif untuk digunakan.
-
## Pengajuan Diri Pengembang
Kami memiliki persyaratan ini terkait dengan pengembang yang ingin mengajukan proyek atau perangkat lunak mereka untuk dipertimbangkan.
diff --git a/i18n/id/index.md b/i18n/id/index.md
index 487dda14..ba2a34b9 100644
--- a/i18n/id/index.md
+++ b/i18n/id/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
-template: overrides/home.id.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Mencoba untuk melindungi semua data Anda dari semua orang setiap saat tidaklah p
==Proses mengidentifikasi ancaman dan mendefinisikan tindakan penanggulangan disebut **pemodelan ancaman**==, dan ini menjadi dasar dari setiap rencana keamanan dan privasi yang baik.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## Kami membutuhkan Anda! Berikut adalah cara untuk terlibat:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-Ini penting bagi situs web seperti Privacy Guides untuk selalu mendapatkan informasi yang terbaru. Kami membutuhkan audiens kami untuk mengawasi pembaruan perangkat lunak untuk aplikasi yang terdaftar di situs kami dan mengikuti berita terbaru tentang penyedia yang kami rekomendasikan. Memang sulit untuk mengimbangi kecepatan internet yang begitu cepat, tetapi kami berusaha sebaik mungkin. Jika Anda menemukan kesalahan, merasa bahwa sebuah penyedia tidak seharusnya terdaftar, melihat penyedia yang memenuhi syarat tidak ada, merasa plugin peramban tidak lagi menjadi pilihan terbaik, atau menemukan masalah lain, silakan beri tahu kami.
diff --git a/i18n/it/about/criteria.md b/i18n/it/about/criteria.md
index 14d56111..44129568 100644
--- a/i18n/it/about/criteria.md
+++ b/i18n/it/about/criteria.md
@@ -1,31 +1,20 @@
---
-title: Criteri generali
+title: General Criteria
---
-
-
Lavori In Corso
+Below are some general priorities we consider for all submissions to Privacy Guides. Ogni categoria avrà requisiti aggiuntivi per l'inclusione.
-La seguente pagina è in costruzione e non riflette i criteri completi dei nostri consigli, al momento. Discussione precedente su questo argomento: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Seguono alcune cose che devono applicarsi a tutti gli articoli di Privacy Guides. Ogni categoria avrà requisiti aggiuntivi per l'inclusione.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Disponibilità codice sorgente**: i progetti open source sono generalmente preferiti rispetto alle alternative proprietarie.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Sviluppo attivo**: Gli strumenti che consigliamo dovrebbero essere mantenuti attivamente; i progetti non mantenuti, in gran parte dei casi, saranno rimossi.
+- **Utilizzabilità**: gli strumenti dovrebbero essere accessibili a gran parte degli utenti, senza richiedere un background eccessivamente tecnico.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Comunicazione Finanziaria
Non guadagniamo denaro consigliando certi prodotti, non utilizziamo i link d'affiliazione e non offriamo considerazione speciale ai progetti donatori.
-## Linee Guida Generali
-
-Applichiamo queste priorità considerando nuovi consigli:
-
-- **Sicuro**: gli strumenti dovrebbero seguire le migliori pratiche di sicurezza, ove applicabile.
-- **Disponibilità codice sorgente**: i progetti open source sono generalmente preferiti rispetto alle alternative proprietarie.
-- **Multipiattaforma**: tipicamente, preferiamo che i prodotti consigliati siano multipiattaforma, per evitare il blocco del venditore.
-- **Sviluppo attivo**: Gli strumenti che consigliamo dovrebbero essere mantenuti attivamente; i progetti non mantenuti, in gran parte dei casi, saranno rimossi.
-- **Utilizzabilità**: gli strumenti dovrebbero essere accessibili a gran parte degli utenti, senza richiedere un background eccessivamente tecnico.
-- **Documentato**: Gli strumenti dovrebbero disporre di una documentazione chiara ed estesa per l'uso.
