1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-28 13:22:36 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2023-06-23 04:04:16 +00:00
parent 6e7f29576f
commit fdfd431152
48 changed files with 447 additions and 442 deletions

View File

@ -13,7 +13,7 @@ Le leggi sul pagamento in contanti variano a seconda del paese. Negli Stati Unit
Nonostante ciò, in genere è l'opzione migliore.
## Carte Prepagate & Carte Regalo
## Carte prepagate e carte regalo
È relativamente semplice acquistare carte regalo e carte prepagate presso la maggior parte dei negozi di alimentari e dei minimarket con denaro contante. Le carte regalo di solito non prevedono commissioni, ma spesso le hanno le carte prepagate, quindi prestate molta attenzione a queste commissioni e alle date di scadenza. Alcuni negozi potrebbero chiedere di vedere il tuo documento d'identità per ridurre le frodi.
@ -33,7 +33,7 @@ Quando si acquistano carte regalo online, di solito ti offrono un piccolo sconto
- [Negozi di carte regalo online :material-arrow-right-drop-circle:](../financial-services.md#gift-card-marketplaces)
## Carte Virtuali
## Carte virtuali
Un altro modo per proteggere le vostre informazioni dai commercianti online è quello di utilizzare carte virtuali, monouso, che nascondono le vostre informazioni bancarie o di fatturazione reali. Questo è utile soprattutto per proteggervi dalle violazioni dei dati dei commercianti, dal tracciamento meno sofisticato o dalla correlazione degli acquisti da parte delle agenzie di marketing e dal furto di dati online. **Non** ti aiutano a effettuare pagamenti totalmente anonimi, né a nascondere informazioni all'istituto bancario stesso. I normali istituti finanziari che offrono carte virtuali sono soggetti alle leggi "Know Your Customer" (KYC), il che significa che potrebbero richiedere un documento d'identità o altre informazioni d'identificazione.
@ -67,7 +67,7 @@ Le transazioni anonime su una blockchain pubblica sono *teoricamente* possibili,
==La scelta migliore è quella di evitare del tutto queste criptovalute e di scegliere una che garantisca la privacy di default.== l'utilizzo di altre criptovalute non rientra nell'ambito di questo sito ed è fortemente sconsigliato.
### Custodia portafoglio
### Custodia del portafoglio
Per le criptovalute esistono due forme di portafogli: portafogli custodial e portafogli noncustodial. I portafogli custodial sono gestiti da società/exchange centralizzati, dove la chiave privata del vostro portafoglio è detenuta da quella società e potete accedervi ovunque, in genere con i classici nome utente e una password. I portafogli non custodial sono portafogli in cui l'utente controlla e gestisce le chiavi private per accedervi. Supponendo che abbiate fatto il backup sicuro delle vostre chiavi private del portafoglio, i portafogli non custodial offrono una maggiore sicurezza e resistenza alla censura rispetto ai portafogli custodial, perché le vostre criptovalute non possono essere rubate o congelate da una società che ha in custodia le vostre chiavi private. La custodia delle chiavi è particolarmente importante quando si tratta di privacy coins: I portafogli custodial garantiscono alla società che li gestisce la possibilità di visualizzare le transazioni dell'utente, annullando i vantaggi di queste criptovalute in termini di privacy.

View File

@ -191,7 +191,7 @@ Altri suggerimenti per l'acquisto di un Google Pixel:
- Consulta le community di sconti online del proprio Paese. Possono segnalarti le vendite più convenienti.
- Google pubblica un elenco che mostra il [ciclo di supporto](https://support.google.com/nexus/answer/4457705) per ciascuno dei suoi dispositivi. Il prezzo giornaliero di un dispositivo può essere calcolato come: $\text{Prezzo} \over \text {Data fine vita}-\text{Data attuale}$, il che significa che più lungo è l'uso del dispositivo, minore è il costo giornaliero.
## App Generali
## App generali
In questo sito raccomandiamo un'ampia gamma di applicazioni per Android. Le app qui elencate sono esclusive di Android e migliorano o sostituiscono in modo specifico le principali funzionalità del sistema.

View File

@ -1,6 +1,6 @@
---
meta_title: "Perché l'email non è la scelta migliore per la privacy e la sicurezza - Privacy Guides"
title: Sicurezza Email
title: Sicurezza email
icon: material/email
description: La posta elettronica è intrinsecamente insicura sotto molti punti di vista e questi sono alcuni dei motivi per cui non è la nostra scelta principale per le comunicazioni sicure.
---
@ -9,7 +9,7 @@ L'e-mail è una forma di comunicazione insicura per impostazione predefinita. È
Di conseguenza, l'e-mail è utilizzata al meglio per ricevere e-mail transazionali (come notifiche, e-mail di verifica, reimpostazione della password e così via) dai servizi a cui ci si iscrive online, non per comunicare con gli altri.
## Panoramica sulla crittografia delle e-mail
## Panoramica sulla crittografia delle email
Il modo standard per aggiungere l'E2EE alle e-mail tra diversi provider di posta elettronica è l'utilizzo di OpenPGP. Esistono diverse implementazioni dello standard OpenPGP, le più comuni sono [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) e [OpenPGP.js](https://openpgpjs.org).
@ -27,7 +27,7 @@ Una smartcard (come una [ YubiKey](https://support.yubico.com/hc/en-us/articles/
È preferibile che la decodifica avvenga sulla smartcard, per evitare di esporre la chiave privata a un dispositivo compromesso.
## Panoramica sui metadati e-mail
## Panoramica sui metadati email
I metadati delle e-mail sono memorizzati [nell'header del messaggio](https://en.wikipedia.org/wiki/Email#Message_header) e comprendono alcune intestazioni visibili, come ad esempio: `A`, `Da`, `Cc`, `Data`, `Oggetto`. Ci sono anche una serie di intestazioni nascoste incluse da molti client e provider di posta elettronica che possono rivelare informazioni sul tuo account.

View File

@ -14,7 +14,7 @@ Immagina questo: registrate un account con la stessa email e la stessa password
Questo fenomeno è chiamato [credential stuffing](https://en.wikipedia.org/wiki/Credential_stuffing) ed è uno dei modi più comuni tramite cui i vostri account potrebbero venir compromessi da malintenzionati. Per evitare che ciò accada, assicurati di non riutilizzare mai le password.
### Usa password generate randomicamente
### Usa password generate casualmente
==Non dovresti **mai** affidarti a te stesso per creare un'ottima password.== Consigliamo di utilizzare [password generate randomicamente](#passwords) o [passphrase di tipo diceware](#diceware-passphrases) con un'entropia sufficiente a proteggere i tuoi account e dispositivi.
@ -36,21 +36,21 @@ Per quanto riguarda le password che non devi ricordare (come quelle memorizzate
Molti servizi impongono determinati criteri per quanto riguarda le password, tra cui una lunghezza minima o massima e l'eventuale utilizzo di caratteri speciali. Dovreste utilizzare il generatore di password integrato nel vostro gestore di password per creare password complesse e lunghe quanto la dimensione massima che il sito permette, includendo lettere maiuscole e minuscole, numeri e caratteri speciali.
Se hai bisogno di una password da memorizzare, ti consigliamo una [passfrase diceware](#diceware-passphrases).
Se hai bisogno di una password da memorizzare, ti consigliamo una [passphrase diceware](#diceware-passphrases).
### Passfrasi Diceware
### Passphrase Diceware
Il metodo Diceware serve per creare passfrasi facili da ricordare, ma difficili da indovinare.
Il metodo Diceware serve per creare passphrase facili da ricordare, ma difficili da indovinare.
Le passfrasi diceware sono un'ottima opzione quando è necessario memorizzare o inserire manualmente le proprie credenziali, come ad esempio la password principale del proprio gestore di password o la password di crittografia del proprio dispositivo.
Le passphrase diceware sono un'ottima opzione quando è necessario memorizzare o inserire manualmente le proprie credenziali, come ad esempio la password principale del proprio gestore di password o la password di crittografia del proprio dispositivo.
Un esempio di passfrase diceware è `viewable fastness reluctant squishy seventeen shown pencil`.
Un esempio di passphrase diceware è `viewable fastness reluctant squishy seventeen shown pencil`.
Per generare una passfrase diceware utilizzando un vero dado, segui questi passaggi:
Per generare una passphrase diceware utilizzando un vero dado, segui questi passaggi:
!!! note "Nota"
Queste istruzioni presuppongono l'utilizzo del [grande elenco di parole di EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) per generare la passfrase, che richiede cinque lanci di dadi per parola. Altri elenchi di parole potrebbero richiedere più o meno tiri per parola, e possono richiedere una quantità diversa di parole per ottenere la stessa entropia.
Queste istruzioni presuppongono l'utilizzo del [grande elenco di parole di EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) per generare la passphrase, che richiede cinque lanci di dadi per parola. Altri elenchi di parole potrebbero richiedere più o meno tiri per parola, e possono richiedere una quantità diversa di parole per ottenere la stessa entropia.
1. Lancia un dado a sei facce 5 volte, annota il numero ottenuto dopo ogni tiro.
@ -58,35 +58,35 @@ Per generare una passfrase diceware utilizzando un vero dado, segui questi passa
3. Troverai la parola `encrypt`. Annota questa parola.
4. Ripeti questa procedura finché la vostra passfrase non avrà il numero di parole necessario, che dovrete separare con uno spazio.
4. Ripeti questa procedura finché la vostra passphrase non avrà il numero di parole necessario, che dovrete separare con uno spazio.
!!! warning "Importante"
**Non** dovresti rigenerare le parole affinché non ottieni una combinazione di parole che ti attragga. Il processo dovrebbe essere effettuato randomicamente.
**Non** dovresti rigenerare le parole affinché non ottieni una combinazione di parole che ti attragga. Il processo dovrebbe essere totalmente casuale.
Se non hai un dado, o semplicemente non lo vuoi usare, puoi utilizzare il generatore di password del tuo gestore di password, molti di questi hanno l'opzione di poter generare passfrasi diceware oltre alle classiche password.
Se non hai un dado, o semplicemente non lo vuoi usare, puoi utilizzare il generatore di password del tuo gestore di password, molti di questi hanno l'opzione di poter generare passphrase diceware oltre alle classiche password.
Consigliamo di utilizzare il [grande elenco di parole di EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) per generare le tue passfrasi diceware, in quanto offre la stessa sicurezza dell'elenco originale, pur contenendo parole più facili da memorizzare. Esistono anche [altri elenchi di parole in lingue diverse](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), se non vuoi che la tua passfrase sia in Inglese.
Consigliamo di utilizzare il [grande elenco di parole di EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) per generare le tue passphrase diceware, in quanto offre la stessa sicurezza dell'elenco originale, pur contenendo parole più facili da memorizzare. Esistono anche [altri elenchi di parole in lingue diverse](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), se non vuoi che la tua passphrase sia in Inglese.
??? nota "Spiegazione dell'entropia e della forza delle passfrasi diceware"
??? nota "Spiegazione dell'entropia e della forza delle passphrase diceware"
Per dimostrare quanto siano forti le passfrasi diceware, useremo la già citata passfrase di sette parole (`viewable fastness reluctant squishy seventeen shown pencil`) e il [grande elenco di parole di EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) come esempio.
Per dimostrare quanto siano forti le passphrase diceware, useremo la già citata passphrase di sette parole (`viewable fastness reluctant squishy seventeen shown pencil`) e il [grande elenco di parole di EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) come esempio.
Un parametro per determinare la forza di una passfrase diceware è la sua entropia. L'entropia per parola in una passphrase diceware è calcolata come $\text{log}_2(\text{WordsInList})$ e l'entropia complessiva della passfrase è calcolata come $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$.
Un parametro per determinare la forza di una passphrase diceware è la sua entropia. L'entropia per parola in una passphrase diceware è calcolata come $\text{log}_2(\text{WordsInList})$ e l'entropia complessiva della passphrase è calcolata come $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$.
Pertanto, ogni parola del suddetto elenco produce ~12,9 bit di entropia ($\text{log}_2(7776)$), e una passfrase di sette parole derivata da esso ha ~90,47 bit di entropia ($\text{log}_2(7776^7)$).
Pertanto, ogni parola del suddetto elenco produce ~12,9 bit di entropia ($\text{log}_2(7776)$), e una passphrase di sette parole derivata da esso ha ~90,47 bit di entropia ($\text{log}_2(7776^7)$).
Il [grande elenco di parole di EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contiene 7776 parole uniche. Per calcolare la quantità di passfrasi possibili, tutto ciò che dobbiamo fare è $\text{WordsInList}^\text{WordsInPhrase}$, o nel nostro caso, $ 7776^7 $.
Il [grande elenco di parole di EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contiene 7776 parole uniche. Per calcolare la quantità di passphrase possibili, tutto ciò che dobbiamo fare è $\text{WordsInList}^\text{WordsInPhrase}$, o nel nostro caso, $ 7776^7 $.
Mettiamo tutto questo in prospettiva: Una passfrase di sette parole utilizzando il [Grande elenco di parole di EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) è una delle ~1.719.070.799.748.422.500.000.000.000.000 possibili passfrasi.
Mettiamo tutto questo in prospettiva: Una passphrase di sette parole utilizzando il [Grande elenco di parole di EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) è una delle ~1.719.070.799.748.422.500.000.000.000.000 possibili passphrase.
In media, è necessario tentare il 50% di tutte le combinazioni possibili per indovinare la tua passfrase. E con questo, anche se l'avversario è in grado di fare ~1.000.000.000.000 tentativi al secondo, gli ci vorrebbero comunque ~27.255.689 anni per indovinare la vostra passfrase. Questo vale solo se le seguenti cose sono vere:
In media, è necessario tentare il 50% di tutte le combinazioni possibili per indovinare la tua passfrase. E con questo, anche se l'avversario è in grado di fare ~1.000.000.000.000 tentativi al secondo, gli ci vorrebbero comunque ~27.255.689 anni per indovinare la tua passphrase. Questo vale solo se le seguenti cose sono vere:
- Il tuo avversario sa che hai usato il metodo diceware.
- Il tuo avversario conosce l'elenco specifico che hai utilizzato.
- Il tuo avversario sa quante parole contiene la tua passfrase.
- Il tuo avversario sa quante parole contiene la tua passphrase.
Ricapitolando, le passfrasi diceware sono la scelta migliore se hai bisogno di qualcosa che sia facile da ricordare *e* estremamente forte.
Ricapitolando, le passphrase diceware sono la scelta migliore se hai bisogno di qualcosa che sia facile da ricordare *ed* estremamente forte.
## Memorizzare le password
@ -94,7 +94,7 @@ Ricapitolando, le passfrasi diceware sono la scelta migliore se hai bisogno di q
Il miglior modo per memorizzare le proprie password è quello di utilizzare un gestore di password. Ti consentono di memorizzare le password in un singolo file o nel cloud e di proteggerle con un'unica password principale. In questo modo, dovrete ricordare solo un'unica password forte, che vi permetterà di accedere alle altre.
Ci sono molte opzioni valide tra cui scegliere, sia basata su cloud, sia locali. Scegli uno dei nostri gestori di password consigliati e usalo per impostare password forti per tutti i tuoi account. Consigliamo di proteggere il vostro gestore di password con una [passfrase diceware](#diceware-passphrases) composta da almeno 7 parole.
Ci sono molte opzioni valide tra cui scegliere, sia basata su cloud, sia locali. Scegli uno dei nostri gestori di password consigliati e usalo per impostare password forti per tutti i tuoi account. Consigliamo di proteggere il vostro gestore di password con una [password diceware](#diceware-passphrases) composta da almeno 7 parole.
[Elenco dei gestori di password consigliati](../passwords.md ""){.md-button}

View File

@ -1,6 +1,6 @@
---
meta_title: "Modellazione delle minacce: Il primo passo nel viaggio verso la privacy - Privacy Guides"
title: "Modellazione delle minacce"
meta_title: "Modelli di minaccia: Il primo passo nel viaggio verso la privacy - Privacy Guides"
title: "Modelli di minaccia"
icon: 'material/target-account'
description: Bilanciare sicurezza, privacy e usabilità è uno dei primi e più difficili obiettivi che dovrete affrontare nel vostro viaggio verso la privacy.
---
@ -15,7 +15,7 @@ Se si vogliono utilizzare gli strumenti **più** sicuri a disposizione, è neces
Concentrarsi sulle minacce che contano per te restringe il tuo pensiero sulla protezione di cui hai bisogno, in modo da poter scegliere gli strumenti giusti per il lavoro.
## Creare il Tuo Modello di Minaccia
## Creare il tuo modello di minaccia
Per identificare cosa potrebbe accadere alle cose che valorizzi e determinare da chi devi proteggerle, dovresti rispondere a queste cinque domande:

View File

@ -1,5 +1,5 @@
---
title: "Perchè la Privacy è importante"
title: "Perchè la privacy è importante"
icon: 'material/shield-account'
---
@ -7,7 +7,7 @@ Nell'era moderna dello sfruttamento dei dati digitali, la tua privacy non è mai
La privacy riguarda dopotutto le informazioni umane, e questo è importante poiché sappiamo che le informazioni umane conferiscono potere sugli esseri umani. Se ci interessa la nostra capacità di diventare esseri umani autentici, realizzati e liberi, dobbiamo preoccuparci innanzitutto delle regole che si applicano alle informazioni che ci riguardano. Gran parte della società moderna in cui viviamo si basa sulle **informazioni**. Quando fai acquisti online, leggi notizie, cerchi qualcosa, voti, cerchi indicazioni stradali o qualsiasi altra cosa, ti stai affidando a informazioni. Se viviamo in una società basata sulle informazioni, le nostre informazioni sono importanti e di conseguenza la privacy è importante.
## Che cos'è la Privacy?
## Che cos'è la privacy?
Molte persone confondono il significato di **privacy**, **sicurezza**, e **anonimato**. Vedrai persone criticare diversi prodotti definendoli "non privati", quando in realtà intendono che non forniscono l'anonimato, per esempio. In questo sito, trattiamo tutti e tre gli argomenti, ma è importante capire la differenza tra loro e quando ciascuno di essi entra in gioco.

View File

@ -355,7 +355,7 @@ Queste sono altre [liste di filtri](https://github.com/gorhill/uBlock/wiki/Dashb
- Blocca i cookie di terze parti con le impostazioni predefinite.
- Supporta il [partizionamento degli stati](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) per mitigare il tracciamento cross-site.[^1]
### Criteri Ottimali
### Criteri ottimali
KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). Ciò può comportare la perdita di dati se si importa questo file in un altro gestore di password.

View File

@ -1,7 +1,7 @@
---
title: "Resolver DNS"
icon: material/dns
description: Questi sono alcuni provider DNS cifrati a cui consigliamo di passare, per sostituire la configurazione predefinita del tuo ISP.
description: Questi sono alcuni fornitori DNS cifrati a cui consigliamo di passare, per sostituire la configurazione predefinita del tuo ISP.
cover: dns.png
---
@ -9,7 +9,7 @@ I DNS cifrati con server di terze parti dovrebbero essere utilizzati solo per ag
[Per saperne di più sui DNS :material-arrow-right-drop-circle:](advanced/dns-overview.md ""){.md-button}
## Provider consigliati
## Fornitori consigliati
| Fornitore DNS | Informativa sulla privacy | Protocolli | Logging | ECS | Filtraggio |
| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ------------------------------------------------------------- | ------------- | --------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------- |

View File

@ -7,7 +7,7 @@ cover: email-clients.png
Il nostro elenco di raccomandazioni contiene client di posta elettronica che supportano sia [OpenPGP](encryption.md#openpgp) che l'autenticazione forte come [Open Authorization (OAuth)](https://it.wikipedia.org/wiki/OAuth). OAuth consente di utilizzare l'[autenticazione a più fattori](basics/multi-factor-authentication.md) e di prevenire il furto di account.
??? warning "L'e-mail non fornisce la segretezza dell'inoltro"
??? warning "L'email non fornisce la segretezza dell'inoltro"
Quando si utilizza una tecnologia di crittografia end-to-end (E2EE) come OpenPGP, le e-mail avranno ancora [alcuni metadati](email.md#email-metadata-overview) non crittografati nell'intestazione dell'e-mail.
@ -230,7 +230,7 @@ Canary Mail è closed-source. Lo consigliamo a causa della scarsa scelta di clie
- Non deve raccogliere la telemetria o deve avere un modo semplice per disabilitare tutta la telemetria.
- Deve supportare la crittografia dei messaggi OpenPGP.
### Criteri Ottimali
### Criteri ottimali
I nostri criteri ottimali rappresentano ciò che vorremmo vedere dal progetto perfetto in questa categoria. Le nostre raccomandazioni potrebbero non includere tutte o alcune di queste funzionalità, ma quelle che le includono potrebbero avere una posizione più alta rispetto ad altre in questa pagina.

