Compare commits
28 Commits
Author | SHA1 | Date | |
---|---|---|---|
d63dc04aff
|
|||
e336699480
|
|||
aaec10b83e
|
|||
9cbebf239b
|
|||
97350b6245
|
|||
f0621e257b | |||
1ac4dd75c7
|
|||
4c8cd3f295
|
|||
bfaba1cd11 | |||
66efe4a27f
|
|||
657e977074 | |||
f516235dd4
|
|||
cc696093ce
|
|||
4da25bc39a
|
|||
6245ed8581
|
|||
d9b9092ac3
|
|||
7a6fc90114
|
|||
ef7cf862d4
|
|||
f396afa15f
|
|||
227609f768
|
|||
425914a33d | |||
131f91ad56 | |||
9b008f2b76 | |||
2a4947bd72 | |||
829883c450 | |||
e52286a1b0 | |||
2a85daa3fa | |||
052671197b
|
2
.github/workflows/crowdin-download.yml
vendored
@ -5,6 +5,8 @@ on:
|
|||||||
release:
|
release:
|
||||||
types: [ published ]
|
types: [ published ]
|
||||||
|
|
||||||
|
permissions: write-all
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
synchronize-with-crowdin:
|
synchronize-with-crowdin:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
|
1
.github/workflows/crowdin-upload.yml
vendored
@ -23,7 +23,6 @@ jobs:
|
|||||||
with:
|
with:
|
||||||
upload_sources: true
|
upload_sources: true
|
||||||
upload_sources_args: '--auto-update --delete-obsolete'
|
upload_sources_args: '--auto-update --delete-obsolete'
|
||||||
upload_translations: false
|
|
||||||
download_translations: false
|
download_translations: false
|
||||||
config: crowdin.yml
|
config: crowdin.yml
|
||||||
env:
|
env:
|
||||||
|
9
.github/workflows/pages.yml
vendored
@ -11,7 +11,7 @@ concurrency:
|
|||||||
cancel-in-progress: true
|
cancel-in-progress: true
|
||||||
|
|
||||||
env:
|
env:
|
||||||
PYTHON_VERSION: 3.x
|
PYTHON_VERSION: 3.8
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
build:
|
build:
|
||||||
@ -34,7 +34,7 @@ jobs:
|
|||||||
- name: Python setup
|
- name: Python setup
|
||||||
uses: actions/setup-python@v4
|
uses: actions/setup-python@v4
|
||||||
with:
|
with:
|
||||||
python-version: '3.10'
|
python-version: '3.8'
|
||||||
|
|
||||||
- name: Cache files
|
- name: Cache files
|
||||||
uses: actions/cache@v3.2.6
|
uses: actions/cache@v3.2.6
|
||||||
@ -52,7 +52,10 @@ jobs:
|
|||||||
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
CARDS: true
|
CARDS: true
|
||||||
run: |
|
run: |
|
||||||
pipenv run mkdocs build --config-file mkdocs.production.yml
|
pipenv run mkdocs build --config-file config/mkdocs.en.yml
|
||||||
|
pipenv run mkdocs build --config-file config/mkdocs.fr.yml
|
||||||
|
pipenv run mkdocs build --config-file config/mkdocs.he.yml
|
||||||
|
pipenv run mkdocs build --config-file config/mkdocs.nl.yml
|
||||||
mv .well-known site/
|
mv .well-known site/
|
||||||
pipenv run mkdocs --version
|
pipenv run mkdocs --version
|
||||||
|
|
||||||
|
6
.gitmodules
vendored
@ -1,6 +1,6 @@
|
|||||||
[submodule "mkdocs-material-insiders"]
|
[submodule "mkdocs-material-insiders"]
|
||||||
path = mkdocs-material
|
path = modules/mkdocs-material
|
||||||
url = git@github.com:privacyguides/mkdocs-material-insiders.git
|
url = git@github.com:privacyguides/mkdocs-material-insiders.git
|
||||||
[submodule "docs/assets/brand"]
|
[submodule "theme/assets/brand"]
|
||||||
path = docs/assets/brand
|
path = theme/assets/brand
|
||||||
url = https://github.com/privacyguides/brand.git
|
url = https://github.com/privacyguides/brand.git
|
||||||
|
1
Brewfile.netlify
Normal file
@ -0,0 +1 @@
|
|||||||
|
brew "pngquant"
|
3
Pipfile
@ -5,14 +5,13 @@ name = "pypi"
|
|||||||
|
|
||||||
[packages]
|
[packages]
|
||||||
mkdocs = "*"
|
mkdocs = "*"
|
||||||
mkdocs-material = {path = "./mkdocs-material"}
|
|
||||||
mkdocs-static-i18n = "*"
|
|
||||||
mkdocs-git-revision-date-localized-plugin = "*"
|
mkdocs-git-revision-date-localized-plugin = "*"
|
||||||
typing-extensions = "*"
|
typing-extensions = "*"
|
||||||
mkdocs-git-committers-plugin-2 = "*"
|
mkdocs-git-committers-plugin-2 = "*"
|
||||||
mkdocs-macros-plugin = "*"
|
mkdocs-macros-plugin = "*"
|
||||||
pillow = "*"
|
pillow = "*"
|
||||||
cairosvg = "*"
|
cairosvg = "*"
|
||||||
|
mkdocs-material = {path = "./modules/mkdocs-material"}
|
||||||
|
|
||||||
[dev-packages]
|
[dev-packages]
|
||||||
scour = "*"
|
scour = "*"
|
||||||
|
118
Pipfile.lock
generated
@ -1,7 +1,7 @@
|
|||||||
{
|
{
|
||||||
"_meta": {
|
"_meta": {
|
||||||
"hash": {
|
"hash": {
|
||||||
"sha256": "e58ad55b2281815cbad8bd08738bc446b516cd8a1892d8d6df9e27dc709e4b76"
|
"sha256": "bbd8e3cc3fd584b0dfa5e2cdf3c7d1b2d1409bcd44cfdb359673fd6b89cae8bd"
|
||||||
},
|
},
|
||||||
"pipfile-spec": 6,
|
"pipfile-spec": 6,
|
||||||
"requires": {
|
"requires": {
|
||||||
@ -18,11 +18,11 @@
|
|||||||
"default": {
|
"default": {
|
||||||
"babel": {
|
"babel": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
"sha256:1ad3eca1c885218f6dce2ab67291178944f810a10a9b5f3cb8382a5a232b64fe",
|
"sha256:b4246fb7677d3b98f501a39d43396d3cafdc8eadb045f4a31be01863f655c610",
|
||||||
"sha256:5ef4b3226b0180dedded4229651c8b0e1a3a6a2837d45a073272f313e4cf97f6"
|
"sha256:cc2d99999cd01d44420ae725a21c9e3711b3aadc7976d6147f622d8581963455"
|
||||||
],
|
],
|
||||||
"markers": "python_version >= '3.6'",
|
"markers": "python_version >= '3.7'",
|
||||||
"version": "==2.11.0"
|
"version": "==2.12.1"
|
||||||
},
|
},
|
||||||
"beautifulsoup4": {
|
"beautifulsoup4": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
@ -215,7 +215,6 @@
|
|||||||
"sha256:f9d0c5c045a3ca9bedfc35dca8526798eb91a07aa7a2c0fee134c6c6f321cbd7",
|
"sha256:f9d0c5c045a3ca9bedfc35dca8526798eb91a07aa7a2c0fee134c6c6f321cbd7",
|
||||||
"sha256:ff6f3db31555657f3163b15a6b7c6938d08df7adbfc9dd13d9d19edad678f1e8"
|
"sha256:ff6f3db31555657f3163b15a6b7c6938d08df7adbfc9dd13d9d19edad678f1e8"
|
||||||
],
|
],
|
||||||
"markers": "python_version >= '3.6'",
|
|
||||||
"version": "==3.0.1"
|
"version": "==3.0.1"
|
||||||
},
|
},
|
||||||
"click": {
|
"click": {
|
||||||
@ -275,11 +274,11 @@
|
|||||||
},
|
},
|
||||||
"gitpython": {
|
"gitpython": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
"sha256:769c2d83e13f5d938b7688479da374c4e3d49f71549aaf462b646db9602ea6f8",
|
"sha256:8ce3bcf69adfdf7c7d503e78fd3b1c492af782d58893b650adb2ac8912ddd573",
|
||||||
"sha256:cd455b0000615c60e286208ba540271af9fe531fa6a87cc590a7298785ab2882"
|
"sha256:f04893614f6aa713a60cbbe1e6a97403ef633103cdd0ef5eb6efe0deb98dbe8d"
|
||||||
],
|
],
|
||||||
"markers": "python_version >= '3.7'",
|
"markers": "python_version >= '3.7'",
|
||||||
"version": "==3.1.30"
|
"version": "==3.1.31"
|
||||||
},
|
},
|
||||||
"idna": {
|
"idna": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
@ -398,11 +397,11 @@
|
|||||||
},
|
},
|
||||||
"markdown2": {
|
"markdown2": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
"sha256:62156ad2426249a1d1a9059cfe7eab712ff2f397660991b1796c342c19bfa922",
|
"sha256:7d49ca871d3e0e412c65d7d21fcbc13ae897f7876f3e5f14dd4db3b7fbf27f10",
|
||||||
"sha256:dfb52ff4007389567b391ce8fa3cff3dd363d1f282d20205383c6a710f9870d1"
|
"sha256:90475aca3d9c8e7df6d70c51de5bbbe9edf7fcf6a380bd1044d321500f5445da"
|
||||||
],
|
],
|
||||||
"markers": "python_version >= '3.5' and python_version < '4'",
|
"markers": "python_version >= '3.5' and python_version < '4'",
|
||||||
"version": "==2.4.7"
|
"version": "==2.4.8"
|
||||||
},
|
},
|
||||||
"markupsafe": {
|
"markupsafe": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
@ -501,8 +500,8 @@
|
|||||||
"version": "==0.7.0"
|
"version": "==0.7.0"
|
||||||
},
|
},
|
||||||
"mkdocs-material": {
|
"mkdocs-material": {
|
||||||
"path": "./mkdocs-material",
|
"path": "./modules/mkdocs-material",
|
||||||
"version": "==9.0.11+insiders.4.30.0"
|
"version": "==9.0.15+insiders.4.32.1"
|
||||||
},
|
},
|
||||||
"mkdocs-material-extensions": {
|
"mkdocs-material-extensions": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
@ -512,13 +511,6 @@
|
|||||||
"markers": "python_version >= '3.7'",
|
"markers": "python_version >= '3.7'",
|
||||||
"version": "==1.1.1"
|
"version": "==1.1.1"
|
||||||
},
|
},
|
||||||
"mkdocs-static-i18n": {
|
|
||||||
"hashes": [
|
|
||||||
"sha256:eccd819e727bc91bb58cc7c34230266f9e475abfbc11ace1e4c1f262969e2c2e"
|
|
||||||
],
|
|
||||||
"index": "pypi",
|
|
||||||
"version": "==0.53"
|
|
||||||
},
|
|
||||||
"packaging": {
|
"packaging": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
"sha256:714ac14496c3e68c99c29b00845f7a2b85f3bb6f1078fd9f72fd20f0570002b2",
|
"sha256:714ac14496c3e68c99c29b00845f7a2b85f3bb6f1078fd9f72fd20f0570002b2",
|
||||||
@ -618,11 +610,11 @@
|
|||||||
},
|
},
|
||||||
"pipdeptree": {
|
"pipdeptree": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
"sha256:8c012fd8ee79083806db9d1410a44648f71dba11364719aa40ed718f4762e964",
|
"sha256:cd167f38264c44ed41d3de0e8d7f47d4fbcbe6592587266e0219b8c056416c6b",
|
||||||
"sha256:9d666f77ff1b9528d01b3d98594096484f56de70d752abe22f13e681be239bd8"
|
"sha256:ef17672a0ec47ae97ae9d50f98eabe209609ffd08e8b4abdc2e8e20bf499b151"
|
||||||
],
|
],
|
||||||
"markers": "python_version >= '3.7'",
|
"markers": "python_version >= '3.7'",
|
||||||
"version": "==2.3.3"
|
"version": "==2.5.0"
|
||||||
},
|
},
|
||||||
"pycparser": {
|
"pycparser": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
@ -851,11 +843,11 @@
|
|||||||
},
|
},
|
||||||
"soupsieve": {
|
"soupsieve": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
"sha256:3b2503d3c7084a42b1ebd08116e5f81aadfaea95863628c80a3b774a11b7c759",
|
"sha256:49e5368c2cda80ee7e84da9dbe3e110b70a4575f196efb74e51b94549d921955",
|
||||||
"sha256:fc53893b3da2c33de295667a0e19f078c14bf86544af307354de5fcf12a3f30d"
|
"sha256:e28dba9ca6c7c00173e34e4ba57448f0688bb681b7c5e8bf4971daafc093d69a"
|
||||||
],
|
],
|
||||||
"markers": "python_version >= '3.6'",
|
"markers": "python_version >= '3.7'",
|
||||||
"version": "==2.3.2.post1"
|
"version": "==2.4"
|
||||||
},
|
},
|
||||||
"termcolor": {
|
"termcolor": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
@ -875,11 +867,11 @@
|
|||||||
},
|
},
|
||||||
"typing-extensions": {
|
"typing-extensions": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
"sha256:1511434bb92bf8dd198c12b1cc812e800d4181cfcb867674e0f8279cc93087aa",
|
"sha256:5cb5f4a79139d699607b3ef622a1dedafa84e115ab0024e0d9c044a9479ca7cb",
|
||||||
"sha256:16fa4864408f655d35ec496218b85f79b3437c829e93320c7c9215ccfd92489e"
|
"sha256:fb33085c39dd998ac16d1431ebc293a8b3eedd00fd4a32de0ff79002c19511b4"
|
||||||
],
|
],
|
||||||
"index": "pypi",
|
"index": "pypi",
|
||||||
"version": "==4.4.0"
|
"version": "==4.5.0"
|
||||||
},
|
},
|
||||||
"urllib3": {
|
"urllib3": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
@ -891,37 +883,37 @@
|
|||||||
},
|
},
|
||||||
"watchdog": {
|
"watchdog": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
"sha256:102a60093090fc3ff76c983367b19849b7cc24ec414a43c0333680106e62aae1",
|
"sha256:03f342a9432fe08107defbe8e405a2cb922c5d00c4c6c168c68b633c64ce6190",
|
||||||
"sha256:17f1708f7410af92ddf591e94ae71a27a13974559e72f7e9fde3ec174b26ba2e",
|
"sha256:0d9878be36d2b9271e3abaa6f4f051b363ff54dbbe7e7df1af3c920e4311ee43",
|
||||||
"sha256:195ab1d9d611a4c1e5311cbf42273bc541e18ea8c32712f2fb703cfc6ff006f9",
|
"sha256:0e1dd6d449267cc7d6935d7fe27ee0426af6ee16578eed93bacb1be9ff824d2d",
|
||||||
