From f93b4fa39a2eb6d6f0f89d340ffe81a195c2eb2b Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Sun, 8 Sep 2024 02:45:15 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/ar/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/ar/android/distributions.md | 2 +- i18n/ar/frontends.md | 2 +- i18n/bn-IN/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/bn-IN/android/distributions.md | 2 +- i18n/bn-IN/frontends.md | 2 +- i18n/bn/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/bn/android/distributions.md | 2 +- i18n/bn/frontends.md | 2 +- i18n/cs/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/cs/android/distributions.md | 2 +- i18n/cs/frontends.md | 2 +- i18n/de/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/de/android/distributions.md | 2 +- i18n/de/frontends.md | 2 +- i18n/el/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/el/android/distributions.md | 2 +- i18n/el/frontends.md | 2 +- i18n/eo/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/eo/android/distributions.md | 2 +- i18n/eo/frontends.md | 2 +- i18n/es/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/es/android/distributions.md | 2 +- i18n/es/frontends.md | 2 +- i18n/fa/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/fa/android/distributions.md | 2 +- i18n/fa/frontends.md | 2 +- i18n/fr/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/fr/android/distributions.md | 2 +- i18n/fr/frontends.md | 2 +- i18n/he/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/he/android/distributions.md | 2 +- i18n/he/frontends.md | 2 +- i18n/hi/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/hi/android/distributions.md | 2 +- i18n/hi/frontends.md | 2 +- i18n/hu/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/hu/android/distributions.md | 2 +- i18n/hu/frontends.md | 2 +- i18n/id/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/id/android/distributions.md | 2 +- i18n/id/frontends.md | 2 +- i18n/it/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/it/android/distributions.md | 2 +- i18n/it/frontends.md | 2 +- i18n/ja/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/ja/android/distributions.md | 2 +- i18n/ja/frontends.md | 2 +- i18n/ko/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/ko/android/distributions.md | 2 +- i18n/ko/frontends.md | 2 +- i18n/ku-IQ/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/ku-IQ/android/distributions.md | 2 +- i18n/ku-IQ/frontends.md | 2 +- i18n/nl/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/nl/android/distributions.md | 2 +- i18n/nl/frontends.md | 2 +- i18n/pl/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/pl/android/distributions.md | 2 +- i18n/pl/frontends.md | 2 +- i18n/pt-BR/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/pt-BR/android/distributions.md | 2 +- i18n/pt-BR/frontends.md | 2 +- i18n/pt/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/pt/android/distributions.md | 2 +- i18n/pt/frontends.md | 2 +- i18n/ru/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/ru/android/distributions.md | 2 +- i18n/ru/frontends.md | 2 +- i18n/sv/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/sv/android/distributions.md | 2 +- i18n/sv/frontends.md | 2 +- i18n/tr/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/tr/android/distributions.md | 2 +- i18n/tr/frontends.md | 2 +- i18n/uk/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/uk/android/distributions.md | 2 +- i18n/uk/frontends.md | 2 +- i18n/vi/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/vi/android/distributions.md | 2 +- i18n/vi/frontends.md | 2 +- i18n/zh-Hant/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/zh-Hant/android/distributions.md | 2 +- i18n/zh-Hant/frontends.md | 2 +- i18n/zh/about/executive-policy.md | 27 ++++++++++++++++++++++++++ i18n/zh/android/distributions.md | 2 +- i18n/zh/frontends.md | 2 +- 87 files changed, 841 insertions(+), 58 deletions(-) create mode 100644 i18n/ar/about/executive-policy.md create mode 100644 i18n/bn-IN/about/executive-policy.md create mode 100644 i18n/bn/about/executive-policy.md create mode 100644 i18n/cs/about/executive-policy.md create mode 100644 i18n/de/about/executive-policy.md create mode 100644 i18n/el/about/executive-policy.md create mode 100644 i18n/eo/about/executive-policy.md create mode 100644 