mirror of
https://github.com/privacyguides/i18n.git
synced 2025-06-24 03:34:20 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@ -37,7 +37,7 @@ You should search for your information on these 8 sites first, and submit an opt
|
||||
- TruePeopleSearch
|
||||
- Whitepages
|
||||
|
||||
Once you have done this, it's best to wait a week or two for the requests to propagate to all their sites. Then, you can start to search and opt-out of any remaining sites you find. It can be a good idea to use tools like [Optery](#optery-free-paid)'s free reports or [Google's _Results about you_](#google-results-about-you-free) tool to help find any data that remains on the internet.
|
||||
Once you have done this, it's best to wait a week or two for the requests to propagate to all their sites. Then, you can start to search and opt-out of any remaining sites you find. It can be a good idea to use a web crawler like [Google's _Results about you_](#google-results-about-you-free) tool to help find any data that remains on the internet.
|
||||
|
||||
Otherwise, privacy journalist Yael Grauer has compiled an excellent list of data broker sites with direct links to their search tools and opt-out pages. You can take some time to go though each site to determine whether they have your information, and remove it:
|
||||
|
||||
@ -62,24 +62,6 @@ Some websites supported by EasyOptOuts are publicly searchable. In those cases E
|
||||
|
||||
Our testing indicates that EasyOptOuts provides the best value out of any data removal service we've tested, with a very affordable price and high effectiveness. We will publish a detailed review of EasyOptOuts on our blog in the near future and update this page when it is published. [Independent findings from Consumer Reports](https://discuss.privacyguides.net/t/consumer-reports-evaluating-people-search-site-removal-services/19948) also indicate that EasyOptOuts is one of the top performing data removal services.
|
||||
|
||||
## Optery <small>Free & Paid</small>
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
{ align=right }
|
||||
|
||||
**Optery** is a free scanning tool which will discover which people search sites have your personal information, provide you with a report of those sites, and link you directly to the self-service removal process to do manually. If you keep your account, the report will be updated quarterly. Optery also has paid plans available where they will submit opt-out requests automatically on your behalf.
|
||||
|
||||
[:octicons-home-16: Homepage](https://optery.com){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://optery.com/privacy-policy){ .card-link title="Privacy Policy" }
|
||||
[:octicons-info-16:](https://help.optery.com){ .card-link title=Documentation}
|
||||
|
||||
</div>
|
||||
|
||||
Optery's free scanning tool is an effective way to discover which data brokers have your information already, and their self-service dashboard allows you to easily submit opt-out requests manually.
|
||||
|
||||
We have not finished testing Optery's premium, _automatic_ opt-out plans, although initial results appear to be positive. [Independent findings from Consumer Reports](https://discuss.privacyguides.net/t/consumer-reports-evaluating-people-search-site-removal-services/19948) also indicate that Optery is one of the top performing data removal services. It necessarily takes at least a few months for us to evaluate a new data removal service, so check back here soon for our own test results. We will also publish a detailed review of Optery's full service on our blog when we have completed testing, and we will update this page accordingly.
|
||||
|
||||
## Google _Results About You_ <small>Free</small>
|
||||
|
||||
This method will require you to submit your personal information to Google for them to periodically monitor their search results for. Google claims to not use the information provided to this tool to "personalize your experiences" across other Google products.
|
||||
|
@ -20,6 +20,7 @@ schema:
|
||||
applicationCategory: Web Browser
|
||||
operatingSystem:
|
||||
- Android
|
||||
- iOS
|
||||
subjectOf:
|
||||
"@type": WebPage
|
||||
url: "./"
|
||||
@ -43,9 +44,7 @@ schema:
|
||||
|
||||
These are our currently recommended **mobile web browsers** and configurations for standard/non-anonymous internet browsing. If you need to browse the internet anonymously, you should use [Tor](tor.md) instead.
|
||||
|
||||
## Android
|
||||
|
||||
### Brave
|
||||
## Brave
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
@ -66,22 +65,23 @@ Brave is built upon the Chromium web browser project, so it should feel familiar
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser)
|
||||
- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175)
|
||||
|
||||
</details>
|
||||
|
||||
</div>
|
||||
|
||||
#### Recommended Brave Configuration
|
||||
### Recommended Brave Configuration
|
||||
|
||||
Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another.