-
## Autocandidatura degli sviluppatori
Abbiamo questi requisiti per quanto riguarda gli sviluppatori che desiderano inviare i prropri progetti o software, perché siano presi in considerazione.
diff --git a/i18n/it/index.md b/i18n/it/index.md
index 8132e8b4..cc9903f6 100644
--- a/i18n/it/index.md
+++ b/i18n/it/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: La tua Risorsa Indipendente per Privacy e Sicurezza"
-template: overrides/home.it.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Provare a proteggere tutti i tuoi dati da chiunque e in ogni momento, è poco pr
==Questo procedimento d'identificazione e definizione delle contromisure è detto **Threat Modeling** (modello di minaccia)== e plasma le basi di ogni buon piano di sicurezza e privacy.
[:material-book-outline: Scopri il Modello di Minaccia](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## Abbiamo bisogno di te! Ecco come puoi partecipare:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-È importante che un sito web come Privacy Guides sia sempre aggiornato. Necessitiamo che il nostro pubblico tenga d'occhio gli aggiornamenti delle applicazioni elencate sul nostro sito e che segua le notizie sui fornitori che consigliamo. È difficile tenere il passo con il veloce ritmo di Internet, ma facciamo del nostro meglio. Se noti un errore, pensi che un fornitore non dovrebbe essere elencato, noti che un fornitore qualificato sia mancante, credi che un plugin per browser non sia più la scelta migliore, o scopri qualsiasi altro problema, ti preghiamo di farcelo sapere.
diff --git a/i18n/ja/about/criteria.md b/i18n/ja/about/criteria.md
index 5893ed37..d7a6af77 100644
--- a/i18n/ja/about/criteria.md
+++ b/i18n/ja/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## 一般的なガイドライン
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/ja/index.md b/i18n/ja/index.md
index d74a320e..72b1b7ed 100644
--- a/i18n/ja/index.md
+++ b/i18n/ja/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: プライバシーとセキュリティに関する独立したリソース"
-template: overrides/home.ja.html
+template: home.html
social:
cards_layout: Home
hide:
@@ -57,17 +57,3 @@ schema:
==脅威を特定して対策を定義するこのプロセスは**脅威モデリング**と呼ばれ==、優れたセキュリティとプライバシー計画の基礎となります。
[:material-book-outline: 脅威モデリングの詳細](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## あなたの力が必要です! 参加方法は以下の通りです:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-Privacy Guidesのようなウェブサイトは、常に最新の情報を提供することが重要です。 閲覧者は、私たちのサイトに掲載されたアプリケーションのソフトウェアアップデートを確認し、おすすめのプロバイダに関する最新情報を入手する必要があります。 インターネットの速さに追いつくのは難しいですが、私たちは最善を尽くします。 誤りを見つけた場合、不適切なプロバイダが掲載されていると感じた場合、適格なプロバイダが掲載されていない場合、ブラウザのプラグインが最適でないと感じた場合、またはその他の問題を発見した場合は、ご連絡ください。
diff --git a/i18n/ko/about/criteria.md b/i18n/ko/about/criteria.md
index 7983a9df..4ce2f3dc 100644
--- a/i18n/ko/about/criteria.md
+++ b/i18n/ko/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. 각 분야마다 별도의 추가적인 요구 사항이 존재할 수 있습니다.
-본 페이지는 현재 작업 중이며, 현시점에 존재하는 모든 권장 사항에 반영되는 전체 평가 기준이 아닙니다. 본 주제 관련 예전 토론: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-다음은 Privacy Guides에 등재된 모든 서비스 및 애플리케이션에 적용되는 몇 가지 사항입니다. 각 분야마다 별도의 추가적인 요구 사항이 존재할 수 있습니다.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **활발한 개발**: 권장 툴은 유지 관리가 활발하게 이루어져야 합니다. 개발이 중단된 프로젝트는 대부분 제거됩니다.
+- **사용성**: 툴은 대부분의 컴퓨터 사용자가 사용하는 데에 무리가 없어야 합니다. 지나치게 많은 기술적 배경 지식이 요구되어서는 안 됩니다.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## 재무 공시
Privacy Guides는 특정 제품을 추천함으로써 수익을 창출하지 않으며, 제휴 링크를 운영하지 않고, 프로젝트 후원자에게 특례를 적용하지도 않습니다.
