Compare commits
228 Commits
Author | SHA1 | Date | |
---|---|---|---|
e9a7b27cf2 | |||
278c462466
|
|||
96da882689
|
|||
1487ad6dca | |||
522c5e92ef | |||
6849228388 | |||
472ab56d50 | |||
d8c8a631ee | |||
c23c06c11b | |||
2ddb046a4b | |||
1a8fda242e | |||
92d5d9d1ac | |||
e356ae9212 | |||
ef7bd365cc | |||
8c69fa78d0 | |||
87b1377e85 | |||
94da846afc | |||
42c1611420 | |||
caae79bea2 | |||
fde6019469 | |||
cc077e63c8
|
|||
ff60d624fc
|
|||
f3144efeb2
|
|||
0faf548111
|
|||
60c7a0970f | |||
3daeea597d | |||
972df273e1 | |||
b8b62c18df | |||
e09e35dfdf
|
|||
90a96896a7 | |||
8b09671052
|
|||
f439e0be46
|
|||
7220531861 | |||
72166bb3f1 | |||
2998c52d7c | |||
c19c1599cb | |||
d47c737a73 | |||
5f45dd9147 | |||
57056566b4 | |||
42fe93a194 | |||
b42e62e822 | |||
6cdd3ed34b | |||
93462d6ea7
|
|||
3016dc4bc8 | |||
ef990bf0f2 | |||
ad94d0ebe9 | |||
186e7a2b47 | |||
fa2ed271ef | |||
97ed4c7279 | |||
65a4e306eb | |||
7de8b90cb0 | |||
c5d14debd1 | |||
a2b1f8adf9 | |||
ca6236da58
|
|||
a5c761c237
|
|||
86f8fda8a5 | |||
fe0f0d1ce3
|
|||
18f76a9068
|
|||
e41d5eae11
|
|||
d03114fd33
|
|||
b1fcc23d0f
|
|||
3d2d6fb726
|
|||
32969c9fc5 | |||
31f3319951
|
|||
70366045d5 | |||
8c438b8183 | |||
2df3405598
|
|||
ebfb448ed2
|
|||
fc12732e93 | |||
0e457065a0 | |||
b074ed9401
|
|||
b4804752e1 | |||
4c805daa7e
|
|||
416f468a20 | |||
1f6dfc4e6f | |||
4847c25066 | |||
6582156917
|
|||
e29ed5de35
|
|||
09b4799dbf
|
|||
d1c4abcd4f | |||
77c073c602 | |||
d25b4021d5
|
|||
37632d93ec | |||
321eccb7d6
|
|||
aefa3e75c4
|
|||
8fc748109d
|
|||
7b75ad0514 | |||
a88689fb43 | |||
3f5bbbd492
|
|||
3499498be7 | |||
1bde6c2920 | |||
14b2f975e2 | |||
29658d1d98 | |||
3e7d6c6ac2 | |||
60f0a8df9f
|
|||
9112720140
|
|||
c99bdda06f
|
|||
3849c523ef
|
|||
9e35e2ef8a | |||
5bad28ff6d | |||
3955114451 | |||
d2316dd782 | |||
99618de520 | |||
5c41b3c2f2 | |||
ac8c5a30d1 | |||
45bfe22c61 | |||
65db9d3fee
|
|||
f3f092d1a3
|
|||
35c95c029c
|
|||
7fb07925ec
|
|||
dc4199d7c4 | |||
fda35b5f70
|
|||
9e16a63caa | |||
47377df8da
|
|||
28c576110c
|
|||
d63dc04aff
|
|||
e336699480
|
|||
aaec10b83e
|
|||
9cbebf239b
|
|||
97350b6245
|
|||
f0621e257b | |||
1ac4dd75c7
|
|||
4c8cd3f295
|
|||
bfaba1cd11 | |||
66efe4a27f
|
|||
657e977074 | |||
f516235dd4
|
|||
cc696093ce
|
|||
4da25bc39a
|
|||
6245ed8581
|
|||
d9b9092ac3
|
|||
7a6fc90114
|
|||
ef7cf862d4
|
|||
f396afa15f
|
|||
227609f768
|
|||
425914a33d | |||
131f91ad56 | |||
9b008f2b76 | |||
2a4947bd72 | |||
829883c450 | |||
e52286a1b0 | |||
2a85daa3fa | |||
052671197b
|
|||
f6ca66bbb4
|
|||
d03f91b1c0
|
|||
74928bb4c7 | |||
7b6a158e4d | |||
2150385184
|
|||
561f6a7463
|
|||
23b7effac9 | |||
1cd29c6972 | |||
ebf28c2b35 | |||
3498602fdd | |||
7c6ebc5ebb | |||
d011fe716e | |||
428121c0c7 | |||
3361de1705
|
|||
242894c291
|
|||
d67dcaea11
|
|||
e901d0db22 | |||
815739b7bc | |||
1b9d8f9c14 | |||
70a6cda9d5
|
|||
e6f6498908
|
|||
687a36e7db
|
|||
94fa083700
|
|||
752db84b86
|
|||
d5a732e08c
|
|||
2746861567
|
|||
f4f28ce821
|
|||
b0ce8cea24 | |||
43cdf87ad3
|
|||
9782ddf60f | |||
8ffa8207ff | |||
ff30001aff
|
|||
145e0af811 | |||
e91f63045d | |||
790293b792 | |||
d4f1195bb3 | |||
e4d89b0894 | |||
a9a7864889 | |||
d6bab0c4f8 | |||
27fe6a4c41 | |||
bd1ff328a7 | |||
64d736a7ef | |||
a1e40a79ba | |||
baece71b49 | |||
f5910c4b2b | |||
d35437cafa | |||
41bb717191 | |||
fdb59b32b9 | |||
c1f8a1e00c | |||
070a9b157c | |||
a17363080e | |||
f714a82d84 | |||
3efe31dc29 | |||
670331bcd9 | |||
bd5506bab8 | |||
eb2fd3bccb | |||
478c2cee3b | |||
dd96ff1b56 | |||
2c61157cbc | |||
a110fb0489 | |||
b66845af14 | |||
39f67789c4 | |||
603bec291e | |||
80f1e8ca51 | |||
fa9faa5648 | |||
95126762a6 | |||
0d597160cf | |||
dc0cd7d35f | |||
10812ede81 | |||
53b2c2af89 | |||
78e0cf7a42 | |||
0c2b119089 | |||
22572e096f | |||
41215f7433 | |||
750b73c589 | |||
2edd012619 | |||
2172eab26a | |||
724b70ae51 | |||
b9937e8630 | |||
303bf1aff6 | |||
ba435096f3 | |||
3ae6f80797 | |||
67535a820c | |||
c7ff34b330 | |||
703c291ba3 |
1
.cache/plugin/social/fonts/Bagnard/Bold.woff
Symbolic link
@ -0,0 +1 @@
|
|||||||
|
../../../../../theme/assets/brand/WOFF/bagnard/Bagnard.woff
|
20
.gitattributes
vendored
@ -1,3 +1,23 @@
|
|||||||
|
# Copyright (c) 2020-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
# Auto detect text files and perform LF normalization
|
# Auto detect text files and perform LF normalization
|
||||||
* text=auto
|
* text=auto
|
||||||
|
|
||||||
|
20
.github/CODEOWNERS
vendored
@ -1,3 +1,23 @@
|
|||||||
|
# Copyright (c) 2019-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
# Additional Co-Owners are added to the TOP of this file
|
# Additional Co-Owners are added to the TOP of this file
|
||||||
|
|
||||||
# High-traffic pages
|
# High-traffic pages
|
||||||
|
@ -1,8 +0,0 @@
|
|||||||
---
|
|
||||||
name: "Content Correction"
|
|
||||||
about: Report any inaccurate, incorrect, or outdated information on the website.
|
|
||||||
---
|
|
||||||
|
|
||||||
## Description
|
|
||||||
|
|
||||||
**URL of affected page:**
|
|
66
.github/ISSUE_TEMPLATE/1_Content_Correction.yml
vendored
Normal file
@ -0,0 +1,66 @@
|
|||||||
|
# Copyright (c) 2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
|
name: "Content Correction"
|
||||||
|
description: Report any inaccurate, incorrect, or outdated information on the website.
|
||||||
|
labels: ["t:correction"]
|
||||||
|
body:
|
||||||
|
|
||||||
|
- type: markdown
|
||||||
|
attributes:
|
||||||
|
value: |
|
||||||
|
This form is for reporting verifiable issues with our website.
|
||||||
|
If you simply disagree with an opinion on the website, please open a discussion [on our forum](https://discuss.privacyguides.net/) instead.
|
||||||
|
|
||||||
|
- type: input
|
||||||
|
attributes:
|
||||||
|
label: Affected page
|
||||||
|
description: Please let us know which page the incorrect information can be found on.
|
||||||
|
placeholder: "https://www.privacyguides.org/en/data-redaction/"
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
|
||||||
|
- type: textarea
|
||||||
|
id: description
|
||||||
|
attributes:
|
||||||
|
label: Description
|
||||||
|
description: Please let us know what should be fixed.
|
||||||
|
placeholder: The Google Play Store link for ExifEraser is broken...
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
|
||||||
|
- type: textarea
|
||||||
|
id: source
|
||||||
|
attributes:
|
||||||
|
label: Sources
|
||||||
|
description: Please provide reliable sources that support the change you are requesting.
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
|
||||||
|
- type: checkboxes
|
||||||
|
id: checklist
|
||||||
|
attributes:
|
||||||
|
label: Before submitting
|
||||||
|
description: The Code of Conduct helps create a safe space for everyone. We require that everyone agrees to it.
|
||||||
|
options:
|
||||||
|
- label: I am reporting something that is verifiably incorrect, not a suggestion or opinion.
|
||||||
|
required: true
|
||||||
|
- label: I agree to the [Community Code of Conduct](https://www.privacyguides.org/en/code_of_conduct/).
|
||||||
|
required: true
|
15
.github/ISSUE_TEMPLATE/2_Website_Issues.md
vendored
@ -1,15 +0,0 @@
|
|||||||
---
|
|
||||||
name: "Website Issue"
|
|
||||||
about: Report a bug with the website. (NO CONTENT ISSUES)
|
|
||||||
---
|
|
||||||
|
|
||||||
<!--
|
|
||||||
|
|
||||||
READ ME FIRST:
|
|
||||||
This is NOT the place to request changes to the content of the website.
|
|
||||||
This is NOT the place to report issues with our services like Matrix.
|
|
||||||
This is ONLY for reporting bugs or technical issues with www.privacyguides.org, the website.
|
|
||||||
|
|
||||||
Please add screenshots if applicable.
|
|
||||||
|
|
||||||
-->
|
|
101
.github/ISSUE_TEMPLATE/2_Website_Issues.yml
vendored
Normal file
@ -0,0 +1,101 @@
|
|||||||
|
# Copyright (c) 2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
|
name: "Website Issue"
|
||||||
|
description: Report a bug with the website.
|
||||||
|
labels: ["t:bug"]
|
||||||
|
assignees:
|
||||||
|
- jonaharagon
|
||||||
|
body:
|
||||||
|
|
||||||
|
- type: markdown
|
||||||
|
attributes:
|
||||||
|
value: |
|
||||||
|
This form is only for reporting a technical bug __with our website__, like broken images, broken CSS, issues with search or themes, etc.
|
||||||
|
This is not the place to report an issue with Matrix, Discourse, or our other hosted services.
|
||||||
|
|
||||||
|
If you want us to fix inaccurate information on the website, go back and use the content correction form.
|
||||||
|
If you want to make another suggestion, please [use our discussion forum](https://discuss.privacyguides.net/) instead.
|
||||||
|
|
||||||
|
- type: textarea
|
||||||
|
id: description
|
||||||
|
attributes:
|
||||||
|
label: Bug description
|
||||||
|
description: |
|
||||||
|
Please give a detailed description of the bug.
|
||||||
|
Explain how the website does not behave as you would expect it to, and be as specific as possible.
|
||||||
|
If you have found a workaround or a fix for the problem too, please let us know.
|
||||||
|
validations:
|
||||||
|
required: true
|
||||||
|
|
||||||
|
- type: textarea
|
||||||
|
id: affected-pages
|
||||||
|
attributes:
|
||||||
|
label: Affected pages
|
||||||
|
description: |
|
||||||
|
Please list all pages where you've noticed this issue, or let us know if it affects every page on the site.
|
||||||
|
value: |
|
||||||
|
-
|
||||||
|
|
||||||
|
- type: dropdown
|
||||||
|
id: browser
|
||||||
|
attributes:
|
||||||
|
label: Browser
|
||||||
|
description: |
|
||||||
|
Please select the browser(s) you have noticed this issue with.
|
||||||
|
If your browser is not listed or the version is relevant, you may select _Other_ and provide more details in the description above.
|
||||||
|
multiple: true
|
||||||
|
options:
|
||||||
|
- Firefox
|
||||||
|
- Tor Browser
|
||||||
|
- Chrome
|
||||||
|
- Safari
|
||||||
|
- Edge
|
||||||
|
- Other
|
||||||
|
|
||||||
|
- type: dropdown
|
||||||
|
id: os
|
||||||
|
attributes:
|
||||||
|
label: Operating System
|
||||||
|
description: |
|
||||||
|
Please select the operating system(s) you have noticed this issue with.
|
||||||
|
multiple: true
|
||||||
|
options:
|
||||||
|
- Linux
|
||||||
|
- macOS
|
||||||
|
- Windows
|
||||||
|
- Android
|
||||||
|
- iOS
|
||||||
|
- Other
|
||||||
|
|
||||||
|
- type: checkboxes
|
||||||
|
id: checklist
|
||||||
|
attributes:
|
||||||
|
label: Before submitting
|
||||||
|
description: The Code of Conduct helps create a safe space for everyone. We require that everyone agrees to it.
|
||||||
|
options:
|
||||||
|
- label: I am reporting something that is broken on the website, not making a suggestion.
|
||||||
|
required: true
|
||||||
|
- label: I agree to the [Community Code of Conduct](https://www.privacyguides.org/en/code_of_conduct/).
|
||||||
|
required: true
|
||||||
|
|
||||||
|
- type: markdown
|
||||||
|
attributes:
|
||||||
|
value: Thank you for letting us know about this!
|
32
.github/ISSUE_TEMPLATE/config.yml
vendored
@ -1,12 +1,36 @@
|
|||||||
|
# Copyright (c) 2020-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
|
blank_issues_enabled: false
|
||||||
contact_links:
|
contact_links:
|
||||||
- name: Suggest a New Provider or Software
|
- name: Suggest Adding or Removing a Tool
|
||||||
url: https://discuss.privacyguides.org/c/suggestions
|
url: https://discuss.privacyguides.net/c/site-development/suggestions
|
||||||
about: Suggest something new for us to look at, or something we should remove.
|
about: Suggest something new for us to look at, or something we should remove.
|
||||||
|
- name: Suggest a New Guide
|
||||||
|
url: https://discuss.privacyguides.net/c/site-development/guide-suggestions
|
||||||
|
about: Suggest an area where you think guidance might be required.
|
||||||
- name: Ask a Question
|
- name: Ask a Question
|
||||||
url: https://discuss.privacyguides.org/c/questions
|
url: https://discuss.privacyguides.net/c/privacy/questions
|
||||||
about: Let us know if something doesn't make sense!
|
about: Let us know if something doesn't make sense!
|
||||||
- name: Share an Idea
|
- name: Share an Idea
|
||||||
url: https://discuss.privacyguides.org/c/site-development
|
url: https://discuss.privacyguides.net/c/site-development
|
||||||
about: Suggest a new feature/section/page or anything else for the website.
|
about: Suggest a new feature/section/page or anything else for the website.
|
||||||
- name: Report a Translation Issue
|
- name: Report a Translation Issue
|
||||||
url: https://crowdin.com/project/privacyguides/discussions
|
url: https://crowdin.com/project/privacyguides/discussions
|
||||||
|
20
.github/PULL_REQUEST_TEMPLATE.md
vendored
@ -1,31 +1,23 @@
|
|||||||
|
Changes proposed in this PR:
|
||||||
|
|
||||||
|
-
|
||||||
|
|
||||||
<!-- SCROLL TO BOTTOM TO AGREE!:
|
<!-- SCROLL TO BOTTOM TO AGREE!:
|
||||||
Please use a descriptive title for your PR, it will be included in our changelog!
|
Please use a descriptive title for your PR, it will be included in our changelog!
|
||||||
|
|
||||||
Please share with us what you've changed.
|
|
||||||
If you are adding a software recommendation, give us a link to its website or
|
|
||||||
source code.
|
|
||||||
|
|
||||||
If you are making changes that you have a conflict of interest with, please
|
If you are making changes that you have a conflict of interest with, please
|
||||||
disclose this as well (this does not disqualify your PR by any means):
|
disclose this as well (this does not disqualify your PR by any means):
|
||||||
|
|
||||||
Conflict of interest contributions involve contributing about yourself,
|
Conflict of interest contributions involve contributing about yourself,
|
||||||
family, friends, clients, employers, or your financial and other relationships.
|
family, friends, clients, employers, or your financial and other relationships.
|
||||||
Any external relationship can trigger a conflict of interest.
|
Any external relationship can trigger a conflict of interest.
|
||||||
|
|
||||||
That someone has a conflict of interest is a description of a situation,
|
|
||||||
NOT a judgement about that person's opinions, integrity, or good faith.
|
|
||||||
|
|
||||||
If you have a conflict of interest, you MUST disclose who is paying you for
|
|
||||||
this contribution, who the client is (if for example, you are being paid by
|
|
||||||
an advertising agency), and any other relevant affiliations.
|
|
||||||
-->
|
-->
|
||||||
|
|
||||||
<!-- Place an x in the boxes below, like: [x] -->
|
<!-- Place an x in the boxes below, like: [x] -->
|
||||||
- [ ] Please check this box to confirm you have disclosed any relevant conflicts of interest in your post.
|
- [ ] I have disclosed any relevant conflicts of interest in my post.
|
||||||
- [ ] Please check this box to confirm your agreement to grant Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform, relicense, and distribute your contribution as part of our project.
|
- [ ] I agree to grant Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform, relicense, and distribute my contribution as part of this project.
|
||||||
- [ ] Please check this box to confirm you are the sole author of this work, or that any additional authors will also reply to this PR on GitHub confirming their agreement to these terms.
|
- [ ] I am the sole author of this work. <!-- Do not check this box if you are not -->
|
||||||
|
- [ ] I agree to the [Community Code of Conduct](https://www.privacyguides.org/en/code_of_conduct/).
|
||||||
|
|
||||||
<!-- What's this? When you submit a PR, you keep the Copyright for the work you
|
<!-- What's this? When you submit a PR, you keep the Copyright for the work you
|
||||||
are contributing. We need you to agree to the above terms in order for us to
|
are contributing. We need you to agree to the above terms in order for us to
|
||||||
|
43
.github/dependabot.yml
vendored
@ -1,5 +1,33 @@
|
|||||||
|
# Copyright (c) 2021-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
version: 2
|
version: 2
|
||||||
|
|
||||||
|
registries:
|
||||||
|
|
||||||
|
github-privacyguides:
|
||||||
|
type: git
|
||||||
|
url: https://github.com
|
||||||
|
username: x-access-token
|
||||||
|
password: ${{secrets.REPO_PAT}}
|
||||||
|
|
||||||
updates:
|
updates:
|
||||||
|
|
||||||
# Maintain dependencies for GitHub Actions
|
# Maintain dependencies for GitHub Actions
|
||||||
@ -13,12 +41,23 @@ updates:
|
|||||||
- "jonaharagon"
|
- "jonaharagon"
|
||||||
labels:
|
labels:
|
||||||
- "fix:github_actions"
|
- "fix:github_actions"
|
||||||
|
|
||||||
|
# Maintain submodules
|
||||||
|
- package-ecosystem: "gitsubmodule"
|
||||||
|
directory: "/"
|
||||||
|
registries:
|
||||||
|
- github-privacyguides
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
|
labels:
|
||||||
|
- "fix:submodules"
|
||||||
|
|
||||||
# Maintain dependencies for pipenv
|
# Maintain dependencies for pipenv
|
||||||
- package-ecosystem: "pip"
|
- package-ecosystem: "pip"
|
||||||
directory: "/"
|
directory: "/"
|
||||||
ignore:
|
insecure-external-code-execution: allow
|
||||||
- dependency-name: "mkdocs-material"
|
registries:
|
||||||
|
- github-privacyguides
|
||||||
schedule:
|
schedule:
|
||||||
interval: "daily"
|
interval: "daily"
|
||||||
assignees:
|
assignees:
|
||||||
|
51
.github/workflows/crowdin-upload.yml
vendored
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
# Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
|
name: 💬 Crowdin Upload
|
||||||
|
|
||||||
|
on:
|
||||||
|
workflow_dispatch:
|
||||||
|
push:
|
||||||
|
branches: [ main ]
|
||||||
|
|
||||||
|
concurrency:
|
||||||
|
group: ${{ github.workflow }}-${{ github.ref }}
|
||||||
|
cancel-in-progress: true
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
synchronize-with-crowdin:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
|
||||||
|
steps:
|
||||||
|
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@v3
|
||||||
|
|
||||||
|
- name: crowdin action
|
||||||
|
uses: crowdin/github-action@v1.11.0
|
||||||
|
with:
|
||||||
|
upload_sources: true
|
||||||
|
upload_sources_args: '--auto-update --delete-obsolete'
|
||||||
|
download_translations: false
|
||||||
|
config: crowdin.yml
|
||||||
|
env:
|
||||||
|
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
CROWDIN_PROJECT_ID: ${{ secrets.CROWDIN_PROJECT_ID }}
|
||||||
|
CROWDIN_PERSONAL_TOKEN: ${{ secrets.CROWDIN_PERSONAL_TOKEN }}
|
28
.github/workflows/crowdin.yml
vendored
@ -1,28 +0,0 @@
|
|||||||
name: 💬 Crowdin Upload
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_dispatch:
|
|
||||||
release:
|
|
||||||
types: [published]
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
synchronize-with-crowdin:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
|
|
||||||
steps:
|
|
||||||
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@v3
|
|
||||||
|
|
||||||
- name: crowdin action
|
|
||||||
uses: crowdin/github-action@1.5.1
|
|
||||||
with:
|
|
||||||
upload_sources: true
|
|
||||||
upload_sources_args: '--auto-update --delete-obsolete'
|
|
||||||
upload_translations: false
|
|
||||||
download_translations: false
|
|
||||||
config: crowdin.yml
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
CROWDIN_PROJECT_ID: ${{ secrets.CROWDIN_PROJECT_ID }}
|
|
||||||
CROWDIN_PERSONAL_TOKEN: ${{ secrets.CROWDIN_PERSONAL_TOKEN }}
|
|
20
.github/workflows/mirror.yml
vendored
@ -1,3 +1,23 @@
|
|||||||
|
# Copyright (c) 2022 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
name: 🪞 Push to Mirrors
|
name: 🪞 Push to Mirrors
|
||||||
|
|
||||||
on: [ push, delete, create ]
|
on: [ push, delete, create ]
|
||||||
|
39
.github/workflows/pages.yml
vendored
@ -1,3 +1,23 @@
|
|||||||
|
# Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
name: 🛠️ Deploy to GitHub Pages
|
name: 🛠️ Deploy to GitHub Pages
|
||||||
|
|
||||||
on:
|
on:
|
||||||
@ -11,7 +31,7 @@ concurrency:
|
|||||||
cancel-in-progress: true
|
cancel-in-progress: true
|
||||||
|
|
||||||
env:
|
env:
|
||||||
PYTHON_VERSION: 3.x
|
PYTHON_VERSION: 3.8
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build:
|
build:
|
||||||
@ -23,21 +43,19 @@ jobs:
|
|||||||
uses: actions/checkout@v3
|
uses: actions/checkout@v3
|
||||||
with:
|
with:
|
||||||
fetch-depth: '0'
|
fetch-depth: '0'
|
||||||
ref: ${{github.event.pull_request.head.ref}}
|
|
||||||
repository: ${{github.event.pull_request.head.repo.full_name}}
|
|
||||||
ssh-key: ${{ secrets.ACTIONS_SSH_KEY }}
|
ssh-key: ${{ secrets.ACTIONS_SSH_KEY }}
|
||||||
submodules: 'true'
|
submodules: 'true'
|
||||||
|
|
||||||
- name: Pages setup
|
- name: Pages setup
|
||||||
uses: actions/configure-pages@v2
|
uses: actions/configure-pages@v3
|
||||||
|
|
||||||
- name: Python setup
|
- name: Python setup
|
||||||
uses: actions/setup-python@v4
|
uses: actions/setup-python@v4
|
||||||
with:
|
with:
|
||||||
python-version: '3.10'
|
python-version: '3.8'
|
||||||
|
|
||||||
- name: Cache files
|
- name: Cache files
|
||||||
uses: actions/cache@v3.0.11
|
uses: actions/cache@v3.3.1
|
||||||
with:
|
with:
|
||||||
key: ${{ github.ref }}
|
key: ${{ github.ref }}
|
||||||
path: .cache
|
path: .cache
|
||||||
@ -52,15 +70,8 @@ jobs:
|
|||||||
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
CARDS: true
|
CARDS: true
|
||||||
run: |
|
run: |
|
||||||
pipenv run mkdocs build --config-file mkdocs.production.yml
|
pipenv run mkdocs build --config-file config/mkdocs.en.yml
|
||||||
mv .well-known site/
|
|
||||||
pipenv run mkdocs --version
|
pipenv run mkdocs --version
|
||||||
|
|
||||||
- name: Matrix homeserver configuration
|
|
||||||
run: |
|
|
||||||
mkdir -p site/.well-known/matrix
|
|
||||||
curl -o site/.well-known/matrix/server https://matrix.privacyguides.org/.well-known/matrix/server
|
|
||||||
curl -o site/.well-known/matrix/client https://matrix.privacyguides.org/.well-known/matrix/client
|
|
||||||
|
|
||||||
- name: Package website
|
- name: Package website
|
||||||
uses: actions/upload-pages-artifact@v1
|
uses: actions/upload-pages-artifact@v1
|
||||||
|
131
.github/workflows/release.yml
vendored
@ -1,3 +1,23 @@
|
|||||||
|
# Copyright (c) 2021-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
name: 📦 Releases
|
name: 📦 Releases
|
||||||
|
|
||||||
on:
|
on:
|
||||||
@ -6,14 +26,117 @@ on:
|
|||||||
- '*'
|
- '*'
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
release:
|
production:
|
||||||
name: Create Release
|
name: Push release to production
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
permissions:
|
permissions:
|
||||||
contents: write
|
contents: write
|
||||||
|
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v3
|
- name: Checkout repository
|
||||||
- uses: ncipollo/release-action@v1
|
uses: actions/checkout@v3
|
||||||
|
with:
|
||||||
|
fetch-depth: '0'
|
||||||
|
ssh-key: ${{ secrets.ACTIONS_SSH_KEY }}
|
||||||
|
submodules: 'true'
|
||||||
|
|
||||||
|
- name: Push to production branch
|
||||||
|
run: |
|
||||||
|
git push origin HEAD:production
|
||||||
|
|
||||||
|
build:
|
||||||
|
name: Create release packages
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- name: Checkout repository
|
||||||
|
uses: actions/checkout@v3
|
||||||
|
with:
|
||||||
|
fetch-depth: '0'
|
||||||
|
ssh-key: ${{ secrets.ACTIONS_SSH_KEY }}
|
||||||
|
submodules: 'true'
|
||||||
|
|
||||||
|
- name: Pages setup
|
||||||
|
uses: actions/configure-pages@v3
|
||||||
|
|
||||||
|
- name: Python setup
|
||||||
|
uses: actions/setup-python@v4
|
||||||
|
with:
|
||||||
|
python-version: '3.8'
|
||||||
|
|
||||||
|
- name: Cache files
|
||||||
|
uses: actions/cache@v3.3.1
|
||||||
|
with:
|
||||||
|
key: ${{ github.ref }}
|
||||||
|
path: .cache
|
||||||
|
|
||||||
|
- name: Install Python dependencies
|
||||||
|
run: |
|
||||||
|
pip install pipenv
|
||||||
|
pipenv install
|
||||||
|
|
||||||
|
- name: Build website
|
||||||
|
env:
|
||||||
|
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
CARDS: true
|
||||||
|
run: |
|
||||||
|
pipenv run mkdocs build --config-file config/mkdocs-offline.yml
|
||||||
|
pipenv run mkdocs --version
|
||||||
|
|
||||||
|
- name: Package website
|
||||||
|
run: |
|
||||||
|
tar -czvf offline.tar.gz site
|
||||||
|
zip -r -q offline.zip site
|
||||||
|
|
||||||
|
- name: Upload tar.gz file
|
||||||
|
uses: actions/upload-artifact@v3
|
||||||
|
with:
|
||||||
|
name: offline.tar.gz
|
||||||
|
path: offline.tar.gz
|
||||||
|
|
||||||
|
- name: Upload zip file
|
||||||
|
uses: actions/upload-artifact@v3
|
||||||
|
with:
|
||||||
|
name: offline.zip
|
||||||
|
path: offline.zip
|
||||||
|
|
||||||
|
- name: Create ZIM File
|
||||||
|
uses: addnab/docker-run-action@v3
|
||||||
|
with:
|
||||||
|
image: ghcr.io/openzim/zim-tools:3.1.3
|
||||||
|
options: -v ${{ github.workspace }}:/data
|
||||||
|
run: |
|
||||||
|
zimwriterfs -w index.html -I assets/brand/PNG/Square/pg-yellow.png -l eng -t "Privacy Guides" -d "Your central privacy and security resource to protect yourself online." -c "Privacy Guides" -p "Jonah Aragon" -n "Privacy Guides" -e "https://github.com/privacyguides/privacyguides.org" /data/site /data/privacy_guides.zim
|
||||||
|
|
||||||
|
- name: Upload ZIM file
|
||||||
|
uses: actions/upload-artifact@v3
|
||||||
|
with:
|
||||||
|
name: privacy_guides.zim
|
||||||
|
path: privacy_guides.zim
|
||||||
|
|
||||||
|
release:
|
||||||
|
name: Create release notes
|
||||||
|
needs: build
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
permissions:
|
||||||
|
contents: write
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- uses: actions/download-artifact@v3
|
||||||
|
with:
|
||||||
|
name: offline.tar.gz
|
||||||
|
|
||||||
|
- uses: actions/download-artifact@v3
|
||||||
|
with:
|
||||||
|
name: offline.zip
|
||||||
|
|
||||||
|
- uses: actions/download-artifact@v3
|
||||||
|
with:
|
||||||
|
name: privacy_guides.zim
|
||||||
|
|
||||||
|
- name: Create release notes
|
||||||
|
uses: ncipollo/release-action@v1
|
||||||
with:
|
with:
|
||||||
generateReleaseNotes: true
|
generateReleaseNotes: true
|
||||||
token: ${{ secrets.REPO_TOKEN }}
|
token: ${{ secrets.REPO_TOKEN }}
|
||||||
|
artifacts: "offline.zip,offline.tar.gz,privacy_guides.zim"
|
||||||
|
22
.gitignore
vendored
@ -1,2 +1,22 @@
|
|||||||
site
|
site
|
||||||
.cache
|
/i18n/
|
||||||
|
/includes/*
|
||||||
|
!/includes/*.en.*
|
||||||
|
/static/i18n/*
|
||||||
|
!/static/i18n/*.en.*
|
||||||
|
/theme/overrides/*
|
||||||
|
!/theme/overrides/*.en.*
|
||||||
|
# include Bagnard font in social card
|
||||||
|
# (not available in Google Fonts)
|
||||||
|
# ridiculous hide-and-seek https://stackoverflow.com/a/72380673
|
||||||
|
/.cache/*
|
||||||
|
!/.cache/plugin
|
||||||
|
/.cache/plugin/*
|
||||||
|
!/.cache/plugin/social
|
||||||
|
/.cache/plugin/social/*
|
||||||
|
!/.cache/plugin/social/fonts
|
||||||
|
/.cache/plugin/social/fonts/*
|
||||||
|
!/.cache/plugin/social/fonts/Bagnard
|
||||||
|
|
||||||
|
# Local Netlify folder
|
||||||
|
.netlify
|
||||||
|
10
.gitmodules
vendored
@ -1,6 +1,6 @@
|
|||||||
[submodule "mkdocs-material-insiders"]
|
[submodule "theme/assets/brand"]
|
||||||
path = mkdocs-material
|
path = theme/assets/brand
|
||||||
url = git@github.com:privacyguides/mkdocs-material-insiders.git
|
|
||||||
[submodule "docs/assets/brand"]
|
|
||||||
path = docs/assets/brand
|
|
||||||
url = https://github.com/privacyguides/brand.git
|
url = https://github.com/privacyguides/brand.git
|
||||||
|
[submodule "modules/mkdocs-material"]
|
||||||
|
path = modules/mkdocs-material
|
||||||
|
url = git@github.com:privacyguides/mkdocs-material-insiders.git
|
||||||
|
@ -1,3 +1,23 @@
|
|||||||
|
# Copyright (c) 2022 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
default: true
|
default: true
|
||||||
line-length: false
|
line-length: false
|
||||||
ul-indent:
|
ul-indent:
|
||||||
|
2
Brewfile.netlify
Normal file
@ -0,0 +1,2 @@
|
|||||||
|
brew "pngquant"
|
||||||
|
brew "crowdin"
|
1
Brewfile.preview.netlify
Normal file
@ -0,0 +1 @@
|
|||||||
|
brew "pngquant"
|
91
CITATION.cff
@ -1,37 +1,88 @@
|
|||||||
|
# Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
cff-version: 1.2.0
|
cff-version: 1.2.0
|
||||||
title: Privacy Guides
|
title: Privacy Guides
|
||||||
message: 'If you reference this website, please cite it in your work.'
|
message: "If you reference this website, please cite it in your work."
|
||||||
type: software
|
type: software
|
||||||
authors:
|
authors:
|
||||||
- email: jonah@privacyguides.org
|
- family-names: Aragon
|
||||||
given-names: Jonah
|
given-names: Jonah
|
||||||
family-names: Aragon
|
website: "https://www.jonaharagon.com"
|
||||||
orcid: 'https://orcid.org/0000-0001-6996-4965'
|
orcid: "https://orcid.org/0000-0001-6996-4965"
|
||||||
- name: The Privacy Guides team
|
- name: The Privacy Guides Team
|
||||||
website: 'https://github.com/orgs/privacyguides/people'
|
website: "https://github.com/orgs/privacyguides/people"
|
||||||
repository-code: 'https://github.com/privacyguides/privacyguides.org'
|
repository-code: "https://github.com/privacyguides/privacyguides.org"
|
||||||
|
license:
|
||||||
|
- MIT
|
||||||
|
- CC-BY-ND-4.0
|
||||||
references:
|
references:
|
||||||
- authors:
|
- authors:
|
||||||
- family-names: Donath
|
- family-names: Donath
|
||||||
given-names: Martin
|
given-names: Martin
|
||||||
title: 'mkdocs-material'
|
title: "mkdocs-material"
|
||||||
type: software
|
type: software
|
||||||
repository-code: 'https://github.com/squidfunk/mkdocs-material'
|
repository-code: "https://github.com/squidfunk/mkdocs-material"
|
||||||
|
license: MIT
|
||||||
preferred-citation:
|
preferred-citation:
|
||||||
type: website
|
type: website
|
||||||
title: Privacy Guides
|
title: Privacy Guides
|
||||||
authors:
|
authors:
|
||||||
- email: jonah@privacyguides.org
|
- family-names: Aragon
|
||||||
given-names: Jonah
|
given-names: Jonah
|
||||||
family-names: Aragon
|
website: "https://www.jonaharagon.com"
|
||||||
orcid: 'https://orcid.org/0000-0001-6996-4965'
|
orcid: "https://orcid.org/0000-0001-6996-4965"
|
||||||
- given-names: Daniel
|
- family-names: Gray
|
||||||
family-names: Gray
|
given-names: Daniel
|
||||||
email: dngray@privacyguides.org
|
alias: dngray
|
||||||
- name: The Privacy Guides team
|
website: "https://polarbear.army"
|
||||||
website: 'https://github.com/orgs/privacyguides/people'
|
- family-names: Wilde
|
||||||
- name: Various project contributors
|
given-names: Niek
|
||||||
url: 'https://www.privacyguides.org'
|
name-particle: de
|
||||||
|
alias: blacklight447
|
||||||
|
- given-names: Freddy
|
||||||
|
website: "https://freddy.lol"
|
||||||
|
- alias: mfwmyfacewhen
|
||||||
|
website: "https://github.com/mfwmyfacewhen"
|
||||||
|
- given-names: Olivia
|
||||||
|
alias: hook
|
||||||
|
- alias: nitrohorse
|
||||||
|
website: "https://nitrohorse.com"
|
||||||
|
- family-names: Suomalainen
|
||||||
|
given-names: Aminda
|
||||||
|
alias: Mikaela
|
||||||
|
website: "https://aminda.eu"
|
||||||
|
- family-names: Potocki
|
||||||
|
given-names: Dawid
|
||||||
|
website: "https://dawidpotocki.com"
|
||||||
|
- alias: matchboxbananasynergy
|
||||||
|
website: "https://banana.omg.lol"
|
||||||
|
- family-names: Tran
|
||||||
|
given-names: Thien
|
||||||
|
alias: Tommy
|
||||||
|
website: "https://tommytran.io"
|
||||||
|
- alias: samsepi0l
|
||||||
|
website: "https://github.com/d4rklynk"
|
||||||
|
- name: Privacy Guides Contributors
|
||||||
|
website: "https://github.com/privacyguides/privacyguides.org/graphs/contributors"
|
||||||
|
url: "https://www.privacyguides.org"
|
||||||
abstract: >-
|
abstract: >-
|
||||||
Privacy Guides is a socially motivated website that
|
Privacy Guides is a socially motivated website that
|
||||||
provides information for protecting your data
|
provides information for protecting your data
|
||||||
@ -44,4 +95,4 @@ preferred-citation:
|
|||||||
- encryption
|
- encryption
|
||||||
- website
|
- website
|
||||||
- markdown
|
- markdown
|
||||||
license: "CC-BY-ND-4.0"
|
license: CC-BY-ND-4.0
|
||||||
|
22
LICENSE-CODE
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
MIT License
|
||||||
|
|
||||||
|
Copyright (c) 2019 - 2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
Copyright (c) 2020 - 2023 Privacy Guides contributors
|
||||||
|
|
||||||
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
of this software and associated documentation files (the "Software"), to deal
|
||||||
|
in the Software without restriction, including without limitation the rights
|
||||||
|
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
copies of the Software, and to permit persons to whom the Software is
|
||||||
|
furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be included in all
|
||||||
|
copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||||
|
SOFTWARE.
|
37
Pipfile
@ -1,21 +1,38 @@
|
|||||||
|
# Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
[[source]]
|
[[source]]
|
||||||
url = "https://pypi.org/simple"
|
url = "https://pypi.org/simple"
|
||||||
verify_ssl = true
|
verify_ssl = true
|
||||||
name = "pypi"
|
name = "pypi"
|
||||||
|
|
||||||
[packages]
|
[packages]
|
||||||
mkdocs = "*"
|
mkdocs-material = {path = "./modules/mkdocs-material"}
|
||||||
mkdocs-material = {path = "./mkdocs-material"}
|
mkdocs-git-revision-date-localized-plugin = "~=1.2"
|
||||||
mkdocs-static-i18n = "*"
|
mkdocs-git-committers-plugin-2 = "~=1.1"
|
||||||
mkdocs-git-revision-date-localized-plugin = "*"
|
mkdocs-macros-plugin = "~=0.7"
|
||||||
typing-extensions = "*"
|
pillow = "~=9.5"
|
||||||
mkdocs-git-committers-plugin-2 = "*"
|
cairosvg = "~=2.7"
|
||||||
mkdocs-macros-plugin = "*"
|
|
||||||
pillow = "*"
|
|
||||||
cairosvg = "*"
|
|
||||||
|
|
||||||
[dev-packages]
|
[dev-packages]
|
||||||
scour = "*"
|
scour = "~=0.38"
|
||||||
|
|
||||||
[requires]
|
[requires]
|
||||||
python_version = "3.8"
|
python_version = "3.8"
|
||||||
|
904
Pipfile.lock
generated
69
README.md
@ -28,6 +28,9 @@
|
|||||||
<a href="https://github.com/privacyguides/privacyguides.org/pulls?q=is%3Apr+is%3Aclosed">
|
<a href="https://github.com/privacyguides/privacyguides.org/pulls?q=is%3Apr+is%3Aclosed">
|
||||||
<img src="https://img.shields.io/github/issues-pr-closed-raw/privacyguides/privacyguides.org">
|
<img src="https://img.shields.io/github/issues-pr-closed-raw/privacyguides/privacyguides.org">
|
||||||
</a>
|
</a>
|
||||||
|
<a href="https://crowdin.com/project/privacyguides">
|
||||||
|
<img src="https://badges.crowdin.net/privacyguides/localized.svg">
|
||||||
|
</a>
|
||||||
<a href="https://opencollective.com/privacyguides">
|
<a href="https://opencollective.com/privacyguides">
|
||||||
<img src="https://img.shields.io/opencollective/all/privacyguides">
|
<img src="https://img.shields.io/opencollective/all/privacyguides">
|
||||||
</a></p>
|
</a></p>
|
||||||
@ -35,18 +38,23 @@
|
|||||||
|
|
||||||
## About
|
## About
|
||||||
|
|
||||||
**Privacy Guides** is a socially motivated website that provides information for protecting your data security and privacy. We are a non-profit collective operated entirely by volunteer team members and contributors.
|
**Privacy Guides** is a socially motivated website that provides information for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer team members and contributors. Our website is free of advertisements and not affiliated with any of the listed providers.
|
||||||
|
|
||||||
Our current list of team members can be found [here](https://www.privacyguides.org/about/#our-team). Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project, and you can too!
|
The current list of team members can be found [here](https://www.privacyguides.org/about/#our-team). Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project, and you can too!
|
||||||
|
|
||||||
|
*Featured on: [Tweakers](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html), [The New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/)*
|
||||||
|
|
||||||
## Contributing
|
## Contributing
|
||||||
|
|
||||||
- 💬 [Start a discussion or suggest an idea](https://discuss.privacyguides.org/)
|
- 💬 [Start a discussion or suggest an idea](https://discuss.privacyguides.net/)
|
||||||
- 💖 [Sponsor the project](https://github.com/sponsors/privacyguides)
|
- 💖 [Sponsor the project](https://github.com/sponsors/privacyguides)
|
||||||
- 🈴 [Help translate the site](https://crwd.in/privacyguides) [[Matrix chat](https://matrix.to/#/#pg-i18n:aragon.sh)]
|
- 🈴 [Help translate the site](https://crowdin.com/project/privacyguides) [[Matrix chat](https://matrix.to/#/#pg-i18n:aragon.sh)]
|
||||||
- 📝 Edit the site, everything's accessible in this repo
|
- 📝 Edit the site, everything's accessible in this repo
|
||||||
- Browse our [open issues](https://github.com/privacyguides/privacyguides.org/issues) to see what needs to be updated
|
- Browse our [open issues](https://github.com/privacyguides/privacyguides.org/issues) to see what needs to be updated
|
||||||
- View some contribution tips on our [contributor's wiki](https://github.com/privacyguides/privacyguides.org/wiki)
|
- View the list of [approved topics waiting for a PR](https://discuss.privacyguides.net/tag/approved)
|
||||||
|
- Read some writing tips in our [style guide](https://www.privacyguides.org/en/meta/writing-style/)
|
||||||
|
|
||||||
|
All contributors to the site are listed [here](https://github.com/privacyguides/privacyguides.org/graphs/contributors). If you make a substantial (i.e. copyright eligible) contribution to the project and would like to be formally credited, you are welcome to include your information in the appropriate `authors` section in [`CITATION.cff`](/CITATION.cff) as well, just submit a PR or ask @jonaharagon to make the change.
|
||||||
|
|
||||||
## Mirrors
|
## Mirrors
|
||||||
|
|
||||||
@ -56,43 +64,58 @@ Our current list of team members can be found [here](https://www.privacyguides.o
|
|||||||
[](https://codeberg.org/privacyguides/privacyguides.org)
|
[](https://codeberg.org/privacyguides/privacyguides.org)
|
||||||
[](https://git.sr.ht/~jonaharagon/privacyguides.org)
|
[](https://git.sr.ht/~jonaharagon/privacyguides.org)
|
||||||
|
|
||||||
|
## License
|
||||||
|
|
||||||
|
Copyright © 2019 - 2023 [Privacy Guides contributors](https://github.com/privacyguides/privacyguides.org/graphs/contributors).
|
||||||
|
|
||||||
|
Privacy Guides content is licensed under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](/LICENSE), and the underlying source code used to format and display that content on [www.privacyguides.org](https://www.privacyguides.org) is licensed under the [MIT License](/LICENSE-CODE).
|
||||||
|
|
||||||
|
Generally speaking, **content** can be found in the [`/docs`](/docs), [`/theme/assets/img`](/theme/assets/img), [`/includes`](/includes), and [`/i18n`](/i18n) folders; and **source code** and configuration files can be found in the [`/config`](/config) and [`/theme`](/theme) folders, and in the root of this repository. Any source code snippets contained within documentation files are [MIT Licensed](/LICENSE-CODE). Please contact us if you require clarification on any of these terms.
|
||||||
|
|
||||||
|
These licenses do not apply to any work where another license is otherwise noted.
|
||||||
|
|
||||||
|
**Logos** in the [`/theme/assets/img`](/theme/assets/img) folder may not be original works of Privacy Guides and therefore cannot be (re)licensed by us. We believe that these logos obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.*
|
||||||
|
|
||||||
|
You may comply with our license terms in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo.
|
||||||
|
|
||||||
|
When you contribute to this repository you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project.
|
||||||
|
|
||||||
## Developing
|
## Developing
|
||||||
|
|
||||||
Committing to this repository requires [signing your commits](https://docs.github.com/en/authentication/managing-commit-signature-verification/signing-commits) (`git config commit.gpgsign true`) unless you are making edits via the GitHub.com text editor interface. As of August 2022 the preferred signing method is [SSH commit signatures](https://docs.github.com/en/authentication/managing-commit-signature-verification/about-commit-signature-verification#ssh-commit-signature-verification), but GPG signing is also acceptable. You should add your signing key to your GitHub profile.
|
Committing to this repository requires [signing your commits](https://docs.github.com/en/authentication/managing-commit-signature-verification/signing-commits) (`git config commit.gpgsign true`) unless you are making edits via the GitHub.com text editor interface. As of August 2022 the preferred signing method is [SSH commit signatures](https://docs.github.com/en/authentication/managing-commit-signature-verification/about-commit-signature-verification#ssh-commit-signature-verification), but GPG signing is also acceptable. You should add your signing key to your GitHub profile.
|
||||||
|
|
||||||
This website uses [`mkdocs-material-insiders`](https://squidfunk.github.io/mkdocs-material/insiders/) which offers additional functionality over the open-source `mkdocs-material` project. For obvious reasons we cannot distribute access to the insiders repository. You can install the website locally with the open-source version of `mkdocs-material`:
|
This website uses [`mkdocs-material-insiders`](https://squidfunk.github.io/mkdocs-material/insiders/) which offers additional functionality over the open-source `mkdocs-material` project. For obvious reasons we cannot distribute access to the insiders repository. Running this website locally without access to insiders is unsupported. If you are submitting a PR, please ensure the automatic preview generated for your PR looks correct, as that site will be built with the production insiders build.
|
||||||
|
|
||||||
1. Clone this repository:
|
|
||||||
- `git clone https://github.com/privacyguides/privacyguides.org.git` (then `cd privacyguides.org`)
|
|
||||||
- `git submodule init`
|
|
||||||
- `git submodule update docs/assets/brand`
|
|
||||||
- `git config gpg.ssh.allowedSignersFile .allowed_signers`
|
|
||||||
2. Install [Python 3.6+](https://www.python.org/downloads/) (currently only tested with 3.10)
|
|
||||||
3. Install [dependencies](/Pipfile): `pip install mkdocs mkdocs-material mkdocs-static-i18n mkdocs-macros-plugin typing-extensions`
|
|
||||||
4. Serve the site locally: `mkdocs serve`
|
|
||||||
- The site will be available at `http://localhost:8000`
|
|
||||||
- You can build the site locally with `mkdocs build`
|
|
||||||
- Your local version of the site may be missing functionality, which is expected. If you are submitting a PR, please ensure the automatic preview generated for your PR looks correct, as that site will be built with the production insiders build.
|
|
||||||
|
|
||||||
**Team members** should clone the repository with `mkdocs-material-insiders` directly. This method is identical to production:
|
**Team members** should clone the repository with `mkdocs-material-insiders` directly. This method is identical to production:
|
||||||
|
|
||||||
1. Clone this repository and submodules: `git clone --recurse-submodules https://github.com/privacyguides/privacyguides.org.git`
|
1. Clone this repository and submodules: `git clone --recurse-submodules https://github.com/privacyguides/privacyguides.org.git`
|
||||||
2. Enable SSH commit verification with our local [`.allowed_signers`](/.allowed_signers) file: `git config gpg.ssh.allowedSignersFile .allowed_signers`
|
2. Enable SSH commit verification with our local [`.allowed_signers`](/.allowed_signers) file: `git config gpg.ssh.allowedSignersFile .allowed_signers`
|
||||||
3. Install Python **3.10**
|
3. Install Python **3.8**, this is the only version supported by Netlify
|
||||||
4. Install **pipenv**: `pip install pipenv`
|
4. Install **pipenv**: `pip install pipenv`
|
||||||
5. Install dependencies: `pipenv install --dev` (install [Pillow and CairoSVG](https://squidfunk.github.io/mkdocs-material/setup/setting-up-social-cards/#dependencies) as well to generate social cards)
|
5. Install dependencies: `pipenv install --dev` (install [Pillow and CairoSVG](https://squidfunk.github.io/mkdocs-material/setup/setting-up-social-cards/#dependencies) as well to generate social cards)
|
||||||
6. Serve the site locally: `pipenv run mkdocs serve --config-file mkdocs.production.yml` (set `CARDS=true` to generate social cards)
|
6. Serve the site locally: `pipenv run mkdocs serve --config-file config/mkdocs.en.yml` (set `CARDS=true` to generate social cards)
|
||||||
- The site will be available at `http://localhost:8000`
|
- The site will be available at `http://localhost:8000`
|
||||||
- You can build the site locally with `pipenv run mkdocs build`
|
- You can build the site locally with `pipenv run mkdocs build --config-file config/mkdocs.en.yml`
|
||||||
- This version of the site should be identical to the live, production version
|
- This version of the site should be identical to the live, production version
|
||||||
|
|
||||||
If you commit to `main` with commits signed with your SSH key, you should add your SSH key to [`.allowed_signers`](/.allowed_signers) in this repo.
|
If you commit to `main` with commits signed with your SSH key, you should add your SSH key to [`.allowed_signers`](/.allowed_signers) in this repo.
|
||||||
|
|
||||||
|
### Local Translated Site Builds
|
||||||
|
|
||||||
|
1. Install the [Crowdin CLI Tool](https://developer.crowdin.com/cli-tool/) (`brew install crowdin`)
|
||||||
|
2. Set the `CROWDIN_PERSONAL_TOKEN` environment variable to your Crowdin personal access token
|
||||||
|
3. Run `crowdin download` in the root of this repo
|
||||||
|
4. Serve the site locally: `pipenv run mkdocs serve --config-file config/mkdocs.fr.yml` (replacing the config file with any language in [/config](/config))
|
||||||
|
|
||||||
|
Translations downloaded from Crowdin are [.gitignore](/.gitignore)'d, so any local changes to the translated site cannot be committed to this repo. Actual modifications need to be made on Crowdin. As an alternative to steps 1-3, you can copy the folders from [privacyguides/i18n](https://github.com/privacyguides/i18n) to the root of this repo to obtain the translated files.
|
||||||
|
|
||||||
## Releasing
|
## Releasing
|
||||||
|
|
||||||
1. Create a new tag: `git tag -s v2.X.X -m 'Some message'`
|
It is required to create a GitHub release to publish the current site to privacyguides.org. The current `main` branch can be previewed at [https://main.staging.privacyguides.dev](https://main.staging.privacyguides.dev) prior to release.
|
||||||
|
|
||||||
|
1. Create a new tag: `git tag -s v3.X.X -m 'Some message'`
|
||||||
- [View existing tags](https://github.com/privacyguides/privacyguides.org/tags)
|
- [View existing tags](https://github.com/privacyguides/privacyguides.org/tags)
|
||||||
- Tag [numbering](https://semver.org/): Increment the MINOR (2nd) number when making significant changes (adding/deleting pages, etc.), increment the PATCH (3rd) number when making minor changes (typos, bug fixes). Probably leave the MAJOR number at 2 until a massive revamp (v1 -> v2 was the Jekyll to MkDocs transition).
|
- Tag [numbering](https://semver.org/): Increment the MINOR (2nd) number when making significant changes (adding/deleting pages, etc.), increment the PATCH (3rd) number when making minor changes (typos, bug fixes). Probably leave the MAJOR number at 3 until a massive revamp (v1 -> v2 was the Jekyll to MkDocs transition, v2 -> v3 was the introduction of translations).
|
||||||
- Consider enabling GPG tag signing by default (`git config tag.gpgSign true`) to avoid missing signatures
|
- Consider enabling GPG tag signing by default (`git config tag.gpgSign true`) to avoid missing signatures
|
||||||
2. Push the tag to GitHub: `git push --tags`
|
2. Push the tag to GitHub: `git push --tags`
|
||||||
3. A GitHub Release will be automatically created and deployed to the live site.
|
3. A GitHub Release will be automatically created and deployed to the live site.
|
||||||
|
182
config/layouts/custom.yml
Normal file
@ -0,0 +1,182 @@
|
|||||||
|
definitions:
|
||||||
|
|
||||||
|
- &background_image >-
|
||||||
|
{%- if page.meta.cover -%}
|
||||||
|
theme/assets/img/cover/{{ page.meta.cover }}
|
||||||
|
{%- else -%}
|
||||||
|
{{ layout.background_image or "theme/assets/brand/PNG/Banner/cover-progress-notext-blur.png" }}
|
||||||
|
{%- endif -%}
|
||||||
|
|
||||||
|
- &background_color >-
|
||||||
|
#f7f7fcaa
|
||||||
|
|
||||||
|
#- &background_color >-
|
||||||
|
# {%- if page.meta.cover -%}
|
||||||
|
# #f7f7fcaa
|
||||||
|
# {%- else -%}
|
||||||
|
# #FFD06F
|
||||||
|
# {%- endif -%}
|
||||||
|
|
||||||
|
- &color >-
|
||||||
|
{{ layout.color or "#2d2d2d" }}
|
||||||
|
|
||||||
|
- &title_font_family >-
|
||||||
|
{%- if config.theme.language == "he" -%}
|
||||||
|
Suez One
|
||||||
|
{%- else -%}
|
||||||
|
Bagnard
|
||||||
|
{%- endif -%}
|
||||||
|
|
||||||
|
- &font_family >-
|
||||||
|
{%- if config.theme.language == "he" -%}
|
||||||
|
Suez One
|
||||||
|
{%- else -%}
|
||||||
|
Public Sans
|
||||||
|
{%- endif -%}
|
||||||
|
|
||||||
|
- &site_name >-
|
||||||
|
{%- if page.is_homepage -%}
|
||||||
|
{%- else -%}
|
||||||
|
{{ config.site_name }}
|
||||||
|
{%- endif -%}
|
||||||
|
|
||||||
|
- &page_title >-
|
||||||
|
{%- if page.is_homepage -%}
|
||||||
|
Privacy Guides
|
||||||
|
{%- else -%}
|
||||||
|
{{ page.meta.get("title", page.title) }}
|
||||||
|
{%- endif -%}
|
||||||
|
|
||||||
|
- &page_title_with_site_name >-
|
||||||
|
{%- if page.meta.meta_title -%}
|
||||||
|
{{ page.meta.meta_title }}
|
||||||
|
{%- elif not page.is_homepage -%}
|
||||||
|
{{ page.meta.get("title", page.title) }} - {{ config.site_name }}
|
||||||
|
{%- else -%}
|
||||||
|
{{ page.meta.get("title", page.title) }}
|
||||||
|
{%- endif -%}
|
||||||
|
|
||||||
|
- &page_description >-
|
||||||
|
{%- if page.is_homepage -%}
|
||||||
|
{%- else -%}
|
||||||
|
{{ page.meta.get("description", config.site_description) or "" }}
|
||||||
|
{%- endif -%}
|
||||||
|
|
||||||
|
- &homepage_description >-
|
||||||
|
{%- if page.is_homepage -%}
|
||||||
|
A socially motivated website which provides information about protecting your online data privacy and security.