i18n/es/about/executive-policy.md create mode 100644 i18n/fa/about/executive-policy.md create mode 100644 i18n/fr/about/executive-policy.md create mode 100644 i18n/he/about/executive-policy.md create mode 100644 i18n/hi/about/executive-policy.md create mode 100644 i18n/hu/about/executive-policy.md create mode 100644 i18n/id/about/executive-policy.md create mode 100644 i18n/it/about/executive-policy.md create mode 100644 i18n/ja/about/executive-policy.md create mode 100644 i18n/ko/about/executive-policy.md create mode 100644 i18n/ku-IQ/about/executive-policy.md create mode 100644 i18n/nl/about/executive-policy.md create mode 100644 i18n/pl/about/executive-policy.md create mode 100644 i18n/pt-BR/about/executive-policy.md create mode 100644 i18n/pt/about/executive-policy.md create mode 100644 i18n/ru/about/executive-policy.md create mode 100644 i18n/sv/about/executive-policy.md create mode 100644 i18n/tr/about/executive-policy.md create mode 100644 i18n/uk/about/executive-policy.md create mode 100644 i18n/vi/about/executive-policy.md create mode 100644 i18n/zh-Hant/about/executive-policy.md create mode 100644 i18n/zh/about/executive-policy.md diff --git a/i18n/ar/about/executive-policy.md b/i18n/ar/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/ar/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/ar/android/distributions.md b/i18n/ar/android/distributions.md index e8026b37..2966a58c 100644 --- a/i18n/ar/android/distributions.md +++ b/i18n/ar/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/ar/frontends.md b/i18n/ar/frontends.md index 022c156f..c03c1138 100644 --- a/i18n/ar/frontends.md +++ b/i18n/ar/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/bn-IN/about/executive-policy.md b/i18n/bn-IN/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/bn-IN/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/bn-IN/android/distributions.md b/i18n/bn-IN/android/distributions.md index e8026b37..2966a58c 100644 --- a/i18n/bn-IN/android/distributions.md +++ b/i18n/bn-IN/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/bn-IN/frontends.md b/i18n/bn-IN/frontends.md index 022c156f..c03c1138 100644 --- a/i18n/bn-IN/frontends.md +++ b/i18n/bn-IN/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/bn/about/executive-policy.md b/i18n/bn/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/bn/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/bn/android/distributions.md b/i18n/bn/android/distributions.md index e8026b37..2966a58c 100644 --- a/i18n/bn/android/distributions.md +++ b/i18n/bn/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/bn/frontends.md b/i18n/bn/frontends.md index 022c156f..c03c1138 100644 --- a/i18n/bn/frontends.md +++ b/i18n/bn/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/cs/about/executive-policy.md b/i18n/cs/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/cs/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/cs/android/distributions.md b/i18n/cs/android/distributions.md index e8026b37..2966a58c 100644 --- a/i18n/cs/android/distributions.md +++ b/i18n/cs/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/cs/frontends.md b/i18n/cs/frontends.md index 022c156f..c03c1138 100644 --- a/i18n/cs/frontends.md +++ b/i18n/cs/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/de/about/executive-policy.md b/i18n/de/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/de/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/de/android/distributions.md b/i18n/de/android/distributions.md index 6e7c2b42..17e976de 100644 --- a/i18n/de/android/distributions.md +++ b/i18n/de/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/de/frontends.md b/i18n/de/frontends.md index 4d11baae..4f03d8cf 100644 --- a/i18n/de/frontends.md +++ b/i18n/de/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/el/about/executive-policy.md b/i18n/el/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/el/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/el/android/distributions.md b/i18n/el/android/distributions.md index e8026b37..2966a58c 100644 --- a/i18n/el/android/distributions.md +++ b/i18n/el/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/el/frontends.md b/i18n/el/frontends.md index dbfdf9b0..ea333c7b 100644 --- a/i18n/el/frontends.md +++ b/i18n/el/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Συμβουλή