-## 일반 가이드라인
-
-다음 사항들을 고려하여 권장 목록에 새로 추가합니다.
-
-- **보안**: 툴은 (해당되는 경우) 보안 모범 사례를 따라야 합니다.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **크로스 플랫폼**: 특정 벤더에 종속되는 것을 피하기 위해 일반적으로 크로스 플랫폼을 우선합니다.
-- **활발한 개발**: 권장 툴은 유지 관리가 활발하게 이루어져야 합니다. 개발이 중단된 프로젝트는 대부분 제거됩니다.
-- **사용성**: 툴은 대부분의 컴퓨터 사용자가 사용하는 데에 무리가 없어야 합니다. 지나치게 많은 기술적 배경 지식이 요구되어서는 안 됩니다.
-- **문서화**: 툴은 명확하고 폭넓은 안내 문서를 제공해야 합니다.
-
## 개발자 본인의 제안
개발자가 직접 자신의 프로젝트나 소프트웨어를 Privacy Guides에서 평가할 것을 제안하는 경우, 다음의 요구 사항을 준수해야 합니다.
diff --git a/i18n/ko/index.md b/i18n/ko/index.md
index df92b541..c506f888 100644
--- a/i18n/ko/index.md
+++ b/i18n/ko/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: 여러분의 개인 프라이버시, 보안 리소스"
-template: overrides/home.ko.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ schema:
==위협을 식별하고, 대응책을 정의하는 과정을 **위협 모델링**==이라 합니다. 훌륭한 보안, 개인정보 보호 계획이라면 언제나 그 근간에는 위협 모델링이 존재합니다.
[:material-book-outline: 위협 모델링 자세히 알아보기](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## 여러분의 도움이 필요합니다! 참여 방법은 다음과 같습니다:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-Privacy Guides와 같은 사이트는 언제나 최신 정보를 제공하는 것이 중요합니다. 사이트에서 안내된 프로그램의 업데이트를 주시하고, 추천한 제공 업체 관련 최신 뉴스를 따라가기 위해서는 여러분들의 집단 지성이 필요합니다. 인터넷의 빠른 변화를 따라잡기는 쉽지 않지만, 우린 최선을 다하고 있습니다. 사이트에서 오류를 발견하셨거나, 특정 제공 업체가 목록에서 제외되어야 한다고 생각하시거나, 혹은 적절한 제공 업체가 누락되었거나, 브라우저 플러그인이 더 이상 훌륭한 선택이 아니라고 생각하시는 등 각종 문제를 발견한 경우 알려주시기 바랍니다.
diff --git a/i18n/ku-IQ/about/criteria.md b/i18n/ku-IQ/about/criteria.md
index ccb7e87d..d7a6af77 100644
--- a/i18n/ku-IQ/about/criteria.md
+++ b/i18n/ku-IQ/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## General Guidelines
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/ku-IQ/index.md b/i18n/ku-IQ/index.md
index 4ae0a8d5..69c6beb7 100644
--- a/i18n/ku-IQ/index.md
+++ b/i18n/ku-IQ/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
-template: overrides/home.en.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Trying to protect all your data from everyone all the time is impractical, expen
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## We need you! Here's how to get involved:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
diff --git a/i18n/nl/about/criteria.md b/i18n/nl/about/criteria.md
index 7bd697fb..8cdd7bac 100644
--- a/i18n/nl/about/criteria.md
+++ b/i18n/nl/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Aan elke categorie worden aanvullende eisen gesteld.
-De volgende pagina is een werk in uitvoering, en geeft op dit moment niet de volledige criteria voor onze aanbevelingen weer. Eerdere discussie over dit onderwerp: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Hieronder staan enkele zaken die moeten gelden voor alle inzendingen aan Privacy Guides. Aan elke categorie worden aanvullende eisen gesteld.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Actieve ontwikkeling**: De hulpmiddelen die wij aanbevelen moeten actief worden ontwikkeld, niet-onderhouden projecten zullen in de meeste gevallen worden verwijderd.
+- **Bruikbaarheid**: Tools moeten toegankelijk zijn voor de meeste computergebruikers, een al te technische achtergrond is niet vereist.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financiële informatie
We verdienen geen geld met het aanbevelen van bepaalde producten, we gebruiken geen affiliate links en we geven geen speciale aandacht aan projectdonoren.