|
||||||
|
{%- else -%}
|
||||||
|
{%- endif -%}
|
||||||
|
|
||||||
|
- &og_description >-
|
||||||
|
{{ page.meta.get("description", config.site_description) or "" }}
|
||||||
|
|
||||||
|
- &page_icon >-
|
||||||
|
{{ page.meta.icon or "" }}
|
||||||
|
|
||||||
|
- &logo >-
|
||||||
|
theme/assets/brand/SVG/Logo/privacy-guides-logo-notext.svg
|
||||||
|
|
||||||
|
#{%- if page.meta.cover -%}
|
||||||
|
# theme/assets/brand/SVG/Logo/privacy-guides-logo-notext.svg
|
||||||
|
#{%- elif config.theme.logo -%}
|
||||||
|
# {{ config.docs_dir }}/{{ config.theme.logo }}
|
||||||
|
#{%- endif -%}
|
||||||
|
|
||||||
|
# Meta tags
|
||||||
|
tags:
|
||||||
|
|
||||||
|
# Open Graph
|
||||||
|
og:type: website
|
||||||
|
og:title: *page_title_with_site_name
|
||||||
|
og:description: *og_description
|
||||||
|
og:image: "{{ image.url }}"
|
||||||
|
og:image:type: "{{ image.type }}"
|
||||||
|
og:image:width: "{{ image.width }}"
|
||||||
|
og:image:height: "{{ image.height }}"
|
||||||
|
og:url: "{{ page.canonical_url }}"
|
||||||
|
|
||||||
|
# Twitter
|
||||||
|
twitter:card: summary_large_image
|
||||||
|
twitter.title: *page_title_with_site_name
|
||||||
|
twitter:description: *page_description
|
||||||
|
twitter:image: "{{ image.url }}"
|
||||||
|
|
||||||
|
# -----------------------------------------------------------------------------
|
||||||
|
# Specification
|
||||||
|
# -----------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# Card size and layers
|
||||||
|
size: { width: 1200, height: 630 }
|
||||||
|
layers:
|
||||||
|
|
||||||
|
# Background
|
||||||
|
- background:
|
||||||
|
image: *background_image
|
||||||
|
color: *background_color
|
||||||
|
|
||||||
|
# Page icon
|
||||||
|
- size: { width: 630, height: 630 }
|
||||||
|
offset: { x: 570, y: 0 }
|
||||||
|
icon:
|
||||||
|
value: *page_icon
|
||||||
|
color: "#00000033"
|
||||||
|
|
||||||
|
# Logo
|
||||||
|
- size: { width: 64, height: 64 }
|
||||||
|
offset: { x: 64, y: 64 }
|
||||||
|
background:
|
||||||
|
image: *logo
|
||||||
|
|
||||||
|
# Site name
|
||||||
|
- size: { width: 768, height: 42 }
|
||||||
|
offset: { x: 160, y: 78 }
|
||||||
|
typography:
|
||||||
|
content: *site_name
|
||||||
|
color: *color
|
||||||
|
font:
|
||||||
|
family: Bagnard
|
||||||
|
style: Bold
|
||||||
|
|
||||||
|
# Page title
|
||||||
|
- size: { width: 864, height: 256 }
|
||||||
|
offset: { x: 62, y: 192 }
|
||||||
|
typography:
|
||||||
|
content: *page_title
|
||||||
|
align: start
|
||||||
|
color: *color
|
||||||
|
line:
|
||||||
|
amount: 3
|
||||||
|
height: 1.5
|
||||||
|
font:
|
||||||
|
family: *title_font_family
|
||||||
|
style: Bold
|
||||||
|
|
||||||
|
# Page description
|
||||||
|
- size: { width: 864, height: 96 }
|
||||||
|
offset: { x: 64, y: 480 }
|
||||||
|
typography:
|
||||||
|
content: *page_description
|
||||||
|
align: start
|
||||||
|
color: *color
|
||||||
|
line:
|
||||||
|
amount: 3
|
||||||
|
height: 1.5
|
||||||
|
font:
|
||||||
|
family: *font_family
|
||||||
|
style: Regular
|
||||||
|
|
||||||
|
# Homepage description
|
||||||
|
- size: { width: 864, height: 192 }
|
||||||
|
offset: { x: 64, y: 320 }
|
||||||
|
typography:
|
||||||
|
content: *homepage_description
|
||||||
|
overflow: shrink
|
||||||
|
align: start
|
||||||
|
color: *color
|
||||||
|
line:
|
||||||
|
amount: 3
|
||||||
|
height: 1.5
|
||||||
|
font:
|
||||||
|
family: *font_family
|
||||||
|
style: Regular
|
152
config/mkdocs-common.yml
Normal file
@ -0,0 +1,152 @@
|
|||||||
|
# Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
|
extra:
|
||||||
|
context: !ENV [CONTEXT, "production"]
|
||||||
|
social:
|
||||||
|
- icon: simple/mastodon
|
||||||
|
link: https://mastodon.neat.computer/@privacyguides
|
||||||
|
name: Mastodon
|
||||||
|
- icon: simple/matrix
|
||||||
|
link: https://matrix.to/#/#privacyguides:matrix.org
|
||||||
|
name: Matrix
|
||||||
|
- icon: simple/discourse
|
||||||
|
link: https://discuss.privacyguides.net/
|
||||||
|
name: Forum
|
||||||
|
- icon: simple/github
|
||||||
|
link: https://github.com/privacyguides
|
||||||
|
name: GitHub
|
||||||
|
alternate:
|
||||||
|
- name: English
|
||||||
|
link: /en/
|
||||||
|
lang: en
|
||||||
|
icon: https://raw.githubusercontent.com/twitter/twemoji/master/assets/svg/1f1fa-1f1f8.svg
|
||||||
|
- name: Español
|
||||||
|
link: /es/
|
||||||
|
lang: es
|
||||||
|
icon: https://raw.githubusercontent.com/twitter/twemoji/master/assets/svg/1f1ea-1f1f8.svg
|
||||||
|
- name: Français
|
||||||
|
link: /fr/
|
||||||
|
lang: fr
|
||||||
|
icon: https://raw.githubusercontent.com/twitter/twemoji/master/assets/svg/1f1eb-1f1f7.svg
|
||||||
|
- name: עִברִית
|
||||||
|
link: /he/
|
||||||
|
lang: he
|
||||||
|
icon: https://raw.githubusercontent.com/twitter/twemoji/master/assets/svg/1f1ee-1f1f1.svg
|
||||||
|
- name: Italian
|
||||||
|
link: /it/
|
||||||
|
lang: it
|
||||||
|
icon: https://raw.githubusercontent.com/twitter/twemoji/master/assets/svg/1f1ee-1f1f9.svg
|
||||||
|
- name: Nederlands
|
||||||
|
link: /nl/
|
||||||
|
lang: nl
|
||||||
|
icon: https://raw.githubusercontent.com/twitter/twemoji/master/assets/svg/1f1f3-1f1f1.svg
|
||||||
|
|
||||||
|
repo_url: https://github.com/privacyguides/privacyguides.org
|
||||||
|
repo_name: ""
|
||||||
|
|
||||||
|
theme:
|
||||||
|
name: material
|
||||||
|
custom_dir: ../theme
|
||||||
|
logo: ../../theme/assets/brand/SVG/Logo/privacy-guides-logo-notext-colorbg.svg
|
||||||
|
favicon: assets/brand/png/favicon/favicon-32x32.png
|
||||||
|
icon:
|
||||||
|
repo: simple/github
|
||||||
|
features:
|
||||||
|
- navigation.tracking
|
||||||
|
- navigation.tabs
|
||||||
|
- navigation.sections
|
||||||
|
- navigation.expand
|
||||||
|
- navigation.path
|
||||||
|
- navigation.indexes
|
||||||
|
- content.tooltips
|
||||||
|
- search.highlight
|
||||||
|
|
||||||
|
extra_css:
|
||||||
|
- assets/stylesheets/extra.css?v=3.2.0
|
||||||
|
extra_javascript:
|
||||||
|
- assets/javascripts/mathjax.js
|
||||||
|
- assets/javascripts/feedback.js
|
||||||
|
|
||||||
|
watch:
|
||||||
|
- ../theme
|
||||||
|
- ../includes
|
||||||
|
- mkdocs-common.yml
|
||||||
|
|
||||||
|
plugins:
|
||||||
|
tags: {}
|
||||||
|
search: {}
|
||||||
|
macros: {}
|
||||||
|
meta: {}
|
||||||
|
git-committers:
|
||||||
|
enabled: !ENV [NETLIFY, false]
|
||||||
|
repository: privacyguides/privacyguides.org
|
||||||
|
branch: main
|
||||||
|
git-revision-date-localized:
|
||||||
|
enabled: !ENV [NETLIFY, false]
|
||||||
|
exclude:
|
||||||
|
- index.md
|
||||||
|
fallback_to_build_date: true
|
||||||
|
privacy:
|
||||||
|
assets_exclude:
|
||||||
|
- cdn.jsdelivr.net/npm/mathjax@3/*
|
||||||
|
- api.privacyguides.net/*
|
||||||
|
optimize:
|
||||||
|
enabled: !ENV [NETLIFY, false]
|
||||||
|
typeset: {}
|
||||||
|
social:
|
||||||
|
cards: !ENV [CARDS, true]
|
||||||
|
cards_dir: assets/img/social
|
||||||
|
cards_layout_dir: config/layouts
|
||||||
|
cards_layout: custom
|
||||||
|
|
||||||
|
markdown_extensions:
|
||||||
|
admonition: {}
|
||||||
|
pymdownx.details: {}
|
||||||
|
pymdownx.superfences:
|
||||||
|
custom_fences:
|
||||||
|
- name: mermaid
|
||||||
|
class: mermaid
|
||||||
|
format: !!python/name:pymdownx.superfences.fence_code_format
|
||||||
|
pymdownx.tabbed:
|
||||||
|
alternate_style: true
|
||||||
|
pymdownx.arithmatex:
|
||||||
|
generic: true
|
||||||
|
pymdownx.critic: {}
|
||||||
|
pymdownx.caret: {}
|
||||||
|
pymdownx.keys: {}
|
||||||
|
pymdownx.mark: {}
|
||||||
|
pymdownx.tilde: {}
|
||||||
|
pymdownx.snippets: {}
|
||||||
|
pymdownx.tasklist:
|
||||||
|
custom_checkbox: true
|
||||||
|
attr_list: {}
|
||||||
|
def_list: {}
|
||||||
|
md_in_html: {}
|
||||||
|
meta: {}
|
||||||
|
abbr: {}
|
||||||
|
pymdownx.emoji:
|
||||||
|
emoji_index: !!python/name:materialx.emoji.twemoji
|
||||||
|
emoji_generator: !!python/name:materialx.emoji.to_svg
|
||||||
|
tables: {}
|
||||||
|
footnotes: {}
|
||||||
|
toc:
|
||||||
|
permalink: true
|
||||||
|
toc_depth: 4
|
163
config/mkdocs-offline.yml
Normal file
@ -0,0 +1,163 @@
|
|||||||
|
# Copyright (c) 2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
|
INHERIT: mkdocs-common.yml
|
||||||
|
docs_dir: '../docs'
|
||||||
|
site_url: "https://www.privacyguides.org/"
|
||||||
|
site_dir: '../site'
|
||||||
|
|
||||||
|
site_name: Privacy Guides
|
||||||
|
site_description: |
|
||||||
|
Privacy Guides is your central privacy and security resource to protect yourself online.
|
||||||
|
copyright: |
|
||||||
|
<b>Privacy Guides</b> is a non-profit, socially motivated website that provides information for protecting your data security and privacy.<br>
|
||||||
|
We do not make money from recommending certain products, and we do not use affiliate links.<br>
|
||||||
|
© 2019 - 2023 Privacy Guides and contributors.
|
||||||
|
<span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="m245.83 214.87-33.22 17.28c-9.43-19.58-25.24-19.93-27.46-19.93-22.13 0-33.22 14.61-33.22 43.84 0 23.57 9.21 43.84 33.22 43.84 14.47 0 24.65-7.09 30.57-21.26l30.55 15.5c-6.17 11.51-25.69 38.98-65.1 38.98-22.6 0-73.96-10.32-73.96-77.05 0-58.69 43-77.06 72.63-77.06 30.72-.01 52.7 11.95 65.99 35.86zm143.05 0-32.78 17.28c-9.5-19.77-25.72-19.93-27.9-19.93-22.14 0-33.22 14.61-33.22 43.84 0 23.55 9.23 43.84 33.22 43.84 14.45 0 24.65-7.09 30.54-21.26l31 15.5c-2.1 3.75-21.39 38.98-65.09 38.98-22.69 0-73.96-9.87-73.96-77.05 0-58.67 42.97-77.06 72.63-77.06 30.71-.01 52.58 11.95 65.56 35.86zM247.56 8.05C104.74 8.05 0 123.11 0 256.05c0 138.49 113.6 248 247.56 248 129.93 0 248.44-100.87 248.44-248 0-137.87-106.62-248-248.44-248zm.87 450.81c-112.54 0-203.7-93.04-203.7-202.81 0-105.42 85.43-203.27 203.72-203.27 112.53 0 202.82 89.46 202.82 203.26-.01 121.69-99.68 202.82-202.84 202.82z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M314.9 194.4v101.4h-28.3v120.5h-77.1V295.9h-28.3V194.4c0-4.4 1.6-8.2 4.6-11.3 3.1-3.1 6.9-4.7 11.3-4.7H299c4.1 0 7.8 1.6 11.1 4.7 3.1 3.2 4.8 6.9 4.8 11.3zm-101.5-63.7c0-23.3 11.5-35 34.5-35s34.5 11.7 34.5 35c0 23-11.5 34.5-34.5 34.5s-34.5-11.5-34.5-34.5zM247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3zm94 144.3v42.5H162.1V197h180.3zm0 79.8v42.5H162.1v-42.5h180.3z"></path></svg></span>
|
||||||
|
Content licensed under <a href="https://www.privacyguides.org/license"><strong>CC BY-ND 4.0</strong></a>.
|
||||||
|
repo_url: ""
|
||||||
|
|
||||||
|
extra:
|
||||||
|
generator: false
|
||||||
|
analytics: false
|
||||||
|
alternate: false
|
||||||
|
offline: true
|
||||||
|
|
||||||
|
theme:
|
||||||
|
language: en
|
||||||
|
# this logo needs to be set separately because the relative path is different
|
||||||
|
logo: ../theme/assets/brand/SVG/Logo/privacy-guides-logo-notext-colorbg.svg
|
||||||
|
font:
|
||||||
|
text: Public Sans
|
||||||
|
code: DM Mono
|
||||||
|
palette:
|
||||||
|
- media: "(prefers-color-scheme)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-auto
|
||||||
|
name: "Switch to dark mode"
|
||||||
|
- media: "(prefers-color-scheme: dark)"
|
||||||
|
scheme: slate
|
||||||
|
accent: amber
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-2
|
||||||
|
name: "Switch to light mode"
|
||||||
|
- media: "(prefers-color-scheme: light)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-5
|
||||||
|
name: "Switch to system theme"
|
||||||
|
features:
|
||||||
|
- navigation.tabs
|
||||||
|
- navigation.sections
|
||||||
|
- navigation.indexes
|
||||||
|
- content.tooltips
|
||||||
|
- search.highlight
|
||||||
|
|
||||||
|
plugins:
|
||||||
|
offline:
|
||||||
|
enabled: true
|
||||||
|
social:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
markdown_extensions:
|
||||||
|
pymdownx.snippets:
|
||||||
|
auto_append:
|
||||||
|
- includes/abbreviations.en.txt
|
||||||
|
|
||||||
|
nav:
|
||||||
|
- Home: 'index.md'
|
||||||
|
- Knowledge Base:
|
||||||
|
- 'basics/why-privacy-matters.md'
|
||||||
|
- 'basics/threat-modeling.md'
|
||||||
|
- 'basics/common-threats.md'
|
||||||
|
- 'basics/common-misconceptions.md'
|
||||||
|
- 'basics/account-creation.md'
|
||||||
|
- 'basics/account-deletion.md'
|
||||||
|
- Technology Essentials:
|
||||||
|
- 'basics/passwords-overview.md'
|
||||||
|
- 'basics/multi-factor-authentication.md'
|
||||||
|
- 'basics/email-security.md'
|
||||||
|
- 'basics/vpn-overview.md'
|
||||||
|
- Advanced Topics:
|
||||||
|
- 'advanced/dns-overview.md'
|
||||||
|
- 'advanced/tor-overview.md'
|
||||||
|
- 'advanced/payments.md'
|
||||||
|
- 'advanced/communication-network-types.md'
|
||||||
|
- Operating Systems:
|
||||||
|
- 'os/android-overview.md'
|
||||||
|
- 'os/linux-overview.md'
|
||||||
|
- 'os/qubes-overview.md'
|
||||||
|
- kb-archive.md
|
||||||
|
- Recommendations:
|
||||||
|
- 'tools.md'
|
||||||
|
- Internet Browsing:
|
||||||
|
- 'tor.md'
|
||||||
|
- 'desktop-browsers.md'
|
||||||
|
- 'mobile-browsers.md'
|
||||||
|
- Providers:
|
||||||
|
- 'cloud.md'
|
||||||
|
- 'dns.md'
|
||||||
|
- 'email.md'
|
||||||
|
- 'financial-services.md'
|
||||||
|
- 'search-engines.md'
|
||||||
|
- 'vpn.md'
|
||||||
|
- Software:
|
||||||
|
- 'calendar.md'
|
||||||
|
- 'cryptocurrency.md'
|
||||||
|
- 'data-redaction.md'
|
||||||
|
- 'email-clients.md'
|
||||||
|
- 'encryption.md'
|
||||||
|
- 'file-sharing.md'
|
||||||
|
- 'frontends.md'
|
||||||
|
- 'multi-factor-authentication.md'
|
||||||
|
- 'news-aggregators.md'
|
||||||
|
- 'notebooks.md'
|
||||||
|
- 'passwords.md'
|
||||||
|
- 'productivity.md'
|
||||||
|
- 'real-time-communication.md'
|
||||||
|
- 'video-streaming.md'
|
||||||
|
- Operating Systems:
|
||||||
|
- 'android.md'
|
||||||
|
- 'desktop.md'
|
||||||
|
- 'router.md'
|
||||||
|
- About:
|
||||||
|
- 'about/index.md'
|
||||||
|
- 'about/criteria.md'
|
||||||
|
- 'about/statistics.md'
|
||||||
|
- 'about/notices.md'
|
||||||
|
- 'about/privacy-policy.md'
|
||||||
|
- Community:
|
||||||
|
- 'about/donate.md'
|
||||||
|
- Online Services: 'about/services.md'
|
||||||
|
- Code of Conduct: 'CODE_OF_CONDUCT.md'
|
||||||
|
- 'about/privacytools.md'
|
||||||
|
- Contributing:
|
||||||
|
- Writing Guide:
|
||||||
|
- 'meta/writing-style.md'
|
||||||
|
- 'meta/brand.md'
|
||||||
|
- Technical Guides:
|
||||||
|
- 'meta/uploading-images.md'
|
||||||
|
- 'meta/git-recommendations.md'
|
||||||
|
- Changelog: 'https://github.com/privacyguides/privacyguides.org/releases'
|
||||||
|
- Forum: 'https://discuss.privacyguides.net/'
|
||||||
|
- Blog: 'https://blog.privacyguides.org/'
|
162
config/mkdocs.en.yml
Normal file
@ -0,0 +1,162 @@
|
|||||||
|
# Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
|
INHERIT: mkdocs-common.yml
|
||||||
|
docs_dir: '../docs'
|
||||||
|
site_url: "https://www.privacyguides.org/en/"
|
||||||
|
site_dir: '../site/en'
|
||||||
|
|
||||||
|
site_name: Privacy Guides
|
||||||
|
site_description: |
|
||||||
|
Privacy Guides is your central privacy and security resource to protect yourself online.
|
||||||
|
copyright: |
|
||||||
|
<b>Privacy Guides</b> is a non-profit, socially motivated website that provides information for protecting your data security and privacy.<br>
|
||||||
|
We do not make money from recommending certain products, and we do not use affiliate links.<br>
|
||||||
|
© 2019 - 2023 Privacy Guides and contributors.
|
||||||
|
<span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="m245.83 214.87-33.22 17.28c-9.43-19.58-25.24-19.93-27.46-19.93-22.13 0-33.22 14.61-33.22 43.84 0 23.57 9.21 43.84 33.22 43.84 14.47 0 24.65-7.09 30.57-21.26l30.55 15.5c-6.17 11.51-25.69 38.98-65.1 38.98-22.6 0-73.96-10.32-73.96-77.05 0-58.69 43-77.06 72.63-77.06 30.72-.01 52.7 11.95 65.99 35.86zm143.05 0-32.78 17.28c-9.5-19.77-25.72-19.93-27.9-19.93-22.14 0-33.22 14.61-33.22 43.84 0 23.55 9.23 43.84 33.22 43.84 14.45 0 24.65-7.09 30.54-21.26l31 15.5c-2.1 3.75-21.39 38.98-65.09 38.98-22.69 0-73.96-9.87-73.96-77.05 0-58.67 42.97-77.06 72.63-77.06 30.71-.01 52.58 11.95 65.56 35.86zM247.56 8.05C104.74 8.05 0 123.11 0 256.05c0 138.49 113.6 248 247.56 248 129.93 0 248.44-100.87 248.44-248 0-137.87-106.62-248-248.44-248zm.87 450.81c-112.54 0-203.7-93.04-203.7-202.81 0-105.42 85.43-203.27 203.72-203.27 112.53 0 202.82 89.46 202.82 203.26-.01 121.69-99.68 202.82-202.84 202.82z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M314.9 194.4v101.4h-28.3v120.5h-77.1V295.9h-28.3V194.4c0-4.4 1.6-8.2 4.6-11.3 3.1-3.1 6.9-4.7 11.3-4.7H299c4.1 0 7.8 1.6 11.1 4.7 3.1 3.2 4.8 6.9 4.8 11.3zm-101.5-63.7c0-23.3 11.5-35 34.5-35s34.5 11.7 34.5 35c0 23-11.5 34.5-34.5 34.5s-34.5-11.5-34.5-34.5zM247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3zm94 144.3v42.5H162.1V197h180.3zm0 79.8v42.5H162.1v-42.5h180.3z"></path></svg></span>
|
||||||
|
Content licensed under <a href="/license"><strong>CC BY-ND 4.0</strong></a>.
|
||||||
|
edit_uri: edit/main/docs/
|
||||||
|
|
||||||
|
extra:
|
||||||
|
generator: false
|
||||||
|
analytics:
|
||||||
|
provider: plausible
|
||||||
|
property: privacyguides.org
|
||||||
|
feedback:
|
||||||
|
title: "Was this page helpful?"
|
||||||
|
ratings:
|
||||||
|
- icon: material/robot-happy-outline
|
||||||
|
name: "This page was helpful"
|
||||||
|
data: Helpful
|
||||||
|
note: "Thanks for your feedback!"
|
||||||
|
- icon: material/robot-confused
|
||||||
|
name: "This page could be improved"
|
||||||
|
data: Needs Improvement
|
||||||
|
note: "Thanks for your feedback! Help us improve this page by opening a <a href='https://discuss.privacyguides.net/'>discussion on our forum</a>."
|
||||||
|
|
||||||
|
theme:
|
||||||
|
language: en
|
||||||
|
# ENGLISH ONLY: this logo needs to be set separately because the relative path is different
|
||||||
|
logo: ../theme/assets/brand/SVG/Logo/privacy-guides-logo-notext-colorbg.svg
|
||||||
|
font:
|
||||||
|
text: Public Sans
|
||||||
|
code: DM Mono
|
||||||
|
palette:
|
||||||
|
- media: "(prefers-color-scheme)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-auto
|
||||||
|
name: "Switch to dark mode"
|
||||||
|
- media: "(prefers-color-scheme: dark)"
|
||||||
|
scheme: slate
|
||||||
|
accent: amber
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-2
|
||||||
|
name: "Switch to light mode"
|
||||||
|
- media: "(prefers-color-scheme: light)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-5
|
||||||
|
name: "Switch to system theme"
|
||||||
|
|
||||||
|
markdown_extensions:
|
||||||
|
pymdownx.snippets:
|
||||||
|
auto_append:
|
||||||
|
- includes/abbreviations.en.txt
|
||||||
|
|
||||||
|
nav:
|
||||||
|
- Home: 'index.md'
|
||||||
|
- Knowledge Base:
|
||||||
|
- 'basics/why-privacy-matters.md'
|
||||||
|
- 'basics/threat-modeling.md'
|
||||||
|
- 'basics/common-threats.md'
|
||||||
|
- 'basics/common-misconceptions.md'
|
||||||
|
- 'basics/account-creation.md'
|
||||||
|
- 'basics/account-deletion.md'
|
||||||
|
- Technology Essentials:
|
||||||
|
- 'basics/passwords-overview.md'
|
||||||
|
- 'basics/multi-factor-authentication.md'
|
||||||
|
- 'basics/email-security.md'
|
||||||
|
- 'basics/vpn-overview.md'
|
||||||
|
- Advanced Topics:
|
||||||
|
- 'advanced/dns-overview.md'
|
||||||
|
- 'advanced/tor-overview.md'
|
||||||
|
- 'advanced/payments.md'
|
||||||
|
- 'advanced/communication-network-types.md'
|
||||||
|
- Operating Systems:
|
||||||
|
- 'os/android-overview.md'
|
||||||
|
- 'os/linux-overview.md'
|
||||||
|
- 'os/qubes-overview.md'
|
||||||
|
- kb-archive.md
|
||||||
|
- Recommendations:
|
||||||
|
- 'tools.md'
|
||||||
|
- Internet Browsing:
|
||||||
|
- 'tor.md'
|
||||||
|
- 'desktop-browsers.md'
|
||||||
|
- 'mobile-browsers.md'
|
||||||
|
- Providers:
|
||||||
|
- 'cloud.md'
|
||||||
|
- 'dns.md'
|
||||||
|
- 'email.md'
|
||||||
|
- 'financial-services.md'
|
||||||
|
- 'search-engines.md'
|
||||||
|
- 'vpn.md'
|
||||||
|
- Software:
|
||||||
|
- 'calendar.md'
|
||||||
|
- 'cryptocurrency.md'
|
||||||
|
- 'data-redaction.md'
|
||||||
|
- 'email-clients.md'
|
||||||
|
- 'encryption.md'
|
||||||
|
- 'file-sharing.md'
|
||||||
|
- 'frontends.md'
|
||||||
|
- 'multi-factor-authentication.md'
|
||||||
|
- 'news-aggregators.md'
|
||||||
|
- 'notebooks.md'
|
||||||
|
- 'passwords.md'
|
||||||
|
- 'productivity.md'
|
||||||
|
- 'real-time-communication.md'
|
||||||
|
- 'video-streaming.md'
|
||||||
|
- Operating Systems:
|
||||||
|
- 'android.md'
|
||||||
|
- 'desktop.md'
|
||||||
|
- 'router.md'
|
||||||
|
- About:
|
||||||
|
- 'about/index.md'
|
||||||
|
- 'about/criteria.md'
|
||||||
|
- 'about/statistics.md'
|
||||||
|
- 'about/notices.md'
|
||||||
|
- 'about/privacy-policy.md'
|
||||||
|
- Community:
|
||||||
|
- 'about/donate.md'
|
||||||
|
- Online Services: 'about/services.md'
|
||||||
|
- Code of Conduct: 'CODE_OF_CONDUCT.md'
|
||||||
|
- 'about/privacytools.md'
|
||||||
|
- Contributing:
|
||||||
|
- Writing Guide:
|
||||||
|
- 'meta/writing-style.md'
|
||||||
|
- 'meta/brand.md'
|
||||||
|
- Technical Guides:
|
||||||
|
- 'meta/uploading-images.md'
|
||||||
|
- 'meta/git-recommendations.md'
|
||||||
|
- Changelog: 'https://github.com/privacyguides/privacyguides.org/releases'
|
||||||
|
- Forum: 'https://discuss.privacyguides.net/'
|
||||||
|
- Blog: 'https://blog.privacyguides.org/'
|
160
config/mkdocs.es.yml
Normal file
@ -0,0 +1,160 @@
|
|||||||
|
# Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
|
INHERIT: mkdocs-common.yml
|
||||||
|
docs_dir: '../i18n/es'
|
||||||
|
site_url: "https://www.privacyguides.org/es/"
|
||||||
|
site_dir: '../site/es'
|
||||||
|
|
||||||
|
site_name: Privacy Guides
|
||||||
|
site_description: |
|
||||||
|
Privacy Guides es tu recurso central de privacidad y seguridad para protegerte en línea.
|
||||||
|
copyright: |
|
||||||
|
<b>Privacy Guides</b> es un sitio web sin fines lucrativos y de motivación social que ofrece información para proteger la seguridad y privacidad de sus datos.<br>
|
||||||
|
No ganamos dinero por recomendar determinados productos y no utilizamos enlaces de afiliados.<br>
|
||||||
|
© 2019 - 2023 Privacy Guides y colaboradores.
|
||||||
|
<span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="m245.83 214.87-33.22 17.28c-9.43-19.58-25.24-19.93-27.46-19.93-22.13 0-33.22 14.61-33.22 43.84 0 23.57 9.21 43.84 33.22 43.84 14.47 0 24.65-7.09 30.57-21.26l30.55 15.5c-6.17 11.51-25.69 38.98-65.1 38.98-22.6 0-73.96-10.32-73.96-77.05 0-58.69 43-77.06 72.63-77.06 30.72-.01 52.7 11.95 65.99 35.86zm143.05 0-32.78 17.28c-9.5-19.77-25.72-19.93-27.9-19.93-22.14 0-33.22 14.61-33.22 43.84 0 23.55 9.23 43.84 33.22 43.84 14.45 0 24.65-7.09 30.54-21.26l31 15.5c-2.1 3.75-21.39 38.98-65.09 38.98-22.69 0-73.96-9.87-73.96-77.05 0-58.67 42.97-77.06 72.63-77.06 30.71-.01 52.58 11.95 65.56 35.86zM247.56 8.05C104.74 8.05 0 123.11 0 256.05c0 138.49 113.6 248 247.56 248 129.93 0 248.44-100.87 248.44-248 0-137.87-106.62-248-248.44-248zm.87 450.81c-112.54 0-203.7-93.04-203.7-202.81 0-105.42 85.43-203.27 203.72-203.27 112.53 0 202.82 89.46 202.82 203.26-.01 121.69-99.68 202.82-202.84 202.82z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M314.9 194.4v101.4h-28.3v120.5h-77.1V295.9h-28.3V194.4c0-4.4 1.6-8.2 4.6-11.3 3.1-3.1 6.9-4.7 11.3-4.7H299c4.1 0 7.8 1.6 11.1 4.7 3.1 3.2 4.8 6.9 4.8 11.3zm-101.5-63.7c0-23.3 11.5-35 34.5-35s34.5 11.7 34.5 35c0 23-11.5 34.5-34.5 34.5s-34.5-11.5-34.5-34.5zM247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3zm94 144.3v42.5H162.1V197h180.3zm0 79.8v42.5H162.1v-42.5h180.3z"></path></svg></span>
|
||||||
|
Contenido bajo licencia <a href="/license"><strong>CC BY-ND 4.0</strong></a>.
|
||||||
|
edit_uri: edit/main/i18n/es/
|
||||||
|
|
||||||
|
extra:
|
||||||
|
generator: false
|
||||||
|
analytics:
|
||||||
|
provider: plausible
|
||||||
|
property: privacyguides.org
|
||||||
|
feedback:
|
||||||
|
title: "¿Le ha resultado útil esta página?"
|
||||||
|
ratings:
|
||||||
|
- icon: material/robot-happy-outline
|
||||||
|
name: "Esta página fue útil"
|
||||||
|
data: Helpful
|
||||||
|
note: "Gracias por sus comentarios!"
|
||||||
|
- icon: material/robot-confused
|
||||||
|
name: "Esta página se podría mejorar"
|
||||||
|
data: Needs Improvement
|
||||||
|
note: "Gracias por sus comentarios. Ayúdenos a mejorar esta página abriendo un <a href='https://discuss.privacyguides.net/'>debate en nuestro foro</a>."
|
||||||
|
|
||||||
|
theme:
|
||||||
|
language: es
|
||||||
|
font:
|
||||||
|
text: Public Sans
|
||||||
|
code: DM Mono
|
||||||
|
palette:
|
||||||
|
- media: "(prefers-color-scheme)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-auto
|
||||||
|
name: "Cambiar a modo oscuro"
|
||||||
|
- media: "(prefers-color-scheme: dark)"
|
||||||
|
scheme: slate
|
||||||
|
accent: amber
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-2
|
||||||
|
name: "Cambiar a modo claro"
|
||||||
|
- media: "(prefers-color-scheme: light)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-5
|
||||||
|
name: "Cambiar al tema del sistema"
|
||||||
|
|
||||||
|
markdown_extensions:
|
||||||
|
pymdownx.snippets:
|
||||||
|
auto_append:
|
||||||
|
- includes/abbreviations.es.txt
|
||||||
|
|
||||||
|
nav:
|
||||||
|
- Inicio: 'index.md'
|
||||||
|
- Base de conocimientos:
|
||||||
|
- 'basics/why-privacy-matters.md'
|
||||||
|
- 'basics/threat-modeling.md'
|
||||||
|
- 'basics/common-threats.md'
|
||||||
|
- 'basics/common-misconceptions.md'
|
||||||
|
- 'basics/account-creation.md'
|
||||||
|
- 'basics/account-deletion.md'
|
||||||
|
- "Aspectos tecnológicos esenciales":
|
||||||
|
- 'basics/passwords-overview.md'
|
||||||
|
- 'basics/multi-factor-authentication.md'
|
||||||
|
- 'basics/email-security.md'
|
||||||
|
- 'basics/vpn-overview.md'
|
||||||
|
- Temas avanzados:
|
||||||
|
- 'advanced/dns-overview.md'
|
||||||
|
- 'advanced/tor-overview.md'
|
||||||
|
- 'advanced/payments.md'
|
||||||
|
- 'advanced/communication-network-types.md'
|
||||||
|
- Sistemas operativos:
|
||||||
|
- 'os/android-overview.md'
|
||||||
|
- 'os/linux-overview.md'
|
||||||
|
- 'os/qubes-overview.md'
|
||||||
|
- kb-archive.md
|
||||||
|
- Recomendaciones:
|
||||||
|
- 'tools.md'
|
||||||
|
- "Navegación por Internet":
|
||||||
|
- 'tor.md'
|
||||||
|
- 'desktop-browsers.md'
|
||||||
|
- 'mobile-browsers.md'
|
||||||
|
- Proveedores:
|
||||||
|
- 'cloud.md'
|
||||||
|
- 'dns.md'
|
||||||
|
- 'email.md'
|
||||||
|
- 'financial-services.md'
|
||||||
|
- 'search-engines.md'
|
||||||
|
- 'vpn.md'
|
||||||
|
- Software:
|
||||||
|
- 'calendar.md'
|
||||||
|
- 'cryptocurrency.md'
|
||||||
|
- 'data-redaction.md'
|
||||||
|
- 'email-clients.md'
|
||||||
|
- 'encryption.md'
|
||||||
|
- 'file-sharing.md'
|
||||||
|
- 'frontends.md'
|
||||||
|
- 'multi-factor-authentication.md'
|
||||||
|
- 'news-aggregators.md'
|
||||||
|
- 'notebooks.md'
|
||||||
|
- 'passwords.md'
|
||||||
|
- 'productivity.md'
|
||||||
|
- 'real-time-communication.md'
|
||||||
|
- 'video-streaming.md'
|
||||||
|
- Sistemas operativos:
|
||||||
|
- 'android.md'
|
||||||
|
- 'desktop.md'
|
||||||
|
- 'router.md'
|
||||||
|
- Acerca de:
|
||||||
|
- 'about/index.md'
|
||||||
|
- 'about/criteria.md'
|
||||||
|
- 'about/statistics.md'
|
||||||
|
- 'about/notices.md'
|
||||||
|
- 'about/privacy-policy.md'
|
||||||
|
- Comunidad:
|
||||||
|
- 'about/donate.md'
|
||||||
|
- Servicios en línea: 'about/services.md'
|
||||||
|
- "Código de conducta": 'CODE_OF_CONDUCT.md'
|
||||||
|
- 'about/privacytools.md'
|
||||||
|
- Contribuir:
|
||||||
|
- "Guía de redacción":
|
||||||
|
- 'meta/writing-style.md'
|
||||||
|
- 'meta/brand.md'
|
||||||
|
- "Guías técnicas":
|
||||||
|
- 'meta/uploading-images.md'
|
||||||
|
- 'meta/git-recommendations.md'
|
||||||
|
- "Registro de cambios": 'https://github.com/privacyguides/privacyguides.org/releases'
|
||||||
|
- Foro: 'https://discuss.privacyguides.net/'
|
||||||
|
- Blog: 'https://blog.privacyguides.org/'
|
160
config/mkdocs.fr.yml
Normal file
@ -0,0 +1,160 @@
|
|||||||
|
# Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
|
INHERIT: mkdocs-common.yml
|
||||||
|
docs_dir: '../i18n/fr'
|
||||||
|
site_url: "https://www.privacyguides.org/fr/"
|
||||||
|
site_dir: '../site/fr'
|
||||||
|
|
||||||
|
site_name: Privacy Guides
|
||||||
|
site_description: |
|
||||||
|
Privacy Guides est votre ressource centrale en matière de vie privée et de sécurité pour vous protéger en ligne.
|
||||||
|
copyright: |
|
||||||
|
<b>Privacy Guides</b> est un site web à but non lucratif et à vocation sociale qui fournit des informations pour protéger la sécurité de vos données et votre vie privée.<br>
|
||||||
|
Nous ne gagnons pas d'argent en recommandant certains produits et nous n'utilisons pas de liens d'affiliation.<br>
|
||||||
|
© 2019 - 2023 Privacy Guides et contributeurs.
|
||||||
|
<span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="m245.83 214.87-33.22 17.28c-9.43-19.58-25.24-19.93-27.46-19.93-22.13 0-33.22 14.61-33.22 43.84 0 23.57 9.21 43.84 33.22 43.84 14.47 0 24.65-7.09 30.57-21.26l30.55 15.5c-6.17 11.51-25.69 38.98-65.1 38.98-22.6 0-73.96-10.32-73.96-77.05 0-58.69 43-77.06 72.63-77.06 30.72-.01 52.7 11.95 65.99 35.86zm143.05 0-32.78 17.28c-9.5-19.77-25.72-19.93-27.9-19.93-22.14 0-33.22 14.61-33.22 43.84 0 23.55 9.23 43.84 33.22 43.84 14.45 0 24.65-7.09 30.54-21.26l31 15.5c-2.1 3.75-21.39 38.98-65.09 38.98-22.69 0-73.96-9.87-73.96-77.05 0-58.67 42.97-77.06 72.63-77.06 30.71-.01 52.58 11.95 65.56 35.86zM247.56 8.05C104.74 8.05 0 123.11 0 256.05c0 138.49 113.6 248 247.56 248 129.93 0 248.44-100.87 248.44-248 0-137.87-106.62-248-248.44-248zm.87 450.81c-112.54 0-203.7-93.04-203.7-202.81 0-105.42 85.43-203.27 203.72-203.27 112.53 0 202.82 89.46 202.82 203.26-.01 121.69-99.68 202.82-202.84 202.82z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M314.9 194.4v101.4h-28.3v120.5h-77.1V295.9h-28.3V194.4c0-4.4 1.6-8.2 4.6-11.3 3.1-3.1 6.9-4.7 11.3-4.7H299c4.1 0 7.8 1.6 11.1 4.7 3.1 3.2 4.8 6.9 4.8 11.3zm-101.5-63.7c0-23.3 11.5-35 34.5-35s34.5 11.7 34.5 35c0 23-11.5 34.5-34.5 34.5s-34.5-11.5-34.5-34.5zM247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3zm94 144.3v42.5H162.1V197h180.3zm0 79.8v42.5H162.1v-42.5h180.3z"></path></svg></span>
|
||||||
|
Contenu sous licence <a href="/license"><strong>CC BY-ND 4.0</strong></a>.
|
||||||
|
edit_uri: edit/main/i18n/fr/
|
||||||
|
|
||||||
|
extra:
|
||||||
|
generator: false
|
||||||
|
analytics:
|
||||||
|
provider: plausible
|
||||||
|
property: privacyguides.org
|
||||||
|
feedback:
|
||||||
|
title: "Cette page vous a été utile ?"
|
||||||
|
ratings:
|
||||||
|
- icon: material/robot-happy-outline
|
||||||
|
name: "Cette page a été utile"
|
||||||
|
data: Helpful
|
||||||
|
note: "Merci pour votre retour !"
|
||||||
|
- icon: material/robot-confused
|
||||||
|
name: "Cette page pourrait être améliorée"
|
||||||
|
data: Needs Improvement
|
||||||
|
note: "Merci pour vos commentaires ! Aidez-nous à améliorer cette page en ouvrant une <a href='https://discuss.privacyguides.net/'>discussion sur notre forum</a>."
|
||||||
|
|
||||||
|
theme:
|
||||||
|
language: fr
|
||||||
|
font:
|
||||||
|
text: Public Sans
|
||||||
|
code: DM Mono
|
||||||
|
palette:
|
||||||
|
- media: "(prefers-color-scheme)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-auto
|
||||||
|
name: "Basculer en mode sombre"
|
||||||
|
- media: "(prefers-color-scheme: dark)"
|
||||||
|
scheme: slate
|
||||||
|
accent: amber
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-2
|
||||||
|
name: "Basculer en mode clair"
|
||||||
|
- media: "(prefers-color-scheme: light)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-5
|
||||||
|
name: "Basculer vers le thème du système"
|
||||||
|
|
||||||
|
markdown_extensions:
|
||||||
|
pymdownx.snippets:
|
||||||
|
auto_append:
|
||||||
|
- includes/abbreviations.fr.txt
|
||||||
|
|
||||||
|
nav:
|
||||||
|
- Accueil: 'index.md'
|
||||||
|
- Base de connaissances:
|
||||||
|
- 'basics/why-privacy-matters.md'
|
||||||
|
- 'basics/threat-modeling.md'
|
||||||
|
- 'basics/common-threats.md'
|
||||||
|
- 'basics/common-misconceptions.md'
|
||||||
|
- 'basics/account-creation.md'
|
||||||
|
- 'basics/account-deletion.md'
|
||||||
|
- Les essentiels de la technologie:
|
||||||
|
- 'basics/passwords-overview.md'
|
||||||
|
- 'basics/multi-factor-authentication.md'
|
||||||
|
- 'basics/email-security.md'
|
||||||
|
- 'basics/vpn-overview.md'
|
||||||
|
- "Sujets avancés":
|
||||||
|
- 'advanced/dns-overview.md'
|
||||||
|
- 'advanced/tor-overview.md'
|
||||||
|
- 'advanced/payments.md'
|
||||||
|
- 'advanced/communication-network-types.md'
|
||||||
|
- "Systèmes d'exploitation":
|
||||||
|
- 'os/android-overview.md'
|
||||||
|
- 'os/linux-overview.md'
|
||||||
|
- 'os/qubes-overview.md'
|
||||||
|
- kb-archive.md
|
||||||
|
- Recommandations:
|
||||||
|
- 'tools.md'
|
||||||
|
- Navigation internet:
|
||||||
|
- 'tor.md'
|
||||||
|
- 'desktop-browsers.md'
|
||||||
|
- 'mobile-browsers.md'
|
||||||
|
- "Fournisseurs":
|
||||||
|
- 'cloud.md'
|
||||||
|
- 'dns.md'
|
||||||
|
- 'email.md'
|
||||||
|
- 'financial-services.md'
|
||||||
|
- 'search-engines.md'
|
||||||
|
- 'vpn.md'
|
||||||
|
- "Logiciels":
|
||||||
|
- 'calendar.md'
|
||||||
|
- 'cryptocurrency.md'
|
||||||
|
- 'data-redaction.md'
|
||||||
|
- 'email-clients.md'
|
||||||
|
- 'encryption.md'
|
||||||
|
- 'file-sharing.md'
|
||||||
|
- 'frontends.md'
|
||||||
|
- 'multi-factor-authentication.md'
|
||||||
|
- 'news-aggregators.md'
|
||||||
|
- 'notebooks.md'
|
||||||
|
- 'passwords.md'
|
||||||
|
- 'productivity.md'
|
||||||
|
- 'real-time-communication.md'
|
||||||
|
- 'video-streaming.md'
|
||||||
|
- "Systèmes d'exploitation":
|
||||||
|
- 'android.md'
|
||||||
|
- 'desktop.md'
|
||||||
|
- 'router.md'
|
||||||
|
- "À propos":
|
||||||
|
- 'about/index.md'
|
||||||
|
- 'about/criteria.md'
|
||||||
|
- 'about/statistics.md'
|
||||||
|
- 'about/notices.md'
|
||||||
|
- 'about/privacy-policy.md'
|
||||||
|
- "Communauté":
|
||||||
|
- 'about/donate.md'
|
||||||
|
- "Services en ligne": 'about/services.md'
|
||||||
|
- "Code de conduite": 'CODE_OF_CONDUCT.md'
|
||||||
|
- 'about/privacytools.md'
|
||||||
|
- "Contribuer":
|
||||||
|
- "Guide de rédaction":
|
||||||
|
- 'meta/writing-style.md'
|
||||||
|
- 'meta/brand.md'
|
||||||
|
- "Guides techniques":
|
||||||
|
- 'meta/uploading-images.md'
|
||||||
|
- 'meta/git-recommendations.md'
|
||||||
|
- Journal des modifications: 'https://github.com/privacyguides/privacyguides.org/releases'
|
||||||
|
- Forum: 'https://discuss.privacyguides.net/'
|
||||||
|
- Blog: 'https://blog.privacyguides.org/'
|
164
config/mkdocs.he.yml
Normal file
@ -0,0 +1,164 @@
|
|||||||
|
# Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
|
INHERIT: mkdocs-common.yml
|
||||||
|
docs_dir: '../i18n/he'
|
||||||
|
site_url: "https://www.privacyguides.org/he/"
|
||||||
|
site_dir: '../site/he'
|
||||||
|
|
||||||
|
site_name: Privacy Guides
|
||||||
|
site_description: |
|
||||||
|
Privacy Guides (מדריכי פרטיות) הם משאב הפרטיות והאבטחה המרכזי שלכם כדי להגן על עצמכם באופן מקוון.
|
||||||
|
copyright: |
|
||||||
|
<b>Privacy Guides</b> is a non-profit, socially motivated website that provides information for protecting your data security and privacy.<br>
|
||||||
|
We do not make money from recommending certain products, and we do not use affiliate links.<br>
|
||||||
|
© 2019 - 2023 Privacy Guides and contributors.
|
||||||
|
<span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="m245.83 214.87-33.22 17.28c-9.43-19.58-25.24-19.93-27.46-19.93-22.13 0-33.22 14.61-33.22 43.84 0 23.57 9.21 43.84 33.22 43.84 14.47 0 24.65-7.09 30.57-21.26l30.55 15.5c-6.17 11.51-25.69 38.98-65.1 38.98-22.6 0-73.96-10.32-73.96-77.05 0-58.69 43-77.06 72.63-77.06 30.72-.01 52.7 11.95 65.99 35.86zm143.05 0-32.78 17.28c-9.5-19.77-25.72-19.93-27.9-19.93-22.14 0-33.22 14.61-33.22 43.84 0 23.55 9.23 43.84 33.22 43.84 14.45 0 24.65-7.09 30.54-21.26l31 15.5c-2.1 3.75-21.39 38.98-65.09 38.98-22.69 0-73.96-9.87-73.96-77.05 0-58.67 42.97-77.06 72.63-77.06 30.71-.01 52.58 11.95 65.56 35.86zM247.56 8.05C104.74 8.05 0 123.11 0 256.05c0 138.49 113.6 248 247.56 248 129.93 0 248.44-100.87 248.44-248 0-137.87-106.62-248-248.44-248zm.87 450.81c-112.54 0-203.7-93.04-203.7-202.81 0-105.42 85.43-203.27 203.72-203.27 112.53 0 202.82 89.46 202.82 203.26-.01 121.69-99.68 202.82-202.84 202.82z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M314.9 194.4v101.4h-28.3v120.5h-77.1V295.9h-28.3V194.4c0-4.4 1.6-8.2 4.6-11.3 3.1-3.1 6.9-4.7 11.3-4.7H299c4.1 0 7.8 1.6 11.1 4.7 3.1 3.2 4.8 6.9 4.8 11.3zm-101.5-63.7c0-23.3 11.5-35 34.5-35s34.5 11.7 34.5 35c0 23-11.5 34.5-34.5 34.5s-34.5-11.5-34.5-34.5zM247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3zm94 144.3v42.5H162.1V197h180.3zm0 79.8v42.5H162.1v-42.5h180.3z"></path></svg></span>
|
||||||
|
Content licensed under <a href="/license"><strong>CC BY-ND 4.0</strong></a>.
|
||||||
|
edit_uri: edit/main/i18n/he/
|
||||||
|
|
||||||
|
extra:
|
||||||
|
generator: false
|
||||||
|
analytics:
|
||||||
|
provider: plausible
|
||||||
|
property: privacyguides.org
|
||||||
|
feedback:
|
||||||
|
title: "האם הדף הזה עזר לך?"
|
||||||
|
ratings:
|
||||||
|
- icon: material/robot-happy-outline
|
||||||
|
name: "הדף הזה היה מועיל"
|
||||||
|
data: Helpful
|
||||||
|
note: "תודה על המשוב שלך!"
|
||||||
|
- icon: material/robot-confused
|
||||||
|
name: "דף זה יכול להשתפר"
|
||||||
|
data: Needs Improvement
|
||||||
|
note: "תודה על המשוב שלך! Help us improve this page by opening a <a href='https://discuss.privacyguides.net/'>discussion on our forum</a>."
|
||||||
|
|
||||||
|
extra_css:
|
||||||
|
- assets/stylesheets/extra.css?v=3.2.0
|
||||||
|
- assets/stylesheets/lang-he.css?v=3.4.0
|
||||||
|
|
||||||
|
theme:
|
||||||
|
language: he
|
||||||
|
font:
|
||||||
|
text: Open Sans
|
||||||
|
code: Cousine
|
||||||
|
palette:
|
||||||
|
- media: "(prefers-color-scheme)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-auto
|
||||||
|
name: "עבור למצב כהה"
|
||||||
|
- media: "(prefers-color-scheme: dark)"
|
||||||
|
scheme: slate
|
||||||
|
accent: amber
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-2
|
||||||
|
name: "עבור למצב בהיר"
|
||||||
|
- media: "(prefers-color-scheme: light)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-5
|
||||||
|
name: "עבור לערכת הנושא של המערכת"
|
||||||
|
|
||||||
|
markdown_extensions:
|
||||||
|
pymdownx.snippets:
|
||||||
|
auto_append:
|
||||||
|
- includes/abbreviations.he.txt
|
||||||
|
|
||||||
|
nav:
|
||||||
|
- "דף הבית": 'index.md'
|
||||||
|
- "ידע בסיסי":
|
||||||
|
- 'basics/why-privacy-matters.md'
|
||||||
|
- 'basics/threat-modeling.md'
|
||||||
|
- 'basics/common-threats.md'
|
||||||
|
- 'basics/common-misconceptions.md'
|
||||||
|
- 'basics/account-creation.md'
|
||||||
|
- 'basics/account-deletion.md'
|
||||||
|
- "יסודות הטכנולוגיה":
|
||||||
|
- 'basics/passwords-overview.md'
|
||||||
|
- 'basics/multi-factor-authentication.md'
|
||||||
|
- 'basics/email-security.md'
|
||||||
|
- 'basics/vpn-overview.md'
|
||||||
|
- "נושאים מתקדמים":
|
||||||
|
- 'advanced/dns-overview.md'
|
||||||
|
- 'advanced/tor-overview.md'
|
||||||
|
- 'advanced/payments.md'
|
||||||
|
- 'advanced/communication-network-types.md'
|
||||||
|
- "מערכות הפעלה":
|
||||||
|
- 'os/android-overview.md'
|
||||||
|
- 'os/linux-overview.md'
|
||||||
|
- 'os/qubes-overview.md'
|
||||||
|
- kb-archive.md
|
||||||
|
- "המלצות":
|
||||||
|
- 'tools.md'
|
||||||
|
- "גלישה באינטרנט":
|
||||||
|
- 'tor.md'
|
||||||
|
- 'desktop-browsers.md'
|
||||||
|
- 'mobile-browsers.md'
|
||||||
|
- "ספקים":
|
||||||
|
- 'cloud.md'
|
||||||
|
- 'dns.md'
|
||||||
|
- 'email.md'
|
||||||
|
- 'financial-services.md'
|
||||||
|
- 'search-engines.md'
|
||||||
|
- 'vpn.md'
|
||||||
|
- "תוכנה":
|
||||||
|
- 'calendar.md'
|
||||||
|
- 'cryptocurrency.md'
|
||||||
|
- 'data-redaction.md'
|
||||||
|
- 'email-clients.md'
|
||||||
|
- 'encryption.md'
|
||||||
|
- 'file-sharing.md'
|
||||||
|
- 'frontends.md'
|
||||||
|
- 'multi-factor-authentication.md'
|
||||||
|
- 'news-aggregators.md'
|
||||||
|
- 'notebooks.md'
|
||||||
|
- 'passwords.md'
|
||||||
|
- 'productivity.md'
|
||||||
|
- 'real-time-communication.md'
|
||||||
|
- 'video-streaming.md'
|
||||||
|
- "מערכות הפעלה":
|
||||||
|
- 'android.md'
|
||||||
|
- 'desktop.md'
|
||||||
|
- 'router.md'
|
||||||
|
- "על אודות":
|
||||||
|
- 'about/index.md'
|
||||||
|
- 'about/criteria.md'
|
||||||
|
- 'about/statistics.md'
|
||||||
|
- 'about/notices.md'
|
||||||
|
- 'about/privacy-policy.md'
|
||||||
|
- Community:
|
||||||
|
- 'about/donate.md'
|
||||||
|
- Online Services: 'about/services.md'
|
||||||
|
- Code of Conduct: 'CODE_OF_CONDUCT.md'
|
||||||
|
- 'about/privacytools.md'
|
||||||
|
- Contributing:
|
||||||
|
- Writing Guide:
|
||||||
|
- 'meta/writing-style.md'
|
||||||
|
- 'meta/brand.md'
|
||||||
|
- Technical Guides:
|
||||||
|
- 'meta/uploading-images.md'
|
||||||
|
- 'meta/git-recommendations.md'
|
||||||
|
- "יומן שינויים": 'https://github.com/privacyguides/privacyguides.org/releases'
|
||||||
|
- "פורום": 'https://discuss.privacyguides.net/'
|
||||||
|
- "בלוג": 'https://blog.privacyguides.org/'
|
160
config/mkdocs.it.yml
Normal file
@ -0,0 +1,160 @@
|
|||||||
|
# Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
|
INHERIT: mkdocs-common.yml
|
||||||
|
docs_dir: '../i18n/it'
|
||||||
|
site_url: "https://www.privacyguides.org/it/"
|
||||||
|
site_dir: '../site/it'
|
||||||
|
|
||||||
|
site_name: Privacy Guides
|
||||||
|
site_description: |
|
||||||
|
Privacy Guides è la risorsa centrale per la privacy e la sicurezza per proteggersi online.
|
||||||
|
copyright: |
|
||||||
|
<b>Privacy Guides</b> è un sito web senza fini di lucro e a sfondo sociale che fornisce informazioni per proteggere la sicurezza e la privacy dei dati.<br>
|
||||||
|
Non guadagniamo denaro consigliando determinati prodotti e non utilizziamo link di affiliazione.<br>
|
||||||
|
© 2019 - 2023 Privacy Guides e collaboratori.
|
||||||
|
<span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="m245.83 214.87-33.22 17.28c-9.43-19.58-25.24-19.93-27.46-19.93-22.13 0-33.22 14.61-33.22 43.84 0 23.57 9.21 43.84 33.22 43.84 14.47 0 24.65-7.09 30.57-21.26l30.55 15.5c-6.17 11.51-25.69 38.98-65.1 38.98-22.6 0-73.96-10.32-73.96-77.05 0-58.69 43-77.06 72.63-77.06 30.72-.01 52.7 11.95 65.99 35.86zm143.05 0-32.78 17.28c-9.5-19.77-25.72-19.93-27.9-19.93-22.14 0-33.22 14.61-33.22 43.84 0 23.55 9.23 43.84 33.22 43.84 14.45 0 24.65-7.09 30.54-21.26l31 15.5c-2.1 3.75-21.39 38.98-65.09 38.98-22.69 0-73.96-9.87-73.96-77.05 0-58.67 42.97-77.06 72.63-77.06 30.71-.01 52.58 11.95 65.56 35.86zM247.56 8.05C104.74 8.05 0 123.11 0 256.05c0 138.49 113.6 248 247.56 248 129.93 0 248.44-100.87 248.44-248 0-137.87-106.62-248-248.44-248zm.87 450.81c-112.54 0-203.7-93.04-203.7-202.81 0-105.42 85.43-203.27 203.72-203.27 112.53 0 202.82 89.46 202.82 203.26-.01 121.69-99.68 202.82-202.84 202.82z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M314.9 194.4v101.4h-28.3v120.5h-77.1V295.9h-28.3V194.4c0-4.4 1.6-8.2 4.6-11.3 3.1-3.1 6.9-4.7 11.3-4.7H299c4.1 0 7.8 1.6 11.1 4.7 3.1 3.2 4.8 6.9 4.8 11.3zm-101.5-63.7c0-23.3 11.5-35 34.5-35s34.5 11.7 34.5 35c0 23-11.5 34.5-34.5 34.5s-34.5-11.5-34.5-34.5zM247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3zm94 144.3v42.5H162.1V197h180.3zm0 79.8v42.5H162.1v-42.5h180.3z"></path></svg></span>
|
||||||
|
Contenuto sotto licenza <a href="/license"><strong>CC BY-ND 4.0</strong></a>.
|
||||||
|
edit_uri: edit/main/i18n/it/
|
||||||
|
|
||||||
|
extra:
|
||||||
|
generator: false
|
||||||
|
analytics:
|
||||||
|
provider: plausible
|
||||||
|
property: privacyguides.org
|
||||||
|
feedback:
|
||||||
|
title: "Questa pagina è stata utile?"