View File

@ -151,7 +151,7 @@ Tutti gli account vengono forniti con uno spazio di archiviazione cloud limitato
Mailbox.org dispone di una funzione di eredità digitale per tutti i piani. Puoi scegliere se vuoi che i dati siano trasmessi agli eredi, a condizione che ne facciano richiesta e forniscano il testamento. In alternativa, è possibile nominare una persona per nome e indirizzo.
## Altri provider
## Altri fornitori
Questi provider archiviano le tue e-mail con una crittografia a conoscenza zero, il che li rende ottime opzioni per mantenere sicure le tue e-mail archiviate. Tuttavia, non supportano standard di crittografia interoperabili per le comunicazioni E2EE tra provider.

View File

@ -55,7 +55,7 @@ Privacy.com fornisce di default alla vostra banca informazioni sui commercianti
- Consente la creazione di più carte che fungono da scudo tra il commerciante e le vostre finanze personali.
- Le carte non devono richiedere di fornire informazioni precise sull'indirizzo di fatturazione al commerciante.
## Negozi di Carte Regalo
## Negozi di carte regalo
Questi servizi ti consentono di acquistare carte regalo per una varietà di commercianti online con [criptovalute](cryptocurrency.md). Alcuni di questi servizi offrono limiti più elevati dopo aver verificato la propria identità, ma consentono la creazione di account utilizzando soltanto l'email. I limiti di base partono in genere dai 5.000-10.000 dollari al giorno per i conti base, mentre ci sono limiti significativamente più alti per i conti con l'identità verificata (se offerti).

View File

@ -44,7 +44,7 @@ Proprio come il diritto al matrimonio interrazziale, il suffragio della donna, l
Non bisogna confondere la privacy con la segretezza. Sappiamo cosa succede in bagno, ma chiudi lo stesso la porta. Questo perché vuoi la privacy, non la segretezza. **Tutti** hanno qualcosa da proteggere. La privacy è qualcosa che ci rende umani.
[:material-book-outline: Perchè la Privacy è importante](basics/why-privacy-matters.md){ class="md-button md-button--primary" }
[:material-book-outline: Perchè la privacy è importante](basics/why-privacy-matters.md){ class="md-button md-button--primary" }
## Cosa dovrei fare?
@ -52,9 +52,9 @@ Non bisogna confondere la privacy con la segretezza. Sappiamo cosa succede in ba
Cercare di proteggere tutti i dati da tutti, in ogni momento, è poco pratico, costoso ed estenuante. Ma non preoccuparti! La sicurezza è un processo e, pensando in anticipo, puoi mettere a punto un piano adatto a te. La sicurezza non riguarda solo gli strumenti utilizzati o il software scaricato. Piuttosto, inizia con la comprensione delle minacce personali che devi affrontare e di come puoi mitigarle.
==Questo processo d'identificazione delle minacce e di definizione delle contromisure si chiama **threat modeling**== e costituisce la base di ogni buon piano di sicurezza e privacy.
==Questo processo d'identificazione delle minacce e di definizione delle contromisure si chiama **modello di minaccia**== e costituisce la base di ogni buon piano di sicurezza e privacy.
[:material-book-outline: Per saperne di più sulla modellazione delle minacce](basics/threat-modeling.md){ class="md-button md-button--primary" }
[:material-book-outline: Per saperne di più sui modelli di minaccia](basics/threat-modeling.md){ class="md-button md-button--primary" }
---

View File

@ -1,5 +1,5 @@
---
title: "Appunti"
title: "Appunti e note"
icon: material/notebook-edit-outline
description: Queste app criptate per prendere appunti consentono di tenere traccia dei propri appunti senza darli a terze parti.
cover: notebooks.png
@ -41,7 +41,7 @@ Se stai attualmente utilizzando un'applicazione come Evernote, Google Keep o Mic
![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right }
**Notesnook** è un'applicazione gratuita & open-source per prendere appunti incentrata sulla privacy dell'utente & facile da utilizzare. È dotata di crittografia end-to-end su tutte le piattaforme con una potente sincronizzazione per prendere appunti mentre sei in giro. Puoi importare facilmente le tue note da Evernote, OneNote & molte altre applicazioni utilizzando il loro [importatore ufficiale] (https://importer.notesnook.com/).
**Notesnook** è un'applicazione gratuita & open-source per prendere appunti, incentrata sulla privacy dell'utente & facile da utilizzare. È dotata di crittografia end-to-end su tutte le piattaforme con una potente sincronizzazione per prendere appunti mentre sei in giro. Puoi importare facilmente le tue note da Evernote, OneNote & molte altre applicazioni utilizzando il loro [importatore ufficiale] (https://importer.notesnook.com/).
[:octicons-home-16: Pagina principale](https://notesnook.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Politica sulla Privacy" }
@ -109,7 +109,7 @@ Joplin non supporta la protezione con password/PIN per [l'applicazione stessa o
Cryptee offre 100 MB di spazio di archiviazione gratuito, con opzioni a pagamento se hai bisogno di più spazio. L'iscrizione non richiede l'email o altre informazioni d'identificazione personale.
## Note locali
## Note in locale
### Org-mode

View File

@ -1,14 +1,14 @@
---
title: Panoramica Android
icon: simple/android
description: Android è un sistema operativo open-source con forti protezioni per la sicurezza, il che lo rende la nostra scelta migliore per i telefoni.
description: Android è un sistema operativo open-source con forti protezioni per la sicurezza, il che lo rende la nostra scelta migliore per quanto riguarda i telefoni.
---
Android è un sistema operativo sicuro, dotato di [sandboxing delle app](https://source.android.com/security/app-sandbox), [Verified Boot](https://source.android.com/security/verifiedboot) (AVB) e di un robusto sistema di controllo delle [autorizzazioni](https://developer.android.com/guide/topics/permissions/overview).
## Scegliere una distribuzione di Android
Quando acquisti un telefono Android, il sistema operativo predefinito del dispositivo è spesso dotato di un'integrazione invasiva con applicazioni e servizi che non fanno parte di [Android Open-Source Project](https://source.android.com/). Un esempio è Google Play Services, che ha privilegi irrevocabili di accesso ai file, alla memoria dei contatti, ai registri delle chiamate, ai messaggi SMS, alla posizione, alla fotocamera, al microfono, agli identificatori hardware e così via. Queste applicazioni e servizi aumentano la superficie di attacco del dispositivo e sono all'origine di vari problemi di privacy con Android.
Quando acquisti un telefono Android, il sistema operativo predefinito del dispositivo è spesso dotato di un'integrazione invasiva con applicazioni e servizi che non fanno parte di [Android Open-Source Project](https://source.android.com/). Un esempio è Google Play Services, che ha privilegi irrevocabili di accesso ai file, ai contatti, ai registri delle chiamate, ai messaggi SMS, alla posizione, alla fotocamera, al microfono, agli identificatori hardware e così via. Queste applicazioni e servizi aumentano la superficie di attacco del dispositivo e sono all'origine di vari problemi di privacy con Android.
Questo problema potrebbe essere risolto utilizzando una distribuzione modificata di Android che non preveda un'integrazione così invasiva. Purtroppo, molte distribuzioni di Android personalizzate spesso violano il modello di sicurezza di Android, non supportando funzioni di sicurezza critiche come AVB, protezione rollback, aggiornamenti del firmware e così via. Alcune distribuzioni forniscono anche build [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) che espongono root tramite [ADB](https://developer.android.com/studio/command-line/adb) e richiedono politiche SELinux [più permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) per ospitare le funzionalità di debug, con conseguente ulteriore aumento della superficie di attacco e indebolimento del modello di sicurezza.
@ -77,13 +77,13 @@ Android 12:
Android 13:
- Un permesso per [l'accesso wifi nelle vicinanze](https://developer.android.com/about/versions/13/behavior-changes-13#nearby-wifi-devices-permission). Gli indirizzi MAC degli access point WiFi nelle vicinanze erano un modo molto diffuso per le app di tracciare la posizione dell'utente.
- Un'autorizzazione per [l'accesso wifi nelle vicinanze](https://developer.android.com/about/versions/13/behavior-changes-13#nearby-wifi-devices-permission). Gli indirizzi MAC degli access point WiFi nelle vicinanze erano un modo molto diffuso per le app di tracciare la posizione dell'utente.
- Più [autorizzazioni granulari per i media](https://developer.android.com/about/versions/13/behavior-changes-13#granular-media-permissions), il che significa che è possibile concedere l'accesso solo a immagini, video o file audio.
- L'uso in background dei sensori richiede ora l'autorizzazione [`BODY_SENSORS`](https://developer.android.com/about/versions/13/behavior-changes-13#body-sensors-background-permission).
Un'applicazione potrebbe richiedere un'autorizzazione per far funzionare una sua specifica funzione. Ad esempio, qualsiasi app in grado di scansionare codici QR richiederà l'autorizzazione della fotocamera. Alcune app possono richiedere più autorizzazioni di quelle necessarie.
[Exodus](https://exodus-privacy.eu.org/) può essere utile se devi confrontare app con scopi simili. Se un'applicazione richiede molte autorizzazioni e presenta molte pubblicità e analytics, probabilmente è un brutto segno. Consigliamo di esaminare i singoli tracker e di leggerne le descrizioni piuttosto che limitarsi a **contare il totale di** e assumere che tutte le voci elencate siano uguali.
[Exodus](https://exodus-privacy.eu.org/) può essere utile se devi confrontare app con scopi simili. Se un'applicazione richiede molte autorizzazioni e presenta molte pubblicità e analytics, probabilmente è un brutto segno. Consigliamo di esaminare i singoli tracker e di leggerne le descrizioni piuttosto che limitarsi a **contarne il totale** e supporre che tutte le voci elencate siano uguali.
!!! warning "Attenzione"

View File

@ -7,9 +7,9 @@ cover: productivity.png
La maggior parte delle suite per ufficio online non supportano la crittografia end-to-end, il che significa che il provider del cloud ha accesso a tutto ciò che fai. L'informativa sulla privacy potrebbe proteggere legalmente i tuoi diritti, ma non fornisce vincoli tecnici di accesso.
## Suite per ufficio
## Piattaforme di collaborazione
### LibreOffice
### Nextcloud
!!! recommendation
@ -37,7 +37,7 @@ La maggior parte delle suite per ufficio online non supportano la crittografia e
Sconsigliamo di utilizzare l'[App E2EE](https://apps.nextcloud.com/apps/end_to_end_encryption) per Nextcloud, in quanto potrebbe causare la perdita di dati; è altamente sperimentale e non soddisfa i criteri di qualità. Per questo motivo, non consigliamo i provider Nextcloud di terze parti.
### OnlyOffice
### CryptPad
!!! recommendation
@ -70,14 +70,14 @@ In generale, definiamo le piattaforme di collaborazione come suite complete che
#### Caso migliore
KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikipedia.org/wiki/Comma-separated_values). Ciò può comportare la perdita di dati se si importa questo file in un altro gestore di password.
I nostri criteri ottimali rappresentano ciò che vorremmo vedere dal progetto perfetto in questa categoria. Le nostre raccomandazioni potrebbero non includere tutte o alcune di queste funzionalità, ma quelle che le includono potrebbero avere una posizione più alta rispetto ad altre in questa pagina.
- Dovrebbe memorizzare i file in un filesystem convenzionale.
- Dovrebbe supportare l'autenticazione a più fattori TOTP o FIDO2, o i login con Passkey.
## Servizi di paste
## Suite per ufficio
### PrivateBin
### LibreOffice
!!! recommendation
@ -140,7 +140,7 @@ In generale, definiamo suite per ufficio le applicazioni che possono facilmente
- Deve supportare la modifica dei documenti, fogli di calcolo e presentazioni.
- Deve esportare i file in formati documenti standard.
## Servizi Paste
## Servizi di copia-incolla
### PrivateBin

View File

@ -1,5 +1,5 @@
---
title: "Firmware Router"
title: "Firmware per router"
icon: material/router-wireless
description: Questi sistemi operativi alternativi possono essere utilizzati per proteggere il router o l'access point del Wi-Fi.
cover: router.png

View File

@ -28,7 +28,7 @@ Se stai cercando ulteriore **privacy** dal tuo ISP, su una rete Wi-Fi pubblica o
[Panoramica dettagliata sulle VPN :material-arrow-right-drop-circle:](basics/vpn-overview.md ""){.md-button}
## Provider consigliati
## Fornitori consigliati
I fornitori che consigliamo utilizzano la crittografia, accettano Monero, supportano WireGuard & OpenVPN e applicano una politica di non registrazione del traffico. Leggi la nostra [lista completa di criteri](#criteria) per maggiori informazioni.

View File

@ -38,7 +38,7 @@ Voor optimale privacy, zorg ervoor dat je een noncustodial wallet gebruikt waar
Voor maximale privacy (zelfs met een niet-custodiale wallet) moet je jouw eigen Monero-knooppunt beheren. Als je een knooppunt van een ander gebruikt, krijgt hij enige informatie, zoals het IP-adres van waaruit je verbinding maakt, de tijdstempels waarmee je jouw portemonnee synchroniseert, en de transacties die je vanuit jouw portemonnee verstuurt (maar geen andere details over die transacties). Als alternatief kun je via Tor of i2p verbinding maken met het Monero-knooppunt van iemand anders.
In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Uit openbare berichten blijkt dat het Financial Crimes Enforcement Network van het Amerikaanse ministerie van Financiën [eind 2022 een licentie heeft verleend aan](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module".
In augustus 2021 kondigde CipherTrace [](https://ciphertrace.com/enhanced-monero-tracing/) verbeterde Monero-tracing-mogelijkheden aan voor overheidsinstanties. Uit openbare berichten blijkt dat het Financial Crimes Enforcement Network van het Amerikaanse ministerie van Financiën [eind 2022 een licentie heeft verleend aan](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module".
De privacy van de Monero-transactiegrafiek wordt beperkt door de relatief kleine ringhandtekeningen, vooral tegen gerichte aanvallen. </a> De privacyfuncties van Monero zijn ook

View File

@ -132,9 +132,9 @@ Op iOS is elke app die op het web kan surfen beperkt tot [](https://developer.ap
![Safari-logo](assets/img/browsers/safari.svg){ align=right }
**Safari** is de standaardbrowser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, and fingerprinting reduction by presenting a simplified version of the system configuration to websites so more devices look identical.
**Safari** is de standaardbrowser in iOS. Het bevat [privacy functies](https://support.apple.com/guide/iphone/browse-web-privately-iphb01fc3c85/15.0/ios/15.0) zoals [Intelligent Tracking Prevention](https://webkit. rg/blog/7675/intelligent-tracking-preventie/), Privacy report, geïsoleerd privébrowsing tabbladen, iCloud Private Relay, en vermindering van vingerafdrukken door een vereenvoudigde versie van de systeemconfiguratie aan websites voor te leggen, zodat meer apparaten er identiek uitzien.
Safari is restricted to Apple devices and is covered by [System Integrity Protection](https://support.apple.com/guide/security/system-integrity-protection-secb7ea06b49/web), a security feature which limits system programs and files to being read-only so they can't be tampered with by you or malware.
Safari is beperkt tot Apple-apparaten en wordt gedekt door [System Integrity Protection](https://support.apple.com/guide/security/system-integrity-protection-secb7ea06b49/web), een beveiligingsfunctie die systeemprogramma's en -bestanden beperkt tot read only (alleen lezen), zodat er niet door jou of malware mee geknoeid kan worden.
[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacybeleid" }

View File

@ -113,7 +113,7 @@ Cryptee biedt gratis 100MB opslag, met betaalde opties als je meer nodig hebt. A
### Org-mode
!!! recommendation
!!! aanbeveling
![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right }

View File

@ -107,7 +107,7 @@ Met gebruikersprofielen kun je beperkingen opleggen aan een specifiek profiel, z
[Werkprofielen](https://support.google.com/work/android/answer/6191949) zijn een andere manier om afzonderlijke apps te isoleren en kunnen handiger zijn dan afzonderlijke gebruikersprofielen.
A **device controller** app such as [Shelter](../android.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one.
Een **apparaatcontroller** zoals [Shelter](../android.md#shelter) is vereist, tenzij je CalyxOS gebruikt die er een bevat.
Het werkprofiel is afhankelijk van een apparaatcontroller om te kunnen functioneren. Functies zoals *File Shuttle* en *contact zoeken blokkeren* of enige vorm van isolatiefuncties moeten door de controller worden geïmplementeerd. Je moet de apparaatcontroller-app ook volledig vertrouwen, aangezien deze volledige toegang heeft tot jouw gegevens binnen het werkprofiel.