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/eo/about/executive-policy.md b/i18n/eo/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/eo/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/eo/android/distributions.md b/i18n/eo/android/distributions.md index e8026b37..2966a58c 100644 --- a/i18n/eo/android/distributions.md +++ b/i18n/eo/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/eo/frontends.md b/i18n/eo/frontends.md index 022c156f..c03c1138 100644 --- a/i18n/eo/frontends.md +++ b/i18n/eo/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/es/about/executive-policy.md b/i18n/es/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/es/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/es/android/distributions.md b/i18n/es/android/distributions.md index 609c1e34..b77c3bb6 100644 --- a/i18n/es/android/distributions.md +++ b/i18n/es/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/es/frontends.md b/i18n/es/frontends.md index 14b2984c..f2b62938 100644 --- a/i18n/es/frontends.md +++ b/i18n/es/frontends.md @@ -270,7 +270,7 @@ Piped requiere JavaScript para funcionar y existen varias instancias públicas.

Consejo

-Piped es útil si desea utilizar [SponsorBlock](https://sponsor.ajay.app) sin instalar una extensión o acceder a contenidos restringidos por edad sin una cuenta. No proporciona privacidad por sí mismo y no se recomienda entrar con ninguna cuenta. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. No proporciona privacidad por sí mismo y no se recomienda entrar con ninguna cuenta.
diff --git a/i18n/fa/about/executive-policy.md b/i18n/fa/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/fa/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/fa/android/distributions.md b/i18n/fa/android/distributions.md index e8026b37..2966a58c 100644 --- a/i18n/fa/android/distributions.md +++ b/i18n/fa/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/fa/frontends.md b/i18n/fa/frontends.md index 022c156f..c03c1138 100644 --- a/i18n/fa/frontends.md +++ b/i18n/fa/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/fr/about/executive-policy.md b/i18n/fr/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/fr/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/fr/android/distributions.md b/i18n/fr/android/distributions.md index adf1586a..4f28cbbb 100644 --- a/i18n/fr/android/distributions.md +++ b/i18n/fr/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/fr/frontends.md b/i18n/fr/frontends.md index 923a8bec..a7afa1ce 100644 --- a/i18n/fr/frontends.md +++ b/i18n/fr/frontends.md @@ -270,7 +270,7 @@ Piped nécessite JavaScript pour fonctionner et il existe un certain nombre d'in

Tip

-Piped est utile si vous souhaitez utiliser [SponsorBlock](https://sponsor.ajay.app) sans installer d'extension ou pour accéder à des contenus limités en âge sans compte. Il n'assure pas à lui seul la protection de la vie privée, et nous ne recommandons pas de se connecter à des comptes. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. Il n'assure pas à lui seul la protection de la vie privée, et nous ne recommandons pas de se connecter à des comptes.
diff --git a/i18n/he/about/executive-policy.md b/i18n/he/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/he/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/he/android/distributions.md b/i18n/he/android/distributions.md index 9eb684e6..ea00f068 100644 --- a/i18n/he/android/distributions.md +++ b/i18n/he/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/he/frontends.md b/i18n/he/frontends.md index 48a5d7a4..d7556d6b 100644 --- a/i18n/he/frontends.md +++ b/i18n/he/frontends.md @@ -270,7 +270,7 @@ Piped דורש JavaScript כדי לתפקד ויש מספר מופעים ציב

Tip

-Piped שימושי אם ברצונך להשתמש ב - [SponsorBlock](https://sponsor.ajay.app) מבלי להתקין תוסף או לגשת לתוכן מוגבל לגיל ללא חשבון. הוא אינו מספק פרטיות בפני עצמו, ואנחנו לא ממליצים להיכנס לחשבונות כלשהם. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. הוא אינו מספק פרטיות בפני עצמו, ואנחנו לא ממליצים להיכנס לחשבונות כלשהם.
diff --git a/i18n/hi/about/executive-policy.md b/i18n/hi/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/hi/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/hi/android/distributions.md b/i18n/hi/android/distributions.md index e8026b37..2966a58c 100644 --- a/i18n/hi/android/distributions.md +++ b/i18n/hi/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/hi/frontends.md b/i18n/hi/frontends.md index 022c156f..c03c1138 100644 --- a/i18n/hi/frontends.md +++ b/i18n/hi/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/hu/about/executive-policy.md b/i18n/hu/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/hu/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/hu/android/distributions.md b/i18n/hu/android/distributions.md index 3c0ac05f..b72d0fb6 100644 --- a/i18n/hu/android/distributions.md +++ b/i18n/hu/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/hu/frontends.md b/i18n/hu/frontends.md index 458a6829..b866425f 100644 --- a/i18n/hu/frontends.md +++ b/i18n/hu/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/id/about/executive-policy.md b/i18n/id/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/id/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/id/android/distributions.md b/i18n/id/android/distributions.md index 0373200c..49fe0b07 100644 --- a/i18n/id/android/distributions.md +++ b/i18n/id/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/id/frontends.md b/i18n/id/frontends.md index a059fd86..e0e18017 100644 --- a/i18n/id/frontends.md +++ b/i18n/id/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/it/about/executive-policy.md b/i18n/it/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/it/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/it/android/distributions.md b/i18n/it/android/distributions.md index 55ec6f77..973e3259 100644 --- a/i18n/it/android/distributions.md +++ b/i18n/it/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/it/frontends.md b/i18n/it/frontends.md index 6a9668d9..572cb9fa 100644 --- a/i18n/it/frontends.md +++ b/i18n/it/frontends.md @@ -270,7 +270,7 @@ Piped richiede JavaScript per funzionare e dispone di numerose istanze pubbliche