|
||||||
|
ratings:
|
||||||
|
- icon: material/robot-happy-outline
|
||||||
|
name: "Questa pagina è stata utile"
|
||||||
|
data: Helpful
|
||||||
|
note: "Grazie per il tuo feedback!"
|
||||||
|
- icon: material/robot-confused
|
||||||
|
name: "Questa pagina può essere migliorata"
|
||||||
|
data: Needs Improvement
|
||||||
|
note: "Grazie per il tuo feedback! Aiutaci a migliorare questa pagina aprendo una discussione sul <a href='https://discuss.privacyguides.net/'>nostro forum</a>."
|
||||||
|
|
||||||
|
theme:
|
||||||
|
language: it
|
||||||
|
font:
|
||||||
|
text: Public Sans
|
||||||
|
code: DM Mono
|
||||||
|
palette:
|
||||||
|
- media: "(prefers-color-scheme)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-auto
|
||||||
|
name: "Passa al tema scuro"
|
||||||
|
- media: "(prefers-color-scheme: dark)"
|
||||||
|
scheme: slate
|
||||||
|
accent: amber
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-2
|
||||||
|
name: "Passa al tema chiaro"
|
||||||
|
- media: "(prefers-color-scheme: light)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-5
|
||||||
|
name: "Passa al tema di sistema"
|
||||||
|
|
||||||
|
markdown_extensions:
|
||||||
|
pymdownx.snippets:
|
||||||
|
auto_append:
|
||||||
|
- includes/abbreviations.it.txt
|
||||||
|
|
||||||
|
nav:
|
||||||
|
- Pagina iniziale: 'index.md'
|
||||||
|
- Conoscenze di base:
|
||||||
|
- 'basics/why-privacy-matters.md'
|
||||||
|
- 'basics/threat-modeling.md'
|
||||||
|
- 'basics/common-threats.md'
|
||||||
|
- 'basics/common-misconceptions.md'
|
||||||
|
- 'basics/account-creation.md'
|
||||||
|
- 'basics/account-deletion.md'
|
||||||
|
- Elementi essenziali della tecnologia:
|
||||||
|
- 'basics/passwords-overview.md'
|
||||||
|
- 'basics/multi-factor-authentication.md'
|
||||||
|
- 'basics/email-security.md'
|
||||||
|
- 'basics/vpn-overview.md'
|
||||||
|
- Argomenti avanzati:
|
||||||
|
- 'advanced/dns-overview.md'
|
||||||
|
- 'advanced/tor-overview.md'
|
||||||
|
- 'advanced/payments.md'
|
||||||
|
- 'advanced/communication-network-types.md'
|
||||||
|
- Sistemi operativi:
|
||||||
|
- 'os/android-overview.md'
|
||||||
|
- 'os/linux-overview.md'
|
||||||
|
- 'os/qubes-overview.md'
|
||||||
|
- kb-archive.md
|
||||||
|
- Raccomandazioni:
|
||||||
|
- 'tools.md'
|
||||||
|
- Navigazione su Internet:
|
||||||
|
- 'tor.md'
|
||||||
|
- 'desktop-browsers.md'
|
||||||
|
- 'mobile-browsers.md'
|
||||||
|
- Fornitori:
|
||||||
|
- 'cloud.md'
|
||||||
|
- 'dns.md'
|
||||||
|
- 'email.md'
|
||||||
|
- 'financial-services.md'
|
||||||
|
- 'search-engines.md'
|
||||||
|
- 'vpn.md'
|
||||||
|
- Software:
|
||||||
|
- 'calendar.md'
|
||||||
|
- 'cryptocurrency.md'
|
||||||
|
- 'data-redaction.md'
|
||||||
|
- 'email-clients.md'
|
||||||
|
- 'encryption.md'
|
||||||
|
- 'file-sharing.md'
|
||||||
|
- 'frontends.md'
|
||||||
|
- 'multi-factor-authentication.md'
|
||||||
|
- 'news-aggregators.md'
|
||||||
|
- 'notebooks.md'
|
||||||
|
- 'passwords.md'
|
||||||
|
- 'productivity.md'
|
||||||
|
- 'real-time-communication.md'
|
||||||
|
- 'video-streaming.md'
|
||||||
|
- Sistemi operativi:
|
||||||
|
- 'android.md'
|
||||||
|
- 'desktop.md'
|
||||||
|
- 'router.md'
|
||||||
|
- Informazioni:
|
||||||
|
- 'about/index.md'
|
||||||
|
- 'about/criteria.md'
|
||||||
|
- 'about/statistics.md'
|
||||||
|
- 'about/notices.md'
|
||||||
|
- 'about/privacy-policy.md'
|
||||||
|
- Comunità:
|
||||||
|
- 'about/donate.md'
|
||||||
|
- Servizi online: 'about/services.md'
|
||||||
|
- Codice di condotta: 'CODE_OF_CONDUCT.md'
|
||||||
|
- 'about/privacytools.md'
|
||||||
|
- Contribuisci:
|
||||||
|
- Guida alla scrittura:
|
||||||
|
- 'meta/writing-style.md'
|
||||||
|
- 'meta/brand.md'
|
||||||
|
- Guide tecniche:
|
||||||
|
- 'meta/uploading-images.md'
|
||||||
|
- 'meta/git-recommendations.md'
|
||||||
|
- Registro delle modifiche: 'https://github.com/privacyguides/privacyguides.org/releases'
|
||||||
|
- Forum: 'https://discuss.privacyguides.net/'
|
||||||
|
- Blog: 'https://blog.privacyguides.org/'
|
160
config/mkdocs.nl.yml
Normal file
@ -0,0 +1,160 @@
|
|||||||
|
# Copyright (c) 2022-2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
|
INHERIT: mkdocs-common.yml
|
||||||
|
docs_dir: '../i18n/nl'
|
||||||
|
site_url: "https://www.privacyguides.org/nl/"
|
||||||
|
site_dir: '../site/nl'
|
||||||
|
|
||||||
|
site_name: Privacy Guides
|
||||||
|
site_description: |
|
||||||
|
Privacy Guides is jouw centrale bron voor privacy en beveiliging om jezelf online te beschermen.
|
||||||
|
copyright: |
|
||||||
|
<b>Privacy Guides</b> is een non-profit, sociaal gemotiveerde website die informatie biedt voor de bescherming van jouw gegevensbeveiliging en privacy.<br>
|
||||||
|
Wij verdienen geen geld met het aanbevelen van bepaalde producten, en wij maken geen gebruik van affiliate links.<br>
|
||||||
|
© 2019 - 2023 Privacy Guides en medewerkers.
|
||||||
|
<span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="m245.83 214.87-33.22 17.28c-9.43-19.58-25.24-19.93-27.46-19.93-22.13 0-33.22 14.61-33.22 43.84 0 23.57 9.21 43.84 33.22 43.84 14.47 0 24.65-7.09 30.57-21.26l30.55 15.5c-6.17 11.51-25.69 38.98-65.1 38.98-22.6 0-73.96-10.32-73.96-77.05 0-58.69 43-77.06 72.63-77.06 30.72-.01 52.7 11.95 65.99 35.86zm143.05 0-32.78 17.28c-9.5-19.77-25.72-19.93-27.9-19.93-22.14 0-33.22 14.61-33.22 43.84 0 23.55 9.23 43.84 33.22 43.84 14.45 0 24.65-7.09 30.54-21.26l31 15.5c-2.1 3.75-21.39 38.98-65.09 38.98-22.69 0-73.96-9.87-73.96-77.05 0-58.67 42.97-77.06 72.63-77.06 30.71-.01 52.58 11.95 65.56 35.86zM247.56 8.05C104.74 8.05 0 123.11 0 256.05c0 138.49 113.6 248 247.56 248 129.93 0 248.44-100.87 248.44-248 0-137.87-106.62-248-248.44-248zm.87 450.81c-112.54 0-203.7-93.04-203.7-202.81 0-105.42 85.43-203.27 203.72-203.27 112.53 0 202.82 89.46 202.82 203.26-.01 121.69-99.68 202.82-202.84 202.82z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M314.9 194.4v101.4h-28.3v120.5h-77.1V295.9h-28.3V194.4c0-4.4 1.6-8.2 4.6-11.3 3.1-3.1 6.9-4.7 11.3-4.7H299c4.1 0 7.8 1.6 11.1 4.7 3.1 3.2 4.8 6.9 4.8 11.3zm-101.5-63.7c0-23.3 11.5-35 34.5-35s34.5 11.7 34.5 35c0 23-11.5 34.5-34.5 34.5s-34.5-11.5-34.5-34.5zM247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3zm94 144.3v42.5H162.1V197h180.3zm0 79.8v42.5H162.1v-42.5h180.3z"></path></svg></span>
|
||||||
|
Inhoud gelicentieerd onder <a href="/license"><strong>CC BY-ND 4.0</strong></a>.
|
||||||
|
edit_uri: edit/main/i18n/nl/
|
||||||
|
|
||||||
|
extra:
|
||||||
|
generator: false
|
||||||
|
analytics:
|
||||||
|
provider: plausible
|
||||||
|
property: privacyguides.org
|
||||||
|
feedback:
|
||||||
|
title: "Was deze pagina nuttig?"
|
||||||
|
ratings:
|
||||||
|
- icon: material/robot-happy-outline
|
||||||
|
name: "Deze pagina was nuttig"
|
||||||
|
data: Helpful
|
||||||
|
note: "Bedankt voor je feedback!"
|
||||||
|
- icon: material/robot-confused
|
||||||
|
name: "Deze pagina kan worden verbeterd"
|
||||||
|
data: Needs Improvement
|
||||||
|
note: "Bedankt voor jouw feedback! Help ons deze pagina te verbeteren door een <a href='https://discuss.privacyguides.net/'>discussie te openen op ons forum</a>."
|
||||||
|
|
||||||
|
theme:
|
||||||
|
language: nl
|
||||||
|
font:
|
||||||
|
text: Public Sans
|
||||||
|
code: DM Mono
|
||||||
|
palette:
|
||||||
|
- media: "(prefers-color-scheme)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-auto
|
||||||
|
name: "Verander naar donker thema"
|
||||||
|
- media: "(prefers-color-scheme: dark)"
|
||||||
|
scheme: slate
|
||||||
|
accent: amber
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-2
|
||||||
|
name: "Verander naar licht thema"
|
||||||
|
- media: "(prefers-color-scheme: light)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-5
|
||||||
|
name: "Verander naar systeem thema"
|
||||||
|
|
||||||
|
markdown_extensions:
|
||||||
|
pymdownx.snippets:
|
||||||
|
auto_append:
|
||||||
|
- includes/abbreviations.nl.txt
|
||||||
|
|
||||||
|
nav:
|
||||||
|
- Home: 'index.md'
|
||||||
|
- Kennisbank:
|
||||||
|
- 'basics/why-privacy-matters.md'
|
||||||
|
- 'basics/threat-modeling.md'
|
||||||
|
- 'basics/common-threats.md'
|
||||||
|
- 'basics/common-misconceptions.md'
|
||||||
|
- 'basics/account-creation.md'
|
||||||
|
- 'basics/account-deletion.md'
|
||||||
|
- Technologie essenties:
|
||||||
|
- 'basics/passwords-overview.md'
|
||||||
|
- 'basics/multi-factor-authentication.md'
|
||||||
|
- 'basics/email-security.md'
|
||||||
|
- 'basics/vpn-overview.md'
|
||||||
|
- Gevorderde onderwerpen:
|
||||||
|
- 'advanced/dns-overview.md'
|
||||||
|
- 'advanced/tor-overview.md'
|
||||||
|
- 'advanced/payments.md'
|
||||||
|
- 'advanced/communication-network-types.md'
|
||||||
|
- Besturings systemen:
|
||||||
|
- 'os/android-overview.md'
|
||||||
|
- 'os/linux-overview.md'
|
||||||
|
- 'os/qubes-overview.md'
|
||||||
|
- kb-archive.md
|
||||||
|
- Recommendaties:
|
||||||
|
- 'tools.md'
|
||||||
|
- Surfen op het internet:
|
||||||
|
- 'tor.md'
|
||||||
|
- 'desktop-browsers.md'
|
||||||
|
- 'mobile-browsers.md'
|
||||||
|
- Providers:
|
||||||
|
- 'cloud.md'
|
||||||
|
- 'dns.md'
|
||||||
|
- 'email.md'
|
||||||
|
- 'financial-services.md'
|
||||||
|
- 'search-engines.md'
|
||||||
|
- 'vpn.md'
|
||||||
|
- Software:
|
||||||
|
- 'calendar.md'
|
||||||
|
- 'cryptocurrency.md'
|
||||||
|
- 'data-redaction.md'
|
||||||
|
- 'email-clients.md'
|
||||||
|
- 'encryption.md'
|
||||||
|
- 'file-sharing.md'
|
||||||
|
- 'frontends.md'
|
||||||
|
- 'multi-factor-authentication.md'
|
||||||
|
- 'news-aggregators.md'
|
||||||
|
- 'notebooks.md'
|
||||||
|
- 'passwords.md'
|
||||||
|
- 'productivity.md'
|
||||||
|
- 'real-time-communication.md'
|
||||||
|
- 'video-streaming.md'
|
||||||
|
- Besturings systemen:
|
||||||
|
- 'android.md'
|
||||||
|
- 'desktop.md'
|
||||||
|
- 'router.md'
|
||||||
|
- Over ons:
|
||||||
|
- 'about/index.md'
|
||||||
|
- 'about/criteria.md'
|
||||||
|
- 'about/statistics.md'
|
||||||
|
- 'about/notices.md'
|
||||||
|
- 'about/privacy-policy.md'
|
||||||
|
- Gemeenschap:
|
||||||
|
- 'about/donate.md'
|
||||||
|
- Online diensten: 'about/services.md'
|
||||||
|
- Gedragscode: 'CODE_OF_CONDUCT.md'
|
||||||
|
- 'about/privacytools.md'
|
||||||
|
- Bijdragen:
|
||||||
|
- Schrijfgids:
|
||||||
|
- 'meta/writing-style.md'
|
||||||
|
- 'meta/brand.md'
|
||||||
|
- Technische gids:
|
||||||
|
- 'meta/uploading-images.md'
|
||||||
|
- 'meta/git-recommendations.md'
|
||||||
|
- Wijzigingslogboek: 'https://github.com/privacyguides/privacyguides.org/releases'
|
||||||
|
- Forum: 'https://discuss.privacyguides.net/'
|
||||||
|
- Blog: 'https://blog.privacyguides.org/'
|
44
crowdin.yml
@ -1,18 +1,42 @@
|
|||||||
project_id_env: CROWDIN_PROJECT_ID
|
# Copyright (c) 2023 Jonah Aragon <jonah@triplebit.net>
|
||||||
|
|
||||||
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
# of this software and associated documentation files (the "Software"), to
|
||||||
|
# deal in the Software without restriction, including without limitation the
|
||||||
|
# rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
||||||
|
# sell copies of the Software, and to permit persons to whom the Software is
|
||||||
|
# furnished to do so, subject to the following conditions:
|
||||||
|
|
||||||
|
# The above copyright notice and this permission notice shall be included in
|
||||||
|
# all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
# FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||||
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
||||||
|
# IN THE SOFTWARE.
|
||||||
|
|
||||||
api_token_env: CROWDIN_PERSONAL_TOKEN
|
api_token_env: CROWDIN_PERSONAL_TOKEN
|
||||||
|
project_id: "509862"
|
||||||
"preserve_hierarchy": true
|
"preserve_hierarchy": true
|
||||||
files:
|
files:
|
||||||
- source: "/docs/**/*.en.*"
|
- source: "/docs/**/*.*"
|
||||||
translation: "/docs/**/%file_name%.%locale_with_underscore%.%file_extension%"
|
translation: "/i18n/%two_letters_code%/**/%file_name%.%file_extension%"
|
||||||
translation_replace:
|
skip_untranslated_files: false
|
||||||
"en.": ""
|
|
||||||
update_option: update_as_unapproved
|
|
||||||
- source: "/theme/overrides/*.en.html"
|
- source: "/theme/overrides/*.en.html"
|
||||||
translation: "/theme/overrides/%file_name%.%locale_with_underscore%.html"
|
translation: "/theme/overrides/%file_name%.%two_letters_code%.html"
|
||||||
translation_replace:
|
translation_replace:
|
||||||
"en.": ""
|
"en.": ""
|
||||||
- source: "/includes/*.en.md"
|
skip_untranslated_files: false
|
||||||
translation: "/includes/%file_name%.%locale_with_underscore%.md"
|
- source: "/includes/*.en.*"
|
||||||
|
translation: "/includes/%file_name%.%two_letters_code%.%file_extension%"
|
||||||
translation_replace:
|
translation_replace:
|
||||||
"en.": ""
|
"en.": ""
|
||||||
update_option: update_as_unapproved
|
skip_untranslated_files: false
|
||||||
|
- source: "/static/i18n/*.en.*"
|
||||||
|
translation: "/static/i18n/%file_name%.%two_letters_code%.%file_extension%"
|
||||||
|
translation_replace:
|
||||||
|
"en.": ""
|
||||||
|
skip_untranslated_files: false
|
||||||
|
@ -29,7 +29,7 @@ We have these requirements in regard to developers which wish to submit their pr
|
|||||||
|
|
||||||
- Must disclose affiliation, i.e. your position within the project being submitted.
|
- Must disclose affiliation, i.e. your position within the project being submitted.
|
||||||
|
|
||||||
- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage etc.
|
- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage, etc.
|
||||||
- Third party audit status. We want to know if you have one, or have one planned. If possible please mention who will be conducting the audit.
|
- Third party audit status. We want to know if you have one, or have one planned. If possible please mention who will be conducting the audit.
|
||||||
|
|
||||||
- Must explain what the project brings to the table in regard to privacy.
|
- Must explain what the project brings to the table in regard to privacy.
|
||||||
|
@ -2,18 +2,22 @@
|
|||||||
title: Supporting Us
|
title: Supporting Us
|
||||||
---
|
---
|
||||||
<!-- markdownlint-disable MD036 -->
|
<!-- markdownlint-disable MD036 -->
|
||||||
It takes a lot of [people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) and [work](https://github.com/privacyguides/privacyguides.org/pulse/monthly) to keep Privacy Guides up to date and spreading the word about privacy and mass surveillance. If you like what we do, the best way to help out is by getting involved by [editing the site](https://github.com/privacyguides/privacyguides.org) or [contributing translations](https://crowdin.com/project/privacyguides).
|
It takes a lot of [people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) and [work](https://github.com/privacyguides/privacyguides.org/pulse/monthly) to keep Privacy Guides up to date and spreading the word about privacy and mass surveillance. If you like what we do, consider getting involved by [editing the site](https://github.com/privacyguides/privacyguides.org) or [contributing translations](https://crowdin.com/project/privacyguides).
|
||||||
|
|
||||||
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
If you want to support us financially, the most convenient method for us is contributing via Open Collective, a website operated by our fiscal host. Open Collective accepts payments via credit/debit card, PayPal, and bank transfers.
|
||||||
|
|
||||||
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ .md-button .md-button--primary }
|
[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
Donations made directly to us Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. You will receive a receipt from the Open Collective Foundation after donating. Privacy Guides does not provide financial advice, and you should contact your tax advisor to find out whether this is applicable to you.
|
||||||
|
|
||||||
If you already make use of GitHub sponsorships, you can also sponsor our organization there.
|
If you already make use of GitHub sponsorships, you can also sponsor our organization there.
|
||||||
|
|
||||||
[Sponsor us on GitHub](https://github.com/sponsors/privacyguides){ .md-button }
|
[Sponsor us on GitHub](https://github.com/sponsors/privacyguides){ .md-button }
|
||||||
|
|
||||||
|
Another option to support us is by buying our merchandise from HelloTux. We get roughly $4 for every shirt sold, and you get a quality product to show for it.
|
||||||
|
|
||||||
|
[Buy on HelloTux.com](https://hellotux.com/privacyguides){ class="md-button" }
|
||||||
|
|
||||||
## Backers
|
## Backers
|
||||||
|
|
||||||
A special thanks to all those who support our mission! :heart:
|
A special thanks to all those who support our mission! :heart:
|
||||||
|
@ -1,36 +1,75 @@
|
|||||||
---
|
---
|
||||||
title: "About Privacy Guides"
|
title: "About Privacy Guides"
|
||||||
|
description: Privacy Guides is a socially motivated website that provides information for protecting your data security and privacy.
|
||||||
|
schema:
|
||||||
|
"@context": https://schema.org
|
||||||
|
"@type": Organization
|
||||||
|
"@id": https://www.privacyguides.org/
|
||||||
|
name: Privacy Guides
|
||||||
|
url: https://www.privacyguides.org/en/about/
|
||||||
|
logo: https://www.privacyguides.org/en/assets/brand/png/square/pg-yellow.png
|
||||||
|
sameAs:
|
||||||
|
- https://twitter.com/privacy_guides
|
||||||
|
- https://github.com/privacyguides
|
||||||
|
- https://www.wikidata.org/wiki/Q111710163
|
||||||
|
- https://opencollective.com/privacyguides
|
||||||
|
- https://www.youtube.com/@privacyguides
|
||||||
|
- https://mastodon.neat.computer/@privacyguides
|
||||||
---
|
---
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
**Privacy Guides** is a socially motivated website that provides information for protecting your data security and privacy. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.org/g/team) and contributors.
|
**Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers.
|
||||||
|
|
||||||
[:material-hand-coin-outline: Support the project](donate.md){ .md-button .md-button--primary }
|
[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage }
|
||||||
|
[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" }
|
||||||
|
[:octicons-heart-16:](donate.md){ .card-link title=Contribute }
|
||||||
|
|
||||||
|
> To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies.
|
||||||
|
|
||||||
|
— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/)
|
||||||
|
|
||||||
|
> If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet.
|
||||||
|
|
||||||
|
— [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch]
|
||||||
|
|
||||||
|
Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/).
|
||||||
|
|
||||||
|
## History
|
||||||
|
|
||||||
|
Privacy Guides was launched in September 2021 as a continuation of the [defunct](privacytools.md) "PrivacyTools" open-source educational project. We recognized the importance of independent, criteria-focused product recommendations and general knowledge in the privacy space, which is why we needed to preserve the work that had been created by so many contributors since 2015 and make sure that information had a stable home on the web indefinitely.
|
||||||
|
|
||||||
|
In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document.
|
||||||
|
|
||||||
|
We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms.
|
||||||
|
|
||||||
|
So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry.
|
||||||
|
|
||||||
## Our Team
|
## Our Team
|
||||||
|
|
||||||
??? person "@jonah"
|
??? person "@jonah"
|
||||||
|
|
||||||
- [:simple-discourse: Discourse](https://discuss.privacyguides.org/u/jonah)
|
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/jonah)
|
||||||
- [:simple-github: GitHub](https://github.com/jonaharagon "@jonaharagon")
|
- [:simple-github: GitHub](https://github.com/jonaharagon "@jonaharagon")
|
||||||
- [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@jonah "@jonah@neat.computer"){rel=me}
|
- [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@jonah "@jonah@neat.computer"){rel=me}
|
||||||
- [:fontawesome-solid-house: Homepage](https://www.jonaharagon.com)
|
- [:fontawesome-solid-house: Homepage](https://www.jonaharagon.com)
|
||||||
|
|
||||||
??? person "@niek-de-wilde"
|
??? person "@niek-de-wilde"
|
||||||
|
|
||||||
- [:simple-discourse: Discourse](https://discuss.privacyguides.org/u/Niek-de-Wilde)
|
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/Niek-de-Wilde)
|
||||||
- [:simple-github: GitHub](https://github.com/blacklight447 "@blacklight447")
|
- [:simple-github: GitHub](https://github.com/blacklight447 "@blacklight447")
|
||||||
- [:simple-mastodon: Mastodon](https://mastodon.social/@blacklight447 "@blacklight447@mastodon.social"){rel=me}
|
- [:simple-mastodon: Mastodon](https://mastodon.social/@blacklight447 "@blacklight447@mastodon.social"){rel=me}
|
||||||
|
- [:fontawesome-solid-envelope: Email](mailto:niekdewilde@privacyguides.org)
|
||||||
|
|
||||||
??? person "@dngray"
|
??? person "@dngray"
|
||||||
|
|
||||||
- [:simple-discourse: Discourse](https://discuss.privacyguides.org/u/dngray)
|
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/dngray)
|
||||||
- [:simple-github: GitHub](https://github.com/dngray "@dngray")
|
- [:simple-github: GitHub](https://github.com/dngray "@dngray")
|
||||||
- [:simple-mastodon: Mastodon](https://mastodon.social/@dngray "@dngray@mastodon.social"){rel=me}
|
- [:simple-mastodon: Mastodon](https://mastodon.social/@dngray "@dngray@mastodon.social"){rel=me}
|
||||||
- [:fontawesome-solid-envelope: Email](mailto:dngray@privacyguides.org)
|
- [:fontawesome-solid-envelope: Email](mailto:dngray@privacyguides.org)
|
||||||
|
|
||||||
??? person "@freddy"
|
??? person "@freddy"
|
||||||
|
|
||||||
- [:simple-discourse: Discourse](https://discuss.privacyguides.org/u/freddy)
|
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/freddy)
|
||||||
- [:simple-github: GitHub](https://github.com/freddy-m "@freddy-m")
|
- [:simple-github: GitHub](https://github.com/freddy-m "@freddy-m")
|
||||||
- [:simple-mastodon: Mastodon](https://social.lol/@freddy "@freddy@social.lol"){rel=me}
|
- [:simple-mastodon: Mastodon](https://social.lol/@freddy "@freddy@social.lol"){rel=me}
|
||||||
- [:fontawesome-solid-envelope: Email](mailto:freddy@privacyguides.org)
|
- [:fontawesome-solid-envelope: Email](mailto:freddy@privacyguides.org)
|
||||||
@ -38,23 +77,25 @@ title: "About Privacy Guides"
|
|||||||
|
|
||||||
??? person "@mfwmyfacewhen"
|
??? person "@mfwmyfacewhen"
|
||||||
|
|
||||||
- [:simple-discourse: Discourse](https://discuss.privacyguides.org/u/mfwmyfacewhen)
|
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/mfwmyfacewhen)
|
||||||
- [:simple-github: GitHub](https://github.com/mfwmyfacewhen "@mfwmyfacewhen")
|
- [:simple-github: GitHub](https://github.com/mfwmyfacewhen "@mfwmyfacewhen")
|
||||||
- [:fontawesome-solid-house: Homepage](https://mfw.omg.lol)
|
- [:fontawesome-solid-house: Homepage](https://mfw.omg.lol)
|
||||||
|
|
||||||
??? person "@olivia"
|
??? person "@olivia"
|
||||||
|
|
||||||
- [:simple-discourse: Discourse](https://discuss.privacyguides.org/u/olivia)
|
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/olivia)
|
||||||
- [:simple-github: GitHub](https://github.com/hook9 "@hook9")
|
- [:simple-github: GitHub](https://github.com/hook9 "@hook9")
|
||||||
- [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me}
|
- [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me}
|
||||||
|
|
||||||
Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub!
|
Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides).
|
||||||
|
|
||||||
Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax deductible in the United States.
|
Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States.
|
||||||
|
|
||||||
## Site License
|
## Site License
|
||||||
|
|
||||||
*The following is a human-readable summary of (and not a substitute for) the [license](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE):*
|
!!! danger ""
|
||||||
|
|
||||||
|
The following is a human-readable summary of (and not a substitute for) the [license](/license).
|
||||||
|
|
||||||
:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. If you remix, transform, or build upon the content of this website, you may not distribute the modified material.
|
:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. If you remix, transform, or build upon the content of this website, you may not distribute the modified material.
|
||||||
|
|
||||||
|
@ -1,7 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: "Notices and Disclaimers"
|
title: "Notices and Disclaimers"
|
||||||
hide:
|
|
||||||
- toc
|
|
||||||
---
|
---
|
||||||
|
|
||||||
## Legal Disclaimer
|
## Legal Disclaimer
|
||||||
@ -14,21 +12,26 @@ Privacy Guides is an open source project contributed to under licenses that incl
|
|||||||
|
|
||||||
Privacy Guides additionally does not warrant that this website will be constantly available, or available at all.
|
Privacy Guides additionally does not warrant that this website will be constantly available, or available at all.
|
||||||
|
|
||||||
## Licenses
|
## Licensing Overview
|
||||||
|
|
||||||
Unless otherwise noted, all content on this website is made available under the terms of the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE).
|
!!! danger ""
|
||||||
|
|
||||||
|
The following is a human-readable summary of (and not a substitute for) the [license](/license).
|
||||||
|
|
||||||
|
Unless otherwise noted, all **content** on this website is made available under the terms of the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). The underlying **source code** used to generate this website and display that content is released under the [MIT License](https://github.com/privacyguides/privacyguides.org/tree/main/LICENSE-CODE).
|
||||||
|
|
||||||
This does not include third-party code embedded in this repository, or code where a superseding license is otherwise noted. The following are notable examples, but this list may not be all-inclusive:
|
This does not include third-party code embedded in this repository, or code where a superseding license is otherwise noted. The following are notable examples, but this list may not be all-inclusive:
|
||||||
|
|
||||||
* [MathJax](https://github.com/privacyguides/privacyguides.org/blob/main/docs/assets/javascripts/mathjax.js) is licensed under the [Apache License 2.0](https://github.com/privacyguides/privacyguides.org/blob/main/docs/assets/javascripts/LICENSE.mathjax.txt).
|
* [MathJax](https://github.com/privacyguides/privacyguides.org/blob/main/theme/assets/javascripts/mathjax.js) is licensed under the [Apache License 2.0](https://github.com/privacyguides/privacyguides.org/blob/main/docs/assets/javascripts/LICENSE.mathjax.txt).
|
||||||
|
* The [Bagnard](https://github.com/privacyguides/brand/tree/main/WOFF/bagnard) heading font is licensed under the [SIL Open Font License 1.1](https://github.com/privacyguides/brand/blob/main/WOFF/bagnard/LICENSE.txt).
|
||||||
Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://github.com/github/opensource.guide/blob/master/LICENSE).
|
* The [Public Sans](https://github.com/privacyguides/brand/tree/main/WOFF/public_sans) font used for most text on the site is licensed under the terms detailed [here](https://github.com/privacyguides/brand/blob/main/WOFF/public_sans/LICENSE.txt).
|
||||||
|
* The [DM Mono](https://github.com/privacyguides/brand/tree/main/WOFF/dm_mono) font used for monospaced text on the site is licensed under the [SIL Open Font License 1.1](https://github.com/privacyguides/brand/blob/main/WOFF/dm_mono/LICENSE.txt).
|
||||||
|
|
||||||
This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo.
|
This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo.
|
||||||
|
|
||||||
We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.*
|
We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.*
|
||||||
|
|
||||||
When you contribute to this repository you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project.
|
When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project.
|
||||||
|
|
||||||
## Acceptable Use
|
## Acceptable Use
|
||||||
|
|
||||||
@ -41,3 +44,7 @@ You must not conduct any systematic or automated data collection activities on o
|
|||||||
* Scraping
|
* Scraping
|
||||||
* Data Mining
|
* Data Mining
|
||||||
* 'Framing' (IFrames)
|
* 'Framing' (IFrames)
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).*
|
||||||
|
@ -8,7 +8,7 @@ Privacy Guides is a community project operated by a number of active volunteer c
|
|||||||
The privacy of our website visitors is important to us, so we do not track any individual people. As a visitor to our website:
|
The privacy of our website visitors is important to us, so we do not track any individual people. As a visitor to our website:
|
||||||
|
|
||||||
- No personal information is collected
|
- No personal information is collected
|
||||||
- No information such as cookies is stored in the browser
|
- No information such as cookies are stored in the browser
|
||||||
- No information is shared with, sent to or sold to third-parties
|
- No information is shared with, sent to or sold to third-parties
|
||||||
- No information is shared with advertising companies
|
- No information is shared with advertising companies
|
||||||
- No information is mined and harvested for personal and behavioral trends
|
- No information is mined and harvested for personal and behavioral trends
|
||||||
@ -52,6 +52,7 @@ jonah@privacyguides.org
|
|||||||
For all other inquiries, you can contact any member of our team.
|
For all other inquiries, you can contact any member of our team.
|
||||||
|
|
||||||
For complaints under GDPR more generally, you may lodge complaints with your local data protection supervisory authorities.
|
For complaints under GDPR more generally, you may lodge complaints with your local data protection supervisory authorities.
|
||||||
|
In France it's the Commission Nationale de l'Informatique et des Libertés which take care and handle the complaints. They provide a [template of complaint letter](https://www.cnil.fr/en/plaintes) to use.
|
||||||
|
|
||||||
## About This Policy
|
## About This Policy
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
|
We run a number of web services to test out features and promote cool decentralized, federated, and/or open-source projects. Many of these services are available to the public and are detailed below.
|
||||||
|
|
||||||
[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2){ .md-button .md-button--primary }
|
[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
## Discourse
|
## Discourse
|
||||||
|
|
||||||
@ -29,3 +29,10 @@ Access may be granted upon request to Privacy Guides team members, Matrix modera
|
|||||||
- Domain: [search.privacyguides.net](https://search.privacyguides.net)
|
- Domain: [search.privacyguides.net](https://search.privacyguides.net)
|
||||||
- Availability: Public
|
- Availability: Public
|
||||||
- Source: [github.com/searxng/searxng-docker](https://github.com/searxng/searxng-docker)
|
- Source: [github.com/searxng/searxng-docker](https://github.com/searxng/searxng-docker)
|
||||||
|
|
||||||
|
## Invidious
|
||||||
|
|
||||||
|
- Domain: [invidious.privacyguides.net](https://invidious.privacyguides.net)
|
||||||
|
- Availability: Semi-Public
|
||||||
|
We host Invidious primarily to serve embedded YouTube videos on our website, this instance is not intended for general-purpose use and may be limited at any time.
|
||||||
|
- Source: [github.com/iv-org/invidious](https://github.com/iv-org/invidious)
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: "Types of Communication Networks"
|
title: "Types of Communication Networks"
|
||||||
icon: 'material/transit-connection-variant'
|
icon: 'material/transit-connection-variant'
|
||||||
|
description: An overview of several network architectures commonly used by instant messaging applications.
|
||||||
---
|
---
|
||||||
|
|
||||||
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use.
|
There are several network architectures commonly used to relay messages between people. These networks can provide different privacy guarantees, which is why it's worth considering your [threat model](../basics/threat-modeling.md) when deciding which app to use.
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: "DNS Overview"
|
title: "DNS Overview"
|
||||||
icon: material/dns
|
icon: material/dns
|
||||||
|
description: The Domain Name System is the "phonebook of the internet," helping your browser find the website it's looking for.
|
||||||
---
|
---
|
||||||
|
|
||||||
The [Domain Name System](https://en.wikipedia.org/wiki/Domain_Name_System) is the 'phonebook of the Internet'. DNS translates domain names to IP addresses so browsers and other services can load Internet resources, through a decentralized network of servers.
|
The [Domain Name System](https://en.wikipedia.org/wiki/Domain_Name_System) is the 'phonebook of the Internet'. DNS translates domain names to IP addresses so browsers and other services can load Internet resources, through a decentralized network of servers.
|
||||||
@ -23,7 +24,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s
|
|||||||
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
|
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
|
||||||
```
|
```
|
||||||
|
|
||||||
2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS etc) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. Software such as web browsers do these lookups automatically, unless they are configured to use encrypted DNS.
|
2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS, etc.) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. Software such as web browsers do these lookups automatically, unless they are configured to use encrypted DNS.
|
||||||
|
|
||||||
=== "Linux, macOS"
|
=== "Linux, macOS"
|
||||||
|
|
||||||
@ -79,7 +80,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be
|
|||||||
|
|
||||||
[**DNS over HTTPS**](https://en.wikipedia.org/wiki/DNS_over_HTTPS) as defined in [RFC 8484](https://datatracker.ietf.org/doc/html/rfc8484) packages queries in the [HTTP/2](https://en.wikipedia.org/wiki/HTTP/2) protocol and provides security with HTTPS. Support was first added in web browsers such as Firefox 60 and Chrome 83.
|
[**DNS over HTTPS**](https://en.wikipedia.org/wiki/DNS_over_HTTPS) as defined in [RFC 8484](https://datatracker.ietf.org/doc/html/rfc8484) packages queries in the [HTTP/2](https://en.wikipedia.org/wiki/HTTP/2) protocol and provides security with HTTPS. Support was first added in web browsers such as Firefox 60 and Chrome 83.
|
||||||
|
|
||||||
Native implementation of DoH showed up in iOS 14, macOS 11, Microsoft Windows, and Android 13 (however, it won't be enabled [by default](https://android-review.googlesource.com/c/platform/packages/modules/DnsResolver/+/1833144)). General Linux desktop support is waiting on the systemd [implementation](https://github.com/systemd/systemd/issues/8639) so [installing third-party software is still required](../dns.md#linux).
|
Native implementation of DoH showed up in iOS 14, macOS 11, Microsoft Windows, and Android 13 (however, it won't be enabled [by default](https://android-review.googlesource.com/c/platform/packages/modules/DnsResolver/+/1833144)). General Linux desktop support is waiting on the systemd [implementation](https://github.com/systemd/systemd/issues/8639) so [installing third-party software is still required](../dns.md#encrypted-dns-proxies).
|
||||||
|
|
||||||
## What can an outside party see?
|
## What can an outside party see?
|
||||||
|
|
||||||
@ -117,7 +118,7 @@ When we do a DNS lookup, it's generally because we want to access a resource. Be
|
|||||||
|
|
||||||
The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
|
The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
|
||||||
|
|
||||||
This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet.
|
This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc.). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet.
|
||||||
|
|
||||||
### Server Name Indication (SNI)
|
### Server Name Indication (SNI)
|
||||||
|
|
83
docs/advanced/payments.md
Normal file
@ -0,0 +1,83 @@
|
|||||||
|
---
|
||||||
|
title: Private Payments
|
||||||
|
icon: material/hand-coin
|
||||||
|
---
|
||||||
|
There's a reason data about your buying habits is considered the holy grail of ad targeting: your purchases can leak a veritable treasure trove of data about you. Unfortunately, the current financial system is anti-privacy by design, enabling banks, other companies, and governments to easily trace transactions. Nevertheless, you have plenty of options when it comes to making payments privately.
|
||||||
|
|
||||||
|
## Cash
|
||||||
|
|
||||||
|
For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable.
|
||||||
|
|
||||||
|
Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations.
|
||||||
|
|
||||||
|
Despite this, it’s typically the best option.
|
||||||
|
|
||||||
|
## Prepaid Cards & Gift Cards
|
||||||
|
|
||||||
|
It’s relatively simple to purchase gift cards and prepaid cards at most grocery stores and convenience stores with cash. Gift cards usually don’t have a fee, though prepaid cards often do, so pay close attention to these fees and expiry dates. Some stores may ask to see your ID at checkout to reduce fraud.
|
||||||
|
|
||||||
|
Gift cards usually have limits of up to $200 per card, but some offer limits of up to $2,000 per card. Prepaid cards (eg: from Visa or Mastercard) usually have limits of up to $1,000 per card.
|
||||||
|
|
||||||
|
Gift cards have the downside of being subject to merchant policies, which can have terrible terms and restrictions. For example, some merchants don’t accept payment in gift cards exclusively, or they may cancel the value of the card if they consider you to be a high-risk user. Once you have merchant credit, the merchant has a strong degree of control over this credit.
|
||||||
|
|
||||||
|
Prepaid cards don’t allow cash withdrawals from ATMs or “peer-to-peer” payments in Venmo and similar apps.
|
||||||
|
|
||||||
|
Cash remains the best option for in-person purchases for most people. Gift cards can be useful for the savings they bring. Prepaid cards can be useful for places that don’t accept cash. Gift cards and prepaid cards are easier to use online than cash, and they are easier to acquire with cryptocurrencies than cash.
|
||||||
|
|
||||||
|
### Online Marketplaces
|
||||||
|
|
||||||
|
If you have [cryptocurrency](../cryptocurrency.md), you can purchase gift cards with an online gift card marketplace. Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits start at $5,000-10,000 a day for basic accounts, and significantly higher limits for ID verified accounts (if offered).
|
||||||
|
|
||||||
|
When buying gift cards online, there is usually a slight discount. Prepaid cards are usually sold online at face value or with a fee. If you buy prepaid cards and gift cards with cryptocurrencies, you should strongly prefer to pay with Monero which provides strong privacy, more on this below. Paying for a gift card with a traceable payment method negates the benefits a gift card can provide when purchased with cash or Monero.
|
||||||
|
|
||||||
|
- [Online Gift Card Marketplaces :material-arrow-right-drop-circle:](../financial-services.md#gift-card-marketplaces)
|
||||||
|
|
||||||
|
## Virtual Cards
|
||||||
|
|
||||||
|
Another way to protect your information from merchants online is to use virtual, single-use cards which mask your actual banking or billing information. This is primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft. They do **not** assist you in making a purchase completely anonymously, nor do they hide any information from the banking institution themselves. Regular financial institutions which offer virtual cards are subject to "Know Your Customer" (KYC) laws, meaning they may require your ID or other identifying information.
|
||||||
|
|
||||||
|
- [Recommended Payment Masking Services :material-arrow-right-drop-circle:](../financial-services.md#payment-masking-services)
|
||||||
|
|
||||||
|
These tend to be good options for recurring/subscription payments online, while prepaid gift cards are preferred for one-time transactions.
|
||||||
|
|
||||||
|
## Cryptocurrency
|
||||||
|
|
||||||
|
Cryptocurrencies are a digital form of currency designed to work without central authorities such as a government or bank. While *some* cryptocurrency projects can allow you to make private transactions online, many use a public blockchain which does not provide any transaction privacy. Cryptocurrencies also tend to be very volatile assets, meaning their value can change rapidly and significantly at any time. As such, we generally don't recommend using cryptocurrency as a long-term store of value. If you decide to use cryptocurrency online, make sure you have a full understanding of its privacy aspects beforehand, and only invest amounts which would not be disastrous to lose.
|
||||||
|
|
||||||
|
!!! danger
|
||||||
|
|
||||||
|
The vast majority of cryptocurrencies operate on a **public** blockchain, meaning that every transaction is public knowledge. This includes even most well-known cryptocurrencies like Bitcoin and Ethereum. Transactions with these cryptocurrencies should not be considered private and will not protect your anonymity.
|
||||||
|
|
||||||
|
Additionally, many if not most cryptocurrencies are scams. Make transactions carefully with only projects you trust.
|
||||||
|
|
||||||
|
### Privacy Coins
|
||||||
|
|
||||||
|
There are a number of cryptocurrency projects which purport to provide privacy by making transactions anonymous. We recommend using one which provides transaction anonymity **by default** to avoid operational errors.
|
||||||
|
|
||||||
|
- [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins)
|
||||||
|
|
||||||
|
Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance.
|
||||||
|
|
||||||
|
### Other Coins (Bitcoin, Ethereum, etc.)
|
||||||
|
|
||||||
|
The vast majority of cryptocurrency projects use a public blockchain, meaning that all transactions are both easily traceable and permanent. As such, we strongly discourage the use of most cryptocurrency for privacy-related reasons.
|
||||||
|
|
||||||
|
Anonymous transactions on a public blockchain are *theoretically* possible, and the Bitcoin wiki [gives one example of a "completely anonymous" transaction](https://en.bitcoin.it/wiki/Privacy#Example_-_A_perfectly_private_donation). However, doing so requires a complicated setup involving Tor and "solo-mining" a block to generate completely independent cryptocurrency, a practice which has not been practical for nearly any enthusiast for many years.
|
||||||
|
|
||||||
|
==Your best option is to avoid these cryptocurrencies entirely and stick with one which provides privacy by default.== Attempting to use other cryptocurrency is outside the scope of this site and strongly discouraged.
|
||||||
|
|
||||||
|
### Wallet Custody
|
||||||
|
|
||||||
|
With cryptocurrency there are two forms of wallets: custodial wallets and noncustodial wallets. Custodial wallets are operated by centralized companies/exchanges, where the private key for your wallet is held by that company, and you can access them anywhere typically with a regular username and password. Noncustodial wallets are wallets where you control and manage the private keys to access it. Assuming you keep your wallet's private keys secured and backed up, noncustodial wallets provide greater security and censorship-resistance over custodial wallets, because your cryptocurrency can't be stolen or frozen by a company with custody over your private keys. Key custody is especially important when it comes to privacy coins: Custodial wallets grant the operating company the ability to view your transactions, negating the privacy benefits of those cryptocurrencies.
|
||||||
|
|
||||||
|
### Acquisition
|
||||||
|
|
||||||
|
Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward.
|
||||||
|
|
||||||
|
If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall.
|
||||||
|
|
||||||
|
## Additional Considerations
|
||||||
|
|
||||||
|
When you're making a payment in-person with cash, make sure to keep your in-person privacy in mind. Security cameras are ubiquitous. Consider wearing non-distinct clothing and a face mask (such as a surgical mask or N95). Don’t sign up for rewards programs or provide any other information about yourself.
|
||||||
|
|
||||||
|
When purchasing online, ideally you should do so over [Tor](tor-overview.md). However, many merchants don’t allow purchases with Tor. You can consider using a [recommended VPN](../vpn.md) (paid for with cash, gift card, or Monero), or making the purchase from a coffee shop or library with free Wi-Fi. If you are ordering a physical item that needs to be delivered, you will need to provide a delivery address. You should consider using a PO box, private mailbox, or work address.
|
@ -1,15 +1,24 @@
|
|||||||
---
|
---
|
||||||
title: "Tor Overview"
|
title: "Tor Overview"
|
||||||
icon: 'simple/torproject'
|
icon: 'simple/torproject'
|
||||||
|
description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible.
|
||||||
---
|
---
|
||||||
|
|
||||||
Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications.
|
Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications.
|
||||||
|
|
||||||
## Path Building
|
## Path Building to Clearnet Services
|
||||||
|
|
||||||
Tor works by routing your traffic through a network comprised of thousands of volunteer-run servers called nodes (or relays).
|
"Clearnet services" are websites which you can access with any browser, like [privacyguides.org](https://www.privacyguides.org). Tor lets you connect to these websites anonymously by routing your traffic through a network comprised of thousands of volunteer-run servers called nodes (or relays).
|
||||||
|
|
||||||
Every time you connect to Tor, it will choose three nodes to build a path to the internet—this path is called a "circuit." Each of these nodes has its own function:
|
Every time you [connect to Tor](../tor.md), it will choose three nodes to build a path to the internet—this path is called a "circuit."
|
||||||
|
|
||||||
|
<figure markdown>
|
||||||
|

|
||||||
|

|
||||||
|
<figcaption>Tor circuit pathway</figcaption>
|
||||||
|
</figure>
|
||||||
|
|
||||||
|
Each of these nodes has its own function:
|
||||||
|
|
||||||
### The Entry Node
|
### The Entry Node
|
||||||
|
|
||||||
@ -33,10 +42,16 @@ The exit node will be chosen at random from all available Tor nodes ran with an
|
|||||||
|
|
||||||
[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html))
|
[^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html))
|
||||||
|
|
||||||
<figure markdown>
|
## Path Building to Onion Services
|
||||||

|
|
||||||

|
"Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`.
|
||||||
<figcaption>Tor circuit pathway</figcaption>
|
|
||||||
|
Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
|
||||||
|
|
||||||
|
<figure style="width:100%" markdown>
|
||||||
|

|
||||||
|

|
||||||
|
<figcaption>Tor circuit pathway with Onion Services. Nodes in the <span class="pg-blue">blue</span> fence belong to your browser, while nodes in the <span class="pg-red">red</span> fence belong to the server, so their identity is hidden from you.</figcaption>
|
||||||
</figure>
|
</figure>
|
||||||
|
|
||||||
## Encryption
|
## Encryption
|
||||||
@ -75,5 +90,5 @@ If you wish to use Tor for browsing the web, we only recommend the **official**
|
|||||||
## Additional Resources
|
## Additional Resources
|
||||||
|
|
||||||
- [Tor Browser User Manual](https://tb-manual.torproject.org)
|
- [Tor Browser User Manual](https://tb-manual.torproject.org)
|
||||||
- [How Tor Works - Computerphile](https://www.youtube-nocookie.com/embed/QRYzre4bf7I) <small>(YouTube)</small>
|
- [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) <small>(YouTube)</small>
|
||||||
- [Tor Onion Services - Computerphile](https://www.youtube-nocookie.com/embed/lVcbq_a5N9I) <small>(YouTube)</small>
|
- [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) <small>(YouTube)</small>
|
@ -1,6 +1,82 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
|
||||||
title: "Android"
|
title: "Android"
|
||||||
icon: 'simple/android'
|
icon: 'simple/android'
|
||||||
|
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
|
||||||
|
cover: android.png
|
||||||
|
schema:
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": WebPage
|
||||||
|
name: Private Android Operating Systems
|
||||||
|
url: "./"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": CreativeWork
|
||||||
|
name: Android
|
||||||
|
image: /assets/img/android/android.svg
|
||||||
|
url: https://source.android.com/
|
||||||
|
sameAs: https://en.wikipedia.org/wiki/Android_(operating_system)
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": CreativeWork
|
||||||
|
name: GrapheneOS
|
||||||
|
image: /assets/img/android/grapheneos.svg
|
||||||
|
url: https://grapheneos.org/
|
||||||
|
sameAs: https://en.wikipedia.org/wiki/GrapheneOS
|
||||||
|
subjectOf:
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": CreativeWork
|
||||||
|
name: Divest
|
||||||
|
image: /assets/img/android/divestos.svg
|
||||||
|
url: https://divestos.org/
|
||||||
|
sameAs: https://en.wikipedia.org/wiki/DivestOS
|
||||||
|
subjectOf:
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": Product
|
||||||
|
name: Pixel
|
||||||
|
brand:
|
||||||
|
"@type": Brand
|
||||||
|
name: Google
|
||||||
|
image: /assets/img/android/google-pixel.png
|
||||||
|
sameAs: https://en.wikipedia.org/wiki/Google_Pixel
|
||||||
|
review:
|
||||||
|
"@type": Review
|
||||||
|
author:
|
||||||
|
"@type": Organization
|
||||||
|
name: Privacy Guides
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": MobileApplication
|
||||||
|
name: Shelter
|
||||||
|
applicationCategory: Utilities
|
||||||
|
operatingSystem: Android
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": MobileApplication
|
||||||
|
name: Auditor
|
||||||
|
applicationCategory: Utilities
|
||||||
|
operatingSystem: Android
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": MobileApplication
|
||||||
|
name: Secure Camera
|
||||||
|
applicationCategory: Utilities
|
||||||
|
operatingSystem: Android
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": MobileApplication
|
||||||
|
name: Secure PDF Viewer
|
||||||
|
applicationCategory: Utilities
|
||||||
|
operatingSystem: Android
|
||||||
---
|
---
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
@ -13,8 +89,7 @@ The **Android Open Source Project** is an open-source mobile operating system le
|
|||||||
|
|
||||||
These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android:
|
These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android:
|
||||||
|
|
||||||
- [General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md)
|
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md){ .md-button }
|
||||||
- [Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/)
|
|
||||||
|
|
||||||
## AOSP Derivatives
|
## AOSP Derivatives
|
||||||
|
|
||||||
@ -45,6 +120,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
|
|||||||
|
|
||||||
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
|
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
|
||||||
|
|
||||||
|
[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/){ .md-button }
|
||||||
|
|
||||||
### DivestOS
|
### DivestOS
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
@ -59,7 +136,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw
|
|||||||
[:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation}
|
[:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://divested.dev/pages/donate){ .card-link title=Contribute }
|
||||||
|
|
||||||
DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates.
|
DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates.
|
||||||
DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled.
|
DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled.
|
||||||
@ -86,7 +163,7 @@ A few more tips regarding Android devices and operating system compatibility:
|
|||||||
|
|
||||||
- Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer.
|
- Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer.
|
||||||
- Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with.
|
- Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with.
|
||||||
- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.org/) to find details!
|
- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details!
|
||||||
|
|
||||||
### Google Pixel
|
### Google Pixel
|
||||||
|
|
||||||
@ -111,9 +188,9 @@ The installation of GrapheneOS on a Pixel phone is easy with their [web installe
|
|||||||
A few more tips for purchasing a Google Pixel:
|
A few more tips for purchasing a Google Pixel:
|
||||||
|
|
||||||
- If you're after a bargain on a Pixel device, we suggest buying an "**a**" model, just after the next flagship is released. Discounts are usually available because Google will be trying to clear their stock.
|
- If you're after a bargain on a Pixel device, we suggest buying an "**a**" model, just after the next flagship is released. Discounts are usually available because Google will be trying to clear their stock.
|
||||||
- Consider price beating options and specials offered at brick and mortar stores.
|
- Consider price beating options and specials offered at physical stores.
|
||||||
- Look at online community bargain sites in your country. These can alert you to good sales.
|
- Look at online community bargain sites in your country. These can alert you to good sales.
|
||||||
- Google provides a list showing the [support cycle](https://support.google.com/nexus/answer/4457705) for each one of their devices. The price per day for a device can be calculated as: $\text{Cost} \over \text {EOL Date }-\text{ Current Date}$, meaning that the longer use of the device the lower cost per day.
|
- Google provides a list showing the [support cycle](https://support.google.com/nexus/answer/4457705) for each one of their devices. The price per day for a device can be calculated as: $\text{Cost} \over \text {EOL Date}-\text{Current Date}$, meaning that the longer use of the device the lower cost per day.
|
||||||
|
|
||||||
## General Apps
|
## General Apps
|
||||||
|
|
||||||
@ -133,10 +210,6 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
|
|||||||
[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute }
|
||||||
|
|
||||||
??? downloads
|
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.typeblog.shelter)
|
|
||||||
|
|
||||||
!!! warning
|
!!! warning
|
||||||
|
|
||||||
Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html).
|
Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html).
|
||||||
@ -150,7 +223,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
|
|||||||
{ align=right }
|
{ align=right }
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
|
**Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
@ -160,7 +233,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
|
|||||||
|
|
||||||
??? downloads
|
??? downloads
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.attestation.auditor)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.attestation.auditor.play)
|
||||||
- [:simple-github: GitHub](https://github.com/GrapheneOS/Auditor/releases)
|
- [:simple-github: GitHub](https://github.com/GrapheneOS/Auditor/releases)
|
||||||
- [:material-cube-outline: GrapheneOS App Store](https://github.com/GrapheneOS/Apps/releases)
|
- [:material-cube-outline: GrapheneOS App Store](https://github.com/GrapheneOS/Apps/releases)
|
||||||
|
|
||||||
@ -169,7 +242,7 @@ Auditor performs attestation and intrusion detection by:
|
|||||||
- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an *auditor* and *auditee*, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the *Auditor*.
|
- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an *auditor* and *auditee*, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the *Auditor*.
|
||||||
- The *auditor* can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app).
|
- The *auditor* can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app).
|
||||||
- The *auditor* records the current state and configuration of the *auditee*.
|
- The *auditor* records the current state and configuration of the *auditee*.
|
||||||
- Should tampering with the operating system of the *auditee* after the pairing is complete, the auditor will be aware of the change in the device state and configurations.
|
- Should tampering with the operating system of the *auditee* happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations.
|
||||||
- You will be alerted to the change.
|
- You will be alerted to the change.
|
||||||
|
|
||||||
No personally identifiable information is submitted to the attestation service. We recommend that you sign up with an anonymous account and enable remote attestation for continuous monitoring.
|
No personally identifiable information is submitted to the attestation service. We recommend that you sign up with an anonymous account and enable remote attestation for continuous monitoring.
|
||||||
@ -184,7 +257,7 @@ To make sure that your hardware and operating system is genuine, [perform local
|
|||||||
{ align=right }
|
{ align=right }
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Secure Camera** is a camera app focused on privacy and security which can capture images, videos and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices.
|
**Secure Camera** is a camera app focused on privacy and security which can capture images, videos and QR codes. CameraX vendor extensions (Portrait, HDR, Night Sight, Face Retouch, and Auto) are also supported on available devices.
|
||||||
|
|
||||||
[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary }
|
[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation}
|
[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation}
|
||||||
@ -308,14 +381,46 @@ If you download APK files to install manually, you can verify their signature wi
|
|||||||
|
|
||||||
{ align=right width=120px }
|
{ align=right width=120px }
|
||||||
|
|
||||||
==We do **not** currently recommend F-Droid as a way to obtain apps.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are [notable problems](https://wonderfall.dev/fdroid-issues/) with the official F-Droid client, their quality control, and how they build, sign, and deliver packages.
|
==We do **not** currently recommend F-Droid as a way to obtain apps.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are [notable problems](https://privsec.dev/posts/android/f-droid-security-issues/) with the official F-Droid client, their quality control, and how they build, sign, and deliver packages.
|
||||||
|
|
||||||
Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust.
|
Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust.
|
||||||
|
|
||||||
Other popular third-party repositories such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that respository when they make it to the main F-droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates.
|
Other popular third-party repositories such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that respository when they make it to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates.
|
||||||
|
|
||||||
That said, the [F-droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through Play Store, Aurora Store, or by getting the APK directly from the developer. It is important to keep in mind that some apps in these repositories have not been updated in years and may rely on unsupported libraries, among other things, posing a potential security risk. You should use your best judgement when looking for new apps via this method.
|
That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through Play Store, Aurora Store, or by getting the APK directly from the developer. It is important to keep in mind that some apps in these repositories have not been updated in years and may rely on unsupported libraries, among other things, posing a potential security risk. You should use your best judgement when looking for new apps via this method.
|
||||||
|
|
||||||
!!! note
|
!!! note
|
||||||
|
|
||||||
In some rare cases, the developer of an app will only distribute it through F-droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using [Neo Store](https://github.com/NeoApplications/Neo-Store/) instead of the official F-droid app to obtain it.