View File

@ -217,7 +217,7 @@ Proton VPN [adviseert](https://protonvpn.com/blog/wireguard/) het gebruik van Wi
#### :material-alert-outline:{ .pg-orange } Remote Port Forwarding
Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively.
Proton VPN ondersteunt momenteel alleen ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, met een leasetijd van 60 seconden. De Windows-app biedt hiervoor een gemakkelijk toegankelijke optie, terwijl je op andere besturingssystemen je eigen [NAT-PMP-client](https://protonvpn.com/support/port-forwarding-manual-setup/)moet draaien. Torrent toepassingen ondersteunen vaak de NAT-PMP volledig.
#### :material-check:{ .pg-green } Mobiele Clients

View File

@ -80,69 +80,69 @@ O [**DNS sobre TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) é outro méto
O [**DNS sobre HTTPS**](https://en.wikipedia.org/wiki/DNS_over_HTTPS), tal como definido em [RFC 8484](https://datatracker.ietf.org/doc/html/rfc8484), agrupa as consultas através do protocolo [HTTP/2](https://en.wikipedia.org/wiki/HTTP/2) e proporciona segurança com HTTPS. O suporte foi adicionado pela primeira vez em browsers como o Firefox 60 e o Chrome 83.
Native implementation of DoH showed up in iOS 14, macOS 11, Microsoft Windows, and Android 13 (however, it won't be enabled [by default](https://android-review.googlesource.com/c/platform/packages/modules/DnsResolver/+/1833144)). General Linux desktop support is waiting on the systemd [implementation](https://github.com/systemd/systemd/issues/8639) so [installing third-party software is still required](../dns.md#encrypted-dns-proxies).
A implementação nativa do DoH apareceu no iOS 14, macOS 11, Microsoft Windows e Android 13 (no entanto, não será ativado [por predefinição](https://android-review.googlesource.com/c/platform/packages/modules/DnsResolver/+/1833144)). O suporte geral do ambiente de trabalho Linux está à espera da [implementação](https://github.com/systemd/systemd/issues/8639) do systemd, pelo que [ainda é necessário instalar software de terceiros](../dns.md#encrypted-dns-proxies).
## O que é que uma festa exterior pode ver?
## O que é que uma pessoa de fora pode ver?
Neste exemplo vamos registar o que acontece quando fazemos um pedido DoH:
Neste exemplo, vamos registar o que acontece quando fazemos um pedido ao DoH:
1. Primeiro, iniciar `tshark`:
1. Primeiro, inicie o `tshark`:
```bash
tshark -w /tmp/dns_doh.pcap -f "tcp port https e host 1.1.1.1"
```
2. Segundo, faça um pedido com `curl`:
2. Em segundo lugar, faça um pedido com `curl`:
```bash
curl -vI --doh-url https://1.1.1.1/dns-query https://privacyguides.org
```
3. Após fazer o pedido, podemos parar a captura de pacotes com <kbd>CTRL</kbd> <kbd>C</kbd>.
3. Depois de fazer o pedido, podemos parar a captura de pacotes com <kbd>CTRL</kbd> + <kbd>C</kbd>.
4. Analisar os resultados em Wireshark:
4. Analise os resultados no Wireshark:
```bash
wireshark -r /tmp/dns_doh.pcap
```
Podemos ver o estabelecimento de conexão [e](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) e [aperto de mão TLS](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) que ocorre com qualquer conexão criptografada. Ao olhar para os pacotes de "dados de aplicação" que se seguem, nenhum deles contém o domínio que solicitamos ou o endereço IP devolvido.
Podemos ver o [estabelecimento da ligação](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) e o [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) que ocorre com qualquer ligação encriptada. Ao olhar para os pacotes de "dados da aplicação" que se seguem, verificamos que nenhum deles contém o domínio que pedimos ou o endereço IP devolvido.
## Porque **não deveria** Eu uso DNS encriptado?
## Por que razão **não devo** utilizar DNS encriptado?
In locations where there is internet filtering (or censorship), visiting forbidden resources may have its own consequences which you should consider in your [threat model](../basics/threat-modeling.md). Fazemos **não** sugerimos o uso de DNS criptografado para este fim. Use [Tor](https://torproject.org) or a [VPN](../vpn.md) instead. Se você estiver usando uma VPN, você deve usar os servidores DNS da sua VPN. Ao utilizar uma VPN, está a confiar-lhes toda a sua actividade na rede.
Em locais onde existe filtragem (ou censura) da Internet, visitar recursos proibidos pode ter as suas próprias consequências, que devem ser consideradas no [modelo de ameaças](../basics/threat-modeling.md). **Não** sugerimos a utilização de DNS encriptado para este fim. Em vez disso, utilize o [Tor](https://torproject.org) ou uma [VPN](../vpn.md). Se estiver a utilizar uma VPN, deve utilizar os servidores DNS da sua VPN. Ao utilizar uma VPN, está a confiar-lhes toda a sua atividade de rede.
Quando fazemos uma pesquisa DNS, geralmente é porque queremos aceder a um recurso. Abaixo, discutiremos alguns dos métodos que podem revelar as suas actividades de navegação mesmo quando utiliza DNS encriptado:
Quando fazemos uma pesquisa DNS, geralmente é porque queremos aceder a um recurso. Abaixo, falaremos de alguns dos métodos que podem revelar as suas atividades de navegação, mesmo quando utiliza DNS encriptado:
### Endereço IP
A maneira mais simples de determinar a atividade de navegação pode ser olhar para os endereços IP que seus dispositivos estão acessando. Por exemplo, se o observador sabe que `privacyguides.org` está em `198.98.54.105`, e o seu dispositivo está solicitando dados de `198.98.54.105`, há uma boa chance de você estar visitando os Guias de Privacidade.
A forma mais simples de determinar a sua atividade de navegação é verificar os endereços IP a que os seus dispositivos acedem. Por exemplo, se o observador sabe que `privacyguides.org` está em `198.98.54.105`, e o seu dispositivo está a pedir dados a `198.98.54.105`, há uma boa hipótese de estar a visitar o Privacy Guides.
Este método só é útil quando o endereço IP pertence a um servidor que só hospeda poucos sites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc.). Também não é muito útil se o servidor estiver hospedado atrás de um [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), o que é muito comum na Internet moderna.
Este método só é útil quando o endereço IP pertence a um servidor que aloja um número reduzido de sites. Também não é muito útil se o site estiver alojado numa plataforma partilhada (por exemplo, Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc.). Também não é muito útil se o servidor estiver hospedado atrás de um [proxy reverso](https://en.wikipedia.org/wiki/Reverse_proxy), o que é muito comum na Internet moderna.
### Indicação do nome do servidor (SNI)
A indicação do nome do servidor é normalmente usada quando um endereço IP hospeda muitos sites. Este pode ser um serviço como o Cloudflare, ou algum outro [ataque de negação de serviço](https://en.wikipedia.org/wiki/Denial-of-service_attack) protecção.
A indicação do nome do servidor é normalmente utilizada quando um endereço IP aloja uma grande quantidade de sites. Pode ser um serviço como o Cloudflare ou alguma outra proteção contra [ataques de negação de serviço (DoS)](https://en.wikipedia.org/wiki/Denial-of-service_attack).
1. Comece a capturar novamente com `tshark`. Adicionamos um filtro com nosso endereço IP para que você não capture muitos pacotes:
1. Comece a capturar novamente com o `tshark`. Adicionámos um filtro com o nosso endereço IP para que não capture muitos pacotes:
```bash
tshark -w /tmp/pg.pcap porto 443 e host 198.98.54.105
```
2. Depois visitamos [https://privacyguides.org](https://privacyguides.org).
2. Em seguida, visitamos [https://privacyguides.org](https://privacyguides.org).
3. Depois de visitar o site, nós o que parar a captura de pacotes com <kbd>CTRL</kbd> <kbd>C</kbd>.
3. Depois de visitar o site, paramos a captura de pacotes com <kbd>CTRL</kbd> + <kbd>C</kbd>.
4. A seguir queremos analisar os resultados:
4. Em seguida, analisamos os resultados:
```bash
wireshark -r /tmp/pg.pcap
```
Veremos o [estabelecimento de conexão](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment), seguido pelo [aperto de mão TLS](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) para o site Guias de Privacidade. Em redor da moldura 5. verás um "Olá Cliente".
Veremos o estabelecimento da ligação, seguida do TLS handshake para o site Privacy Guides. Algures na proximidade da frame 5. verá um "Client Hello".
5. Expandir o triângulo &#9656; ao lado de cada campo:
5. Expanda o triângulo &#9656; junto a cada campo:
```text
▸ Transport Layer Security
@ -152,58 +152,58 @@ A indicação do nome do servidor é normalmente usada quando um endereço IP ho
▸ Server Name Indication extension
```
6. Podemos ver o [Server Name Indication (SNI)](https://en.wikipedia.org/wiki/Server_Name_Indication) valor que revela o site que estamos visitando. O comando `tshark` pode dar-lhe o valor directamente para todos os pacotes que contenham um valor SNI:
6. Podemos ver o valor SNI que revela o site que estamos a visitar. O comando `tshark` pode fornecer-lhe o valor diretamente para todos os pacotes que contêm um valor SNI:
```bash
tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name
```
Isto significa que mesmo que estejamos usando servidores DNS "Encriptados", o domínio provavelmente será divulgado através do SNI. O protocolo [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) traz consigo [Cliente Encriptado Olá](https://blog.cloudflare.com/encrypted-client-hello/), o que evita este tipo de fuga.
Isto significa que mesmo que estejamos a utilizar servidores "DNS Encriptados", o domínio será provavelmente divulgado através do SNI. O protocolo [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) traz consigo o [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), que impede este tipo de fuga de informação.
Governos, em particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) e [Rússia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), ou já [começaram a bloquear](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) ou manifestaram o desejo de o fazer. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. Isto porque o [QUIC](https://en.wikipedia.org/wiki/QUIC) protocolo que faz parte do HTTP/3 requer que `ClientHello` também seja criptografado.
Os governos, em particular a [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) e a [Rússia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), já [começaram a bloquear](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) ou manifestaram o desejo de o fazer. Recentemente, a Rússia [começou a bloquear sites estrangeiros](https://github.com/net4people/bbs/issues/108) que utilizam a norma [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3). Isto deve-se ao facto do protocolo [QUIC](https://en.wikipedia.org/wiki/QUIC), que faz parte do HTTP/3, exigir que o `ClientHello` também seja encriptado.
### Protocolo de Status de Certificado Online (OCSP)
### Protocolo de estado dos certificados em linha (OCSP)
Outra forma do seu navegador poder divulgar suas atividades de navegação é com o [Online Certificate Status Protocol](https://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol). When visiting an HTTPS website, the browser might check to see if the website's [certificate](https://en.wikipedia.org/wiki/Public_key_certificate) has been revoked. Isto geralmente é feito através do protocolo [HTTP](https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol) , significando que é **não** encriptado.
Outra forma de o seu browser revelar as suas atividades de navegação é através do [protocolo de estado dos certificados online](https://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol). Ao visitar um site HTTPS, o browser pode verificar se o certificado [do site](https://en.wikipedia.org/wiki/Public_key_certificate) foi revogado. Isto é geralmente feito através do protocolo HTTP, o que significa que **não** é encriptado.
O pedido OCSP contém o certificado "[número de série](https://en.wikipedia.org/wiki/Public_key_certificate#Common_fields)", que é único. Ele é enviado ao "OCSP respondedor" para verificar o seu estado.
O pedido OCSP contém o "[número de série](https://en.wikipedia.org/wiki/Public_key_certificate#Common_fields)" do certificado, que é único. É enviado para o "OCSP responder" para verificar o seu estado.
Podemos simular o que um navegador faria usando o comando [`openssl`](https://en.wikipedia.org/wiki/OpenSSL) .
Podemos simular o que um browser faz ao usar o comando [`openssl`](https://en.wikipedia.org/wiki/OpenSSL).
1. Obtenha o certificado do servidor e use [`sed`](https://en.wikipedia.org/wiki/Sed) para manter apenas a parte importante e escrevê-la em um arquivo:
1. Obtenha o certificado do servidor e utilize [`sed`](https://en.wikipedia.org/wiki/Sed) para ficar apenas com a parte importante e escrevê-la num ficheiro:
```bash
openssl s_client -connect privacyguides.org:443 < /dev/null 2>&1 |
sed -n '/^-*BEGIN/,/^-*END/p' > /tmp/pg_server.cert
```
2. Obter o certificado intermediário. [Autoridades Certificadoras (AC)](https://en.wikipedia.org/wiki/Certificate_authority) normalmente não assinam um certificado diretamente; eles usam o que é conhecido como certificado "intermediário".
2. Obtenha o certificado intermédio. As [Autoridades de Certificação (CA)](https://en.wikipedia.org/wiki/Certificate_authority) normalmente não assinam um certificado diretamente; utilizam o que se conhece por certificado "intermédio".
```bash
openssl s_client -showcerts -connect privacyguides.org:443 < /dev/null 2>&1 |
sed -n '/^-*BEGIN/,/^-*END/p' > /tmp/pg_and_intermediate.cert
```
3. O primeiro certificado em `pg_and_intermediate.cert` é na verdade o certificado do servidor do passo 1. Podemos usar `sed` novamente para apagar até a primeira instância de TERMINAR:
3. O primeiro certificado em `pg_and_intermediate.cert` é, de facto, o certificado do servidor do passo 1. Podemos usar`sed` novamente para eliminar até à primeira instância de END:
```bash
sed -n '/^-*END CERTIFICATE-*$/!d;:a n;p;ba' \
/tmp/pg_and_intermediate.cert > /tmp/intermediate_chain.cert
```
4. Obtenha o OCSP respondedor para o certificado do servidor:
4. Obtenha o OCSP responder para o certificado do servidor:
```bash
openssl x509 -noout -ocsp_uri -in /tmp/pg_server.cert
```
O nosso certificado mostra o Lets Encrypt Responder ao certificado. Se quisermos ver todos os detalhes do certificado, podemos usar:
O nosso certificado mostra o Lets Encrypt certificate responder. Se quisermos ver todos os pormenores do certificado, podemos usar:
```bash
openssl x509 -text -noout -in /tmp/pg_server.cert
```
5. Comece a captura do pacote:
5. Inicie a captura de pacotes:
```bash
tshark -w /tmp/pg_ocsp.pcap -f "tcp port http
@ -224,7 +224,7 @@ Podemos simular o que um navegador faria usando o comando [`openssl`](https://en
wireshark -r /tmp/pg_ocsp.pcap
```
There will be two packets with the "OCSP" protocol: a "Request" and a "Response". Para o "Request" podemos ver o "serial number", expandindo o triângulo &#9656; ao lado de cada campo:
Haverá dois pacotes com o protocolo "OCSP": um "Pedido" e uma "Resposta". Para o "Pedido", podemos ver o "número de série" expandindo o triângulo &#9656; ao lado de cada campo:
```bash
▸ Online Certificate Status Protocol
@ -235,7 +235,7 @@ Podemos simular o que um navegador faria usando o comando [`openssl`](https://en
serialNumber
```
Para a "Resposta" também podemos ver o "número de série":
Para a "Resposta", também podemos ver o "número de série":
```bash
▸ Online Certificate Status Protocol
@ -248,59 +248,59 @@ Podemos simular o que um navegador faria usando o comando [`openssl`](https://en
serialNumber
```
8. Ou use `tshark` para filtrar os pacotes para o Número de Série:
8. Ou utilizar o `tshark` para filtrar os pacotes pelo número de série:
```bash
tshark -r /tmp/pg_ocsp.pcap -Tfields -Y ocsp.serialNumber -e ocsp.serialNumber
```
Se o observador da rede tiver o certificado público, que está disponível publicamente, ele pode fazer corresponder o número de série com esse certificado e, portanto, determinar o site que você está visitando a partir daí. O processo pode ser automatizado e pode associar endereços IP com números de série. Também é possível verificar [Certificate Transparency](https://en.wikipedia.org/wiki/Certificate_Transparency) logs para o número de série.
Se o observador da rede tiver o certificado público, que está disponível publicamente, pode fazer corresponder o número de série a esse certificado e, assim, determinar o site que está a visitar. O processo pode ser automatizado e pode associar endereços IP a números de série. Também é possível consultar os logs de [Certificate Transparency](https://en.wikipedia.org/wiki/Certificate_Transparency) para obter o número de série.
## Devo utilizar DNS encriptado?
Nós fizemos este fluxograma para descrever quando você *deve* usar DNS criptografado:
Criámos este fluxograma para descrever quando é que *deve* utilizar DNS encriptado:
``` mermaid
graph TB
Start[Start] --> anonymous{Trying to be<br> anonymous?}
anonymous--> | Yes | tor(Use Tor)
anonymous --> | No | censorship{Avoiding<br> censorship?}
censorship --> | Yes | vpnOrTor(Use<br> VPN ou Tor)
censorship --> | No | privacy{Want privacy<br> from ISP?}
privacidade --> | Yes | vpnOrTor
privacidade --> | No | obnoxious{ISP makes<br> obnoxious<br> redirecciona?}
obnóxio --> | Yes | encryptedDNS(Use<br> encrypted DNS<br> with 3rd party)
obnóxio --> | No | ispDNS{Does ISP support<br> encrypted DNS?}
ispDNS --> | Yes | useISP(Use<br> DNS encriptado<br> com ISP)
ispDNS --> | No | nothing(Do nothing)
Iniciar[Start] --> anonimato{Pretende <br> anonimato?}
anonimato--> | Sim | tor(Use o Tor)
anonimato --> | Não | censura{Evitar<br> censura?}
censura --> | Sim | vpnOrTor(Use<br> uma VPN ou o Tor)
censura --> | Não | privacidade{Quer privacidade em relação<br> ao ISP?}
privacidade --> | Sim | vpnOrTor
privacidade --> | Não | obnoxious{O ISP faz<br>redirecionamentos<br> desagradáveis?}
obnoxious --> | Sim | encryptedDNS(Use<br> DNS encriptado<br> com fornecedor terceiro)
obnoxious --> | Não | ispDNS{O ISP suporta<br> DNS encriptado?}
ispDNS --> | Sim | useISP(Use<br> DNS encriptado<br> com ISP)
ispDNS --> | Não | nothing(Não faça nada)
```
Encrypted DNS with a third-party should only be used to get around redirects and basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences or you're interested in a provider that does some rudimentary filtering.
O DNS encriptado com terceiros só deve ser utilizado para contornar redirecionamentos e o bloqueio básico do DNS [](https://en.wikipedia.org/wiki/DNS_blocking) quando tiver a certeza de que não haverá quaisquer consequências ou quando estiver interessado num fornecedor que efetue uma filtragem rudimentar.
[Lista de servidores DNS recomendados](../dns.md ""){.md-button}
## What is DNSSEC?
## O que é o DNSSEC?
[Domain Name System Security Extensions](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) (DNSSEC) is a feature of DNS that authenticates responses to domain name lookups. It does not provide privacy protections for those lookups, but rather prevents attackers from manipulating or poisoning the responses to DNS requests.
[Domain Name System Security Extensions](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) (DNSSEC) é uma funcionalidade do DNS que autentica as respostas às pesquisas de nomes de domínio. Não fornece proteções de privacidade para essas pesquisas, mas impede que os atacantes manipulem ou envenenem as respostas aos pedidos de DNS.
In other words, DNSSEC digitally signs data to help ensure its validity. In order to ensure a secure lookup, the signing occurs at every level in the DNS lookup process. As a result, all answers from DNS can be trusted.
Por outras palavras, o DNSSEC assina digitalmente os dados para ajudar a garantir a sua validade. Para garantir uma pesquisa segura, a assinatura ocorre em todos os níveis do processo de pesquisa do DNS. Como resultado, todas as respostas do DNS são fiáveis.
The DNSSEC signing process is similar to someone signing a legal document with a pen; that person signs with a unique signature that no one else can create, and a court expert can look at that signature and verify that the document was signed by that person. These digital signatures ensure that data has not been tampered with.
O processo de assinatura DNSSEC é semelhante ao de alguém que assina um documento legal com uma caneta; essa pessoa assina com uma assinatura única que mais ninguém pode criar, e um perito judicial pode olhar para essa assinatura e verificar que o documento foi assinado por essa pessoa. Estas assinaturas digitais garantem que os dados não foram adulterados.
DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`s authoritative nameserver.
O DNSSEC implementa uma política de assinatura digital hierárquica em todos os níveis do DNS. Por exemplo, no caso de uma pesquisa em `privacyguides.org`, um servidor DNS de raiz assinaria uma chave para o DNS de `.org`, e o DNS de `.org` assinaria então uma chave para o DNS autoritário `privacyguides.org`.
<small>Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/).</small>
<small>Adaptado de [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) da Google e [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) da Cloudflare, ambos licenciados sob [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/).</small>
## O que é a minimização do QNAME?
## O que é a minimização de QNAME?
Um QNAME é um "nome qualificado", por exemplo `privacyguides.org`. A minimização do QNAME reduz a quantidade de informação enviada do servidor DNS para o [servidor de nomes autorizado](https://en.wikipedia.org/wiki/Name_server#Authoritative_name_server).
Um QNAME é um "nome qualificado", por exemplo `privacyguides.org`. A minimização do QNAME reduz a quantidade de informações enviadas do servidor DNS para o servidor de nomes autoritário [](https://en.wikipedia.org/wiki/Name_server#Authoritative_name_server).
Em vez de enviar o domínio inteiro `privacyguides.org`, a minimização do QNAME significa que o servidor DNS irá pedir todos os registos que terminem em `.org`. Descrição técnica adicional é definida em [RFC 7816](https://datatracker.ietf.org/doc/html/rfc7816).
Em vez de enviar todo o domínio `privacyguides.org`, a minimização do QNAME significa que o servidor DNS irá pedir todos os registos que terminam em `.org`. Uma descrição técnica mais pormenorizada é definida em [RFC 7816](https://datatracker.ietf.org/doc/html/rfc7816).
## O que é a Sub-Rede do Cliente EDNS (ECS)?
## O que é a Sub-rede de Cliente EDNS (ECS)?
O [subrede do cliente EDNS](https://en.wikipedia.org/wiki/EDNS_Client_Subnet) é um método para um resolvedor DNS recursivo para especificar um [sub-rede](https://en.wikipedia.org/wiki/Subnetwork) para o [host ou cliente](https://en.wikipedia.org/wiki/Client_(computing)) que está fazendo a consulta DNS.
A sub-rede de cliente [EDNS](https://en.wikipedia.org/wiki/EDNS_Client_Subnet) é um método para um resolver DNS recursivo especificar uma [sub-rede](https://en.wikipedia.org/wiki/Subnetwork) para o [anfitrião ou cliente](https://en.wikipedia.org/wiki/Client_(computing)) que está a efetuar a consulta DNS.
O objectivo é "acelerar" a entrega de dados, dando ao cliente uma resposta que pertence a um servidor que lhes está próximo, tal como um [content delivery network (CDN)](https://en.wikipedia.org/wiki/Content_delivery_network), que são frequentemente utilizados em streaming de vídeo e em aplicações web JavaScript.
Destina-se a "acelerar" a entrega de dados, dando ao cliente uma resposta que pertence a um servidor que está perto dele, como uma rede de entrega de conteúdos [](https://en.wikipedia.org/wiki/Content_delivery_network), que são frequentemente utilizados em streaming de vídeo e no fornecimento de aplicações Web JavaScript.
Este recurso tem um custo de privacidade, pois informa ao servidor DNS algumas informações sobre a localização do cliente.
Esta funcionalidade tem um custo de privacidade, uma vez que fornece ao servidor DNS algumas informações sobre a localização do cliente.