Suggerimento

-Piped è utile se desideri utilizzare [SponsorBlock](https://sponsor.ajay.app) senza installare un'estensione o per accedere a contenuti con limiti d'età senza un profilo. Non fornisce di per sé la privacy, e sconsigliamo di accedere a qualsiasi profilo. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. Non fornisce di per sé la privacy, e sconsigliamo di accedere a qualsiasi profilo.
diff --git a/i18n/ja/about/executive-policy.md b/i18n/ja/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/ja/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/ja/android/distributions.md b/i18n/ja/android/distributions.md index fce67293..6d697040 100644 --- a/i18n/ja/android/distributions.md +++ b/i18n/ja/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/ja/frontends.md b/i18n/ja/frontends.md index 7d70ec31..097e7272 100644 --- a/i18n/ja/frontends.md +++ b/i18n/ja/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/ko/about/executive-policy.md b/i18n/ko/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/ko/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/ko/android/distributions.md b/i18n/ko/android/distributions.md index 3e2bee33..1fb13ea6 100644 --- a/i18n/ko/android/distributions.md +++ b/i18n/ko/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/ko/frontends.md b/i18n/ko/frontends.md index 4785517c..ae7a64cb 100644 --- a/i18n/ko/frontends.md +++ b/i18n/ko/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/ku-IQ/about/executive-policy.md b/i18n/ku-IQ/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/ku-IQ/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/ku-IQ/android/distributions.md b/i18n/ku-IQ/android/distributions.md index e8026b37..2966a58c 100644 --- a/i18n/ku-IQ/android/distributions.md +++ b/i18n/ku-IQ/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/ku-IQ/frontends.md b/i18n/ku-IQ/frontends.md index 022c156f..c03c1138 100644 --- a/i18n/ku-IQ/frontends.md +++ b/i18n/ku-IQ/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/nl/about/executive-policy.md b/i18n/nl/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/nl/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/nl/android/distributions.md b/i18n/nl/android/distributions.md index 03da6762..3712df03 100644 --- a/i18n/nl/android/distributions.md +++ b/i18n/nl/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/nl/frontends.md b/i18n/nl/frontends.md index 3a303e9d..7dd56e74 100644 --- a/i18n/nl/frontends.md +++ b/i18n/nl/frontends.md @@ -270,7 +270,7 @@ Piped vereist JavaScript om te kunnen functioneren en er zijn een aantal openbar

Tip

-Piped is handig als je [SponsorBlock](https://sponsor.ajay.app) wilt gebruiken zonder een extensie te installeren of als je zonder account toegang wilt krijgen tot inhoud met leeftijdsbeperkingen. Het biedt op zichzelf geen privacy, en wij raden niet aan in te loggen op een account. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. Het biedt op zichzelf geen privacy, en wij raden niet aan in te loggen op een account.
diff --git a/i18n/pl/about/executive-policy.md b/i18n/pl/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/pl/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/pl/android/distributions.md b/i18n/pl/android/distributions.md index e8026b37..2966a58c 100644 --- a/i18n/pl/android/distributions.md +++ b/i18n/pl/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/pl/frontends.md b/i18n/pl/frontends.md index 05d39cee..9fd2f3c3 100644 --- a/i18n/pl/frontends.md +++ b/i18n/pl/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/pt-BR/about/executive-policy.md b/i18n/pt-BR/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/pt-BR/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/pt-BR/android/distributions.md b/i18n/pt-BR/android/distributions.md index e8026b37..2966a58c 100644 --- a/i18n/pt-BR/android/distributions.md +++ b/i18n/pt-BR/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/pt-BR/frontends.md b/i18n/pt-BR/frontends.md index 022c156f..c03c1138 100644 --- a/i18n/pt-BR/frontends.md +++ b/i18n/pt-BR/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/pt/about/executive-policy.md b/i18n/pt/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/pt/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/pt/android/distributions.md b/i18n/pt/android/distributions.md index fa14c827..5e7067bd 100644 --- a/i18n/pt/android/distributions.md +++ b/i18n/pt/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/pt/frontends.md b/i18n/pt/frontends.md index 3dff09c7..e3d98005 100644 --- a/i18n/pt/frontends.md +++ b/i18n/pt/frontends.md @@ -270,7 +270,7 @@ O Piped requer JavaScript para funcionar e existem várias instâncias públicas