|
In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using [Neo Store](https://github.com/NeoApplications/Neo-Store/) instead of the official F-Droid app to obtain it.
|
||||||
|
|
||||||
|
## Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
### Operating Systems
|
||||||
|
|
||||||
|
- Must be open-source software.
|
||||||
|
- Must support bootloader locking with custom AVB key support.
|
||||||
|
- Must receive major Android updates within 0-1 months of release.
|
||||||
|
- Must receive Android feature updates (minor version) within 0-14 days of release.
|
||||||
|
- Must receive regular security patches within 0-5 days of release.
|
||||||
|
- Must **not** be "rooted" out of the box.
|
||||||
|
- Must **not** enable Google Play Services by default.
|
||||||
|
- Must **not** require system modification to support Google Play Services.
|
||||||
|
|
||||||
|
### Devices
|
||||||
|
|
||||||
|
- Must support at least one of our recommended custom operating systems.
|
||||||
|
- Must be currently sold new in stores.
|
||||||
|
- Must receive a minimum of 5 years of security updates.
|
||||||
|
- Must have dedicated secure element hardware.
|
||||||
|
|
||||||
|
### Applications
|
||||||
|
|
||||||
|
- Applications on this page must not be applicable to any other software category on the site.
|
||||||
|
- General applications should extend or replace core system functionality.
|
||||||
|
- Applications should receive regular updates and maintenance.
|
@ -1,75 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
|
||||||
<!-- Created with Inkscape (http://www.inkscape.org/) -->
|
|
||||||
<svg xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:cc="http://creativecommons.org/ns#" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:svg="http://www.w3.org/2000/svg" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd" xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape" width="48" height="48" viewBox="0 0 48.000001 48.000001" id="svg4230" version="1.1" inkscape:version="0.91 r13725" sodipodi:docname="fdroid-logo.svg">
|
|
||||||
<defs id="defs4232">
|
|
||||||
<linearGradient inkscape:collect="always" id="linearGradient5212">
|
|
||||||
<stop style="stop-color:#ffffff;stop-opacity:0.09803922" offset="0" id="stop5214"/>
|
|
||||||
<stop style="stop-color:#ffffff;stop-opacity:0" offset="1" id="stop5216"/>
|
|
||||||
</linearGradient>
|
|
||||||
<radialGradient inkscape:collect="always" xlink:href="#linearGradient5212" id="radialGradient5220" cx="-98.23381" cy="3.4695871" fx="-98.23381" fy="3.4695871" r="22.671185" gradientTransform="matrix(0,1.9747624,-2.117225,3.9784049e-8,8.677247,1199.588)" gradientUnits="userSpaceOnUse"/>
|
|
||||||
<filter inkscape:collect="always" style="color-interpolation-filters:sRGB" id="filter4175" x="-0.023846937" width="1.0476939" y="-0.02415504" height="1.0483101">
|
|
||||||
<feGaussianBlur inkscape:collect="always" stdDeviation="0.45053152" id="feGaussianBlur4177"/>
|
|
||||||
</filter>
|
|
||||||
</defs>
|
|
||||||
<sodipodi:namedview id="base" pagecolor="#ffffff" bordercolor="#666666" borderopacity="1.0" inkscape:pageopacity="0.0" inkscape:pageshadow="2" inkscape:zoom="11.313708" inkscape:cx="6.4184057" inkscape:cy="25.737489" inkscape:document-units="px" inkscape:current-layer="layer1" showgrid="true" units="px" inkscape:window-width="1920" inkscape:window-height="1009" inkscape:window-x="0" inkscape:window-y="34" inkscape:window-maximized="1" gridtolerance="10000"/>
|
|
||||||
<metadata id="metadata4235">
|
|
||||||
<rdf:RDF>
|
|
||||||
<cc:Work rdf:about="">
|
|
||||||
<dc:format>image/svg+xml</dc:format>
|
|
||||||
<dc:type rdf:resource="http://purl.org/dc/dcmitype/StillImage"/>
|
|
||||||
<dc:title/>
|
|
||||||
<cc:license rdf:resource="http://creativecommons.org/licenses/by-sa/3.0/"/>
|
|
||||||
</cc:Work>
|
|
||||||
<cc:License rdf:about="http://creativecommons.org/licenses/by-sa/3.0/">
|
|
||||||
<cc:permits rdf:resource="http://creativecommons.org/ns#Reproduction"/>
|
|
||||||
<cc:permits rdf:resource="http://creativecommons.org/ns#Distribution"/>
|
|
||||||
<cc:requires rdf:resource="http://creativecommons.org/ns#Notice"/>
|
|
||||||
<cc:requires rdf:resource="http://creativecommons.org/ns#Attribution"/>
|
|
||||||
<cc:permits rdf:resource="http://creativecommons.org/ns#DerivativeWorks"/>
|
|
||||||
<cc:requires rdf:resource="http://creativecommons.org/ns#ShareAlike"/>
|
|
||||||
</cc:License>
|
|
||||||
</rdf:RDF>
|
|
||||||
</metadata>
|
|
||||||
<g inkscape:label="Layer 1" inkscape:groupmode="layer" id="layer1" transform="translate(0,-1004.3622)">
|
|
||||||
<path style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#263238;fill-opacity:0.4;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter4175);color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate" d="m 2.613462,1006.3488 a 1.250125,1.250125 0 0 0 -1.01172,2.0293 l 3.60351,4.6641 c -0.12699,0.3331 -0.20312,0.6915 -0.20312,1.0703 l 0,4 0,2.8652 0,0.1348 c 0,1.662 1.338,3 3,3 l 32,0 c 1.662,0 3,-1.338 3,-3 l 0,-4 0,-2.8652 0,-0.1348 c 0,-0.3803 -0.0771,-0.74 -0.20508,-1.0742 l 3.60156,-4.6602 a 1.250125,1.250125 0 0 0 -1.04882,-2.0273 1.250125,1.250125 0 0 0 -0.92969,0.498 l -3.43164,4.4414 c -0.31022,-0.1079 -0.63841,-0.1777 -0.98633,-0.1777 l -32,0 c -0.34857,0 -0.67757,0.069 -0.98828,0.1777 l -3.4336,-4.4414 a 1.250125,1.250125 0 0 0 -0.96679,-0.5 z m 5.38867,18.7637 c -0.20775,0 -0.40983,0.021 -0.60547,0.061 -1.36951,0.2761 -2.39453,1.4698 -2.39453,2.9101 l 0,0.029 0,19.7793 0,0.029 0,0.1914 c 0,1.662 1.338,3 3,3 l 32,0 c 1.662,0 3,-1.338 3,-3 l 0,-20 0,-0.029 c 0,-1.4403 -1.02502,-2.634 -2.39453,-2.9101 -0.19565,-0.039 -0.39772,-0.061 -0.60547,-0.061 l -32,0 z" id="path4192" inkscape:connector-curvature="0"/>
|
|
||||||
<g id="g5012">
|
|
||||||
<g id="g4179" transform="matrix(-1,0,0,1,47.999779,0)">
|
|
||||||
<path style="fill:#8ab000;fill-opacity:1;fill-rule:evenodd;stroke:#769616;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" d="m 2.5889342,1006.8622 4.25,5.5" id="path4181" inkscape:connector-curvature="0" sodipodi:nodetypes="cc"/>
|
|
||||||
<path sodipodi:nodetypes="cccccc" inkscape:connector-curvature="0" id="path4183" d="m 2.6113281,1005.6094 c -0.4534623,0.012 -0.7616975,0.189 -0.9807462,0.4486 2.0269314,2.4089 2.368401,2.7916 5.1354735,6.2214 1.0195329,1.319 2.0816026,0.6373 1.0620696,-0.6817 l -4.25,-5.5 c -0.2289894,-0.3056 -0.5850813,-0.478 -0.9667969,-0.4883 z" style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#ffffff;fill-opacity:0.29803923;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate"/>
|
|
||||||
<path sodipodi:nodetypes="ccccc" inkscape:connector-curvature="0" id="path4185" d="m 1.6220992,1006.0705 c -0.1238933,0.1479 -0.561176,0.8046 -0.02249,1.5562 l 4.25,5.5 c 1.0195329,1.319 1.1498748,-0.6123 1.1498748,-0.6123 0,0 -3.7344514,-4.51 -5.3773848,-6.4439 z" style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#263238;fill-opacity:0.2;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate"/>
|
|
||||||
<path sodipodi:nodetypes="cscccc" inkscape:connector-curvature="0" id="path4187" d="m 2.3378905,1005.8443 c -0.438175,0 -0.959862,0.1416 -0.8242183,0.7986 0.103561,0.5016 4.6608262,6.0744 4.6608262,6.0744 1.0195329,1.319 2.4934721,0.6763 1.4739391,-0.6425 l -4.234375,-5.4727 c -0.2602394,-0.29 -0.6085188,-0.7436 -1.076172,-0.7578 z" style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#8ab000;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate"/>
|
|
||||||
</g>
|
|
||||||
<g id="g4955">
|
|
||||||
<path sodipodi:nodetypes="cc" inkscape:connector-curvature="0" id="path4945" d="m 2.5889342,1006.8622 4.25,5.5" style="fill:#8ab000;fill-opacity:1;fill-rule:evenodd;stroke:#769616;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"/>
|
|
||||||
<path style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#ffffff;fill-opacity:0.29803923;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate" d="m 2.6113281,1005.6094 c -0.4534623,0.012 -0.7616975,0.189 -0.9807462,0.4486 2.0269314,2.4089 2.368401,2.7916 5.1354735,6.2214 1.0195329,1.319 2.0816026,0.6373 1.0620696,-0.6817 l -4.25,-5.5 c -0.2289894,-0.3056 -0.5850813,-0.478 -0.9667969,-0.4883 z" id="path4947" inkscape:connector-curvature="0" sodipodi:nodetypes="cccccc"/>
|
|
||||||
<path style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#263238;fill-opacity:0.2;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate" d="m 1.6220992,1006.0705 c -0.1238933,0.1479 -0.561176,0.8046 -0.02249,1.5562 l 4.25,5.5 c 1.0195329,1.319 1.1498748,-0.6123 1.1498748,-0.6123 0,0 -3.7344514,-4.51 -5.3773848,-6.4439 z" id="path4951" inkscape:connector-curvature="0" sodipodi:nodetypes="ccccc"/>
|
|
||||||
<path style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#8ab000;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate" d="m 2.3378905,1005.8443 c -0.438175,0 -0.959862,0.1416 -0.8242183,0.7986 0.103561,0.5016 4.6608262,6.0744 4.6608262,6.0744 1.0195329,1.319 2.4934721,0.6763 1.4739391,-0.6425 l -4.234375,-5.4727 c -0.2602394,-0.29 -0.6085188,-0.7436 -1.076172,-0.7578 z" id="path4925" inkscape:connector-curvature="0" sodipodi:nodetypes="cscccc"/>
|
|
||||||
</g>
|
|
||||||
<g transform="translate(42,0)" id="g4967">
|
|
||||||
<rect style="opacity:1;fill:#aeea00;fill-opacity:1;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1" id="rect4144" width="38" height="13" x="-37" y="1010.3622" rx="3" ry="3"/>
|
|
||||||
<rect ry="3" rx="3" y="1013.3622" x="-37" height="10" width="38" id="rect4961" style="opacity:1;fill:#263238;fill-opacity:0.2;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"/>
|
|
||||||
<rect ry="3" rx="3" y="1010.3622" x="-37" height="10" width="38" id="rect4963" style="opacity:1;fill:#ffffff;fill-opacity:0.29803923;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"/>
|
|
||||||
<rect ry="2.5384617" rx="3" y="1011.3622" x="-37" height="11" width="38" id="rect4965" style="opacity:1;fill:#aeea00;fill-opacity:1;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"/>
|
|
||||||
</g>
|
|
||||||
<g id="g4979">
|
|
||||||
<rect style="opacity:1;fill:#1976d2;fill-opacity:1;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1" id="rect4146" width="38" height="26" x="5" y="1024.3622" rx="3" ry="3"/>
|
|
||||||
<rect ry="3" rx="3" y="1037.3622" x="5" height="13" width="38" id="rect4973" style="opacity:1;fill:#263238;fill-opacity:0.2;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"/>
|
|
||||||
<rect ry="3" rx="3" y="1024.3622" x="5" height="13" width="38" id="rect4975" style="opacity:1;fill:#ffffff;fill-opacity:0.2;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"/>
|
|
||||||
<rect ry="2.7692308" rx="3" y="1025.3622" x="5" height="24" width="38" id="rect4977" style="opacity:1;fill:#1976d2;fill-opacity:1;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"/>
|
|
||||||
</g>
|
|
||||||
<g transform="translate(0,1013.3622)" id="g4211">
|
|
||||||
<path style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#0d47a1;fill-opacity:1;fill-rule:nonzero;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate" d="m 24,17.75 c -2.880662,0 -5.319789,1.984685 -6.033203,4.650391 l 3.212891,0 C 21.734004,21.415044 22.774798,20.75 24,20.75 c 1.812692,0 3.25,1.437308 3.25,3.25 0,1.812693 -1.437308,3.25 -3.25,3.25 -1.307381,0 -2.411251,-0.75269 -2.929688,-1.849609 l -3.154296,0 C 18.558263,28.166146 21.04791,30.25 24,30.25 c 3.434013,0 6.25,-2.815987 6.25,-6.25 0,-3.434012 -2.815987,-6.25 -6.25,-6.25 z" id="path4161" inkscape:connector-curvature="0"/>
|
|
||||||
<circle style="opacity:1;fill:none;fill-opacity:0.40392157;stroke:#0d47a1;stroke-width:1.89999998;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1" id="path4209" cx="24" cy="24" r="9.5500002"/>
|
|
||||||
</g>
|
|
||||||
<g id="g4989" transform="translate(0,0.50001738)">
|
|
||||||
<ellipse cy="1016.4872" cx="14.375" id="circle4985" style="opacity:1;fill:#263238;fill-opacity:0.2;stroke:none;stroke-width:1.89999998;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:0.69721117" rx="3.375" ry="3.875"/>
|
|
||||||
<circle style="opacity:1;fill:#ffffff;fill-opacity:1;stroke:none;stroke-width:1.89999998;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:0.69721117" id="path4859" cx="14.375" cy="1016.9872" r="3.375"/>
|
|
||||||
</g>
|
|
||||||
<g transform="translate(19.5,0.50001738)" id="g4171">
|
|
||||||
<ellipse ry="3.875" rx="3.375" style="opacity:1;fill:#263238;fill-opacity:0.2;stroke:none;stroke-width:1.89999998;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:0.69721117" id="ellipse4175" cx="14.375" cy="1016.4872"/>
|
|
||||||
<circle r="3.375" cy="1016.9872" cx="14.375" id="circle4177" style="opacity:1;fill:#ffffff;fill-opacity:1;stroke:none;stroke-width:1.89999998;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:0.69721117"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<path inkscape:connector-curvature="0" id="path5128" d="m 2.613462,1005.5987 a 1.250125,1.250125 0 0 0 -1.01172,2.0293 l 3.60351,4.6641 c -0.12699,0.3331 -0.20312,0.6915 -0.20312,1.0703 l 0,4 0,2.8652 0,0.1348 c 0,1.662 1.338,3 3,3 l 32,0 c 1.662,0 3,-1.338 3,-3 l 0,-4 0,-2.8652 0,-0.1348 c 0,-0.3803 -0.0771,-0.74 -0.20508,-1.0742 l 3.60156,-4.6602 a 1.250125,1.250125 0 0 0 -1.04882,-2.0273 1.250125,1.250125 0 0 0 -0.92969,0.498 l -3.43164,4.4414 c -0.31022,-0.1079 -0.63841,-0.1777 -0.98633,-0.1777 l -32,0 c -0.34857,0 -0.67757,0.069 -0.98828,0.1777 l -3.4336,-4.4414 a 1.250125,1.250125 0 0 0 -0.96679,-0.5 z m 5.38867,18.7637 c -0.20775,0 -0.40983,0.021 -0.60547,0.061 -1.36951,0.2761 -2.39453,1.4698 -2.39453,2.9101 l 0,0.029 0,19.7793 0,0.029 0,0.1914 c 0,1.662 1.338,3 3,3 l 32,0 c 1.662,0 3,-1.338 3,-3 l 0,-20 0,-0.029 c 0,-1.4403 -1.02502,-2.634 -2.39453,-2.9101 -0.19565,-0.039 -0.39772,-0.061 -0.60547,-0.061 l -32,0 z" style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:url(#radialGradient5220);fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate"/>
|
|
||||||
</g>
|
|
||||||
</svg>
|
|
Before Width: | Height: | Size: 21 KiB |
@ -1,2 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g transform="translate(0 -263.13)"><g transform="matrix(.25 0 0 .25 -75.421 228.27)"><circle cx="369.42" cy="207.2" r="67.733" fill="#521737" stroke-width=".71866"/><path transform="matrix(.26458 0 0 .26458 301.69 139.47)" d="m265.99 65.18v0.0078c1.8901 2.438 3.0273 5.5806 3.0273 9.0215v195.24c19.426 3.3884 50.314 16.138 55.404 62.422l0.26367 2.377 1.9512 17.611h-2e-3l10.252 92.566h-161.81l64.785 67.07c5.4118 0.44356 10.702 0.40924 16.131 0.50781 6.0422 3e-4 12.082-0.21339 18.109-0.64062 8.5134-0.60344 16.992-1.6336 25.402-3.084 8.4107-1.4512 16.743-3.3219 24.967-5.6055 8.2243-2.2825 16.33-4.9742 24.285-8.0664 7.9553-3.0931 15.751-6.5833 23.357-10.455 7.6063-3.8716 15.013-8.1208 22.195-12.732 7.1823-4.6114 14.13-9.5793 20.816-14.885 6.6858-5.3055 13.102-10.942 19.225-16.889 6.1225-5.9464 11.945-12.195 17.443-18.723 5.4986-6.528 10.667-13.327 15.486-20.371 4.8192-7.0443 9.2831-14.324 13.375-21.814 4.0921-7.4904 7.8071-15.181 11.131-23.043 3.3233-7.8616 6.2497-15.885 8.7715-24.039 2.5223-8.154 4.6364-16.428 6.332-24.793 0.0435-0.28271 0.12174-0.53757 0.16407-0.82032zm-119.28 111.21c-3e-3 20.217 16.387 36.607 36.604 36.605zm36.604 36.605c-20.216-1e-3 -36.605 16.387-36.604 36.604 9.4e-4 -4.2e-4 50.205 51.017 50.205 51.017 12.099-18.158 28.866-28.067 41.949-30.349zm-36.604 36.604c1e-3 -20.216-16.387-36.605-36.604-36.604z" fill="#351228" stroke-width=".98462"/><g transform="matrix(.98462 0 0 .98462 4.6413 4.2297)" fill="#fff"><path d="m370.47 153.51c-1.9408 0-3.5026 1.6846-3.5026 3.777v54.445c0 2.0925 1.5618 3.777 3.5026 3.777s3.5026-1.6846 3.5026-3.777v-54.445c0-2.0924-1.5618-3.777-3.5026-3.777z" stroke-width=".62166"/><path d="m341.11 184.75a9.8353 9.8353 0 0 1-9.836 9.836 9.8353 9.8353 0 0 1 9.836 9.836 9.8353 9.8353 0 0 1 9.836-9.836 9.8353 9.8353 0 0 1-9.836-9.836z" fill="#fff" stroke-width=".63312"/><path d="m401.71 203.66a8.3455 8.3455 0 0 1-8.3461 8.3461 8.3455 8.3455 0 0 1 8.3461 8.3461 8.3455 8.3455 0 0 1 8.3461-8.3461 8.3455 8.3455 0 0 1-8.3461-8.3461z" fill="#fff" stroke-width=".53722"/><path d="m370.47 153.51v62c-1.9408 0-3.5026-1.6846-3.5026-3.777v-54.445c0-2.0924 1.5618-3.777 3.5026-3.777z" stroke-width=".62166"/></g><path d="m369.42 155.38v61.046c1.911 0 3.4488-1.6587 3.4488-3.7189v-53.608c0-2.0602-1.5378-3.7189-3.4488-3.7189z" fill="#dfdfe0" stroke-width=".61209"/><path d="m369.42 210.44c-3.3202 0-16.374 1.0601-18.108 16.828l-3.2974 29.78h42.811l-3.2974-29.78c-1.7341-15.768-14.788-16.828-18.108-16.828z" fill="#f8d057" stroke-width=".56531"/><path d="m351.31 227.27c1.7341-15.768 14.788-16.828 18.108-16.828v46.608h-21.406z" fill="#f8d057" stroke-width=".56531"/><path d="m351.24 227.9 18.178-3e-5 1e-5 4.6596h-18.694z" fill="#e97043" stroke-width=".25734"/><path d="m387.52 227.27c-1.7341-15.768-14.788-16.828-18.108-16.828v46.608h21.406z" fill="#f2b55a" stroke-width=".56531"/><path d="m387.59 227.9h-18.178v4.6596h18.694z" fill="#a15439" stroke-width=".25734"/></g></g></svg>
|
|
Before Width: | Height: | Size: 3.0 KiB |
@ -1 +0,0 @@
|
|||||||
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 56 56"><g fill="none" fill-rule="nonzero"><path fill="#6573FF" d="M55.73 9.844V5.297A5.275 5.275 0 0 0 50.453.022H5.284A5.275 5.275 0 0 0 .007 5.297v4.461c2.097 2.006 21.3 20.222 27.956 20.222 7.043 0 25.592-18.003 27.767-20.136h-.002Z"/><path fill="#e5e8ff" d="M45.804 26.455c-7.608 6.855-13.613 10.332-17.849 10.332C18.347 36.787 2.08 22.23 0 20.34v30.128a5.276 5.276 0 0 0 5.275 5.275h45.17a5.275 5.275 0 0 0 5.276-5.275V16.43a133.421 133.421 0 0 1-9.918 10.023l.001.002Z"/></g></svg>
|
|
Before Width: | Height: | Size: 540 B |
@ -1 +0,0 @@
|
|||||||
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 56 56"><g fill="none" fill-rule="nonzero"><path fill="#6573FF" d="M55.73 9.844V5.297A5.275 5.275 0 0 0 50.453.022H5.284A5.275 5.275 0 0 0 .007 5.297v4.461c2.097 2.006 21.3 20.222 27.956 20.222 7.043 0 25.592-18.003 27.767-20.136h-.002Z"/><path fill="#202945" d="M45.804 26.455c-7.608 6.855-13.613 10.332-17.849 10.332C18.347 36.787 2.08 22.23 0 20.34v30.128a5.276 5.276 0 0 0 5.275 5.275h45.17a5.275 5.275 0 0 0 5.276-5.275V16.43a133.421 133.421 0 0 1-9.918 10.023l.001.002Z"/></g></svg>
|
|
Before Width: | Height: | Size: 540 B |
@ -1,2 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<svg width="64mm" height="64mm" version="1.1" viewBox="0 0 64 64" xmlns="http://www.w3.org/2000/svg"><path id="cloud-upload" d="m64 34.286a17.033 17.033 0 0 1-4.4062 11.429 14.857 14.857 0 0 1-10.558 4.5714h-2.1786v-6.8571h2.1786a8.0044 8.0044 0 0 0 5.4688-2.3103 10.184 10.184 0 0 0 2.6384-6.8326 11.442 11.442 0 0 0-11.429-11.429c-0.37683 0-2.3126 0.2418-3.4903 0.3935a1.136 1.136 0 0 1-1.2211-0.76359l-0.46538-1.3576a14.103 14.103 0 0 0-11.716-9.6317 13.666 13.666 0 0 0-14.73 16.779l0.4881 2.0877a1.1429 1.1429 0 0 1-0.78226 1.3542l-2.054 0.62062a6.7941 6.7941 0 0 0-4.8861 6.5178 4.6044 4.6044 0 0 0 0.94642 2.808 5.5388 5.5388 0 0 0 4.0893 1.7634h5.25v6.8571h-5.25a12.236 12.236 0 0 1-9.6808-4.6518 11.506 11.506 0 0 1-2.212-6.7768 13.573 13.573 0 0 1 6.9442-11.884c-0.057884-0.6138-0.087074-1.2254-0.087074-1.8304a20.563 20.563 0 0 1 38.987-9.1428 18.307 18.307 0 0 1 18.156 18.286zm-31.077-2.1632a1.1429 1.1429 0 0 0-1.8465 0l-8.5917 11.775a1.1429 1.1429 0 0 0 0.92327 1.8165h5.1631v12.571a1.1429 1.1429 0 0 0 1.1428 1.1429h4.5714a1.1429 1.1429 0 0 0 1.1429-1.1429v-12.571h5.1631a1.1429 1.1429 0 0 0 0.92326-1.8165z" fill="#45a1ff" stroke-width="2.2857"/></svg>
|
|
Before Width: | Height: | Size: 1.2 KiB |
@ -1 +0,0 @@
|
|||||||
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 443 301"><g fill="none" fill-rule="evenodd" transform="translate(7 8)"><path stroke="#FFF" stroke-width="13.479" d="m46.85 153.335 147.023 71.613 200.843-128.54L204.251 0 0 126.961v62.287l194.722 95.724 205.043-128.999"/><ellipse cx="406.752" cy="145.787" fill="#1E88E5" fill-opacity=".997" fill-rule="nonzero" rx="28.441" ry="30.31"/></g></svg>
|
|
Before Width: | Height: | Size: 398 B |
@ -1 +0,0 @@
|
|||||||
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 443 301"><g fill="none" fill-rule="evenodd" transform="translate(7 8)"><path stroke="#000007" stroke-width="13.479" d="m46.85 153.335 147.023 71.613 200.843-128.54L204.251 0 0 126.961v62.287l194.722 95.724 205.043-128.999"/><ellipse cx="406.752" cy="145.787" fill="#1E88E5" fill-opacity=".997" fill-rule="nonzero" rx="28.441" ry="30.31"/></g></svg>
|
|
Before Width: | Height: | Size: 401 B |
@ -1,2 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<svg width="666.67" height="666.67" version="1" viewBox="0 0 500 500" xmlns="http://www.w3.org/2000/svg"><path d="M73.6 33.6L71 36.3v427.4l2.6 2.7 2.7 2.6h87.4l2.7-2.6 2.6-2.7V339.9c0-102.6.2-123.9 1.3-123.9.8 0 41.1 56.1 89.7 124.7 48.5 68.7 89.2 125.6 90.4 126.5 1.9 1.6 5.5 1.8 37.7 1.8h35.6l2.7-2.6 2.6-2.7V36.3l-2.6-2.7-2.7-2.6h-87.4l-2.7 2.6-2.6 2.7v123.8c0 102.6-.2 123.9-1.3 123.9-.8 0-41.1-56.1-89.7-124.8-48.5-68.6-89.2-125.5-90.4-126.4-1.9-1.6-5.5-1.8-37.7-1.8H76.3l-2.7 2.6zm158.9 147.1c51.2 72.3 94.4 133.1 96.1 134.9 2.9 3.1 3.6 3.4 9.1 3.4 5.2 0 6.4-.4 8.7-2.6l2.6-2.7V49h62v402l-25.2-.1h-25.3l-93-131.6c-51.1-72.3-94.4-133.1-96.1-134.9-2.9-3.1-3.6-3.4-9.1-3.4-5.2 0-6.4.4-8.7 2.6l-2.6 2.7V451H89V49l25.3.1h25.2l93 131.6z" fill="#ff6c60" stroke="#ff6c60" stroke-width=".99975"/></svg>
|
|
Before Width: | Height: | Size: 839 B |
225
docs/assets/img/how-tor-works/tor-path-hidden-service-dark.svg
Normal file
@ -0,0 +1,225 @@
|
|||||||
|
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
||||||
|
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
||||||
|
<svg width="100%" height="100%" viewBox="0 0 1051 447" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xml:space="preserve" xmlns:serif="http://www.serif.com/" style="fill-rule:evenodd;clip-rule:evenodd;stroke-linecap:round;stroke-linejoin:round;">
|
||||||
|
<g transform="matrix(1,0,0,1,-101.526,-98.3251)">
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<rect x="87.098" y="355.919" width="154.361" height="165.495" style="fill:rgb(114,159,207);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M164.319,521.414L87.098,521.414L87.098,355.919L241.458,355.919L241.458,521.414L164.319,521.414" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M481.938,94.093C481.938,108.602 478.372,122.936 471.566,135.531C464.84,148.041 455.036,158.553 443.368,165.764C431.619,173.061 418.249,176.884 404.715,176.884C391.183,176.884 377.814,173.061 366.146,165.764C354.397,158.553 344.592,148.041 337.867,135.531C331.06,122.934 327.495,108.6 327.495,94.093C327.495,79.585 331.061,65.251 337.867,52.742C344.592,40.145 354.397,29.634 366.065,22.423C377.814,15.126 391.184,11.303 404.718,11.303C418.25,11.303 431.619,15.126 443.287,22.423C455.036,29.634 464.84,40.146 471.566,52.742C478.372,65.252 481.938,79.587 481.938,94.093Z" style="fill:rgb(129,212,26);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M481.938,93.965C481.938,108.473 478.372,122.807 471.566,135.403C464.84,147.913 455.036,158.425 443.368,165.635C431.619,172.932 418.249,176.755 404.715,176.755C391.183,176.755 377.814,172.932 366.146,165.635C354.397,158.425 344.592,147.912 337.867,135.403C331.06,122.806 327.495,108.472 327.495,93.965C327.495,79.457 331.061,65.122 337.867,52.614C344.592,40.017 354.397,29.505 366.065,22.295C377.814,14.997 391.184,11.175 404.718,11.175C418.25,11.175 431.619,14.997 443.287,22.295C455.036,29.505 464.84,40.017 471.566,52.614C478.372,65.124 481.938,79.458 481.938,93.965" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M790.681,94.18C790.681,108.689 787.116,122.936 780.31,135.531C773.584,148.128 763.78,158.553 752.112,165.764C740.362,173.061 726.993,176.884 713.459,176.884C699.927,176.884 686.558,173.061 674.89,165.764C663.141,158.553 653.336,148.128 646.611,135.531C639.804,122.934 636.239,108.687 636.239,94.18C636.239,79.585 639.804,65.338 646.611,52.742C653.336,40.145 663.141,29.721 674.89,22.51C686.558,15.213 699.928,11.39 713.459,11.39C726.991,11.39 740.361,15.213 752.112,22.51C763.78,29.721 773.584,40.146 780.31,52.742C787.116,65.339 790.681,79.587 790.681,94.18Z" style="fill:rgb(128,0,128);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M790.681,94.052C790.681,108.56 787.116,122.807 780.31,135.403C773.584,148 763.78,158.425 752.112,165.635C740.362,172.932 726.993,176.755 713.459,176.755C699.927,176.755 686.558,172.932 674.89,165.635C663.141,158.425 653.336,147.999 646.611,135.403C639.804,122.806 636.239,108.558 636.239,94.052C636.239,79.457 639.804,65.209 646.611,52.614C653.336,40.017 663.141,29.592 674.89,22.382C686.558,15.084 699.928,11.262 713.459,11.262C726.991,11.262 740.361,15.084 752.112,22.382C763.78,29.592 773.584,40.017 780.31,52.614C787.116,65.211 790.681,79.458 790.681,94.052" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M1099.39,94.139C1099.39,108.647 1095.82,122.894 1089.02,135.49C1082.29,148.087 1072.49,158.512 1060.82,165.722C1049.07,173.019 1035.7,176.842 1022.17,176.842C1008.63,176.842 995.264,173.019 983.596,165.722C971.847,158.512 962.042,148.086 955.317,135.49C948.51,122.893 944.945,108.645 944.945,94.139C944.945,79.544 948.511,65.296 955.317,52.701C962.042,40.104 971.847,29.679 983.596,22.468C995.264,15.171 1008.63,11.348 1022.17,11.348C1035.7,11.348 1049.07,15.171 1060.82,22.468C1072.49,29.679 1082.29,40.104 1089.02,52.701C1095.82,65.298 1099.39,79.545 1099.39,94.139Z" style="fill:rgb(255,128,0);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M1099.39,94.139C1099.39,108.647 1095.82,122.894 1089.02,135.49C1082.29,148.087 1072.49,158.512 1060.82,165.722C1049.07,173.019 1035.7,176.842 1022.17,176.842C1008.63,176.842 995.264,173.019 983.596,165.722C971.847,158.512 962.042,148.086 955.317,135.49C948.51,122.893 944.945,108.645 944.945,94.139C944.945,79.544 948.511,65.296 955.317,52.701C962.042,40.104 971.847,29.679 983.596,22.468C995.264,15.171 1008.63,11.348 1022.17,11.348C1035.7,11.348 1049.07,15.171 1060.82,22.468C1072.49,29.679 1082.29,40.104 1089.02,52.701C1095.82,65.298 1099.39,79.545 1099.39,94.139" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M481.938,432.899C481.938,447.407 478.372,461.655 471.566,474.25C464.84,486.847 455.036,497.272 443.368,504.482C431.619,511.78 418.249,515.602 404.715,515.602C391.183,515.602 377.814,511.78 366.146,504.482C354.397,497.272 344.592,486.847 337.867,474.25C331.06,461.653 327.495,447.406 327.495,432.899C327.495,418.304 331.061,404.057 337.867,391.461C344.592,378.864 354.397,368.439 366.065,361.229C377.814,353.931 391.184,350.109 404.718,350.109C418.25,350.109 431.619,353.931 443.287,361.229C455.036,368.439 464.84,378.865 471.566,391.461C478.372,404.058 481.938,418.305 481.938,432.899Z" style="fill:rgb(129,212,26);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M481.938,438.795C481.938,453.303 478.372,467.551 471.566,480.146C464.84,492.743 455.036,503.168 443.368,510.378C431.619,517.676 418.249,521.498 404.715,521.498C391.183,521.498 377.814,517.676 366.146,510.378C354.397,503.168 344.592,492.743 337.867,480.146C331.06,467.549 327.495,453.302 327.495,438.795C327.495,424.2 331.061,409.952 337.867,397.357C344.592,384.76 354.397,374.335 366.065,367.125C377.814,359.827 391.184,356.005 404.718,356.005C418.25,356.005 431.619,359.827 443.287,367.125C455.036,374.335 464.84,384.76 471.566,397.357C478.372,409.954 481.938,424.201 481.938,438.795" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M790.681,432.899C790.681,447.407 787.116,461.655 780.31,474.25C773.584,486.847 763.78,497.272 752.112,504.482C740.362,511.78 726.993,515.602 713.459,515.602C699.927,515.602 686.558,511.78 674.89,504.482C663.141,497.272 653.336,486.847 646.611,474.25C639.804,461.653 636.239,447.406 636.239,432.899C636.239,418.304 639.804,404.057 646.611,391.461C653.336,378.864 663.141,368.439 674.89,361.229C686.558,353.931 699.928,350.109 713.459,350.109C726.991,350.109 740.361,353.931 752.112,361.229C763.78,368.439 773.584,378.865 780.31,391.461C787.116,404.058 790.681,418.305 790.681,432.899Z" style="fill:rgb(128,0,128);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M790.681,438.795C790.681,453.303 787.116,467.551 780.31,480.146C773.584,492.743 763.78,503.168 752.112,510.378C740.362,517.676 726.993,521.498 713.459,521.498C699.927,521.498 686.558,517.676 674.89,510.378C663.141,503.168 653.336,492.743 646.611,480.146C639.804,467.549 636.239,453.302 636.239,438.795C636.239,424.2 639.804,409.952 646.611,397.357C653.336,384.76 663.141,374.335 674.89,367.125C686.558,359.827 699.928,356.005 713.459,356.005C726.991,356.005 740.361,359.827 752.112,367.125C763.78,374.335 773.584,384.76 780.31,397.357C787.116,409.954 790.681,424.201 790.681,438.795" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M1099.39,432.899C1099.39,447.407 1095.82,461.655 1089.02,474.25C1082.29,486.847 1072.49,497.272 1060.82,504.482C1049.07,511.78 1035.7,515.602 1022.17,515.602C1008.63,515.602 995.264,511.78 983.596,504.482C971.847,497.272 962.042,486.847 955.317,474.25C948.51,461.653 944.945,447.406 944.945,432.899C944.945,418.304 948.511,404.057 955.317,391.461C962.042,378.864 971.847,368.439 983.596,361.229C995.264,353.931 1008.63,350.109 1022.17,350.109C1035.7,350.109 1049.07,353.931 1060.82,361.229C1072.49,368.439 1082.29,378.865 1089.02,391.461C1095.82,404.058 1099.39,418.305 1099.39,432.899Z" style="fill:rgb(255,128,0);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M1099.39,432.899C1099.39,447.407 1095.82,461.655 1089.02,474.25C1082.29,486.847 1072.49,497.272 1060.82,504.482C1049.07,511.78 1035.7,515.602 1022.17,515.602C1008.63,515.602 995.264,511.78 983.596,504.482C971.847,497.272 962.042,486.847 955.317,474.25C948.51,461.653 944.945,447.406 944.945,432.899C944.945,418.304 948.511,404.057 955.317,391.461C962.042,378.864 971.847,368.439 983.596,361.229C995.264,353.931 1008.63,350.109 1022.17,350.109C1035.7,350.109 1049.07,353.931 1060.82,361.229C1072.49,368.439 1082.29,378.865 1089.02,391.461C1095.82,404.058 1099.39,418.305 1099.39,432.899" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M481.938,756.043C481.938,770.551 478.372,784.798 471.566,797.394C464.84,809.991 455.036,820.416 443.368,827.626C431.619,834.924 418.249,838.746 404.715,838.746C391.183,838.746 377.814,834.924 366.146,827.626C354.397,820.416 344.592,809.991 337.867,797.394C331.06,784.797 327.495,770.549 327.495,756.043C327.495,741.448 331.061,727.2 337.867,714.605C344.592,702.008 354.397,691.583 366.065,684.372C377.814,677.075 391.184,673.253 404.718,673.253C418.25,673.253 431.619,677.075 443.287,684.372C455.036,691.583 464.84,702.008 471.566,714.605C478.372,727.202 481.938,741.449 481.938,756.043Z" style="fill:rgb(129,212,26);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M481.938,756.043C481.938,770.551 478.372,784.798 471.566,797.394C464.84,809.991 455.036,820.416 443.368,827.626C431.619,834.924 418.249,838.746 404.715,838.746C391.183,838.746 377.814,834.924 366.146,827.626C354.397,820.416 344.592,809.991 337.867,797.394C331.06,784.797 327.495,770.549 327.495,756.043C327.495,741.448 331.061,727.2 337.867,714.605C344.592,702.008 354.397,691.583 366.065,684.372C377.814,677.075 391.184,673.253 404.718,673.253C418.25,673.253 431.619,677.075 443.287,684.372C455.036,691.583 464.84,702.008 471.566,714.605C478.372,727.202 481.938,741.449 481.938,756.043" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M790.681,756.118C790.681,770.626 787.116,784.874 780.31,797.469C773.584,810.066 763.78,820.491 752.112,827.702C740.362,834.999 726.993,838.822 713.459,838.822C699.927,838.822 686.558,834.999 674.89,827.702C663.141,820.492 653.336,810.066 646.611,797.469C639.804,784.872 636.239,770.625 636.239,756.118C636.239,741.523 639.804,727.276 646.611,714.68C653.336,702.083 663.141,691.658 674.89,684.448C686.558,677.15 699.928,673.328 713.459,673.328C726.991,673.328 740.361,677.15 752.112,684.448C763.78,691.658 773.584,702.083 780.31,714.68C787.116,727.277 790.681,741.525 790.681,756.118Z" style="fill:rgb(128,0,128);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M790.681,756.118C790.681,770.626 787.116,784.874 780.31,797.469C773.584,810.066 763.78,820.491 752.112,827.702C740.362,834.999 726.993,838.822 713.459,838.822C699.927,838.822 686.558,834.999 674.89,827.702C663.141,820.492 653.336,810.066 646.611,797.469C639.804,784.872 636.239,770.625 636.239,756.118C636.239,741.523 639.804,727.276 646.611,714.68C653.336,702.083 663.141,691.658 674.89,684.448C686.558,677.15 699.928,673.328 713.459,673.328C726.991,673.328 740.361,677.15 752.112,684.448C763.78,691.658 773.584,702.083 780.31,714.68C787.116,727.277 790.681,741.525 790.681,756.118" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M1099.39,756.118C1099.39,770.626 1095.82,784.874 1089.02,797.469C1082.29,810.066 1072.49,820.491 1060.82,827.702C1049.07,834.999 1035.7,838.822 1022.17,838.822C1008.63,838.822 995.264,834.999 983.596,827.702C971.847,820.492 962.042,810.066 955.317,797.469C948.51,784.872 944.945,770.625 944.945,756.118C944.945,741.523 948.511,727.276 955.317,714.68C962.042,702.083 971.847,691.658 983.596,684.448C995.264,677.15 1008.63,673.328 1022.17,673.328C1035.7,673.328 1049.07,677.15 1060.82,684.448C1072.49,691.658 1082.29,702.083 1089.02,714.68C1095.82,727.277 1099.39,741.525 1099.39,756.118Z" style="fill:rgb(255,128,0);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M1099.39,756.118C1099.39,770.626 1095.82,784.874 1089.02,797.469C1082.29,810.066 1072.49,820.491 1060.82,827.702C1049.07,834.999 1035.7,838.822 1022.17,838.822C1008.63,838.822 995.264,834.999 983.596,827.702C971.847,820.492 962.042,810.066 955.317,797.469C948.51,784.872 944.945,770.625 944.945,756.118C944.945,741.523 948.511,727.276 955.317,714.68C962.042,702.083 971.847,691.658 983.596,684.448C995.264,677.15 1008.63,673.328 1022.17,673.328C1035.7,673.328 1049.07,677.15 1060.82,684.448C1072.49,691.658 1082.29,702.083 1089.02,714.68C1095.82,727.277 1099.39,741.525 1099.39,756.118" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.206,203.232)">
|
||||||
|
<path d="M1340.44,328.48L1433.95,503.186L1247.02,503.186L1340.44,328.48Z" style="fill:rgb(114,159,207);"/>
|
||||||
|
</g>
|
||||||
|
<g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.453686,63.5184,110.551)">
|
||||||
|
<g transform="matrix(1,0,0,1,88.7196,550.073)">
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;fill:white;">Your</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,1,88.7196,616.708)">
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;fill:white;">Device</text>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.423185,215.188,217.539)">
|
||||||
|
<g transform="matrix(53.3092,0,0,53.3092,148.162,0)">
|
||||||
|
</g>
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;fill:white;">Guard</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.453686,342.481,365.105)">
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;fill:white;">Relay</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.453686,486.481,214.679)">
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;fill:white;">Relay</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.423185,1011.71,453.118)">
|
||||||
|
<g transform="matrix(53.3092,0,0,53.3092,334.953,0)">
|
||||||
|
</g>
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;fill:white;">hidden...onion</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,1.13387,0,-13.5981)">
|
||||||
|
<rect x="192.377" y="101.575" width="397.824" height="388.045" style="fill:none;stroke:rgb(97,107,243);stroke-width:6.08px;stroke-linecap:butt;stroke-miterlimit:1.5;stroke-dasharray:6.08,6.08;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,1.13387,406.832,-13.5981)">
|
||||||
|
<rect x="192.377" y="101.575" width="397.824" height="388.045" style="fill:none;stroke:rgb(218,85,92);stroke-width:6.08px;stroke-linecap:butt;stroke-miterlimit:1.5;stroke-dasharray:6.08,6.08;"/>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,-1,296.309,499.871)">
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-102.956,170.289)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill:white;fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-102.956,170.289)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z" style="fill:white;"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z" style="fill:white;"/>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,1,599.384,5.09357)">
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-273.231,107.69)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill:white;fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-273.231,107.69)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z" style="fill:white;"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z" style="fill:white;"/>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,-1,927.895,527.537)">
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-37.0942,67.0447)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill:white;fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-34.7625,65.947)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z" style="fill:white;"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z" style="fill:white;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-467.504,185.162)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill:white;fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-467.504,185.162)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z" style="fill:white;"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z" style="fill:white;"/>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,1,-12.9813,-5.07732)">
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,70.8116,113.404)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill:white;fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,70.8116,113.404)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z" style="fill:white;"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z" style="fill:white;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M481.938,94.093C481.938,108.602 478.372,122.936 471.566,135.531C464.84,148.041 455.036,158.553 443.368,165.764C431.619,173.061 418.249,176.884 404.715,176.884C391.183,176.884 377.814,173.061 366.146,165.764C354.397,158.553 344.592,148.041 337.867,135.531C331.06,122.934 327.495,108.6 327.495,94.093C327.495,79.585 331.061,65.251 337.867,52.742C344.592,40.145 354.397,29.634 366.065,22.423C377.814,15.126 391.184,11.303 404.718,11.303C418.25,11.303 431.619,15.126 443.287,22.423C455.036,29.634 464.84,40.146 471.566,52.742C478.372,65.252 481.938,79.587 481.938,94.093Z" style="fill:rgb(129,212,26);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M481.938,93.965C481.938,108.473 478.372,122.807 471.566,135.403C464.84,147.913 455.036,158.425 443.368,165.635C431.619,172.932 418.249,176.755 404.715,176.755C391.183,176.755 377.814,172.932 366.146,165.635C354.397,158.425 344.592,147.912 337.867,135.403C331.06,122.806 327.495,108.472 327.495,93.965C327.495,79.457 331.061,65.122 337.867,52.614C344.592,40.017 354.397,29.505 366.065,22.295C377.814,14.997 391.184,11.175 404.718,11.175C418.25,11.175 431.619,14.997 443.287,22.295C455.036,29.505 464.84,40.017 471.566,52.614C478.372,65.124 481.938,79.458 481.938,93.965" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M790.681,94.18C790.681,108.689 787.116,122.936 780.31,135.531C773.584,148.128 763.78,158.553 752.112,165.764C740.362,173.061 726.993,176.884 713.459,176.884C699.927,176.884 686.558,173.061 674.89,165.764C663.141,158.553 653.336,148.128 646.611,135.531C639.804,122.934 636.239,108.687 636.239,94.18C636.239,79.585 639.804,65.338 646.611,52.742C653.336,40.145 663.141,29.721 674.89,22.51C686.558,15.213 699.928,11.39 713.459,11.39C726.991,11.39 740.361,15.213 752.112,22.51C763.78,29.721 773.584,40.146 780.31,52.742C787.116,65.339 790.681,79.587 790.681,94.18Z" style="fill:rgb(128,0,128);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M790.681,94.052C790.681,108.56 787.116,122.807 780.31,135.403C773.584,148 763.78,158.425 752.112,165.635C740.362,172.932 726.993,176.755 713.459,176.755C699.927,176.755 686.558,172.932 674.89,165.635C663.141,158.425 653.336,147.999 646.611,135.403C639.804,122.806 636.239,108.558 636.239,94.052C636.239,79.457 639.804,65.209 646.611,52.614C653.336,40.017 663.141,29.592 674.89,22.382C686.558,15.084 699.928,11.262 713.459,11.262C726.991,11.262 740.361,15.084 752.112,22.382C763.78,29.592 773.584,40.017 780.31,52.614C787.116,65.211 790.681,79.458 790.681,94.052" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M1099.39,94.139C1099.39,108.647 1095.82,122.894 1089.02,135.49C1082.29,148.087 1072.49,158.512 1060.82,165.722C1049.07,173.019 1035.7,176.842 1022.17,176.842C1008.63,176.842 995.264,173.019 983.596,165.722C971.847,158.512 962.042,148.086 955.317,135.49C948.51,122.893 944.945,108.645 944.945,94.139C944.945,79.544 948.511,65.296 955.317,52.701C962.042,40.104 971.847,29.679 983.596,22.468C995.264,15.171 1008.63,11.348 1022.17,11.348C1035.7,11.348 1049.07,15.171 1060.82,22.468C1072.49,29.679 1082.29,40.104 1089.02,52.701C1095.82,65.298 1099.39,79.545 1099.39,94.139Z" style="fill:rgb(255,128,0);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M1099.39,94.139C1099.39,108.647 1095.82,122.894 1089.02,135.49C1082.29,148.087 1072.49,158.512 1060.82,165.722C1049.07,173.019 1035.7,176.842 1022.17,176.842C1008.63,176.842 995.264,173.019 983.596,165.722C971.847,158.512 962.042,148.086 955.317,135.49C948.51,122.893 944.945,108.645 944.945,94.139C944.945,79.544 948.511,65.296 955.317,52.701C962.042,40.104 971.847,29.679 983.596,22.468C995.264,15.171 1008.63,11.348 1022.17,11.348C1035.7,11.348 1049.07,15.171 1060.82,22.468C1072.49,29.679 1082.29,40.104 1089.02,52.701C1095.82,65.298 1099.39,79.545 1099.39,94.139" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M481.938,432.899C481.938,447.407 478.372,461.655 471.566,474.25C464.84,486.847 455.036,497.272 443.368,504.482C431.619,511.78 418.249,515.602 404.715,515.602C391.183,515.602 377.814,511.78 366.146,504.482C354.397,497.272 344.592,486.847 337.867,474.25C331.06,461.653 327.495,447.406 327.495,432.899C327.495,418.304 331.061,404.057 337.867,391.461C344.592,378.864 354.397,368.439 366.065,361.229C377.814,353.931 391.184,350.109 404.718,350.109C418.25,350.109 431.619,353.931 443.287,361.229C455.036,368.439 464.84,378.865 471.566,391.461C478.372,404.058 481.938,418.305 481.938,432.899Z" style="fill:rgb(129,212,26);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M481.938,438.795C481.938,453.303 478.372,467.551 471.566,480.146C464.84,492.743 455.036,503.168 443.368,510.378C431.619,517.676 418.249,521.498 404.715,521.498C391.183,521.498 377.814,517.676 366.146,510.378C354.397,503.168 344.592,492.743 337.867,480.146C331.06,467.549 327.495,453.302 327.495,438.795C327.495,424.2 331.061,409.952 337.867,397.357C344.592,384.76 354.397,374.335 366.065,367.125C377.814,359.827 391.184,356.005 404.718,356.005C418.25,356.005 431.619,359.827 443.287,367.125C455.036,374.335 464.84,384.76 471.566,397.357C478.372,409.954 481.938,424.201 481.938,438.795" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M790.681,432.899C790.681,447.407 787.116,461.655 780.31,474.25C773.584,486.847 763.78,497.272 752.112,504.482C740.362,511.78 726.993,515.602 713.459,515.602C699.927,515.602 686.558,511.78 674.89,504.482C663.141,497.272 653.336,486.847 646.611,474.25C639.804,461.653 636.239,447.406 636.239,432.899C636.239,418.304 639.804,404.057 646.611,391.461C653.336,378.864 663.141,368.439 674.89,361.229C686.558,353.931 699.928,350.109 713.459,350.109C726.991,350.109 740.361,353.931 752.112,361.229C763.78,368.439 773.584,378.865 780.31,391.461C787.116,404.058 790.681,418.305 790.681,432.899Z" style="fill:rgb(128,0,128);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M790.681,438.795C790.681,453.303 787.116,467.551 780.31,480.146C773.584,492.743 763.78,503.168 752.112,510.378C740.362,517.676 726.993,521.498 713.459,521.498C699.927,521.498 686.558,517.676 674.89,510.378C663.141,503.168 653.336,492.743 646.611,480.146C639.804,467.549 636.239,453.302 636.239,438.795C636.239,424.2 639.804,409.952 646.611,397.357C653.336,384.76 663.141,374.335 674.89,367.125C686.558,359.827 699.928,356.005 713.459,356.005C726.991,356.005 740.361,359.827 752.112,367.125C763.78,374.335 773.584,384.76 780.31,397.357C787.116,409.954 790.681,424.201 790.681,438.795" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M1099.39,432.899C1099.39,447.407 1095.82,461.655 1089.02,474.25C1082.29,486.847 1072.49,497.272 1060.82,504.482C1049.07,511.78 1035.7,515.602 1022.17,515.602C1008.63,515.602 995.264,511.78 983.596,504.482C971.847,497.272 962.042,486.847 955.317,474.25C948.51,461.653 944.945,447.406 944.945,432.899C944.945,418.304 948.511,404.057 955.317,391.461C962.042,378.864 971.847,368.439 983.596,361.229C995.264,353.931 1008.63,350.109 1022.17,350.109C1035.7,350.109 1049.07,353.931 1060.82,361.229C1072.49,368.439 1082.29,378.865 1089.02,391.461C1095.82,404.058 1099.39,418.305 1099.39,432.899Z" style="fill:rgb(255,128,0);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M1099.39,432.899C1099.39,447.407 1095.82,461.655 1089.02,474.25C1082.29,486.847 1072.49,497.272 1060.82,504.482C1049.07,511.78 1035.7,515.602 1022.17,515.602C1008.63,515.602 995.264,511.78 983.596,504.482C971.847,497.272 962.042,486.847 955.317,474.25C948.51,461.653 944.945,447.406 944.945,432.899C944.945,418.304 948.511,404.057 955.317,391.461C962.042,378.864 971.847,368.439 983.596,361.229C995.264,353.931 1008.63,350.109 1022.17,350.109C1035.7,350.109 1049.07,353.931 1060.82,361.229C1072.49,368.439 1082.29,378.865 1089.02,391.461C1095.82,404.058 1099.39,418.305 1099.39,432.899" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M481.938,756.043C481.938,770.551 478.372,784.798 471.566,797.394C464.84,809.991 455.036,820.416 443.368,827.626C431.619,834.924 418.249,838.746 404.715,838.746C391.183,838.746 377.814,834.924 366.146,827.626C354.397,820.416 344.592,809.991 337.867,797.394C331.06,784.797 327.495,770.549 327.495,756.043C327.495,741.448 331.061,727.2 337.867,714.605C344.592,702.008 354.397,691.583 366.065,684.372C377.814,677.075 391.184,673.253 404.718,673.253C418.25,673.253 431.619,677.075 443.287,684.372C455.036,691.583 464.84,702.008 471.566,714.605C478.372,727.202 481.938,741.449 481.938,756.043Z" style="fill:rgb(129,212,26);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M481.938,756.043C481.938,770.551 478.372,784.798 471.566,797.394C464.84,809.991 455.036,820.416 443.368,827.626C431.619,834.924 418.249,838.746 404.715,838.746C391.183,838.746 377.814,834.924 366.146,827.626C354.397,820.416 344.592,809.991 337.867,797.394C331.06,784.797 327.495,770.549 327.495,756.043C327.495,741.448 331.061,727.2 337.867,714.605C344.592,702.008 354.397,691.583 366.065,684.372C377.814,677.075 391.184,673.253 404.718,673.253C418.25,673.253 431.619,677.075 443.287,684.372C455.036,691.583 464.84,702.008 471.566,714.605C478.372,727.202 481.938,741.449 481.938,756.043" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M790.681,756.118C790.681,770.626 787.116,784.874 780.31,797.469C773.584,810.066 763.78,820.491 752.112,827.702C740.362,834.999 726.993,838.822 713.459,838.822C699.927,838.822 686.558,834.999 674.89,827.702C663.141,820.492 653.336,810.066 646.611,797.469C639.804,784.872 636.239,770.625 636.239,756.118C636.239,741.523 639.804,727.276 646.611,714.68C653.336,702.083 663.141,691.658 674.89,684.448C686.558,677.15 699.928,673.328 713.459,673.328C726.991,673.328 740.361,677.15 752.112,684.448C763.78,691.658 773.584,702.083 780.31,714.68C787.116,727.277 790.681,741.525 790.681,756.118Z" style="fill:rgb(128,0,128);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M790.681,756.118C790.681,770.626 787.116,784.874 780.31,797.469C773.584,810.066 763.78,820.491 752.112,827.702C740.362,834.999 726.993,838.822 713.459,838.822C699.927,838.822 686.558,834.999 674.89,827.702C663.141,820.492 653.336,810.066 646.611,797.469C639.804,784.872 636.239,770.625 636.239,756.118C636.239,741.523 639.804,727.276 646.611,714.68C653.336,702.083 663.141,691.658 674.89,684.448C686.558,677.15 699.928,673.328 713.459,673.328C726.991,673.328 740.361,677.15 752.112,684.448C763.78,691.658 773.584,702.083 780.31,714.68C787.116,727.277 790.681,741.525 790.681,756.118" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M1099.39,756.118C1099.39,770.626 1095.82,784.874 1089.02,797.469C1082.29,810.066 1072.49,820.491 1060.82,827.702C1049.07,834.999 1035.7,838.822 1022.17,838.822C1008.63,838.822 995.264,834.999 983.596,827.702C971.847,820.492 962.042,810.066 955.317,797.469C948.51,784.872 944.945,770.625 944.945,756.118C944.945,741.523 948.511,727.276 955.317,714.68C962.042,702.083 971.847,691.658 983.596,684.448C995.264,677.15 1008.63,673.328 1022.17,673.328C1035.7,673.328 1049.07,677.15 1060.82,684.448C1072.49,691.658 1082.29,702.083 1089.02,714.68C1095.82,727.277 1099.39,741.525 1099.39,756.118Z" style="fill:rgb(255,128,0);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M1099.39,756.118C1099.39,770.626 1095.82,784.874 1089.02,797.469C1082.29,810.066 1072.49,820.491 1060.82,827.702C1049.07,834.999 1035.7,838.822 1022.17,838.822C1008.63,838.822 995.264,834.999 983.596,827.702C971.847,820.492 962.042,810.066 955.317,797.469C948.51,784.872 944.945,770.625 944.945,756.118C944.945,741.523 948.511,727.276 955.317,714.68C962.042,702.083 971.847,691.658 983.596,684.448C995.264,677.15 1008.63,673.328 1022.17,673.328C1035.7,673.328 1049.07,677.15 1060.82,684.448C1072.49,691.658 1082.29,702.083 1089.02,714.68C1095.82,727.277 1099.39,741.525 1099.39,756.118" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.453686,613.992,258.963)">
|
||||||
|
<g transform="matrix(53.3092,0,0,53.3092,296.35,0)">
|
||||||
|
</g>
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;fill:white;">Rendezvous</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.453686,776.886,519.873)">
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;fill:white;">Relay</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.453686,924.29,375.575)">
|
||||||
|
<g transform="matrix(53.3092,0,0,53.3092,124.423,0)">
|
||||||
|
</g>
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;fill:white;">Entry</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,-0.438175,616.236,496.055)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill:white;fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,-0.438175,618.568,497.152)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z" style="fill:white;"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z" style="fill:white;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,757.768,262.897)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill:white;fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,760.1,261.799)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z" style="fill:white;"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z" style="fill:white;"/>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
</svg>
|
After Width: | Height: | Size: 35 KiB |
225
docs/assets/img/how-tor-works/tor-path-hidden-service.svg
Normal file
@ -0,0 +1,225 @@
|
|||||||
|
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
||||||
|