View File

@ -1,15 +1,15 @@
---
title: Private Payments
title: Pagamentos privados
icon: material/hand-coin
---
There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.
Há uma razão para que os dados sobre os seus hábitos de compra sejam considerados o Santo Graal da segmentação de anúncios: as suas compras podem revelar um verdadeiro tesouro de dados sobre si. Infelizmente, o atual sistema financeiro, por conceção, é anti-privacidade, o que permite a bancos, a outras empresas e aos governos rastrear facilmente as suas transações. No entanto, há muitas opções para efetuar pagamentos com privacidade.
## Cash
## Dinheiro
For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable.
Durante séculos, o **dinheiro** foi a principal forma de pagamento. O numerário tem excelentes propriedades de privacidade na maioria dos casos, é amplamente aceite na maioria dos países e é **fungível**, o que significa que não é único e é completamente intercambiável.
Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payees name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations.
A legislação relativa ao pagamento em numerário varia de acordo com o país. Nos Estados Unidos, os pagamentos em dinheiro superiores a 10.000 dólares devem ser comunicados no IRS, através do [formulário 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). A empresa recetora é obrigada a verificar o nome, a morada, a profissão, a data de nascimento e o número de segurança social ou NIF do beneficiário (com algumas exceções). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations.
Despite this, its typically the best option.

View File

@ -282,90 +282,95 @@ Desative as extensões incluídas que não utilizar em **Extensões**
As funcionalidades Web3 do Brave podem potencialmente aumentar a impressão digital do seu browser e a superfície de ataque. A menos que utilize alguma destas funcionalidades, desative-as.
Defina **Default Ethereum wallet** para **Extensions (no fallback)** Defina **Default Solana wallet** para **Extensions (no fallback)** Defina **Method to resolve IPFS resources** para **Desativado**
Defina **Carteira Ethereum predefinida** para **Extensões (sem cópia de segurança)** Defina **Carteira Solana predefinida** para **Extensões (sem cópia de segurança)** Defina **Método para solucionar métodos IPFS** para **Desativada**
##### System
##### Sistema
<div class="annotate" markdown>
- [ ] Uncheck **Continue running apps when Brave is closed** to disable background apps (1)
- [ ] Desmarque a opção **Continuar a executar aplicações quando o Brave é fechado** para desativar as aplicações em segundo plano (1)
</div>
1. This option is not present on all platforms.
1. Esta opção não está presente em todas as plataformas.
#### Sincronizar
#### Sincronização
[A Sincronização do Brave](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) permite que os seus dados de navegação (histórico, marcadores, etc.) estejam acessíveis em todos os seus dispositivos, sem necessidade de uma conta, e protege-os com E2EE.
#### Brave Rewards and Wallet
#### Recompensar Brave
**Brave Rewards** lets you recieve Basic Attention Token (BAT) cryptocurrency for performing certain actions within Brave. It relies on a custodial account and KYC from a select number of providers. We do not recommend BAT as a [private cryptocurrency](cryptocurrency.md), nor do we recommend using a [custodial wallet](advanced/payments.md#other-coins-bitcoin-ethereum-etc), so we would discourage using this feature.
**Recompensas Brave** permite-lhe receber criptomoeda Basic Attention Token (BAT) pelo facto de realizar determinadas ações. Baseia-se numa conta de custódia e no KYC de um número selecionado de fornecedores. Não recomendamos a BAT como uma criptomoeda privada [](cryptocurrency.md), nem recomendamos a utilização de uma carteira de custódia [](advanced/payments.md#other-coins-bitcoin-ethereum-etc), pelo que desencorajamos a utilização desta funcionalidade.
**Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well.
**A Brave Wallet** funciona localmente no seu computador, mas não suporta quaisquer criptomoedas privadas, pelo que desencorajamos a utilização desta funcionalidade também.
## Recursos Adicionais
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality.
Em geral, recomendamos que a utilização de extensões seja reduzida ao mínimo; têm acesso privilegiado no seu browser, exigem que confie no programador, podem fazer com que se [destaque](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)e [enfraquecem](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) o isolamento do site. No entanto, o uBlock Origin pode ser útil se valorizar a funcionalidade de bloqueio de conteúdos.
### AdGuard para Safari
### uBlock Origin
!!! nota
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
Não recomendamos a instalação do ToS;DR como uma extensão do navegador.
![logótipo uBlock Origin](assets/img/browsers/ublock_origin.svg){ align=right }
A mesma informação é fornecida no site deles. downloads
O **uBlock Origin** é um popular bloqueador de conteúdos que pode ajudá-lo a bloquear anúncios, rastreadores e scripts de impressões digitais.
[:octicons-repo-16: Repositório](https://github.com/gorhill/uBlock#readme){ .md-button .md-button--primary }
[:octicons-eye-16:](https://github.com/gorhill/uBlock/wiki/Privacy-policy){ .card-link title="Política de Privacidade" }
[:octicons-info-16:](https://github.com/gorhill/uBlock/wiki){ .card-link title=Documentação}
[:octicons-code-16:](https://github.com/gorhill/uBlock){ .card-link title="Código-fonte" }
??? downloads
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/)
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm)
- [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak)
We suggest following the [developer's documentation](https://github.com/gorhill/uBlock/wiki/Blocking-mode) and picking one of the "modes". Additional filter lists can impact performance and [may increase attack surface](https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css).
Sugerimos que siga as instruções da documentação do programador [](https://github.com/gorhill/uBlock/wiki/Blocking-mode) e escolha um dos "modos". Listas de filtros adicionais podem afetar o desempenho e [podem aumentar a superfície de ataque](https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css).
##### Other lists
##### Outras listas
These are some other [filter lists](https://github.com/gorhill/uBlock/wiki/Dashboard:-Filter-lists) that you may want to consider adding:
Estas são algumas [listas de filtros](https://github.com/gorhill/uBlock/wiki/Dashboard:-Filter-lists) que pode querer considerar adicionar:
- [x] Check **Privacy** > **AdGuard URL Tracking Protection**
- Add [Actually Legitimate URL Shortener Tool](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt)
- [x] Selecione **Privacidade** > **Proteção de rastreio de URL do AdGuard**
- Adicionar [Ferramenta de encurtamento de URL realmente legítima](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt)
## Framadate
## Critérios
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
**Note que não estamos associados a nenhum dos projetos que recomendamos.** Para além dos [nossos critérios padrão](about/criteria.md), temos um conjunto claro de requisitos que nos permitem fornecer recomendações objetivas. Sugerimos que se familiarize com esta lista antes de optar por um projeto e que desenvolva a sua própria investigação para garantir que se trata da escolha certa para si.
!!! Considere o auto-hospedagem para mitigar esta ameaça.
!!! exemplo "Esta secção é nova"
![logo PrivateBin](/assets/img/productivity/privatebin.svg){ align=right }
**PrivateBin** é um pastebin online minimalista e de código aberto onde o servidor tem zero conhecimento de dados colados. Os dados são criptografados/descriptografados no navegador usando AES de 256 bits. Psono suporta compartilhamento seguro de senhas, arquivos, marcadores e e-mails.
Estamos a trabalhar no sentido de estabelecer critérios para cada secção do nosso site, o que pode originar alterações. Se tiver alguma dúvida sobre os critérios utilizados, por favor [pergunte no nosso fórum] (https://discuss.privacyguides.net/latest) e não parta do princípio de que algo foi excluído das nossas recomendações, caso não esteja listado aqui. São muitos os fatores considerados e discutidos quando recomendamos um projeto, e documentar cada um deles é um trabalho em curso.
### Requisitos mínimos
- O software deve ser de código aberto.
- Supports automatic updates.
- Receives engine updates in 0-1 days from upstream release.
- Available on Linux, macOS, and Windows.
- Any changes required to make the browser more privacy-respecting should not negatively impact user experience.
- Blocks third-party cookies by default.
- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^1]
- Software de código aberto.
- Atualizações automáticas.
- Atualizações do motor em 0-1 dias a partir do lançamento upstream.
- Disponível em Linux, macOS e Windows.
- Alterações necessárias para tornar o browser mais respeitador da privacidade não devem afetar negativamente a experiência do utilizador.
- Bloqueio de cookies de terceiros por defeito.
- [Particionamento de estado](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) para mitigar o rastreio entre sítios.[^1]
### Melhor caso
Os nossos melhores critérios representam o que gostaríamos de ver num projeto perfeito desta categoria. As nossas recomendações podem não incluir todas as funcionalidades, mas incluem as que, na nossa opinião, têm um impacto mais elevado.
Estes são os critérios que consideramos essenciais para um projeto perfeito nesta categoria. As nossas recomendações podem não incluir todas as funcionalidades, mas incluem as que, na nossa opinião, têm um impacto mais elevado.
- Includes built-in content blocking functionality.
- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)).
- Supports Progressive Web Apps.
PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates.
- Does not include add-on functionality (bloatware) that does not impact user privacy.
- Does not collect telemetry by default.
- Provides open-source sync server implementation.
- Defaults to a [private search engine](search-engines.md).
- Inclui a funcionalidade de bloqueio de conteúdos incorporada.
- Suporta a compartimentação de cookies (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)).
- Suporta Progressive Web Apps.
Os PWAs permitem-lhe instalar determinados sites como se fossem aplicações nativas no seu computador. Isto pode ter vantagens sobre a instalação de aplicações baseadas no Electron, uma vez que beneficia das atualizações de segurança regulares do seu browser.
- Não inclui funcionalidades adicionais (bloatware) que não afetam a privacidade do utilizador.
- Não recolhe telemetria por predefinição.
- Fornece implementação de código aberto de sincronização de servidor.
- Tem predefinido um motor de busca privado [](search-engines.md).
### Extension Criteria
### Critérios de extensão
- Must not replicate built-in browser or OS functionality.
- Must directly impact user privacy, i.e. must not simply provide information.
- Não deve replicar a funcionalidade incorporada do browser ou do sistema operativo.
- Deve ter um impacto direto na privacidade do utilizador, ou seja, não deve limitar-se a fornecer informações.
[^1]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/).
[^1]: A implementação do Brave é pormenorizada em [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/).

View File

@ -14,45 +14,45 @@ description: Обзор нескольких сетевых архитектур
Централизованные мессенджеры - это те, где все участники находятся на одном сервере или сети серверов, контролируемых одной организацией.
Some self-hosted messengers allow you to set up your own server. Self-hosting can provide additional privacy guarantees, such as no usage logs or limited access to metadata (data about who is talking to whom). Self-hosted centralized messengers are isolated and everyone must be on the same server to communicate.
Некоторые мессенджеры позволяют настроить собственный сервер. Самостоятельный хостинг может обеспечить дополнительные гарантии конфиденциальности, например, отсутствие журналов использования или ограниченный доступ к метаданным (данные о том, кто с кем разговаривает). При самостоятельном хостинге централизованные мессенджеры изолированы, и для общения все должны находиться на одном сервере.
**Преимущества:**
- New features and changes can be implemented more quickly.
- Easier to get started with and to find contacts.
- Most mature and stable features ecosystems, as they are easier to program in a centralized software.
- Privacy issues may be reduced when you trust a server that you're self-hosting.
- Новые функции и изменения могут быть внедрены быстрее.
- Легче начать использовать и найти контакты.
- Наиболее проверенные и стабильные функции экосистем, так как их легче программировать в централизованном программном обеспечении.
- Проблемы конфиденциальности могут быть снижены, если вы доверяете серверу, который вы самостоятельно размещаете.
**Недостатки:**
- Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like:
- Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage.
- Poor or no documentation for third-party developers.
- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on.
- Self-hosting requires effort and knowledge of how to set up a service.
- Может включать [ограниченный контроль или доступ](https://drewdevault.com/2018/08/08/Signal.html). Это может включать в себя такие вещи, как:
- [Запрет на подключение сторонних клиентов](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) к централизованной сети, которые могли бы обеспечить большую персонализацию или лучший опыт. Это часто написано в условиях использования.
- Плохая документация для сторонних разработчиков или ее полное отсутствие.
- [Руководство](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), политика конфиденциальности и операции сервиса могут легко измениться, если его контролирует одна организация, что впоследствии может поставить сервис под угрозу.
- Самостоятельный хостинг требует усилий и знаний о том, как настроить сервис.
## Федеративные сети
![Схема федеративных сетей](../assets/img/layout/network-decentralized.svg){ align=left }
Federated messengers use multiple, independent, decentralized servers that are able to talk to each other (email is one example of a federated service). Federation allows system administrators to control their own server and still be a part of the larger communications network.
Федеративные мессенджеры используют несколько независимых, децентрализованных серверов, которые могут общаться друг с другом (электронная почта является одним из примеров федеративной службы). Федерация позволяет системным администраторам контролировать свой собственный сервер и при этом быть частью большой коммуникационной сети.
When self-hosted, members of a federated server can discover and communicate with members of other servers, although some servers may choose to remain private by being non-federated (e.g., work team server).
При самостоятельном хостинге участники объединенного сервера могут обнаруживать и общаться с участниками других серверов, хотя некоторые серверы могут предпочесть оставаться закрытыми, не будучи объединенными (например, сервер рабочей группы).
**Преимущества:**
- Allows for greater control over your own data when running your own server.
- Allows you to choose whom to trust your data with by choosing between multiple "public" servers.
- Often allows for third-party clients which can provide a more native, customized, or accessible experience.
- Server software can be verified that it matches public source code, assuming you have access to the server or you trust the person who does (e.g., a family member).
- Позволяют получить больший контроль над собственными данными при работе на собственном сервере.
- Позволяют выбирать, кому доверять свои данные, выбирая между несколькими "публичными" серверами.
- Часто позволяют использовать сторонние клиенты, которые могут обеспечить более нативный, индивидуальный или доступный опыт использования.
- Программное обеспечение сервера может быть проверено на соответствие публичному исходному коду, если у вас есть доступ к серверу или вы доверяете человеку, который имеет такой доступ (например, члену семьи).
**Недостатки:**
- Adding new features is more complex because these features need to be standardized and tested to ensure they work with all servers on the network.
- Due to the previous point, features can be lacking, or incomplete or working in unexpected ways compared to centralized platforms, such as message relay when offline or message deletion.
- Some metadata may be available (e.g., information like "who is talking to whom," but not actual message content if E2EE is used).
- Federated servers generally require trusting your server's administrator. They may be a hobbyist or otherwise not a "security professional," and may not serve standard documents like a privacy policy or terms of service detailing how your data is used.
- Server administrators sometimes choose to block other servers, which are a source of unmoderated abuse or break general rules of accepted behavior. This will hinder your ability to communicate with members of those servers.
- Добавление новых функций является более сложной задачей, поскольку эти функции должны быть стандартизированы и протестированы для обеспечения их работы со всеми серверами в сети.
- В связи с предыдущим пунктом, функции могут отсутствовать, быть неполными или работать неожиданным образом по сравнению с централизованными платформами, например, передача сообщений в автономном режиме или удаление сообщений.
- Некоторые метаданные могут быть доступны (например, информация "кто с кем разговаривает", но не фактическое содержание сообщения, если используется E2EE).
- Федеративные серверы обычно требуют доверия к администратору вашего сервера. Они могут быть любителями или не являться "профессионалами в области безопасности" и не предоставлять стандартные документы, такие как политика конфиденциальности или условия предоставления услуг, в которых подробно описывается, как используются ваши данные.
- Администраторы серверов иногда решают блокировать другие серверы, которые являются источником немодерируемых злоупотреблений или нарушают правила общепринятого поведения. Это затруднит вашу возможность общаться с участниками этих серверов.
## Пиринговые сети

View File

@ -3,35 +3,35 @@ title: Приватные платежи
icon: material/hand-coin
---
There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.
Не зря данные о ваших покупательских привычках считаются святым Граалем таргетинга рекламы: ваши покупки могут рассказать очень много информации о вас. К сожалению, существующая финансовая система по своей сути является антиприватной, позволяя банкам, другим компаниям и правительствам легко отслеживать транзакции. Тем не менее у вас есть много вариантов осуществлять платежи приватно.
## Наличные
For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable.
На протяжении веков **наличные** функционировали как основная форма приватных платежей. Наличные деньги обладают превосходными свойствами конфиденциальности в большинстве случаев, широко принимаются в большинстве стран и являются **заменяемыми**, то есть они не уникальны и полностью взаимозаменяемы.
Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payees name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations.
Законы об оплате наличными варьируются в зависимости от страны. В США требуется специальное раскрытие информации о денежных платежах свыше 10 000 долларов США в налоговую службу по [форме 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). Получающее предприятие обязано проверить имя, адрес, род занятий, дату рождения и номер социального страхования или другой ИНН получателя (за некоторыми исключениями). Более низкие лимиты без удостоверения личности, такие как $3 000 или меньше, существуют для обмена и передачи денег. Наличные деньги также содержат серийные номера. Они почти никогда не отслеживаются продавцами, но могут быть использованы правоохранительными органами в расследованиях.
Despite this, its typically the best option.
Несмотря на это, как правило, это лучший вариант.
## Предоплаченные карты & Подарочные карты
Its relatively simple to purchase gift cards and prepaid cards at most grocery stores and convenience stores with cash. Gift cards usually dont have a fee, though prepaid cards often do, so pay close attention to these fees and expiry dates. Some stores may ask to see your ID at checkout to reduce fraud.
Приобрести подарочные карты и предоплаченные карты в большинстве продуктовых и круглосуточных магазинов за наличные деньги довольно просто. Подарочные карты обычно не имеют комиссии, предоплаченные - часто имеют, поэтому обращайте пристальное внимание на эти комиссии и сроки действия. Некоторые магазины могут попросить предъявить удостоверение личности на кассе для предотвращения мошенничества.
Gift cards usually have limits of up to $200 per card, but some offer limits of up to $2,000 per card. Prepaid cards (eg: from Visa or Mastercard) usually have limits of up to $1,000 per card.
Подарочные карты обычно имеют лимит до 200 долларов, но некоторые предлагают лимиты до 2 000 долларов. Предоплаченные карты (например, от Visa или Mastercard) обычно имеют лимит до 1000 долларов США.
Gift cards have the downside of being subject to merchant policies, which can have terrible terms and restrictions. For example, some merchants dont accept payment in gift cards exclusively, or they may cancel the value of the card if they consider you to be a high-risk user. Once you have merchant credit, the merchant has a strong degree of control over this credit.
Подарочные карты имеют тот недостаток, что они зависят от политики продавцов, которые могут иметь ужасные условия использования и ограничения. Например, некоторые продавцы не принимают оплату исключительно подарочными картами или могут аннулировать стоимость карты, если сочтут вас пользователем с высоким уровнем риска. Получив торговый кредит, торговое предприятие имеет сильную степень контроля над этим кредитом.
Prepaid cards dont allow cash withdrawals from ATMs or “peer-to-peer” payments in Venmo and similar apps.
Предоплаченные карты не позволяют снимать наличные в банкоматах или осуществлять "peer-to-peer" платежи в Venmo и подобных приложениях.
Cash remains the best option for in-person purchases for most people. Gift cards can be useful for the savings they bring. Prepaid cards can be useful for places that dont accept cash. Gift cards and prepaid cards are easier to use online than cash, and they are easier to acquire with cryptocurrencies than cash.
Для большинства людей наличные остаются лучшим вариантом для покупок, совершаемых при личном присутствии. Подарочные карты могут быть полезны благодаря экономии, которую они приносят. Предоплаченные карты могут быть полезны в местах, где не принимают наличные. В отличие от наличных, подарочные карты и предоплаченные карты легче использовать в интернете и их легче приобрести с помощью криптовалют.
### Онлайн магазины
If you have [cryptocurrency](../cryptocurrency.md), you can purchase gift cards with an online gift card marketplace. Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits start at $5,000-10,000 a day for basic accounts, and significantly higher limits for ID verified accounts (if offered).
Если у вас есть [криптовалюта](../cryptocurrency.md), вы можете приобрести подарочные карты на онлайн-маркетплейсе подарочных карт. Некоторые из этих служб предлагают возможность проверки личности для получения более высоких лимитов, но они также позволяют открывать счета, используя только адрес электронной почты. Базовые лимиты начинаются от $5,000-10,000 в день для базовых счетов, и значительно выше лимиты для счетов, подтвержденных документами (если они предлагаются).
When buying gift cards online, there is usually a slight discount. Prepaid cards are usually sold online at face value or with a fee. If you buy prepaid cards and gift cards with cryptocurrencies, you should strongly prefer to pay with Monero which provides strong privacy, more on this below. Paying for a gift card with a traceable payment method negates the benefits a gift card can provide when purchased with cash or Monero.
При покупке подарочных карт через интернет обычно предоставляется небольшая скидка. Предоплаченные карты обычно продаются в интернете по номинальной стоимости или с комиссией. Если вы покупаете предоплаченные карты и подарочные карты с помощью криптовалюты, вам следует отдать предпочтение оплате с помощью Monero, которая обеспечивает высокую степень конфиденциальности, подробнее об этом ниже. Оплата подарочной карты с помощью отслеживаемого способа оплаты сводит на нет преимущества, которые может предоставить подарочная карта при покупке за наличные или Monero.
- [Online Gift Card Marketplaces :material-arrow-right-drop-circle:](../financial-services.md#gift-card-marketplaces)
- [Онлайн-маркетплейсы подарочных карт :material-arrow-right-drop-circle:](../financial-services.md#gift-card-marketplaces)
## Виртуальные карты