-## Algemene richtlijnen
-
-We passen deze prioriteiten toe bij het overwegen van nieuwe aanbevelingen:
-
-- **Secure**: Tools moeten de beste beveiligingspraktijken volgen, waar van toepassing.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We geven er meestal de voorkeur aan dat aanbevelingen cross-platform zijn, om lock-in van leveranciers te voorkomen.
-- **Actieve ontwikkeling**: De hulpmiddelen die wij aanbevelen moeten actief worden ontwikkeld, niet-onderhouden projecten zullen in de meeste gevallen worden verwijderd.
-- **Bruikbaarheid**: Tools moeten toegankelijk zijn voor de meeste computergebruikers, een al te technische achtergrond is niet vereist.
-- **Gedocumenteerd**: Tools moeten duidelijke en uitgebreide documentatie hebben voor gebruik.
-
## Zelfinzendingen van ontwikkelaars
Wij stellen deze eisen aan ontwikkelaars die hun project of software in overweging willen geven.
diff --git a/i18n/nl/index.md b/i18n/nl/index.md
index ec0d550c..d1a1b146 100644
--- a/i18n/nl/index.md
+++ b/i18n/nl/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Jouw onafhankelijke bron voor privacy en veiligheid"
-template: overrides/home.nl.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Het is onpraktisch, duur en vermoeiend om te proberen al jouw gegevens altijd te
==Dit proces van het identificeren van bedreigingen en het vaststellen van tegenmaatregelen wordt **bedreigingsmodellering** genoemd==, en het vormt de basis van elk goed beveiligings- en privacyplan.
[:material-book-outline: Meer informatie over Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## We hebben je nodig! Zo kan je betrokken raken:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-Het is belangrijk voor een website zoals Privacy Guides om altijd up-to-date te blijven. Ons publiek moet software-updates in de gaten houden voor de toepassingen die op onze site staan en recent nieuws volgen over aanbieders die wij aanbevelen. Het is moeilijk om het hoge tempo van het internet bij te houden, maar we doen ons best. Als je een fout ziet, denkt dat een provider niet in de lijst thuishoort, merkt dat een gekwalificeerde provider ontbreekt, denkt dat een browserplugin niet langer de beste keuze is, of een ander probleem ontdekt, laat het ons dan weten.
diff --git a/i18n/pl/about/criteria.md b/i18n/pl/about/criteria.md
index ccb7e87d..d7a6af77 100644
--- a/i18n/pl/about/criteria.md
+++ b/i18n/pl/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## General Guidelines
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/pl/index.md b/i18n/pl/index.md
index 943b1424..c76df9d3 100644
--- a/i18n/pl/index.md
+++ b/i18n/pl/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
-template: overrides/home.pl.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Trying to protect all your data from everyone all the time is impractical, expen
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## We need you! Here's how to get involved:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
diff --git a/i18n/pt-BR/about/criteria.md b/i18n/pt-BR/about/criteria.md
index ccb7e87d..d7a6af77 100644
--- a/i18n/pt-BR/about/criteria.md
+++ b/i18n/pt-BR/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## General Guidelines
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/pt-BR/index.md b/i18n/pt-BR/index.md
index d985cecc..05dac330 100644
--- a/i18n/pt-BR/index.md
+++ b/i18n/pt-BR/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Sua Fonte Independente de Privacidade e Segurança"
-template: overrides/home.pt-BR.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Tentar proteger os seus dados contra todos, o tempo todo, é impraticável, caro
==Este processo de identificação de ameaças e definição de contramedidas é chamado **modelagem de ameaça**==, e forma a base de todo bom plano de segurança e privacidade.