"sha256:4cb5ecc332112017fbdb19ede78d92e29a8165c46b68a0b8ccbd0a154f196d5e",
|
"sha256:2caf77ae137935c1466f8cefd4a3aec7017b6969f425d086e6a528241cba7256",
|
||||||
"sha256:5100eae58133355d3ca6c1083a33b81355c4f452afa474c2633bd2fbbba398b3",
|
"sha256:3d2dbcf1acd96e7a9c9aefed201c47c8e311075105d94ce5e899f118155709fd",
|
||||||
"sha256:61fdb8e9c57baf625e27e1420e7ca17f7d2023929cd0065eb79c83da1dfbeacd",
|
"sha256:4109cccf214b7e3462e8403ab1e5b17b302ecce6c103eb2fc3afa534a7f27b96",
|
||||||
"sha256:6ccd8d84b9490a82b51b230740468116b8205822ea5fdc700a553d92661253a3",
|
"sha256:4cd61f98cb37143206818cb1786d2438626aa78d682a8f2ecee239055a9771d5",
|
||||||
"sha256:6e01d699cd260d59b84da6bda019dce0a3353e3fcc774408ae767fe88ee096b7",
|
"sha256:53f3e95081280898d9e4fc51c5c69017715929e4eea1ab45801d5e903dd518ad",
|
||||||
"sha256:748ca797ff59962e83cc8e4b233f87113f3cf247c23e6be58b8a2885c7337aa3",
|
"sha256:564e7739abd4bd348aeafbf71cc006b6c0ccda3160c7053c4a53b67d14091d42",
|
||||||
"sha256:83a7cead445008e880dbde833cb9e5cc7b9a0958edb697a96b936621975f15b9",
|
"sha256:5b848c71ef2b15d0ef02f69da8cc120d335cec0ed82a3fa7779e27a5a8527225",
|
||||||
"sha256:8586d98c494690482c963ffb24c49bf9c8c2fe0589cec4dc2f753b78d1ec301d",
|
"sha256:5defe4f0918a2a1a4afbe4dbb967f743ac3a93d546ea4674567806375b024adb",
|
||||||
"sha256:8b5cde14e5c72b2df5d074774bdff69e9b55da77e102a91f36ef26ca35f9819c",
|
"sha256:6f5d0f7eac86807275eba40b577c671b306f6f335ba63a5c5a348da151aba0fc",
|
||||||
"sha256:8c28c23972ec9c524967895ccb1954bc6f6d4a557d36e681a36e84368660c4ce",
|
"sha256:7a1876f660e32027a1a46f8a0fa5747ad4fcf86cb451860eae61a26e102c8c79",
|
||||||
"sha256:967636031fa4c4955f0f3f22da3c5c418aa65d50908d31b73b3b3ffd66d60640",
|
"sha256:7a596f9415a378d0339681efc08d2249e48975daae391d58f2e22a3673b977cf",
|
||||||
"sha256:96cbeb494e6cbe3ae6aacc430e678ce4b4dd3ae5125035f72b6eb4e5e9eb4f4e",
|
"sha256:85bf2263290591b7c5fa01140601b64c831be88084de41efbcba6ea289874f44",
|
||||||
"sha256:978a1aed55de0b807913b7482d09943b23a2d634040b112bdf31811a422f6344",
|
"sha256:8a4d484e846dcd75e96b96d80d80445302621be40e293bfdf34a631cab3b33dc",
|
||||||
"sha256:a09483249d25cbdb4c268e020cb861c51baab2d1affd9a6affc68ffe6a231260",
|
"sha256:8f2df370cd8e4e18499dd0bfdef476431bcc396108b97195d9448d90924e3131",
|
||||||
"sha256:a480d122740debf0afac4ddd583c6c0bb519c24f817b42ed6f850e2f6f9d64a8",
|
"sha256:91fd146d723392b3e6eb1ac21f122fcce149a194a2ba0a82c5e4d0ee29cd954c",
|
||||||
"sha256:adaf2ece15f3afa33a6b45f76b333a7da9256e1360003032524d61bdb4c422ae",
|
"sha256:95ad708a9454050a46f741ba5e2f3468655ea22da1114e4c40b8cbdaca572565",
|
||||||
"sha256:bc43c1b24d2f86b6e1cc15f68635a959388219426109233e606517ff7d0a5a73",
|
"sha256:964fd236cd443933268ae49b59706569c8b741073dbfd7ca705492bae9d39aab",
|
||||||
"sha256:c27d8c1535fd4474e40a4b5e01f4ba6720bac58e6751c667895cbc5c8a7af33c",
|
"sha256:9da7acb9af7e4a272089bd2af0171d23e0d6271385c51d4d9bde91fe918c53ed",
|
||||||
"sha256:cdcc23c9528601a8a293eb4369cbd14f6b4f34f07ae8769421252e9c22718b6f",
|
"sha256:a073c91a6ef0dda488087669586768195c3080c66866144880f03445ca23ef16",
|
||||||
"sha256:cece1aa596027ff56369f0b50a9de209920e1df9ac6d02c7f9e5d8162eb4f02b",
|
"sha256:a74155398434937ac2780fd257c045954de5b11b5c52fc844e2199ce3eecf4cf",
|
||||||
"sha256:d0f29fd9f3f149a5277929de33b4f121a04cf84bb494634707cfa8ea8ae106a8",
|
"sha256:aa8b028750b43e80eea9946d01925168eeadb488dfdef1d82be4b1e28067f375",
|
||||||
"sha256:d6b87477752bd86ac5392ecb9eeed92b416898c30bd40c7e2dd03c3146105646",
|
"sha256:d1f1200d4ec53b88bf04ab636f9133cb703eb19768a39351cee649de21a33697",
|
||||||
"sha256:e038be858425c4f621900b8ff1a3a1330d9edcfeaa1c0468aeb7e330fb87693e",
|
"sha256:d9f9ed26ed22a9d331820a8432c3680707ea8b54121ddcc9dc7d9f2ceeb36906",
|
||||||
"sha256:e618a4863726bc7a3c64f95c218437f3349fb9d909eb9ea3a1ed3b567417c661",
|
"sha256:ea5d86d1bcf4a9d24610aa2f6f25492f441960cf04aed2bd9a97db439b643a7b",
|
||||||
"sha256:f8ac23ff2c2df4471a61af6490f847633024e5aa120567e08d07af5718c9d092"
|
"sha256:efe3252137392a471a2174d721e1037a0e6a5da7beb72a021e662b7000a9903f"
|
||||||
],
|
],
|
||||||
"markers": "python_version >= '3.6'",
|
"markers": "python_version >= '3.6'",
|
||||||
"version": "==2.2.1"
|
"version": "==2.3.1"
|
||||||
},
|
},
|
||||||
"webencodings": {
|
"webencodings": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
@ -932,11 +924,11 @@
|
|||||||
},
|
},
|
||||||
"zipp": {
|
"zipp": {
|
||||||
"hashes": [
|
"hashes": [
|
||||||
"sha256:23f70e964bc11a34cef175bc90ba2914e1e4545ea1e3e2f67c079671883f9cb6",
|
"sha256:112929ad649da941c23de50f356a2b5570c954b65150642bccdd66bf194d224b",
|
||||||
"sha256:e8b2a36ea17df80ffe9e2c4fda3f693c3dad6df1697d3cd3af232db680950b0b"
|
"sha256:48904fc76a60e542af151aded95726c1a5c34ed43ab4134b597665c86d7ad556"
|
||||||
],
|
],
|
||||||
"markers": "python_version >= '3.7'",
|
"markers": "python_version >= '3.7'",
|
||||||
"version": "==3.13.0"
|
"version": "==3.15.0"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"develop": {
|
"develop": {
|
||||||
|
21
README.md
@ -28,6 +28,9 @@
|
|||||||
<a href="https://github.com/privacyguides/privacyguides.org/pulls?q=is%3Apr+is%3Aclosed">
|
<a href="https://github.com/privacyguides/privacyguides.org/pulls?q=is%3Apr+is%3Aclosed">
|
||||||
<img src="https://img.shields.io/github/issues-pr-closed-raw/privacyguides/privacyguides.org">
|
<img src="https://img.shields.io/github/issues-pr-closed-raw/privacyguides/privacyguides.org">
|
||||||
</a>
|
</a>
|
||||||
|
<a href="https://crowdin.com/project/privacyguides">
|
||||||
|
<img src="https://badges.crowdin.net/privacyguides/localized.svg">
|
||||||
|
</a>
|
||||||
<a href="https://opencollective.com/privacyguides">
|
<a href="https://opencollective.com/privacyguides">
|
||||||
<img src="https://img.shields.io/opencollective/all/privacyguides">
|
<img src="https://img.shields.io/opencollective/all/privacyguides">
|
||||||
</a></p>
|
</a></p>
|
||||||
@ -60,19 +63,7 @@ Our current list of team members can be found [here](https://www.privacyguides.o
|
|||||||
|
|
||||||
Committing to this repository requires [signing your commits](https://docs.github.com/en/authentication/managing-commit-signature-verification/signing-commits) (`git config commit.gpgsign true`) unless you are making edits via the GitHub.com text editor interface. As of August 2022 the preferred signing method is [SSH commit signatures](https://docs.github.com/en/authentication/managing-commit-signature-verification/about-commit-signature-verification#ssh-commit-signature-verification), but GPG signing is also acceptable. You should add your signing key to your GitHub profile.
|
Committing to this repository requires [signing your commits](https://docs.github.com/en/authentication/managing-commit-signature-verification/signing-commits) (`git config commit.gpgsign true`) unless you are making edits via the GitHub.com text editor interface. As of August 2022 the preferred signing method is [SSH commit signatures](https://docs.github.com/en/authentication/managing-commit-signature-verification/about-commit-signature-verification#ssh-commit-signature-verification), but GPG signing is also acceptable. You should add your signing key to your GitHub profile.
|
||||||
|
|
||||||
This website uses [`mkdocs-material-insiders`](https://squidfunk.github.io/mkdocs-material/insiders/) which offers additional functionality over the open-source `mkdocs-material` project. For obvious reasons we cannot distribute access to the insiders repository. You can install the website locally with the open-source version of `mkdocs-material`:
|
This website uses [`mkdocs-material-insiders`](https://squidfunk.github.io/mkdocs-material/insiders/) which offers additional functionality over the open-source `mkdocs-material` project. For obvious reasons we cannot distribute access to the insiders repository. Running this website locally without access to insiders is unsupported. If you are submitting a PR, please ensure the automatic preview generated for your PR looks correct, as that site will be built with the production insiders build.
|
||||||
|
|
||||||
1. Clone this repository:
|
|
||||||
- `git clone https://github.com/privacyguides/privacyguides.org.git` (then `cd privacyguides.org`)
|
|
||||||
- `git submodule init`
|
|
||||||
- `git submodule update docs/assets/brand`
|
|
||||||
- `git config gpg.ssh.allowedSignersFile .allowed_signers`
|
|
||||||
2. Install [Python 3.6+](https://www.python.org/downloads/) (currently only tested with 3.10)
|
|
||||||
3. Install [dependencies](/Pipfile): `pip install mkdocs mkdocs-material mkdocs-static-i18n mkdocs-macros-plugin typing-extensions`
|
|
||||||
4. Serve the site locally: `mkdocs serve`
|
|
||||||
- The site will be available at `http://localhost:8000`
|
|
||||||
- You can build the site locally with `mkdocs build`
|
|
||||||
- Your local version of the site may be missing functionality, which is expected. If you are submitting a PR, please ensure the automatic preview generated for your PR looks correct, as that site will be built with the production insiders build.
|
|
||||||
|
|
||||||
**Team members** should clone the repository with `mkdocs-material-insiders` directly. This method is identical to production:
|
**Team members** should clone the repository with `mkdocs-material-insiders` directly. This method is identical to production:
|
||||||
|
|
||||||
@ -81,9 +72,9 @@ This website uses [`mkdocs-material-insiders`](https://squidfunk.github.io/mkdoc
|
|||||||
3. Install Python **3.10**
|
3. Install Python **3.10**
|
||||||
4. Install **pipenv**: `pip install pipenv`
|
4. Install **pipenv**: `pip install pipenv`
|
||||||
5. Install dependencies: `pipenv install --dev` (install [Pillow and CairoSVG](https://squidfunk.github.io/mkdocs-material/setup/setting-up-social-cards/#dependencies) as well to generate social cards)
|
5. Install dependencies: `pipenv install --dev` (install [Pillow and CairoSVG](https://squidfunk.github.io/mkdocs-material/setup/setting-up-social-cards/#dependencies) as well to generate social cards)
|
||||||
6. Serve the site locally: `pipenv run mkdocs serve --config-file mkdocs.production.yml` (set `CARDS=true` to generate social cards)
|
6. Serve the site locally: `pipenv run mkdocs serve --config-file config/mkdocs.en.yml` (set `CARDS=true` to generate social cards)
|
||||||
- The site will be available at `http://localhost:8000`
|
- The site will be available at `http://localhost:8000`
|
||||||
- You can build the site locally with `pipenv run mkdocs build`
|
- You can build the site locally with `pipenv run mkdocs build --config-file config/mkdocs.en.yml`
|
||||||
- This version of the site should be identical to the live, production version
|
- This version of the site should be identical to the live, production version
|
||||||
|
|
||||||
If you commit to `main` with commits signed with your SSH key, you should add your SSH key to [`.allowed_signers`](/.allowed_signers) in this repo.
|
If you commit to `main` with commits signed with your SSH key, you should add your SSH key to [`.allowed_signers`](/.allowed_signers) in this repo.