Tip

-O Piped é útil se pretender utilizar [SponsorBlock](https://sponsor.ajay.app) sem instalar uma extensão ou para aceder a conteúdos com restrições de idade sem uma conta. Não proporciona privacidade por si só e não recomendamos que inicie sessão em conta alguma. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. Não proporciona privacidade por si só e não recomendamos que inicie sessão em conta alguma.
diff --git a/i18n/ru/about/executive-policy.md b/i18n/ru/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/ru/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/ru/android/distributions.md b/i18n/ru/android/distributions.md index c1b77bbb..52299c47 100644 --- a/i18n/ru/android/distributions.md +++ b/i18n/ru/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/ru/frontends.md b/i18n/ru/frontends.md index 23e623b6..847fbe0b 100644 --- a/i18n/ru/frontends.md +++ b/i18n/ru/frontends.md @@ -270,7 +270,7 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [

Tip

-Piped полезен, если вы хотите использовать [SponsorBlock](https://sponsor.ajay.app) без установки расширения или получить доступ к контенту с возрастными ограничениями без учетной записи. Сам по себе он не обеспечивает конфиденциальности, и мы не рекомендуем входить в какие-либо учетные записи. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. Сам по себе он не обеспечивает конфиденциальности, и мы не рекомендуем входить в какие-либо учетные записи.
diff --git a/i18n/sv/about/executive-policy.md b/i18n/sv/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/sv/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/sv/android/distributions.md b/i18n/sv/android/distributions.md index 64eda479..23fd5044 100644 --- a/i18n/sv/android/distributions.md +++ b/i18n/sv/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/sv/frontends.md b/i18n/sv/frontends.md index ca139420..70358429 100644 --- a/i18n/sv/frontends.md +++ b/i18n/sv/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/tr/about/executive-policy.md b/i18n/tr/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/tr/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/tr/android/distributions.md b/i18n/tr/android/distributions.md index e8026b37..2966a58c 100644 --- a/i18n/tr/android/distributions.md +++ b/i18n/tr/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/tr/frontends.md b/i18n/tr/frontends.md index 022c156f..c03c1138 100644 --- a/i18n/tr/frontends.md +++ b/i18n/tr/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/uk/about/executive-policy.md b/i18n/uk/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/uk/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/uk/android/distributions.md b/i18n/uk/android/distributions.md index e8026b37..2966a58c 100644 --- a/i18n/uk/android/distributions.md +++ b/i18n/uk/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/uk/frontends.md b/i18n/uk/frontends.md index 022c156f..c03c1138 100644 --- a/i18n/uk/frontends.md +++ b/i18n/uk/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/vi/about/executive-policy.md b/i18n/vi/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/vi/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/vi/android/distributions.md b/i18n/vi/android/distributions.md index 29e9e025..08f2960b 100644 --- a/i18n/vi/android/distributions.md +++ b/i18n/vi/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/vi/frontends.md b/i18n/vi/frontends.md index 341f3145..c9a91b6c 100644 --- a/i18n/vi/frontends.md +++ b/i18n/vi/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
diff --git a/i18n/zh-Hant/about/executive-policy.md b/i18n/zh-Hant/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/zh-Hant/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/zh-Hant/android/distributions.md b/i18n/zh-Hant/android/distributions.md index 9db547f4..263ea608 100644 --- a/i18n/zh-Hant/android/distributions.md +++ b/i18n/zh-Hant/android/distributions.md @@ -68,7 +68,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/zh-Hant/frontends.md b/i18n/zh-Hant/frontends.md index 7f86635f..e9816b0c 100644 --- a/i18n/zh-Hant/frontends.md +++ b/i18n/zh-Hant/frontends.md @@ -270,7 +270,7 @@ Piped 需要JavaScript 才能運行,它有許多公共實例。