[:material-book-outline: Saiba mais sobre a Modelagem de Ameaças](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## Precisamos de você! Como se envolver:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-É importante que um site como o Privacy Guides esteja sempre atualizado. Precisamos que nosso público fique de olho nas atualizações de software para os aplicativos listados em nosso site e acompanhe as notícias recentes sobre os serviços que recomendamos. É difícil acompanhar o ritmo acelerado da internet, mas tentamos o nosso melhor. Se você detectar um erro, achar que um serviço não deve ser listado, notar que um serviço qualificado está faltando, acreditar que uma extensão de navegador não é mais a melhor escolha ou descobrir qualquer outro problema, informe-nos.
diff --git a/i18n/pt/about/criteria.md b/i18n/pt/about/criteria.md
index 7a582f38..69e4991f 100644
--- a/i18n/pt/about/criteria.md
+++ b/i18n/pt/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Cada uma das categorias tem requisitos adicionais para ser incluída.
-A página seguinte é um trabalho em curso e não reflete, neste momento, todos os critérios das nossas recomendações. Discussão anterior sobre este tópico: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Seguem-se alguns aspetos que devem ser aplicados a todas as contribuições para o Privacy Guides. Cada uma das categorias tem requisitos adicionais para ser incluída.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Desenvolvimento ativo**: as ferramentas que recomendamos devem ser desenvolvidas ativamente. Os projetos que não tenham uma manutenção regular serão removidos, na maioria dos casos.
+- **Usabilidade**: as ferramentas devem ser acessíveis à maioria dos utilizadores de computadores, não devendo ser necessária uma formação ou conhecimento demasiado técnicos.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Divulgação financeira
Não ganhamos dinheiro com a recomendação de determinados produtos, não utilizamos ligações de afiliados e não damos tratamento preferencial aos doadores do projeto.
-## Orientações gerais
-
-Aos considerarmos novas recomendações, aplicamos as seguintes prioridades:
-
-- **Segurança**: as ferramentas devem seguir as melhores práticas de segurança, sempre que aplicável.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Multiplataforma**: normalmente, preferimos que as recomendações sejam multiplataforma, para evitar a dependência do fornecedor.
-- **Desenvolvimento ativo**: as ferramentas que recomendamos devem ser desenvolvidas ativamente. Os projetos que não tenham uma manutenção regular serão removidos, na maioria dos casos.
-- **Usabilidade**: as ferramentas devem ser acessíveis à maioria dos utilizadores de computadores, não devendo ser necessária uma formação ou conhecimento demasiado técnicos.
-- **Documentado**: as ferramentas devem ter a sua utilização documentada de forma clara e extensa.
-
## Auto-submissões do desenvolvedor
Os programadores que pretendam submeter o seu projeto ou software para apreciação devem observar os seguintes requisitos.
diff --git a/i18n/pt/index.md b/i18n/pt/index.md
index 59712af1..db6ff175 100644
--- a/i18n/pt/index.md
+++ b/i18n/pt/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: o seu recurso independente de privacidade e segurança"
-template: overrides/home.pt.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Tentar proteger os seus dados de toda a gente, a toda a hora, é impraticável,
==Este processo de identificação de ameaças e definição de contramedidas é designado por **modelagem de ameaças**== e constitui a base de qualquer bom plano de segurança e privacidade.
[:material-book-outline: Saiba mais sobre a modelação de ameaças](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## Precisamos de si! Eis como participar:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-É importante que um site como o Privacy Guides esteja sempre atualizado. Precisamos que o nosso público esteja atento às atualizações de software para as aplicações listadas no nosso site e siga as notícias recentes sobre os fornecedores que recomendamos. É difícil acompanhar o ritmo acelerado da Internet, mas tentamos fazer o nosso melhor. Se detetar um erro, se achar que um fornecedor não deveria constar da lista, se notar que falta um fornecedor qualificado, se achar que um plugin do browser já não é a melhor opção ou se descobrir qualquer outro problema, informe-nos.
diff --git a/i18n/ru/about/criteria.md b/i18n/ru/about/criteria.md
index 92376687..ff752ab6 100644
--- a/i18n/ru/about/criteria.md
+++ b/i18n/ru/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Каждая категория будет иметь дополнительные требования для включения.
-Следующая страница незавершена и на данный момент не отражает всех критериев наших рекомендаций. Предыдущие обсуждения этой темы: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Ниже перечислены некоторые критерии, которые должны применяться ко всем материалам, представленным в Privacy Guides. Каждая категория будет иметь дополнительные требования для включения.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Активная разработка**: Инструменты, которые мы рекомендуем, должны активно разрабатываться, не поддерживаемые проекты в большинстве случаев будут удалены.