|
||||||
|
61
_redirects
Normal file
@ -0,0 +1,61 @@
|
|||||||
|
/ /en/ 302 Language=en
|
||||||
|
/ /fr/ 302 Language=fr
|
||||||
|
/ /he/ 302 Language=he
|
||||||
|
/ /nl/ 302 Language=nl
|
||||||
|
/ /en/ 302
|
||||||
|
|
||||||
|
/sitemap.xml /en/sitemap.xml
|
||||||
|
/CODE_OF_CONDUCT/ /en/CODE_OF_CONDUCT/
|
||||||
|
/android/ /en/android/
|
||||||
|
/calendar/ /en/calendar/
|
||||||
|
/cloud/ /en/cloud/
|
||||||
|
/data-redaction/ /en/data-redaction/
|
||||||
|
/desktop-browsers/ /en/desktop-browsers/
|
||||||
|
/desktop/ /en/desktop/
|
||||||
|
/dns/ /en/dns/
|
||||||
|
/email-clients/ /en/email-clients/
|
||||||
|
/email/ /en/email/
|
||||||
|
/encryption/ /en/encryption/
|
||||||
|
/file-sharing/ /en/file-sharing/
|
||||||
|
/frontends/ /en/frontends/
|
||||||
|
/kb-archive/ /en/kb-archive/
|
||||||
|
/mobile-browsers/ /en/mobile-browsers/
|
||||||
|
/multi-factor-authentication/ /en/multi-factor-authentication/
|
||||||
|
/news-aggregators/ /en/news-aggregators/
|
||||||
|
/notebooks/ /en/notebooks/
|
||||||
|
/passwords/ /en/passwords/
|
||||||
|
/productivity/ /en/productivity/
|
||||||
|
/real-time-communication/ /en/real-time-communication/
|
||||||
|
/router/ /en/router/
|
||||||
|
/search-engines/ /en/search-engines/
|
||||||
|
/tools/ /en/tools/
|
||||||
|
/tor/ /en/tor/
|
||||||
|
/video-streaming/ /en/video-streaming/
|
||||||
|
/vpn/ /en/vpn/
|
||||||
|
/about/criteria/ /en/about/criteria/
|
||||||
|
/about/donate/ /en/about/donate/
|
||||||
|
/about/ /en/about/
|
||||||
|
/about/notices/ /en/about/notices/
|
||||||
|
/about/privacy-policy/ /en/about/privacy-policy/
|
||||||
|
/about/privacytools/ /en/about/privacytools/
|
||||||
|
/about/services/ /en/about/services/
|
||||||
|
/about/statistics/ /en/about/statistics/
|
||||||
|
/advanced/communication-network-types/ /en/advanced/communication-network-types/
|
||||||
|
/advanced/dns-overview/ /en/advanced/dns-overview/
|
||||||
|
/advanced/tor-overview/ /en/advanced/tor-overview/
|
||||||
|
/basics/account-creation/ /en/basics/account-creation/
|
||||||
|
/basics/account-deletion/ /en/basics/account-deletion/
|
||||||
|
/basics/common-misconceptions/ /en/basics/common-misconceptions/
|
||||||
|
/basics/common-threats/ /en/basics/common-threats/
|
||||||
|
/basics/email-security/ /en/basics/email-security/
|
||||||
|
/basics/multi-factor-authentication/ /en/basics/multi-factor-authentication/
|
||||||
|
/basics/passwords-overview/ /en/basics/passwords-overview/
|
||||||
|
/basics/threat-modeling/ /en/basics/threat-modeling/
|
||||||
|
/basics/vpn-overview/ /en/basics/vpn-overview/
|
||||||
|
/meta/brand/ /en/meta/brand/
|
||||||
|
/meta/git-recommendations/ /en/meta/git-recommendations/
|
||||||
|
/meta/uploading-images/ /en/meta/uploading-images/
|
||||||
|
/meta/writing-style/ /en/meta/writing-style/
|
||||||
|
/os/android-overview/ /en/os/android-overview/
|
||||||
|
/os/linux-overview/ /en/os/linux-overview/
|
||||||
|
/os/qubes-overview/ /en/os/qubes-overview/
|
116
config/mkdocs.common.yml
Normal file
@ -0,0 +1,116 @@
|
|||||||
|
extra:
|
||||||
|
social:
|
||||||
|
- icon: simple/mastodon
|
||||||
|
link: https://mastodon.neat.computer/@privacyguides
|
||||||
|
name: Mastodon
|
||||||
|
- icon: simple/matrix
|
||||||
|
link: https://matrix.to/#/#privacyguides:matrix.org
|
||||||
|
name: Matrix
|
||||||
|
- icon: simple/discourse
|
||||||
|
link: https://discuss.privacyguides.net/
|
||||||
|
name: Forum
|
||||||
|
- icon: simple/github
|
||||||
|
link: https://github.com/privacyguides
|
||||||
|
name: GitHub
|
||||||
|
alternate:
|
||||||
|
- name: English
|
||||||
|
link: /en/
|
||||||
|
lang: en
|
||||||
|
icon: https://raw.githubusercontent.com/twitter/twemoji/master/assets/svg/1f1fa-1f1f8.svg
|
||||||
|
- name: Français
|
||||||
|
link: /fr/
|
||||||
|
lang: fr
|
||||||
|
icon: https://raw.githubusercontent.com/twitter/twemoji/master/assets/svg/1f1eb-1f1f7.svg
|
||||||
|
- name: עִברִית
|
||||||
|
link: /he/
|
||||||
|
lang: he
|
||||||
|
icon: https://raw.githubusercontent.com/twitter/twemoji/master/assets/svg/1f1ee-1f1f1.svg
|
||||||
|
- name: Nederlands
|
||||||
|
link: /nl/
|
||||||
|
lang: nl
|
||||||
|
icon: https://raw.githubusercontent.com/twitter/twemoji/master/assets/svg/1f1f3-1f1f1.svg
|
||||||
|
|
||||||
|
repo_url: https://github.com/privacyguides/privacyguides.org
|
||||||
|
repo_name: ""
|
||||||
|
|
||||||
|
theme:
|
||||||
|
name: material
|
||||||
|
custom_dir: ../theme
|
||||||
|
favicon: assets/img/brand/PNG/Favicon/favicon-32x32.png
|
||||||
|
icon:
|
||||||
|
logo: octicons/shield-lock-16
|
||||||
|
repo: simple/github
|
||||||
|
font: false
|
||||||
|
features:
|
||||||
|
- navigation.tracking
|
||||||
|
- navigation.tabs
|
||||||
|
- navigation.sections
|
||||||
|
- navigation.expand
|
||||||
|
- content.tooltips
|
||||||
|
- search.highlight
|
||||||
|
|
||||||
|
extra_css:
|
||||||
|
- assets/stylesheets/extra.css?v=3.2.0
|
||||||
|
extra_javascript:
|
||||||
|
- assets/javascripts/mathjax.js
|
||||||
|
- assets/javascripts/feedback.js
|
||||||
|
|
||||||
|
watch:
|
||||||
|
- ../theme
|
||||||
|
- ../includes
|
||||||
|
- mkdocs.common.yml
|
||||||
|
|
||||||
|
plugins:
|
||||||
|
tags: {}
|
||||||
|
search: {}
|
||||||
|
macros: {}
|
||||||
|
meta: {}
|
||||||
|
git-committers:
|
||||||
|
enabled: !ENV [NETLIFY, false]
|
||||||
|
repository: privacyguides/privacyguides.org
|
||||||
|
branch: main
|
||||||
|
git-revision-date-localized:
|
||||||
|
enabled: !ENV [NETLIFY, false]
|
||||||
|
exclude:
|
||||||
|
- index.md
|
||||||
|
fallback_to_build_date: true
|
||||||
|
privacy:
|
||||||
|
external_assets_exclude:
|
||||||
|
- cdn.jsdelivr.net/npm/mathjax@3/*
|
||||||
|
- api.privacyguides.net/*
|
||||||
|
optimize:
|
||||||
|
enabled: !ENV [NETLIFY, false]
|
||||||
|
|
||||||
|
markdown_extensions:
|
||||||
|
admonition: {}
|
||||||
|
pymdownx.details: {}
|
||||||
|
pymdownx.superfences:
|
||||||
|
custom_fences:
|
||||||
|
- name: mermaid
|
||||||
|
class: mermaid
|
||||||
|
format: !!python/name:pymdownx.superfences.fence_code_format
|
||||||
|
pymdownx.tabbed:
|
||||||
|
alternate_style: true
|
||||||
|
pymdownx.arithmatex:
|
||||||
|
generic: true
|
||||||
|
pymdownx.critic: {}
|
||||||
|
pymdownx.caret: {}
|
||||||
|
pymdownx.keys: {}
|
||||||
|
pymdownx.mark: {}
|
||||||
|
pymdownx.tilde: {}
|
||||||
|
pymdownx.snippets: {}
|
||||||
|
pymdownx.tasklist:
|
||||||
|
custom_checkbox: true
|
||||||
|
attr_list: {}
|
||||||
|
def_list: {}
|
||||||
|
md_in_html: {}
|
||||||
|
meta: {}
|
||||||
|
abbr: {}
|
||||||
|
pymdownx.emoji:
|
||||||
|
emoji_index: !!python/name:materialx.emoji.twemoji
|
||||||
|
emoji_generator: !!python/name:materialx.emoji.to_svg
|
||||||
|
tables: {}
|
||||||
|
footnotes: {}
|
||||||
|
toc:
|
||||||
|
permalink: true
|
||||||
|
toc_depth: 4
|
137
config/mkdocs.en.yml
Normal file
@ -0,0 +1,137 @@
|
|||||||
|
INHERIT: mkdocs.common.yml
|
||||||
|
docs_dir: '../docs'
|
||||||
|
site_url: "https://www.privacyguides.org/en/"
|
||||||
|
site_dir: '../site/en'
|
||||||
|
|
||||||
|
site_name: Privacy Guides
|
||||||
|
site_description: |
|
||||||
|
Privacy Guides is your central privacy and security resource to protect yourself online.
|
||||||
|
copyright: |
|
||||||
|
<b>Privacy Guides</b> is a non-profit, socially motivated website that provides information for protecting your data security and privacy.<br>
|
||||||
|
We do not make money from recommending certain products, and we do not use affiliate links.<br>
|
||||||
|
© 2022 Privacy Guides and contributors.
|
||||||
|
<span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="m245.83 214.87-33.22 17.28c-9.43-19.58-25.24-19.93-27.46-19.93-22.13 0-33.22 14.61-33.22 43.84 0 23.57 9.21 43.84 33.22 43.84 14.47 0 24.65-7.09 30.57-21.26l30.55 15.5c-6.17 11.51-25.69 38.98-65.1 38.98-22.6 0-73.96-10.32-73.96-77.05 0-58.69 43-77.06 72.63-77.06 30.72-.01 52.7 11.95 65.99 35.86zm143.05 0-32.78 17.28c-9.5-19.77-25.72-19.93-27.9-19.93-22.14 0-33.22 14.61-33.22 43.84 0 23.55 9.23 43.84 33.22 43.84 14.45 0 24.65-7.09 30.54-21.26l31 15.5c-2.1 3.75-21.39 38.98-65.09 38.98-22.69 0-73.96-9.87-73.96-77.05 0-58.67 42.97-77.06 72.63-77.06 30.71-.01 52.58 11.95 65.56 35.86zM247.56 8.05C104.74 8.05 0 123.11 0 256.05c0 138.49 113.6 248 247.56 248 129.93 0 248.44-100.87 248.44-248 0-137.87-106.62-248-248.44-248zm.87 450.81c-112.54 0-203.7-93.04-203.7-202.81 0-105.42 85.43-203.27 203.72-203.27 112.53 0 202.82 89.46 202.82 203.26-.01 121.69-99.68 202.82-202.84 202.82z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M314.9 194.4v101.4h-28.3v120.5h-77.1V295.9h-28.3V194.4c0-4.4 1.6-8.2 4.6-11.3 3.1-3.1 6.9-4.7 11.3-4.7H299c4.1 0 7.8 1.6 11.1 4.7 3.1 3.2 4.8 6.9 4.8 11.3zm-101.5-63.7c0-23.3 11.5-35 34.5-35s34.5 11.7 34.5 35c0 23-11.5 34.5-34.5 34.5s-34.5-11.5-34.5-34.5zM247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3zm94 144.3v42.5H162.1V197h180.3zm0 79.8v42.5H162.1v-42.5h180.3z"></path></svg></span>
|
||||||
|
Content licensed under <a href="/about/"><strong>CC BY-ND 4.0</strong></a>.
|
||||||
|
edit_uri: edit/main/docs/
|
||||||
|
|
||||||
|
extra:
|
||||||
|
generator: false
|
||||||
|
analytics:
|
||||||
|
provider: plausible
|
||||||
|
property: privacyguides.org
|
||||||
|
feedback:
|
||||||
|
title: "Was this page helpful?"
|
||||||
|
ratings:
|
||||||
|
- icon: material/robot-happy-outline
|
||||||
|
name: "This page was helpful"
|
||||||
|
data: Helpful
|
||||||
|
note: "Thanks for your feedback!"
|
||||||
|
- icon: material/robot-confused
|
||||||
|
name: "This page could be improved"
|
||||||
|
data: Needs Improvement
|
||||||
|
note: "Thanks for your feedback! Help us improve this page by opening a <a href='https://discuss.privacyguides.net/'>discussion on our forum</a>."
|
||||||
|
|
||||||
|
theme:
|
||||||
|
language: en
|
||||||
|
palette:
|
||||||
|
- media: "(prefers-color-scheme)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-auto
|
||||||
|
name: "Switch to light mode"
|
||||||
|
- media: "(prefers-color-scheme: dark)"
|
||||||
|
scheme: slate
|
||||||
|
accent: amber
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-2
|
||||||
|
name: "Switch to system theme"
|
||||||
|
- media: "(prefers-color-scheme: light)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-5
|
||||||
|
name: "Switch to dark mode"
|
||||||
|
|
||||||
|
plugins:
|
||||||
|
social:
|
||||||
|
cards: !ENV [NETLIFY, false]
|
||||||
|
cards_color:
|
||||||
|
fill: "#FFD06F"
|
||||||
|
text: "#2d2d2d"
|
||||||
|
cards_dir: assets/img/social
|
||||||
|
cards_font: 'Public Sans'
|
||||||
|
|
||||||
|
nav:
|
||||||
|
- Home: 'index.md'
|
||||||
|
- Knowledge Base:
|
||||||
|
- 'basics/threat-modeling.md'
|
||||||
|
- 'basics/common-threats.md'
|
||||||
|
- 'basics/common-misconceptions.md'
|
||||||
|
- 'basics/account-creation.md'
|
||||||
|
- 'basics/account-deletion.md'
|
||||||
|
- Technology Essentials:
|
||||||
|
- 'basics/passwords-overview.md'
|
||||||
|
- 'basics/multi-factor-authentication.md'
|
||||||
|
- 'basics/email-security.md'
|
||||||
|
- 'basics/vpn-overview.md'
|
||||||
|
- Operating Systems:
|
||||||
|
- 'os/android-overview.md'
|
||||||
|
- 'os/linux-overview.md'
|
||||||
|
- 'os/qubes-overview.md'
|
||||||
|
- Advanced Topics:
|
||||||
|
- 'advanced/dns-overview.md'
|
||||||
|
- 'advanced/tor-overview.md'
|
||||||
|
- 'advanced/communication-network-types.md'
|
||||||
|
- kb-archive.md
|
||||||
|
- Recommendations:
|
||||||
|
- 'tools.md'
|
||||||
|
- Internet Browsing:
|
||||||
|
- 'tor.md'
|
||||||
|
- 'desktop-browsers.md'
|
||||||
|
- 'mobile-browsers.md'
|
||||||
|
- Operating Systems:
|
||||||
|
- 'android.md'
|
||||||
|
- 'desktop.md'
|
||||||
|
- 'router.md'
|
||||||
|
- Providers:
|
||||||
|
- 'cloud.md'
|
||||||
|
- 'dns.md'
|
||||||
|
- 'email.md'
|
||||||
|
- 'search-engines.md'
|
||||||
|
- 'vpn.md'
|
||||||
|
- Software:
|
||||||
|
- 'calendar.md'
|
||||||
|
- 'data-redaction.md'
|
||||||
|
- 'email-clients.md'
|
||||||
|
- 'encryption.md'
|
||||||
|
- 'file-sharing.md'
|
||||||
|
- 'frontends.md'
|
||||||
|
- 'multi-factor-authentication.md'
|
||||||
|
- 'news-aggregators.md'
|
||||||
|
- 'notebooks.md'
|
||||||
|
- 'passwords.md'
|
||||||
|
- 'productivity.md'
|
||||||
|
- 'real-time-communication.md'
|
||||||
|
- 'video-streaming.md'
|
||||||
|
- About:
|
||||||
|
- 'about/index.md'
|
||||||
|
- 'about/criteria.md'
|
||||||
|
- 'about/statistics.md'
|
||||||
|
- 'about/notices.md'
|
||||||
|
- 'about/privacy-policy.md'
|
||||||
|
- Community:
|
||||||
|
- 'about/donate.md'
|
||||||
|
- Online Services: 'about/services.md'
|
||||||
|
- Code of Conduct: 'CODE_OF_CONDUCT.md'
|
||||||
|
- 'about/privacytools.md'
|
||||||
|
- Contributing:
|
||||||
|
- Writing Guide:
|
||||||
|
- 'meta/writing-style.md'
|
||||||
|
- 'meta/brand.md'
|
||||||
|
- Technical Guides:
|
||||||
|
- 'meta/uploading-images.md'
|
||||||
|
- 'meta/git-recommendations.md'
|
||||||
|
- Changelog: 'https://github.com/privacyguides/privacyguides.org/releases'
|
||||||
|
- Forum: 'https://discuss.privacyguides.net/'
|
||||||
|
- Blog: 'https://blog.privacyguides.org/'
|
128
config/mkdocs.fr.yml
Normal file
@ -0,0 +1,128 @@
|
|||||||
|
INHERIT: mkdocs.common.yml
|
||||||
|
docs_dir: '../i18n/fr'
|
||||||
|
site_url: "https://www.privacyguides.org/fr/"
|
||||||
|
site_dir: '../site/fr'
|
||||||
|
|
||||||
|
site_name: Privacy Guides
|
||||||
|
site_description: |
|
||||||
|
Privacy Guides est votre ressource centrale en matière de vie privée et de sécurité pour vous protéger en ligne.