溫馨提示

-如果您想使用 [SponsorBlock](https://sponsor.ajay.app)但不安裝瀏覽器擴展或在不登入帳戶訪問有年齡限制的內容, Piped 非常有用。 它本身不提供隱私,故不建議登入任何帳戶。 +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. 它本身不提供隱私,故不建議登入任何帳戶。
diff --git a/i18n/zh/about/executive-policy.md b/i18n/zh/about/executive-policy.md new file mode 100644 index 00000000..0b94c570 --- /dev/null +++ b/i18n/zh/about/executive-policy.md @@ -0,0 +1,27 @@ +--- +title: Executive Policy +--- + +These are policies formally adopted by Privacy Guides' executive committee, and take precedence over all other statements expressed on this website. + +The key words **must**, **must not**, **required**, **shall**, **shall not**, **should**, **should not**, **recommended**, **may**, and **optional** are to be interpreted as described in [RFC 2119](https://datatracker.ietf.org/doc/html/rfc2119). + +## EP1: Freely-Provided Product Samples + +_Our policy on accepting product samples for review was adopted September 7, 2024._ + +\=== "Current Version (1)" + +``` +- Privacy Guides **shall not** proactively reach out to vendors asking for product samples or review accounts. +- Privacy Guides **shall not** accept test/review accounts for subscription cloud services. +- Privacy Guides **may** accept freely-provided product samples for one-time purchase software applications which run locally, given they don't require a subscription for continued operation. +- Privacy Guides **may** accept freely-provided samples of hardware products. + - Privacy Guides **may** accept a freely-provided subscription service associated with a hardware product, if such a subscription/license is necessary to use the product. +- Privacy Guides **must not** enter into an agreement pertaining to our editorial opinion with the vendor in order to receive a sample or publish a review. All freely-provided items must be strictly "no strings attached." + - We **may** agree to return the product to the vendor following the review if requested. + - We **may** agree to a reasonable NDA, provided it has a clear embargo date that is lifted no more than 6 months in the future where the NDA completely no longer applies. + - We **should not** enter into any other agreement with the vendor not described here. Potential agreements not described here **must** be approved by the executive committee beforehand. + +In all cases, whether we paid for the product independently or received a free sample from a vendor, how we obtained the product **must** be clearly documented in the background section of every article associated with the product. +``` diff --git a/i18n/zh/android/distributions.md b/i18n/zh/android/distributions.md index 04c06639..8ef42a87 100644 --- a/i18n/zh/android/distributions.md +++ b/i18n/zh/android/distributions.md @@ -66,7 +66,7 @@ GrapheneOS supports [sandboxed Google Play](https://grapheneos.org/usage#sandbox By default, Android makes many network connections to Google to perform DNS connectivity checks, to sync with current network time, to check your network connectivity, and for many other background tasks. GrapheneOS replaces these with connections to servers operated by GrapheneOS and subject to their privacy policy. This hides information like your IP address [from Google](../basics/common-threats.md#privacy-from-service-providers), but means it is trivial for an admin on your network or ISP to see you are making connections to `grapheneos.network`, `grapheneos.org`, etc. and deduce what operating system you are using. -GrapheneOS provides the option to switch back to connecting to Google's servers for many of these background connections if you prefer, but it is far more robust/foolproof to use a [trusted VPN](../vpn.md) and enable Android's native VPN [kill switch](../os/android-overview.md#vpn-killswitch) to hide information like this from adversaries on your network. +If you want to hide information like this from an adversary on your network or ISP, you **must** use a [trusted VPN](../vpn.md) in addition to changing the connectivity check setting to **Standard (Google)**. It can be found in :gear: **Settings** → **Network & internet** → **Internet connectivity checks**. This option allows you to connect to Google's servers for connectivity checks, which, alongside the usage of a VPN, helps you blend in with a larger pool of Android devices. ### DivestOS diff --git a/i18n/zh/frontends.md b/i18n/zh/frontends.md index 58822726..537d38e5 100644 --- a/i18n/zh/frontends.md +++ b/i18n/zh/frontends.md @@ -270,7 +270,7 @@ Piped requires JavaScript in order to function and there are a number of public

Tip

-Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts. +Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension. It does not provide privacy by itself, and we don’t recommend logging into any accounts.