+- **Юзабилити**: Инструменты должны быть доступны большинству пользователей компьютеров, не должно требоваться чрезмерной технической подготовки.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Раскрытие финансовой информации
Мы не зарабатываем на рекомендации определенных продуктов, не используем партнерские ссылки и не предоставляем особых условий проектам, которые нас поддерживают.
-## Общие принципы
-
-Мы применяем эти приоритеты при рассмотрении новых рекомендаций:
-
-- **Безопасность**: Инструменты должны следовать лучшим практикам безопасности, где это применимо.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Кросс-платформенность**: Мы обычно предпочитаем, чтобы рекомендации были кросс-платформенными, чтобы избежать привязки к производителю.
-- **Активная разработка**: Инструменты, которые мы рекомендуем, должны активно разрабатываться, не поддерживаемые проекты в большинстве случаев будут удалены.
-- **Юзабилити**: Инструменты должны быть доступны большинству пользователей компьютеров, не должно требоваться чрезмерной технической подготовки.
-- **Документация**: Инструменты должны иметь четкую и обширную документацию по использованию.
-
## Самостоятельные заявки разработчиков
Мы предъявляем эти требования к разработчикам, которые хотят представить свой проект или программное обеспечение на рассмотрение.
diff --git a/i18n/ru/index.md b/i18n/ru/index.md
index 445bf568..4e903752 100644
--- a/i18n/ru/index.md
+++ b/i18n/ru/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Ваш независимый ресурс по конфиденциальности и безопасности"
-template: overrides/home.ru.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ schema:
==Процесс нахождения угроз и мер противодействия им называется **моделированием угроз**==, и он составляет основу каждого хорошего плана безопасности и приватности.
[:material-book-outline: Узнайте больше о моделировании угроз](basics/threat-modeling.md){class="md-button md-button--primary"}
-
----
-
-## Вы нужны нам! Вот как можно помочь нам:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-Такому сайту, как Privacy Guides, важно содержать наиболее актуальную информацию. Нам нужно, чтобы читатели следили за обновлениями программного обеспечения, перечисленного на сайте, и были в курсе новостей о сервисах, которые мы рекомендуем. Сложно угнаться за быстрым темпом развития интернета, но мы стараемся изо всех сил. Если вы встретите ошибку, посчитаете сервис недостойным упоминания на нашем сайте, заметите отсутствие хорошего сервиса, найдёте лучшую альтернативу браузерному расширению или обнаружите любую другую проблему, дайте нам знать.
diff --git a/i18n/sv/about/criteria.md b/i18n/sv/about/criteria.md
index 24ce6b56..de3e48dc 100644
--- a/i18n/sv/about/criteria.md
+++ b/i18n/sv/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Varje kategori kommer att ha ytterligare krav för inkludering.
-Följande sida är ett pågående arbete och återspeglar för närvarande inte alla kriterier för våra rekommendationer. Tidigare diskussion om detta ämne: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Nedan följer några saker som måste gälla för alla inlagor till integritetsguider. Varje kategori kommer att ha ytterligare krav för inkludering.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Aktiv utveckling**: De verktyg som vi rekommenderar bör vara aktivt utvecklade, ounderhållna projekt kommer i de flesta fall att tas bort.
+- **Användbarhet**: Verktyg bör vara tillgängliga för de flesta datoranvändare, en alltför teknisk bakgrund bör inte krävas.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Finansiell information
Vi tjänar inga pengar på att rekommendera vissa produkter, vi använder inga affiliate-länkar och vi ger inga särskilda överväganden till projektdonatorer.
-## Allmänna riktlinjer
-
-Vi tillämpar dessa prioriteringar när vi överväger nya rekommendationer:
-
-- **Säker**: Verktyg bör följa bästa säkerhetspraxis där det är tillämpligt.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Plattformsoberoende**: Vi föredrar vanligtvis att rekommendationerna är plattformsoberoende för att undvika leverantörslåsning.
-- **Aktiv utveckling**: De verktyg som vi rekommenderar bör vara aktivt utvecklade, ounderhållna projekt kommer i de flesta fall att tas bort.