|
||||||
|
copyright: |
|
||||||
|
<b>Privacy Guides</b> is a non-profit, socially motivated website that provides information for protecting your data security and privacy.<br>
|
||||||
|
We do not make money from recommending certain products, and we do not use affiliate links.<br>
|
||||||
|
© 2022 Privacy Guides and contributors.
|
||||||
|
<span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="m245.83 214.87-33.22 17.28c-9.43-19.58-25.24-19.93-27.46-19.93-22.13 0-33.22 14.61-33.22 43.84 0 23.57 9.21 43.84 33.22 43.84 14.47 0 24.65-7.09 30.57-21.26l30.55 15.5c-6.17 11.51-25.69 38.98-65.1 38.98-22.6 0-73.96-10.32-73.96-77.05 0-58.69 43-77.06 72.63-77.06 30.72-.01 52.7 11.95 65.99 35.86zm143.05 0-32.78 17.28c-9.5-19.77-25.72-19.93-27.9-19.93-22.14 0-33.22 14.61-33.22 43.84 0 23.55 9.23 43.84 33.22 43.84 14.45 0 24.65-7.09 30.54-21.26l31 15.5c-2.1 3.75-21.39 38.98-65.09 38.98-22.69 0-73.96-9.87-73.96-77.05 0-58.67 42.97-77.06 72.63-77.06 30.71-.01 52.58 11.95 65.56 35.86zM247.56 8.05C104.74 8.05 0 123.11 0 256.05c0 138.49 113.6 248 247.56 248 129.93 0 248.44-100.87 248.44-248 0-137.87-106.62-248-248.44-248zm.87 450.81c-112.54 0-203.7-93.04-203.7-202.81 0-105.42 85.43-203.27 203.72-203.27 112.53 0 202.82 89.46 202.82 203.26-.01 121.69-99.68 202.82-202.84 202.82z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M314.9 194.4v101.4h-28.3v120.5h-77.1V295.9h-28.3V194.4c0-4.4 1.6-8.2 4.6-11.3 3.1-3.1 6.9-4.7 11.3-4.7H299c4.1 0 7.8 1.6 11.1 4.7 3.1 3.2 4.8 6.9 4.8 11.3zm-101.5-63.7c0-23.3 11.5-35 34.5-35s34.5 11.7 34.5 35c0 23-11.5 34.5-34.5 34.5s-34.5-11.5-34.5-34.5zM247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3zm94 144.3v42.5H162.1V197h180.3zm0 79.8v42.5H162.1v-42.5h180.3z"></path></svg></span>
|
||||||
|
Content licensed under <a href="/about/"><strong>CC BY-ND 4.0</strong></a>.
|
||||||
|
edit_uri: edit/main/i18n/fr/
|
||||||
|
|
||||||
|
extra:
|
||||||
|
generator: false
|
||||||
|
analytics:
|
||||||
|
provider: plausible
|
||||||
|
property: privacyguides.org
|
||||||
|
feedback:
|
||||||
|
title: "Cette page vous a été utile ?"
|
||||||
|
ratings:
|
||||||
|
- icon: material/robot-happy-outline
|
||||||
|
name: "Cette page a été utile"
|
||||||
|
data: Helpful
|
||||||
|
note: "Merci pour votre retour !"
|
||||||
|
- icon: material/robot-confused
|
||||||
|
name: "Cette page pourrait être améliorée"
|
||||||
|
data: Needs Improvement
|
||||||
|
note: "Thanks for your feedback! Help us improve this page by opening a <a href='https://discuss.privacyguides.net/'>discussion on our forum</a>."
|
||||||
|
|
||||||
|
theme:
|
||||||
|
language: fr
|
||||||
|
palette:
|
||||||
|
- media: "(prefers-color-scheme)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-auto
|
||||||
|
name: "Basculer en mode clair"
|
||||||
|
- media: "(prefers-color-scheme: dark)"
|
||||||
|
scheme: slate
|
||||||
|
accent: amber
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-2
|
||||||
|
name: "Basculer vers le thème du système"
|
||||||
|
- media: "(prefers-color-scheme: light)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-5
|
||||||
|
name: "Basculer en mode sombre"
|
||||||
|
|
||||||
|
nav:
|
||||||
|
- Accueil: 'index.md'
|
||||||
|
- Base de connaissances:
|
||||||
|
- 'basics/threat-modeling.md'
|
||||||
|
- 'basics/common-threats.md'
|
||||||
|
- 'basics/common-misconceptions.md'
|
||||||
|
- 'basics/account-creation.md'
|
||||||
|
- 'basics/account-deletion.md'
|
||||||
|
- Les essentiels de la technologie:
|
||||||
|
- 'basics/passwords-overview.md'
|
||||||
|
- 'basics/multi-factor-authentication.md'
|
||||||
|
- 'basics/email-security.md'
|
||||||
|
- 'basics/vpn-overview.md'
|
||||||
|
- "Systèmes d'exploitation":
|
||||||
|
- 'os/android-overview.md'
|
||||||
|
- 'os/linux-overview.md'
|
||||||
|
- 'os/qubes-overview.md'
|
||||||
|
- "Sujets avancés":
|
||||||
|
- 'advanced/dns-overview.md'
|
||||||
|
- 'advanced/tor-overview.md'
|
||||||
|
- 'advanced/communication-network-types.md'
|
||||||
|
- kb-archive.md
|
||||||
|
- Recommandations:
|
||||||
|
- 'tools.md'
|
||||||
|
- Navigation internet:
|
||||||
|
- 'tor.md'
|
||||||
|
- 'desktop-browsers.md'
|
||||||
|
- 'mobile-browsers.md'
|
||||||
|
- "Systèmes d'exploitation":
|
||||||
|
- 'android.md'
|
||||||
|
- 'desktop.md'
|
||||||
|
- 'router.md'
|
||||||
|
- "Fournisseurs":
|
||||||
|
- 'cloud.md'
|
||||||
|
- 'dns.md'
|
||||||
|
- 'email.md'
|
||||||
|
- 'search-engines.md'
|
||||||
|
- 'vpn.md'
|
||||||
|
- "Logiciels":
|
||||||
|
- 'calendar.md'
|
||||||
|
- 'data-redaction.md'
|
||||||
|
- 'email-clients.md'
|
||||||
|
- 'encryption.md'
|
||||||
|
- 'file-sharing.md'
|
||||||
|
- 'frontends.md'
|
||||||
|
- 'multi-factor-authentication.md'
|
||||||
|
- 'news-aggregators.md'
|
||||||
|
- 'notebooks.md'
|
||||||
|
- 'passwords.md'
|
||||||
|
- 'productivity.md'
|
||||||
|
- 'real-time-communication.md'
|
||||||
|
- 'video-streaming.md'
|
||||||
|
- "À propos":
|
||||||
|
- 'about/index.md'
|
||||||
|
- 'about/criteria.md'
|
||||||
|
- 'about/statistics.md'
|
||||||
|
- 'about/notices.md'
|
||||||
|
- 'about/privacy-policy.md'
|
||||||
|
- Community:
|
||||||
|
- 'about/donate.md'
|
||||||
|
- Online Services: 'about/services.md'
|
||||||
|
- Code of Conduct: 'CODE_OF_CONDUCT.md'
|
||||||
|
- 'about/privacytools.md'
|
||||||
|
- Contributing:
|
||||||
|
- Writing Guide:
|
||||||
|
- 'meta/writing-style.md'
|
||||||
|
- 'meta/brand.md'
|
||||||
|
- Technical Guides:
|
||||||
|
- 'meta/uploading-images.md'
|
||||||
|
- 'meta/git-recommendations.md'
|
||||||
|
- Journal des modifications: 'https://github.com/privacyguides/privacyguides.org/releases'
|
||||||
|
- Forum: 'https://discuss.privacyguides.net/'
|
||||||
|
- Blog: 'https://blog.privacyguides.org/'
|
128
config/mkdocs.he.yml
Normal file
@ -0,0 +1,128 @@
|
|||||||
|
INHERIT: mkdocs.common.yml
|
||||||
|
docs_dir: '../i18n/he'
|
||||||
|
site_url: "https://www.privacyguides.org/he/"
|
||||||
|
site_dir: '../site/he'
|
||||||
|
|
||||||
|
site_name: Privacy Guides
|
||||||
|
site_description: |
|
||||||
|
Privacy Guides (מדריכי פרטיות) הם משאב הפרטיות והאבטחה המרכזי שלכם כדי להגן על עצמכם באופן מקוון.
|
||||||
|
copyright: |
|
||||||
|
<b>Privacy Guides</b> is a non-profit, socially motivated website that provides information for protecting your data security and privacy.<br>
|
||||||
|
We do not make money from recommending certain products, and we do not use affiliate links.<br>
|
||||||
|
© 2022 Privacy Guides and contributors.
|
||||||
|
<span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="m245.83 214.87-33.22 17.28c-9.43-19.58-25.24-19.93-27.46-19.93-22.13 0-33.22 14.61-33.22 43.84 0 23.57 9.21 43.84 33.22 43.84 14.47 0 24.65-7.09 30.57-21.26l30.55 15.5c-6.17 11.51-25.69 38.98-65.1 38.98-22.6 0-73.96-10.32-73.96-77.05 0-58.69 43-77.06 72.63-77.06 30.72-.01 52.7 11.95 65.99 35.86zm143.05 0-32.78 17.28c-9.5-19.77-25.72-19.93-27.9-19.93-22.14 0-33.22 14.61-33.22 43.84 0 23.55 9.23 43.84 33.22 43.84 14.45 0 24.65-7.09 30.54-21.26l31 15.5c-2.1 3.75-21.39 38.98-65.09 38.98-22.69 0-73.96-9.87-73.96-77.05 0-58.67 42.97-77.06 72.63-77.06 30.71-.01 52.58 11.95 65.56 35.86zM247.56 8.05C104.74 8.05 0 123.11 0 256.05c0 138.49 113.6 248 247.56 248 129.93 0 248.44-100.87 248.44-248 0-137.87-106.62-248-248.44-248zm.87 450.81c-112.54 0-203.7-93.04-203.7-202.81 0-105.42 85.43-203.27 203.72-203.27 112.53 0 202.82 89.46 202.82 203.26-.01 121.69-99.68 202.82-202.84 202.82z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M314.9 194.4v101.4h-28.3v120.5h-77.1V295.9h-28.3V194.4c0-4.4 1.6-8.2 4.6-11.3 3.1-3.1 6.9-4.7 11.3-4.7H299c4.1 0 7.8 1.6 11.1 4.7 3.1 3.2 4.8 6.9 4.8 11.3zm-101.5-63.7c0-23.3 11.5-35 34.5-35s34.5 11.7 34.5 35c0 23-11.5 34.5-34.5 34.5s-34.5-11.5-34.5-34.5zM247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3zm94 144.3v42.5H162.1V197h180.3zm0 79.8v42.5H162.1v-42.5h180.3z"></path></svg></span>
|
||||||
|
Content licensed under <a href="/about/"><strong>CC BY-ND 4.0</strong></a>.
|
||||||
|
edit_uri: edit/main/i18n/he/
|
||||||
|
|
||||||
|
extra:
|
||||||
|
generator: false
|
||||||
|
analytics:
|
||||||
|
provider: plausible
|
||||||
|
property: privacyguides.org
|
||||||
|
feedback:
|
||||||
|
title: "האם הדף הזה עזר לך?"
|
||||||
|
ratings:
|
||||||
|
- icon: material/robot-happy-outline
|
||||||
|
name: "הדף הזה היה מועיל"
|
||||||
|
data: Helpful
|
||||||
|
note: "תודה על המשוב שלך!"
|
||||||
|
- icon: material/robot-confused
|
||||||
|
name: "דף זה יכול להשתפר"
|
||||||
|
data: Needs Improvement
|
||||||
|
note: "תודה על המשוב שלך! Help us improve this page by opening a <a href='https://discuss.privacyguides.net/'>discussion on our forum</a>."