|
||||
|
||||
These options can be found in :material-menu: → **Settings** → **Brave Shields & privacy**
|
||||
|
||||
##### Shields
|
||||
#### Shields
|
||||
|
||||
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit.
|
||||
|
||||
##### Brave shields global defaults
|
||||
#### Brave shields global defaults
|
||||
|
||||
Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following:
|
||||
|
||||
@ -108,15 +108,15 @@ Brave allows you to select additional content filters within the internal `brave
|
||||
|
||||
1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension.
|
||||
|
||||
##### Clear browsing data
|
||||
#### Clear browsing data
|
||||
|
||||
- [x] Select **Clear data on exit**
|
||||
|
||||
##### Social Media Blocking
|
||||
#### Social Media Blocking
|
||||
|
||||
- [ ] Uncheck all social media components
|
||||
|
||||
##### Other privacy settings
|
||||
#### Other privacy settings
|
||||
|
||||
<div class="annotate" markdown>
|
||||
|
||||
@ -134,17 +134,17 @@ Brave allows you to select additional content filters within the internal `brave
|
||||
1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services.
|
||||
2. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it.
|
||||
|
||||
#### Leo
|
||||
### Leo
|
||||
|
||||
These options can be found in :material-menu: → **Settings** → **Leo**
|
||||
|
||||
- [ ] Uncheck **Show autocomplete suggestions in address bar**
|
||||
|
||||
#### Brave Sync
|
||||
### Brave Sync
|
||||
|
||||
[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
||||
|
||||
### Mull
|
||||
## Mull (Android)
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
@ -177,7 +177,7 @@ Enable DivestOS's [F-Droid repository](https://divestos.org/fdroid/official) to
|
||||
|
||||
Mull enables many features upstreamed by the [Tor uplift project](https://wiki.mozilla.org/Security/Tor_Uplift) using preferences from [Arkenfox](desktop-browsers.md#arkenfox-advanced). Proprietary blobs are removed from Mozilla's code using the scripts developed for Fennec F-Droid.
|
||||
|
||||
#### Recommended Mull Configuration
|
||||
### Recommended Mull Configuration
|
||||
|
||||
We would suggest installing [uBlock Origin](browser-extensions.md#ublock-origin) as a content blocker if you want to block trackers within Mull.
|
||||
|
||||
@ -185,12 +185,10 @@ Mull comes with privacy protecting settings configured by default. You might con
|
||||
|
||||
Because Mull has more advanced and strict privacy protections enabled by default compared to most browsers, some websites may not load or work properly unless you adjust those settings. You can consult this [list of known issues and workarounds](https://divestos.org/pages/broken#mull) for advice on a potential fix if you do encounter a broken site. Adjusting a setting in order to fix a website could impact your privacy/security, so make sure you fully understand any instructions you follow.
|
||||
|
||||
## iOS
|
||||
## Safari (iOS)
|
||||
|
||||
On iOS, any app that can browse the web is [restricted](https://developer.apple.com/app-store/review/guidelines) to using an Apple-provided [WebKit framework](https://developer.apple.com/documentation/webkit), so there is little reason to use a third-party web browser.
|
||||
|
||||
### Safari
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
{ align=right }
|
||||
@ -205,17 +203,17 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple.
|
||||
|
||||
</div>
|
||||
|
||||
#### Recommended Safari Configuration
|
||||
### Recommended Safari Configuration
|
||||
|
||||
We would suggest installing [AdGuard](browser-extensions.md#adguard) as a content blocker if you want to block trackers within Safari.
|
||||
|
||||
The following privacy/security-related options can be found in the :gear: **Settings** app → **Safari**
|
||||
|
||||
##### Profiles
|
||||
#### Profiles
|
||||
|
||||
All of your cookies, history, and website data will be separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School.
|
||||
|
||||
##### Privacy & Security
|
||||
#### Privacy & Security
|
||||
|
||||
- [x] Enable **Prevent Cross-Site Tracking**
|
||||
|
||||
@ -225,19 +223,19 @@ All of your cookies, history, and website data will be separate for each profile
|
||||
|
||||
This setting allows you to lock your private tabs behind biometrics/PIN when not in use.
|
||||
|
||||
##### Advanced → Privacy
|
||||
#### Advanced → Privacy
|
||||
|
||||
The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you:
|
||||
|
||||
- [x] Select **All Browsing** or **Private Browsing**
|
||||
|
||||
##### Privacy Report
|
||||
#### Privacy Report
|
||||
|
||||
Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time.