View File

@ -4,50 +4,50 @@ icon: 'material/account-remove'
description: Легко накопить большое количество интернет-аккаунтов, вот несколько советов о том, как уменьшить их количество.
---
Со временем можно легко накопить множество учетных записей в Интернете, многие из которых вы можете уже не использовать. Удаление этих неиспользуемых учетных записей - важный шаг в восстановлении конфиденциальности, поскольку неиспользуемые учетные записи уязвимы для утечки данных. Утечка данных - это когда безопасность сервиса скомпрометирована, и защищенная информация просматривается, передается или похищается неавторизованными лицами. К сожалению, утечки данных - [слишком частое](https://haveibeenpwned.com/PwnedWebsites) явление в наши дни, поэтому соблюдение правил цифровой гигиены - лучший способ минимизировать их влияние на вашу жизнь. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence.
Со временем можно легко накопить множество учетных записей в Интернете, многие из которых вы можете уже не использовать. Удаление этих неиспользуемых учетных записей - важный шаг в восстановлении конфиденциальности, поскольку неиспользуемые учетные записи уязвимы для утечки данных. Утечка данных - это когда безопасность сервиса скомпрометирована, и защищенная информация просматривается, передается или похищается неавторизованными лицами. К сожалению, утечки данных - [слишком частое](https://haveibeenpwned.com/PwnedWebsites) явление в наши дни, поэтому соблюдение правил цифровой гигиены - лучший способ минимизировать их влияние на вашу жизнь. Цель данного руководства - помочь вам пройти через неприятный процесс удаления учетной записи, который часто усложняется [обманчивым дизайном](https://www.deceptive.design/), для улучшения вашего присутствия в интернете.
## Поиск старых аккаунтов
### Менеджер паролей
Если у вас есть менеджер паролей, которым вы пользовались на протяжении всей своей цифровой жизни, то эта часть будет очень простой. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/).
Если у вас есть менеджер паролей, которым вы пользовались на протяжении всей своей цифровой жизни, то эта часть будет очень простой. Часто они включают встроенные функции для обнаружения того, что ваши учетные данные были раскрыты в результате утечки данных - например, отчеты в Bitwarden об [скомпрометированных паролях](https://bitwarden.com/blog/have-you-been-pwned/).
<figure markdown>
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
![Функция поиска скомпрометированных паролей в Bitwarden](../assets/img/account-deletion/exposed_passwords.png)
</figure>
Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336).
Даже если вы раньше не использовали отдельный менеджер паролей, есть вероятность, что вы пользовались им в браузере или на телефоне, даже не подозревая об этом. Например: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) и [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336).
Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about:
Также на настольных платформах часто есть менеджер паролей, который может помочь вам восстановить забытые пароли:
- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0)
- macOS [Passwords](https://support.apple.com/en-us/HT211145)
- iOS [Passwords](https://support.apple.com/en-us/HT211146)
- Windows: [Диспетчер учетных данных](https://support.microsoft.com/ru-ru/windows/%D0%B4%D0%BE%D1%81%D1%82%D1%83%D0%BF-%D0%BA-%D0%B4%D0%B8%D1%81%D0%BF%D0%B5%D1%82%D1%87%D0%B5%D1%80%D1%83-%D1%83%D1%87%D0%B5%D1%82%D0%BD%D1%8B%D1%85-%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D1%85-1b5c916a-6a16-889f-8581-fc16e8165ac0)
- macOS: [Пароли](https://support.apple.com/ru-ru/HT211145)
- iOS: [Пароли](https://support.apple.com/ru-ru/HT211146)
- Linux, Gnome Keyring, which can be accessed through [Seahorse](https://help.gnome.org/users/seahorse/stable/passwords-view.html.en) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager)
### VPN сервисы
If you didn't use a password manager in the past or you think you have accounts that were never added to your password manager, another option is to search the email account(s) that you believe you signed up on. On your email client, search for keywords such as "verify" or "welcome." Almost every time you make an online account, the service will send a verification link or an introductory message to your email. This can be a good way to find old, forgotten accounts.
Если в прошлом вы не пользовались менеджером паролей или считаете, что у вас есть учетные записи, которые никогда не добавлялись в менеджер паролей, другой вариант - поискать учетную запись(и) электронной почты, с которой, по вашему мнению, вы зарегистрировались. В своем почтовом клиенте найдите такие ключевые слова, как "подтверждение" или "приветствие." Почти каждый раз, когда вы регистрируетесь где-либо в интернете, сервис отправляет на вашу электронную почту проверочную ссылку или вводное сообщение. Это может быть хорошим способом найти старые, забытые аккаунты.
## Deleting Old Accounts
## Удаление старых аккаунтов
### Log In
### Вход
In order to delete your old accounts, you'll need to first make sure you can log in to them. Again, if the account was in your password manager, this step is easy. If not, you can try to guess your password. Failing that, there are typically options to regain access to your account, commonly available through a "forgot password" link on the login page. It may also be possible that accounts you've abandoned have already been deleted—sometimes services prune all old accounts.
When attempting to regain access, if the site returns an error message saying that email is not associated with an account, or you never receive a reset link after multiple attempts, then you do not have an account under that email address and should try a different one. If you can't figure out which email address you used, or you no longer have access to that email, you can try contacting the service's customer support. Unfortunately, there is no guarantee that you will be able to reclaim access your account.
### GDPR (EEA residents only)
### GDPR (только для резидентов ЕЭЗ)
Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation.
### Overwriting Account information
### Перезапись информации в аккаунте
In some situations where you plan to abandon an account, it may make sense to overwrite the account information with fake data. Once you've made sure you can log in, change all the information in your account to falsified information. The reason for this is that many sites will retain information you previously had even after account deletion. The hope is that they will overwrite the previous information with the newest data you entered. However, there is no guarantee that there won't be backups with the prior information.
For the account email, either create a new alternate email account via your provider of choice or create an alias using an [email aliasing service](../email.md#email-aliasing-services). You can then delete your alternate email address once you are done. We recommend against using temporary email providers, as oftentimes it is possible to reactivate temporary emails.
### Delete
### Удаление
You can check [JustDeleteMe](https://justdeleteme.xyz) for instructions on deleting the account for a specific service. Some sites will graciously have a "Delete Account" option, while others will go as far as to force you to speak with a support agent. The deletion process can vary from site to site, with account deletion being impossible on some.
@ -57,6 +57,6 @@ If you're satisfied that all information you care about is removed, you can safe
Even when you are able to delete an account, there is no guarantee that all your information will be removed. In fact, some companies are required by law to keep certain information, particularly when related to financial transactions. It's mostly out of your control what happens to your data when it comes to websites and cloud services.
## Avoid New Accounts
## Избегайте новых аккаунтов
As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you!

View File

@ -38,7 +38,7 @@ cover: vpn.png
![Логотип IVPN](assets/img/vpn/ivpn.svg){ align=right }
**IVPN** — еще один платный VPN-провайдер, работающий с 2009 года. Выбор VPN-провайдера с ближайшим к вам сервером позволит снизить задержку передаваемого вами сетевого трафика.
**IVPN** — еще один платный VPN-провайдер, работающий с 2009 года. Компания IVPN базируется в Гибралтаре.
[:octicons-home-16: Домашняя страница](https://www.ivpn.net/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Политика конфиденциальности" }

View File

@ -95,7 +95,7 @@ schema:
根據設備與這些作業系統的兼容性,列出偏好順序以安裝我們推薦的某款定制 Android 作業系統。
!!! 備註
!!! note "備註"
由於 OEM 停止支持壽命終止的設備如GrapheneOS或CalyxOS的 "延長支授 "設備)沒有完整的安全補丁(軔體更新)。 這些設備無論安裝何種軟體,都不能視為完全安全。
@ -144,7 +144,7 @@ DivestOS 實現了一些最初為 GrapheneOS 開發的系統加固補丁。 Dive
DivestOS 以 F-Droid 為預設的應用下載服務。 通常我們建議避免使用 F-Droid它有不少[安全問題](#f-droid)。 然而 DivestOS 這樣卻不可行,開發者透過 ([DivestOS 官方](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) 與 [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2))的 F-Droid 存取庫來更新他們的應用程式。 我們建議禁用官方 F-Droid 應用,並使用 [Neo Store](https://github.com/NeoApplications/Neo-Store/) 啟用DivestOS 存取庫,以保持這些組件為最新。 至於其它應用,我們建議的獲取方式仍適用。
!!! 警告
!!! warning "警告"
DivestOS 軔體更新 [status](https://gitlab.com/divested-mobile/firmware-empty/-/blob/master/STATUS)和品管依所支援的設備不同而異。 雖取決於設備的兼容性,我们仍推薦 GrapheneOS。 對其它設備DivestOS 是不錯的選項。
@ -170,11 +170,11 @@ Google Pixel 是**唯一** 推薦的手機。 由於對第三方作業系統的
!!! recommendation
![ Google Pixel 6](assets/img/android/google-pixel.png){ align=right }
![Google Pixel 6](assets/img/android/google-pixel.png){ align=right }
眾所周知,** Google Pixel**設備具有良好安全性,支持[Verified Boot](https://source.android.com/security/verifiedboot),即使安裝自定義作業系統時也是如此。
眾所周知,**Google Pixel** 設備具有良好安全性,支持 [Verified Boot](https://source.android.com/security/verifiedboot),即使安裝自定義作業系統時也是如此。
從**Pixel 6**和**6 Pro**開始Pixel 設備至少有 5年的安全更新保證確保其使用壽命比其他競爭OEM 廠商 2-4年長得多。
**Pixel 6**和 **6 Pro** 開始Pixel 設備至少有 5年的安全更新保證確保其使用壽命比其他競爭OEM 廠商 2-4年長得多。
[:material-shopping: Store](https://store.google.com/category/phones){ .md-button .md-button--primary }
@ -209,9 +209,9 @@ Pixel 手機很容易安裝 GrapheneOS 只需依其 [網頁安裝程式](https:/
[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" }
[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute }
!!! 警告
!!! warning "警告"
推薦使用 Shelter 取代[Insular](https://secure-system.gitlab.io/Insular/)和 [Island](https://github.com/oasisfeng/island),因為 Shelter 支持[聯繫人搜索屏蔽](https://secure-system.gitlab.io/Insular/faq.html)。
推薦使用 Shelter 取代 [Insular](https://secure-system.gitlab.io/Insular/)和 [Island](https://github.com/oasisfeng/island),因為 Shelter 支持[聯繫人搜索屏蔽](https://secure-system.gitlab.io/Insular/faq.html)。
當使用 Shelter 時將信任置於其開發者Shelter 作為[設備管理員](https://developer.android.com/guide/topics/admin/device-admin)來創建工作設定檔,它有大量權限訪問存儲在工作設定檔的資料。
@ -230,7 +230,7 @@ Pixel 手機很容易安裝 GrapheneOS 只需依其 [網頁安裝程式](https:/
[:octicons-code-16:](https://attestation.app/source){ .card-link title="Source Code" }
[:octicons-heart-16:](https://attestation.app/donate){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.attestation.auditor.play)
- [:simple-github: GitHub](https://github.com/GrapheneOS/Auditor/releases)
@ -262,7 +262,7 @@ Auditor 通過下列方式鑑證和入侵檢測。
[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" }
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.camera.play)
- [:simple-github: GitHub](https://github.com/GrapheneOS/Camera/releases)
@ -274,11 +274,11 @@ Auditor 通過下列方式鑑證和入侵檢測。
- 使用新的 [媒介](https://developer.android.com/training/data-storage/shared/media) API因此不需要 [儲存權限](https://developer.android.com/training/data-storage)。
- 除非需錄制聲音,否則無需麥克風權限。
!!! 備註
!!! note "備註"
目前影片沒有刪除中繼資料,未來計畫要刪除。
圖片方向的中繼資料未刪除。 如果 ( Secure Camera) 開啟定位, 也 **不會** 被不會偵測到。 如果之後想刪除,必須使用外部應用如[ExifEraser](data-redaction.md#exiferaser)。
圖片方向的中繼資料未刪除。 如果 (Secure Camera) 開啟定位, 也 **不會** 被不會偵測到。 如果之後想刪除,必須使用外部應用如[ExifEraser](data-redaction.md#exiferaser)。
### 安全的 PDF 檢視器
@ -287,7 +287,7 @@ Auditor 通過下列方式鑑證和入侵檢測。
![Secure PDF Viewer logo](assets/img/android/secure_pdf_viewer.svg#only-light){ align=right }
![Secure PDF Viewer logo](assets/img/android/secure_pdf_viewer-dark.svg#only-dark){ align=right }
**Secure PDF Viewer** 是基於 [pdf.js](https://en.wikipedia.org/wiki/PDF.js)的PDF 瀏覽器,無需任何權限。 此 PDF 被送入[sandboxed](https://en.wikipedia.org/wiki/Sandbox_(software_development))[webview](https://developer.android.com/guide/webapps/webview)。 這意味著它不需要權限就能直接存取內容或檔案。
**Secure PDF Viewer** 是基於 [pdf.js](https://en.wikipedia.org/wiki/PDF.js)的PDF 瀏覽器,無需任何權限。 此 PDF 被送入 [sandboxed](https://en.wikipedia.org/wiki/Sandbox_(software_development)) [webview](https://developer.android.com/guide/webapps/webview)。 這意味著它不需要權限就能直接存取內容或檔案。
[內容安全政策](https://en.wikipedia.org/wiki/Content_Security_Policy)用來強制要求 WebView 內的JavaScript 和造型屬性需全為靜態內容。
@ -295,7 +295,7 @@ Auditor 通過下列方式鑑證和入侵檢測。
[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" }
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.pdfviewer.play)
- [:simple-github: GitHub](https://github.com/GrapheneOS/PdfViewer/releases)
@ -320,7 +320,7 @@ Google Play商店需要登錄 Google 帳戶,這對隱私來說不是很好。
[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary }
[:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" }
??? 下載
??? downloads "下載"
- [:simple-gitlab: GitLab](https://gitlab.com/AuroraOSS/AuroraStore/-/releases)
@ -395,9 +395,9 @@ Aurora Store不允許其匿名帳戶下載付費應用程式。 您可以選擇
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! !!! 例如 "本节是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
### 作業系統

View File

@ -11,10 +11,10 @@ cover: calendar.png
!!! recommendation
! [Tutanota logo] (assets/img/calendar/tutanota.svg#only-light) {align = right}
! [Tutanota標誌] (assets/img/calendar/tutanota-dark.svg#only-dark) {align = right}
![Tutanota 標誌 (assets/img/calendar/tutanota.svg#only-light){ align=right }
![Tutanota 標誌](assets/img/calendar/tutanota-dark.svg#only-dark){ align=right }
* * Tutanota * *在其支援的平臺上提供免費和加密的日曆。 功能包括所有數據的自動E2EE ,共享功能,匯入/匯出功能,多因素驗證和 [more] https://tutanota.com/calendar-app-comparison/ )。
**Tutanota** 在其支援的平臺上提供免費和加密的日曆。 功能包括所有數據的自動E2EE ,共享功能,匯入/匯出功能,多因素驗證和 [more](https://tutanota.com/calendar-app-comparison/)。
多個行事曆和擴展共享功能僅限於付費訂閱者。
@ -24,7 +24,7 @@ cover: calendar.png
[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" }
[:octicons-heart-16:](https://tutanota.com/community/){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota)
- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609)
@ -38,16 +38,16 @@ cover: calendar.png
!!! recommendation
![Proton](assets/img/calendar/proton-calendar.svg) {align = right}
![Proton](assets/img/calendar/proton-calendar.svg){ align=right }
* * Proton Calendar * *是 Proton 會員可透過網路或行動客戶端使用的加密行事曆服務。 功能包括:所有資料自動 E2EE 、共享、匯入/匯出等等[眾多功能](https://proton.me/support/proton-calendar-guide). 免費會員可以使用單一行事曆而付費訂閱者最多可以創建20個行事曆。 擴展共享功能也僅限於付費訂閱者。
**Proton Calendar** 是 Proton 會員可透過網路或行動客戶端使用的加密行事曆服務。 功能包括:所有資料自動 E2EE 、共享、匯入/匯出等等[眾多功能](https://proton.me/support/proton-calendar-guide). 免費會員可以使用單一行事曆而付費訂閱者最多可以創建20個行事曆。 擴展共享功能也僅限於付費訂閱者。
[:octicons-home-16: Homepage](https://proton.me/calendar){ .md-button .md-button--primary }
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://proton.me/support/proton-calendar-guide){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar)
- [:octicons-browser-16: Web](https://calendar.proton.me)
@ -56,9 +56,9 @@ cover: calendar.png
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! example "此部分是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
### 最低合格

View File

@ -18,16 +18,16 @@ cover: cloud.png
!!! recommendation
! [Proton Drive logo] (assets/img/cloud/protondrive.svg) {align = right}
![Proton Drive logo](assets/img/cloud/protondrive.svg){ align=right }
* * Proton Drive * *是來自流行的加密電子郵件供應商[Proton Mail] (email.md#proton-mail)的瑞士加密雲存儲供應商。
**Proton Drive** 是來自流行的加密電子郵件供應商[Proton Mail](email.md#proton-mail)的瑞士加密雲存儲供應商。
[:octicons-home-16: Homepage](https://proton.me/drive){ class="md-button md-button--primary" }
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851)
@ -50,7 +50,7 @@ Proton Drive 全新移動客戶端軟體尚未經過第三方公開審核。
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation}
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile)
- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232)
@ -74,9 +74,9 @@ Tresorit 已獲得多項獨立安全稽核:
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! example "此部分是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
### 最低合格要求