|
||||||
|
|
||||||
|
theme:
|
||||||
|
language: he
|
||||||
|
palette:
|
||||||
|
- media: "(prefers-color-scheme)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-auto
|
||||||
|
name: "עבור למצב בהיר"
|
||||||
|
- media: "(prefers-color-scheme: dark)"
|
||||||
|
scheme: slate
|
||||||
|
accent: amber
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-2
|
||||||
|
name: "עבור לערכת הנושא של המערכת"
|
||||||
|
- media: "(prefers-color-scheme: light)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-5
|
||||||
|
name: "עבור למצב כהה"
|
||||||
|
|
||||||
|
nav:
|
||||||
|
- "דף הבית": 'index.md'
|
||||||
|
- "ידע בסיסי":
|
||||||
|
- 'basics/threat-modeling.md'
|
||||||
|
- 'basics/common-threats.md'
|
||||||
|
- 'basics/common-misconceptions.md'
|
||||||
|
- 'basics/account-creation.md'
|
||||||
|
- 'basics/account-deletion.md'
|
||||||
|
- "יסודות הטכנולוגיה":
|
||||||
|
- 'basics/passwords-overview.md'
|
||||||
|
- 'basics/multi-factor-authentication.md'
|
||||||
|
- 'basics/email-security.md'
|
||||||
|
- 'basics/vpn-overview.md'
|
||||||
|
- "מערכות הפעלה":
|
||||||
|
- 'os/android-overview.md'
|
||||||
|
- 'os/linux-overview.md'
|
||||||
|
- 'os/qubes-overview.md'
|
||||||
|
- "נושאים מתקדמים":
|
||||||
|
- 'advanced/dns-overview.md'
|
||||||
|
- 'advanced/tor-overview.md'
|
||||||
|
- 'advanced/communication-network-types.md'
|
||||||
|
- kb-archive.md
|
||||||
|
- "המלצות":
|
||||||
|
- 'tools.md'
|
||||||
|
- "גלישה באינטרנט":
|
||||||
|
- 'tor.md'
|
||||||
|
- 'desktop-browsers.md'
|
||||||
|
- 'mobile-browsers.md'
|
||||||
|
- "מערכות הפעלה":
|
||||||
|
- 'android.md'
|
||||||
|
- 'desktop.md'
|
||||||
|
- 'router.md'
|
||||||
|
- "ספקים":
|
||||||
|
- 'cloud.md'
|
||||||
|
- 'dns.md'
|
||||||
|
- 'email.md'
|
||||||
|
- 'search-engines.md'
|
||||||
|
- 'vpn.md'
|
||||||
|
- "תוכנה":
|
||||||
|
- 'calendar.md'
|
||||||
|
- 'data-redaction.md'
|
||||||
|
- 'email-clients.md'
|
||||||
|
- 'encryption.md'
|
||||||
|
- 'file-sharing.md'
|
||||||
|
- 'frontends.md'
|
||||||
|
- 'multi-factor-authentication.md'
|
||||||
|
- 'news-aggregators.md'
|
||||||
|
- 'notebooks.md'
|
||||||
|
- 'passwords.md'
|
||||||
|
- 'productivity.md'
|
||||||
|
- 'real-time-communication.md'
|
||||||
|
- 'video-streaming.md'
|
||||||
|
- "על אודות":
|
||||||
|
- 'about/index.md'
|
||||||
|
- 'about/criteria.md'
|
||||||
|
- 'about/statistics.md'
|
||||||
|
- 'about/notices.md'
|
||||||
|
- 'about/privacy-policy.md'
|
||||||
|
- Community:
|
||||||
|
- 'about/donate.md'
|
||||||
|
- Online Services: 'about/services.md'
|
||||||
|
- Code of Conduct: 'CODE_OF_CONDUCT.md'
|
||||||
|
- 'about/privacytools.md'
|
||||||
|
- Contributing:
|
||||||
|
- Writing Guide:
|
||||||
|
- 'meta/writing-style.md'
|
||||||
|
- 'meta/brand.md'
|
||||||
|
- Technical Guides:
|
||||||
|
- 'meta/uploading-images.md'
|
||||||
|
- 'meta/git-recommendations.md'
|
||||||
|
- "יומן שינויים": 'https://github.com/privacyguides/privacyguides.org/releases'
|
||||||
|
- "פורום": 'https://discuss.privacyguides.net/'
|
||||||
|
- "בלוג": 'https://blog.privacyguides.org/'
|
128
config/mkdocs.nl.yml
Normal file
@ -0,0 +1,128 @@
|
|||||||
|
INHERIT: mkdocs.common.yml
|
||||||
|
docs_dir: '../i18n/nl'
|
||||||
|
site_url: "https://www.privacyguides.org/nl/"
|
||||||
|
site_dir: '../site/nl'
|
||||||
|
|
||||||
|
site_name: Privacy Guides
|
||||||
|
site_description: |
|
||||||
|
Privacy Guides is jouw centrale bron voor privacy en beveiliging om jezelf online te beschermen.
|
||||||
|
copyright: |
|
||||||
|
<b>Privacy Guides</b> is een non-profit, sociaal gemotiveerde website die informatie biedt voor de bescherming van jouw gegevensbeveiliging en privacy.<br>
|
||||||
|
Wij verdienen geen geld met het aanbevelen van bepaalde producten, en wij maken geen gebruik van affiliate links.<br>
|
||||||
|
© 2022 Privacy Guides en medewerkers.
|
||||||
|
<span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="m245.83 214.87-33.22 17.28c-9.43-19.58-25.24-19.93-27.46-19.93-22.13 0-33.22 14.61-33.22 43.84 0 23.57 9.21 43.84 33.22 43.84 14.47 0 24.65-7.09 30.57-21.26l30.55 15.5c-6.17 11.51-25.69 38.98-65.1 38.98-22.6 0-73.96-10.32-73.96-77.05 0-58.69 43-77.06 72.63-77.06 30.72-.01 52.7 11.95 65.99 35.86zm143.05 0-32.78 17.28c-9.5-19.77-25.72-19.93-27.9-19.93-22.14 0-33.22 14.61-33.22 43.84 0 23.55 9.23 43.84 33.22 43.84 14.45 0 24.65-7.09 30.54-21.26l31 15.5c-2.1 3.75-21.39 38.98-65.09 38.98-22.69 0-73.96-9.87-73.96-77.05 0-58.67 42.97-77.06 72.63-77.06 30.71-.01 52.58 11.95 65.56 35.86zM247.56 8.05C104.74 8.05 0 123.11 0 256.05c0 138.49 113.6 248 247.56 248 129.93 0 248.44-100.87 248.44-248 0-137.87-106.62-248-248.44-248zm.87 450.81c-112.54 0-203.7-93.04-203.7-202.81 0-105.42 85.43-203.27 203.72-203.27 112.53 0 202.82 89.46 202.82 203.26-.01 121.69-99.68 202.82-202.84 202.82z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M314.9 194.4v101.4h-28.3v120.5h-77.1V295.9h-28.3V194.4c0-4.4 1.6-8.2 4.6-11.3 3.1-3.1 6.9-4.7 11.3-4.7H299c4.1 0 7.8 1.6 11.1 4.7 3.1 3.2 4.8 6.9 4.8 11.3zm-101.5-63.7c0-23.3 11.5-35 34.5-35s34.5 11.7 34.5 35c0 23-11.5 34.5-34.5 34.5s-34.5-11.5-34.5-34.5zM247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3z"></path></svg></span><span class="twemoji"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 496 512"><!--! Font Awesome Free 6.2.0 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2022 Fonticons, Inc.--><path d="M247.6 8C389.4 8 496 118.1 496 256c0 147.1-118.5 248-248.4 248C113.6 504 0 394.5 0 256 0 123.1 104.7 8 247.6 8zm.8 44.7C130.2 52.7 44.7 150.6 44.7 256c0 109.8 91.2 202.8 203.7 202.8 103.2 0 202.8-81.1 202.8-202.8.1-113.8-90.2-203.3-202.8-203.3zm94 144.3v42.5H162.1V197h180.3zm0 79.8v42.5H162.1v-42.5h180.3z"></path></svg></span>
|
||||||
|
Inhoud gelicentieerd onder <a href="/about/"><strong>CC BY-ND 4.0</strong></a>.
|
||||||
|
edit_uri: edit/main/docs/
|
||||||
|
|
||||||
|
extra:
|
||||||
|
generator: false
|
||||||
|
analytics:
|
||||||
|
provider: plausible
|
||||||
|
property: privacyguides.org
|
||||||
|
feedback:
|
||||||
|
title: "Was deze pagina nuttig?"
|
||||||
|
ratings:
|
||||||
|
- icon: material/robot-happy-outline
|
||||||
|
name: "Deze pagina was nuttig"
|
||||||
|
data: Helpful
|
||||||
|
note: "Bedankt voor je feedback!"
|
||||||
|
- icon: material/robot-confused
|
||||||
|
name: "Deze pagina kan worden verbeterd"
|
||||||
|
data: Needs Improvement
|
||||||
|
note: "Bedankt voor jouw feedback! Help ons deze pagina te verbeteren door een <a href='https://discuss.privacyguides.net/'>discussie te openen op ons forum</a>."
|
||||||
|
|
||||||
|
theme:
|
||||||
|
language: nl
|
||||||
|
palette:
|
||||||
|
- media: "(prefers-color-scheme)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-auto
|
||||||
|
name: "Verander naar licht thema"
|
||||||
|
- media: "(prefers-color-scheme: dark)"
|
||||||
|
scheme: slate
|
||||||
|
accent: amber
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-2
|
||||||
|
name: "Verander naar systeem thema"
|
||||||
|
- media: "(prefers-color-scheme: light)"
|
||||||
|
scheme: default
|
||||||
|
accent: deep purple
|
||||||
|
toggle:
|
||||||
|
icon: material/brightness-5
|
||||||
|
name: "Verander naar donker thema"
|
||||||
|
|
||||||
|
nav:
|
||||||
|
- Home: 'index.md'
|
||||||
|
- Kennisbank:
|
||||||
|
- 'basics/threat-modeling.md'
|
||||||
|
- 'basics/common-threats.md'
|
||||||
|
- 'basics/common-misconceptions.md'
|
||||||
|
- 'basics/account-creation.md'
|
||||||
|
- 'basics/account-deletion.md'
|
||||||
|
- Technologie essenties:
|
||||||
|
- 'basics/passwords-overview.md'
|
||||||
|
- 'basics/multi-factor-authentication.md'
|
||||||
|
- 'basics/email-security.md'
|
||||||
|
- 'basics/vpn-overview.md'
|
||||||
|
- Besturings systemen:
|
||||||
|
- 'os/android-overview.md'
|
||||||
|
- 'os/linux-overview.md'
|
||||||
|
- 'os/qubes-overview.md'
|
||||||
|
- Gevorderde onderwerpen:
|
||||||
|
- 'advanced/dns-overview.md'
|
||||||
|
- 'advanced/tor-overview.md'
|
||||||
|
- 'advanced/communication-network-types.md'
|
||||||
|
- kb-archive.md
|
||||||
|
- Recommendaties:
|
||||||
|
- 'tools.md'
|
||||||
|
- Surfen op het internet:
|
||||||
|
- 'tor.md'
|
||||||
|
- 'desktop-browsers.md'
|
||||||
|
- 'mobile-browsers.md'
|
||||||
|
- Besturings systemen:
|
||||||
|
- 'android.md'
|
||||||
|
- 'desktop.md'
|
||||||
|
- 'router.md'
|
||||||
|
- Providers:
|
||||||
|
- 'cloud.md'
|
||||||
|
- 'dns.md'
|
||||||
|
- 'email.md'
|
||||||
|
- 'search-engines.md'
|
||||||
|
- 'vpn.md'
|
||||||
|
- Software:
|
||||||
|
- 'calendar.md'
|
||||||
|
- 'data-redaction.md'
|
||||||
|
- 'email-clients.md'
|
||||||
|
- 'encryption.md'
|
||||||
|
- 'file-sharing.md'
|
||||||
|
- 'frontends.md'
|
||||||
|
- 'multi-factor-authentication.md'
|
||||||
|
- 'news-aggregators.md'
|
||||||
|
- 'notebooks.md'
|
||||||
|
- 'passwords.md'
|
||||||
|
- 'productivity.md'
|
||||||
|
- 'real-time-communication.md'
|
||||||
|
- 'video-streaming.md'
|
||||||
|
- Over ons:
|
||||||
|
- 'about/index.md'
|
||||||
|
- 'about/criteria.md'
|
||||||
|
- 'about/statistics.md'
|
||||||
|
- 'about/notices.md'
|
||||||
|
- 'about/privacy-policy.md'
|
||||||
|
- Community:
|
||||||
|
- 'about/donate.md'
|
||||||
|
- Online Services: 'about/services.md'
|
||||||
|
- Code of Conduct: 'CODE_OF_CONDUCT.md'
|
||||||
|
- 'about/privacytools.md'
|
||||||
|
- Contributing:
|
||||||
|
- Writing Guide:
|
||||||
|
- 'meta/writing-style.md'
|
||||||
|
- 'meta/brand.md'
|
||||||
|
- Technical Guides:
|
||||||
|
- 'meta/uploading-images.md'
|
||||||
|
- 'meta/git-recommendations.md'
|
||||||
|
- Changelog: 'https://github.com/privacyguides/privacyguides.org/releases'
|
||||||
|
- Forum: 'https://discuss.privacyguides.net/'
|
||||||
|
- Blog: 'https://blog.privacyguides.org/'
|
15
crowdin.yml
@ -1,16 +1,17 @@
|
|||||||
project_id_env: CROWDIN_PROJECT_ID
|
|
||||||
api_token_env: CROWDIN_PERSONAL_TOKEN
|
api_token_env: CROWDIN_PERSONAL_TOKEN
|
||||||
|
project_id: "509862"
|
||||||
"preserve_hierarchy": true
|
"preserve_hierarchy": true
|
||||||
files:
|
files:
|
||||||
- source: "/docs/**/*.en.*"
|
- source: "/docs/**/*.*"
|
||||||
translation: "/docs/**/%file_name%.%two_letters_code%.%file_extension%"
|
translation: "/i18n/%two_letters_code%/**/%file_name%.%file_extension%"
|
||||||
translation_replace:
|
skip_untranslated_files: false
|
||||||
"en.": ""
|
|
||||||
- source: "/theme/overrides/*.en.html"
|
- source: "/theme/overrides/*.en.html"
|
||||||
translation: "/theme/overrides/%file_name%.%two_letters_code%.html"
|
translation: "/theme/overrides/%file_name%.%two_letters_code%.html"
|
||||||
translation_replace:
|
translation_replace:
|
||||||
"en.": ""
|
"en.": ""
|
||||||
- source: "/includes/*.en.md"
|
skip_untranslated_files: false
|
||||||
translation: "/includes/%file_name%.%two_letters_code%.md"
|
- source: "/includes/*.en.*"
|
||||||
|
translation: "/includes/%file_name%.%two_letters_code%.%file_extension%"
|
||||||
translation_replace:
|
translation_replace:
|
||||||
"en.": ""
|
"en.": ""
|
||||||
|
skip_untranslated_files: false
|
||||||
|
17
docs/404.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
---
|
||||||
|
hide:
|
||||||
|
- feedback
|
||||||
|
---
|
||||||
|
|
||||||
|
# 404 - Not Found
|
||||||
|
|
||||||
|
We couldn't find the page you were looking for! Maybe you were looking for one of these?
|
||||||
|
|
||||||
|
- [Introduction to Threat Modeling](basics/threat-modeling.md)
|
||||||
|
- [Recommended DNS Providers](dns.md)
|
||||||
|
- [Best Desktop Web Browsers](desktop-browsers.md)
|
||||||
|
- [Best VPN Providers](vpn.md)
|
||||||
|
- [Privacy Guides Forum](https://discuss.privacyguides.net)
|
||||||
|
- [Our Blog](https://blog.privacyguides.org)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -38,3 +38,5 @@ We have these requirements in regard to developers which wish to submit their pr
|
|||||||
|
|
||||||
- Must state what the exact threat model is with their project.
|
- Must state what the exact threat model is with their project.
|
||||||
- It should be clear to potential users what the project can provide, and what it cannot.
|
- It should be clear to potential users what the project can provide, and what it cannot.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -43,3 +43,5 @@ Privacy Guides is a **non-profit** organization. We use donations for a variety
|
|||||||
: We occasionally purchase products and services for the purposes of testing our [recommended tools](../tools.md).
|
: We occasionally purchase products and services for the purposes of testing our [recommended tools](../tools.md).
|
||||||
|
|
||||||
We are still working with our fiscal host (the Open Collective Foundation) to receive cryptocurrency donations, at the moment the accounting is unfeasible for many smaller transactions, but this should change in the future. In the meantime, if you wish to make a sizable (> $100) cryptocurrency donation, please reach out to [jonah@privacyguides.org](mailto:jonah@privacyguides.org).
|
We are still working with our fiscal host (the Open Collective Foundation) to receive cryptocurrency donations, at the moment the accounting is unfeasible for many smaller transactions, but this should change in the future. In the meantime, if you wish to make a sizable (> $100) cryptocurrency donation, please reach out to [jonah@privacyguides.org](mailto:jonah@privacyguides.org).