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
||||||
|
<svg width="100%" height="100%" viewBox="0 0 1051 447" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xml:space="preserve" xmlns:serif="http://www.serif.com/" style="fill-rule:evenodd;clip-rule:evenodd;stroke-linecap:round;stroke-linejoin:round;">
|
||||||
|
<g transform="matrix(1,0,0,1,-101.526,-98.3251)">
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<rect x="87.098" y="355.919" width="154.361" height="165.495" style="fill:rgb(114,159,207);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M164.319,521.414L87.098,521.414L87.098,355.919L241.458,355.919L241.458,521.414L164.319,521.414" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M481.938,94.093C481.938,108.602 478.372,122.936 471.566,135.531C464.84,148.041 455.036,158.553 443.368,165.764C431.619,173.061 418.249,176.884 404.715,176.884C391.183,176.884 377.814,173.061 366.146,165.764C354.397,158.553 344.592,148.041 337.867,135.531C331.06,122.934 327.495,108.6 327.495,94.093C327.495,79.585 331.061,65.251 337.867,52.742C344.592,40.145 354.397,29.634 366.065,22.423C377.814,15.126 391.184,11.303 404.718,11.303C418.25,11.303 431.619,15.126 443.287,22.423C455.036,29.634 464.84,40.146 471.566,52.742C478.372,65.252 481.938,79.587 481.938,94.093Z" style="fill:rgb(129,212,26);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M481.938,93.965C481.938,108.473 478.372,122.807 471.566,135.403C464.84,147.913 455.036,158.425 443.368,165.635C431.619,172.932 418.249,176.755 404.715,176.755C391.183,176.755 377.814,172.932 366.146,165.635C354.397,158.425 344.592,147.912 337.867,135.403C331.06,122.806 327.495,108.472 327.495,93.965C327.495,79.457 331.061,65.122 337.867,52.614C344.592,40.017 354.397,29.505 366.065,22.295C377.814,14.997 391.184,11.175 404.718,11.175C418.25,11.175 431.619,14.997 443.287,22.295C455.036,29.505 464.84,40.017 471.566,52.614C478.372,65.124 481.938,79.458 481.938,93.965" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M790.681,94.18C790.681,108.689 787.116,122.936 780.31,135.531C773.584,148.128 763.78,158.553 752.112,165.764C740.362,173.061 726.993,176.884 713.459,176.884C699.927,176.884 686.558,173.061 674.89,165.764C663.141,158.553 653.336,148.128 646.611,135.531C639.804,122.934 636.239,108.687 636.239,94.18C636.239,79.585 639.804,65.338 646.611,52.742C653.336,40.145 663.141,29.721 674.89,22.51C686.558,15.213 699.928,11.39 713.459,11.39C726.991,11.39 740.361,15.213 752.112,22.51C763.78,29.721 773.584,40.146 780.31,52.742C787.116,65.339 790.681,79.587 790.681,94.18Z" style="fill:rgb(128,0,128);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M790.681,94.052C790.681,108.56 787.116,122.807 780.31,135.403C773.584,148 763.78,158.425 752.112,165.635C740.362,172.932 726.993,176.755 713.459,176.755C699.927,176.755 686.558,172.932 674.89,165.635C663.141,158.425 653.336,147.999 646.611,135.403C639.804,122.806 636.239,108.558 636.239,94.052C636.239,79.457 639.804,65.209 646.611,52.614C653.336,40.017 663.141,29.592 674.89,22.382C686.558,15.084 699.928,11.262 713.459,11.262C726.991,11.262 740.361,15.084 752.112,22.382C763.78,29.592 773.584,40.017 780.31,52.614C787.116,65.211 790.681,79.458 790.681,94.052" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M1099.39,94.139C1099.39,108.647 1095.82,122.894 1089.02,135.49C1082.29,148.087 1072.49,158.512 1060.82,165.722C1049.07,173.019 1035.7,176.842 1022.17,176.842C1008.63,176.842 995.264,173.019 983.596,165.722C971.847,158.512 962.042,148.086 955.317,135.49C948.51,122.893 944.945,108.645 944.945,94.139C944.945,79.544 948.511,65.296 955.317,52.701C962.042,40.104 971.847,29.679 983.596,22.468C995.264,15.171 1008.63,11.348 1022.17,11.348C1035.7,11.348 1049.07,15.171 1060.82,22.468C1072.49,29.679 1082.29,40.104 1089.02,52.701C1095.82,65.298 1099.39,79.545 1099.39,94.139Z" style="fill:rgb(255,128,0);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M1099.39,94.139C1099.39,108.647 1095.82,122.894 1089.02,135.49C1082.29,148.087 1072.49,158.512 1060.82,165.722C1049.07,173.019 1035.7,176.842 1022.17,176.842C1008.63,176.842 995.264,173.019 983.596,165.722C971.847,158.512 962.042,148.086 955.317,135.49C948.51,122.893 944.945,108.645 944.945,94.139C944.945,79.544 948.511,65.296 955.317,52.701C962.042,40.104 971.847,29.679 983.596,22.468C995.264,15.171 1008.63,11.348 1022.17,11.348C1035.7,11.348 1049.07,15.171 1060.82,22.468C1072.49,29.679 1082.29,40.104 1089.02,52.701C1095.82,65.298 1099.39,79.545 1099.39,94.139" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M481.938,432.899C481.938,447.407 478.372,461.655 471.566,474.25C464.84,486.847 455.036,497.272 443.368,504.482C431.619,511.78 418.249,515.602 404.715,515.602C391.183,515.602 377.814,511.78 366.146,504.482C354.397,497.272 344.592,486.847 337.867,474.25C331.06,461.653 327.495,447.406 327.495,432.899C327.495,418.304 331.061,404.057 337.867,391.461C344.592,378.864 354.397,368.439 366.065,361.229C377.814,353.931 391.184,350.109 404.718,350.109C418.25,350.109 431.619,353.931 443.287,361.229C455.036,368.439 464.84,378.865 471.566,391.461C478.372,404.058 481.938,418.305 481.938,432.899Z" style="fill:rgb(129,212,26);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M481.938,438.795C481.938,453.303 478.372,467.551 471.566,480.146C464.84,492.743 455.036,503.168 443.368,510.378C431.619,517.676 418.249,521.498 404.715,521.498C391.183,521.498 377.814,517.676 366.146,510.378C354.397,503.168 344.592,492.743 337.867,480.146C331.06,467.549 327.495,453.302 327.495,438.795C327.495,424.2 331.061,409.952 337.867,397.357C344.592,384.76 354.397,374.335 366.065,367.125C377.814,359.827 391.184,356.005 404.718,356.005C418.25,356.005 431.619,359.827 443.287,367.125C455.036,374.335 464.84,384.76 471.566,397.357C478.372,409.954 481.938,424.201 481.938,438.795" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M790.681,432.899C790.681,447.407 787.116,461.655 780.31,474.25C773.584,486.847 763.78,497.272 752.112,504.482C740.362,511.78 726.993,515.602 713.459,515.602C699.927,515.602 686.558,511.78 674.89,504.482C663.141,497.272 653.336,486.847 646.611,474.25C639.804,461.653 636.239,447.406 636.239,432.899C636.239,418.304 639.804,404.057 646.611,391.461C653.336,378.864 663.141,368.439 674.89,361.229C686.558,353.931 699.928,350.109 713.459,350.109C726.991,350.109 740.361,353.931 752.112,361.229C763.78,368.439 773.584,378.865 780.31,391.461C787.116,404.058 790.681,418.305 790.681,432.899Z" style="fill:rgb(128,0,128);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M790.681,438.795C790.681,453.303 787.116,467.551 780.31,480.146C773.584,492.743 763.78,503.168 752.112,510.378C740.362,517.676 726.993,521.498 713.459,521.498C699.927,521.498 686.558,517.676 674.89,510.378C663.141,503.168 653.336,492.743 646.611,480.146C639.804,467.549 636.239,453.302 636.239,438.795C636.239,424.2 639.804,409.952 646.611,397.357C653.336,384.76 663.141,374.335 674.89,367.125C686.558,359.827 699.928,356.005 713.459,356.005C726.991,356.005 740.361,359.827 752.112,367.125C763.78,374.335 773.584,384.76 780.31,397.357C787.116,409.954 790.681,424.201 790.681,438.795" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M1099.39,432.899C1099.39,447.407 1095.82,461.655 1089.02,474.25C1082.29,486.847 1072.49,497.272 1060.82,504.482C1049.07,511.78 1035.7,515.602 1022.17,515.602C1008.63,515.602 995.264,511.78 983.596,504.482C971.847,497.272 962.042,486.847 955.317,474.25C948.51,461.653 944.945,447.406 944.945,432.899C944.945,418.304 948.511,404.057 955.317,391.461C962.042,378.864 971.847,368.439 983.596,361.229C995.264,353.931 1008.63,350.109 1022.17,350.109C1035.7,350.109 1049.07,353.931 1060.82,361.229C1072.49,368.439 1082.29,378.865 1089.02,391.461C1095.82,404.058 1099.39,418.305 1099.39,432.899Z" style="fill:rgb(255,128,0);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M1099.39,432.899C1099.39,447.407 1095.82,461.655 1089.02,474.25C1082.29,486.847 1072.49,497.272 1060.82,504.482C1049.07,511.78 1035.7,515.602 1022.17,515.602C1008.63,515.602 995.264,511.78 983.596,504.482C971.847,497.272 962.042,486.847 955.317,474.25C948.51,461.653 944.945,447.406 944.945,432.899C944.945,418.304 948.511,404.057 955.317,391.461C962.042,378.864 971.847,368.439 983.596,361.229C995.264,353.931 1008.63,350.109 1022.17,350.109C1035.7,350.109 1049.07,353.931 1060.82,361.229C1072.49,368.439 1082.29,378.865 1089.02,391.461C1095.82,404.058 1099.39,418.305 1099.39,432.899" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M481.938,756.043C481.938,770.551 478.372,784.798 471.566,797.394C464.84,809.991 455.036,820.416 443.368,827.626C431.619,834.924 418.249,838.746 404.715,838.746C391.183,838.746 377.814,834.924 366.146,827.626C354.397,820.416 344.592,809.991 337.867,797.394C331.06,784.797 327.495,770.549 327.495,756.043C327.495,741.448 331.061,727.2 337.867,714.605C344.592,702.008 354.397,691.583 366.065,684.372C377.814,677.075 391.184,673.253 404.718,673.253C418.25,673.253 431.619,677.075 443.287,684.372C455.036,691.583 464.84,702.008 471.566,714.605C478.372,727.202 481.938,741.449 481.938,756.043Z" style="fill:rgb(129,212,26);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M481.938,756.043C481.938,770.551 478.372,784.798 471.566,797.394C464.84,809.991 455.036,820.416 443.368,827.626C431.619,834.924 418.249,838.746 404.715,838.746C391.183,838.746 377.814,834.924 366.146,827.626C354.397,820.416 344.592,809.991 337.867,797.394C331.06,784.797 327.495,770.549 327.495,756.043C327.495,741.448 331.061,727.2 337.867,714.605C344.592,702.008 354.397,691.583 366.065,684.372C377.814,677.075 391.184,673.253 404.718,673.253C418.25,673.253 431.619,677.075 443.287,684.372C455.036,691.583 464.84,702.008 471.566,714.605C478.372,727.202 481.938,741.449 481.938,756.043" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M790.681,756.118C790.681,770.626 787.116,784.874 780.31,797.469C773.584,810.066 763.78,820.491 752.112,827.702C740.362,834.999 726.993,838.822 713.459,838.822C699.927,838.822 686.558,834.999 674.89,827.702C663.141,820.492 653.336,810.066 646.611,797.469C639.804,784.872 636.239,770.625 636.239,756.118C636.239,741.523 639.804,727.276 646.611,714.68C653.336,702.083 663.141,691.658 674.89,684.448C686.558,677.15 699.928,673.328 713.459,673.328C726.991,673.328 740.361,677.15 752.112,684.448C763.78,691.658 773.584,702.083 780.31,714.68C787.116,727.277 790.681,741.525 790.681,756.118Z" style="fill:rgb(128,0,128);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M790.681,756.118C790.681,770.626 787.116,784.874 780.31,797.469C773.584,810.066 763.78,820.491 752.112,827.702C740.362,834.999 726.993,838.822 713.459,838.822C699.927,838.822 686.558,834.999 674.89,827.702C663.141,820.492 653.336,810.066 646.611,797.469C639.804,784.872 636.239,770.625 636.239,756.118C636.239,741.523 639.804,727.276 646.611,714.68C653.336,702.083 663.141,691.658 674.89,684.448C686.558,677.15 699.928,673.328 713.459,673.328C726.991,673.328 740.361,677.15 752.112,684.448C763.78,691.658 773.584,702.083 780.31,714.68C787.116,727.277 790.681,741.525 790.681,756.118" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M1099.39,756.118C1099.39,770.626 1095.82,784.874 1089.02,797.469C1082.29,810.066 1072.49,820.491 1060.82,827.702C1049.07,834.999 1035.7,838.822 1022.17,838.822C1008.63,838.822 995.264,834.999 983.596,827.702C971.847,820.492 962.042,810.066 955.317,797.469C948.51,784.872 944.945,770.625 944.945,756.118C944.945,741.523 948.511,727.276 955.317,714.68C962.042,702.083 971.847,691.658 983.596,684.448C995.264,677.15 1008.63,673.328 1022.17,673.328C1035.7,673.328 1049.07,677.15 1060.82,684.448C1072.49,691.658 1082.29,702.083 1089.02,714.68C1095.82,727.277 1099.39,741.525 1099.39,756.118Z" style="fill:rgb(255,128,0);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,63.5184,110.551)">
|
||||||
|
<path d="M1099.39,756.118C1099.39,770.626 1095.82,784.874 1089.02,797.469C1082.29,810.066 1072.49,820.491 1060.82,827.702C1049.07,834.999 1035.7,838.822 1022.17,838.822C1008.63,838.822 995.264,834.999 983.596,827.702C971.847,820.492 962.042,810.066 955.317,797.469C948.51,784.872 944.945,770.625 944.945,756.118C944.945,741.523 948.511,727.276 955.317,714.68C962.042,702.083 971.847,691.658 983.596,684.448C995.264,677.15 1008.63,673.328 1022.17,673.328C1035.7,673.328 1049.07,677.15 1060.82,684.448C1072.49,691.658 1082.29,702.083 1089.02,714.68C1095.82,727.277 1099.39,741.525 1099.39,756.118" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.206,203.232)">
|
||||||
|
<path d="M1340.44,328.48L1433.95,503.186L1247.02,503.186L1340.44,328.48Z" style="fill:rgb(114,159,207);"/>
|
||||||
|
</g>
|
||||||
|
<g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.453686,63.5184,110.551)">
|
||||||
|
<g transform="matrix(1,0,0,1,88.7196,550.073)">
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;">Your</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,1,88.7196,616.708)">
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;">Device</text>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.423185,215.188,217.539)">
|
||||||
|
<g transform="matrix(53.3092,0,0,53.3092,148.162,0)">
|
||||||
|
</g>
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;">Guard</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.453686,342.481,365.105)">
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;">Relay</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.453686,486.481,214.679)">
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;">Relay</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.423185,1011.71,453.118)">
|
||||||
|
<g transform="matrix(53.3092,0,0,53.3092,334.953,0)">
|
||||||
|
</g>
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;">hidden...onion</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,1.13387,0,-13.5981)">
|
||||||
|
<rect x="192.377" y="101.575" width="397.824" height="388.045" style="fill:none;stroke:rgb(62,44,177);stroke-width:6.08px;stroke-linecap:butt;stroke-miterlimit:1.5;stroke-dasharray:6.08,6.08;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,1.13387,406.832,-13.5981)">
|
||||||
|
<rect x="192.377" y="101.575" width="397.824" height="388.045" style="fill:none;stroke:rgb(208,26,36);stroke-width:6.08px;stroke-linecap:butt;stroke-miterlimit:1.5;stroke-dasharray:6.08,6.08;"/>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,-1,296.309,499.871)">
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-102.956,170.289)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-102.956,170.289)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z"/>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,1,599.384,5.09357)">
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-273.231,107.69)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-273.231,107.69)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z"/>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,-1,927.895,527.537)">
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-37.0942,67.0447)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-34.7625,65.947)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-467.504,185.162)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,-467.504,185.162)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z"/>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(1,0,0,1,-12.9813,-5.07732)">
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,70.8116,113.404)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,70.8116,113.404)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M481.938,94.093C481.938,108.602 478.372,122.936 471.566,135.531C464.84,148.041 455.036,158.553 443.368,165.764C431.619,173.061 418.249,176.884 404.715,176.884C391.183,176.884 377.814,173.061 366.146,165.764C354.397,158.553 344.592,148.041 337.867,135.531C331.06,122.934 327.495,108.6 327.495,94.093C327.495,79.585 331.061,65.251 337.867,52.742C344.592,40.145 354.397,29.634 366.065,22.423C377.814,15.126 391.184,11.303 404.718,11.303C418.25,11.303 431.619,15.126 443.287,22.423C455.036,29.634 464.84,40.146 471.566,52.742C478.372,65.252 481.938,79.587 481.938,94.093Z" style="fill:rgb(129,212,26);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M481.938,93.965C481.938,108.473 478.372,122.807 471.566,135.403C464.84,147.913 455.036,158.425 443.368,165.635C431.619,172.932 418.249,176.755 404.715,176.755C391.183,176.755 377.814,172.932 366.146,165.635C354.397,158.425 344.592,147.912 337.867,135.403C331.06,122.806 327.495,108.472 327.495,93.965C327.495,79.457 331.061,65.122 337.867,52.614C344.592,40.017 354.397,29.505 366.065,22.295C377.814,14.997 391.184,11.175 404.718,11.175C418.25,11.175 431.619,14.997 443.287,22.295C455.036,29.505 464.84,40.017 471.566,52.614C478.372,65.124 481.938,79.458 481.938,93.965" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M790.681,94.18C790.681,108.689 787.116,122.936 780.31,135.531C773.584,148.128 763.78,158.553 752.112,165.764C740.362,173.061 726.993,176.884 713.459,176.884C699.927,176.884 686.558,173.061 674.89,165.764C663.141,158.553 653.336,148.128 646.611,135.531C639.804,122.934 636.239,108.687 636.239,94.18C636.239,79.585 639.804,65.338 646.611,52.742C653.336,40.145 663.141,29.721 674.89,22.51C686.558,15.213 699.928,11.39 713.459,11.39C726.991,11.39 740.361,15.213 752.112,22.51C763.78,29.721 773.584,40.146 780.31,52.742C787.116,65.339 790.681,79.587 790.681,94.18Z" style="fill:rgb(128,0,128);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M790.681,94.052C790.681,108.56 787.116,122.807 780.31,135.403C773.584,148 763.78,158.425 752.112,165.635C740.362,172.932 726.993,176.755 713.459,176.755C699.927,176.755 686.558,172.932 674.89,165.635C663.141,158.425 653.336,147.999 646.611,135.403C639.804,122.806 636.239,108.558 636.239,94.052C636.239,79.457 639.804,65.209 646.611,52.614C653.336,40.017 663.141,29.592 674.89,22.382C686.558,15.084 699.928,11.262 713.459,11.262C726.991,11.262 740.361,15.084 752.112,22.382C763.78,29.592 773.584,40.017 780.31,52.614C787.116,65.211 790.681,79.458 790.681,94.052" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M1099.39,94.139C1099.39,108.647 1095.82,122.894 1089.02,135.49C1082.29,148.087 1072.49,158.512 1060.82,165.722C1049.07,173.019 1035.7,176.842 1022.17,176.842C1008.63,176.842 995.264,173.019 983.596,165.722C971.847,158.512 962.042,148.086 955.317,135.49C948.51,122.893 944.945,108.645 944.945,94.139C944.945,79.544 948.511,65.296 955.317,52.701C962.042,40.104 971.847,29.679 983.596,22.468C995.264,15.171 1008.63,11.348 1022.17,11.348C1035.7,11.348 1049.07,15.171 1060.82,22.468C1072.49,29.679 1082.29,40.104 1089.02,52.701C1095.82,65.298 1099.39,79.545 1099.39,94.139Z" style="fill:rgb(255,128,0);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M1099.39,94.139C1099.39,108.647 1095.82,122.894 1089.02,135.49C1082.29,148.087 1072.49,158.512 1060.82,165.722C1049.07,173.019 1035.7,176.842 1022.17,176.842C1008.63,176.842 995.264,173.019 983.596,165.722C971.847,158.512 962.042,148.086 955.317,135.49C948.51,122.893 944.945,108.645 944.945,94.139C944.945,79.544 948.511,65.296 955.317,52.701C962.042,40.104 971.847,29.679 983.596,22.468C995.264,15.171 1008.63,11.348 1022.17,11.348C1035.7,11.348 1049.07,15.171 1060.82,22.468C1072.49,29.679 1082.29,40.104 1089.02,52.701C1095.82,65.298 1099.39,79.545 1099.39,94.139" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M481.938,432.899C481.938,447.407 478.372,461.655 471.566,474.25C464.84,486.847 455.036,497.272 443.368,504.482C431.619,511.78 418.249,515.602 404.715,515.602C391.183,515.602 377.814,511.78 366.146,504.482C354.397,497.272 344.592,486.847 337.867,474.25C331.06,461.653 327.495,447.406 327.495,432.899C327.495,418.304 331.061,404.057 337.867,391.461C344.592,378.864 354.397,368.439 366.065,361.229C377.814,353.931 391.184,350.109 404.718,350.109C418.25,350.109 431.619,353.931 443.287,361.229C455.036,368.439 464.84,378.865 471.566,391.461C478.372,404.058 481.938,418.305 481.938,432.899Z" style="fill:rgb(129,212,26);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M481.938,438.795C481.938,453.303 478.372,467.551 471.566,480.146C464.84,492.743 455.036,503.168 443.368,510.378C431.619,517.676 418.249,521.498 404.715,521.498C391.183,521.498 377.814,517.676 366.146,510.378C354.397,503.168 344.592,492.743 337.867,480.146C331.06,467.549 327.495,453.302 327.495,438.795C327.495,424.2 331.061,409.952 337.867,397.357C344.592,384.76 354.397,374.335 366.065,367.125C377.814,359.827 391.184,356.005 404.718,356.005C418.25,356.005 431.619,359.827 443.287,367.125C455.036,374.335 464.84,384.76 471.566,397.357C478.372,409.954 481.938,424.201 481.938,438.795" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M790.681,432.899C790.681,447.407 787.116,461.655 780.31,474.25C773.584,486.847 763.78,497.272 752.112,504.482C740.362,511.78 726.993,515.602 713.459,515.602C699.927,515.602 686.558,511.78 674.89,504.482C663.141,497.272 653.336,486.847 646.611,474.25C639.804,461.653 636.239,447.406 636.239,432.899C636.239,418.304 639.804,404.057 646.611,391.461C653.336,378.864 663.141,368.439 674.89,361.229C686.558,353.931 699.928,350.109 713.459,350.109C726.991,350.109 740.361,353.931 752.112,361.229C763.78,368.439 773.584,378.865 780.31,391.461C787.116,404.058 790.681,418.305 790.681,432.899Z" style="fill:rgb(128,0,128);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M790.681,438.795C790.681,453.303 787.116,467.551 780.31,480.146C773.584,492.743 763.78,503.168 752.112,510.378C740.362,517.676 726.993,521.498 713.459,521.498C699.927,521.498 686.558,517.676 674.89,510.378C663.141,503.168 653.336,492.743 646.611,480.146C639.804,467.549 636.239,453.302 636.239,438.795C636.239,424.2 639.804,409.952 646.611,397.357C653.336,384.76 663.141,374.335 674.89,367.125C686.558,359.827 699.928,356.005 713.459,356.005C726.991,356.005 740.361,359.827 752.112,367.125C763.78,374.335 773.584,384.76 780.31,397.357C787.116,409.954 790.681,424.201 790.681,438.795" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M1099.39,432.899C1099.39,447.407 1095.82,461.655 1089.02,474.25C1082.29,486.847 1072.49,497.272 1060.82,504.482C1049.07,511.78 1035.7,515.602 1022.17,515.602C1008.63,515.602 995.264,511.78 983.596,504.482C971.847,497.272 962.042,486.847 955.317,474.25C948.51,461.653 944.945,447.406 944.945,432.899C944.945,418.304 948.511,404.057 955.317,391.461C962.042,378.864 971.847,368.439 983.596,361.229C995.264,353.931 1008.63,350.109 1022.17,350.109C1035.7,350.109 1049.07,353.931 1060.82,361.229C1072.49,368.439 1082.29,378.865 1089.02,391.461C1095.82,404.058 1099.39,418.305 1099.39,432.899Z" style="fill:rgb(255,128,0);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M1099.39,432.899C1099.39,447.407 1095.82,461.655 1089.02,474.25C1082.29,486.847 1072.49,497.272 1060.82,504.482C1049.07,511.78 1035.7,515.602 1022.17,515.602C1008.63,515.602 995.264,511.78 983.596,504.482C971.847,497.272 962.042,486.847 955.317,474.25C948.51,461.653 944.945,447.406 944.945,432.899C944.945,418.304 948.511,404.057 955.317,391.461C962.042,378.864 971.847,368.439 983.596,361.229C995.264,353.931 1008.63,350.109 1022.17,350.109C1035.7,350.109 1049.07,353.931 1060.82,361.229C1072.49,368.439 1082.29,378.865 1089.02,391.461C1095.82,404.058 1099.39,418.305 1099.39,432.899" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M481.938,756.043C481.938,770.551 478.372,784.798 471.566,797.394C464.84,809.991 455.036,820.416 443.368,827.626C431.619,834.924 418.249,838.746 404.715,838.746C391.183,838.746 377.814,834.924 366.146,827.626C354.397,820.416 344.592,809.991 337.867,797.394C331.06,784.797 327.495,770.549 327.495,756.043C327.495,741.448 331.061,727.2 337.867,714.605C344.592,702.008 354.397,691.583 366.065,684.372C377.814,677.075 391.184,673.253 404.718,673.253C418.25,673.253 431.619,677.075 443.287,684.372C455.036,691.583 464.84,702.008 471.566,714.605C478.372,727.202 481.938,741.449 481.938,756.043Z" style="fill:rgb(129,212,26);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M481.938,756.043C481.938,770.551 478.372,784.798 471.566,797.394C464.84,809.991 455.036,820.416 443.368,827.626C431.619,834.924 418.249,838.746 404.715,838.746C391.183,838.746 377.814,834.924 366.146,827.626C354.397,820.416 344.592,809.991 337.867,797.394C331.06,784.797 327.495,770.549 327.495,756.043C327.495,741.448 331.061,727.2 337.867,714.605C344.592,702.008 354.397,691.583 366.065,684.372C377.814,677.075 391.184,673.253 404.718,673.253C418.25,673.253 431.619,677.075 443.287,684.372C455.036,691.583 464.84,702.008 471.566,714.605C478.372,727.202 481.938,741.449 481.938,756.043" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M790.681,756.118C790.681,770.626 787.116,784.874 780.31,797.469C773.584,810.066 763.78,820.491 752.112,827.702C740.362,834.999 726.993,838.822 713.459,838.822C699.927,838.822 686.558,834.999 674.89,827.702C663.141,820.492 653.336,810.066 646.611,797.469C639.804,784.872 636.239,770.625 636.239,756.118C636.239,741.523 639.804,727.276 646.611,714.68C653.336,702.083 663.141,691.658 674.89,684.448C686.558,677.15 699.928,673.328 713.459,673.328C726.991,673.328 740.361,677.15 752.112,684.448C763.78,691.658 773.584,702.083 780.31,714.68C787.116,727.277 790.681,741.525 790.681,756.118Z" style="fill:rgb(128,0,128);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M790.681,756.118C790.681,770.626 787.116,784.874 780.31,797.469C773.584,810.066 763.78,820.491 752.112,827.702C740.362,834.999 726.993,838.822 713.459,838.822C699.927,838.822 686.558,834.999 674.89,827.702C663.141,820.492 653.336,810.066 646.611,797.469C639.804,784.872 636.239,770.625 636.239,756.118C636.239,741.523 639.804,727.276 646.611,714.68C653.336,702.083 663.141,691.658 674.89,684.448C686.558,677.15 699.928,673.328 713.459,673.328C726.991,673.328 740.361,677.15 752.112,684.448C763.78,691.658 773.584,702.083 780.31,714.68C787.116,727.277 790.681,741.525 790.681,756.118" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M1099.39,756.118C1099.39,770.626 1095.82,784.874 1089.02,797.469C1082.29,810.066 1072.49,820.491 1060.82,827.702C1049.07,834.999 1035.7,838.822 1022.17,838.822C1008.63,838.822 995.264,834.999 983.596,827.702C971.847,820.492 962.042,810.066 955.317,797.469C948.51,784.872 944.945,770.625 944.945,756.118C944.945,741.523 948.511,727.276 955.317,714.68C962.042,702.083 971.847,691.658 983.596,684.448C995.264,677.15 1008.63,673.328 1022.17,673.328C1035.7,673.328 1049.07,677.15 1060.82,684.448C1072.49,691.658 1082.29,702.083 1089.02,714.68C1095.82,727.277 1099.39,741.525 1099.39,756.118Z" style="fill:rgb(255,128,0);"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,495.905,117.379)">
|
||||||
|
<path d="M1099.39,756.118C1099.39,770.626 1095.82,784.874 1089.02,797.469C1082.29,810.066 1072.49,820.491 1060.82,827.702C1049.07,834.999 1035.7,838.822 1022.17,838.822C1008.63,838.822 995.264,834.999 983.596,827.702C971.847,820.492 962.042,810.066 955.317,797.469C948.51,784.872 944.945,770.625 944.945,756.118C944.945,741.523 948.511,727.276 955.317,714.68C962.042,702.083 971.847,691.658 983.596,684.448C995.264,677.15 1008.63,673.328 1022.17,673.328C1035.7,673.328 1049.07,677.15 1060.82,684.448C1072.49,691.658 1082.29,702.083 1089.02,714.68C1095.82,727.277 1099.39,741.525 1099.39,756.118" style="fill:none;fill-rule:nonzero;stroke:rgb(52,101,164);stroke-width:0.08px;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.453686,613.992,258.963)">
|
||||||
|
<g transform="matrix(53.3092,0,0,53.3092,296.35,0)">
|
||||||
|
</g>
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;">Rendezvous</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.453686,776.886,519.873)">
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;">Relay</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.423185,0,0,0.453686,924.29,375.575)">
|
||||||
|
<g transform="matrix(53.3092,0,0,53.3092,124.423,0)">
|
||||||
|
</g>
|
||||||
|
<text x="0px" y="0px" style="font-family:'Helvetica';font-size:53.309px;">Entry</text>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,-0.438175,616.236,496.055)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,-0.438175,618.568,497.152)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,757.768,262.897)">
|
||||||
|
<path d="M330.234,166.032L193.058,348.322L196.941,351.246L334.117,168.955L330.234,166.032Z" style="fill-rule:nonzero;"/>
|
||||||
|
</g>
|
||||||
|
<g transform="matrix(0.438175,0,0,0.438175,760.1,261.799)">
|
||||||
|
<path d="M340.601,156.288L337.671,180.385L318.258,165.776L340.601,156.288Z"/>
|
||||||
|
<path d="M342.547,153.703L339.971,154.795L315.043,165.381L338.945,183.37L342.547,153.703ZM338.657,158.87L336.406,177.398L321.48,166.171L338.657,158.87Z"/>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
</svg>
|
After Width: | Height: | Size: 34 KiB |
Before Width: | Height: | Size: 130 KiB After Width: | Height: | Size: 130 KiB |
Before Width: | Height: | Size: 115 KiB After Width: | Height: | Size: 115 KiB |
Before Width: | Height: | Size: 198 KiB |
@ -1,2 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<svg id="svg" version="1.1" viewBox="0 0 400 400" xmlns="http://www.w3.org/2000/svg"><g id="svgg" fill-rule="evenodd"><path d="m192.97 62.129c-26.656 3.317-47.983 19.882-57.565 44.71-3.853 9.982-4.545 15.747-4.545 37.851v17.306l-6.738 0.232c-14.347 0.494-22.587 5.938-26.729 17.659l-1.103 3.121v29.492c0 32.127 0.031 32.689 2.391 43.3 7.874 35.404 34.139 64.851 68.117 76.367 64.962 22.019 132.51-23.702 137.13-92.819 0.687-10.284 0.297-55.379-0.502-58.008-3.668-12.066-12.845-18.84-25.525-18.84-2.61 0-5.562-0.112-6.558-0.248l-1.813-0.249v-16.507c0-21.046-0.486-25.958-3.516-35.535-9.734-30.76-41.753-51.726-73.046-47.832m15.537 24.046c16.237 2.877 30.363 15.383 35.396 31.336 2.023 6.411 2.192 8.514 2.192 27.267v17.331h-45.899-45.898v-17.331c0-13.608 0.125-18.05 0.582-20.673 4.48-25.69 28.165-42.442 53.627-37.93m-2.898 121.87c16.242 4.187 21.698 24.248 9.976 36.683-4.224 4.481-4.355 4.975-3.637 13.767 0.717 8.774 0.689 10.256-0.241 12.743-3.982 10.643-19.039 10.643-23.021 0-0.93-2.485-0.959-3.97-0.244-12.722 0.716-8.755 0.61-9.191-3.224-13.329-15.541-16.775-1.291-42.732 20.391-37.142" fill="#f4f5f5"/><path d="m66.797 0.623c-34.231 4.974-61.413 32.288-66.186 66.507-0.93 6.668-0.93 259.07 0 265.74 4.796 34.385 32.134 61.723 66.519 66.519 6.668 0.93 259.07 0.93 265.74 0 34.385-4.796 61.723-32.134 66.519-66.519 0.93-6.668 0.93-259.07 0-265.74-4.795-34.376-32.143-61.724-66.519-66.519-6.215-0.867-260.1-0.855-266.07 0.012m147.07 62.252c28.834 6.201 50.351 28.799 55.107 57.871 0.535 3.274 0.698 7.656 0.843 22.669l0.18 18.61 7.091 0.164c13.738 0.317 22.526 6.264 26.147 17.694 1.083 3.416 1.371 60.296 0.341 67.187-9.283 62.11-67.941 102.56-127.69 88.048-42.787-10.389-75.15-47.632-79.396-91.368-0.9-9.268-0.357-61.056 0.672-64.062 3.924-11.473 12.498-17.212 26.144-17.502l7.092-0.15 0.179-18.616c0.281-29.073 2.88-38.928 14.315-54.268 15.529-20.833 43.951-31.661 68.979-26.277m-20.508 23.266c-18.263 2.85-33.014 16.445-37.53 34.59-1.16 4.66-1.519 10.98-1.526 26.828l-6e-3 14.55h45.898 45.899l-6e-3 -14.55c-7e-3 -15.848-0.367-22.168-1.527-26.828-5.762-23.154-28.041-38.204-51.202-34.59m3.259 121.69c-17.389 3.099-23.811 23.765-11.46 36.877 4.079 4.331 4.177 4.691 3.58 13.041-0.882 12.331-0.586 14.057 3.034 17.681 4.868 4.873 11.978 4.873 16.847 0 3.62-3.624 3.916-5.35 3.034-17.681-0.598-8.35-0.499-8.71 3.58-13.041 14.6-15.5 1.959-40.543-18.615-36.877" fill="#1444b4"/><path d="m273.03 307.72-1.346 1.465 1.465-1.346c0.805-0.741 1.464-1.4 1.464-1.465 0-0.299-0.33-0.018-1.583 1.346" fill="#6884c7"/><path d="m150.95 82.129-1.147 1.269 1.269-1.147c1.184-1.069 1.449-1.392 1.148-1.392-0.068 0-0.639 0.572-1.27 1.27m-20.305 64.16c0 8.809 0.051 12.468 0.114 8.132 0.063-4.337 0.063-11.544 0-16.016-0.062-4.472-0.114-0.925-0.114 7.884m139.06 3.32c0 6.983 0.053 9.839 0.118 6.348 0.064-3.491 0.064-9.204 0-12.695-0.065-3.491-0.118-0.635-0.118 6.347" fill="#4c6cc4"/><path d="m274.12 162.4c1.343 0.076 3.54 0.076 4.883 0 1.343-0.077 0.244-0.139-2.441-0.139-2.686 0-3.785 0.062-2.442 0.139m29.892 75.882c0 0.967 0.076 1.363 0.169 0.879 0.093-0.483 0.093-1.274 0-1.758-0.093-0.483-0.169-0.088-0.169 0.879m-109.97 99.495c0.483 0.093 1.274 0.093 1.758 0 0.483-0.093 0.088-0.17-0.879-0.17s-1.362 0.077-0.879 0.17m10.547 0c0.483 0.093 1.274 0.093 1.758 0 0.483-0.093 0.088-0.17-0.879-0.17s-1.363 0.077-0.879 0.17" fill="#8c9ccc"/><path d="m269.67 133.79c-1e-3 1.934 0.065 2.774 0.147 1.867 0.082-0.906 0.083-2.488 2e-3 -3.515s-0.148-0.286-0.149 1.648" fill="#3c62ba"/></g></svg>
|
|
Before Width: | Height: | Size: 3.4 KiB |
@ -1,125 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<!DOCTYPE svg PUBLIC '-//W3C//DTD SVG 1.1//EN' 'http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd'>
|
|
||||||
<svg clip-rule="evenodd" fill-rule="evenodd" stroke-linejoin="round" stroke-miterlimit="2" version="1.1" viewBox="0 0 128 128" xml:space="preserve" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">
|
|
||||||
<g transform="matrix(1.0638 0 0 1.0684 -29.885 -16.775)">
|
|
||||||
<clipPath id="_clip1">
|
|
||||||
<path d="m38.8 34.1v-4.8c0-0.4 0.1-1.1 0.1-1.1l0.2-0.5v-0.2l0.2-0.4 0.1-0.1 0.1-0.2 0.1-0.1v-0.1l0.2-0.2v-0.1l0.7-0.7 0.2-0.1h0.1l0.3-0.2h0.3l0.6-0.3c0.4-0.1 0.7-0.1 1.1-0.1h94.6v9.2h9v-18.4h-103.6c-7.3 0-13.3 6.1-13.3 13.6v4.8h9z"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip1)">
|
|
||||||
<rect x="30.2" y="14.7" width="117.1" height="12" fill="#898b8d"/>
|
|
||||||
</g>
|
|
||||||
<clipPath id="_clip2">
|
|
||||||
<path d="m38.8 34.1v-4.8c0-0.4 0.1-1.1 0.1-1.1l0.2-0.5v-0.2l0.2-0.4 0.1-0.1 0.1-0.2 0.1-0.1v-0.1l0.2-0.2v-0.1l0.7-0.7 0.2-0.1h0.1l0.3-0.2h0.3l0.6-0.3c0.4-0.1 0.7-0.1 1.1-0.1h94.6v9.2h9v-18.4h-103.6c-7.3 0-13.3 6.1-13.3 13.6v4.8h9z"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip2)">
|
|
||||||
<clipPath id="_clip3">
|
|
||||||
<path d="m133.8 27 13.2-7.1 3.7 7.2-13.2 7.1-3.7-7.2z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip3)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.98026 .94825)" x="114.723" y="4.732" width="13.724px" height="15.172px" xlink:href="#_Image4"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<clipPath id="_clip5">
|
|
||||||
<path d="m38.8 34.1v-4.8c0-0.4 0.1-1.1 0.1-1.1l0.2-0.5v-0.2l0.2-0.4 0.1-0.1 0.1-0.2 0.1-0.1v-0.1l0.2-0.2v-0.1l0.7-0.7 0.2-0.1h0.1l0.3-0.2h0.3l0.6-0.3c0.4-0.1 0.7-0.1 1.1-0.1h94.6v9.2h9v-18.4h-103.6c-7.3 0-13.3 6.1-13.3 13.6v4.8h9z"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip5)">
|
|
||||||
<clipPath id="_clip6">
|
|
||||||
<path d="m31.9 21.1 10.7 5.8-3.7 7.2-10.7-5.7 3.7-7.3z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip6)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.97267 .99213)" x="1.869" y="5.815" width="13.617px" height="13.89px" xlink:href="#_Image7"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<rect x="47.8" y="34.1" width="80.9" height="9.2" fill="#403f41"/>
|
|
||||||
<rect x="47.8" y="108" width="80.9" height="9.2" fill="#403f41"/>
|
|
||||||
<clipPath id="_clip8">
|
|
||||||
<path d="m137.7 117.1v4.9c0 0.4-0.1 1.1-0.1 1.1l-0.2 0.5v0.2l-0.2 0.4-0.1 0.1-0.1 0.2-0.1 0.1v0.1l-0.2 0.2v0.1l-0.5 0.5h-0.1l-0.1 0.1-0.2 0.1-0.1 0.1-0.3 0.2h-0.3l-0.5 0.2c-0.4 0.1-0.7 0.1-1.1 0.1h-94.7v-9.2h-9v18.4h103.6c7.3 0 13.3-6.1 13.3-13.6v-4.8h-9z"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip8)">
|
|
||||||
<rect x="29.2" y="124.6" width="117.1" height="12" fill="#898b8d"/>
|
|
||||||
</g>
|
|
||||||
<clipPath id="_clip9">
|
|
||||||
<path d="m137.7 117.1v4.9c0 0.4-0.1 1.1-0.1 1.1l-0.2 0.5v0.2l-0.2 0.4-0.1 0.1-0.1 0.2-0.1 0.1v0.1l-0.2 0.2v0.1l-0.5 0.5h-0.1l-0.1 0.1-0.2 0.1-0.1 0.1-0.3 0.2h-0.3l-0.5 0.2c-0.4 0.1-0.7 0.1-1.1 0.1h-94.7v-9.2h-9v18.4h103.6c7.3 0 13.3-6.1 13.3-13.6v-4.8h-9z"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip9)">
|
|
||||||
<clipPath id="_clip10">
|
|
||||||
<path d="m42.7 124.4-13.2 7.1-3.7-7.3 13.2-7.1 3.7 7.3z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip10)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.98026 .9616)" x="1.854" y="112.667" width="13.724px" height="15.386px" xlink:href="#_Image11"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<clipPath id="_clip12">
|
|
||||||
<path d="m137.7 117.1v4.9c0 0.4-0.1 1.1-0.1 1.1l-0.2 0.5v0.2l-0.2 0.4-0.1 0.1-0.1 0.2-0.1 0.1v0.1l-0.2 0.2v0.1l-0.5 0.5h-0.1l-0.1 0.1-0.2 0.1-0.1 0.1-0.3 0.2h-0.3l-0.5 0.2c-0.4 0.1-0.7 0.1-1.1 0.1h-94.7v-9.2h-9v18.4h103.6c7.3 0 13.3-6.1 13.3-13.6v-4.8h-9z"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip12)">
|
|
||||||
<clipPath id="_clip13">
|
|
||||||
<path d="m144.7 130.2-10.8-5.8 3.7-7.2 10.8 5.7-3.7 7.3z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip13)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.97267 .99213)" x="115.728" y="109.308" width="13.617px" height="13.89px" xlink:href="#_Image14"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<rect x="38.8" y="52.6" width="34.6" height="9.2" fill="#58595b"/>
|
|
||||||
<clipPath id="_clip15">
|
|
||||||
<path d="m69.7 69.2-31.3-16.8 3.7-7.4 31.4 16.8-3.8 7.4z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip15)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.98266 .99448)" x="11.16" y="31.479" width="37.341px" height="25.856px" xlink:href="#_Image16"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<rect x="103.1" y="52.6" width="34.6" height="9.2" fill="#58595b"/>
|
|
||||||
<clipPath id="_clip17">
|
|
||||||
<path d="m106.8 69.2 31.4-16.8-3.8-7.4-31.3 16.8 3.7 7.4z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip17)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.98266 .99448)" x="81.206" y="31.479" width="37.341px" height="25.856px" xlink:href="#_Image16"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<rect x="103.1" y="89.5" width="34.6" height="9.2" fill="#58595b"/>
|
|
||||||
<clipPath id="_clip18">
|
|
||||||
<path d="m106.8 82.1 31.4 16.8-3.8 7.4-31.3-16.8 3.7-7.4z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip18)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.98266 .99448)" x="81.206" y="71.339" width="37.341px" height="25.856px" xlink:href="#_Image16"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<rect x="38.8" y="89.5" width="34.6" height="9.2" fill="#58595b"/>
|
|
||||||
<clipPath id="_clip19">
|
|
||||||
<path d="m69.7 82.1-31.3 16.8 3.7 7.4 31.4-16.8-3.8-7.4z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip19)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.98266 .99448)" x="11.16" y="71.339" width="37.341px" height="25.856px" xlink:href="#_Image16"/>
|
|
||||||
</g>
|
|
||||||
</g><g fill-rule="nonzero">
|
|
||||||
<path d="m73.4 52.6v9.2l-43.6-23.3v-9.2l43.6 23.3z" fill="url(#_Linear20)"/>
|
|
||||||
<path d="m103.1 52.6v9.2l43.6-23.3v-9.2l-43.6 23.3z" fill="url(#_Linear21)"/>
|
|
||||||
<path d="m103.1 98.8v-9.3l43.6 23.3v9.3l-43.6-23.3z" fill="url(#_Linear22)"/>
|
|
||||||
<path d="m73.4 98.8v-9.3l-43.6 23.3v9.3l43.6-23.3z" fill="url(#_Linear23)"/>
|
|
||||||
<path d="m103.1 80.3 25.6 13.7v-9.3l-8.3-4.4h26.3v-9.3h-26.3l8.3-4.4v-9.2l-25.6 13.6v9.3z" fill="#e24525"/>
|
|
||||||
<path d="m47.8 94 25.6-13.7v-9.3l-25.6-13.6v9.2l8.4 4.4h-26.4v9.3h26.3l-8.3 4.4v9.3z" fill="#e24525"/>
|
|
||||||
</g></g>
|
|
||||||
<defs>
|
|
||||||
<image id="_Image4" width="14px" height="16px" xlink:href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAA4AAAAQCAYAAAAmlE46AAAACXBIWXMAAA7EAAAOxAGVKw4bAAAAI0lEQVQokWMsLi7+z0AGYCJH00jRyIguQGwoDyE/jmqkhUYAma0EzxtWDhkAAAAASUVORK5CYII="/>
|
|
||||||
<image id="_Image7" width="14px" height="14px" xlink:href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAA4AAAAOCAYAAAAfSC3RAAAACXBIWXMAAA7EAAAOxAGVKw4bAAAAPklEQVQokWNkgILi4uL/DCQARnI0MTAwMDCRqgFuIzm2UWQjC6kaent7GUm2EaaJZI3IgGiNyLbRx8YhrBEAaikMHGN+VycAAAAASUVORK5CYII="/>
|
|
||||||
<image id="_Image11" width="14px" height="16px" xlink:href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAA4AAAAQCAYAAAAmlE46AAAACXBIWXMAAA7EAAAOxAGVKw4bAAAAKUlEQVQokWM0Njb+z0AEOHv2LCMyn4kYTdjAqMbhoZGR2JRDNRtHgkYALcwFtyg+QT8AAAAASUVORK5CYII="/>
|
|
||||||
<image id="_Image14" width="14px" height="14px" xlink:href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAA4AAAAOCAYAAAAfSC3RAAAACXBIWXMAAA7EAAAOxAGVKw4bAAAAP0lEQVQokWNkQAPGxsb/0cWwASZiFI1UjYzIHGJDlDo2kmIbAwMDAyOpGmCAvqF69uxZRvrZePbsWUYGBgYGAL1XC0kWB9UkAAAAAElFTkSuQmCC"/>
|
|
||||||
<image id="_Image16" width="38px" height="26px" xlink:href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACYAAAAaCAYAAADbhS54AAAACXBIWXMAAA7EAAAOxAGVKw4bAAAAPElEQVRIie3OsRGAIAAAMWRKPPefQyagSKXFZ4Jc637e8UPz68BJMVVMFVPFVDFVTBVTxVQxVUwVU8XUBl5UAj8RVzT1AAAAAElFTkSuQmCC"/>
|
|
||||||
<linearGradient id="_Linear20" x2="1" gradientTransform="matrix(43.56,0,0,43.56,29.84,45.5)" gradientUnits="userSpaceOnUse"><stop stop-color="#a6a8ab" offset="0"/><stop stop-color="#a6a8ab" offset=".24"/><stop stop-color="#404040" offset="1"/></linearGradient>
|
|
||||||
<linearGradient id="_Linear21" x2="1" gradientTransform="matrix(-43.6 5.3395e-15 -5.3395e-15 -43.6 146.7 45.5)" gradientUnits="userSpaceOnUse"><stop stop-color="#a6a8ab" offset="0"/><stop stop-color="#a6a8ab" offset=".24"/><stop stop-color="#404040" offset="1"/></linearGradient>
|
|
||||||
<linearGradient id="_Linear22" x2="1" gradientTransform="matrix(-43.56 5.3346e-15 -5.3346e-15 -43.56 146.68 606)" gradientUnits="userSpaceOnUse"><stop stop-color="#a6a8ab" offset="0"/><stop stop-color="#a6a8ab" offset=".24"/><stop stop-color="#404040" offset="1"/></linearGradient>
|
|
||||||
<linearGradient id="_Linear23" x2="1" gradientTransform="matrix(43.53,0,0,43.53,29.9,606)" gradientUnits="userSpaceOnUse"><stop stop-color="#a6a8ab" offset="0"/><stop stop-color="#a6a8ab" offset=".24"/><stop stop-color="#404040" offset="1"/></linearGradient>
|
|
||||||
</defs>
|
|
||||||
</svg>
|
|
Before Width: | Height: | Size: 9.5 KiB |
@ -1,23 +0,0 @@
|
|||||||
var feedback = document.forms.feedback
|
|
||||||
/* Show feedback */
|
|
||||||
feedback.hidden = false
|
|
||||||
feedback.addEventListener("submit", function(ev) {
|
|
||||||
ev.preventDefault()
|
|
||||||
|
|
||||||
/* Retrieve page and feedback value */
|
|
||||||
var page = document.location.pathname
|
|
||||||
var data = ev.submitter.getAttribute("data-md-value")
|
|
||||||
|
|
||||||
/* Send feedback value */
|
|
||||||
console.log(page, data)
|
|
||||||
plausible(data)
|
|
||||||
|
|
||||||
/* Disable form and show note, if given */
|
|
||||||
feedback.firstElementChild.disabled = true
|
|
||||||
var note = feedback.querySelector(
|
|
||||||
".md-feedback__note [data-md-value='" + data + "']"
|
|
||||||
)
|
|
||||||
|
|
||||||
if (note)
|
|
||||||
note.hidden = false
|
|
||||||
})
|
|
78
docs/basics/account-creation.md
Normal file
@ -0,0 +1,78 @@
|
|||||||
|
---
|
||||||
|
meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
|
||||||
|
title: "Account Creation"
|
||||||
|
icon: 'material/account-plus'
|
||||||
|
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
|
||||||
|
---
|
||||||
|
|
||||||
|
Often people sign up for services without thinking. Maybe it's a streaming service so you can watch that new show everyone's talking about, or an account that gives you a discount for your favorite fast food place. Whatever the case may be, you should consider the implications for your data now and later on down the line.
|
||||||
|
|
||||||
|
There are risks associated with every new service that you use. Data breaches; disclosure of customer information to third parties; rogue employees accessing data; all are possibilities that must be considered when giving your information out. You need to be confident that you can trust the service, which is why we don't recommend storing valuable data on anything but the most mature and battle-tested products. That usually means services which provide E2EE and have undergone a cryptographic audit. An audit increases assurance that the product was designed without glaring security issues caused by an inexperienced developer.
|
||||||
|
|
||||||
|
It can also be difficult to delete the accounts on some services. Sometimes [overwriting data](account-deletion.md#overwriting-account-information) associated with an account can be possible, but in other cases the service will keep an entire history of changes to the account.
|
||||||
|
|
||||||
|
## Terms of Service & Privacy Policy
|
||||||
|
|
||||||
|
The ToS are the rules that you agree to follow when using the service. With larger services these rules are often enforced by automated systems. Sometimes these automated systems can make mistakes. For example, you may be banned or locked out of your account on some services for using a VPN or VOIP number. Appealing such bans is often difficult, and involves an automated process too, which isn't always successful. This would be one of the reasons why we wouldn't suggest using Gmail for email as an example. Email is crucial for access to other services you might have signed up for.
|
||||||
|
|
||||||
|
The Privacy Policy is how the service says they will use your data and it is worth reading so that you understand how your data will be used. A company or organization might not be legally obligated to follow everything contained in the policy (it depends on the jurisdiction). We would recommend having some idea what your local laws are and what they permit a provider to collect.
|
||||||
|
|
||||||
|
We recommend looking for particular terms such as "data collection", "data analysis", "cookies", "ads" or "3rd-party" services. Sometimes you will be able to opt-out from data collection or from sharing your data, but it is best to choose a service that respects your privacy from the start.
|
||||||
|
|
||||||
|
Keep in mind you're also placing your trust in the company or organization and that they will comply with their own privacy policy.
|
||||||
|
|
||||||
|
## Authentication methods
|
||||||
|
|
||||||
|
There are usually multiple ways to sign up for an account, each with their own benefits and drawbacks.
|
||||||
|
|
||||||
|
### Email and password
|
||||||
|
|
||||||
|
The most common way to create a new account is by an email address and password. When using this method, you should use a password manager and follow [best practices](passwords-overview.md) regarding passwords.
|
||||||
|
|
||||||
|
!!! tip
|
||||||
|
|
||||||
|
You can use your password manager to organize other authentication methods too! Just add the new entry and fill the appropriate fields, you can add notes for things like security questions or a backup key.
|
||||||
|
|
||||||
|
You will be responsible for managing your login credentials. For added security, you can set up [MFA](multi-factor-authentication.md) on your accounts.
|
||||||
|
|
||||||
|
[Recommended password managers](../passwords.md){ .md-button }
|
||||||
|
|
||||||
|
#### Email aliases
|
||||||
|
|
||||||
|
If you don't want to give your real email address to a service, you have the option to use an alias. We described them in more detail on our email services recommendation page. Essentially, alias services allow you to generate new email addresses that forward all emails to your main address. This can help prevent tracking across services and help you manage the marketing emails that sometimes come with the sign up process. Those can be filtered automatically based on the alias they are sent to.
|
||||||
|
|
||||||
|
Should a service get hacked, you might start receiving phishing or spam emails to the address you used to sign up. Using unique aliases for each service can assist in identifying exactly what service was hacked.
|
||||||
|
|
||||||
|
[Recommended email aliasing services](../email.md#email-aliasing-services){ .md-button }
|
||||||
|
|
||||||
|
### "Sign in with..." (OAuth)
|
||||||
|
|
||||||
|
OAuth is an authentication protocol that allows you to register for a service without sharing much information with the service provider, if any, by using an existing account you have with another service instead. Whenever you see something along the lines of "Sign in with *provider name*" on a registration form, it's typically using OAuth.
|
||||||
|
|
||||||
|
When you sign in with OAuth, it will open a login page with the provider you choose, and your existing account and new account will be connected. Your password won't be shared, but some basic information typically will (you can review it during the login request). This process is needed every time you want to log in to the same account.
|
||||||
|
|
||||||
|
The main advantages are:
|
||||||
|
|
||||||
|
- **Security**: no risk of being involved in a [data breach](https://en.wikipedia.org/wiki/Data_breach) because the website does not store your credentials.
|
||||||
|
- **Ease of use**: multiple accounts are managed by a single login.
|
||||||
|
|
||||||
|
But there are disadvantages:
|
||||||
|
|
||||||
|
- **Privacy**: the OAuth provider you log in with will know the services you use.
|
||||||
|
- **Centralization**: if the account you use for OAuth is compromised or you aren't able to login to it, all other accounts connected to it are affected.
|
||||||
|
|
||||||
|
OAuth authentication can be especially useful in those situations where you could benefit from deeper integration between services. Our recommendation is to limit using OAuth to only where you need it, and always protect the main account with [MFA](multi-factor-authentication.md).
|
||||||
|
|
||||||
|
All the services that use OAuth will be as secure as your underlying provider's account. For example, if you want to secure an account with a hardware key, but that service doesn't support hardware keys, you can secure the account you use with OAuth with a hardware key instead, and now you essentially have hardware MFA on all your accounts. It is worth noting though that weak authentication on your OAuth provider account means that any account tied to that login will also be weak.
|
||||||
|
|
||||||
|
### Phone number
|
||||||
|
|
||||||
|
We recommend avoiding services that require a phone number for sign up. A phone number can identity you across multiple services and depending on data sharing agreements this will make your usage easier to track, particularly if one of those services is breached as the phone number is often **not** encrypted.
|
||||||
|
|
||||||
|
You should avoid giving out your real phone number if you can. Some services will allow the use of VOIP numbers, however these often trigger fraud detection systems, causing an account to be locked down, so we don't recommend that for important accounts.
|
||||||
|
|
||||||
|
In many cases you will need to provide a number that you can receive SMS or calls from, particularly when shopping internationally, in case there is a problem with your order at border screening. It's common for services to use your number as a verification method; don't let yourself get locked out of an important account because you wanted to be clever and give a fake number!
|
||||||
|
|
||||||
|
### Username and password
|
||||||
|
|
||||||
|
Some services allow you to register without using an email address and only require you to set a username and password. These services may provide increased anonymity when combined with a VPN or Tor. Keep in mind that for these accounts there will most likely be **no way to recover your account** in the event you forget your username or password.