-- **Användbarhet**: Verktyg bör vara tillgängliga för de flesta datoranvändare, en alltför teknisk bakgrund bör inte krävas.
-- **Dokumenterad**: Verktyg ska ha tydlig och omfattande dokumentation för användning.
-
## Utvecklarens självinlämningar
Vi har dessa krav på utvecklare som vill lämna in sitt projekt eller sin programvara för bedömning.
diff --git a/i18n/sv/index.md b/i18n/sv/index.md
index be8f0346..69c6beb7 100644
--- a/i18n/sv/index.md
+++ b/i18n/sv/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
-template: overrides/home.sv.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Trying to protect all your data from everyone all the time is impractical, expen
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## Vi behöver dig! Here's how to get involved:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
diff --git a/i18n/tr/about/criteria.md b/i18n/tr/about/criteria.md
index a3a52d56..910c9b0e 100644
--- a/i18n/tr/about/criteria.md
+++ b/i18n/tr/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Her kategorinin dahil edilmesi için ek gereklilikler olacaktır.
-Aşağıdaki sayfa üzerinde çalışılmaktadır ve şu anda tavsiyelerimize ilişkin kriterlerin tamamını yansıtmamaktadır. Bu konuyla ilgili geçmiş tartışma: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Aşağıda Privacy Guides'a yapılan tüm başvurular için geçerli olması gereken bazı hususlar yer almaktadır. Her kategorinin dahil edilmesi için ek gereklilikler olacaktır.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Aktif Gelişim**: Tavsiye ettiğimiz araçlar aktif olarak geliştirilmeli, çoğu durumda sürdürülmeyen projeler kaldırılacaktır.
+- **Kullanılabilirlik**: Araçlar çoğu bilgisayar kullanıcısı için erişilebilir olmalı, aşırı teknik bir altyapı gerekmemelidir.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Finansal Açıklama
Belirli ürünleri tavsiye ederek para kazanmıyoruz, bağlı kuruluş bağlantıları kullanmıyoruz ve proje bağışçılarına özel bir değerlendirme sağlamıyoruz.
-## Genel Talimatlar
-
-Yeni önerileri değerlendirirken bu öncelikleri uygularız:
-
-- **Güvenli**: Araçlar, uygun olan her yerde en iyi güvenlik uygulamalarını takip etmelidir.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Çapraz Platform**: Satıcı kilitlenmesini önlemek için genellikle önerilerin çapraz platform olmasını tercih ederiz.
-- **Aktif Gelişim**: Tavsiye ettiğimiz araçlar aktif olarak geliştirilmeli, çoğu durumda sürdürülmeyen projeler kaldırılacaktır.
-- **Kullanılabilirlik**: Araçlar çoğu bilgisayar kullanıcısı için erişilebilir olmalı, aşırı teknik bir altyapı gerekmemelidir.
-- **Belgelenmiş**: Araçlar, kullanım için açık ve kapsamlı belgelere sahip olmalıdır.
-
## Geliştiricinin Kendi Gönderimleri
Projelerini veya yazılımlarını değerlendirmeye göndermek isteyen geliştiriciler için bu gerekliliklere sahibiz.
diff --git a/i18n/tr/index.md b/i18n/tr/index.md
index 82cbe1bc..6640433e 100644
--- a/i18n/tr/index.md
+++ b/i18n/tr/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
-template: overrides/home.tr.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Tüm verilerinizi her zaman herkesten korumaya çalışmak pratik değildir, pah
==Tehditleri belirleme ve karşı önlemleri tanımlama sürecine **tehdit modelleme**== denir ve her iyi güvenlik ve gizlilik planının temelini oluşturur.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## Sana ihtiyacımız var! Nasıl dahil olabilirsiniz:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-Privacy Guides gibi bir web sitesinin her zaman güncel kalması önemlidir. Hedef kitlemizin sitemizde listelenen uygulamalar için yazılım güncellemelerini takip etmesine ve önerdiğimiz sağlayıcılarla ilgili son haberleri izlemesine ihtiyacımız var. İnternetin hızlı temposuna ayak uydurmak zor, ancak elimizden gelenin en iyisini yapmaya çalışıyoruz. Bir hata tespit ederseniz, bir sağlayıcının listelenmemesi gerektiğini düşünürseniz, nitelikli bir sağlayıcının eksik olduğunu fark ederseniz, bir tarayıcı eklentisinin artık en iyi seçenek olmadığını düşünürseniz veya başka bir sorunu ortaya çıkarırsanız, lütfen bize bildirin.