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -59,3 +59,5 @@ Our team members review all changes made to the website and handle administrativ
|
|||||||
:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. If you remix, transform, or build upon the content of this website, you may not distribute the modified material.
|
:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. If you remix, transform, or build upon the content of this website, you may not distribute the modified material.
|
||||||
|
|
||||||
This license is in place to prevent people from sharing our work without giving proper credit, and to prevent people from modifying our work in a way that could be used to mislead people. If you find the terms of this license too restrictive for the project you're working on, please reach out to us at `jonah@privacyguides.org`. We are happy to provide alternative licensing options for well-intentioned projects in the privacy space!
|
This license is in place to prevent people from sharing our work without giving proper credit, and to prevent people from modifying our work in a way that could be used to mislead people. If you find the terms of this license too restrictive for the project you're working on, please reach out to us at `jonah@privacyguides.org`. We are happy to provide alternative licensing options for well-intentioned projects in the privacy space!
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -41,3 +41,5 @@ You must not conduct any systematic or automated data collection activities on o
|
|||||||
* Scraping
|
* Scraping
|
||||||
* Data Mining
|
* Data Mining
|
||||||
* 'Framing' (IFrames)
|
* 'Framing' (IFrames)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -52,9 +52,12 @@ jonah@privacyguides.org
|
|||||||
For all other inquiries, you can contact any member of our team.
|
For all other inquiries, you can contact any member of our team.
|
||||||
|
|
||||||
For complaints under GDPR more generally, you may lodge complaints with your local data protection supervisory authorities.
|
For complaints under GDPR more generally, you may lodge complaints with your local data protection supervisory authorities.
|
||||||
|
In France it's the Commission Nationale de l'Informatique et des Libertés which take care and handle the complaints. They provide a [template of complaint letter](https://www.cnil.fr/en/plaintes) to use.
|
||||||
|
|
||||||
## About This Policy
|
## About This Policy
|
||||||
|
|
||||||
We will post any new versions of this statement [here](privacy-policy.md). We may change how we announce changes in future versions of this document. In the meantime we may update our contact information at any time without announcing a change. Please refer to the [Privacy Policy](privacy-policy.md) for the latest contact information at any time.
|
We will post any new versions of this statement [here](privacy-policy.md). We may change how we announce changes in future versions of this document. In the meantime we may update our contact information at any time without announcing a change. Please refer to the [Privacy Policy](privacy-policy.md) for the latest contact information at any time.
|
||||||
|
|
||||||
A full revision [history](https://github.com/privacyguides/privacyguides.org/commits/main/docs/about/privacy-policy.md) of this page can be found on GitHub.
|
A full revision [history](https://github.com/privacyguides/privacyguides.org/commits/main/docs/about/privacy-policy.md) of this page can be found on GitHub.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -115,3 +115,5 @@ This topic has been discussed extensively within our communities in various loca
|
|||||||
- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/)
|
- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/)
|
||||||
- [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496)
|
- [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496)
|
||||||
- [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20)
|
- [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -29,3 +29,12 @@ Access may be granted upon request to Privacy Guides team members, Matrix modera
|
|||||||
- Domain: [search.privacyguides.net](https://search.privacyguides.net)
|
- Domain: [search.privacyguides.net](https://search.privacyguides.net)
|
||||||
- Availability: Public
|
- Availability: Public
|
||||||
- Source: [github.com/searxng/searxng-docker](https://github.com/searxng/searxng-docker)
|
- Source: [github.com/searxng/searxng-docker](https://github.com/searxng/searxng-docker)
|
||||||
|
|
||||||
|
## Invidious
|
||||||
|
|
||||||
|
- Domain: [invidious.privacyguides.net](https://invidious.privacyguides.net)
|
||||||
|
- Availability: Semi-Public
|
||||||
|
We host Invidious primarily to serve embedded YouTube videos on our website, this instance is not intended for general-purpose use and may be limited at any time.
|
||||||
|
- Source: [github.com/iv-org/invidious](https://github.com/iv-org/invidious)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -58,3 +58,5 @@ title: Traffic Statistics
|
|||||||
})
|
})
|
||||||
})
|
})
|
||||||
</script>
|
</script>
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -100,3 +100,5 @@ Self-hosting a node in an anonymous routing network does not provide the hoster
|
|||||||
- Less reliable if nodes are selected by randomized routing, some nodes may be very far from the sender and receiver, adding latency or even failing to transmit messages if one of the nodes goes offline.
|
- Less reliable if nodes are selected by randomized routing, some nodes may be very far from the sender and receiver, adding latency or even failing to transmit messages if one of the nodes goes offline.
|
||||||
- More complex to get started, as the creation and secured backup of a cryptographic private key is required.
|
- More complex to get started, as the creation and secured backup of a cryptographic private key is required.
|
||||||
- Just like other decentralized platforms, adding features is more complex for developers than on a centralized platform. Hence, features may be lacking or incompletely implemented, such as offline message relaying or message deletion.
|
- Just like other decentralized platforms, adding features is more complex for developers than on a centralized platform. Hence, features may be lacking or incompletely implemented, such as offline message relaying or message deletion.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -304,3 +304,5 @@ The [EDNS Client Subnet](https://en.wikipedia.org/wiki/EDNS_Client_Subnet) is a
|
|||||||
It's intended to "speed up" delivery of data by giving the client an answer that belongs to a server that is close to them such as a [content delivery network](https://en.wikipedia.org/wiki/Content_delivery_network), which are often used in video streaming and serving JavaScript web apps.
|
It's intended to "speed up" delivery of data by giving the client an answer that belongs to a server that is close to them such as a [content delivery network](https://en.wikipedia.org/wiki/Content_delivery_network), which are often used in video streaming and serving JavaScript web apps.
|
||||||
|
|
||||||
This feature does come at a privacy cost, as it tells the DNS server some information about the client's location.
|
This feature does come at a privacy cost, as it tells the DNS server some information about the client's location.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -75,5 +75,7 @@ If you wish to use Tor for browsing the web, we only recommend the **official**
|
|||||||
## Additional Resources
|
## Additional Resources
|
||||||
|
|
||||||
- [Tor Browser User Manual](https://tb-manual.torproject.org)
|
- [Tor Browser User Manual](https://tb-manual.torproject.org)
|
||||||
- [How Tor Works - Computerphile](https://www.youtube-nocookie.com/embed/QRYzre4bf7I) <small>(YouTube)</small>
|
- [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) <small>(YouTube)</small>
|
||||||
- [Tor Onion Services - Computerphile](https://www.youtube-nocookie.com/embed/lVcbq_a5N9I) <small>(YouTube)</small>
|
- [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) <small>(YouTube)</small>
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -312,13 +312,13 @@ If you download APK files to install manually, you can verify their signature wi
|
|||||||
|
|
||||||
Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust.
|
Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust.
|
||||||
|
|
||||||
Other popular third-party repositories such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that respository when they make it to the main F-droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates.
|
Other popular third-party repositories such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that respository when they make it to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates.
|
||||||
|
|
||||||
That said, the [F-droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through Play Store, Aurora Store, or by getting the APK directly from the developer. It is important to keep in mind that some apps in these repositories have not been updated in years and may rely on unsupported libraries, among other things, posing a potential security risk. You should use your best judgement when looking for new apps via this method.
|
That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through Play Store, Aurora Store, or by getting the APK directly from the developer. It is important to keep in mind that some apps in these repositories have not been updated in years and may rely on unsupported libraries, among other things, posing a potential security risk. You should use your best judgement when looking for new apps via this method.
|
||||||
|
|
||||||
!!! note
|
!!! note
|
||||||
|
|
||||||
In some rare cases, the developer of an app will only distribute it through F-droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using [Neo Store](https://github.com/NeoApplications/Neo-Store/) instead of the official F-droid app to obtain it.
|
In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using [Neo Store](https://github.com/NeoApplications/Neo-Store/) instead of the official F-Droid app to obtain it.
|
||||||
|
|
||||||
## Criteria
|
## Criteria
|
||||||
|
|
||||||
@ -351,3 +351,5 @@ That said, the [F-droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](htt
|
|||||||
- Applications on this page must not be applicable to any other software category on the site.
|
- Applications on this page must not be applicable to any other software category on the site.
|
||||||
- General applications should extend or replace core system functionality.
|
- General applications should extend or replace core system functionality.
|
||||||
- Applications should receive regular updates and maintenance.
|
- Applications should receive regular updates and maintenance.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
Before Width: | Height: | Size: 27 KiB After Width: | Height: | Size: 27 KiB |
@ -1,75 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
|
||||||
<!-- Created with Inkscape (http://www.inkscape.org/) -->
|
|
||||||
<svg xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:cc="http://creativecommons.org/ns#" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:svg="http://www.w3.org/2000/svg" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd" xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape" width="48" height="48" viewBox="0 0 48.000001 48.000001" id="svg4230" version="1.1" inkscape:version="0.91 r13725" sodipodi:docname="fdroid-logo.svg">
|
|
||||||
<defs id="defs4232">
|
|
||||||
<linearGradient inkscape:collect="always" id="linearGradient5212">
|
|
||||||
<stop style="stop-color:#ffffff;stop-opacity:0.09803922" offset="0" id="stop5214"/>
|
|
||||||
<stop style="stop-color:#ffffff;stop-opacity:0" offset="1" id="stop5216"/>
|
|
||||||
</linearGradient>
|
|
||||||
<radialGradient inkscape:collect="always" xlink:href="#linearGradient5212" id="radialGradient5220" cx="-98.23381" cy="3.4695871" fx="-98.23381" fy="3.4695871" r="22.671185" gradientTransform="matrix(0,1.9747624,-2.117225,3.9784049e-8,8.677247,1199.588)" gradientUnits="userSpaceOnUse"/>
|
|
||||||
<filter inkscape:collect="always" style="color-interpolation-filters:sRGB" id="filter4175" x="-0.023846937" width="1.0476939" y="-0.02415504" height="1.0483101">
|
|
||||||
<feGaussianBlur inkscape:collect="always" stdDeviation="0.45053152" id="feGaussianBlur4177"/>