View File

@ -9,7 +9,7 @@ cover: cryptocurrency.png
[私密付款 :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button}
!!! 危險
!!! danger "危險"
許多(如果不是大多數)加密貨幣項目都是騙局。 只用你信任的項目小心進行交易。
@ -17,9 +17,9 @@ cover: cryptocurrency.png
!!! recommendation
! [Monero 標誌] (assets/img/cryptocurrency/monero.svg) {align = right}
![Monero 標誌](assets/img/cryptocurrency/monero.svg){ align=right }
* * Monero * *使用增強隱私技術的區塊鏈,混淆交易以實現匿名性。 每筆 Monero 交易都隱藏了交易金額、發送和接收地址以及資金來源,使其成為加密貨幣新手的理想選擇。
**Monero** 使用增強隱私技術的區塊鏈,混淆交易以實現匿名性。 每筆 Monero 交易都隱藏了交易金額、發送和接收地址以及資金來源,使其成為加密貨幣新手的理想選擇。
[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary }
[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation}
@ -50,6 +50,6 @@ Monero 是隱私友好的加密貨幣中最強大的競爭者,但它的隱私
!!! 示例“此部分是新的”
我們正在努力為網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 推薦項目時,我們會考慮與討論許多因素,且記錄下每一個項目種種工作流程。
我們正在努力為網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 推薦項目時,我們會考慮與討論許多因素,且記錄下每一個項目種種工作流程。
- 預設情況下,加密貨幣必須提供私密/無法追蹤的交易。

View File

@ -14,9 +14,9 @@ cover: data-redaction.png
!!! recommendation
! [MAT2 logo] (assets/img/data-redaction/mat2.svg) {align = right}
![MAT2 logo](assets/img/data-redaction/mat2.svg){ align=right }
* * MAT2 * *是免費軟體,可以移除圖像,音頻,種子和文件文件類型的中繼資料。 它通過[ Nautilus 擴展元件] (https://0xacab.org/jvoisin/mat2/-/tree/master/nautilus)提供命令行工具和圖形用戶界面Nautilus 是 [GNOME](https://www.gnome.org)的預設檔案管理器, [Dolphin](https://0xacab.org/jvoisin/mat2/-/tree/master/dolphin)是 [KDE](https://kde.org)的預設檔案管理器。
**MAT2** 是免費軟體,可以移除圖像,音頻,種子和文件文件類型的中繼資料。 它通過 [Nautilus 擴展元件](https://0xacab.org/jvoisin/mat2/-/tree/master/nautilus)提供命令行工具和圖形用戶界面Nautilus 是 [GNOME](https://www.gnome.org)的預設檔案管理器, [Dolphin](https://0xacab.org/jvoisin/mat2/-/tree/master/dolphin)是 [KDE](https://kde.org)的預設檔案管理器。
Linux 有MAT2 提供支持的第三方圖形界面工具[Metadata Cleaner] (https://gitlab.com/rmnvgr/metadata-cleaner) ,並且[可從 Flathub 取得] (https://flathub.org/apps/details/fr.romainvigier.MetadataCleaner)。
@ -24,7 +24,7 @@ cover: data-redaction.png
[:octicons-info-16:](https://0xacab.org/jvoisin/mat2/-/blob/master/README.md){ .card-link title=Documentation}
[:octicons-code-16:](https://0xacab.org/jvoisin/mat2){ .card-link title="Source Code" }
??? 下載
??? downloads "下載"
- [:simple-windows11: Windows](https://pypi.org/project/mat2)
- [:simple-apple: macOS](https://0xacab.org/jvoisin/mat2#requirements-setup-on-macos-os-x-using-homebrew)
@ -37,9 +37,9 @@ cover: data-redaction.png
!!! recommendation
! [ExifEraser logo] (assets/img/data-redaction/exiferaser.svg) {align = right}
![ExifEraser logo](assets/img/data-redaction/exiferaser.svg){ align=right }
* * ExifEraser * *是 Android 的現代無需許可的圖像中繼資料擦除應用程式。
**ExifEraser** 是 Android 的現代無需許可的圖像中繼資料擦除應用程式。
它目前支持JPEG PNG和WebP 檔案格式。
@ -47,7 +47,7 @@ cover: data-redaction.png
[:octicons-info-16:](https://github.com/Tommy-Geenexus/exif-eraser#readme){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/Tommy-Geenexus/exif-eraser){ .card-link title="Source Code" }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.none.tom.exiferaser)
- [:octicons-moon-16: Accrescent](https://accrescent.app/app/com.none.tom.exiferaser)
@ -73,14 +73,14 @@ cover: data-redaction.png
!!! recommendation
! [Metapho logo] (assets/img/data-redaction/metapho.jpg) {align = right}
![Metapho logo](assets/img/data-redaction/metapho.jpg){ align=right }
* * Metapho * *是一個簡單清晰的相片中繼資料檢視器,例如日期、檔案名稱、大小、相機型號、快門速度和位置。
**Metapho** 是一個簡單清晰的相片中繼資料檢視器,例如日期、檔案名稱、大小、相機型號、快門速度和位置。
[:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary }
[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" }
??? 下載
??? downloads "下載"
- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352)
@ -88,23 +88,23 @@ cover: data-redaction.png
!!! recommendation
! [PrivacyBlur logo] (assets/img/data-redaction/privacyblur.svg) {align = right}
![PrivacyBlur logo](assets/img/data-redaction/privacyblur.svg){ align=right }
* * PrivacyBlur * *是一個免費應用程式,在線上分享前先模糊圖片的敏感部分。
**PrivacyBlur** 是一個免費應用程式,在線上分享前先模糊圖片的敏感部分。
[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur)
- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106)
!!! 警告
!!! warning "警告"
* *永遠不要* *使用模糊來編輯[圖片中的文字] (https://bishopfox.com/blog/unredacter-tool-never-pixelation)。 如果要編輯影像中的文字,請在文字上畫一個框。 為此,我們建議使用[Pocket Paint] (https://github.com/Catrobat/Paintroid)等應用程式。
**永遠不要** 使用模糊來編輯 [圖片中的文字](https://bishopfox.com/blog/unredacter-tool-never-pixelation)。 如果要編輯影像中的文字,請在文字上畫一個框。 為此,我們建議使用 [Pocket Paint](https://github.com/Catrobat/Paintroid) 等應用程式。
## 命令行
@ -112,9 +112,9 @@ cover: data-redaction.png
!!! recommendation
! [ExifTool logo] (assets/img/data-redaction/exiftool.png) {align = right}
![ExifTool logo](assets/img/data-redaction/exiftool.png){ align=right }
* * ExifTool * *是原始的perl庫和命令行應用程式用於讀取、寫入和編輯各種檔案格式 (JPEG , TIFF , PNG, PDF, RAW等的中繼資訊(Exif , IPTC , XMP...)。
**ExifTool** 是原始的perl庫和命令行應用程式用於讀取、寫入和編輯各種檔案格式 (JPEG , TIFF , PNG, PDF, RAW等的中繼資訊(Exif , IPTC , XMP...)。
它通常是其他Exif 移除應用程式的組件,並且在大多數 Linux 發行版儲存庫中。
@ -123,7 +123,7 @@ cover: data-redaction.png
[:octicons-code-16:](https://github.com/exiftool/exiftool){ .card-link title="Source Code" }
[:octicons-heart-16:](https://exiftool.org/#donate){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-windows11: Windows](https://exiftool.org)
- [:simple-apple: macOS](https://exiftool.org)
@ -139,9 +139,9 @@ cover: data-redaction.png
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! !!! 例如 "本节是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
- 為開源作業系統開發的應用程式必須是開源的。
- 應用程式必須是免費的,不應包含廣告或其他限制。

View File

@ -15,9 +15,9 @@ cover: desktop.png
!!! recommendation
! [Fedora logo] (assets/img/linux-desktop/fedora-workstation.svg) {align = right}
![Fedora logo](assets/img/linux-desktop/fedora-workstation.svg){ align=right }
* * Fedora Workstation * *是我們推薦給Linux新手的發行版。 Fedora 通常較其他發行版更早採用較新技術,例如 [Wayland](https://wayland.freedesktop.org/) [PipeWire](https://pipewire.org)。 這些新技術通常會在安全性、隱私性和可用性方面有所改善。
**Fedora Workstation** 是我們推薦給Linux新手的發行版。 Fedora 通常較其他發行版更早採用較新技術,例如 [Wayland](https://wayland.freedesktop.org/) [PipeWire](https://pipewire.org)。 這些新技術通常會在安全性、隱私性和可用性方面有所改善。
[:octicons-home-16: Homepage](https://getfedora.org/){ .md-button .md-button--primary }
[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation}
@ -29,11 +29,11 @@ Fedora 有一個半滾動的發布週期。 雖然像 [GNOME](https://www.gnome.
!!! recommendation
! [openSUSE Tumbleweed logo] (assets/img/linux-desktop/opensuse-tumbleweed.svg) {align = right}
![openSUSE Tumbleweed logo](assets/img/linux-desktop/opensuse-tumbleweed.svg){ align=right }
* * openSUSE Tumbleweed * *是一個穩定滾動發行版。
**openSUSE Tumbleweed** 是一個穩定滾動發行版。
openSUSE Tumbleweed 有一個[transactional update] (https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/)系統,使用 [Btrfs](https://en.wikipedia.org/wiki/Btrfs)和 [Snapper](https://en.opensuse.org/openSUSE: Snapper_Tutorial)來確保快照可以在出現問題時回滾。
openSUSE Tumbleweed 有一個 [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/)系統,使用 [Btrfs](https://en.wikipedia.org/wiki/Btrfs)和 [Snapper](https://en.opensuse.org/openSUSE: Snapper_Tutorial)來確保快照可以在出現問題時回滾。
[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary }
[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation}
@ -45,9 +45,9 @@ Tumbleweed 遵循滾動發佈模式,每個更新都是快照發布。 當您
!!! recommendation
! [Arch logo] (assets/img/linux-desktop/archlinux.svg) {align = right}
![Arch logo](assets/img/linux-desktop/archlinux.svg){ align=right }
* * Arch Linux * *是一個輕量級的、自己動手(DIY)的發行版,意味著只能得到你安裝的東西。 如需更多資訊,請參閱他們的 [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions)。
**Arch Linux** 是一個輕量級的、自己動手(DIY)的發行版,意味著只能得到你安裝的東西。 如需更多資訊,請參閱他們的 [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions)。
[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary }
[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation}
@ -65,9 +65,9 @@ Arch Linux有一個滾動發佈週期。 沒有固定的發布時間表,套件
!!! recommendation
! [Fedora Silverblue logo] (assets/img/linux-desktop/fedora-silverblue.svg) {align = right}
![Fedora Silverblue logo](assets/img/linux-desktop/fedora-silverblue.svg){ align=right }
* * Fedora Silverblue * *和* * Fedora Kinoite * *是自 Fedora 變體的不可更動發行版,主要關注容器工作流程。 Silverblue 搭配 [GNOME](https://www.gnome.org/)桌面環境,而 Kinoite 則探 [KDE](https://kde.org/)。 Silverblue 和 Kinoite 遵循 Fedora Workstation 同樣的發佈時間表,受益於相同的快速更新並保持非常接近上遊。
**Fedora Silverblue****Fedora Kinoite** 是自 Fedora 變體的不可更動發行版,主要關注容器工作流程。 Silverblue 搭配 [GNOME](https://www.gnome.org/)桌面環境,而 Kinoite 則探 [KDE](https://kde.org/)。 Silverblue 和 Kinoite 遵循 Fedora Workstation 同樣的發佈時間表,受益於相同的快速更新並保持非常接近上遊。
[:octicons-home-16: Homepage](https://silverblue.fedoraproject.org/){ .md-button .md-button--primary }
[:octicons-info-16:](https://docs.fedoraproject.org/en-US/fedora-silverblue/){ .card-link title=Documentation}
@ -85,9 +85,9 @@ Silverblue 和Kinoite )與 Fedora Workstation 不同的是,它們用更
!!! recommendation
! [NixOS logo] (assets/img/linux-desktop/nixos.svg) {align = right}
![NixOS logo](assets/img/linux-desktop/nixos.svg){ align=right }
NixOS 是基於 Nix套件管理器的獨立發行版專注於可重複性和可靠性。
NixOS 是基於 Nix套件管理器的獨立發行版專注於可重複性和可靠性。
[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary }
[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation}
@ -109,9 +109,9 @@ Nix是一個基於源的套件管理器如果二進位快取中沒有預先
!!! recommendation
! [Whonix logo] (assets/img/linux-desktop/whonix.svg) {align = right}
![Whonix logo](assets/img/linux-desktop/whonix.svg){ align=right }
* * Whonix * * 來自 [Kicksecure](https://www.whonix.org/wiki/Kicksecure),為 Debian 安全分支。 它旨在提供網際網路的隱私、安全和匿名性。 Whonix 最好與[Qubes OS](# qubes-os) 配合使用。
**Whonix** 來自 [Kicksecure](https://www.whonix.org/wiki/Kicksecure),為 Debian 安全分支。 它旨在提供網際網路的隱私、安全和匿名性。 Whonix 最好與 [Qubes OS](# qubes-os) 配合使用。
[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary }
[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" }
@ -133,9 +133,9 @@ Whonix 最好與 Qubes</a>一起使用
!!! recommendation
! [Tails logo] (assets/img/linux-desktop/tails.svg) {align = right}
![Tails logo](assets/img/linux-desktop/tails.svg){ align=right }
* * Tails * *是一個基於Debian 的自生作業系統,通過 Tor 路由所有通訊,透過 DVD USB記憶棒或 SD卡安裝幾乎可在任何電腦上啟動。 它使用 [Tor](tor.md)來保護隱私和匿名性,同時規避審查制度,並且使用的電腦在關閉電源後不會留下任何痕跡。
**Tails** 是一個基於Debian 的自生作業系統,通過 Tor 路由所有通訊,透過 DVD USB記憶棒或 SD卡安裝幾乎可在任何電腦上啟動。 它使用 [Tor](tor.md) 來保護隱私和匿名性,同時規避審查制度,並且使用的電腦在關閉電源後不會留下任何痕跡。
[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary }
[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation}
@ -158,9 +158,9 @@ Tails Tor 瀏覽器預設包含 [uBlock Origin](desktop-browsers.md#ublock-origi
!!! recommendation
! [Qubes OS logo] (assets/img/qubes/qubes_os.svg) {align = right}
![Qubes OS logo](assets/img/qubes/qubes_os.svg){ align=right }
* * Qubes OS * *是一個開源作業系統,旨在為桌機運算提供強大的安全性。 Qubes 基於 Xen、X Window System 和 Linux ,可以運行大多數 Linux 應用程式與使用大多數 Linux 驅動程式。
**Qubes OS** 是一個開源作業系統,旨在為桌機運算提供強大的安全性。 Qubes 基於 Xen、X Window System 和 Linux ,可以運行大多數 Linux 應用程式與使用大多數 Linux 驅動程式。
[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary }
[:material-arrow-right-drop-circle: Overview](os/qubes-overview.md){ .md-button .md-button--primary }
@ -181,9 +181,9 @@ Qubes OS 作業系統將子系統例如網絡、USB等和應用程式隔
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! example "此部分是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們推薦的作業系統:

View File

@ -24,7 +24,7 @@ cover: dns.png
**請注意,我們這裏所推薦專案沒有任何牽扯。 ** 除了 [我們的標準準則](about/criteria.md)外,還有一套明確要求以提出客觀建議。 我們建議您在選擇使用任何項目之前先熟悉此列表,並進行自己的研究,以確保您的正確選擇。
!!! 示例“此部分是新的
!!! example "此部分是新的"
我們正在努力為這個網站的各個部分建立明確標準,它可能依情況變化。 如果您對我們的標準有任何疑問,請[在我們的論壇上提問] (https://discuss.privacyguides.net/latest) ,不要因為未列出而認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個專案時,會考慮和討論許多因素,記錄每一個項目都是一件持續的工作。
@ -49,7 +49,7 @@ Android 9 以上版本支持 DoT (DNS over TLS)。 設定方式可以在以下
Apple不提供用於建立加密DNS設定檔的原生介面。 [Secure DNS profile creator](https://dns.notjakob.com/tool.html) 是一款非正式工具用以建立您自己的加密 DNS 設定檔。不過這個軟體並未得到簽署。 最好是簽署過個人資設定檔;簽署會驗證個人資料的來源,並有助於確保個人資料的完整性。 綠色的「已驗證」標籤會提供給已簽署的配置文件。 代碼簽名的詳細資訊,請參閱 [關於代碼簽名](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html)。 由 [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html)、 [NextDNS](https://apple.nextdns.io)和 [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/)提供的**簽名設定檔** 。
!!! 資訊
!!! info "資訊"
許多 Linux 發行版用來進行DNS查詢的`systemd-resolved` 還不[支援 DoH] (https://github.com/systemd/systemd/issues/8639)。 如果要使用 DoH ,您需要安裝一個類似 [dnscrypt-proxy](https://github.com/DNSCrypt/dnscrypt-proxy)的代理,並[設定] (https://wiki.archlinux.org/title/Dnscrypt-proxy)讓系統解析器獲取所有 DNS 查詢,並透過 HTTPS 轉發。
@ -61,17 +61,17 @@ Apple不提供用於建立加密DNS設定檔的原生介面。 [Secure DNS profi
!!! recommendation
! [RethinkDNS logo] (assets/img/android/rethinkdns.svg#only-light) {align = right}
! [RethinkDNS logo] (assets/img/android/rethinkdns-dark.svg#only-dark) {align = right}
![RethinkDNS logo](assets/img/android/rethinkdns.svg#only-light){ align=right }
![RethinkDNS logo](assets/img/android/rethinkdns-dark.svg#only-dark){ align=right }
* * RethinkDNS * *是一個開源 Android 用戶端工具,支持 [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh)、 [DNS-over-TLS](advanced/dns-overview.md#dns-over-tls-dot)、 [DNSCrypt](advanced/dns-overview.md#dnscrypt)和 DNS 代理以及快取DNS 回應、本地記錄 DNS 查詢,也可用作防火牆。
**RethinkDNS** 是一個開源 Android 用戶端工具,支持 [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh)、 [DNS-over-TLS](advanced/dns-overview.md#dns-over-tls-dot)、 [DNSCrypt](advanced/dns-overview.md#dnscrypt)和 DNS 代理以及快取DNS 回應、本地記錄 DNS 查詢,也可用作防火牆。
[:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary }
[:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.celzero.bravedns)
- [:simple-github: GitHub](https://github.com/celzero/rethink-app/releases)
@ -80,18 +80,18 @@ Apple不提供用於建立加密DNS設定檔的原生介面。 [Secure DNS profi
!!! recommendation
! [dnscrypt-proxy logo] (assets/img/dns/dnscrypt-proxy.svg) {align = right}
![dnscrypt-proxy logo](assets/img/dns/dnscrypt-proxy.svg){ align=right }
* * dnscrypt-proxy * *是 DNS 代理,支持 [DNSCrypt](advanced/dns-overview.md#dnscrypt)、 [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh)和[Anonymized DNS] (https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS)。
**dnscrypt-proxy** 是 DNS 代理,支持 [DNSCrypt](advanced/dns-overview.md#dnscrypt)、 [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh)和[Anonymized DNS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS)。
!!! 警告 "匿名化 DNS 功能[* * 不會 * *] (advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns)匿名化其他網路流量。
!!! warning "匿名化 DNS 功能[**不會**](advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) 匿名化其他網路流量。
[:octicons-repo-16: Repository](https://github.com/DNSCrypt/dnscrypt-proxy){ .md-button .md-button--primary }
[:octicons-info-16:](https://github.com/DNSCrypt/dnscrypt-proxy/wiki){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/DNSCrypt/dnscrypt-proxy){ .card-link title="Source Code" }
[:octicons-heart-16:](https://opencollective.com/dnscrypt/contribute){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-windows11: Windows](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-Windows)
- [:simple-apple: macOS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-macOS)
@ -105,9 +105,9 @@ Apple不提供用於建立加密DNS設定檔的原生介面。 [Secure DNS profi
!!! recommendation
! [AdGuard 首頁標誌] (assets/img/dns/adguard-home.svg) {align = right}
![AdGuard 首頁標誌](assets/img/dns/adguard-home.svg){ align=right }
* * AdGuard * *是一個開源的 [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) ,使用[DNS 過濾] (https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/)來封鎖不需要的網頁內容,例如廣告。
**AdGuard** 是一個開源的 [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) ,使用[DNS 過濾] (https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) 來封鎖不需要的網頁內容,例如廣告。
AdGuard 首頁提供精美的網頁介面,可查看有用資訊並管理被封鎖的內容。
@ -120,9 +120,9 @@ Apple不提供用於建立加密DNS設定檔的原生介面。 [Secure DNS profi
!!! recommendation
! [Pi-hole logo] (assets/img/dns/pi-hole.svg) {align = right}
![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right }
* * Pi-hole * *是一個開源的 [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) ,它使用 [DNS 篩選] (https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/)來阻止不需要的網頁內容,例如廣告。
**Pi-hole** 是一個開源的 [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) ,它使用 [DNS 篩選] (https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/)來阻止不需要的網頁內容,例如廣告。
Pi-hole 設計應用在 Raspberry Pi ,但它不限於這種硬體。 該軟體良好的 Web 界面,可查看有用資訊和管理被阻止的內容。