|
||||
|
||||
Privacy Report is accessible via the Page Settings menu.
|
||||
|
||||
##### Privacy Preserving Ad Measurement
|
||||
#### Privacy Preserving Ad Measurement
|
||||
|
||||
- [ ] Disable **Privacy Preserving Ad Measurement**
|
||||
|
||||
@ -245,7 +243,7 @@ Ad click measurement has traditionally used tracking technology that infringes o
|
||||
|
||||
The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature.
|
||||
|
||||
##### Always-on Private Browsing
|
||||
#### Always-on Private Browsing
|
||||
|
||||
Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list.
|
||||
|
||||
@ -255,7 +253,7 @@ Safari's Private Browsing mode offers additional privacy protections. Private Br
|
||||
|
||||
Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience.
|
||||
|
||||
##### iCloud Sync
|
||||
#### iCloud Sync
|
||||
|
||||
Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww).
|
||||
|
||||
|
@ -99,7 +99,11 @@ Molly is updated every two weeks to include the latest features and bug fixes fr
|
||||
|
||||
Note that you are trusting multiple parties by using Molly, as you now need to trust the Signal team *and* the Molly team to deliver safe and timely updates.
|
||||
|
||||
There is a version of Molly called **Molly-FOSS** which removes proprietary code like the Google services used by both Signal and Molly, at the expense of some features like push notifications. There is also a version called [**Molly-UP**](https://github.com/mollyim/mollyim-android#unifiedpush) which is based on Molly-FOSS and adds back support for push notifications with UnifiedPush, but it requires self-hosting a program on a separate computer to function. All three versions of Molly provide the same security improvements.
|
||||
There is a version of Molly called **Molly-FOSS** which removes proprietary code like the Google services used by both Signal and Molly, at the expense of some features like battery-saving push notifications via Google Play Services.
|
||||
|
||||
There is also a version called [**Molly-UP**](https://github.com/mollyim/mollyim-android#unifiedpush) which is based on Molly-FOSS and adds support for push notifications with [UnifiedPush](https://unifiedpush.org/), an open source alternative to the push notifications provided by Google Play Services, but it requires running a separate program called [Mollysocket](https://github.com/mollyim/mollysocket) to function. Mollysocket can either be self-hosted on a separate computer or server (VPS), or alternatively a public Mollysocket instance can be used ([step-by-step tutorial, in German](https://www.kuketz-blog.de/messenger-wechsel-von-signal-zu-molly-unifiedpush-mollysocket-ntfy/)).
|
||||
|
||||
All three versions of Molly provide the same security improvements.
|
||||
|
||||
Molly and Molly-FOSS support [reproducible builds](https://github.com/mollyim/mollyim-android/tree/main/reproducible-builds), meaning it's possible to confirm that the compiled APKs match the source code.
|
||||
|
||||
|
@ -274,7 +274,6 @@ If you're looking for added **security**, you should always ensure you're connec
|
||||
<div class="grid cards" markdown>
|
||||
|
||||
- { .twemoji loading=lazy } [EasyOptOuts](data-broker-removals.md#easyoptouts-paid)
|
||||
- { .twemoji loading=lazy } [Optery](data-broker-removals.md#optery-free-paid)
|
||||
- { .twemoji loading=lazy } [Google *Results about you*](data-broker-removals.md#google-results-about-you-free)
|
||||
|
||||
</div>
|
||||
|
@ -122,13 +122,13 @@ All versions are signed using the same signature so they should be compatible wi
|
||||
|
||||
</div>
|
||||
|
||||
## Onion Browser
|
||||
## Onion Browser (iOS)
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
{ align=right }
|
||||
|
||||
**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser).
|
||||
**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:material-star-box: Read our latest Onion Browser review.](/articles/2024/09/18/onion-browser-review/)
|
||||
|
||||
[:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" }
|
||||
@ -145,4 +145,6 @@ All versions are signed using the same signature so they should be compatible wi
|
||||
|
||||
</div>
|
||||
|
||||
Onion Browser does not provide the same levels of privacy protections as Tor Browser does on desktop platforms. For casual use it is a perfectly fine way to access hidden services, but if you're concerned about being traced or monitored by advanced adversaries you should not rely on this as an anonymity tool.
|
||||
|
||||
[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people.
|
||||
|
Reference in New Issue
Block a user