|
|
||||||
</filter>
|
|
||||||
</defs>
|
|
||||||
<sodipodi:namedview id="base" pagecolor="#ffffff" bordercolor="#666666" borderopacity="1.0" inkscape:pageopacity="0.0" inkscape:pageshadow="2" inkscape:zoom="11.313708" inkscape:cx="6.4184057" inkscape:cy="25.737489" inkscape:document-units="px" inkscape:current-layer="layer1" showgrid="true" units="px" inkscape:window-width="1920" inkscape:window-height="1009" inkscape:window-x="0" inkscape:window-y="34" inkscape:window-maximized="1" gridtolerance="10000"/>
|
|
||||||
<metadata id="metadata4235">
|
|
||||||
<rdf:RDF>
|
|
||||||
<cc:Work rdf:about="">
|
|
||||||
<dc:format>image/svg+xml</dc:format>
|
|
||||||
<dc:type rdf:resource="http://purl.org/dc/dcmitype/StillImage"/>
|
|
||||||
<dc:title/>
|
|
||||||
<cc:license rdf:resource="http://creativecommons.org/licenses/by-sa/3.0/"/>
|
|
||||||
</cc:Work>
|
|
||||||
<cc:License rdf:about="http://creativecommons.org/licenses/by-sa/3.0/">
|
|
||||||
<cc:permits rdf:resource="http://creativecommons.org/ns#Reproduction"/>
|
|
||||||
<cc:permits rdf:resource="http://creativecommons.org/ns#Distribution"/>
|
|
||||||
<cc:requires rdf:resource="http://creativecommons.org/ns#Notice"/>
|
|
||||||
<cc:requires rdf:resource="http://creativecommons.org/ns#Attribution"/>
|
|
||||||
<cc:permits rdf:resource="http://creativecommons.org/ns#DerivativeWorks"/>
|
|
||||||
<cc:requires rdf:resource="http://creativecommons.org/ns#ShareAlike"/>
|
|
||||||
</cc:License>
|
|
||||||
</rdf:RDF>
|
|
||||||
</metadata>
|
|
||||||
<g inkscape:label="Layer 1" inkscape:groupmode="layer" id="layer1" transform="translate(0,-1004.3622)">
|
|
||||||
<path style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#263238;fill-opacity:0.4;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter4175);color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate" d="m 2.613462,1006.3488 a 1.250125,1.250125 0 0 0 -1.01172,2.0293 l 3.60351,4.6641 c -0.12699,0.3331 -0.20312,0.6915 -0.20312,1.0703 l 0,4 0,2.8652 0,0.1348 c 0,1.662 1.338,3 3,3 l 32,0 c 1.662,0 3,-1.338 3,-3 l 0,-4 0,-2.8652 0,-0.1348 c 0,-0.3803 -0.0771,-0.74 -0.20508,-1.0742 l 3.60156,-4.6602 a 1.250125,1.250125 0 0 0 -1.04882,-2.0273 1.250125,1.250125 0 0 0 -0.92969,0.498 l -3.43164,4.4414 c -0.31022,-0.1079 -0.63841,-0.1777 -0.98633,-0.1777 l -32,0 c -0.34857,0 -0.67757,0.069 -0.98828,0.1777 l -3.4336,-4.4414 a 1.250125,1.250125 0 0 0 -0.96679,-0.5 z m 5.38867,18.7637 c -0.20775,0 -0.40983,0.021 -0.60547,0.061 -1.36951,0.2761 -2.39453,1.4698 -2.39453,2.9101 l 0,0.029 0,19.7793 0,0.029 0,0.1914 c 0,1.662 1.338,3 3,3 l 32,0 c 1.662,0 3,-1.338 3,-3 l 0,-20 0,-0.029 c 0,-1.4403 -1.02502,-2.634 -2.39453,-2.9101 -0.19565,-0.039 -0.39772,-0.061 -0.60547,-0.061 l -32,0 z" id="path4192" inkscape:connector-curvature="0"/>
|
|
||||||
<g id="g5012">
|
|
||||||
<g id="g4179" transform="matrix(-1,0,0,1,47.999779,0)">
|
|
||||||
<path style="fill:#8ab000;fill-opacity:1;fill-rule:evenodd;stroke:#769616;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" d="m 2.5889342,1006.8622 4.25,5.5" id="path4181" inkscape:connector-curvature="0" sodipodi:nodetypes="cc"/>
|
|
||||||
<path sodipodi:nodetypes="cccccc" inkscape:connector-curvature="0" id="path4183" d="m 2.6113281,1005.6094 c -0.4534623,0.012 -0.7616975,0.189 -0.9807462,0.4486 2.0269314,2.4089 2.368401,2.7916 5.1354735,6.2214 1.0195329,1.319 2.0816026,0.6373 1.0620696,-0.6817 l -4.25,-5.5 c -0.2289894,-0.3056 -0.5850813,-0.478 -0.9667969,-0.4883 z" style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#ffffff;fill-opacity:0.29803923;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate"/>
|
|
||||||
<path sodipodi:nodetypes="ccccc" inkscape:connector-curvature="0" id="path4185" d="m 1.6220992,1006.0705 c -0.1238933,0.1479 -0.561176,0.8046 -0.02249,1.5562 l 4.25,5.5 c 1.0195329,1.319 1.1498748,-0.6123 1.1498748,-0.6123 0,0 -3.7344514,-4.51 -5.3773848,-6.4439 z" style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#263238;fill-opacity:0.2;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate"/>
|
|
||||||
<path sodipodi:nodetypes="cscccc" inkscape:connector-curvature="0" id="path4187" d="m 2.3378905,1005.8443 c -0.438175,0 -0.959862,0.1416 -0.8242183,0.7986 0.103561,0.5016 4.6608262,6.0744 4.6608262,6.0744 1.0195329,1.319 2.4934721,0.6763 1.4739391,-0.6425 l -4.234375,-5.4727 c -0.2602394,-0.29 -0.6085188,-0.7436 -1.076172,-0.7578 z" style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#8ab000;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate"/>
|
|
||||||
</g>
|
|
||||||
<g id="g4955">
|
|
||||||
<path sodipodi:nodetypes="cc" inkscape:connector-curvature="0" id="path4945" d="m 2.5889342,1006.8622 4.25,5.5" style="fill:#8ab000;fill-opacity:1;fill-rule:evenodd;stroke:#769616;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"/>
|
|
||||||
<path style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#ffffff;fill-opacity:0.29803923;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate" d="m 2.6113281,1005.6094 c -0.4534623,0.012 -0.7616975,0.189 -0.9807462,0.4486 2.0269314,2.4089 2.368401,2.7916 5.1354735,6.2214 1.0195329,1.319 2.0816026,0.6373 1.0620696,-0.6817 l -4.25,-5.5 c -0.2289894,-0.3056 -0.5850813,-0.478 -0.9667969,-0.4883 z" id="path4947" inkscape:connector-curvature="0" sodipodi:nodetypes="cccccc"/>
|
|
||||||
<path style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#263238;fill-opacity:0.2;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate" d="m 1.6220992,1006.0705 c -0.1238933,0.1479 -0.561176,0.8046 -0.02249,1.5562 l 4.25,5.5 c 1.0195329,1.319 1.1498748,-0.6123 1.1498748,-0.6123 0,0 -3.7344514,-4.51 -5.3773848,-6.4439 z" id="path4951" inkscape:connector-curvature="0" sodipodi:nodetypes="ccccc"/>
|
|
||||||
<path style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#8ab000;fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate" d="m 2.3378905,1005.8443 c -0.438175,0 -0.959862,0.1416 -0.8242183,0.7986 0.103561,0.5016 4.6608262,6.0744 4.6608262,6.0744 1.0195329,1.319 2.4934721,0.6763 1.4739391,-0.6425 l -4.234375,-5.4727 c -0.2602394,-0.29 -0.6085188,-0.7436 -1.076172,-0.7578 z" id="path4925" inkscape:connector-curvature="0" sodipodi:nodetypes="cscccc"/>
|
|
||||||
</g>
|
|
||||||
<g transform="translate(42,0)" id="g4967">
|
|
||||||
<rect style="opacity:1;fill:#aeea00;fill-opacity:1;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1" id="rect4144" width="38" height="13" x="-37" y="1010.3622" rx="3" ry="3"/>
|
|
||||||
<rect ry="3" rx="3" y="1013.3622" x="-37" height="10" width="38" id="rect4961" style="opacity:1;fill:#263238;fill-opacity:0.2;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"/>
|
|
||||||
<rect ry="3" rx="3" y="1010.3622" x="-37" height="10" width="38" id="rect4963" style="opacity:1;fill:#ffffff;fill-opacity:0.29803923;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"/>
|
|
||||||
<rect ry="2.5384617" rx="3" y="1011.3622" x="-37" height="11" width="38" id="rect4965" style="opacity:1;fill:#aeea00;fill-opacity:1;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"/>
|
|
||||||
</g>
|
|
||||||
<g id="g4979">
|
|
||||||
<rect style="opacity:1;fill:#1976d2;fill-opacity:1;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1" id="rect4146" width="38" height="26" x="5" y="1024.3622" rx="3" ry="3"/>
|
|
||||||
<rect ry="3" rx="3" y="1037.3622" x="5" height="13" width="38" id="rect4973" style="opacity:1;fill:#263238;fill-opacity:0.2;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"/>
|
|
||||||
<rect ry="3" rx="3" y="1024.3622" x="5" height="13" width="38" id="rect4975" style="opacity:1;fill:#ffffff;fill-opacity:0.2;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"/>
|
|
||||||
<rect ry="2.7692308" rx="3" y="1025.3622" x="5" height="24" width="38" id="rect4977" style="opacity:1;fill:#1976d2;fill-opacity:1;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:3;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"/>
|
|
||||||
</g>
|
|
||||||
<g transform="translate(0,1013.3622)" id="g4211">
|
|
||||||
<path style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:#0d47a1;fill-opacity:1;fill-rule:nonzero;stroke:none;stroke-width:3;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate" d="m 24,17.75 c -2.880662,0 -5.319789,1.984685 -6.033203,4.650391 l 3.212891,0 C 21.734004,21.415044 22.774798,20.75 24,20.75 c 1.812692,0 3.25,1.437308 3.25,3.25 0,1.812693 -1.437308,3.25 -3.25,3.25 -1.307381,0 -2.411251,-0.75269 -2.929688,-1.849609 l -3.154296,0 C 18.558263,28.166146 21.04791,30.25 24,30.25 c 3.434013,0 6.25,-2.815987 6.25,-6.25 0,-3.434012 -2.815987,-6.25 -6.25,-6.25 z" id="path4161" inkscape:connector-curvature="0"/>
|
|
||||||
<circle style="opacity:1;fill:none;fill-opacity:0.40392157;stroke:#0d47a1;stroke-width:1.89999998;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1" id="path4209" cx="24" cy="24" r="9.5500002"/>
|
|
||||||
</g>
|
|
||||||
<g id="g4989" transform="translate(0,0.50001738)">
|
|
||||||
<ellipse cy="1016.4872" cx="14.375" id="circle4985" style="opacity:1;fill:#263238;fill-opacity:0.2;stroke:none;stroke-width:1.89999998;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:0.69721117" rx="3.375" ry="3.875"/>
|
|
||||||
<circle style="opacity:1;fill:#ffffff;fill-opacity:1;stroke:none;stroke-width:1.89999998;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:0.69721117" id="path4859" cx="14.375" cy="1016.9872" r="3.375"/>
|
|
||||||
</g>
|
|
||||||
<g transform="translate(19.5,0.50001738)" id="g4171">
|
|
||||||
<ellipse ry="3.875" rx="3.375" style="opacity:1;fill:#263238;fill-opacity:0.2;stroke:none;stroke-width:1.89999998;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:0.69721117" id="ellipse4175" cx="14.375" cy="1016.4872"/>
|
|
||||||
<circle r="3.375" cy="1016.9872" cx="14.375" id="circle4177" style="opacity:1;fill:#ffffff;fill-opacity:1;stroke:none;stroke-width:1.89999998;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:0.69721117"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<path inkscape:connector-curvature="0" id="path5128" d="m 2.613462,1005.5987 a 1.250125,1.250125 0 0 0 -1.01172,2.0293 l 3.60351,4.6641 c -0.12699,0.3331 -0.20312,0.6915 -0.20312,1.0703 l 0,4 0,2.8652 0,0.1348 c 0,1.662 1.338,3 3,3 l 32,0 c 1.662,0 3,-1.338 3,-3 l 0,-4 0,-2.8652 0,-0.1348 c 0,-0.3803 -0.0771,-0.74 -0.20508,-1.0742 l 3.60156,-4.6602 a 1.250125,1.250125 0 0 0 -1.04882,-2.0273 1.250125,1.250125 0 0 0 -0.92969,0.498 l -3.43164,4.4414 c -0.31022,-0.1079 -0.63841,-0.1777 -0.98633,-0.1777 l -32,0 c -0.34857,0 -0.67757,0.069 -0.98828,0.1777 l -3.4336,-4.4414 a 1.250125,1.250125 0 0 0 -0.96679,-0.5 z m 5.38867,18.7637 c -0.20775,0 -0.40983,0.021 -0.60547,0.061 -1.36951,0.2761 -2.39453,1.4698 -2.39453,2.9101 l 0,0.029 0,19.7793 0,0.029 0,0.1914 c 0,1.662 1.338,3 3,3 l 32,0 c 1.662,0 3,-1.338 3,-3 l 0,-20 0,-0.029 c 0,-1.4403 -1.02502,-2.634 -2.39453,-2.9101 -0.19565,-0.039 -0.39772,-0.061 -0.60547,-0.061 l -32,0 z" style="color:#000000;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:medium;line-height:normal;font-family:sans-serif;text-indent:0;text-align:start;text-decoration:none;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000000;letter-spacing:normal;word-spacing:normal;text-transform:none;direction:ltr;block-progression:tb;writing-mode:lr-tb;baseline-shift:baseline;text-anchor:start;white-space:normal;clip-rule:nonzero;display:inline;overflow:visible;visibility:visible;opacity:1;isolation:auto;mix-blend-mode:normal;color-interpolation:sRGB;color-interpolation-filters:linearRGB;solid-color:#000000;solid-opacity:1;fill:url(#radialGradient5220);fill-opacity:1;fill-rule:evenodd;stroke:none;stroke-width:2.5;stroke-linecap:round;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;color-rendering:auto;image-rendering:auto;shape-rendering:auto;text-rendering:auto;enable-background:accumulate"/>
|
|
||||||
</g>
|
|
||||||
</svg>
|
|
Before Width: | Height: | Size: 21 KiB |
Before Width: | Height: | Size: 50 KiB After Width: | Height: | Size: 50 KiB |
Before Width: | Height: | Size: 47 KiB After Width: | Height: | Size: 47 KiB |
Before Width: | Height: | Size: 96 KiB After Width: | Height: | Size: 96 KiB |
Before Width: | Height: | Size: 93 KiB After Width: | Height: | Size: 93 KiB |