View File

@ -11,9 +11,9 @@ cover: email-clients.png
當使用端到端加密( E2EE 技術如OpenPGP )時,電子郵件仍然會有一些未在電子郵件標頭中加密的[一些中繼數據] email.md#email-metadata-overview )。
OpenPGP 也不支援[前向保密] (https://en.wikipedia.org/wiki/Forward_secrecy) ,這意味著如果你或收件人的私鑰被盜,所有以前用它加密的訊息都會被曝光: [如何保護我的私鑰?] (basics/email-security.md)考慮使用提供前向保密的媒介:
OpenPGP 也不支援 [前向保密](https://en.wikipedia.org/wiki/Forward_secrecy) ,這意味著如果你或收件人的私鑰被盜,所有以前用它加密的訊息都會被曝光: [如何保護我的私鑰?](basics/email-security.md)考慮使用提供前向保密的媒介:
[通時通訊] (real-time-communication.md){ .md-button }
[通時通訊](real-time-communication.md){ .md-button }
## 跨平臺
@ -21,16 +21,16 @@ cover: email-clients.png
!!! recommendation
! [Thunderbird logo] (assets/img/email-clients/thunderbird.svg) {align = right}
![Thunderbird logo](assets/img/email-clients/thunderbird.svg){ align=right }
* * Thunderbird * *是一個免費、開源、跨平臺的電子郵件、新聞組、新聞提要和聊天(XMPP、IRC、Twitter)客戶端由Thunderbird 社區開發,之前由 Mozilla 基金會開發。
**Thunderbird** 是一個免費、開源、跨平臺的電子郵件、新聞組、新聞提要和聊天(XMPP、IRC、Twitter)客戶端由Thunderbird 社區開發,之前由 Mozilla 基金會開發。
[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary }
[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation}
[:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
??? 下載
??? downloads "下載"
- [:simple-windows11: Windows](https://www.thunderbird.net)
- [:simple-apple: macOS](https://www.thunderbird.net)
@ -62,9 +62,9 @@ cover: email-clients.png
!!! recommendation
! [Apple Mail標誌] (assets/img/email-clients/applemail.png) {align = right}
![Apple Mail標誌](assets/img/email-clients/applemail.png){ align=right }
* * Apple Mail * *包含在 macOS並可利用[GPG Suite] (encryption.md#gpg-suite)擴展支援 OpenPGP增加了發送PGP 加密電子郵件的能力。
**Apple Mail** 包含在 macOS並可利用[GPG Suite] (encryption.md#gpg-suite)擴展支援 OpenPGP增加了發送PGP 加密電子郵件的能力。
[:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary }
[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" }
@ -76,21 +76,21 @@ cover: email-clients.png
!!! recommendation
! [Canary Mail logo] (assets/img/email-clients/canarymail.svg) {align = right}
![Canary Mail logo](assets/img/email-clients/canarymail.svg){ align=right }
* * Canary Mail * *是一個付費的電子郵件用戶端,提供無縫的端到端加密安全功能,如生物識別應用程式鎖定。
**Canary Mail** 是一個付費的電子郵件用戶端,提供無縫的端到端加密安全功能,如生物識別應用程式鎖定。
[:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary }
[:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation}
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.canarymail.android)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1236045954)
- [:simple-windows11: Windows](https://canarymail.io/downloads.html)
!!! 警告
!!! warning "警告"
Canary Mail 最近才發布了 Windows 和 Android 用戶端,我們不認為它們已如 iOS和 Mac 用戶端一樣穩定。
@ -100,9 +100,9 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客
!!! recommendation
! [FairEmail標誌] (assets/img/email-clients/fairemail.svg) {align = right}
![FairEmail標誌](assets/img/email-clients/fairemail.svg){ align=right }
* * FairEmail * *是一個極簡的開源電子郵件應用程式,使用開放標準(IMAP, SMTP, OpenPGP ),數據和電池使用量低。
**FairEmail** 是一個極簡的開源電子郵件應用程式,使用開放標準(IMAP, SMTP, OpenPGP ),數據和電池使用量低。
[:octicons-home-16: Homepage](https://email.faircode.eu){ .md-button .md-button--primary }
[:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" }
@ -110,7 +110,7 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客
[:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" }
[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=eu.faircode.email)
- [:simple-github: GitHub](https://github.com/M66B/FairEmail/releases)
@ -119,9 +119,9 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客
!!! recommendation
! [Evolution logo] (assets/img/email-clients/evolution.svg) {align = right}
![Evolution logo](assets/img/email-clients/evolution.svg){ align=right }
* * Evolution * *是個人資訊管理應用程式,提供綜合郵件、行事曆和聯絡簿功能。 Evolution有廣泛的 [文檔](https://help.gnome.org/users/evolution/stable/)來幫助您開始。
**Evolution** 是個人資訊管理應用程式,提供綜合郵件、行事曆和聯絡簿功能。 Evolution有廣泛的 [文檔](https://help.gnome.org/users/evolution/stable/)來幫助您開始。
[:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary }
[:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" }
@ -129,7 +129,7 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客
[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" }
[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.gnome.Evolution)
@ -137,11 +137,11 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客
!!! recommendation
! [K-9 Mail logo] (assets/img/email-clients/k9mail.svg) {align = right}
![K-9 Mail logo](assets/img/email-clients/k9mail.svg){ align=right }
* * K-9 Mail * *是一個獨立的郵件應用程式,同時支援 POP3 和IMAP 郵箱,但只支援 IMAP 推送郵件。
**K-9 Mail** 是一個獨立的郵件應用程式,同時支援 POP3 和IMAP 郵箱,但只支援 IMAP 推送郵件。
未來 K-9 Mai l將成為[官方品牌] (https://k9mail.app/2022/06/13/K-9-Mail-and-Thunderbird.html) Thunderbird Android 用戶端。
未來 K-9 Mai l將成為 [官方品牌](https://k9mail.app/2022/06/13/K-9-Mail-and-Thunderbird.html) Thunderbird Android 用戶端。
[:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" }
@ -149,22 +149,22 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客
[:octicons-code-16:](https://github.com/k9mail/k-9){ .card-link title="Source Code" }
[:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.fsck.k9)
- [:simple-github: GitHub](https://github.com/k9mail/k-9/releases)
!!! 警告
!!! warning "警告"
當回覆郵件群組中的某人時,「回覆」選項也可能包括郵件群組。 如需更多資訊,請參閱[thundernest/k-9 # 3738] (https://github.com/thundernest/k-9/issues/3738)。
當回覆郵件群組中的某人時,「回覆」選項也可能包括郵件群組。 如需更多資訊,請參閱 [thundernest/k-9 # 3738](https://github.com/thundernest/k-9/issues/3738)。
### Kontact (KDE)
!!! recommendation
! [Kontact logo] (assets/img/email-clients/kontact.svg) {align = right}
![Kontact logo](assets/img/email-clients/kontact.svg){ align=right }
* * Kontact * *是來自 [KDE](https://kde.org)專案的個人資訊管理器(PIM)應用程式。 它提供了郵件客戶端、地址簿、待辦事項和 RSS 客戶端。
**Kontact** 是來自 [KDE](https://kde.org)專案的個人資訊管理器(PIM)應用程式。 它提供了郵件客戶端、地址簿、待辦事項和 RSS 客戶端。
[:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary }
[:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" }
@ -172,7 +172,7 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客
[:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" }
[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-linux: Linux](https://kontact.kde.org/download)
- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.kde.kontact)
@ -181,16 +181,16 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客
!!! recommendation
! [Mailvelope logo] (assets/img/email-clients/mailvelope.svg) {align = right}
![Mailvelope logo](assets/img/email-clients/mailvelope.svg){ align=right }
* * Mailvelope * *是一個瀏覽器擴充功能,可按照 OpenPGP 加密標準交換加密電子郵件。
**Mailvelope** 是一個瀏覽器擴充功能,可按照 OpenPGP 加密標準交換加密電子郵件。
[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary }
[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" }
??? 下載
??? downloads "下載"
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/mailvelope)
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/mailvelope/kajibbejlbohfaggdiogboambcijhkke)
@ -200,9 +200,9 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客
!!! recommendation
! [NeoMutt logo] (assets/img/email-clients/mutt.svg) {align = right}
![NeoMutt logo](assets/img/email-clients/mutt.svg){ align=right }
* * NeoMutt * *是 Linux 和 BSD 的開源命令行郵件閱讀器或MUA )。 它是 [Mutt](https://en.wikipedia.org/wiki/Mutt_ (email_client))的分支,具有附加功能。
**NeoMutt** 是 Linux 和 BSD 的開源命令行郵件閱讀器或MUA )。 它是 [Mutt](https://en.wikipedia.org/wiki/Mutt_ (email_client)) 的分支,具有附加功能。
NeoMutt 是一個文字指令的客戶端,具有陡峭的學習曲線。 然而,它有高度自制的特色。
@ -211,7 +211,7 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客
[:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" }
[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-apple: macOS](https://neomutt.org/distro)
- [:simple-linux: Linux](https://neomutt.org/distro)
@ -220,9 +220,9 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! example "此部分是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
### 最低合格要求

View File

@ -1,5 +1,5 @@
---
meta_title: "推薦的加密軟件: VeraCryp, Cryptomat, PicoCrypt 和 OpenPGP - Privacy Guides"
meta_title: "推薦的加密軟件: VeraCrypt, Cryptomat, PicoCrypt 和 OpenPGP - Privacy Guides"
title: "加密軟體"
icon: material/file-lock
description: 數據加密是控制誰可以訪問它的唯一方法。 這些工具允許您加密電子郵件和任何其他檔案。
@ -16,9 +16,9 @@ cover: encryption.png
!!! recommendation
! [Cryptomator logo] (assets/img/encryption-software/cryptomator.svg) {align = right}
![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ align=right }
* * Cryptomator * *是一種加密解決方案,專為將檔案私密保存到任何雲端提供商而設計。 它允許您創建存儲在虛擬驅動器上的保管庫,其內容已加密並與雲端儲存供應商同步。
**Cryptomator** 是一種加密解決方案,專為將檔案私密保存到任何雲端提供商而設計。 它允許您創建存儲在虛擬驅動器上的保管庫,其內容已加密並與雲端儲存供應商同步。
[:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary }
[:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" }
@ -26,7 +26,7 @@ cover: encryption.png
[:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" }
[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator)
- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163)
@ -46,15 +46,15 @@ Cryptomator 詳細介紹了其預期的 [安全目標](https://docs.cryptomator
!!! recommendation
! [Picocrypt logo] (assets/img/encryption-software/picocrypt.svg) {align = right}
![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ align=right }
* * Picocrypt * *是一個小而簡單的加密工具,提供現代加密。 Picocrypt 使用安全的 XChaCha20 密碼和 Argon2id 密鑰派生功能來提供高級別的安全性。 它使用 Go 標準x/crypto 模塊作為其加密功能。
**Picocrypt** 是一個小而簡單的加密工具,提供現代加密。 Picocrypt 使用安全的 XChaCha20 密碼和 Argon2id 密鑰派生功能來提供高級別的安全性。 它使用 Go 標準x/crypto 模塊作為其加密功能。
[:octicons-repo-16: Repository](https://github.com/HACKERALERT/Picocrypt){ .md-button .md-button--primary }
[:octicons-code-16:](https://github.com/HACKERALERT/Picocrypt){ .card-link title="Source Code" }
[:octicons-heart-16:](https://opencollective.com/picocrypt){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-windows11: Windows](https://github.com/HACKERALERT/Picocrypt/releases)
- [:simple-apple: macOS](https://github.com/HACKERALERT/Picocrypt/releases)
@ -64,17 +64,17 @@ Cryptomator 詳細介紹了其預期的 [安全目標](https://docs.cryptomator
!!! recommendation
! [VeraCrypt logo] (assets/img/encryption-software/veracrypt.svg#only-light) {align = right}
! [VeraCrypt logo] (assets/img/encryption-software/veracrypt-dark.svg#only-dark) {align = right}
![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ align=right }
![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ align=right }
* * VeraCrypt * *是一個開源的免費軟件實用程式,用於即時加密。 它可以在檔案中建立虛擬加密磁碟、加密分割區,或透過預先啟動驗證來加密整個儲存裝置。
**VeraCrypt** 是一個開源的免費軟件實用程式,用於即時加密。 它可以在檔案中建立虛擬加密磁碟、加密分割區,或透過預先啟動驗證來加密整個儲存裝置。
[:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary }
[:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation}
[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" }
[:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html)
- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html)
@ -94,17 +94,17 @@ Truecrypt 已完成[多次審計](https://en.wikipedia.org/wiki/TrueCrypt#Securi
!!! recommendation
! [BitLocker logo] (assets/img/encryption-software/bitlocker.png) {align = right}
![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right }
* * BitLocker * *是 Microsoft Windows 捆綁的全磁區加密解決方案。 我們推薦它的主要原因是[使用 TPM] (https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm)。 取證公司[ElcomSoft](https://en.wikipedia.org/wiki/ElcomSoft)在[Understanding BitLocker TPM Protection] (https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/)中撰寫了有關此問題的文章。
**BitLocker** 是 Microsoft Windows 捆綁的全磁區加密解決方案。 我們推薦它的主要原因是 [使用 TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm)。 取證公司[ElcomSoft](https://en.wikipedia.org/wiki/ElcomSoft)在[Understanding BitLocker TPM Protection] (https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/)中撰寫了有關此問題的文章。
[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) Windows 專業版、企業版和教育版。 它可以在家庭版上啓用,只要符合先決條件。
??? 示例“在Windows Home上啓用BitLocker
??? example "在Windows Home上啓用BitLocker"
若要在 Windows 家用版啟用 BitLocker ,必須使用 [GUID 分割表] (https://zh.wikipedia.org/wiki/GUID_Partition_Table)格式化的分割區並且具有專用的TPM (v1.2, 2.0+)模組。
若要在 Windows 家用版啟用 BitLocker ,必須使用 [GUID 分割表](https://zh.wikipedia.org/wiki/GUID_Partition_Table) 格式化的分割區並且具有專用的TPM (v1.2, 2.0+)模組。
1. 開啟命令提示符,並使用以下命令檢查磁碟機的分區表格格式。 您應該會在“分區樣式”下方看到“**GPT**”
@ -123,7 +123,7 @@ BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device
4. 使用管理員帳戶登入並在命令提示符中輸入指令以開始加密:
```
manage-bde -on c: - used
manage-bde -on c: -used
```
5. 關閉命令提示符並繼續啟動正常Windows。
@ -136,7 +136,7 @@ BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device
manage-bde -protectors -get c: > %UserProfile%\Desktop\BitLocker-Recovery-Key.txt
```
!!! 訣竅
!!! tip "訣竅"
將桌面上的「BitLocker-Recovery-Key.txt」備份到單獨的儲存裝置。 若遺失恢復代碼可能會導致資料無法回復。
@ -144,9 +144,9 @@ BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device
!!! recommendation
! [FileVault logo] (assets/img/encryption-software/filevault.png) {align = right}
![FileVault logo](assets/img/encryption-software/filevault.png){ align=right }
* * FileVault * *是 macOS 內建的即時磁區加密方案。 建議使用FileVault ,因為它打抵擋 Apple siliconSoC 或 T2 安全晶片[硬體安全問題](https://support.apple.com/guide/security/volume-encryption-with-filevault-sec4c6dc1b6e/web)。
**FileVault** 是 macOS 內建的即時磁區加密方案。 建議使用FileVault ,因為它打抵擋 Apple silicon SoC 或 T2 安全晶片 [硬體安全問題](https://support.apple.com/guide/security/volume-encryption-with-filevault-sec4c6dc1b6e/web)。
[:octicons-info-16:](https://support.apple.com/guide/mac-help/encrypt-mac-data-with-filevault-mh11785/mac){ .card-link title=Documentation}
@ -156,15 +156,15 @@ BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device
!!! recommendation
! [LUKS logo] (assets/img/encryption-software/luks.png) {align = right}
![LUKS logo](assets/img/encryption-software/luks.png){ align=right }
* * LUKS * *是 Linux 預設 FDE 方法。 它可用於加密整個磁區、分割區或建立加密容器。
**LUKS** 是 Linux 預設 FDE 方法。 它可用於加密整個磁區、分割區或建立加密容器。
[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary }
[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation}
[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" }
??? 示例"建立和開啟加密容器"
??? example "建立和開啟加密容器"
```
dd if=/dev/urandom of=/path-to-file bs=1M count=1024 status=progress
@ -181,7 +181,7 @@ BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device
!!! 備註 "記得備份磁區標頭"
我們建議您務必[備份您的LUKS標頭] (https://wiki.archlinux.org/title/Dm-crypt/Device_encryption#Backup_and_restore)以防部分驅動器故障。 可以通過以下方式完成:
我們建議您務必 [備份您的LUKS標頭](https://wiki.archlinux.org/title/Dm-crypt/Device_encryption#Backup_and_restore) 以防部分驅動器故障。 可以通過以下方式完成:
```
cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img
@ -195,10 +195,10 @@ BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device
!!! recommendation
! [hat.sh logo] (assets/img/encryption-software/hat-sh.png#only-light) {align = right}
! [hat.sh logo] (assets/img/encryption-software/hat-shark.png#only-dark) {align = right}
![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right }
![hat.sh logo](assets/img/encryption-software/hat-shark.png#only-dark){ align=right }
* * Hat.sh * *是一款在瀏覽器中提供安全用戶端檔案加密的網頁應用程式。 它也可以是自行託管,如果您需要加密文件,但由於組織政策無法在設備上安裝任何軟件,這個方法將非常有用。
**Hat.sh** 是一款在瀏覽器中提供安全用戶端檔案加密的網頁應用程式。 它也可以是自行託管,如果您需要加密文件,但由於組織政策無法在設備上安裝任何軟件,這個方法將非常有用。
[:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary }
[:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" }
@ -214,9 +214,9 @@ BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device
!!! recommendation
! [Kryptor logo] (assets/img/encryption-software/kryptor.png) {align = right}
![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right }
* * Kryptor * *是一個免費的開源文件加密和簽名工具,利用現代安全的加密算法。 它旨在成為更好版本的 [age](https://github.com/FiloSottile/age)和 [Minisign](https://jedisct1.github.io/minisign/),提供一個簡單,更容易的 GPG 替代品。
**Kryptor** 是一個免費的開源文件加密和簽名工具,利用現代安全的加密算法。 它旨在成為更好版本的 [age](https://github.com/FiloSottile/age)和 [Minisign](https://jedisct1.github.io/minisign/),提供一個簡單,更容易的 GPG 替代品。
[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary }
[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" }
@ -224,7 +224,7 @@ BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device
[:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" }
[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-windows11: Windows](https://www.kryptor.co.uk)
- [:simple-apple: macOS](https://www.kryptor.co.uk)
@ -234,9 +234,9 @@ BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device
!!! recommendation
! [Tomb logo] (assets/img/encryption-software/tomb.png) {align = right}
![Tomb logo](assets/img/encryption-software/tomb.png){ align=right }
* * Tomb * *是 LUKS 的命令行 shell 包裝器。 它通過[第三方工具] (https://github.com/dyne/Tomb#how-does-it-work)支持隱寫。
**Tomb** 是 LUKS 的命令行 shell 包裝器。 它通過 [第三方工具](https://github.com/dyne/Tomb#how-does-it-work) 支持隱寫。
[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary }
[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation}
@ -249,9 +249,9 @@ OpenPGP 有時需要執行特定任務,例如數位簽署和加密電子郵件
使用 PGP 加密時,您可以選擇在 `gpg.conf` 檔案中設定不同的選項。 我們建議您繼續使用 [ GnuPG 用戶常見問題集](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf)中指定的標準選項。
!!! 訣竅 "在生成金鑰時使用未來的預設值"
!!! tip "在生成金鑰時使用未來的預設值"
[生成密鑰] (https://www.gnupg.org/gph/en/manual/c14.html)時,建議使用`future-default`命令,因為這將指示 GnuPG 使用現代密碼學,例如 [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History)和 [Ed25519](https://ed25519.cr.yp.to/)
[生成密鑰] (https://www.gnupg.org/gph/en/manual/c14.html)時,建議使用`future-default`命令,因為這將指示 GnuPG 使用現代密碼學,例如 [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) 和 [Ed25519](https://ed25519.cr.yp.to/)
```bash
gpg --quick-gen-key alice@example.com future-default
@ -261,16 +261,16 @@ OpenPGP 有時需要執行特定任務,例如數位簽署和加密電子郵件
!!! recommendation
! [GNU Privacy Guard logo] (assets/img/encryption-software/gnupg.svg) {align = right}
![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right }
* * GnuPG * *是 GPL授權的加密軟體 PGP 替代品。 GnuPG 符合[RFC 4880] (https://tools.ietf.org/html/rfc4880) ,這是目前 OpenPGP 的 IETF 規範。 GnuPG 專案一直致力於[更新] (https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) 試圖現代化OpenPGP。 GnuPG 是自由軟體基金會GNU 軟體項目的一部分,並已收到德國政府的重大 [資助](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html)。
**GnuPG** 是 GPL授權的加密軟體 PGP 替代品。 GnuPG 符合 [RFC 4880](https://tools.ietf.org/html/rfc4880) ,這是目前 OpenPGP 的 IETF 規範。 GnuPG 專案一直致力於 [更新](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) 試圖現代化OpenPGP。 GnuPG 是自由軟體基金會GNU 軟體項目的一部分,並已收到德國政府的重大 [資助](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html)。
[:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary }
[:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://gnupg.org/documentation/index.html){ .card-link title=Documentation}
[:octicons-code-16:](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git){ .card-link title="Source Code" }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain)
- [:simple-windows11: Windows](https://gpg4win.org/download.html)
@ -281,9 +281,9 @@ OpenPGP 有時需要執行特定任務,例如數位簽署和加密電子郵件
!!! recommendation
! [GPG4win logo] (assets/img/encryption-software/gpg4win.svg) {align = right}
![GPG4win logo](assets/img/encryption-software/gpg4win.svg){ align=right }
* * GPG4win * *是[Intevation and g10 Code] (https://gpg4win.org/impressum.html) 的Windows 套件。 它包括[各種工具] (https://gpg4win.org/about.html) ,可協助您在 Microsoft Windows 上使用GPG。 該項目最初由德國聯邦信息安全辦公室 (BSI )於2005年發起並[資助](https://web.archive.org/web/20190425125223/https://joinup.ec.europa.eu/news/government-used-cryptography)。
**GPG4win** 是 [Intevation and g10 Code](https://gpg4win.org/impressum.html) 的Windows 套件。 它包括 [各種工具](https://gpg4win.org/about.html) ,可協助您在 Microsoft Windows 上使用GPG。 該項目最初由德國聯邦信息安全辦公室 (BSI)於2005年發起並 [資助](https://web.archive.org/web/20190425125223/https://joinup.ec.europa.eu/news/government-used-cryptography)。
[:octicons-home-16: Homepage](https://gpg4win.org){ .md-button .md-button--primary }
[:octicons-eye-16:](https://gpg4win.org/privacy-policy.html){ .card-link title="Privacy Policy" }
@ -291,7 +291,7 @@ OpenPGP 有時需要執行特定任務,例如數位簽署和加密電子郵件
[:octicons-code-16:](https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpg4win.git;a=summary){ .card-link title="Source Code" }
[:octicons-heart-16:](https://gpg4win.org/donate.html){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-windows11: Windows](https://gpg4win.org/download.html)
@ -299,22 +299,22 @@ OpenPGP 有時需要執行特定任務,例如數位簽署和加密電子郵件
!!! 備註
我們建議[Canary Mail] (email-clients.md#canary-mail)在iOS裝置上使用PGP和電子郵件。
我們建議 [Canary Mail](email-clients.md#canary-mail) 在iOS裝置上使用PGP和電子郵件。
!!! recommendation
! [GPG Suite logo] (assets/img/encryption-software/gpgsuite.png) {align = right}
![GPG Suite logo](assets/img/encryption-software/gpgsuite.png){ align=right }
* * GPG Suite * *爲 [Apple Mail] (email-clients.md#apple-mail)和macOS 提供OpenPGP 支持。
**GPG Suite** 爲 [Apple Mail](email-clients.md#apple-mail) 和macOS 提供OpenPGP 支持。
我們建議您查看他們的[第一步指南] (https://gpgtools.tenderapp.com/kb/how-to/first-steps-where-do-i-start-where-do-i-begin-setup-gpgtools-create-a-new-key-your-first-encrypted-email)和[使用知識庫] (https://gpgtools.tenderapp.com/kb)以取得支援。
我們建議您查看他們的 [第一步指南](https://gpgtools.tenderapp.com/kb/how-to/first-steps-where-do-i-start-where-do-i-begin-setup-gpgtools-create-a-new-key-your-first-encrypted-email)和 [使用知識庫](https://gpgtools.tenderapp.com/kb) 以取得支援。
[:octicons-home-16: Homepage](https://gpgtools.org){ .md-button .md-button--primary }
[:octicons-eye-16:](https://gpgtools.org/privacy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://gpgtools.tenderapp.com/kb){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/GPGTools){ .card-link title="Source Code" }
??? 下載
??? downloads "下載"
- [:simple-apple: macOS](https://gpgtools.org)
@ -322,16 +322,16 @@ OpenPGP 有時需要執行特定任務,例如數位簽署和加密電子郵件
!!! recommendation
! [OpenKeychain logo] (assets/img/encryption-software/openkeychain.svg) {align = right}
![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right }
* * OpenKeychain * *是 GnuPG 的Android 實作。 郵件客戶端通常需要它,例如[K-9 Mail] email-clients.md#k-9-mail )和 [FairEmail] email-clients.md#fairemail )以及其他 Android 應用程序提供加密支持。 Cure53 於2015年10月完成了 OpenKeychain 3.6 的[安全審核] (https://www.openkeychain.org/openkeychain-3-6)。 審核 OpenKeychain 方案的[技術細節在此](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015)。
**OpenKeychain** 是 GnuPG 的Android 實作。 郵件客戶端通常需要它,例如 [K-9 Mail] email-clients.md#k-9-mail和 [FairEmail]email-clients.md#fairemail)以及其他 Android 應用程序提供加密支持。 Cure53 於2015年10月完成了 OpenKeychain 3.6 的 [安全審核](https://www.openkeychain.org/openkeychain-3-6)。 審核 OpenKeychain 方案的 [技術細節在此](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015)。
[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary }
[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain)
@ -339,9 +339,9 @@ OpenPGP 有時需要執行特定任務,例如數位簽署和加密電子郵件
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! example "此部分是新的"
我們正在努力為這個網站的各個部分建立明確標準,它可能依情況變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為這個網站的各個部分建立明確標準,它可能依情況變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
### 最低合格要求