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: "Account Deletion"
|
title: "Account Deletion"
|
||||||
icon: 'material/account-remove'
|
icon: 'material/account-remove'
|
||||||
|
description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection.
|
||||||
---
|
---
|
||||||
Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence.
|
Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence.
|
||||||
|
|
@ -1,6 +1,41 @@
|
|||||||
---
|
---
|
||||||
title: "Common Misconceptions"
|
title: "Common Misconceptions"
|
||||||
icon: 'material/robot-confused'
|
icon: 'material/robot-confused'
|
||||||
|
description: Privacy isn't a straightforward topic, and it's easy to get caught up in marketing claims and other disinformation.
|
||||||
|
schema:
|
||||||
|
-
|
||||||
|
"@context": https://schema.org
|
||||||
|
"@type": FAQPage
|
||||||
|
mainEntity:
|
||||||
|
-
|
||||||
|
"@type": Question
|
||||||
|
name: Is open source software inherently secure?
|
||||||
|
acceptedAnswer:
|
||||||
|
"@type": Answer
|
||||||
|
text: |
|
||||||
|
Whether the source code is available and how software is licensed does not inherently affect its security in any way. Open-source software has the potential to be more secure than proprietary software, but there is absolutely no guarantee this is the case. When you evaluate software, you should look at the reputation and security of each tool on an individual basis.
|
||||||
|
-
|
||||||
|
"@type": Question
|
||||||
|
name: Can shifting trust to another provider increase privacy?
|
||||||
|
acceptedAnswer:
|
||||||
|
"@type": Answer
|
||||||
|
text: |
|
||||||
|
We talk about "shifting trust" a lot when discussing solutions like VPNs (which shift the trust you place in your ISP to the VPN provider). While this protects your browsing data from your ISP specifically, the VPN provider you choose still has access to your browsing data: Your data isn't completely secured from all parties.
|
||||||
|
-
|
||||||
|
"@type": Question
|
||||||
|
name: Are privacy-focused solutions inherently trustworthy?
|
||||||
|
acceptedAnswer:
|
||||||
|
"@type": Answer
|
||||||
|
text: |
|
||||||
|
Focusing solely on the privacy policies and marketing of a tool or provider can blind you to its weaknesses. When you're looking for a more private solution, you should determine what the underlying problem is and find technical solutions to that problem. For example, you may want to avoid Google Drive, which gives Google access to all of your data. The underlying problem in this case is lack of E2EE, so you should make sure that the provider you switch to actually implements E2EE, or use a tool (like Cryptomator) which provides E2EE on any cloud provider. Switching to a "privacy-focused" provider (that doesn't implement E2EE) doesn't solve your problem: it just shifts trust from Google to that provider.
|
||||||
|
-
|
||||||
|
"@type": Question
|
||||||
|
name: How complicated should my threat model be?
|
||||||
|
acceptedAnswer:
|
||||||
|
"@type": Answer
|
||||||
|
text: |
|
||||||
|
We often see people describing privacy threat models that are overly complex. Often, these solutions include problems like many different email accounts or complicated setups with lots of moving parts and conditions. The replies are usually answers to "What is the best way to do X?"
|
||||||
|
Finding the "best" solution for yourself doesn't necessarily mean you are after an infallible solution with dozens of conditions—these solutions are often difficult to work with realistically. As we discussed previously, security often comes at the cost of convenience.
|
||||||
---
|
---
|
||||||
|
|
||||||
## "Open-source software is always secure" or "Proprietary software is more secure"
|
## "Open-source software is always secure" or "Proprietary software is more secure"
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: "Common Threats"
|
title: "Common Threats"
|
||||||
icon: 'material/eye-outline'
|
icon: 'material/eye-outline'
|
||||||
|
description: Your threat model is personal to you, but these are some of the things many visitors to this site care about.
|
||||||
---
|
---
|
||||||
|
|
||||||
Broadly speaking, we categorize our recommendations into the [threats](threat-modeling.md) or goals that apply to most people. ==You may be concerned with none, one, a few, or all of these possibilities==, and the tools and services you use depend on what your goals are. You may have specific threats outside of these categories as well, which is perfectly fine! The important part is developing an understanding of the benefits and shortcomings of the tools you choose to use, because virtually none of them will protect you from every threat.
|
Broadly speaking, we categorize our recommendations into the [threats](threat-modeling.md) or goals that apply to most people. ==You may be concerned with none, one, a few, or all of these possibilities==, and the tools and services you use depend on what your goals are. You may have specific threats outside of these categories as well, which is perfectly fine! The important part is developing an understanding of the benefits and shortcomings of the tools you choose to use, because virtually none of them will protect you from every threat.
|
||||||
@ -76,6 +77,12 @@ Even with E2EE, service providers can still profile you based on **metadata**, w
|
|||||||
|
|
||||||
Mass surveillance is the intricate effort to monitor the "behavior, many activities, or information" of an entire (or substantial fraction of a) population.[^1] It often refers to government programs, such as the ones [disclosed by Edward Snowden in 2013](https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)). However, it can also be carried out by corporations, either on behalf of government agencies or by their own initiative.
|
Mass surveillance is the intricate effort to monitor the "behavior, many activities, or information" of an entire (or substantial fraction of a) population.[^1] It often refers to government programs, such as the ones [disclosed by Edward Snowden in 2013](https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)). However, it can also be carried out by corporations, either on behalf of government agencies or by their own initiative.
|
||||||
|
|
||||||
|
!!! abstract "Atlas of Surveillance"
|
||||||
|
|
||||||
|
If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/).
|
||||||
|
|
||||||
|
In France you can take a look at the [Technolopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net.
|
||||||
|
|
||||||
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
|
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
|
||||||
|
|
||||||
!!! quote "ACLU: [*The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward*](https://www.aclu.org/news/national-security/the-privacy-lesson-of-9-11-mass-surveillance-is-not-the-way-forward)"
|
!!! quote "ACLU: [*The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward*](https://www.aclu.org/news/national-security/the-privacy-lesson-of-9-11-mass-surveillance-is-not-the-way-forward)"
|
||||||
@ -126,7 +133,7 @@ Censorship on corporate platforms is increasingly common, as platforms like Twit
|
|||||||
|
|
||||||
People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily.
|
People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily.
|
||||||
|
|
||||||
!!! important
|
!!! tip
|
||||||
|
|
||||||
While evading censorship itself can be easy, hiding the fact that you are doing it can be very problematic.
|
While evading censorship itself can be easy, hiding the fact that you are doing it can be very problematic.
|
||||||
|
|
@ -1,6 +1,8 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
|
||||||
title: Email Security
|
title: Email Security
|
||||||
icon: material/email
|
icon: material/email
|
||||||
|
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
|
||||||
---
|
---
|
||||||
|
|
||||||
Email is an insecure form of communication by default. You can improve your email security with tools such as OpenPGP, which add End-to-End Encryption to your messages, but OpenPGP still has a number of drawbacks compared to encryption in other messaging applications, and some email data can never be encrypted inherently due to how email is designed.
|
Email is an insecure form of communication by default. You can improve your email security with tools such as OpenPGP, which add End-to-End Encryption to your messages, but OpenPGP still has a number of drawbacks compared to encryption in other messaging applications, and some email data can never be encrypted inherently due to how email is designed.
|
||||||
@ -21,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
|
|||||||
|
|
||||||
### How Do I Protect My Private Keys?
|
### How Do I Protect My Private Keys?
|
||||||
|
|
||||||
A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
||||||
|
|
||||||
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
||||||
|
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: "Multi-Factor Authentication"
|
title: "Multi-Factor Authentication"
|
||||||
icon: 'material/two-factor-authentication'
|
icon: 'material/two-factor-authentication'
|
||||||
|
description: MFA is a critical security mechanism for securing your online accounts, but some methods are stronger than others.
|
||||||
---
|
---
|
||||||
**Multi-Factor Authentication** (**MFA**) is a security mechanism that requires additional steps beyond entering your username (or email) and password. The most common method is time limited codes you might receive from SMS or an app.
|
**Multi-Factor Authentication** (**MFA**) is a security mechanism that requires additional steps beyond entering your username (or email) and password. The most common method is time limited codes you might receive from SMS or an app.
|
||||||
|
|
||||||
@ -77,7 +78,7 @@ When you create an account, the public key is sent to the service, then when you
|
|||||||
This presentation discusses the history of password authentication, the pitfalls (such as password reuse), and discussion of FIDO2 and [WebAuthn](https://webauthn.guide) standards.
|
This presentation discusses the history of password authentication, the pitfalls (such as password reuse), and discussion of FIDO2 and [WebAuthn](https://webauthn.guide) standards.
|
||||||
|
|
||||||
<div class="yt-embed">
|
<div class="yt-embed">
|
||||||
<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/aMo4ZlWznao" title="How FIDO2 and WebAuthn Stop Account Takeovers" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
<iframe width="560" height="315" src="https://invidious.privacyguides.net/embed/aMo4ZlWznao?local=true" title="How FIDO2 and WebAuthn Stop Account Takeovers" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
FIDO2 and WebAuthn have superior security and privacy properties when compared to any MFA methods.
|
FIDO2 and WebAuthn have superior security and privacy properties when compared to any MFA methods.
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: "Introduction to Passwords"
|
title: "Introduction to Passwords"
|
||||||
icon: 'material/form-textbox-password'
|
icon: 'material/form-textbox-password'
|
||||||
|
description: These are some tips and tricks on how to create the strongest passwords and keep your accounts secure.
|
||||||
---
|
---
|
||||||
|
|
||||||
Passwords are an essential part of our everyday digital lives. We use them to protect our accounts, our devices and our secrets. Despite often being the only thing between us and an adversary who's after our private information, not a lot of thought is put into them, which often leads to people using passwords that can be easily guessed or brute-forced.
|
Passwords are an essential part of our everyday digital lives. We use them to protect our accounts, our devices and our secrets. Despite often being the only thing between us and an adversary who's after our private information, not a lot of thought is put into them, which often leads to people using passwords that can be easily guessed or brute-forced.
|
||||||
@ -25,11 +26,10 @@ You should avoid changing passwords that you have to remember (such as your pass
|
|||||||
|
|
||||||
When it comes to passwords that you don't have to remember (such as passwords stored inside your password manager), if your [threat model](threat-modeling.md) calls for it, we recommend going through important accounts (especially accounts that don't use multi-factor authentication) and changing their password every couple of months, in case they have been compromised in a data breach that hasn't become public yet. Most password managers allow you to set an expiry date for your password to make this easier to manage.
|
When it comes to passwords that you don't have to remember (such as passwords stored inside your password manager), if your [threat model](threat-modeling.md) calls for it, we recommend going through important accounts (especially accounts that don't use multi-factor authentication) and changing their password every couple of months, in case they have been compromised in a data breach that hasn't become public yet. Most password managers allow you to set an expiry date for your password to make this easier to manage.
|
||||||
|
|
||||||
!!! Tip "Checking for data breaches"
|
!!! tip "Checking for data breaches"
|
||||||
|
|
||||||
If your password manager lets you check for compromised passwords, make sure to do so and promptly change any password that may have been exposed in a data breach. Alternatively, you could follow [Have I Been Pwned's Latest Breaches feed](https://feeds.feedburner.com/HaveIBeenPwnedLatestBreaches) with the help of a [news aggregator](../news-aggregators.md).
|
If your password manager lets you check for compromised passwords, make sure to do so and promptly change any password that may have been exposed in a data breach. Alternatively, you could follow [Have I Been Pwned's Latest Breaches feed](https://feeds.feedburner.com/HaveIBeenPwnedLatestBreaches) with the help of a [news aggregator](../news-aggregators.md).
|
||||||
|
|
||||||
|
|
||||||
## Creating strong passwords
|
## Creating strong passwords
|
||||||
|
|
||||||
### Passwords
|
### Passwords
|
||||||
@ -48,7 +48,7 @@ An example of a diceware passphrase is `viewable fastness reluctant squishy seve
|
|||||||
|
|
||||||
To generate a diceware passphrase using real dice, follow these steps:
|
To generate a diceware passphrase using real dice, follow these steps:
|
||||||
|
|
||||||
!!! Note
|
!!! note
|
||||||
|
|
||||||
These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
|
These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
|
||||||
|
|
||||||
@ -60,15 +60,15 @@ To generate a diceware passphrase using real dice, follow these steps:
|
|||||||
|
|
||||||
4. Repeat this process until your passphrase has as many words as you need, which you should separate with a space.
|
4. Repeat this process until your passphrase has as many words as you need, which you should separate with a space.
|
||||||
|
|
||||||
!!! Warning "Important"
|
!!! warning "Important"
|
||||||
|
|
||||||
You should **not** re-roll words until you get a combination of words that appeal to you. The process should be completely random.
|
You should **not** re-roll words until you get a combination of words that appeal to you. The process should be completely random.
|
||||||
|
|
||||||
If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords.
|
If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords.
|
||||||
|
|
||||||
We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also other wordlists in different languages, if you do not want your passphrase to be in English.
|
We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
|
||||||
|
|
||||||
??? Note "Explanation of entropy and strength of diceware passphrases"
|
??? note "Explanation of entropy and strength of diceware passphrases"
|
||||||
|
|
||||||
To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example.
|
To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example.
|
||||||
|
|
||||||
@ -98,7 +98,7 @@ There are many good options to choose from, both cloud-based and local. Choose o
|
|||||||
|
|
||||||
[List of recommended password managers](../passwords.md){ .md-button }
|
[List of recommended password managers](../passwords.md){ .md-button }
|
||||||
|
|
||||||
!!! Warning "Don't place your passwords and TOTP tokens inside the same password manager"
|
!!! warning "Don't place your passwords and TOTP tokens inside the same password manager"
|
||||||
|
|
||||||
When using TOTP codes as [multi-factor authentication](../multi-factor-authentication.md), the best security practice is to keep your TOTP codes in a [separate app](../multi-factor-authentication.md#authenticator-apps).
|
When using TOTP codes as [multi-factor authentication](../multi-factor-authentication.md), the best security practice is to keep your TOTP codes in a [separate app](../multi-factor-authentication.md#authenticator-apps).
|
||||||
|
|
@ -1,6 +1,8 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
|
||||||
title: "Threat Modeling"
|
title: "Threat Modeling"
|
||||||
icon: 'material/target-account'
|
icon: 'material/target-account'
|
||||||
|
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
|
||||||
---
|
---
|
||||||
|
|
||||||
Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
|
Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
|
@ -1,11 +1,13 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
|
||||||
title: VPN Overview
|
title: VPN Overview
|
||||||
icon: material/vpn
|
icon: material/vpn
|
||||||
|
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
|
||||||
---
|
---
|
||||||
|
|
||||||
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. An ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem).
|
Virtual Private Networks are a way of extending the end of your network to exit somewhere else in the world. An ISP can see the flow of internet traffic entering and exiting your network termination device (i.e. modem).
|
||||||
|
|
||||||
Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
Encryption protocols such as HTTPS are commonly used on the internet, so they may not be able to see exactly what you're posting or reading, but they can get an idea of the [domains you request](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
||||||
|
|
||||||
A VPN can help as it can shift trust to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing into it.
|
A VPN can help as it can shift trust to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing into it.
|
||||||
|
|
||||||
@ -19,7 +21,7 @@ However, they do hide your actual IP from a third-party service, provided that t
|
|||||||
|
|
||||||
## When shouldn't I use a VPN?
|
## When shouldn't I use a VPN?
|
||||||
|
|
||||||
Using a VPN in cases where you're using your [known identity](../basics/common-threats.en.md#common-misconceptions) is unlikely be useful.
|
Using a VPN in cases where you're using your [known identity](common-threats.md#common-misconceptions) is unlikely be useful.
|
||||||
|
|
||||||
Doing so may trigger spam and fraud detection systems, such as if you were to log into your bank's website.
|
Doing so may trigger spam and fraud detection systems, such as if you were to log into your bank's website.
|
||||||
|
|
||||||
@ -47,7 +49,7 @@ VPNs cannot provide anonymity. Your VPN provider will still see your real IP add
|
|||||||
|
|
||||||
## What about VPN providers that provide Tor nodes?
|
## What about VPN providers that provide Tor nodes?
|
||||||
|
|
||||||
Do not use that feature. The point of using Tor is that you do not trust your VPN provider. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
|
Do not use that feature. The point of using Tor is that you do not trust your VPN provider. Currently Tor only supports the [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (used in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) for voice and video sharing, the new [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, etc.), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit).
|
||||||
|
|
||||||
The feature should be viewed as a convenient way to access the Tor Network, not to stay anonymous. For proper anonymity, use the Tor Browser, TorSocks, or a Tor gateway.
|
The feature should be viewed as a convenient way to access the Tor Network, not to stay anonymous. For proper anonymity, use the Tor Browser, TorSocks, or a Tor gateway.
|
||||||
|
|
||||||
@ -59,7 +61,7 @@ A VPN may still be useful to you in a variety of scenarios, such as:
|
|||||||
1. Hiding your downloads (such as torrents) from your ISP and anti-piracy organizations.
|
1. Hiding your downloads (such as torrents) from your ISP and anti-piracy organizations.
|
||||||
1. Hiding your IP from third-party websites and services, preventing IP based tracking.
|
1. Hiding your IP from third-party websites and services, preventing IP based tracking.
|
||||||
|
|
||||||
For use cases like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're *trusting* the provider. In pretty much any other scenario you should be using a secure**-by-design** tool such as Tor.
|
For situations like these, or if you have another compelling reason, the VPN providers we listed above are who we think are the most trustworthy. However, using a VPN provider still means you're *trusting* the provider. In pretty much any other scenario you should be using a secure**-by-design** tool such as Tor.
|
||||||
|
|
||||||
## Sources and Further Reading
|
## Sources and Further Reading
|
||||||
|
|
||||||
@ -70,7 +72,7 @@ For use cases like these, or if you have another compelling reason, the VPN prov
|
|||||||
|
|
||||||
## Related VPN Information
|
## Related VPN Information
|
||||||
|
|
||||||
- [The Trouble with VPN and Privacy Review Sites](https://jonaharagon.com/2019/11/the-trouble-with-vpn-and-privacy-review-sites/)
|
- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/)
|
||||||
- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/)
|
- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/)
|
||||||
- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/)
|
- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/)
|
||||||
- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/)
|
- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/)
|
53
docs/basics/why-privacy-matters.md
Normal file
@ -0,0 +1,53 @@
|
|||||||
|
---
|
||||||
|
title: "Why Privacy Matters"
|
||||||
|
icon: 'material/shield-account'
|
||||||
|
---
|
||||||
|
In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands.
|
||||||
|
|
||||||
|
Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters.
|
||||||
|
|
||||||
|
## What is Privacy?
|
||||||
|
|
||||||
|
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
|
||||||
|
|
||||||
|
**Privacy**
|
||||||
|
|
||||||
|
: ==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient.
|
||||||
|
|
||||||
|
**Security**
|
||||||
|
|
||||||
|
: Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates.
|
||||||
|
|
||||||
|
: Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website.
|
||||||
|
|
||||||
|
**Anonymity**
|
||||||
|
|
||||||
|
: Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own.
|
||||||
|
|
||||||
|
: **Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
|
||||||
|
|
||||||
|
All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
|
||||||
|
|
||||||
|
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md){ .md-button }
|
||||||
|
|
||||||
|
## Privacy vs. Secrecy
|
||||||
|
|
||||||
|
A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong.
|
||||||
|
|
||||||
|
==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets.
|
||||||
|
|
||||||
|
## Is Privacy About Control?
|
||||||
|
|
||||||
|
A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work.
|
||||||
|
|
||||||
|
Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place.
|
||||||
|
|
||||||
|
==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to.
|
||||||
|
|
||||||
|
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
|
||||||
|
|
||||||
|
## Sources
|
||||||
|
|
||||||
|
- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards
|
||||||
|
- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/)
|
||||||
|
- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298)
|
@ -1,15 +1,17 @@
|
|||||||
---
|
---
|
||||||
title: "Calendar and Contact Sync"
|
title: "Calendar Sync"
|
||||||
icon: material/calendar-account
|
icon: material/calendar
|
||||||
|
description: Calendars contain some of your most sensitive data; use products that implement encryption at rest.
|
||||||
|
cover: calendar.png
|
||||||
---
|
---
|
||||||
Calendars and contacts contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them.
|
Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them.
|
||||||
|
|
||||||
## Tutanota
|
## Tutanota
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Tutanota** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tutanota.com/calendar-app-comparison/).
|
**Tutanota** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tutanota.com/calendar-app-comparison/).
|
||||||
|
|
||||||
@ -35,12 +37,10 @@ Calendars and contacts contain some of your most sensitive data; use products th
|
|||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Proton Calendar** is an encrypted calendar service available to Proton members via web or mobile clients. Features include: automatic E2EE of all data, sharing features, import/export functionality, and [more](https://proton.me/support/proton-calendar-guide). Those on the free tier get access to a single calendar, whereas paid subscribers can create up to 20 calendars. Extended sharing functionality is also limited to paid subscribers.
|
**Proton Calendar** is an encrypted calendar service available to Proton members via web or mobile clients. Features include: automatic E2EE of all data, sharing features, import/export functionality, and [more](https://proton.me/support/proton-calendar-guide). Those on the free tier get access to a single calendar, whereas paid subscribers can create up to 20 calendars. Extended sharing functionality is also limited to paid subscribers.
|
||||||
|
|
||||||
**Proton Mail** can be used to synchronize contacts. Likewise, the service is currently only available via the web and mobile clients.
|
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://proton.me/calendar){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://proton.me/calendar){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://proton.me/support/proton-calendar-guide){ .card-link title=Documentation}
|
[:octicons-info-16:](https://proton.me/support/proton-calendar-guide){ .card-link title=Documentation}
|
||||||
@ -51,5 +51,20 @@ Calendars and contacts contain some of your most sensitive data; use products th
|
|||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar)
|
||||||
- [:octicons-browser-16: Web](https://calendar.proton.me)
|
- [:octicons-browser-16: Web](https://calendar.proton.me)
|
||||||
|
|
||||||
!!! warning
|
## Criteria
|
||||||
Proton [does not](https://proton.me/support/proton-contacts#verify) use E2EE for your contact names and email addresses.
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
### Minimum Qualifications
|
||||||
|
|
||||||
|
- Must sync and store information with E2EE to ensure data is not visible to the service provider.
|
||||||
|
|
||||||
|
### Best-Case
|
||||||
|
|
||||||
|
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||||
|
|
||||||
|
- Should integrate with native OS calendar and contact management apps if applicable.
|
@ -1,76 +0,0 @@
|
|||||||
---
|
|
||||||
title: "Cloud Storage"
|
|
||||||
icon: material/file-cloud
|
|
||||||
---
|
|
||||||
Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by either putting you in control of your data or by implementing E2EE.
|
|
||||||
|
|
||||||
If these alternatives do not fit your needs, we suggest you look into [Encryption Software](encryption.md).
|
|
||||||
|
|
||||||
## Cryptee
|
|
||||||
|
|
||||||
!!! recommendation
|
|
||||||
|
|
||||||
{ align=right }
|
|
||||||
{ align=right }
|
|
||||||
|
|
||||||
**Cryptee** is a web-based E2EE data storage service. It primarily focuses on photo and video storage as well document editing. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform.
|
|
||||||
|
|
||||||
Cryptee offers 100MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information.
|
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary }
|
|
||||||
[:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" }
|
|
||||||
[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation}
|
|
||||||
[:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
|
|
||||||
|
|
||||||
??? downloads
|
|
||||||
|
|
||||||
- [:octicons-globe-16: PWA](https://crypt.ee/download)
|
|
||||||
|
|
||||||
## Nextcloud
|
|
||||||
|
|
||||||
!!! recommendation
|
|
||||||
|
|
||||||
{ align=right }
|
|
||||||
|
|
||||||
**Nextcloud** is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control. It also comes with experimental E2EE.
|
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary }
|
|
||||||
[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" }
|
|
||||||
[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation}
|
|
||||||
[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" }
|
|
||||||
[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute }
|
|
||||||
|
|
||||||
??? downloads
|
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client)
|
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102)
|
|
||||||
- [:simple-github: GitHub](https://github.com/nextcloud/android/releases)
|
|
||||||
- [:simple-windows11: Windows](https://nextcloud.com/install/#install-clients)
|
|
||||||
- [:simple-apple: macOS](https://nextcloud.com/install/#install-clients)
|
|
||||||
- [:simple-linux: Linux](https://nextcloud.com/install/#install-clients)
|
|
||||||
- [:simple-freebsd: FreeBSD](https://www.freshports.org/www/nextcloud)
|
|
||||||
- [:simple-openbsd: OpenBSD](https://openports.se/www/nextcloud)
|
|
||||||
- [:simple-netbsd: NetBSD](https://pkgsrc.se/www/php-nextcloud)
|
|
||||||
|
|
||||||
We recommend checking if your Nextcloud provider supports E2EE, otherwise you have to trust the provider to not look at your files.
|
|
||||||
|
|
||||||
When self-hosting, you should also enable E2EE to protect against your hosting provider snooping on your data.
|
|
||||||
|
|
||||||
## Proton Drive
|
|
||||||
|
|
||||||
!!! recommendation
|
|
||||||
|
|
||||||
{ align=right }
|
|
||||||
|
|
||||||
**Proton Drive** is an E2EE general file storage service by the popular encrypted email provider [Proton Mail](https://proton.me/mail).
|
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://proton.me/drive){ .md-button .md-button--primary }
|
|
||||||
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
|
||||||
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation}
|
|
||||||
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
|
|
||||||
|
|
||||||
??? downloads
|
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive)
|
|
||||||
|
|
||||||
Proton Drive is currently only available through a web client and an Android app.
|
|
100
docs/cloud.md
Normal file
@ -0,0 +1,100 @@
|
|||||||
|
---
|
||||||
|
meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
|
||||||
|
title: "Cloud Storage"
|
||||||
|
icon: material/file-cloud
|
||||||
|
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
|
||||||
|
cover: cloud.png
|
||||||
|
---
|
||||||
|
Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE.
|
||||||
|
|
||||||
|
If these alternatives do not fit your needs, we suggest you look into using encryption software like [Cryptomator](encryption.md#cryptomator-cloud) with another cloud provider. Using Cryptomator in conjunction with **any** cloud provider (including these) may be a good idea to reduce the risk of encryption flaws in a provider's native clients.
|
||||||
|
|
||||||
|
??? question "Looking for Nextcloud?"
|
||||||
|
|
||||||
|
Nextcloud is [still a recommended tool](productivity.md) for self-hosting a file management suite, however we do not recommend third-party Nextcloud storage providers at the moment, because we do [not recommend](https://discuss.privacyguides.net/t/dont-recommend-nextcloud-e2ee/10352/29) Nextcloud's built-in E2EE functionality for home users.
|
||||||
|
|
||||||
|
## Proton Drive
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Proton Drive** is a Swiss encrypted cloud storage provider from the popular encrypted email provider [Proton Mail](email.md#proton-mail).
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://proton.me/drive){ class="md-button md-button--primary" }
|
||||||
|
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
|
||||||
|
|
||||||
|
??? downloads
|
||||||
|
|
||||||
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive)
|
||||||
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851)
|
||||||
|
|
||||||
|
The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states:
|
||||||
|
|
||||||
|
> Auditors identified two low-severity vulnerabilities. Additionally, five general recommendations were reported. At the same time, we confirm that no important security issues were identified during the pentest.
|
||||||
|
|
||||||
|
Proton Drive's brand new mobile clients have not yet been publicly audited by a third-party.
|
||||||
|
|
||||||
|
## Tresorit
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" }
|
||||||
|
[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation}
|
||||||
|
|
||||||
|
??? downloads
|
||||||
|
|
||||||
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile)
|
||||||
|
- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232)
|
||||||
|
- [:simple-windows11: Windows](https://tresorit.com/download)
|
||||||
|
- [:simple-apple: macOS](https://tresorit.com/download)
|
||||||
|
- [:simple-linux: Linux](https://tresorit.com/download)
|
||||||
|
|
||||||
|
Tresorit has received a number of independent security audits:
|
||||||
|
|
||||||
|
- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft
|
||||||
|
- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest
|
||||||
|
- This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure.
|
||||||
|
- Computest discovered two vulnerabilities which have been resolved.
|
||||||
|
- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young.
|
||||||
|
- This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf).
|
||||||
|
- Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims."
|
||||||
|
|
||||||
|
[^1]: [ISO/IEC 27001](https://en.wikipedia.org/wiki/ISO/IEC_27001):2013 compliance relates to the company's [information security management system](https://en.wikipedia.org/wiki/Information_security_management) and covers the sales, development, maintenance and support of their cloud services.
|
||||||
|
|
||||||
|
They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability.
|
||||||
|
|
||||||
|
## Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
### Minimum Requirements
|
||||||
|
|
||||||
|
- Must enforce end-to-end encryption.
|
||||||
|
- Must offer a free plan or trial period for testing.
|
||||||
|
- Must support TOTP or FIDO2 multi-factor authentication, or Passkey logins.
|
||||||
|
- Must offer a web interface which supports basic file management functionality.
|
||||||
|
- Must allow for easy exports of all files/documents.
|
||||||
|
- Must use standard, audited encryption.
|
||||||
|
|
||||||
|
### Best-Case
|
||||||
|
|
||||||
|
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||||
|
|
||||||
|
- Clients should be open-source.
|
||||||
|
- Clients should be audited in their entirety by an independent third-party.
|
||||||
|
- Should offer native clients for Linux, Android, Windows, macOS, and iOS.
|
||||||
|
- These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android.
|
||||||
|
- Should support easy file-sharing with other users.
|
||||||
|
- Should offer at least basic file preview and editing functionality on the web interface.
|
55
docs/cryptocurrency.md
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
---
|
||||||
|
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
|
||||||
|
title: Cryptocurrency
|
||||||
|
icon: material/bank-circle
|
||||||
|
cover: cryptocurrency.png
|
||||||
|
---
|
||||||
|
|
||||||
|
Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:
|
||||||
|
|
||||||
|
[Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md){ .md-button }
|
||||||
|
|
||||||
|
!!! danger
|
||||||
|
|
||||||
|
Many if not most cryptocurrency projects are scams. Make transactions carefully with only projects you trust.
|
||||||
|
|
||||||
|
## Monero
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary }
|
||||||
|
[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" }
|
||||||
|
[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute }
|
||||||
|
|
||||||
|
With Monero, outside observers cannot decipher addresses trading Monero, transaction amounts, address balances, or transaction histories.
|
||||||
|
|
||||||
|
For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include:
|
||||||
|
|
||||||
|
- [Official Monero client](https://getmonero.org/downloads) (Desktop)
|
||||||
|
- [Cake Wallet](https://cakewallet.com/) (iOS, Android)
|
||||||
|
- Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/).
|
||||||
|
- [Feather Wallet](https://featherwallet.org/) (Desktop)
|
||||||
|
- [Monerujo](https://www.monerujo.io/) (Android)
|
||||||
|
|
||||||
|
For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p.
|
||||||
|
|
||||||
|
In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022.
|
||||||
|
|
||||||
|
Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations.
|
||||||
|
|
||||||
|
Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy.
|
||||||
|
|
||||||
|
## Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
- Cryptocurrency must provide private/untraceable transactions by default.
|
@ -1,29 +1,14 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
|
||||||
title: "Data and Metadata Redaction"
|
title: "Data and Metadata Redaction"
|
||||||
icon: material/tag-remove
|
icon: material/tag-remove
|
||||||
|
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
|
||||||
|
cover: data-redaction.png
|
||||||
---
|
---
|
||||||
When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata.
|
When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata.
|
||||||
|
|
||||||
## Desktop
|
## Desktop
|
||||||
|
|
||||||
### ExifCleaner
|
|
||||||
|
|
||||||
!!! recommendation
|
|
||||||
|
|
||||||
{ align=right }
|
|
||||||
|
|
||||||
**ExifCleaner** is a freeware, open-source graphical app that uses [ExifTool](https://exiftool.org) to remove Exif metadata from images, videos, and PDF documents using a simple drag and drop interface. It supports multi-core batch processing and dark mode.
|
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://exifcleaner.com){ .md-button .md-button--primary }
|
|
||||||
[:octicons-info-16:](https://github.com/szTheory/exifcleaner#readme){ .card-link title=Documentation}
|
|
||||||
[:octicons-code-16:](https://github.com/szTheory/exifcleaner){ .card-link title="Source Code" }
|
|
||||||
|
|
||||||
??? downloads
|
|
||||||
|
|
||||||
- [:simple-windows11: Windows](https://github.com/szTheory/exifcleaner/releases)
|
|
||||||
- [:simple-apple: macOS](https://github.com/szTheory/exifcleaner/releases)
|
|
||||||
- [:simple-linux: Linux](https://github.com/szTheory/exifcleaner/releases)
|
|
||||||
|
|
||||||
### MAT2
|
### MAT2
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
@ -64,6 +49,7 @@ When sharing files, be sure to remove associated metadata. Image files commonly
|
|||||||
??? downloads
|
??? downloads
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.none.tom.exiferaser)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.none.tom.exiferaser)
|
||||||
|
- [:octicons-moon-16: Accrescent](https://accrescent.app/app/com.none.tom.exiferaser)
|
||||||
- [:simple-github: GitHub](https://github.com/Tommy-Geenexus/exif-eraser/releases)
|
- [:simple-github: GitHub](https://github.com/Tommy-Geenexus/exif-eraser/releases)
|
||||||
|
|
||||||
The metadata that is erased depends on the image's file type:
|
The metadata that is erased depends on the image's file type:
|
||||||
@ -147,3 +133,14 @@ The app offers multiple ways to erase metadata from images. Namely:
|
|||||||
```bash
|
```bash
|
||||||
exiftool -all= *.file_extension
|
exiftool -all= *.file_extension
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
- Apps developed for open-source operating systems must be open-source.
|
||||||
|
- Apps must be free and should not include ads or other limitations.
|
@ -1,211 +0,0 @@
|
|||||||
---
|
|
||||||
title: "Desktop Browsers"
|
|
||||||
icon: material/laptop
|
|
||||||
---
|
|
||||||
These are our currently recommended desktop web browsers and configurations for standard/non-anonymous browsing. If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. In general, we recommend keeping your browser extensions to a minimum; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation.
|
|
||||||
|
|
||||||
### Firefox
|
|
||||||
|
|
||||||
!!! recommendation
|
|
||||||
|
|
||||||
{ align=right }
|
|
||||||
|
|
||||||
**Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks).
|
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary }
|
|
||||||
[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" }
|
|
||||||
[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation}
|
|
||||||
[:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" }
|
|
||||||
[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute }
|
|
||||||
|
|
||||||
??? downloads
|
|
||||||
|
|
||||||
- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows)
|
|
||||||
- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac)
|
|
||||||
- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux)
|
|
||||||
- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
|
|
||||||
|
|
||||||
!!! warning
|
|
||||||
Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/).
|
|
||||||
|
|
||||||
#### Recommended Configuration
|
|
||||||
|
|
||||||
Tor Browser is the only way to truly browse the internet anonymously. When you use Firefox, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another.
|
|
||||||
|
|
||||||
These options can be found in :material-menu: → **Settings** → **Privacy & Security**.
|
|
||||||
|
|
||||||
##### Enhanced Tracking Protection
|
|
||||||
|
|
||||||
- [x] Select **Strict** Enhanced Tracking Protection
|
|
||||||
|
|
||||||
This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
|
|
||||||
|
|
||||||
##### Sanitize on Close
|
|
||||||
|
|
||||||
If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...**
|
|
||||||
|
|
||||||
- [x] Check **Delete cookies and site data when Firefox is closed**
|
|
||||||
|
|
||||||
This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
|
|
||||||
|
|
||||||
##### Search Suggestions
|
|
||||||
|
|
||||||
- [ ] Disable **Suggestions from the web**
|
|
||||||
- [ ] Disable **Suggestions from sponsors**
|
|
||||||
- [ ] Disable **Improve the Firefox Suggest experience**
|
|
||||||
|
|
||||||
Search suggestion features may not be available in your region.
|
|
||||||
|
|
||||||
Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
|
|
||||||
|
|
||||||
##### Telemetry
|
|
||||||
|
|
||||||
- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla**
|
|
||||||
- [ ] Uncheck **Allow Firefox to install and run studies**
|
|
||||||
- [ ] Uncheck **Allow Firefox to send backlogged crash reports on your behalf**
|
|
||||||
|
|
||||||
> Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs.
|
|
||||||
|
|
||||||
##### HTTPS-Only Mode
|
|
||||||
|
|
||||||
- [x] Select **Enable HTTPS-Only Mode in all windows**
|
|
||||||
|
|
||||||
This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing.
|
|
||||||
|
|
||||||
#### Firefox Sync
|
|
||||||
|
|
||||||
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE.
|
|
||||||
|
|
||||||
#### Arkenfox (advanced)
|
|
||||||
|
|
||||||
The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support.
|
|
||||||
|
|
||||||
### Brave
|
|
||||||
|
|
||||||
!!! recommendation
|
|
||||||
|
|
||||||
{ align=right }
|
|
||||||
|
|
||||||
**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default.
|
|
||||||
|
|
||||||
Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues.
|
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary }
|
|
||||||
[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" }
|
|
||||||
[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" }
|
|
||||||
[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation}
|
|
||||||
[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
|
|
||||||
|
|
||||||
??? downloads annotate
|
|
||||||
|
|
||||||
- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases)
|
|
||||||
- [:simple-windows11: Windows](https://brave.com/download/)
|
|
||||||
- [:simple-apple: macOS](https://brave.com/download/)
|
|
||||||
- [:simple-linux: Linux](https://brave.com/linux/) (1)
|
|
||||||
|
|
||||||
1. We advise against using the Flatpak version of Brave, as it replaces Chromium's sandbox with Flatpak's, which is less effective. Additionally, the package is not maintained by Brave Software, Inc.
|
|
||||||
|
|
||||||
#### Recommended Configuration
|
|
||||||
|
|
||||||
Tor Browser is the only way to truly browse the internet anonymously. When you use Brave, we recommend changing the following settings to protect your privacy from certain parties, but all browsers other than the [Tor Browser](tor.md#tor-browser) will be traceable by *somebody* in some regard or another.
|
|
||||||
|
|
||||||
These options can be found in :material-menu: → **Settings**.
|
|
||||||
|
|
||||||
##### Shields
|
|
||||||
|
|
||||||
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
|
||||||
|
|
||||||
Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following:
|
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
|
||||||
|
|
||||||
- [x] Select **Prevent sites from fingerprinting me based on my language preferences**
|
|
||||||
- [x] Select **Aggressive** under Trackers & ads blocking
|
|
||||||
|
|
||||||
??? warning "Use default filter lists"
|
|
||||||
Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use.
|
|
||||||
|
|
||||||
- [x] (Optional) Select **Block Scripts** (1)
|
|
||||||
- [x] Select **Strict, may break sites** under Block fingerprinting
|
|
||||||
|
|
||||||
</div>
|
|
||||||
|
|
||||||
1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension.
|
|
||||||
|
|
||||||
##### Social media blocking
|
|
||||||
|
|
||||||
- [ ] Uncheck all social media components
|
|
||||||
|
|
||||||
##### Privacy and Security
|
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
|
||||||
|
|
||||||
- [x] Select **Disable Non-Proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc)
|
|
||||||
- [ ] Uncheck **Use Google services for push messaging**
|
|
||||||
- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)**
|
|
||||||
- [ ] Uncheck **Automatically send daily usage ping to Brave**
|
|
||||||
- [x] Select **Always use secure connections** in the **Security** menu
|
|
||||||
- [ ] Uncheck **Private window with Tor** (1)
|
|
||||||
|
|
||||||
!!! important "Sanitizing on Close"
|
|
||||||
- [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu
|
|
||||||
|
|
||||||
If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section.
|
|
||||||
|
|
||||||
</div>
|
|
||||||
|
|
||||||
1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser).
|
|
||||||
|
|
||||||
##### Extensions
|
|
||||||
|
|
||||||
Disable built-in extensions you do not use in **Extensions**
|
|
||||||
|
|
||||||
- [ ] Uncheck **Hangouts**
|
|
||||||
- [ ] Uncheck **WebTorrent**
|
|
||||||
|
|
||||||
##### IPFS
|
|
||||||
|
|
||||||
InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it.
|
|
||||||
|
|
||||||
- [x] Select **Disabled** on Method to resolve IPFS resources
|
|
||||||
|
|
||||||
##### Additional settings
|
|
||||||
|
|
||||||
Under the *System* menu
|
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
|
||||||
|
|
||||||
- [ ] Uncheck **Continue running apps when Brave is closed** to disable background apps (1)
|
|
||||||
|
|
||||||
</div>
|
|
||||||
|
|
||||||
1. This option is not present on all platforms.
|
|
||||||
|
|
||||||
#### Brave Sync
|
|
||||||
|
|
||||||
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
|
||||||
|
|
||||||
## Additional Resources
|
|
||||||
|
|
||||||
We generally do not recommend installing any extensions as they increase your attack surface. However, uBlock Origin may prove useful if you value content blocking functionality.
|
|
||||||
|
|
||||||
### uBlock Origin
|
|
||||||
|
|
||||||
!!! recommendation
|
|
||||||
|
|
||||||
{ align=right }
|
|
||||||
|
|
||||||
**uBlock Origin** is a popular content blocker that could help you block ads, trackers, and fingerprinting scripts.
|
|
||||||
|
|
||||||
[:octicons-repo-16: Repository](https://github.com/gorhill/uBlock#readme){ .md-button .md-button--primary }
|
|
||||||
[:octicons-eye-16:](https://github.com/gorhill/uBlock/wiki/Privacy-policy){ .card-link title="Privacy Policy" }
|
|
||||||
[:octicons-info-16:](https://github.com/gorhill/uBlock/wiki){ .card-link title=Documentation}
|
|
||||||
[:octicons-code-16:](https://github.com/gorhill/uBlock){ .card-link title="Source Code" }
|
|
||||||
|
|
||||||
??? downloads
|
|
||||||
|
|
||||||
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/)
|
|
||||||
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm)
|
|
||||||
- [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak)
|
|
||||||
|
|
||||||
We suggest following the [developer's documentation](https://github.com/gorhill/uBlock/wiki/Blocking-mode) and picking one of the "modes". Additional filter lists can impact performance and may increase attack surface, so only apply what you need. If there is a [vulnerability in uBlock Origin](https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css) a third-party filter could add malicious rules that can potentially steal user data.
|
|
377
docs/desktop-browsers.md
Normal file
@ -0,0 +1,377 @@
|
|||||||
|
---
|
||||||
|
meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
|
||||||
|
title: "Desktop Browsers"
|
||||||
|
icon: material/laptop
|
||||||
|
description: These web browsers provide stronger privacy protections than Google Chrome.
|
||||||
|
cover: desktop-browsers.png
|
||||||
|
schema:
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": WebPage
|
||||||
|
name: Private Desktop Browser Recommendations
|
||||||
|
url: "./"
|
||||||
|
relatedLink: "../mobile-browsers/"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": SoftwareApplication
|
||||||
|
name: Mullvad Browser
|
||||||
|
image: /assets/img/browsers/mullvad_browser.svg
|
||||||
|
url: https://mullvad.net/en/browser
|
||||||
|
applicationCategory: Web Browser
|
||||||
|
operatingSystem:
|
||||||
|
- Windows
|
||||||
|
- macOS
|
||||||
|
- Linux
|
||||||
|
subjectOf:
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": SoftwareApplication
|
||||||
|
name: Firefox
|
||||||
|
image: /assets/img/browsers/firefox.svg
|
||||||
|
url: https://firefox.com
|
||||||
|
sameAs: https://en.wikipedia.org/wiki/Firefox
|
||||||
|
applicationCategory: Web Browser
|
||||||
|
operatingSystem:
|
||||||
|
- Windows
|
||||||
|
- macOS
|
||||||
|
- Linux
|
||||||
|
subjectOf:
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": SoftwareApplication
|
||||||
|
name: Brave
|
||||||
|
image: /assets/img/browsers/brave.svg
|
||||||
|
url: https://brave.com
|
||||||
|
sameAs: https://en.wikipedia.org/wiki/Brave_(web_browser)
|
||||||
|
applicationCategory: Web Browser
|
||||||
|
operatingSystem:
|
||||||
|
- Windows
|
||||||
|
- macOS
|
||||||
|
- Linux
|
||||||
|
subjectOf:
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
|
---
|
||||||
|
These are our currently recommended desktop web browsers and configurations for standard/non-anonymous browsing. We recommend [Mullvad Browser](#mullvad-browser) if you are focused on strong privacy protections and anti-fingerprinting out of the box, [Firefox](#firefox) for casual internet browsers looking for a good alternative to Google Chrome, and [Brave](#brave) if you need Chromium browser compatibility.
|
||||||
|
|
||||||
|
If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. We make some configuration recommendations on this page, but all browsers other than Tor Browser will be traceable by *somebody* in some manner or another.
|
||||||
|
|
||||||
|
## Mullvad Browser
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
|
||||||
|
|
||||||
|
??? downloads
|
||||||
|
|
||||||
|
- [:simple-windows11: Windows](https://mullvad.net/en/download/browser/windows)
|
||||||
|
- [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos)
|
||||||
|
- [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux)
|
||||||
|
|
||||||
|
Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead.
|
||||||
|
|
||||||
|
### Anti-Fingerprinting
|
||||||
|
|
||||||
|
**Without** using a [VPN](vpn.md), Mullvad Browser provides the same protections against [naive fingerprinting scripts](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) as other private browsers like Firefox+[Arkenfox](#arkenfox-advanced) or [Brave](#brave). Mullvad Browser provides these protections out of the box, at the expense of some flexibility and convenience that other private browsers can provide.
|
||||||
|
|
||||||
|
==For the strongest anti-fingerprinting protection, we recommend using Mullvad Browser in conjunction **with** a VPN==, whether that is Mullvad or another recommended VPN provider. When using a VPN with Mullvad Browser, you will share a fingerprint and a pool of IP addresses with many other users, giving you a "crowd" to blend in with. This strategy is the only way to thwart advanced tracking scripts, and is the same anti-fingerprinting technique used by Tor Browser.
|
||||||
|
|
||||||
|
Note that while you can use Mullvad Browser with any VPN provider, other people on that VPN must also be using Mullvad Browser for this "crowd" to exist, something which is more likely on Mullvad VPN compared to other providers, particularly this close to the launch of Mullvad Browser. Mullvad Browser does not have built-in VPN connectivity, nor does it check whether you are using a VPN before browsing; your VPN connection has to be configured and managed separately.
|
||||||
|
|
||||||
|
Mullvad Browser comes with the *uBlock Origin* and *NoScript* browser extensions pre-installed. While we typically [don't recommend](#extensions) adding *additional* browser extensions, these extensions that come pre-installed with the browser should **not** be removed or configured outside their default values, because doing so would noticeably make your browser fingerprint distinct from other Mullvad Browser users. It also comes pre-installed with the Mullvad Browser Extension, which *can* be safely removed without impacting your browser fingerprint if you would like, but is also safe to keep even if you don't use Mullvad VPN.
|
||||||
|
|
||||||
|
### Private Browsing Mode
|
||||||
|
|
||||||
|
Mullvad Browser operates in permanent private browsing mode, meaning your history, cookies, and other site data will always be cleared every time the browser is closed. Your bookmarks, browser settings, and extension settings will still be preserved.
|
||||||
|
|
||||||
|
This is required to prevent advanced forms of tracking, but does come at the cost of convenience and some Firefox features, such as Multi-Account Containers. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise don't work properly in Mullvad Browser, and Mullvad Browser for general browsing.
|
||||||
|
|
||||||
|
### Mullvad Leta
|
||||||
|
|
||||||
|
Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-engines.md), but it also comes preinstalled with **Mullvad Leta**, a search engine which requires an active Mullvad VPN subscription to access. Mullvad Leta queries Google's paid search API directly (which is why it is limited to paying subscribers), however because of this limitation it is possible for Mullvad to correlate search queries and Mullvad VPN accounts. For this reason we discourage the use of Mullvad Leta, even though Mullvad collects very little information about their VPN subscribers.
|
||||||
|
|
||||||
|
## Firefox
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks).
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" }
|
||||||
|
[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute }
|
||||||
|
|
||||||
|
??? downloads
|
||||||
|
|
||||||
|
- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows)
|
||||||
|
- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac)
|
||||||
|
- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux)
|
||||||
|
- [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
|
||||||
|
|
||||||
|
!!! warning
|
||||||
|
Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/).
|
||||||
|
|
||||||
|
### Recommended Configuration
|
||||||
|
|
||||||
|
These options can be found in :material-menu: → **Settings**
|
||||||
|
|
||||||
|
#### Search
|
||||||
|
|
||||||
|
- [ ] Uncheck **Provide search suggestions**
|
||||||
|
|
||||||
|
Search suggestion features may not be available in your region.
|
||||||
|
|
||||||
|
Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
|
||||||
|
|
||||||
|
#### Privacy & Security
|
||||||
|
|
||||||
|
##### Enhanced Tracking Protection
|
||||||
|
|
||||||
|
- [x] Select **Strict** Enhanced Tracking Protection
|
||||||
|
|
||||||
|
This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
|
||||||
|
|
||||||
|
##### Firefox Suggest (US only)
|
||||||
|
|
||||||
|
[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes.
|
||||||
|
|
||||||
|
- [ ] Uncheck **Suggestions from the web**
|
||||||
|
- [ ] Uncheck **Suggestions from sponsors**
|
||||||
|
|
||||||
|
##### Sanitize on Close
|
||||||
|
|
||||||
|
If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data** → **Manage Exceptions...**
|
||||||
|
|
||||||
|
- [x] Check **Delete cookies and site data when Firefox is closed**
|
||||||
|
|
||||||
|
This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
|
||||||
|
|
||||||
|
##### Telemetry
|
||||||
|
|
||||||
|
- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla**
|
||||||
|
- [ ] Uncheck **Allow Firefox to install and run studies**
|
||||||
|
- [ ] Uncheck **Allow Firefox to send backlogged crash reports on your behalf**
|
||||||
|
|
||||||
|
> Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs.
|
||||||
|
|
||||||
|
Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out:
|
||||||
|
|
||||||
|
1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection)
|
||||||
|
2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts**
|
||||||
|
|
||||||
|
##### HTTPS-Only Mode
|
||||||
|
|
||||||
|
- [x] Select **Enable HTTPS-Only Mode in all windows**
|
||||||
|
|
||||||
|
This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing.
|
||||||
|
|
||||||
|
#### Sync
|
||||||
|
|
||||||
|
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE.
|
||||||
|
|
||||||
|
### Arkenfox (advanced)
|
||||||
|
|
||||||
|
!!! tip "Use Mullvad Browser for advanced anti-fingerprinting"
|
||||||
|
|
||||||
|
[Mullvad Browser](#mullvad-browser) provides the same anti-fingerprinting protections as Arkenfox out of the box, and does not require the use of Mullvad's VPN to benefit from these protections. Coupled with a VPN, Mullvad Browser can thwart more advanced tracking scripts which Arkenfox cannot. Arkenfox still has the advantage of being much more flexible, and allowing per-site exceptions for websites which you need to stay logged in to.
|
||||||
|
|
||||||
|
The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support.
|
||||||
|
|
||||||
|
Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing.
|
||||||
|
|
||||||
|
## Brave
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default.
|
||||||
|
|
||||||
|
Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary }
|
||||||
|
[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" }
|
||||||
|
[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
|
||||||
|
|
||||||
|
??? downloads annotate
|
||||||
|
|
||||||
|
- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases)
|
||||||
|
- [:simple-windows11: Windows](https://brave.com/download/)
|
||||||
|
- [:simple-apple: macOS](https://brave.com/download/)
|
||||||
|
- [:simple-linux: Linux](https://brave.com/linux/) (1)
|
||||||
|
|
||||||
|
1. We advise against using the Flatpak version of Brave, as it replaces Chromium's sandbox with Flatpak's, which is less effective. Additionally, the package is not maintained by Brave Software, Inc.
|
||||||
|
|
||||||
|
### Recommended Configuration
|
||||||
|
|
||||||
|
These options can be found in :material-menu: → **Settings**.
|
||||||
|
|
||||||
|
#### Settings
|
||||||
|
|
||||||
|
##### Shields
|
||||||
|
|
||||||
|
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
||||||
|
|
||||||
|
Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following:
|
||||||
|
|
||||||
|
<div class="annotate" markdown>
|
||||||
|
|
||||||
|
- [x] Select **Prevent sites from fingerprinting me based on my language preferences**
|
||||||
|
- [x] Select **Aggressive** under Trackers & ads blocking
|
||||||
|
|
||||||
|
??? warning "Use default filter lists"
|
||||||
|
Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use.
|
||||||
|
|
||||||
|
- [x] (Optional) Select **Block Scripts** (1)
|
||||||
|
- [x] Select **Strict, may break sites** under Block fingerprinting
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension.
|
||||||
|
|
||||||
|
##### Social media blocking
|
||||||
|
|
||||||
|
- [ ] Uncheck all social media components
|
||||||
|
|
||||||
|
##### Privacy and security
|
||||||
|
|
||||||
|
<div class="annotate" markdown>
|
||||||
|
|
||||||
|
- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc)
|
||||||
|
- [ ] Uncheck **Use Google services for push messaging**
|
||||||
|
- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)**
|
||||||
|
- [ ] Uncheck **Automatically send daily usage ping to Brave**
|
||||||
|
- [ ] Uncheck **Automatically send diagnostic reports**
|
||||||
|
- [x] Select **Always use secure connections** in the **Security** menu
|
||||||
|
- [ ] Uncheck **Private window with Tor** (1)
|
||||||
|
|
||||||
|
!!! tip "Sanitizing on Close"
|
||||||
|
|
||||||
|
- [x] Select **Clear cookies and site data when you close all windows** in the *Cookies and other site data* menu
|
||||||
|
|
||||||
|
If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section.