diff --git a/i18n/uk/about/criteria.md b/i18n/uk/about/criteria.md
index ccb7e87d..d7a6af77 100644
--- a/i18n/uk/about/criteria.md
+++ b/i18n/uk/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## General Guidelines
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/uk/index.md b/i18n/uk/index.md
index 8ddc567a..7f296221 100644
--- a/i18n/uk/index.md
+++ b/i18n/uk/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
-template: overrides/home.uk.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ schema:
==Цей процес виявлення загроз та визначення контрзаходів називається **моделюванням загроз**==, та він є основою кожного хорошого плану безпеки та конфіденційності.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## Ви нам потрібні! Ось як можна долучитися:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-Для таких сайтів, як Privacy Guides, важливо завжди залишатися актуальними. Ми хочемо, щоб наша аудиторія стежила за оновленнями програмного забезпечення для додатків, перелічених на нашому сайті, а також за останніми новинами про провайдерів, яких ми рекомендуємо. Важко встигати за швидким темпом інтернету, але ми намагаємося з усіх сил. Якщо ви помітили помилку, вважаєте, що провайдер не повинен бути в списку, помітили відсутність кваліфікованого провайдера, вважаєте, що плагін для браузера більше не є найкращим вибором, або виявили будь-яку іншу проблему, будь ласка, повідомте нам про це.
diff --git a/i18n/vi/about/criteria.md b/i18n/vi/about/criteria.md
index ccb7e87d..d7a6af77 100644
--- a/i18n/vi/about/criteria.md
+++ b/i18n/vi/about/criteria.md
@@ -2,30 +2,19 @@
title: General Criteria
---
-
-
Work in Progress
+Below are some general priorities we consider for all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
-The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-
-
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+- **Security**: Tools should follow security best-practices wherever applicable.
+- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
+- **Cross-Platform Availability**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
+- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
+- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
+- **Documentation**: Tools should have clear and extensive documentation for use.
## Financial Disclosure
We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
-## General Guidelines
-
-We apply these priorities when considering new recommendations:
-
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open-source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
-
## Developer Self-Submissions
We have these requirements in regard to developers which wish to submit their project or software for consideration.
diff --git a/i18n/vi/index.md b/i18n/vi/index.md
index 2b6aa11b..69c6beb7 100644
--- a/i18n/vi/index.md
+++ b/i18n/vi/index.md
@@ -1,6 +1,6 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
-template: overrides/home.vi.html
+template: home.html
social:
cards_layout: home
hide:
@@ -57,17 +57,3 @@ Trying to protect all your data from everyone all the time is impractical, expen
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
-
----
-
-## We need you! Here's how to get involved:
-
-[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" }
-[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
-[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
-[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
-[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
-[:material-information-outline:](about/index.md){ title="Learn more about us" }
-[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
-
-It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
diff --git a/i18n/zh-Hant/about/criteria.md b/i18n/zh-Hant/about/criteria.md
index 24db84b5..8785153e 100644
--- a/i18n/zh-Hant/about/criteria.md
+++ b/i18n/zh-Hant/about/criteria.md
@@ -1,31 +1,20 @@
---
-title: 通用標準
+title: General Criteria
---
-
-
施工中
+Below are some general priorities we consider for all submissions to Privacy Guides. 每個類別都會有額外的加入要求。
-以下頁面是一項正在進行的工作,並未反映我們目前的建議的全部標準。 過去關於此主題的討論: [#24](https://github.com/privacyguides/privacyguides.org/discussion/24)
-
-
+Below are some general priorities we consider for all submissions to Privacy Guides. 每个类别都会有额外的纳入要求。
-以下页面是一项正在进行的工作,目前并不反映我们建议的全部标准。 过去关于这个主题的讨论。[#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-
-