View File

@ -13,9 +13,9 @@ cover: file-sharing.png
!!! recommendation
! [Send logo] (assets/img/file-sharing-sync/send.svg) {align = right}
![Send logo](assets/img/file-sharing-sync/send.svg){align = right}
* * Send * *是分支自 Mozilla 已停止的 Firefox Send服務它允許您使用鏈接將檔案發送給其他人。 檔案在您的裝置上已加密,因此無法被伺服器讀取,並且它們也可以選擇受密碼保護。 Send 維護者託管[公共實例] (https://send.vis.ee/)。 你可以利用其他公開實例,也可以自行託管 Send。
**Send** 是分支自 Mozilla 已停止的 Firefox Send服務它允許您使用鏈接將檔案發送給其他人。 檔案在您的裝置上已加密,因此無法被伺服器讀取,並且它們也可以選擇受密碼保護。 Send 維護者託管 [公共實例](https://send.vis.ee/)。 你可以利用其他公開實例,也可以自行託管 Send。
[:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary }
[:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"}
@ -33,16 +33,16 @@ ffsend upload --host https://send.vis.ee/ FILE
!!! recommendation
! [OnionShare logo] (assets/img/file-sharing-sync/onionshare.svg) {align = right}
![OnionShare logo](assets/img/file-sharing-sync/onionshare.svg){ align=right }
* * OnionShare * *是一個開源工具,可讓您安全匿名地共享任何大小的檔案。 它的工作原理是啟動可作為 Tor 洋蔥服務訪問的網頁伺服器具有一個無法猜測的URL ,您可以與收件人共享以下載或發送檔案。
**OnionShare** 是一個開源工具,可讓您安全匿名地共享任何大小的檔案。 它的工作原理是啟動可作為 Tor 洋蔥服務訪問的網頁伺服器具有一個無法猜測的URL ,您可以與收件人共享以下載或發送檔案。
[:octicons-home-16: Homepage](https://onionshare.org){ .md-button .md-button--primary }
[:simple-torbrowser:](http://lldan5gahapx5k7iafb3s4ikijc4ni7gx5iywdflkba5y2ezyg6sjgyd.onion){ .card-link title="Onion Service" }
[:octicons-info-16:](https://docs.onionshare.org){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/onionshare/onionshare){ .card-link title="Source Code" }
??? 下載
??? downloads "下載"
- [:simple-windows11: Windows](https://onionshare.org/#download)
- [:simple-apple: macOS](https://onionshare.org/#download)
@ -52,9 +52,9 @@ ffsend upload --host https://send.vis.ee/ FILE
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! example "此部分是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
- 不得將解密的資料儲存在遠端伺服器上。
- 必須是開源軟體。
@ -64,9 +64,9 @@ ffsend upload --host https://send.vis.ee/ FILE
!!! recommendation
! [FreedomBox logo] (assets/img/file-sharing-sync/freedombox.svg) {align = right}
![FreedomBox logo](assets/img/file-sharing-sync/freedombox.svg){ align=right }
* * FreedomBox * *是設計在[單板電腦(SBC)] (https://en.wikipedia.org/wiki/Single-board_computer)上執行的作業系統。 其目的是讓設置自主託管的伺服器應用程式變得容易。
**FreedomBox** 是設計在[單板電腦(SBC)](https://en.wikipedia.org/wiki/Single-board_computer)上執行的作業系統。 其目的是讓設置自主託管的伺服器應用程式變得容易。
[:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary }
[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation}
@ -79,9 +79,9 @@ ffsend upload --host https://send.vis.ee/ FILE
!!! recommendation
! [Nextcloud logo] (assets/img/productivity/nextcloud.svg) {align = right}
![Nextcloud logo](assets/img/productivity/nextcloud.svg){ align=right }
* * Nextcloud * *是一套免費開源用戶端伺服器軟體,可在您控制的私人伺服器上建立自己的檔案託管服務。
**Nextcloud** 是一套免費開源用戶端伺服器軟體,可在您控制的私人伺服器上建立自己的檔案託管服務。
[:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary }
[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" }
@ -89,7 +89,7 @@ ffsend upload --host https://send.vis.ee/ FILE
[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" }
[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102)
@ -99,24 +99,24 @@ ffsend upload --host https://send.vis.ee/ FILE
- [:simple-linux: Linux](https://nextcloud.com/install/#install-clients)
- [:simple-freebsd: FreeBSD](https://www.freshports.org/www/nextcloud)
!!! 危險
!!! danger "危險"
我們不建議使用 Nextcloud [E2EE App] (https://apps.nextcloud.com/apps/end_to_end_encryption) ,因為它可能會導致資料丟失;目前它仍是高度實驗性,未達穩定品質。
我們不建議使用 Nextcloud [E2EE App](https://apps.nextcloud.com/apps/end_to_end_encryption) ,因為它可能會導致資料丟失;目前它仍是高度實驗性,未達穩定品質。
### Syncthing P2P
!!! recommendation
! [Syncthing logo] (assets/img/file-sharing-sync/syncthing.svg) {align = right}
![Syncthing logo](assets/img/file-sharing-sync/syncthing.svg){ align=right }
* * Syncthing * *是一個開源的點對點連續檔案件同步實用程式。 它可用在本地網路或網際網路的多個設備之間同步檔案。 Syncthing 不使用集中式伺服器;它使用 [Block Exchange Protocol] (https://docs.syncthing.net/specs/bep-v1.html # bep-v1)在裝置之間傳輸資料。 所有資料都使用 TLS 加密。
**Syncthing** 是一個開源的點對點連續檔案件同步實用程式。 它可用在本地網路或網際網路的多個設備之間同步檔案。 Syncthing 不使用集中式伺服器;它使用 [Block Exchange Protocol](https://docs.syncthing.net/specs/bep-v1.html#bep-v1) 在裝置之間傳輸資料。 所有資料都使用 TLS 加密。
[:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary }
[:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" }
[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid)
- [:simple-windows11: Windows](https://syncthing.net/downloads/)
@ -130,9 +130,9 @@ ffsend upload --host https://send.vis.ee/ FILE
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! example "此部分是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
#### 最低合格要求

View File

@ -179,7 +179,7 @@ cover: frontends.png
[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" }
[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute }
!!! 警告
!!! warning "警告"
預設情況下, Invidious不會代理影片串流。 通過 Invidious 觀看的影片會直接連接到 Google 伺服器(例如`googlevideo.com` ),但是有些實例支持影片代理-只需在實例設置中啟用*Proxy videos*或在 URL 中添加`&local = true`

View File

@ -211,7 +211,7 @@ Safari 歷史記錄、標籤組、iCloud 標籤分頁和保存密碼的同步都
!!! example "此部分是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
### 最低合格要求

View File

@ -128,9 +128,9 @@ Cryptee 免費提供100MB 的儲存空間,如果需要更多容量,則另有
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! !!! 例如 "本节是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
- 客戶端應是開源的。
- 任何雲端同步都必須是 E2EE。

View File

@ -88,7 +88,7 @@ Android 13:
[Exodus](https://exodus-privacy.eu.org/) 在比較具相似目的的應用程式時可能很有用。 如果某應用程式需要大量權限,並且有很多的廣告和分析,這可能是個壞跡象。 建議查看個別跟蹤器與閱讀其描述而不是只有**計算總數**把所列的項目一視同仁。
!!! 警告
!!! warning "警告"
如果應用程式主要是基於網頁的服務,則跟蹤可能發生在伺服器端。 [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/)顯示「無追蹤器」,但確實會追蹤使用者在網站上的興趣和行為。 應用程式也許無需廣告業的標準代碼庫來逃避檢測,儘管這不太可能。

View File

@ -39,7 +39,7 @@ Qubes OS 利用 [DOM0](https://wiki.xenproject.org/wiki/Dom0) Xen VM 即「Ad
??? info" AppVms沒有自己的檔案系統"
您可以在Qubes之間[複製和移動檔案] (https://www.qubes-os.org/doc/how-to-copy-and-move-files/)。 當這樣做時,不會立即進行更改,並且在發生事故時可以輕鬆撤消。
[您可以在Qubes之間[複製和移動檔案](https://www.qubes-os.org/doc/how-to-copy-and-move-files/)。 當這樣做時,不會立即進行更改,並且在發生事故時可以輕鬆撤消。
### 虛擬機之間交互

View File

@ -222,9 +222,9 @@ Psono為其產品提供廣泛的文檔。 Psono 的網頁用戶端可以自行
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! !!! 例如 "本节是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
#### 最低合格要求
@ -336,8 +336,8 @@ KeePassXC 將其匯出數據存儲為 [CSV](https://en.wikipedia.org/wiki/Comma-
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! !!! 例如 "本节是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
- 需為跨平臺。

View File

@ -13,9 +13,9 @@ cover: productivity.png
!!! recommendation
! [Nextcloud logo] (assets/img/productivity/nextcloud.svg) {align = right}
![Nextcloud logo](assets/img/productivity/nextcloud.svg){ align=right }
* * Nextcloud * *是一套免費開源用戶端伺服器軟體,可在您控制的私人伺服器上建立自己的檔案託管服務。
**Nextcloud** 是一套免費開源用戶端伺服器軟體,可在您控制的私人伺服器上建立自己的檔案託管服務。
[:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary }
[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" }
@ -23,7 +23,7 @@ cover: productivity.png
[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" }
[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute }
??? 下載
??? downloads "下載"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102)
@ -33,9 +33,9 @@ cover: productivity.png
- [:simple-linux: Linux](https://nextcloud.com/install/#install-clients)
- [:simple-freebsd: FreeBSD](https://www.freshports.org/www/nextcloud)
!!! 危險
!!! danger "危險"
我們不建議使用 Nextcloud [E2EE App] (https://apps.nextcloud.com/apps/end_to_end_encryption) ,因為它可能會導致資料丟失;目前它仍是高度實驗性,未達穩定品質。 因此我們不推薦第三方Nextcloud提供商。
我們不建議使用 Nextcloud [E2EE App](https://apps.nextcloud.com/apps/end_to_end_encryption) ,因為它可能會導致資料丟失;目前它仍是高度實驗性,未達穩定品質。 因此我們不推薦第三方Nextcloud提供商。
### CryptPad
@ -55,9 +55,9 @@ cover: productivity.png
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! !!! 例如 "本节是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
一般來說我們將協作平臺定義為成熟的套件可以合理地替代Google Drive 等協作平臺。
@ -128,9 +128,9 @@ cover: productivity.png
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! !!! 例如 "本节是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
一般來說,我們將辦公套件定義為可以合理地替代 Microsoft Word 以滿足大多數需求的應用程式。
@ -159,9 +159,9 @@ cover: productivity.png
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! !!! 例如 "本节是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
#### 最低合格要求

View File

@ -103,7 +103,7 @@ Briar 使用 Bramble [Handshake](https://code.briarproject.org/briar/briar-spec/
## 額外選項
!!! 警告
!!! warning "警告"
這些通訊軟體沒有 Perfect [Forward Secrecy] (https://zh.wikipedia.org/wiki/Forward_secrecy) (PFS) ,雖然他們滿足了我們推薦產品所無法滿足的某些需求,但不建議長期使用或用在敏感通訊。 訊息收件人之間的任何密鑰洩露都會影響* *所有* *過去通信的機密性。
@ -182,9 +182,9 @@ Session [白皮書](https://arxiv.org/pdf/2002.04609.pdf) ,描述了應用程
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! !!! 例如 "本节是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
- 一定要有開源客戶端。

View File

@ -81,7 +81,7 @@ SearXNG 是您和它所聚合的搜尋引擎之間的代理。 您的搜尋查
[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
!!! 警告
!!! warning "警告"
Startpage 定期限制服務對某些 IP位址的存取例如為 VPN 或Tor 保留的IP。 [DuckDuckGo](#duckduckgo)和[Brave Search] (#brave-search)是更友好的選項如果您的威脅模型需要向搜索提供商隱藏您的IP位址。
@ -96,9 +96,9 @@ Startpage 大股東是System1它是一家廣告技術公司。 我們不認
**請注意,我們所推薦專案沒有任何瓜葛。 ** 除了 [標準準則](about/criteria.md)外,我們還發展出一套明確要求以提出客觀建議。 我們建議您在選擇使用項目之前先熟悉此列表,並進行自己的研究,以確保它是您的正確選擇。
!!! 示例“此部分是新的
!!! !!! 例如 "本节是新的"
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在[論壇上提問] (https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。
我們正在努力為我們網站的每個部分建立定義的標準,這可能會有所變化。 如果您對我們的標準有任何疑問,請在 [論壇上提問](https://discuss.privacyguides.net/latest) ,如果沒有列出,請不要認為我們在提出建議時沒有考慮到某些事情。 當我們推薦一個項目時,有許多因素被考慮和討論,記錄每一個項目都是正在進行式。