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser).
|
||||||
|
|
||||||
|
##### Extensions
|
||||||
|
|
||||||
|
Disable built-in extensions you do not use in **Extensions**
|
||||||
|
|
||||||
|
- [ ] Uncheck **Hangouts**
|
||||||
|
- [ ] Uncheck **WebTorrent**
|
||||||
|
|
||||||
|
##### Web3
|
||||||
|
|
||||||
|
Brave's Web3 features can potentially add to your browser fingerprint and attack surface. Unless you use any of features, they should be disabled.
|
||||||
|
|
||||||
|
Set **Default Ethereum wallet** to **Extensions (no fallback)**
|
||||||
|
Set **Default Solana wallet** to **Extensions (no fallback)**
|
||||||
|
Set **Method to resolve IPFS resources** to **Disabled**
|
||||||
|
|
||||||
|
##### System
|
||||||
|
|
||||||
|
<div class="annotate" markdown>
|
||||||
|
|
||||||
|
- [ ] Uncheck **Continue running apps when Brave is closed** to disable background apps (1)
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
1. This option is not present on all platforms.
|
||||||
|
|
||||||
|
#### Sync
|
||||||
|
|
||||||
|
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
|
||||||
|
|
||||||
|
#### Brave Rewards and Wallet
|
||||||
|
|
||||||
|
**Brave Rewards** lets you recieve Basic Attention Token (BAT) cryptocurrency for performing certain actions within Brave. It relies on a custodial account and KYC from a select number of providers. We do not recommend BAT as a [private cryptocurrency](cryptocurrency.md), nor do we recommend using a [custodial wallet](advanced/payments.md#other-coins-bitcoin-ethereum-etc), so we would discourage using this feature.
|
||||||
|
|
||||||
|
**Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well.
|
||||||
|
|
||||||
|
## Additional Resources
|
||||||
|
|
||||||
|
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality.
|
||||||
|
|
||||||
|
### uBlock Origin
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**uBlock Origin** is a popular content blocker that could help you block ads, trackers, and fingerprinting scripts.
|
||||||
|
|
||||||
|
[:octicons-repo-16: Repository](https://github.com/gorhill/uBlock#readme){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://github.com/gorhill/uBlock/wiki/Privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://github.com/gorhill/uBlock/wiki){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://github.com/gorhill/uBlock){ .card-link title="Source Code" }
|
||||||
|
|
||||||
|
??? downloads
|
||||||
|
|
||||||
|
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/)
|
||||||
|
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm)
|
||||||
|
- [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak)
|
||||||
|
|
||||||
|
We suggest following the [developer's documentation](https://github.com/gorhill/uBlock/wiki/Blocking-mode) and picking one of the "modes". Additional filter lists can impact performance and [may increase attack surface](https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css).
|
||||||
|
|
||||||
|
##### Other lists
|
||||||
|
|
||||||
|
These are some other [filter lists](https://github.com/gorhill/uBlock/wiki/Dashboard:-Filter-lists) that you may want to consider adding:
|
||||||
|
|
||||||
|
- [x] Check **Privacy** > **AdGuard URL Tracking Protection**
|
||||||
|
- Add [Actually Legitimate URL Shortener Tool](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt)
|
||||||
|
|
||||||
|
## Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
### Minimum Requirements
|
||||||
|
|
||||||
|
- Must be open-source software.
|
||||||
|
- Supports automatic updates.
|
||||||
|
- Receives engine updates in 0-1 days from upstream release.
|
||||||
|
- Available on Linux, macOS, and Windows.
|
||||||
|
- Any changes required to make the browser more privacy-respecting should not negatively impact user experience.
|
||||||
|
- Blocks third-party cookies by default.
|
||||||
|
- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^1]
|
||||||
|
|
||||||
|
[^1]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/).
|
||||||
|
|
||||||
|
### Best-Case
|
||||||
|
|
||||||
|
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||||
|
|
||||||
|
- Includes built-in content blocking functionality.
|
||||||
|
- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)).
|
||||||
|
- Supports Progressive Web Apps.
|
||||||
|
PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates.
|
||||||
|
- Does not include add-on functionality (bloatware) that does not impact user privacy.
|
||||||
|
- Does not collect telemetry by default.
|
||||||
|
- Provides open-source sync server implementation.
|
||||||
|
- Defaults to a [private search engine](search-engines.md).
|
||||||
|
|
||||||
|
### Extension Criteria
|
||||||
|
|
||||||
|
- Must not replicate built-in browser or OS functionality.
|
||||||
|
- Must directly impact user privacy, i.e. must not simply provide information.
|
@ -1,6 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: "Desktop/PC"
|
title: "Desktop/PC"
|
||||||
icon: simple/linux
|
icon: simple/linux
|
||||||
|
description: Linux distributions are commonly recommended for privacy protection and software freedom.
|
||||||
|
cover: desktop.png
|
||||||
---
|
---
|
||||||
Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions.
|
Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions.
|
||||||
|
|
||||||
@ -14,7 +16,7 @@ Linux distributions are commonly recommended for privacy protection and software
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org), and soon, [FS-Verity](https://fedoraproject.org/wiki/Changes/FsVerityRPM). These new technologies often come with improvements in security, privacy, and usability in general.
|
**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://getfedora.org/){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://getfedora.org/){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation}
|
[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation}
|
||||||
@ -139,7 +141,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written
|
|||||||
|
|
||||||
Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device.
|
Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device.
|
||||||
|
|
||||||
By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/first_steps/persistence/index.en.html) can be configured to store some data between reboots.
|
By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots.
|
||||||
|
|
||||||
## Security-focused Distributions
|
## Security-focused Distributions
|
||||||
|
|
||||||
@ -162,3 +164,20 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte
|
|||||||
Qubes OS is a Xen-based operating system meant to provide strong security for desktop computing through secure virtual machines (VMs), also known as *Qubes*.
|
Qubes OS is a Xen-based operating system meant to provide strong security for desktop computing through secure virtual machines (VMs), also known as *Qubes*.
|
||||||
|
|
||||||
The Qubes OS operating system secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate VMs. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the system. For further details see the Qubes [FAQ](https://www.qubes-os.org/faq/).
|
The Qubes OS operating system secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate VMs. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the system. For further details see the Qubes [FAQ](https://www.qubes-os.org/faq/).
|
||||||
|
|
||||||
|
## Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
Our recommended operating systems:
|
||||||
|
|
||||||
|
- Must be open-source.
|
||||||
|
- Must receive regular software and Linux kernel updates.
|
||||||
|
- Linux distributions must support [Wayland](os/linux-overview.md#Wayland).
|
||||||
|
- Must support full-disk encryption during installation.
|
||||||
|
- Must not freeze regular releases for more than 1 year. We [do not recommend](os/linux-overview.md#release-cycle) "Long Term Support" or "stable" distro releases for desktop usage.
|
||||||
|
- Must support a wide variety of hardware.
|
@ -1,24 +1,24 @@
|
|||||||
---
|
---
|
||||||
title: "DNS Resolvers"
|
title: "DNS Resolvers"
|
||||||
icon: material/dns
|
icon: material/dns
|
||||||
|
description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration.
|
||||||
|
cover: dns.png
|
||||||
---
|
---
|
||||||
|
|
||||||
!!! faq "Should I use encrypted DNS?"
|
Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity.
|
||||||
|
|
||||||
Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity.
|
[Learn more about DNS :material-arrow-right-drop-circle:](advanced/dns-overview.md){ .md-button }
|
||||||
|
|
||||||
[Learn more about DNS](advanced/dns-overview.md){ .md-button }
|
|
||||||
|
|
||||||
## Recommended Providers
|
## Recommended Providers
|
||||||
|
|
||||||
| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering |
|
| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering |
|
||||||
| ------------ | -------------- | --------- | ------- | --- | --------- |
|
| ------------ | -------------- | --------- | ------- | --- | --------- |
|
||||||
| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext <br> DoH <br> DoT <br> DNSCrypt | Some[^1] | No | Based on server choice. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS)
|
| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext <br> DoH/3 <br> DoT <br> DNSCrypt | Some[^1] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS)
|
||||||
| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext <br> DoH <br> DoT | Some[^2] | No | Based on server choice.|
|
| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext <br> DoH/3 <br> DoT | Some[^2] | No | Based on personal configuration.|
|
||||||
| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext <br> DoH <br> DoT <br> DNSCrypt <br> DoQ <br> DoH3 | Optional[^3] | No | Based on server choice. |
|
| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext <br> DoH/3 <br> DoT <br> DoQ| Optional[^3] | No | Based on personal configuration. |
|
||||||
| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH <br> DoT | No[^4] | No | Based on server choice. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock)
|
| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH <br> DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock)
|
||||||
| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext <br> DoH <br> DoT <br> DNSCrypt | Optional[^5] | Optional | Based on server choice. |
|
| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext <br> DoH/3 <br> DoT <br> DoQ | Optional[^5] | Optional | Based on personal configuration. |
|
||||||
| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext <br> DoH <br> DoT <br> DNSCrypt | Some[^6] | Optional | Based on server choice, Malware blocking by default. |
|
| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext <br> DoH <br> DoT <br> DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. |
|
||||||
|
|
||||||
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html)
|
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html)
|
||||||
[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/)
|
[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/)
|
||||||
@ -27,18 +27,24 @@ icon: material/dns
|
|||||||
[^5]: NextDNS can provide insights and logging features on an opt-in basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy)
|
[^5]: NextDNS can provide insights and logging features on an opt-in basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy)
|
||||||
[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/)
|
[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/)
|
||||||
|
|
||||||
The criteria for the servers listed above are:
|
### Criteria
|
||||||
|
|
||||||
- Must support [DNSSEC](advanced/dns-overview.md#what-is-dnssec)
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
- Must have [anycast](https://en.wikipedia.org/wiki/Anycast#Addressing_methods) support
|
|
||||||
- [QNAME Minimization](advanced/dns-overview.md#what-is-qname-minimization)
|
!!! example "This section is new"
|
||||||
- Allow for [ECS](advanced/dns-overview.md#what-is-edns-client-subnet-ecs) to be disabled
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
- Must support [DNSSEC](advanced/dns-overview.md#what-is-dnssec).
|
||||||
|
- [QNAME Minimization](advanced/dns-overview.md#what-is-qname-minimization).
|
||||||
|
- Allow for [ECS](advanced/dns-overview.md#what-is-edns-client-subnet-ecs) to be disabled.
|
||||||
|
- Prefer [anycast](https://en.wikipedia.org/wiki/Anycast#Addressing_methods) support or geo-steering support.
|
||||||
|
|
||||||
## Native Operating System Support
|
## Native Operating System Support
|
||||||
|
|
||||||
### Android
|
### Android
|
||||||
|
|
||||||
Android 9 and above support DNS over TLS. Android 13 will support DNS over HTTPS. The settings can be found in: **Settings** → **Network & Internet** → **Private DNS**.
|
Android 9 and above support DNS over TLS. The settings can be found in: **Settings** → **Network & Internet** → **Private DNS**.
|
||||||
|
|
||||||
### Apple Devices
|
### Apple Devices
|
||||||
|
|
||||||
@ -50,27 +56,9 @@ After installation of either a configuration profile or an app that uses the DNS
|
|||||||
|
|
||||||
Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/).
|
Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/).
|
||||||
|
|
||||||
#### iOS/iPadOS
|
!!! info
|
||||||
|
|
||||||
Select **Settings** → **General** → **VPN, DNS, & Device Management** → **DNS**
|
`systemd-resolved`, which many Linux distributions use to do their DNS lookups, doesn't yet [support DoH](https://github.com/systemd/systemd/issues/8639). If you want to use DoH, you'll need to install a proxy like [dnscrypt-proxy](https://github.com/DNSCrypt/dnscrypt-proxy) and [configure it](https://wiki.archlinux.org/title/Dnscrypt-proxy) to take all the DNS queries from your system resolver and forward them over HTTPS.
|
||||||
|
|
||||||
#### macOS
|
|
||||||
|
|
||||||
Select **System Preferences → Profiles** or **System Preferences** → **Network** → **Advanced**, (depending on if you have configuration profiles installed).
|
|
||||||
|
|
||||||
#### tvOS
|
|
||||||
|
|
||||||
Select **Settings** → **General** → **Privacy** → **Share Apple TV Analytics** → then press the *Play* button on the remote.
|
|
||||||
|
|
||||||
### Windows
|
|
||||||
|
|
||||||
You can [turn on DoH](https://docs.microsoft.com/en-us/windows-server/networking/dns/doh-client-support) by accessing Windows settings in the control panel.
|
|
||||||
|
|
||||||
Select **Settings** → **Network & Internet** → **Ethernet or WiFi**, → **Edit DNS Settings** → **Preferred DNS encryption** → **Encrypted only (DNS over HTTPS)**.
|
|
||||||
|
|
||||||
### Linux
|
|
||||||
|
|
||||||
`systemd-resolved`, which many Linux distributions use to do their DNS lookups, doesn't yet [support DoH](https://github.com/systemd/systemd/issues/8639). If you want to use DoH, you'll need to install a proxy like [dnscrypt-proxy](https://github.com/DNSCrypt/dnscrypt-proxy) and [configure it](https://wiki.archlinux.org/title/Dnscrypt-proxy) to take all the DNS queries from your system resolver and forward them over HTTPS.
|
|
||||||
|
|
||||||
## Encrypted DNS Proxies
|
## Encrypted DNS Proxies
|
||||||
|
|
@ -1,10 +1,13 @@
|
|||||||
---
|
---
|
||||||
title: "Email Clients"
|
title: "Email Clients"
|
||||||
icon: material/email-open
|
icon: material/email-open
|
||||||
|
description: These email clients are privacy-respecting and support OpenPGP email encryption.
|
||||||
|
cover: email-clients.png
|
||||||
---
|
---
|
||||||
Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft.
|
Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft.
|
||||||
|
|
||||||
??? Attention "Email does not provide forward secrecy"
|
??? warning "Email does not provide forward secrecy"
|
||||||
|
|
||||||
When using end-to-end encryption (E2EE) technology like OpenPGP, email will still have [some metadata](email.md#email-metadata-overview) that is not encrypted in the header of the email.
|
When using end-to-end encryption (E2EE) technology like OpenPGP, email will still have [some metadata](email.md#email-metadata-overview) that is not encrypted in the header of the email.
|
||||||
|
|
||||||
OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed: [How do I protect my private keys?](basics/email-security.md) Consider using a medium that provides forward secrecy:
|
OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed: [How do I protect my private keys?](basics/email-security.md) Consider using a medium that provides forward secrecy:
|
||||||
@ -60,11 +63,13 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send encrypted email.
|
**Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://support.apple.com/guide/mail/toc){ .card-link title=Documentation}
|
[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation}
|
||||||
|
|
||||||
|
Apple Mail has the ability to load remote content in the background or block it entirely and hide your IP address from senders on [macOS](https://support.apple.com/guide/mail/mlhl03be2866/mac) and [iOS](https://support.apple.com/guide/iphone/iphf084865c7/ios).
|
||||||
|
|
||||||
### Canary Mail (iOS)
|
### Canary Mail (iOS)
|
||||||
|
|
||||||
@ -84,7 +89,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S
|
|||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1236045954)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id1236045954)
|
||||||
- [:simple-windows11: Windows](https://canarymail.io/downloads.html)
|
- [:simple-windows11: Windows](https://canarymail.io/downloads.html)
|
||||||
|
|
||||||
!!! attention
|
!!! warning
|
||||||
|
|
||||||
Canary Mail only recently released a Windows and Android client, though we don't believe they are as stable as their iOS and Mac counterparts.
|
Canary Mail only recently released a Windows and Android client, though we don't believe they are as stable as their iOS and Mac counterparts.
|
||||||
|
|
||||||
@ -148,6 +153,10 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f
|
|||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.fsck.k9)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.fsck.k9)
|
||||||
- [:simple-github: GitHub](https://github.com/k9mail/k-9/releases)
|
- [:simple-github: GitHub](https://github.com/k9mail/k-9/releases)
|
||||||
|
|
||||||
|
!!! warning
|
||||||
|
|
||||||
|
When replying to someone on a mailing list the "reply" option may also include the mailing list. For more information see [thundernest/k-9 #3738](https://github.com/thundernest/k-9/issues/3738).
|
||||||
|
|
||||||
### Kontact (KDE)
|
### Kontact (KDE)
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
@ -205,3 +214,27 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f
|
|||||||
|
|
||||||
- [:simple-apple: macOS](https://neomutt.org/distro)
|
- [:simple-apple: macOS](https://neomutt.org/distro)
|
||||||
- [:simple-linux: Linux](https://neomutt.org/distro)
|
- [:simple-linux: Linux](https://neomutt.org/distro)
|
||||||
|
|
||||||
|
## Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
### Minimum Qualifications
|
||||||
|
|
||||||
|
- Apps developed for open-source operating systems must be open-source.
|
||||||
|
- Must not collect telemetry, or have an easy way to disable all telemetry.
|
||||||
|
- Must support OpenPGP message encryption.
|
||||||
|
|
||||||
|
### Best-Case
|
||||||
|
|
||||||
|
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||||
|
|
||||||
|
- Should be open-source.
|
||||||
|
- Should be cross-platform.
|
||||||
|
- Should not collect any telemetry by default.
|
||||||
|
- Should support OpenPGP natively, i.e. without extensions.
|
||||||
|
- Should support storing OpenPGP encrypted emails locally.
|
@ -1,6 +1,9 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
|
||||||
title: "Email Services"
|
title: "Email Services"
|
||||||
icon: material/email
|
icon: material/email
|
||||||
|
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
|
||||||
|
cover: email.png
|
||||||
---
|
---
|
||||||
Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy.
|
Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy.
|
||||||
|
|
||||||
@ -8,14 +11,28 @@ Email is practically a necessity for using any online service, however we do not
|
|||||||
|
|
||||||
For everything else, we recommend a variety of email providers based on sustainable business models and built-in security and privacy features.
|
For everything else, we recommend a variety of email providers based on sustainable business models and built-in security and privacy features.
|
||||||
|
|
||||||
|
- [OpenPGP-Compatible Email Providers :material-arrow-right-drop-circle:](#openpgp-compatible-services)
|
||||||
|
- [Other Encrypted Providers :material-arrow-right-drop-circle:](#more-providers)
|
||||||
|
- [Email Aliasing Services :material-arrow-right-drop-circle:](#email-aliasing-services)
|
||||||
|
- [Self-Hosted Options :material-arrow-right-drop-circle:](#self-hosting-email)
|
||||||
|
|
||||||
|
## OpenPGP Compatible Services
|
||||||
|
|
||||||
|
These providers natively support OpenPGP encryption/decryption and the Web Key Directory (WKD) standard, allowing for provider-agnostic E2EE emails. For example, a Proton Mail user could send an E2EE message to a Mailbox.org user, or you could receive OpenPGP-encrypted notifications from internet services which support it.
|
||||||
|
|
||||||
|
<div class="grid cards" markdown>
|
||||||
|
|
||||||
|
- { .twemoji } [Proton Mail](email.md#proton-mail)
|
||||||
|
- { .twemoji } [Mailbox.org](email.md#mailboxorg)
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
!!! warning
|
!!! warning
|
||||||
|
|
||||||
When using E2EE technology like OpenPGP, email will still have some metadata that is not encrypted in the header of the email. Read more about [email metadata](basics/email-security.md#email-metadata-overview).
|
When using E2EE technology like OpenPGP, email will still have some metadata that is not encrypted in the header of the email. Read more about [email metadata](basics/email-security.md#email-metadata-overview).
|
||||||
|
|
||||||
OpenPGP also does not support Forward secrecy, which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. [How do I protect my private keys?](basics/email-security.md#how-do-i-protect-my-private-keys)
|
OpenPGP also does not support Forward secrecy, which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. [How do I protect my private keys?](basics/email-security.md#how-do-i-protect-my-private-keys)
|
||||||
|
|
||||||
## Recommended Email Providers
|
|
||||||
|
|
||||||
### Proton Mail
|
### Proton Mail
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
@ -24,10 +41,6 @@ For everything else, we recommend a variety of email providers based on sustaina
|
|||||||
|
|
||||||
**Proton Mail** is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since **2013**. Proton AG is based in Genève, Switzerland. Accounts start with 500 MB storage with their free plan.
|
**Proton Mail** is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since **2013**. Proton AG is based in Genève, Switzerland. Accounts start with 500 MB storage with their free plan.
|
||||||
|
|
||||||
Free accounts have some limitations, such as not being able to search body text and not having access to [Proton Mail Bridge](https://proton.me/mail/bridge), which is required to use a [recommended desktop email client](email-clients.md) (e.g. Thunderbird). Paid accounts include features like Proton Mail Bridge, additional storage, and custom domain support.
|
|
||||||
|
|
||||||
If you have the Proton Unlimited, Business, or Visionary Plan, you also get [SimpleLogin](#simplelogin) Premium for free.
|
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://proton.me/mail){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://proton.me/mail){ .md-button .md-button--primary }
|
||||||
[:simple-torbrowser:](https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion){ .card-link title="Onion Service" }
|
[:simple-torbrowser:](https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion){ .card-link title="Onion Service" }
|
||||||
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://proton.me/legal/privacy){ .card-link title="Privacy Policy" }
|
||||||
@ -44,33 +57,46 @@ For everything else, we recommend a variety of email providers based on sustaina
|
|||||||
- [:simple-linux: Linux](https://proton.me/mail/bridge#download)
|
- [:simple-linux: Linux](https://proton.me/mail/bridge#download)
|
||||||
- [:octicons-browser-16: Web](https://mail.proton.me)
|
- [:octicons-browser-16: Web](https://mail.proton.me)
|
||||||
|
|
||||||
??? check "Custom Domains and Aliases"
|
Free accounts have some limitations, such as not being able to search body text and not having access to [Proton Mail Bridge](https://proton.me/mail/bridge), which is required to use a [recommended desktop email client](email-clients.md) (e.g. Thunderbird). Paid accounts include features like Proton Mail Bridge, additional storage, and custom domain support. A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton Mail's apps on 9th November 2021 by [Securitum](https://research.securitum.com).
|
||||||
|
|
||||||
Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain.
|
If you have the Proton Unlimited, Business, or Visionary Plan, you also get [SimpleLogin](#simplelogin) Premium for free.
|
||||||
|
|
||||||
??? check "Private Payment Methods"
|
Proton Mail has internal crash reports that they **do not** share with third parties. This can be disabled in: **Settings** > **Go to Settings** > **Account** > **Security and privacy** > **Send crash reports**.
|
||||||
|
|
||||||
Proton Mail [accepts](https://proton.me/support/payment-options) Bitcoin and cash by mail in addition to standard credit/debit card and PayPal payments.
|
#### :material-check:{ .pg-green } Custom Domains and Aliases
|
||||||
|
|
||||||
??? check "Account Security"
|
Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain.
|
||||||
|
|
||||||
Proton Mail supports TOTP [two factor authentication](https://proton.me/support/two-factor-authentication-2fa) only. The use of a U2F security key is not yet supported. Proton Mail is planning to implement U2F upon completion of their [Single Sign On (SSO)](https://reddit.com/comments/cheoy6/comment/feh2lw0/) code.
|
#### :material-check:{ .pg-green } Private Payment Methods
|
||||||
|
|
||||||
??? check "Data Security"
|
Proton Mail [accepts](https://proton.me/support/payment-options) cash by mail in addition to standard credit/debit card, [Bitcoin](advanced/payments.md#other-coins-bitcoin-ethereum-etc), and PayPal payments.
|
||||||
|
|
||||||
Proton Mail has [zero-access encryption](https://proton.me/blog/zero-access-encryption) at rest for your emails and [calendars](https://proton.me/news/protoncalendar-security-model). Data secured with zero-access encryption is only accessible by you.
|
#### :material-check:{ .pg-green } Account Security
|
||||||
|
|
||||||
Certain information stored in [Proton Contacts](https://proton.me/support/proton-contacts), such as display names and email addresses, are not secured with zero-access encryption. Contact fields that support zero-access encryption, such as phone numbers, are indicated with a padlock icon.
|
Proton Mail supports TOTP [two factor authentication](https://proton.me/support/two-factor-authentication-2fa) and [hardware security keys](https://proton.me/support/2fa-security-key) using FIDO2 or U2F standards. The use of a hardware security key requires setting up TOTP two factor authentication first.
|
||||||
|
|
||||||
??? check "Email Encryption"
|
#### :material-check:{ .pg-green } Data Security
|
||||||
|
|
||||||
Proton Mail has [integrated OpenPGP encryption](https://proton.me/support/how-to-use-pgp) in their webmail. Emails to other Proton Mail accounts are encrypted automatically, and encryption to non-Proton Mail addresses with an OpenPGP key can be enabled easily in your account settings. They also allow you to [encrypt messages to non-Proton Mail addresses](https://proton.me/support/password-protected-emails) without the need for them to sign up for a Proton Mail account or use software like OpenPGP.
|
Proton Mail has [zero-access encryption](https://proton.me/blog/zero-access-encryption) at rest for your emails and [calendars](https://proton.me/news/protoncalendar-security-model). Data secured with zero-access encryption is only accessible by you.
|
||||||
|
|
||||||
Proton Mail also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people who don't use Proton Mail to find the OpenPGP keys of Proton Mail accounts easily, for cross-provider E2EE.
|
Certain information stored in [Proton Contacts](https://proton.me/support/proton-contacts), such as display names and email addresses, are not secured with zero-access encryption. Contact fields that support zero-access encryption, such as phone numbers, are indicated with a padlock icon.
|
||||||
|
|
||||||
??? info "Additional Functionality"
|
#### :material-check:{ .pg-green } Email Encryption
|
||||||
|
|
||||||
Proton Mail offers an "Unlimited" account for €9.99/Month, which also enables access to Proton VPN in addition to providing multiple accounts, domains, aliases, and 500GB of storage.
|
Proton Mail has [integrated OpenPGP encryption](https://proton.me/support/how-to-use-pgp) in their webmail. Emails to other Proton Mail accounts are encrypted automatically, and encryption to non-Proton Mail addresses with an OpenPGP key can be enabled easily in your account settings. They also allow you to [encrypt messages to non-Proton Mail addresses](https://proton.me/support/password-protected-emails) without the need for them to sign up for a Proton Mail account or use software like OpenPGP.
|
||||||
|
|
||||||
|
Proton Mail also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people who don't use Proton Mail to find the OpenPGP keys of Proton Mail accounts easily, for cross-provider E2EE.
|
||||||
|
|
||||||
|
|
||||||
|
#### :material-information-outline:{ .pg-blue } Account Termination
|
||||||
|
|
||||||
|
If you have a paid account and your [bill is unpaid](https://proton.me/support/delinquency) after 14 days, you won't be able to access your data. After 30 days, your account will become delinquent and won't receive incoming mail. You will continue to be billed during this period.
|
||||||
|
|
||||||
|
#### :material-information-outline:{ .pg-blue } Additional Functionality
|
||||||
|
|
||||||
|
Proton Mail offers an "Unlimited" account for €9.99/Month, which also enables access to Proton VPN in addition to providing multiple accounts, domains, aliases, and 500GB of storage.
|
||||||
|
|
||||||
|
Proton Mail doesn't offer a digital legacy feature.
|
||||||
|
|
||||||
### Mailbox.org
|
### Mailbox.org
|
||||||
|
|
||||||
@ -88,78 +114,51 @@ For everything else, we recommend a variety of email providers based on sustaina
|
|||||||
|
|
||||||
- [:octicons-browser-16: Web](https://login.mailbox.org)
|
- [:octicons-browser-16: Web](https://login.mailbox.org)
|
||||||
|
|
||||||
??? check "Custom Domains and Aliases"
|
#### :material-check:{ .pg-green } Custom Domains and Aliases
|
||||||
|
|
||||||
Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain.
|
Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain.
|
||||||
|
|
||||||
??? info "Private Payment Methods"
|
#### :material-check:{ .pg-green } Private Payment Methods
|
||||||
|
|
||||||
Mailbox.org doesn't accept Bitcoin or any other cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofortüberweisung.
|
Mailbox.org doesn't accept any cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofortüberweisung.
|
||||||
|
|
||||||
??? check "Account Security"
|
#### :material-check:{ .pg-green } Account Security
|
||||||
|
|
||||||
Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
|
Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
|
||||||
|
|
||||||
??? info "Data Security"
|
#### :material-information-outline:{ .pg-blue } Data Security
|
||||||
|
|
||||||
Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key.
|
Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key.
|
||||||
|
|
||||||
However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar-contacts.md) may be more appropriate for that information.
|
However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information.
|
||||||
|
|
||||||
??? check "Email Encryption"
|
#### :material-check:{ .pg-green } Email Encryption
|
||||||
|
|
||||||
Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox.
|
Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox.
|
||||||
|
|
||||||
Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE.
|
Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE.
|
||||||
|
|
||||||
??? info "Additional Functionality"
|
#### :material-information-outline:{ .pg-blue } Account Termination
|
||||||
|
|
||||||
You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors.
|
Your account will be set to a restricted user account when your contract ends, after [30 days it will be irrevocably deleted](https://kb.mailbox.org/en/private/payment-article/what-happens-at-the-end-of-my-contract).
|
||||||
|
|
||||||
All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3.
|
#### :material-information-outline:{ .pg-blue } Additional Functionality
|
||||||
|
|
||||||
### StartMail
|
You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors.
|
||||||
|
|
||||||
!!! recommendation
|
All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3.
|
||||||
|
|
||||||
{ align=right }
|
Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address.
|
||||||
{ align=right }
|
|
||||||
|
|
||||||
**StartMail** is an email service with a focus on security and privacy through the use of standard OpenPGP encryption. StartMail has been in operation since 2014 and is based in Boulevard 11, Zeist Netherlands. Accounts start with 10GB. They offer a 30-day trial.
|
## More Providers
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://www.startmail.com/){ .md-button .md-button--primary }
|
These providers store your emails with zero-knowledge encryption, making them great options for keeping your stored emails secure. However, they don't support interoperable encryption standards for E2EE communications between providers.
|
||||||
[:octicons-eye-16:](https://www.startmail.com/en/privacy/){ .card-link title="Privacy Policy" }
|
|
||||||
[:octicons-info-16:](https://support.startmail.com){ .card-link title=Documentation}
|
|
||||||
|
|
||||||
??? downloads
|
<div class="grid cards" markdown>
|
||||||
|
|
||||||
- [:octicons-browser-16: Web](https://mail.startmail.com/login)
|
- { .twemoji } [Tutanota](email.md#tutanota)
|
||||||
|
|
||||||
??? check "Custom Domains and Aliases"
|
</div>
|
||||||
|
|
||||||
Personal accounts can use [Custom or Quick](https://support.startmail.com/hc/en-us/articles/360007297457-Aliases) aliases. [Custom domains](https://support.startmail.com/hc/en-us/articles/4403911432209-Setup-a-custom-domain) are also available.
|
|
||||||
|
|
||||||
??? warning "Private Payment Methods"
|
|
||||||
|
|
||||||
StartMail accepts Visa, MasterCard, American Express and Paypal. StartMail also has other [payment options](https://support.startmail.com/hc/en-us/articles/360006620637-Payment-methods) such as Bitcoin (currently only for Personal accounts) and SEPA Direct Debit for accounts older than a year.
|
|
||||||
|
|
||||||
??? check "Account Security"
|
|
||||||
|
|
||||||
StartMail supports TOTP two factor authentication [for webmail only](https://support.startmail.com/hc/en-us/articles/360006682158-Two-factor-authentication-2FA). They do not allow U2F security key authentication.
|
|
||||||
|
|
||||||
??? info "Data Security"
|
|
||||||
|
|
||||||
StartMail has [zero access encryption at rest](https://www.startmail.com/en/whitepaper/#_Toc458527835), using their "user vault" system. When you log in, the vault is opened, and the email is then moved to the vault out of the queue where it is decrypted by the corresponding private key.
|
|
||||||
|
|
||||||
StartMail supports importing [contacts](https://support.startmail.com/hc/en-us/articles/360006495557-Import-contacts) however, they are only accessible in the webmail and not through protocols such as [CalDAV](https://en.wikipedia.org/wiki/CalDAV). Contacts are also not stored using zero knowledge encryption, so a [standalone option](calendar-contacts.md) may be more appropriate.
|
|
||||||
|
|
||||||
??? check "Email Encryption"
|
|
||||||
|
|
||||||
StartMail has [integrated encryption](https://support.startmail.com/hc/en-us/sections/360001889078-Encryption) in their webmail, which simplifies sending encrypted messages with public OpenPGP keys.
|
|
||||||
|
|
||||||
??? info "Additional Functionality"
|
|
||||||
|
|
||||||
StartMail allows for proxying of images within emails. If you allow the remote image to be loaded, the sender won't know what your IP address is.
|
|
||||||
|
|
||||||
### Tutanota
|
### Tutanota
|
||||||
|
|
||||||
@ -178,49 +177,58 @@ For everything else, we recommend a variety of email providers based on sustaina
|
|||||||
??? downloads
|
??? downloads
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota)
|
||||||
- [:simple-appstore: App Store](https://itunes.apple.com/de/app/tutanota/id922429609)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609)
|
||||||
- [:simple-github: GitHub](https://github.com/tutao/tutanota/releases)
|
- [:simple-github: GitHub](https://github.com/tutao/tutanota/releases)
|
||||||
- [:simple-windows11: Windows](https://tutanota.com/#download)
|
- [:simple-windows11: Windows](https://tutanota.com/#download)
|
||||||
- [:simple-apple: macOS](https://tutanota.com/#download)
|
- [:simple-apple: macOS](https://tutanota.com/#download)
|
||||||
- [:simple-linux: Linux](https://tutanota.com/#download)
|
- [:simple-linux: Linux](https://tutanota.com/#download)
|
||||||
- [:octicons-browser-16: Web](https://mail.tutanota.com/)
|
- [:octicons-browser-16: Web](https://mail.tutanota.com/)
|
||||||
|
|
||||||
Tutanota [doesn't allow](https://tutanota.com/faq/#imap) the use of third-party [email clients](email-clients.md). Tutanota has no plans pull email from [external email accounts](https://github.com/tutao/tutanota/issues/544#issuecomment-670473647) using the IMAP protocol. [Email import](https://github.com/tutao/tutanota/issues/630) is currently not possible.
|
Tutanota doesn't support the [IMAP protocol](https://tutanota.com/faq/#imap) or the use of third-party [email clients](email-clients.md), and you also won't be able to add [external email accounts](https://github.com/tutao/tutanota/issues/544#issuecomment-670473647) to the Tutanota app. Neither [Email import](https://github.com/tutao/tutanota/issues/630) or [subfolders](https://github.com/tutao/tutanota/issues/927) are currently supported, though this is [due to be changed](https://tutanota.com/blog/posts/kickoff-import). Emails can be exported [individually or by bulk selection](https://tutanota.com/howto#generalMail) per folder, which may be inconvenient if you have many folders.
|
||||||
|
|
||||||
Emails can be exported [individually or by bulk selection](https://tutanota.com/howto#generalMail). Tutanota does not allow for [subfolders](https://github.com/tutao/tutanota/issues/927) as you might expect with other email providers.
|
#### :material-check:{ .pg-green } Custom Domains and Aliases
|
||||||
|
|
||||||
??? check "Custom Domains and Aliases"
|
Paid Tutanota accounts can use up to 5 [aliases](https://tutanota.com/faq#alias) and [custom domains](https://tutanota.com/faq#custom-domain). Tutanota doesn't allow for [subaddressing (plus addresses)](https://tutanota.com/faq#plus), but you can use a [catch-all](https://tutanota.com/howto#settings-global) with a custom domain.
|
||||||
|
|
||||||
Paid Tutanota accounts can use up to 5 [aliases](https://tutanota.com/faq#alias) and [custom domains](https://tutanota.com/faq#custom-domain). Tutanota doesn't allow for [subaddressing (plus addresses)](https://tutanota.com/faq#plus), but you can use a [catch-all](https://tutanota.com/howto#settings-global) with a custom domain.
|
#### :material-information-outline:{ .pg-blue } Private Payment Methods
|
||||||
|
|
||||||
??? warning "Private Payment Methods"
|
Tutanota only directly accepts credit cards and PayPal, however [cryptocurrency](cryptocurrency.md) can be used to purchase gift cards via their [partnership](https://tutanota.com/faq/#cryptocurrency) with Proxystore.
|
||||||
|
|
||||||
Tutanota only directly accepts credit cards and PayPal, however Bitcoin and Monero can be used to purchase gift cards via their [partnership](https://tutanota.com/faq/#cryptocurrency) with Proxystore.
|
#### :material-check:{ .pg-green } Account Security
|
||||||
|
|
||||||
??? check "Account Security"
|
Tutanota supports [two factor authentication](https://tutanota.com/faq#2fa) with either TOTP or U2F.
|
||||||
|
|
||||||
Tutanota supports [two factor authentication](https://tutanota.com/faq#2fa) with either TOTP or U2F. U2F support is [not yet available on Android](https://github.com/tutao/tutanota/issues/443).
|
#### :material-check:{ .pg-green } Data Security
|
||||||
|
|
||||||
??? check "Data Security"
|
Tutanota has [zero access encryption at rest](https://tutanota.com/faq#what-encrypted) for your emails, [address book contacts](https://tutanota.com/faq#encrypted-address-book), and [calendars](https://tutanota.com/faq#calendar). This means the messages and other data stored in your account are only readable by you.
|
||||||
|
|
||||||
Tutanota has [zero access encryption at rest](https://tutanota.com/faq#what-encrypted) for your emails, [address book contacts](https://tutanota.com/faq#encrypted-address-book), and [calendars](https://tutanota.com/faq#calendar). This means the messages and other data stored in your account are only readable by you.
|
#### :material-information-outline:{ .pg-blue } Email Encryption
|
||||||
|
|
||||||
??? warning "Email Encryption"
|
Tutanota [does not use OpenPGP](https://www.tutanota.com/faq/#pgp). Tutanota accounts can only receive encrypted emails from non-Tutanota email accounts when sent via a [temporary Tutanota mailbox](https://www.tutanota.com/howto/#encrypted-email-external).
|
||||||
|
|
||||||
Tutanota [does not use OpenPGP](https://www.tutanota.com/faq/#pgp). Tutanota accounts can only receive encrypted emails from non-Tutanota email accounts when sent via a [temporary Tutanota mailbox](https://www.tutanota.com/howto/#encrypted-email-external).
|
#### :material-information-outline:{ .pg-blue } Account Termination
|
||||||
|
|
||||||
Tutanota [does have plans](https://github.com/tutao/tutanota/issues/198) to support [AutoCrypt](https://autocrypt.org). This would allow for non-Tutanota emails to send encrypted emails to Tutanota accounts as long as their email client supports the AutoCrypt headers.
|
Tutanota will [delete inactive free accounts](https://tutanota.com/faq#inactive-accounts) after six months. You can reuse a deactivated free account if you pay.
|
||||||
|
|
||||||
??? info "Additional Functionality"
|
#### :material-information-outline:{ .pg-blue } Additional Functionality
|
||||||
|
|
||||||
Tutanota offers the business version of [Tutanota to non-profit organizations](https://tutanota.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount.
|
Tutanota offers the business version of [Tutanota to non-profit organizations](https://tutanota.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount.
|
||||||
|
|
||||||
Tutanota also has a business feature called [Secure Connect](https://tutanota.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y.
|
Tutanota also has a business feature called [Secure Connect](https://tutanota.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y.
|
||||||
|
|
||||||
|
Tutanota doesn't offer a digital legacy feature.
|
||||||
|
|
||||||
## Email Aliasing Services
|
## Email Aliasing Services
|
||||||
|
|
||||||
An email aliasing service allows you to easily generate a new email address for every website you register for. The email aliases you generate are then forwarded to an email address of your choosing, hiding both your "main" email address and the identity of your email provider. True email aliasing is better than plus addressing commonly used and supported by many providers, which allows you to create aliases like yourname+[anythinghere]@example.com, because websites, advertisers, and tracking networks can trivially remove anything after the + sign to know your true email address.
|
An email aliasing service allows you to easily generate a new email address for every website you register for. The email aliases you generate are then forwarded to an email address of your choosing, hiding both your "main" email address and the identity of your email provider. True email aliasing is better than plus addressing commonly used and supported by many providers, which allows you to create aliases like yourname+[anythinghere]@example.com, because websites, advertisers, and tracking networks can trivially remove anything after the + sign to know your true email address.
|
||||||
|
|
||||||
|
<div class="grid cards" markdown>
|
||||||
|
|
||||||
|
- { .twemoji }{ .twemoji } [AnonAddy](email.md#anonaddy)
|
||||||
|
- { .twemoji } [SimpleLogin](email.md#simplelogin)
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
Email aliasing can act as a safeguard in case your email provider ever ceases operation. In that scenario, you can easily re-route your aliases to a new email address. In turn, however, you are placing trust in the aliasing service to continue functioning.
|
Email aliasing can act as a safeguard in case your email provider ever ceases operation. In that scenario, you can easily re-route your aliases to a new email address. In turn, however, you are placing trust in the aliasing service to continue functioning.
|
||||||
|
|
||||||
Using a dedicated email aliasing service also has a number of benefits over a catch-all alias on a custom domain:
|
Using a dedicated email aliasing service also has a number of benefits over a catch-all alias on a custom domain:
|
||||||
@ -337,9 +345,9 @@ For a more manual approach we've picked out these two articles:
|
|||||||
- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019)
|
- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019)
|
||||||
- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017)
|
- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017)
|
||||||
|
|
||||||
## Our Criteria
|
## Criteria
|
||||||
|
|
||||||
**Please note we are not affiliated with any of the providers we recommend.** This allows us to provide completely objective recommendations. We have developed a clear set of requirements for any Email provider wishing to be recommended, including implementing industry best practices, modern technology and more. We suggest you familiarize yourself with this list before choosing an Email provider, and conduct your own research to ensure the Email provider you choose is the right choice for you.
|
**Please note we are not affiliated with any of the providers we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements for any Email provider wishing to be recommended, including implementing industry best practices, modern technology and more. We suggest you familiarize yourself with this list before choosing an Email provider, and conduct your own research to ensure the Email provider you choose is the right choice for you.
|
||||||
|
|
||||||
### Technology
|
### Technology
|
||||||
|
|
||||||
@ -348,11 +356,13 @@ We regard these features as important in order to provide a safe and optimal ser
|
|||||||
**Minimum to Qualify:**
|
**Minimum to Qualify:**
|
||||||
|
|
||||||
- Encrypts email account data at rest with zero-access encryption.
|
- Encrypts email account data at rest with zero-access encryption.
|
||||||
|
- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard.
|
||||||
|
- Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy.
|
||||||
|
- Operates on owned infrastructure, i.e. not built upon third-party email service providers.
|
||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
||||||
|
|
||||||
- Encrypts all account data (Contacts, Calendars, etc) at rest with zero-access encryption.
|
- Encrypts all account data (Contacts, Calendars, etc.) at rest with zero-access encryption.
|
||||||
- Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy.
|
|
||||||
- Integrated webmail E2EE/PGP encryption provided as a convenience.
|
- Integrated webmail E2EE/PGP encryption provided as a convenience.
|
||||||
- Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP.
|
- Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP.
|
||||||
GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com`
|
GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com`
|
||||||
@ -370,12 +380,12 @@ We prefer our recommended providers to collect as little data as possible.
|
|||||||
|
|
||||||
- Protect sender's IP address. Filter it from showing in the `Received` header field.
|
- Protect sender's IP address. Filter it from showing in the `Received` header field.
|
||||||
- Don't require personally identifiable information (PII) besides a username and a password.
|
- Don't require personally identifiable information (PII) besides a username and a password.
|
||||||
- Privacy policy that meets the requirements defined by the GDPR
|
- Privacy policy that meets the requirements defined by the GDPR.
|
||||||
- Must not be hosted in the US due to [ECPA](https://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act#Criticism) which has [yet to be reformed](https://epic.org/ecpa/).
|
|
||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
||||||
|
|
||||||
- Accepts Bitcoin, cash, and other forms of cryptocurrency and/or anonymous payment options (gift cards, etc.)
|
- Accepts [anonymous payment options](advanced/payments.md) ([cryptocurrency](cryptocurrency.md), cash, gift cards, etc.)
|
||||||
|
- Hosted in a jurisdiction with strong email privacy protection laws.
|
||||||
|
|
||||||
### Security
|
### Security
|
||||||
|
|
||||||
@ -392,11 +402,12 @@ Email servers deal with a lot of very sensitive data. We expect that providers w
|
|||||||
- Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records.
|
- Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records.
|
||||||
- Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records.
|
- Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records.
|
||||||
- Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`.
|
- Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`.
|
||||||
- A server suite preference of TLS 1.2 or later and a plan for [Deprecating TLSv1.0 and TLSv1.1](https://datatracker.ietf.org/doc/draft-ietf-tls-oldversions-deprecate/).
|
- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/).
|
||||||
- [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used.
|
- [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used.
|
||||||
- Website security standards such as:
|
- Website security standards such as:
|
||||||
- [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security)
|
- [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security)
|
||||||
- [Subresource Integrity](https://en.wikipedia.org/wiki/Subresource_Integrity) if loading things from external domains.
|
- [Subresource Integrity](https://en.wikipedia.org/wiki/Subresource_Integrity) if loading things from external domains.
|
||||||
|
- Must support viewing of [Message headers](https://en.wikipedia.org/wiki/Email#Message_header), as it is a crucial forensic feature to determine if an email is a phishing attempt.
|
||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
||||||
|
|
||||||
@ -406,7 +417,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w
|
|||||||
- Bug-bounty programs and/or a coordinated vulnerability-disclosure process.
|
- Bug-bounty programs and/or a coordinated vulnerability-disclosure process.
|
||||||
- Website security standards such as:
|
- Website security standards such as:
|
||||||
- [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy)
|
- [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy)
|
||||||
- [Expect-CT](https://datatracker.ietf.org/doc/draft-ietf-httpbis-expect-ct)
|
- [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/)
|
||||||
|
|
||||||
### Trust
|
### Trust
|
||||||
|
|
||||||
@ -427,14 +438,14 @@ With the email providers we recommend we like to see responsible marketing.
|
|||||||
|
|
||||||
**Minimum to Qualify:**
|
**Minimum to Qualify:**
|
||||||
|
|
||||||
- Must self-host analytics (no Google Analytics, Adobe Analytics, etc). The provider's site must also comply with [DNT (Do Not Track)](https://en.wikipedia.org/wiki/Do_Not_Track) for those who wish to opt-out.
|
- Must self-host analytics (no Google Analytics, Adobe Analytics, etc.). The provider's site must also comply with [DNT (Do Not Track)](https://en.wikipedia.org/wiki/Do_Not_Track) for those who wish to opt-out.
|
||||||
|
|
||||||
Must not have any marketing which is irresponsible:
|
Must not have any marketing which is irresponsible:
|
||||||
|
|
||||||
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
|
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
|
||||||
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
- Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.:
|
||||||
|
|
||||||
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc) that they accessed without anonymity software (Tor, VPN, etc)
|
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.)
|
||||||
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
- [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
|
||||||
|
|
||||||
**Best Case:**
|
**Best Case:**
|
@ -1,6 +1,9 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
|
||||||
title: "Encryption Software"
|
title: "Encryption Software"
|
||||||
icon: material/file-lock
|
icon: material/file-lock
|
||||||
|
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
|
||||||
|
cover: encryption.png
|
||||||
---
|
---
|
||||||
Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here.
|
Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here.
|
||||||
|
|
||||||
@ -132,7 +135,7 @@ BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-o
|
|||||||
manage-bde -protectors -get c: > %UserProfile%\Desktop\BitLocker-Recovery-Key.txt
|
manage-bde -protectors -get c: > %UserProfile%\Desktop\BitLocker-Recovery-Key.txt
|
||||||
```
|
```
|
||||||
|
|
||||||
!!! important
|
!!! tip
|
||||||
|
|
||||||
Backup `BitLocker-Recovery-Key.txt` on your Desktop to a separate storage device. Loss of this recovery code may result in loss of data.
|
Backup `BitLocker-Recovery-Key.txt` on your Desktop to a separate storage device. Loss of this recovery code may result in loss of data.
|
||||||
|
|
||||||
@ -146,7 +149,7 @@ BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-o
|
|||||||
|
|
||||||
[:octicons-info-16:](https://support.apple.com/guide/mac-help/encrypt-mac-data-with-filevault-mh11785/mac){ .card-link title=Documentation}
|
[:octicons-info-16:](https://support.apple.com/guide/mac-help/encrypt-mac-data-with-filevault-mh11785/mac){ .card-link title=Documentation}
|
||||||
|
|
||||||
We recommend storing a local recovery key in a secure place as opposed to using iCloud FileVault recovery. As well, FileVault should be enabled **after** a complete macOS installation as more pseudorandom number generator ([PRNG](https://support.apple.com/guide/security/random-number-generation-seca0c73a75b/web)) [entropy](https://en.wikipedia.org/wiki/Entropy_(computing)) will be available.
|
We recommend storing a local recovery key in a secure place as opposed to using your iCloud account for recovery.
|
||||||
|
|
||||||
### Linux Unified Key Setup
|
### Linux Unified Key Setup
|
||||||
|
|
||||||
@ -199,7 +202,7 @@ Browser-based encryption can be useful when you need to encrypt a file but canno
|
|||||||
[:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation}
|
[:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" }
|
||||||
:octicons-heart-16:{ .card-link title="Donations methods can be found at the bottom of the website" }
|
[:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" }
|
||||||
|
|
||||||
## Command-line
|
## Command-line
|
||||||
|
|
||||||
@ -325,8 +328,29 @@ When encrypting with PGP, you have the option to configure different options in
|
|||||||
[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation}
|
[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
|
||||||
:octicons-heart-16:{ .card-link title="Donations can be made within the app" }
|
|
||||||
|
|
||||||
??? downloads
|
??? downloads
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain)
|
||||||
|
|
||||||
|
## Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
### Minimum Qualifications
|
||||||
|
|
||||||
|
- Cross-platform encryption apps must be open-source.
|
||||||
|
- File encryption apps must support decryption on Linux, macOS, and Windows.
|
||||||
|
- External disk encryption apps must support decryption on Linux, macOS, and Windows.
|
||||||
|
- Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively.
|
||||||
|
|
||||||
|
### Best-Case
|
||||||
|
|
||||||
|
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||||
|
|
||||||
|
- Operating System (FDE) encryption apps should utilize hardware security such as a TPM or Secure Enclave.
|
||||||
|
- File encryption apps should have first- or third-party support for mobile platforms.
|
@ -1,6 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: "File Sharing and Sync"
|
title: "File Sharing and Sync"
|
||||||
icon: material/share-variant
|
icon: material/share-variant
|
||||||
|
description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
|
||||||
|
cover: file-sharing.png
|
||||||
---
|
---
|
||||||
Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
|
Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
|
||||||
|
|
||||||
@ -45,6 +47,18 @@ ffsend upload --host https://send.vis.ee/ FILE
|
|||||||
- [:simple-apple: macOS](https://onionshare.org/#download)
|
- [:simple-apple: macOS](https://onionshare.org/#download)
|
||||||
- [:simple-linux: Linux](https://onionshare.org/#download)
|
- [:simple-linux: Linux](https://onionshare.org/#download)
|
||||||
|
|
||||||
|
### Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
- Must not store decrypted data on a remote server.
|
||||||
|
- Must be open-source software.
|
||||||
|
- Must either have clients for Linux, macOS, and Windows; or have a web interface.
|
||||||
|
|
||||||
## FreedomBox
|
## FreedomBox
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
@ -60,7 +74,35 @@ ffsend upload --host https://send.vis.ee/ FILE
|
|||||||
|
|
||||||
## File Sync
|
## File Sync
|
||||||
|
|
||||||
### Syncthing
|
### Nextcloud (Client-Server)
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Nextcloud** is a suite of free and open-source client-server software for creating your own file hosting services on a private server you control.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" }
|
||||||
|
[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute }
|
||||||
|
|
||||||
|
??? downloads
|
||||||
|
|
||||||
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nextcloud.client)
|
||||||
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id1125420102)
|
||||||
|
- [:simple-github: GitHub](https://github.com/nextcloud/android/releases)
|
||||||
|
- [:simple-windows11: Windows](https://nextcloud.com/install/#install-clients)
|
||||||
|
- [:simple-apple: macOS](https://nextcloud.com/install/#install-clients)
|
||||||
|
- [:simple-linux: Linux](https://nextcloud.com/install/#install-clients)
|
||||||
|
- [:simple-freebsd: FreeBSD](https://www.freshports.org/www/nextcloud)
|
||||||
|
|
||||||
|
!!! danger
|
||||||
|
|
||||||
|
We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_end_encryption) for Nextcloud as it may lead to data loss; it is highly experimental and not production quality.
|
||||||
|
|
||||||
|
### Syncthing (P2P)
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
|
|
||||||
@ -82,3 +124,24 @@ ffsend upload --host https://send.vis.ee/ FILE
|
|||||||
- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/)
|
- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/)
|
||||||
- [:simple-openbsd: OpenBSD](https://syncthing.net/downloads/)
|
- [:simple-openbsd: OpenBSD](https://syncthing.net/downloads/)
|
||||||
- [:simple-netbsd: NetBSD](https://syncthing.net/downloads/)
|
- [:simple-netbsd: NetBSD](https://syncthing.net/downloads/)
|
||||||
|
|
||||||
|
### Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
#### Minimum Requirements
|
||||||
|
|
||||||
|
- Must not require a third-party remote/cloud server.
|
||||||
|
- Must be open-source software.
|
||||||
|
- Must either have clients for Linux, macOS, and Windows; or have a web interface.
|
||||||
|
|
||||||
|
#### Best-Case
|
||||||
|
|
||||||
|
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||||
|
|
||||||
|
- Has mobile clients for iOS and Android, which at least support document previews.
|
||||||
|
- Supports photo backup from iOS and Android, and optionally supports file/folder sync on Android.
|
95
docs/financial-services.md
Normal file
@ -0,0 +1,95 @@
|
|||||||
|
---
|
||||||
|
title: Financial Services
|
||||||
|
icon: material/bank
|
||||||
|
cover: financial-services.png
|
||||||
|
---
|
||||||
|
|
||||||
|
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:
|
||||||
|
|
||||||
|
[Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md){ .md-button }
|
||||||
|
|
||||||
|
## Payment Masking Services
|
||||||
|
|
||||||
|
There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
|
||||||
|
|
||||||
|
!!! tip "Check your current bank"
|
||||||
|
|
||||||
|
Many banks and credit card providers offer native virtual card functionality. If you use one which provides this option already, you should use it over the following recommendations in most cases. That way you are not trusting multiple parties with your personal information.
|
||||||
|
|
||||||
|
### Privacy.com (US)
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Privacy.com**'s free plan allows you to create up to 12 virtual cards per month, set spend limits on those cards, and shut off cards instantly. Their paid plan allows you to create up to 36 cards per month, get 1% cash back on purchases, and hide transaction information from your bank.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation}
|
||||||
|
|
||||||
|
Privacy.com gives information about the merchants you purchase from to your bank by default. Their paid "discreet merchants" feature hides merchant information from your bank, so your bank only sees that a purchase was made with Privacy.com but not where that money was spent, however that is not foolproof, and of course Privacy.com still has knowledge about the merchants you are spending money with.
|
||||||
|
|
||||||
|
### MySudo (US, Paid)
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation}
|
||||||
|
|
||||||
|
### Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
- Allows the creation of multiple cards which function as a shield between the merchant and your personal finances.
|
||||||
|
- Cards must not require you to provide accurate billing address information to the merchant.
|
||||||
|
|
||||||
|
## Gift Card Marketplaces
|
||||||
|
|
||||||
|
These services allow you to purchase gift cards for a variety of merchants online with [cryptocurrency](cryptocurrency.md). Some of these services offer ID verification options for higher limits, but they also allow accounts with just an email address. Basic limits typically start at $5,000-10,000 a day for basic accounts, and significantly higher limits for ID verified accounts (if offered).
|
||||||
|
|
||||||
|
### Cake Pay
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Cake Pay** allows you to purchase gift cards and related products with Monero. Purchases for USA merchants are available in the Cake Wallet mobile app, while the Cake Pay web app includes a broad selection of global merchants.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://cakepay.com/){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://ionia.docsend.com/view/jhjvdn7qq7k3ukwt){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://guides.cakewallet.com/){ .card-link title=Documentation}
|
||||||
|
|
||||||
|
### CoinCards
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation}
|
||||||
|
|
||||||
|
### Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
- Accepts payment in [a recommended cryptocurrency](cryptocurrency.md).
|
||||||
|
- No ID requirement.
|
@ -1,39 +1,15 @@
|
|||||||
---
|
---
|
||||||
title: "Frontends"
|
title: "Frontends"
|
||||||
icon: material/flip-to-front
|
icon: material/flip-to-front
|
||||||
|
description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances.
|
||||||
|
cover: frontends.png
|
||||||
---
|
---
|
||||||
|
|
||||||
Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions.
|
Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions.
|
||||||
|
|
||||||
## LBRY
|
If you choose to self-host these frontends, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting, as other peoples' usage will be linked to your hosting.
|
||||||
|
|
||||||
### Librarian
|
When you are using an instance run by someone else, make sure to read the privacy policy of that specific instance. They can be modified by their owners and therefore may not reflect the default policy. Some instances have Tor .onion addresses which may grant some privacy as long as your search queries don't contain PII.
|
||||||
|
|
||||||
!!! recommendation
|
|
||||||
|
|
||||||
{ align=right }
|
|
||||||
{ align=right }
|
|
||||||
|
|
||||||
**Librarian** is a free and open-source frontend for [Odysee](https://odysee.com/) (LBRY) that is also self-hostable.
|
|
||||||
|
|
||||||
There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support.
|
|
||||||
|
|
||||||
[:octicons-repo-16: Repository](https://codeberg.org/librarian/librarian){ .md-button .md-button--primary }
|
|
||||||
[:octicons-server-16:](https://librarian.codeberg.page/){ .card-link title="Public Instances"}
|
|
||||||
[:octicons-info-16:](https://codeberg.org/librarian/librarian/wiki){ .card-link title=Documentation}
|
|
||||||
[:octicons-code-16:](https://codeberg.org/librarian/librarian){ .card-link title="Source Code" }
|
|
||||||
|
|
||||||
!!! warning
|
|
||||||
|
|
||||||
Librarian does not proxy video streams by default. Videos watched through Librarian will still make direct connections to Odysee's servers (e.g. `odycdn.com`); however, some instances may enable proxying which would be detailed in the instance's privacy policy.
|
|
||||||
|
|
||||||
!!! tip
|
|
||||||
|
|
||||||
Librarian is useful if you want watch LBRY content on mobile without mandatory telemetry and if you want to disable JavaScript in your browser, as is the case with [Tor Browser](https://www.torproject.org/) on the Safest security level.
|
|
||||||
|
|
||||||
When self-hosting, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting Librarian, as other peoples' usage will be linked to your hosting.
|
|
||||||
|
|
||||||
When you are using a Librarian instance, make sure to read the privacy policy of that specific instance. Librarian instances can be modified by their owners and therefore may not reflect the default policy. Librarian instances feature a "privacy nutrition label" to provide an overview of their policy. Some instances have Tor .onion addresses which may grant some privacy as long as your search queries don't contain PII (Personally Identifiable Information).
|
|
||||||
|
|
||||||
## Twitter
|
## Twitter
|
||||||
|
|
||||||
@ -55,11 +31,28 @@ When you are using a Librarian instance, make sure to read the privacy policy of
|
|||||||
|
|
||||||
!!! tip
|
!!! tip
|
||||||
|
|
||||||
Nitter is useful if you want to browser Twitter content without having to log in and if you want to disable JavaScript in your browser, as is the case with [Tor Browser](https://www.torproject.org/) on the Safest security level. It also allows you to [create RSS feeds for Twitter](news-aggregators.md#twitter).
|
Nitter is useful if you want to browse Twitter content without having to log in and if you want to disable JavaScript in your browser, as is the case with [Tor Browser](https://www.torproject.org/) on the Safest security level. It also allows you to [create RSS feeds for Twitter](news-aggregators.md#twitter).
|
||||||
|
|
||||||
When self-hosting, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting Nitter, as other peoples' usage will be linked to your hosting.
|
## TikTok
|
||||||
|
|
||||||
When you are using a Nitter instance, make sure to read the privacy policy of that specific instance. Nitter instances can be modified by their owners and therefore may not reflect the default policy. Some instances have Tor .onion addresses which may grant some privacy as long as your search queries don't contain PII (Personally Identifiable Information).
|
### ProxiTok
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**ProxiTok** is an open source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable.
|
||||||
|
|
||||||
|
There are a number of public instances, with some instances having [Tor](https://www.torproject.org) onion services support.
|
||||||
|
|
||||||
|
[:octicons-repo-16: Repository](https://github.com/pablouser1/ProxiTok){ .md-button .md-button--primary }
|
||||||
|
[:octicons-server-16:](https://github.com/pablouser1/ProxiTok/wiki/Public-instances){ .card-link title="Public Instances"}
|
||||||
|
[:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" }
|
||||||
|
|
||||||
|
!!! tip
|
||||||
|
|
||||||
|
ProxiTok is useful if you want to disable JavaScript in your browser, such as [Tor Browser](https://www.torproject.org/) on the Safest security level.
|
||||||
|
|
||||||
## YouTube
|
## YouTube
|
||||||
|
|
||||||
@ -86,10 +79,62 @@ When you are using a Nitter instance, make sure to read the privacy policy of th
|
|||||||
- [:simple-linux: Linux](https://freetubeapp.io/#download)
|
- [:simple-linux: Linux](https://freetubeapp.io/#download)
|
||||||
- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube)
|
- [:simple-flathub: Flathub](https://flathub.org/apps/details/io.freetubeapp.FreeTube)
|
||||||
|
|
||||||
!!! Warning
|
!!! warning
|
||||||
|
|
||||||
When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
|
### Yattee
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device.
|
||||||
|
|
||||||
|
You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://github.com/yattee/yattee/wiki){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://github.com/yattee/yattee){ .card-link title="Source Code" }
|
||||||
|
[:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribute }
|
||||||
|
|
||||||
|
??? downloads
|
||||||
|
|
||||||
|
- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629)
|
||||||
|
- [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
|
||||||
|
|
||||||
|
!!! warning
|
||||||
|
|
||||||
|
When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
|
By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments.
|
||||||
|
|
||||||
|
### LibreTube (Android)
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**LibreTube** is a free and open-source Android application for [YouTube](https://youtube.com) which uses the [Piped](#piped) API.
|
||||||
|
|
||||||
|
LibreTube allows you to store your subscription list and playlists locally on your Android device, or to an account on your Piped instance of choice, which allows you to access them seamlessly on other devices as well.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://libre-tube.github.io){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://github.com/libre-tube/LibreTube#privacy-policy-and-disclaimer){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://github.com/libre-tube/LibreTube#readme){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://github.com/libre-tube/LibreTube){ .card-link title="Source Code" }
|
||||||
|
|
||||||
|
??? downloads
|
||||||
|
|
||||||
|
- [:simple-github: GitHub](https://github.com/libre-tube/LibreTube/releases)
|
||||||
|
|
||||||
|
!!! warning
|
||||||
|
|
||||||
|
When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
|
By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired.
|
||||||
|
|
||||||
### NewPipe (Android)
|
### NewPipe (Android)
|
||||||
|
|
||||||
@ -113,8 +158,8 @@ When you are using a Nitter instance, make sure to read the privacy policy of th
|
|||||||
|
|
||||||
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
||||||
|
|
||||||
!!! Warning
|
!!! warning
|
||||||
|
|
||||||
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
### Invidious
|
### Invidious
|
||||||
@ -142,10 +187,6 @@ When you are using a Nitter instance, make sure to read the privacy policy of th
|
|||||||
|
|
||||||
Invidious is useful if you want to disable JavaScript in your browser, such as [Tor Browser](https://www.torproject.org/) on the Safest security level. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
|
Invidious is useful if you want to disable JavaScript in your browser, such as [Tor Browser](https://www.torproject.org/) on the Safest security level. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
|
||||||
|
|
||||||
When self-hosting, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting Invidious, as other peoples' usage will be linked to your hosting.
|
|
||||||
|
|
||||||
When you are using an Invidious instance, make sure to read the privacy policy of that specific instance. Invidious instances can be modified by their owners and therefore may not reflect their associated privacy policy. Some instances have Tor .onion addresses which may grant some privacy as long as your search queries don't contain PII (Personally Identifiable Information).
|
|
||||||
|
|
||||||
### Piped
|
### Piped
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
@ -166,6 +207,20 @@ When you are using an Invidious instance, make sure to read the privacy policy o
|
|||||||
|
|
||||||
Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
|
Piped is useful if you want to use [SponsorBlock](https://sponsor.ajay.app) without installing an extension or to access age-restricted content without an account. It does not provide privacy by itself, and we don’t recommend logging into any accounts.
|
||||||
|
|
||||||
When self-hosting, it is important that you have other people using your instance as well in order for you to blend in. You should be careful with where and how you are hosting Piped, as other peoples' usage will be linked to your hosting.
|
## Criteria
|
||||||
|
|
||||||
When you are using a Piped instance, make sure to read the privacy policy of that specific instance. Piped instances can be modified by their owners and therefore may not reflect their associated privacy policy.
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
Recommended frontends...
|
||||||
|
|
||||||
|
- Must be open-source software.
|
||||||
|
- Must be self-hostable.
|
||||||
|
- Must provide all basic website functionality available to anonymous users.
|
||||||
|
|
||||||
|
We only consider frontends for websites which are...
|
||||||
|
|
||||||
|
- Not normally accessible without JavaScript.
|
@ -1,50 +0,0 @@
|
|||||||
---
|
|
||||||
template: overrides/home.en.html
|
|
||||||
hide:
|
|
||||||
- navigation
|
|
||||||
- toc
|
|
||||||
- feedback
|
|
||||||
---
|
|
||||||
<!-- markdownlint-disable-next-line -->
|
|
||||||
<div style="max-width:50rem;margin:auto;" markdown>
|
|
||||||
<div style="max-width:38rem;" markdown>
|
|
||||||
## Why should I care?
|
|
||||||
|
|
||||||
##### “I have nothing to hide. Why should I care about my privacy?”
|
|
||||||
|
|
||||||
Much like the right to interracial marriage, woman's suffrage, freedom of speech, and many others, our right to privacy hasn't always been upheld. In several dictatorships, it still isn't. Generations before ours fought for our right to privacy. ==Privacy is a human right, inherent to all of us,== that we are entitled to (without discrimination).
|
|
||||||
|
|
||||||
You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes you human.
|
|
||||||
|
|
||||||
[:material-target-account: Common Internet Threats](basics/common-threats.md){ .md-button .md-button--primary }
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="margin-left:auto;margin-right:0;text-align:right;max-width:38rem;" markdown>
|
|
||||||
## What should I do?
|
|
||||||
|
|
||||||
##### First, you need to make a plan.
|
|
||||||
|
|
||||||
Trying to protect all your data from everyone all the time is impractical, expensive, and exhausting. But don't worry! Security is a process, and, by thinking ahead, you can put together a plan that's right for you. Security isn't just about the tools you use or the software you download. Rather, it begins by understanding the unique threats you face, and how you can mitigate them.
|
|
||||||
|
|
||||||
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
|
|
||||||
|
|
||||||
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ .md-button .md-button--primary }
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="padding:3em;max-width:960px;margin:auto;text-align:center;" markdown>
|
|
||||||
## We need you! Here's how to get involved:
|
|
||||||
|
|
||||||
It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
|
|
||||||
|
|
||||||
<div class="grid cards" style="margin:auto;max-width:800px;text-align:center;" markdown>
|
|
||||||
|
|
||||||
- [:simple-discourse: Join our forum](https://discuss.privacyguides.org/)
|
|
||||||
- [:simple-mastodon: Follow us on Mastodon](https://mastodon.neat.computer/@privacyguides){ rel=me }
|
|
||||||
- [:material-book-edit: Contribute to this website](https://github.com/privacyguides/privacyguides.org)
|
|
||||||
- [:simple-matrix: Chat with us on Matrix](https://matrix.to/#/#privacyguides:matrix.org)
|
|
||||||
- [:material-information-outline: Learn more about us](about/index.md)
|
|
||||||
- [:material-hand-coin-outline: Support the project](about/donate.md)
|
|
||||||
|
|
||||||
</div>
|
|
||||||
</div>
|
|
70
docs/index.md
Normal file
@ -0,0 +1,70 @@
|
|||||||
|
---
|
||||||
|
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
|
||||||
|
template: overrides/home.en.html
|
||||||
|
hide:
|
||||||
|
- navigation
|
||||||
|
- toc
|
||||||
|
- feedback
|
||||||
|
schema:
|
||||||
|
-
|
||||||
|
"@context": https://schema.org
|
||||||
|
"@type": Organization
|
||||||
|
"@id": https://www.privacyguides.org/
|
||||||
|
name: Privacy Guides
|
||||||
|
url: https://www.privacyguides.org/en/about/
|
||||||
|
logo: https://www.privacyguides.org/en/assets/brand/png/square/pg-yellow.png
|
||||||
|
sameAs:
|
||||||
|
- https://twitter.com/privacy_guides
|
||||||
|
- https://github.com/privacyguides
|
||||||
|
- https://www.wikidata.org/wiki/Q111710163
|
||||||
|
- https://opencollective.com/privacyguides
|
||||||
|
- https://www.youtube.com/@privacyguides
|
||||||
|
- https://mastodon.neat.computer/@privacyguides
|
||||||
|
-
|
||||||
|
"@context": https://schema.org
|
||||||
|
"@type": WebSite
|
||||||
|
name: Privacy Guides
|
||||||
|
url: "https://www.privacyguides.org/"
|
||||||
|
sameAs:
|
||||||
|
- https://www.wikidata.org/wiki/Q111710163
|
||||||
|
potentialAction:
|
||||||
|
"@type": SearchAction
|
||||||
|
target:
|
||||||
|
"@type": EntryPoint
|
||||||
|
urlTemplate: "https://www.privacyguides.org/?q={search_term_string}"
|
||||||
|
query-input: required name=search_term_string
|
||||||
|
---
|
||||||
|
<!-- markdownlint-disable-next-line -->
|
||||||
|
## Why should I care?
|
||||||
|
|
||||||
|
##### “I have nothing to hide. Why should I care about my privacy?”
|
||||||
|
|
||||||
|
Much like the right to interracial marriage, woman's suffrage, freedom of speech, and many others, our right to privacy hasn't always been upheld. In several dictatorships, it still isn't. Generations before ours fought for our right to privacy. ==Privacy is a human right, inherent to all of us,== that we are entitled to (without discrimination).
|
||||||
|
|
||||||
|
You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human.
|
||||||
|
|
||||||
|
[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
|
## What should I do?
|
||||||
|
|
||||||
|
##### First, you need to make a plan
|
||||||
|
|
||||||
|
Trying to protect all your data from everyone all the time is impractical, expensive, and exhausting. But don't worry! Security is a process, and, by thinking ahead, you can put together a plan that's right for you. Security isn't just about the tools you use or the software you download. Rather, it begins by understanding the unique threats you face, and how you can mitigate them.
|
||||||
|
|
||||||
|
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
|
||||||
|
|
||||||
|
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
## We need you! Here's how to get involved:
|
||||||
|
|
||||||
|
[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" }
|
||||||
|
[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
|
||||||
|
[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
|
||||||
|
[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
|
||||||
|
[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
|
||||||
|
[:material-information-outline:](about/index.md){ title="Learn more about us" }
|
||||||
|
[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
|
||||||
|
|
||||||
|
It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: KB Archive
|
title: KB Archive
|
||||||
icon: material/archive
|
icon: material/archive
|
||||||
|
description: Some pages that used to be in our knowledge base can now be found on our blog.
|
||||||
---
|
---
|
||||||
# Pages Moved to Blog
|
# Pages Moved to Blog
|
||||||
|
|
@ -1,6 +1,40 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
|
||||||
title: "Mobile Browsers"
|
title: "Mobile Browsers"
|
||||||
icon: material/cellphone-information
|
icon: material/cellphone-information
|
||||||
|
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
|
||||||
|
cover: mobile-browsers.png
|
||||||
|
schema:
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": WebPage
|
||||||
|
name: Private Mobile Browser Recommendations
|
||||||
|
url: "./"
|
||||||
|
relatedLink: "../desktop-browsers/"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": MobileApplication
|
||||||
|
name: Brave
|
||||||
|
image: /assets/img/browsers/brave.svg
|
||||||
|
url: https://brave.com
|
||||||
|
applicationCategory: Web Browser
|
||||||
|
operatingSystem:
|
||||||
|
- Android
|
||||||
|
subjectOf:
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": MobileApplication
|
||||||
|
name: Safari
|
||||||
|
image: /assets/img/browsers/safari.svg
|
||||||
|
url: https://www.apple.com/safari/
|
||||||
|
applicationCategory: Web Browser
|
||||||
|
operatingSystem:
|
||||||
|
- iOS
|
||||||
|
subjectOf:
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
---
|
---
|
||||||
These are our currently recommended mobile web browsers and configurations for standard/non-anonymous internet browsing. If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. In general, we recommend keeping extensions to a minimum; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation.
|
These are our currently recommended mobile web browsers and configurations for standard/non-anonymous internet browsing. If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. In general, we recommend keeping extensions to a minimum; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation.
|
||||||
|
|
||||||
@ -39,6 +73,8 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel
|
|||||||
|
|
||||||
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit.
|
||||||
|
|
||||||
|
##### Brave shields global defaults
|
||||||
|
|
||||||
Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following:
|
Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following:
|
||||||
|
|
||||||
<div class="annotate" markdown>
|
<div class="annotate" markdown>
|
||||||
@ -48,32 +84,38 @@ Shields' options can be downgraded on a per-site basis as needed, but by default
|
|||||||
??? warning "Use default filter lists"
|
??? warning "Use default filter lists"
|
||||||
Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use.
|
Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use.
|
||||||
|
|
||||||
|
- [x] Select **Upgrade connections to HTTPS**
|
||||||
|
- [x] Select **Always use secure connections**
|
||||||
- [x] (Optional) Select **Block Scripts** (1)
|
- [x] (Optional) Select **Block Scripts** (1)
|
||||||
- [x] Select **Strict, may break sites** under Block fingerprinting
|
- [x] Select **Strict, may break sites** under **Block fingerprinting**
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension.
|
1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension.
|
||||||
|
|
||||||
|
##### Clear browsing data
|
||||||
|
|
||||||
|
- [x] Select **Clear data on exit**
|
||||||
|
|
||||||
##### Social Media Blocking
|
##### Social Media Blocking
|
||||||
|
|
||||||
- [ ] Uncheck all social media components
|
- [ ] Uncheck all social media components
|
||||||
|
|
||||||
##### IPFS
|
|
||||||
|
|
||||||
InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it.
|
|
||||||
|
|
||||||
- [ ] Uncheck **IPFS Gateway**
|
|
||||||
|
|
||||||
##### Other privacy settings
|
##### Other privacy settings
|
||||||
|
|
||||||
- [x] Select **Disable Non-Proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc)
|
<div class="annotate" markdown>
|
||||||
- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)**
|
|
||||||
- [ ] Uncheck **Automatically send daily usage ping to Brave**
|
- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc)
|
||||||
- [ ] Uncheck **Automatically send diagnostic reports**
|
- [ ] Uncheck **Allow sites to check if you have payment methods saved**
|
||||||
- [x] Select **Always use secure connections**
|
- [ ] Uncheck **IPFS Gateway** (1)
|
||||||
- [x] Select **Close tabs on exit**
|
- [x] Select **Close tabs on exit**
|
||||||
- [x] Select **Clear data on exit**
|
- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)**
|
||||||
|
- [ ] Uncheck **Automatically send diagnostic reports**
|
||||||
|
- [ ] Uncheck **Automatically send daily usage ping to Brave**
|
||||||
|
|
||||||
|
</div>
|
||||||
|
|
||||||
|
1. InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it.
|
||||||
|
|
||||||
#### Brave Sync
|
#### Brave Sync
|
||||||
|
|
||||||
@ -89,7 +131,9 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple.
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as Intelligent Tracking Protection, Privacy Report, isolated Private Browsing tabs, iCloud Private Relay, and automatic HTTPS upgrades.
|
**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, and fingerprinting reduction by presenting a simplified version of the system configuration to websites so more devices look identical.
|
||||||
|
|
||||||
|
Safari is restricted to Apple devices and is covered by [System Integrity Protection](https://support.apple.com/guide/security/system-integrity-protection-secb7ea06b49/web), a security feature which limits system programs and files to being read-only so they can't be tampered with by you or malware.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" }
|
||||||
@ -131,9 +175,13 @@ Do note that Private Browsing does not save cookies and website data, so it won'
|
|||||||
|
|
||||||
##### iCloud Sync
|
##### iCloud Sync
|
||||||
|
|
||||||
Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/).
|
Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/).
|
||||||
|
|
||||||
If you use iCloud, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**.
|
You can enable E2EE for you Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**.
|
||||||
|
|
||||||
|
- [x] Turn On **Advanced Data Protection**
|
||||||
|
|
||||||
|
If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in :gear: **Settings** → **Safari** → **General** → **Downloads**.
|
||||||
|
|
||||||
### AdGuard
|
### AdGuard
|
||||||
|
|
||||||
@ -155,3 +203,25 @@ If you use iCloud, we also recommend checking to ensure Safari's default downloa
|
|||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162)
|
- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162)
|
||||||
|
|
||||||
Additional filter lists do slow things down and may increase your attack surface, so only apply what you need.
|
Additional filter lists do slow things down and may increase your attack surface, so only apply what you need.
|
||||||
|
|
||||||
|
## Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
### Minimum Requirements
|
||||||
|
|
||||||
|
- Must support automatic updates.
|
||||||
|
- Must receive engine updates in 0-1 days from upstream release.
|
||||||
|
- Any changes required to make the browser more privacy-respecting should not negatively impact user experience.
|
||||||
|
- Android browsers must use the Chromium engine.
|
||||||
|
- Unfortunately, Mozilla GeckoView is still less secure than Chromium on Android.
|
||||||
|
- iOS browsers are limited to WebKit.
|
||||||
|
|
||||||
|
### Extension Criteria
|
||||||
|
|
||||||
|
- Must not replicate built-in browser or OS functionality.
|
||||||
|
- Must directly impact user privacy, i.e. must not simply provide information.
|
@ -1,6 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: "Multi-Factor Authenticators"
|
title: "Multi-Factor Authenticators"
|
||||||
icon: 'material/two-factor-authentication'
|
icon: 'material/two-factor-authentication'
|
||||||
|
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
|
||||||
|
cover: multi-factor-authentication.png
|
||||||
---
|
---
|
||||||
## Hardware Security Keys
|
## Hardware Security Keys
|
||||||
|
|
||||||
@ -27,7 +29,7 @@ For models which support HOTP and TOTP, there are 2 slots in the OTP interface w
|
|||||||
!!! warning
|
!!! warning
|
||||||
The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key.
|
The firmware of YubiKey is not open-source and is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key.
|
||||||
|
|
||||||
### Nitrokey / Librem Key
|
### Nitrokey
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
|
|
||||||
@ -47,19 +49,39 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
|
|||||||
|
|
||||||
!!! warning
|
!!! warning
|
||||||
|
|
||||||
While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
|
While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
|
||||||
|
|
||||||
!!! warning
|
!!! warning
|
||||||
|
|
||||||
Resetting the OpenPGP interface on a Nitrokey will also make the password database [inaccessible](https://docs.nitrokey.com/pro/factory-reset.html).
|
Resetting the OpenPGP interface on a Nitrokey will also make the password database [inaccessible](https://docs.nitrokey.com/pro/linux/factory-reset).
|
||||||
|
|
||||||
The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. Purism's [Librem Key](https://puri.sm/products/librem-key/) is a rebranded NitroKey Pro 2 with similar firmware and can also be used for the same purposes.
|
The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware.
|
||||||
|
|
||||||
Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable.
|
Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable.
|
||||||
|
|
||||||
!!! tip
|
### Criteria
|
||||||
|
|
||||||
The Nitrokey app, while compatible with Librem Keys, requires `libnitrokey` version 3.6 or above to recognize them. Currently, the package is outdated on Windows, macOS, and most Linux distributions' repository, so you will likely have to compile the Nitrokey app yourself to get it working with the Librem Key. On Linux, you can obtain an up-to-date version from [Flathub](https://flathub.org/apps/details/com.nitrokey.nitrokey-app).
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
#### Minimum Requirements
|
||||||
|
|
||||||
|
- Must use high quality, tamper resistant hardware security modules.
|
||||||
|
- Must support the latest FIDO2 specification.
|
||||||
|
- Must not allow private key extraction.
|
||||||
|
- Devices which cost over $35 must support handling OpenPGP and S/MIME.
|
||||||
|
|
||||||
|
#### Best-Case
|
||||||
|
|
||||||
|
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||||
|
|
||||||
|
- Should be available in USB-C form-factor.
|
||||||
|
- Should be available with NFC.
|
||||||
|
- Should support TOTP secret storage.
|
||||||
|
- Should support secure firmware updates.
|
||||||
|
|
||||||
## Authenticator Apps
|
## Authenticator Apps
|
||||||
|
|
||||||
@ -67,7 +89,7 @@ Authenticator Apps implement a security standard adopted by the Internet Enginee
|
|||||||
|
|
||||||
We highly recommend that you use mobile TOTP apps instead of desktop alternatives as Android and iOS have better security and app isolation than most desktop operating systems.
|
We highly recommend that you use mobile TOTP apps instead of desktop alternatives as Android and iOS have better security and app isolation than most desktop operating systems.
|
||||||
|
|
||||||
### Aegis Authenticator
|
### Aegis Authenticator (Android)
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
|
|
||||||
@ -86,7 +108,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative
|
|||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.beemdevelopment.aegis)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.beemdevelopment.aegis)
|
||||||
- [:simple-github: GitHub](https://github.com/beemdevelopment/Aegis/releases)
|
- [:simple-github: GitHub](https://github.com/beemdevelopment/Aegis/releases)
|
||||||
|
|
||||||
### Raivo OTP
|
### Raivo OTP (iOS)
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
|
|
||||||
@ -102,3 +124,16 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative
|
|||||||
??? downloads
|
??? downloads
|
||||||
|
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/us/app/raivo-otp/id1459042137)
|
- [:simple-appstore: App Store](https://apps.apple.com/us/app/raivo-otp/id1459042137)
|
||||||
|
|
||||||
|
### Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
- Source code must be publicly available.
|
||||||
|
- Must not require internet connectivity.
|
||||||
|
- Must not sync to a third-party cloud sync/backup service.
|
||||||
|
- **Optional** E2EE sync support with OS-native tools is acceptable, e.g. encrypted sync via iCloud.
|
@ -1,9 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: "News Aggregators"
|
title: "News Aggregators"
|
||||||
icon: material/rss
|
icon: material/rss
|
||||||
|
description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS.
|
||||||
|
cover: news-aggregators.png
|
||||||
---
|
---
|
||||||
|
|
||||||
A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favourite blogs and news sites.
|
A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites.
|
||||||
|
|
||||||
## Aggregator clients
|
## Aggregator clients
|
||||||
|
|
||||||
@ -97,10 +99,10 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Twitter and Reddit feeds.
|
**NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://netnewswire.com/privacypolicy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation}
|
[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
|
||||||
|
|
||||||
@ -121,6 +123,17 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k
|
|||||||
[:octicons-info-16:](https://newsboat.org/releases/2.27/docs/newsboat.html){ .card-link title=Documentation}
|
[:octicons-info-16:](https://newsboat.org/releases/2.27/docs/newsboat.html){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/newsboat/newsboat){ .card-link title="Source Code" }
|
||||||
|
|
||||||
|
## Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
- Must be open-source software.
|
||||||
|
- Must operate locally, i.e. must not be a cloud service.
|
||||||
|
|
||||||
## Social Media RSS Support
|
## Social Media RSS Support
|
||||||
|
|
||||||
Some social media services also support RSS although it's not often advertised.
|
Some social media services also support RSS although it's not often advertised.
|
@ -1,76 +0,0 @@
|
|||||||
---
|
|
||||||
title: "Notebooks"
|
|
||||||
icon: material/notebook-edit-outline
|
|
||||||
---
|
|
||||||
|
|
||||||
Keep track of your notes and journalings without giving them to a third-party.
|
|
||||||
|
|
||||||
If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE.
|
|
||||||
|
|
||||||
## Cloud-based
|
|
||||||
|
|
||||||
### Joplin
|
|
||||||
|
|
||||||
!!! recommendation
|
|
||||||
|
|
||||||
{ align=right }
|
|
||||||
|
|
||||||
**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes.
|
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary }
|
|
||||||
[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" }
|
|
||||||
[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation}
|
|
||||||
[:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" }
|
|
||||||
[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute }
|
|
||||||
|
|
||||||
??? downloads
|
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin)
|
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797)
|
|
||||||
- [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases)
|
|
||||||
- [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications)
|
|
||||||
- [:simple-apple: macOS](https://joplinapp.org/#desktop-applications)
|
|
||||||
- [:simple-linux: Linux](https://joplinapp.org/#desktop-applications)
|
|
||||||
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/)
|
|
||||||
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
|
|
||||||
|
|
||||||
Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key.
|
|
||||||
|
|
||||||
### Standard Notes
|
|
||||||
|
|
||||||
!!! recommendation
|
|
||||||
|
|
||||||
{ align=right }
|
|
||||||
|
|
||||||
**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited (PDF)](https://s3.amazonaws.com/standard-notes/security/Report-SN-Audit.pdf).
|
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary }
|
|
||||||
[:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" }
|
|
||||||
[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation}
|
|
||||||
[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" }
|
|
||||||
[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute }
|
|
||||||
|
|
||||||
??? downloads
|
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.standardnotes)
|
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/app/id1285392450)
|
|
||||||
- [:simple-github: GitHub](https://github.com/standardnotes/app/releases)
|
|
||||||
- [:simple-windows11: Windows](https://standardnotes.com)
|
|
||||||
- [:simple-apple: macOS](https://standardnotes.com)
|
|
||||||
- [:simple-linux: Linux](https://standardnotes.com)
|
|
||||||
- [:octicons-globe-16: Web](https://app.standardnotes.com/)
|
|
||||||
|
|
||||||
## Local notebooks
|
|
||||||
|
|
||||||
### Org-mode
|
|
||||||
|
|
||||||
!!! recommendation
|
|
||||||
|
|
||||||
{ align=right }
|
|
||||||
|
|
||||||
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining TODO lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
|
||||||
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
|
||||||
[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" }
|
|
||||||
[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute }
|
|
143
docs/notebooks.md
Normal file
@ -0,0 +1,143 @@
|
|||||||
|
---
|
||||||
|
title: "Notebooks"
|
||||||
|
icon: material/notebook-edit-outline
|
||||||
|
description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party.
|
||||||
|
cover: notebooks.png
|
||||||
|
---
|
||||||
|
|
||||||
|
Keep track of your notes and journalings without giving them to a third-party.
|
||||||
|
|
||||||
|
If you are currently using an application like Evernote, Google Keep, or Microsoft OneNote, we suggest you pick an alternative here that supports E2EE.
|
||||||
|
|
||||||
|
## Cloud-based
|
||||||
|
|
||||||
|
### Standard Notes
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Standard Notes** is a simple and private notes app that makes your notes easy and available everywhere you are. It features E2EE on every platform, and a powerful desktop experience with themes and custom editors. It has also been [independently audited](https://standardnotes.com/help/2/has-standard-notes-completed-a-third-party-security-audit).
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://standardnotes.com){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://standardnotes.com/privacy){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://standardnotes.com/help){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" }
|
||||||
|
[:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribute }
|
||||||
|
|
||||||
|
??? downloads
|
||||||
|
|
||||||
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.standardnotes)
|
||||||
|
- [:simple-appstore: App Store](https://apps.apple.com/app/id1285392450)
|
||||||
|
- [:simple-github: GitHub](https://github.com/standardnotes/app/releases)
|
||||||
|
- [:simple-windows11: Windows](https://standardnotes.com)
|
||||||
|
- [:simple-apple: macOS](https://standardnotes.com)
|
||||||
|
- [:simple-linux: Linux](https://standardnotes.com)
|
||||||
|
- [:octicons-globe-16: Web](https://app.standardnotes.com/)
|
||||||
|
|
||||||
|
### Notesnook
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/).
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" }
|
||||||
|
[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute }
|
||||||
|
|
||||||
|
??? downloads
|
||||||
|
|
||||||
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook)
|
||||||
|
- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013)
|
||||||
|
- [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases)
|
||||||
|
- [:simple-windows11: Windows](https://notesnook.com/downloads)
|
||||||
|
- [:simple-apple: macOS](https://notesnook.com/downloads)
|
||||||
|
- [:simple-linux: Linux](https://notesnook.com/downloads)
|
||||||
|
- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/)
|
||||||
|
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
|
||||||
|
|
||||||
|
Notesnook does not support password/PIN protection on the web & desktop apps. However, you can still lock individual notes, and your data is always encrypted in transit and on your device using your master key.
|
||||||
|
|
||||||
|
### Joplin
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" }
|
||||||
|
[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute }
|
||||||
|
|
||||||
|
??? downloads
|
||||||
|
|
||||||
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin)
|
||||||
|
- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797)
|
||||||
|
- [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases)
|
||||||
|
- [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications)
|
||||||
|
- [:simple-apple: macOS](https://joplinapp.org/#desktop-applications)
|
||||||
|
- [:simple-linux: Linux](https://joplinapp.org/#desktop-applications)
|
||||||
|
- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/)
|
||||||
|
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
|
||||||
|
|
||||||
|
Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key.
|
||||||
|
Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z).
|
||||||
|
|
||||||
|
### Cryptee
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Cryptee** is an open-source, web-based E2EE document editor and photo storage application. Cryptee is a PWA, which means that it works seamlessly across all modern devices without requiring native apps for each respective platform.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://crypt.ee){ .md-button .md-button--primary }
|
||||||
|
[:octicons-eye-16:](https://crypt.ee/privacy){ .card-link title="Privacy Policy" }
|
||||||
|
[:octicons-info-16:](https://crypt.ee/help){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://github.com/cryptee){ .card-link title="Source Code" }
|
||||||
|
|
||||||
|
??? downloads
|
||||||
|
|
||||||
|
- [:octicons-globe-16: PWA](https://crypt.ee/download)
|
||||||
|
|
||||||
|
Cryptee offers 100MB of storage for free, with paid options if you need more. Sign-up doesn't require an e-mail or other personally identifiable information.
|
||||||
|
|
||||||
|
## Local notebooks
|
||||||
|
|
||||||
|
### Org-mode
|
||||||
|
|
||||||
|
!!! recommendation
|
||||||
|
|
||||||
|
{ align=right }
|
||||||
|
|
||||||
|
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
||||||
|
|
||||||
|
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
||||||
|
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
||||||
|
[:octicons-code-16:](https://git.savannah.gnu.org/cgit/emacs/org-mode.git){ .card-link title="Source Code" }
|
||||||
|
[:octicons-heart-16:](https://liberapay.com/bzg){ .card-link title=Contribute }
|
||||||
|
|
||||||
|
## Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
- Clients must be open-source.
|
||||||
|
- Any cloud sync functionality must be E2EE.
|
||||||
|
- Must support exporting documents into a standard format.
|
||||||
|
|
||||||
|
### Best Case
|
||||||
|
|
||||||
|
- Local backup/sync functionality should support encryption.
|
||||||
|
- Cloud-based platforms should support document sharing.
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Android Overview
|
title: Android Overview
|
||||||
icon: simple/android
|
icon: simple/android
|
||||||
|
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||||
---
|
---
|
||||||
Android is a secure operating system that has strong [app sandboxing](https://source.android.com/security/app-sandbox), [Verified Boot](https://source.android.com/security/verifiedboot) (AVB), and a robust [permission](https://developer.android.com/guide/topics/permissions/overview) control system.
|
Android is a secure operating system that has strong [app sandboxing](https://source.android.com/security/app-sandbox), [Verified Boot](https://source.android.com/security/verifiedboot) (AVB), and a robust [permission](https://developer.android.com/guide/topics/permissions/overview) control system.
|
||||||
|
|
||||||
@ -52,9 +53,44 @@ It's important to not use an [end-of-life](https://endoflife.date/android) versi
|
|||||||
|
|
||||||
## Android Permissions
|
## Android Permissions
|
||||||
|
|
||||||
[Permissions on Android](https://developer.android.com/guide/topics/permissions/overview) grant you control over what apps are allowed to access. Google regularly makes [improvements](https://developer.android.com/about/versions/11/privacy/permissions) on the permission system in each successive version. All apps you install are strictly [sandboxed](https://source.android.com/security/app-sandbox), therefore, there is no need to install any antivirus apps. A smartphone with the latest version of Android will always be more secure than an old smartphone with an antivirus that you have paid for. It's better not to pay for antivirus software and to save money to buy a new smartphone such as a Google Pixel.
|
[Permissions on Android](https://developer.android.com/guide/topics/permissions/overview) grant you control over what apps are allowed to access. Google regularly makes [improvements](https://developer.android.com/about/versions/11/privacy/permissions) on the permission system in each successive version. All apps you install are strictly [sandboxed](https://source.android.com/security/app-sandbox), therefore, there is no need to install any antivirus apps.
|
||||||
|
|
||||||
Should you want to run an app that you're unsure about, consider using a user or work profile.
|
A smartphone with the latest version of Android will always be more secure than an old smartphone with an antivirus that you have paid for. It's better not to pay for antivirus software and to save money to buy a new smartphone such as a Google Pixel.
|
||||||
|
|
||||||
|
Android 10:
|
||||||
|
|
||||||
|
- [Scoped Storage](https://developer.android.com/about/versions/10/privacy/changes#scoped-storage) gives you more control over your files and can limit what can [access external storage](https://developer.android.com/training/data-storage#permissions). Apps can have a specific directory in external storage as well as the ability to store specific types of media there.
|
||||||
|
- Tighter access on [device location](https://developer.android.com/about/versions/10/privacy/changes#app-access-device-location) by introducing the `ACCESS_BACKGROUND_LOCATION` permission. This prevents apps from accessing the location when running in the background without express permission from the user.
|
||||||
|
|
||||||
|
Android 11:
|
||||||
|
|
||||||
|
- [One-time permissions](https://developer.android.com/about/versions/11/privacy/permissions#one-time) which allows you to grant a permission to an app just once.
|
||||||
|
- [Auto-reset permissions](https://developer.android.com/about/versions/11/privacy/permissions#auto-reset), which resets [runtime permissions](https://developer.android.com/guide/topics/permissions/overview#runtime) that were granted when the app was opened.
|
||||||
|
- Granular permissions for accessing [phone number](https://developer.android.com/about/versions/11/privacy/permissions#phone-numbers) related features.
|
||||||
|
|
||||||
|
Android 12:
|
||||||
|
|
||||||
|
- A permission to grant only the [approximate location](https://developer.android.com/about/versions/12/behavior-changes-12#approximate-location).
|
||||||
|
- Auto-reset of [hibernated apps](https://developer.android.com/about/versions/12/behavior-changes-12#app-hibernation).
|
||||||
|
- [Data access auditing](https://developer.android.com/about/versions/12/behavior-changes-12#data-access-auditing) which makes it easier to determine what part of an app is performing a specific type of data access.
|
||||||
|
|
||||||
|
Android 13:
|
||||||
|
|
||||||
|
- A permission for [nearby wifi access](https://developer.android.com/about/versions/13/behavior-changes-13#nearby-wifi-devices-permission). The MAC addresses of nearby WiFi access points was a popular way for apps to track a user's location.
|
||||||
|
- More [granular media permissions](https://developer.android.com/about/versions/13/behavior-changes-13#granular-media-permissions), meaning you can grant access to images, videos or audio files only.
|
||||||
|
- Background use of sensors now requires the [`BODY_SENSORS`](https://developer.android.com/about/versions/13/behavior-changes-13#body-sensors-background-permission) permission.
|
||||||
|
|
||||||
|
An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need.
|
||||||
|
|
||||||
|
[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.
|
||||||
|
|
||||||
|
!!! warning
|
||||||
|
|
||||||
|
If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.
|
||||||
|
|
||||||
|
!!! note
|
||||||
|
|
||||||
|
Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
|
||||||
|
|
||||||
## Media Access
|
## Media Access
|
||||||
|
|
||||||
@ -70,7 +106,7 @@ With user profiles, you can impose restrictions on a specific profile, such as:
|
|||||||
|
|
||||||
[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles.
|
[Work Profiles](https://support.google.com/work/android/answer/6191949) are another way to isolate individual apps and may be more convenient than separate user profiles.
|
||||||
|
|
||||||
A **device controller** app such as [Shelter](#recommended-apps) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one.
|
A **device controller** app such as [Shelter](../android.md#shelter) is required to create a Work Profile without an enterprise MDM, unless you're using a custom Android OS which includes one.
|
||||||
|
|
||||||
The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside of the work profile.
|
The work profile is dependent on a device controller to function. Features such as *File Shuttle* and *contact search blocking* or any kind of isolation features must be implemented by the controller. You must also fully trust the device controller app, as it has full access to your data inside of the work profile.
|
||||||
|
|
@ -1,22 +1,23 @@
|
|||||||
---
|
---
|
||||||
title: Linux Overview
|
title: Linux Overview
|
||||||
icon: simple/linux
|
icon: simple/linux
|
||||||
|
description: Linux is an open-source, privacy-focused desktop operating system alternative, but not all distribitions are created equal.
|
||||||
---
|
---
|
||||||
It is often believed that [open-source](https://en.wikipedia.org/wiki/Open-source_software) software is inherently secure because the source code is available. There is an expectation that community verification occurs regularly; however, this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). It does depend on a number of factors, such as project activity, developer experience, level of rigour applied to [code reviews](https://en.wikipedia.org/wiki/Code_review), and how often attention is given to specific parts of the [codebase](https://en.wikipedia.org/wiki/Codebase) that may go untouched for years.
|
It is often believed that [open-source](https://en.wikipedia.org/wiki/Open-source_software) software is inherently secure because the source code is available. There is an expectation that community verification occurs regularly; however, this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). It does depend on a number of factors, such as project activity, developer experience, level of rigor applied to [code reviews](https://en.wikipedia.org/wiki/Code_review), and how often attention is given to specific parts of the [codebase](https://en.wikipedia.org/wiki/Codebase) that may go untouched for years.
|
||||||
|
|
||||||
At the moment, desktop GNU/Linux does have some areas that could be better improved when compared to their proprietary counterparts, e.g.:
|
At the moment, desktop Linux does have some areas that could be better improved when compared to their proprietary counterparts, e.g.:
|
||||||
|
|
||||||
- A verified boot chain, like Apple’s [Secure Boot](https://support.apple.com/guide/security/startup-security-utility-secc7b34e5b5/web) (with [Secure Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1)), Android’s [Verified Boot](https://source.android.com/security/verifiedboot), ChromeOS' [Verified boot](https://www.chromium.org/chromium-os/chromiumos-design-docs/security-overview/#verified-boot), or Microsoft Windows’s [boot process](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process) with [TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). These features and hardware technologies can all help prevent persistent tampering by malware or [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack)
|
- A verified boot chain, like Apple’s [Secure Boot](https://support.apple.com/guide/security/startup-security-utility-secc7b34e5b5/web) (with [Secure Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1)), Android’s [Verified Boot](https://source.android.com/security/verifiedboot), ChromeOS' [Verified boot](https://www.chromium.org/chromium-os/chromiumos-design-docs/security-overview/#verified-boot), or Microsoft Windows’s [boot process](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process) with [TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). These features and hardware technologies can all help prevent persistent tampering by malware or [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack)
|
||||||
- A strong sandboxing solution such as that found in [macOS](https://developer.apple.com/library/archive/documentation/Security/Conceptual/AppSandboxDesignGuide/AboutAppSandbox/AboutAppSandbox.html), [ChromeOS](https://chromium.googlesource.com/chromiumos/docs/+/HEAD/sandboxing.md), and [Android](https://source.android.com/security/app-sandbox). Commonly used Linux sandboxing solutions such as [Flatpak](https://docs.flatpak.org/en/latest/sandbox-permissions.html) and [Firejail](https://firejail.wordpress.com/) still have a long way to go
|
- A strong sandboxing solution such as that found in [macOS](https://developer.apple.com/library/archive/documentation/Security/Conceptual/AppSandboxDesignGuide/AboutAppSandbox/AboutAppSandbox.html), [ChromeOS](https://chromium.googlesource.com/chromiumos/docs/+/HEAD/sandboxing.md), and [Android](https://source.android.com/security/app-sandbox). Commonly used Linux sandboxing solutions such as [Flatpak](https://docs.flatpak.org/en/latest/sandbox-permissions.html) and [Firejail](https://firejail.wordpress.com/) still have a long way to go
|
||||||
- Strong [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations)
|
- Strong [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations)
|
||||||
|
|
||||||
Despite these drawbacks, desktop GNU/Linux distributions are great if you want to:
|
Despite these drawbacks, desktop Linux distributions are great if you want to:
|
||||||
|
|
||||||
- Avoid telemetry that often comes with proprietary operating systems
|
- Avoid telemetry that often comes with proprietary operating systems
|
||||||
- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms)
|
- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms)
|
||||||
- Have privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/)
|
- Have privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/)
|
||||||
|
|
||||||
Our website generally uses the term “Linux” to describe desktop GNU/Linux distributions. Other operating systems which also use the Linux kernel such as ChromeOS, Android, and Qubes OS are not discussed here.
|
Our website generally uses the term “Linux” to describe desktop Linux distributions. Other operating systems which also use the Linux kernel such as ChromeOS, Android, and Qubes OS are not discussed here.
|
||||||
|
|
||||||
[Our Linux Recommendations :material-arrow-right-drop-circle:](../desktop.md){ .md-button }
|
[Our Linux Recommendations :material-arrow-right-drop-circle:](../desktop.md){ .md-button }
|
||||||
|
|
||||||
@ -33,7 +34,7 @@ For frozen distributions such as [Debian](https://www.debian.org/security/faq#ha
|
|||||||
We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this:
|
We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this:
|
||||||
|
|
||||||
<div class="yt-embed">
|
<div class="yt-embed">
|
||||||
<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/i8c0mg_mS7U" title="Regular Releases are Wrong, Roll for your life" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
<iframe width="560" height="315" src="https://invidious.privacyguides.net/embed/i8c0mg_mS7U?local=true" title="Regular Releases are Wrong, Roll for your life" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
### Traditional vs Atomic updates
|
### Traditional vs Atomic updates
|
||||||
@ -47,7 +48,7 @@ A transactional update system creates a snapshot that is made before and after a
|
|||||||
The Atomic update method is used for immutable distributions like Silverblue, Tumbleweed, and NixOS and can achieve reliability with this model. [Adam Šamalík](https://twitter.com/adsamalik) provided a presentation on how `rpm-ostree` works with Silverblue:
|
The Atomic update method is used for immutable distributions like Silverblue, Tumbleweed, and NixOS and can achieve reliability with this model. [Adam Šamalík](https://twitter.com/adsamalik) provided a presentation on how `rpm-ostree` works with Silverblue:
|
||||||
|
|
||||||
<div class="yt-embed">
|
<div class="yt-embed">
|
||||||
<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/-hpV5l-gJnQ" title="Let's try Fedora Silverblue — an immutable desktop OS! - Adam Šamalik" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
<iframe width="560" height="315" src="https://invidious.privacyguides.net/embed/-hpV5l-gJnQ?local=true" title="Let's try Fedora Silverblue — an immutable desktop OS! - Adam Šamalik" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
### “Security-focused” distributions
|
### “Security-focused” distributions
|
||||||
@ -89,7 +90,7 @@ Consider using [ZRAM](https://wiki.archlinux.org/title/Swap#zram-generator) or [
|
|||||||
|
|
||||||
### Wayland
|
### Wayland
|
||||||
|
|
||||||
We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol as it developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor, [X11](https://en.wikipedia.org/wiki/X_Window_System), does not support GUI isolation, allowing all windows to [record screen, log and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences and are not convenient to set up and are not preferable over Wayland.
|
We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor, [X11](https://en.wikipedia.org/wiki/X_Window_System), does not support GUI isolation, allowing all windows to [record screen, log and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences and are not convenient to set up and are not preferable over Wayland.
|
||||||
|
|
||||||
Fortunately, common environments such as [GNOME](https://www.gnome.org), [KDE](https://kde.org), and the window manager [Sway](https://swaywm.org) have support for Wayland. Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/scan.php?page=news_item&px=X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)).
|
Fortunately, common environments such as [GNOME](https://www.gnome.org), [KDE](https://kde.org), and the window manager [Sway](https://swaywm.org) have support for Wayland. Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/scan.php?page=news_item&px=X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)).
|
||||||
|
|
||||||
@ -101,11 +102,19 @@ Linux distributions such as those which are [Linux-libre](https://en.wikipedia.o
|
|||||||
|
|
||||||
We **highly recommend** that you install the microcode updates, as your CPU is already running the proprietary microcode from the factory. Fedora and openSUSE both have the microcode updates applied by default.
|
We **highly recommend** that you install the microcode updates, as your CPU is already running the proprietary microcode from the factory. Fedora and openSUSE both have the microcode updates applied by default.
|
||||||
|
|
||||||
|
### Updates
|
||||||
|
|
||||||
|
Most Linux distributions will automatically install updates or remind you to do so. It is important to keep your OS up to date so that your software is patched when a vulnerability is found.
|
||||||
|
|
||||||
|
Some distributions (particularly those aimed at advanced users) are more barebones and expect you to do things yourself (e.g. Arch or Debian). These will require running the "package manager" (`apt`, `pacman`, `dnf`, etc.) manually in order to receive important security updates.
|
||||||
|
|
||||||
|
Additionally, some distributions will not download firmware updates automatically. For that you will need to install [`fwupd`](https://wiki.archlinux.org/title/Fwupd).
|
||||||
|
|
||||||
## Privacy Tweaks
|
## Privacy Tweaks
|
||||||
|
|
||||||
### MAC Address Randomization
|
### MAC Address Randomization
|
||||||
|
|
||||||
Many desktop Linux distributions (Fedora, openSUSE, etc) will come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), to configure Ethernet and Wi-Fi settings.
|
Many desktop Linux distributions (Fedora, openSUSE, etc.) will come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager), to configure Ethernet and Wi-Fi settings.
|
||||||
|
|
||||||
It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous.
|
It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous.
|
||||||
|
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: "Qubes Overview"
|
title: "Qubes Overview"
|
||||||
icon: simple/qubesos
|
icon: simple/qubesos
|
||||||
|
description: Qubes is an operating system built around isolating apps within virtual machines for heightened security.
|
||||||
---
|
---
|
||||||
[**Qubes OS**](../desktop.md#qubes-os) is an operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated virtual machines. Each VM is called a *Qube* and you can assign each Qube a level of trust based on its purpose. As Qubes OS provides security by using isolation, and only permitting actions on a per case basis, it is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/).
|
[**Qubes OS**](../desktop.md#qubes-os) is an operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated virtual machines. Each VM is called a *Qube* and you can assign each Qube a level of trust based on its purpose. As Qubes OS provides security by using isolation, and only permitting actions on a per case basis, it is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/).
|
||||||
|
|
||||||
@ -18,7 +19,7 @@ Each Qubes application has a [colored border](https://www.qubes-os.org/screensho
|
|||||||
|
|
||||||
## Why Should I use Qubes?
|
## Why Should I use Qubes?
|
||||||
|
|
||||||
Qubes OS is useful if your [threat model](../basics/threat-modeling.md) requires strong compartmentalization and security, such as if you think you'll be opening untrusted files from untrusted sources. A typical use-case for Qubes OS is for opening documents from an unknown source.
|
Qubes OS is useful if your [threat model](../basics/threat-modeling.md) requires strong compartmentalization and security, such as if you think you'll be opening untrusted files from untrusted sources. A typical reason for using Qubes OS is to open documents from unknown sources.
|
||||||
|
|
||||||
Qubes OS utilizes [Dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM (i.e., an "AdminVM") for controlling other guest VMs or Qubes on the host OS. Other VMs display individual application windows within Dom0's desktop environment. It allows you to color code windows based on trust levels and run apps that can interact with each other with very granular control.
|
Qubes OS utilizes [Dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM (i.e., an "AdminVM") for controlling other guest VMs or Qubes on the host OS. Other VMs display individual application windows within Dom0's desktop environment. It allows you to color code windows based on trust levels and run apps that can interact with each other with very granular control.
|
||||||
|
|
||||||
@ -33,7 +34,7 @@ You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste
|
|||||||
|
|
||||||
### File Exchange
|
### File Exchange
|
||||||
|
|
||||||
To copy and paste files and directories (folders) from one VM to another, you can use the option **Copy to Other AppVM...** or **Move to Other AppVM...**. The difference is that the **Move** option will delete the original file. Either option will protect your clipboard from being leaked to any other Qubes. This is more security than air-gapped file transfer because an air-gapped computer will still be forced to parse partitions or file systems. That is not required with the inter-qube copy system.
|
To copy and paste files and directories (folders) from one VM to another, you can use the option **Copy to Other AppVM...** or **Move to Other AppVM...**. The difference is that the **Move** option will delete the original file. Either option will protect your clipboard from being leaked to any other Qubes. This is more secure than air-gapped file transfer because an air-gapped computer will still be forced to parse partitions or file systems. That is not required with the inter-qube copy system.
|
||||||
|
|
||||||
??? info "AppVMs or qubes do not have their own file systems"
|
??? info "AppVMs or qubes do not have their own file systems"
|
||||||
|
|
@ -1,11 +1,132 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
|
||||||
title: "Password Managers"
|
title: "Password Managers"
|
||||||
icon: material/form-textbox-password
|
icon: material/form-textbox-password
|
||||||
|
description: Password managers allow you to securely store and manage passwords and other credentials.
|
||||||
|
cover: passwords.png
|
||||||
|
schema:
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": WebPage
|
||||||
|
name: Password Manager Recommendations
|
||||||
|
url: "./"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": SoftwareApplication
|
||||||
|
name: Bitwarden
|
||||||
|
image: /assets/img/password-management/bitwarden.svg
|
||||||
|
url: https://bitwarden.com
|
||||||
|
sameAs: https://en.wikipedia.org/wiki/Bitwarden
|
||||||
|
applicationCategory: Password Manager
|
||||||
|
operatingSystem:
|
||||||
|
- Windows
|
||||||
|
- macOS
|
||||||
|
- Linux
|
||||||
|
- Android
|
||||||
|
- iOS
|
||||||
|
subjectOf:
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": SoftwareApplication
|
||||||
|
name: 1Password
|
||||||
|
image: /assets/img/password-management/1password.svg
|
||||||
|
url: https://1password.com
|
||||||
|
sameAs: https://en.wikipedia.org/wiki/1Password
|
||||||
|
applicationCategory: Password Manager
|
||||||
|
operatingSystem:
|
||||||
|
- Windows
|
||||||
|
- macOS
|
||||||
|
- Linux
|
||||||
|
- Android
|
||||||
|
- iOS
|
||||||
|
subjectOf:
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": SoftwareApplication
|
||||||
|
name: Psono
|
||||||
|
image: /assets/img/password-management/psono.svg
|
||||||
|
url: https://psono.com
|
||||||
|
applicationCategory: Password Manager
|
||||||
|
operatingSystem:
|
||||||
|
- Android
|
||||||
|
- iOS
|
||||||
|
subjectOf:
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": SoftwareApplication
|
||||||
|
name: KeePassXC
|
||||||
|
image: /assets/img/password-management/keepassxc.svg
|
||||||
|
url: https://keepassxc.org/
|
||||||
|
sameAs: https://en.wikipedia.org/wiki/KeePassXC
|
||||||
|
applicationCategory: Password Manager
|
||||||
|
operatingSystem:
|
||||||
|
- Windows
|
||||||
|
- macOS
|
||||||
|
- Linux
|
||||||
|
subjectOf:
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": SoftwareApplication
|
||||||
|
name: KeePassDX
|
||||||
|
image: /assets/img/password-management/keepassdx.svg
|
||||||
|
url: https://www.keepassdx.com/
|
||||||
|
applicationCategory: Password Manager
|
||||||
|
operatingSystem: Android
|
||||||
|
subjectOf:
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": SoftwareApplication
|
||||||
|
name: Strongbox
|
||||||
|
image: /assets/img/password-management/strongbox.svg
|
||||||
|
url: https://strongboxsafe.com/
|
||||||
|
applicationCategory: Password Manager
|
||||||
|
operatingSystem: iOS
|
||||||
|
subjectOf:
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": SoftwareApplication
|
||||||
|
name: gopass
|
||||||
|
image: /assets/img/password-management/gopass.svg
|
||||||
|
url: https://www.gopass.pw/
|
||||||
|
applicationCategory: Password Manager
|
||||||
|
operatingSystem:
|
||||||
|
- Windows
|
||||||
|
- macOS
|
||||||
|
- Linux
|
||||||
|
- FreeBSD
|
||||||
|
subjectOf:
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
---
|
---
|
||||||
Password managers allow you to securely store and manage passwords and other credentials with the use of a master password.
|
Password managers allow you to securely store and manage passwords and other credentials with the use of a master password.
|
||||||
|
|
||||||
[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md)
|
[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md)
|
||||||
|
|
||||||
|
!!! info
|
||||||
|
|
||||||
|
Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have.
|
||||||
|
|
||||||
|
For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default.
|
||||||
|
|
||||||
## Cloud-based
|
## Cloud-based
|
||||||
|
|
||||||
These password managers sync your passwords to a cloud server for easy accessibility from all your devices and safety against device loss.
|
These password managers sync your passwords to a cloud server for easy accessibility from all your devices and safety against device loss.
|
||||||
@ -57,7 +178,7 @@ Bitwarden's server-side code is [open-source](https://github.com/bitwarden/serve
|
|||||||
**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf).
|
**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://support.1password.com/1password-privacy/){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation}
|
[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation}
|
||||||
|
|
||||||
??? downloads
|
??? downloads
|
||||||
@ -67,7 +188,6 @@ Bitwarden's server-side code is [open-source](https://github.com/bitwarden/serve
|
|||||||
- [:simple-windows11: Windows](https://1password.com/downloads/windows/)
|
- [:simple-windows11: Windows](https://1password.com/downloads/windows/)
|
||||||
- [:simple-apple: macOS](https://1password.com/downloads/mac/)
|
- [:simple-apple: macOS](https://1password.com/downloads/mac/)
|
||||||
- [:simple-linux: Linux](https://1password.com/downloads/linux/)
|
- [:simple-linux: Linux](https://1password.com/downloads/linux/)
|
||||||
|
|
||||||
|
|
||||||
Traditionally, **1Password** has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. It boasts many features geared towards families and less technical people, as well as advanced functionality.
|
Traditionally, **1Password** has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. It boasts many features geared towards families and less technical people, as well as advanced functionality.
|
||||||
|
|
||||||
@ -85,7 +205,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native
|
|||||||
|
|
||||||
[:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://psono.com){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://psono.com/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
[:octicons-info-16:](https://doc.psono.com/){ .card-link title=Documentation}
|
[:octicons-info-16:](https://doc.psono.com){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Source Code" }
|
||||||
|
|
||||||
??? downloads
|
??? downloads
|
||||||
@ -96,7 +216,30 @@ One advantage 1Password has over Bitwarden is its first-class support for native
|
|||||||
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo)
|
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo)
|
||||||
- [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
|
- [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
|
||||||
|
|
||||||
Psono provides [extensive documentation](https://doc.psono.com/) for their product. The [web-client](https://doc.psono.com/admin/installation/install-webclient.html#installation-with-docker) for Psono can be self-hosted; alternatively, you can choose the full [Community Edition](https://doc.psono.com/admin/installation/install-server-ce.html) or the [Enterprise Edition](https://doc.psono.com/admin/installation/install-server-ee.html) with additional features.
|
Psono provides extensive documentation for their product. The web-client for Psono can be self-hosted; alternatively, you can choose the full Community Edition or the Enterprise Edition with additional features.
|
||||||
|
|
||||||
|
### Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
#### Minimum Requirements
|
||||||
|
|
||||||
|
- Must utilize strong, standards-based/modern E2EE.
|
||||||
|
- Must have thoroughly documented encryption and security practices.
|
||||||
|
- Must have a published audit from a reputable, independent third-party.
|
||||||
|
- All non-essential telemetry must be optional.
|
||||||
|
- Must not collect more PII than is necessary for billing purposes.
|
||||||
|
|
||||||
|
#### Best-Case
|
||||||
|
|
||||||
|
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||||
|
|
||||||
|
- Telemetry should be opt-in (disabled by default) or not collected at all.
|
||||||
|
- Should be open-source and reasonably self-hostable.
|
||||||
|
|
||||||
## Local Storage
|
## Local Storage
|
||||||
|
|
||||||
@ -165,11 +308,11 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se
|
|||||||
|
|
||||||
Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface.
|
Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface.
|
||||||
|
|
||||||
## Command-line
|
### Command-line
|
||||||
|
|
||||||
These products are minimal password managers that can be used within scripting applications.
|
These products are minimal password managers that can be used within scripting applications.
|
||||||
|
|
||||||
### gopass
|
#### gopass
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
|
|
||||||
@ -188,3 +331,13 @@ These products are minimal password managers that can be used within scripting a
|
|||||||
- [:simple-apple: macOS](https://www.gopass.pw/#install-macos)
|
- [:simple-apple: macOS](https://www.gopass.pw/#install-macos)
|
||||||
- [:simple-linux: Linux](https://www.gopass.pw/#install-linux)
|
- [:simple-linux: Linux](https://www.gopass.pw/#install-linux)
|
||||||
- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd)
|
- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd)
|
||||||
|
|
||||||
|
### Criteria
|
||||||
|
|
||||||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||||||
|
|
||||||
|
!!! example "This section is new"
|
||||||
|
|
||||||
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
|
- Must be cross-platform.
|