@ -1,2 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<svg width="64mm" height="64mm" version="1.1" viewBox="0 0 64 64" xmlns="http://www.w3.org/2000/svg"><path id="cloud-upload" d="m64 34.286a17.033 17.033 0 0 1-4.4062 11.429 14.857 14.857 0 0 1-10.558 4.5714h-2.1786v-6.8571h2.1786a8.0044 8.0044 0 0 0 5.4688-2.3103 10.184 10.184 0 0 0 2.6384-6.8326 11.442 11.442 0 0 0-11.429-11.429c-0.37683 0-2.3126 0.2418-3.4903 0.3935a1.136 1.136 0 0 1-1.2211-0.76359l-0.46538-1.3576a14.103 14.103 0 0 0-11.716-9.6317 13.666 13.666 0 0 0-14.73 16.779l0.4881 2.0877a1.1429 1.1429 0 0 1-0.78226 1.3542l-2.054 0.62062a6.7941 6.7941 0 0 0-4.8861 6.5178 4.6044 4.6044 0 0 0 0.94642 2.808 5.5388 5.5388 0 0 0 4.0893 1.7634h5.25v6.8571h-5.25a12.236 12.236 0 0 1-9.6808-4.6518 11.506 11.506 0 0 1-2.212-6.7768 13.573 13.573 0 0 1 6.9442-11.884c-0.057884-0.6138-0.087074-1.2254-0.087074-1.8304a20.563 20.563 0 0 1 38.987-9.1428 18.307 18.307 0 0 1 18.156 18.286zm-31.077-2.1632a1.1429 1.1429 0 0 0-1.8465 0l-8.5917 11.775a1.1429 1.1429 0 0 0 0.92327 1.8165h5.1631v12.571a1.1429 1.1429 0 0 0 1.1428 1.1429h4.5714a1.1429 1.1429 0 0 0 1.1429-1.1429v-12.571h5.1631a1.1429 1.1429 0 0 0 0.92326-1.8165z" fill="#45a1ff" stroke-width="2.2857"/></svg>
|
|
Before Width: | Height: | Size: 1.2 KiB |
@ -1,63 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
|
||||||
<svg
|
|
||||||
width="1280"
|
|
||||||
height="1280"
|
|
||||||
viewBox="0 0 1280 1280"
|
|
||||||
fill="none"
|
|
||||||
version="1.1"
|
|
||||||
id="svg15"
|
|
||||||
sodipodi:docname="bw.svg"
|
|
||||||
inkscape:version="1.2.2 (b0a8486541, 2022-12-01)"
|
|
||||||
xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape"
|
|
||||||
xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd"
|
|
||||||
xmlns="http://www.w3.org/2000/svg"
|
|
||||||
xmlns:svg="http://www.w3.org/2000/svg">
|
|
||||||
<sodipodi:namedview
|
|
||||||
id="namedview17"
|
|
||||||
pagecolor="#ffffff"
|
|
||||||
bordercolor="#000000"
|
|
||||||
borderopacity="0.25"
|
|
||||||
inkscape:showpageshadow="2"
|
|
||||||
inkscape:pageopacity="0.0"
|
|
||||||
inkscape:pagecheckerboard="0"
|
|
||||||
inkscape:deskcolor="#d1d1d1"
|
|
||||||
showgrid="false"
|
|
||||||
inkscape:zoom="0.34023438"
|
|
||||||
inkscape:cx="348.28932"
|
|
||||||
inkscape:cy="661.30884"
|
|
||||||
inkscape:window-width="1251"
|
|
||||||
inkscape:window-height="993"
|
|
||||||
inkscape:window-x="0"
|
|
||||||
inkscape:window-y="0"
|
|
||||||
inkscape:window-maximized="1"
|
|
||||||
inkscape:current-layer="svg15" />
|
|
||||||
<path
|
|
||||||
d="m 1106.8657,639.34162 c 0,-5.51084 -2.9241,-10.60761 -7.6815,-13.39078 L 285.2517,150.02764 c -14.22957,-8.32175 -32.11737,1.94223 -32.11737,18.42352 v 205.27116 c 0,7.69852 4.14486,14.79943 10.84879,18.5836 l 405.63124,229.03691 c 14.46434,8.16807 14.46434,29.00339 0,37.17146 L 263.98312,887.5512 c -6.70393,3.78417 -10.84879,10.88721 -10.84879,18.58573 v 205.22417 c 0,16.492 17.90701,26.7538 32.13658,18.415 L 1099.197,652.72386 c 4.751,-2.7853 7.6687,-7.87781 7.6687,-13.38224 z"
|
|
||||||
fill="url(#paint0_linear_115_2)"
|
|
||||||
id="path4"
|
|
||||||
style="fill:url(#paint0_linear_115_2);stroke-width:2.13433" />
|
|
||||||
<path
|
|
||||||
d="m 540.53872,621.09525 c 14.42165,8.17661 14.42165,28.95643 0,37.13304 l -255.5346,144.88888 c -14.22743,8.06563 -31.86979,-2.21116 -31.86979,-18.56652 V 494.77289 c 0,-16.35749 17.64236,-26.63428 31.86979,-18.56652 z"
|
|
||||||
fill="#f2eeff"
|
|
||||||
id="path6"
|
|
||||||
style="stroke-width:2.13433" />
|
|
||||||
<defs
|
|
||||||
id="defs13">
|
|
||||||
<linearGradient
|
|
||||||
id="paint0_linear_115_2"
|
|
||||||
x1="680"
|
|
||||||
y1="409"
|
|
||||||
x2="680"
|
|
||||||
y2="870.813"
|
|
||||||
gradientUnits="userSpaceOnUse"
|
|
||||||
gradientTransform="matrix(2.1343284,0,0,2.1343284,-771.34328,-725.86444)">
|
|
||||||
<stop
|
|
||||||
stop-color="#FF5A8B"
|
|
||||||
id="stop8" />
|
|
||||||
<stop
|
|
||||||
offset="1"
|
|
||||||
stop-color="#FFD1A7"
|
|
||||||
id="stop10" />
|
|
||||||
</linearGradient>
|
|
||||||
</defs>
|
|
||||||
</svg>
|
|
Before Width: | Height: | Size: 2.4 KiB |
@ -1,6 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
|
||||||
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
|
||||||
<svg width="100%" height="100%" viewBox="0 0 1280 1280" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xml:space="preserve" xmlns:serif="http://www.serif.com/" style="fill-rule:evenodd;clip-rule:evenodd;stroke-linejoin:round;stroke-miterlimit:2;">
|
|
||||||
<path id="path4" d="M1106.87,639.342C1106.87,633.831 1103.94,628.734 1099.18,625.951L285.252,150.028C271.022,141.706 253.134,151.97 253.134,168.451L253.134,373.722C253.134,381.421 257.279,388.522 263.983,392.306L669.614,621.343C684.079,629.511 684.079,650.346 669.614,658.514L263.983,887.551C257.279,891.335 253.134,898.438 253.134,906.137L253.134,1111.36C253.134,1127.85 271.041,1138.12 285.271,1129.78L1099.2,652.724C1103.95,649.939 1106.87,644.846 1106.87,639.342Z" style="fill:rgb(22,19,22);fill-rule:nonzero;"/>
|
|
||||||
<path id="path6" d="M540.539,621.095C554.96,629.272 554.96,650.052 540.539,658.228L285.004,803.117C270.777,811.183 253.134,800.906 253.134,784.551L253.134,494.773C253.134,478.415 270.777,468.139 285.004,476.206L540.539,621.095Z" style="fill:rgb(22,19,22);fill-rule:nonzero;"/>
|
|
||||||
</svg>
|
|
Before Width: | Height: | Size: 1.2 KiB |
@ -1,2 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<svg width="666.67" height="666.67" version="1" viewBox="0 0 500 500" xmlns="http://www.w3.org/2000/svg"><path d="M73.6 33.6L71 36.3v427.4l2.6 2.7 2.7 2.6h87.4l2.7-2.6 2.6-2.7V339.9c0-102.6.2-123.9 1.3-123.9.8 0 41.1 56.1 89.7 124.7 48.5 68.7 89.2 125.6 90.4 126.5 1.9 1.6 5.5 1.8 37.7 1.8h35.6l2.7-2.6 2.6-2.7V36.3l-2.6-2.7-2.7-2.6h-87.4l-2.7 2.6-2.6 2.7v123.8c0 102.6-.2 123.9-1.3 123.9-.8 0-41.1-56.1-89.7-124.8-48.5-68.6-89.2-125.5-90.4-126.4-1.9-1.6-5.5-1.8-37.7-1.8H76.3l-2.7 2.6zm158.9 147.1c51.2 72.3 94.4 133.1 96.1 134.9 2.9 3.1 3.6 3.4 9.1 3.4 5.2 0 6.4-.4 8.7-2.6l2.6-2.7V49h62v402l-25.2-.1h-25.3l-93-131.6c-51.1-72.3-94.4-133.1-96.1-134.9-2.9-3.1-3.6-3.4-9.1-3.4-5.2 0-6.4.4-8.7 2.6l-2.6 2.7V451H89V49l25.3.1h25.2l93 131.6z" fill="#ff6c60" stroke="#ff6c60" stroke-width=".99975"/></svg>
|
|
Before Width: | Height: | Size: 839 B |
@ -1,2 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<svg width="128" height="128" version="1.1" viewBox="0 0 33.867 33.867" xmlns="http://www.w3.org/2000/svg"><g transform="matrix(1.4916 0 0 1.4916 -108.81 -169.4)"><path d="m75.442 117.85c3.3426-0.62057 5.8921-0.31143 8.1139 2.4694 2.9164-2.5188 5.4372-2.8222 9.1722-2.8222-4.1614-5.3918-13.3-5.0479-17.286 0.35278m-2.4694 8.8194h0.35278c0.57274-2.4745 1.4387-4.7979 3.5278-6.35-0.0024 3.6523-2.0171 8.0642-1.0975 11.636 0.49495 1.9227 3.2713 3.1322 4.9781 3.7012 4.9853 1.6617 10.772-0.5401 13.344-5.1071 2.4443-4.3407 2.4887-10.227-3.1135-10.936-0.54247 2.8791-1.2627 5.8902-1.3972 8.8194-0.0545 1.1867 0.16563 2.8529-1.1229 3.4973-1.6634 0.83189-2.0984-1.2819-2.0042-2.439 0.26141-3.2124 1.2561-6.5356 2.4076-9.525-1.338 0.0285-3.3185 0.0732-4.3735 1.0352-0.7456 0.67987-0.64012 1.9754-1.0793 2.8451-1.3627 2.6986-3.871 3.4357-6.5416 2.4697 1.198-0.74525 2.8991-1.1261 3.5245-2.5076 1.8751-4.1413-4.1426-6.0016-6.4428-3.0566-1.2381 1.5851-0.96224 4.037-0.96224 5.9169z" fill="#4343ff"/></g></svg>
|
|
Before Width: | Height: | Size: 1.0 KiB |
@ -1,2 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<svg version="1.1" viewBox="0 0 128 128" xmlns="http://www.w3.org/2000/svg"><g transform="scale(.125)" stroke-miterlimit="0" stroke-width="0"><rect id="bg" x="5e-7" y="5e-7" width="1024" height="1024" fill="#1b345f" style="paint-order:markers stroke fill"/><circle id="circle" cx="512" cy="512" r="406.19" fill="#ee3a3a" style="paint-order:markers stroke fill"/><path id="outer" d="m327.85 320.22a50 50 0 0 0-50 50v198.11a50 50 0 0 0 50 50h15.107v-190.81a50 50 0 0 1 50-50h266.35v-7.2949a50 50 0 0 0-50-50z" fill="#fff" style="paint-order:markers stroke fill"/><path id="square" x="367.19916" y="403.98566" width="378.94815" height="299.79266" d="m417.2 403.99h278.95a50 50 45 0 1 50 50v199.79a50 50 135 0 1-50 50h-278.95a50 50 45 0 1-50-50v-199.79a50 50 135 0 1 50-50z" fill="#fff" style="paint-order:markers stroke fill"/><path id="triangle" transform="matrix(.98233 0 0 .98233 1118.3 105.84)" d="m-643.31 522.07v-131.93a14.434 14.434 150 0 1 21.651-12.5l114.25 65.963a14.434 14.434 90 0 1 0 25l-114.25 65.963a14.434 14.434 30 0 1-21.651-12.5z" fill="#ee3a3a" style="paint-order:markers stroke fill"/></g></svg>
|
|
Before Width: | Height: | Size: 1.1 KiB |
Before Width: | Height: | Size: 16 KiB After Width: | Height: | Size: 16 KiB |
Before Width: | Height: | Size: 16 KiB After Width: | Height: | Size: 16 KiB |
Before Width: | Height: | Size: 14 KiB After Width: | Height: | Size: 14 KiB |
Before Width: | Height: | Size: 14 KiB After Width: | Height: | Size: 14 KiB |
Before Width: | Height: | Size: 116 KiB |
Before Width: | Height: | Size: 144 KiB |
Before Width: | Height: | Size: 127 KiB |
Before Width: | Height: | Size: 95 KiB |
Before Width: | Height: | Size: 130 KiB After Width: | Height: | Size: 130 KiB |
Before Width: | Height: | Size: 137 KiB |
Before Width: | Height: | Size: 173 KiB |
Before Width: | Height: | Size: 154 KiB |
Before Width: | Height: | Size: 137 KiB |
Before Width: | Height: | Size: 115 KiB After Width: | Height: | Size: 115 KiB |
@ -1,2 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<svg id="svg" version="1.1" viewBox="0 0 400 400" xmlns="http://www.w3.org/2000/svg"><g id="svgg" fill-rule="evenodd"><path d="m192.97 62.129c-26.656 3.317-47.983 19.882-57.565 44.71-3.853 9.982-4.545 15.747-4.545 37.851v17.306l-6.738 0.232c-14.347 0.494-22.587 5.938-26.729 17.659l-1.103 3.121v29.492c0 32.127 0.031 32.689 2.391 43.3 7.874 35.404 34.139 64.851 68.117 76.367 64.962 22.019 132.51-23.702 137.13-92.819 0.687-10.284 0.297-55.379-0.502-58.008-3.668-12.066-12.845-18.84-25.525-18.84-2.61 0-5.562-0.112-6.558-0.248l-1.813-0.249v-16.507c0-21.046-0.486-25.958-3.516-35.535-9.734-30.76-41.753-51.726-73.046-47.832m15.537 24.046c16.237 2.877 30.363 15.383 35.396 31.336 2.023 6.411 2.192 8.514 2.192 27.267v17.331h-45.899-45.898v-17.331c0-13.608 0.125-18.05 0.582-20.673 4.48-25.69 28.165-42.442 53.627-37.93m-2.898 121.87c16.242 4.187 21.698 24.248 9.976 36.683-4.224 4.481-4.355 4.975-3.637 13.767 0.717 8.774 0.689 10.256-0.241 12.743-3.982 10.643-19.039 10.643-23.021 0-0.93-2.485-0.959-3.97-0.244-12.722 0.716-8.755 0.61-9.191-3.224-13.329-15.541-16.775-1.291-42.732 20.391-37.142" fill="#f4f5f5"/><path d="m66.797 0.623c-34.231 4.974-61.413 32.288-66.186 66.507-0.93 6.668-0.93 259.07 0 265.74 4.796 34.385 32.134 61.723 66.519 66.519 6.668 0.93 259.07 0.93 265.74 0 34.385-4.796 61.723-32.134 66.519-66.519 0.93-6.668 0.93-259.07 0-265.74-4.795-34.376-32.143-61.724-66.519-66.519-6.215-0.867-260.1-0.855-266.07 0.012m147.07 62.252c28.834 6.201 50.351 28.799 55.107 57.871 0.535 3.274 0.698 7.656 0.843 22.669l0.18 18.61 7.091 0.164c13.738 0.317 22.526 6.264 26.147 17.694 1.083 3.416 1.371 60.296 0.341 67.187-9.283 62.11-67.941 102.56-127.69 88.048-42.787-10.389-75.15-47.632-79.396-91.368-0.9-9.268-0.357-61.056 0.672-64.062 3.924-11.473 12.498-17.212 26.144-17.502l7.092-0.15 0.179-18.616c0.281-29.073 2.88-38.928 14.315-54.268 15.529-20.833 43.951-31.661 68.979-26.277m-20.508 23.266c-18.263 2.85-33.014 16.445-37.53 34.59-1.16 4.66-1.519 10.98-1.526 26.828l-6e-3 14.55h45.898 45.899l-6e-3 -14.55c-7e-3 -15.848-0.367-22.168-1.527-26.828-5.762-23.154-28.041-38.204-51.202-34.59m3.259 121.69c-17.389 3.099-23.811 23.765-11.46 36.877 4.079 4.331 4.177 4.691 3.58 13.041-0.882 12.331-0.586 14.057 3.034 17.681 4.868 4.873 11.978 4.873 16.847 0 3.62-3.624 3.916-5.35 3.034-17.681-0.598-8.35-0.499-8.71 3.58-13.041 14.6-15.5 1.959-40.543-18.615-36.877" fill="#1444b4"/><path d="m273.03 307.72-1.346 1.465 1.465-1.346c0.805-0.741 1.464-1.4 1.464-1.465 0-0.299-0.33-0.018-1.583 1.346" fill="#6884c7"/><path d="m150.95 82.129-1.147 1.269 1.269-1.147c1.184-1.069 1.449-1.392 1.148-1.392-0.068 0-0.639 0.572-1.27 1.27m-20.305 64.16c0 8.809 0.051 12.468 0.114 8.132 0.063-4.337 0.063-11.544 0-16.016-0.062-4.472-0.114-0.925-0.114 7.884m139.06 3.32c0 6.983 0.053 9.839 0.118 6.348 0.064-3.491 0.064-9.204 0-12.695-0.065-3.491-0.118-0.635-0.118 6.347" fill="#4c6cc4"/><path d="m274.12 162.4c1.343 0.076 3.54 0.076 4.883 0 1.343-0.077 0.244-0.139-2.441-0.139-2.686 0-3.785 0.062-2.442 0.139m29.892 75.882c0 0.967 0.076 1.363 0.169 0.879 0.093-0.483 0.093-1.274 0-1.758-0.093-0.483-0.169-0.088-0.169 0.879m-109.97 99.495c0.483 0.093 1.274 0.093 1.758 0 0.483-0.093 0.088-0.17-0.879-0.17s-1.362 0.077-0.879 0.17m10.547 0c0.483 0.093 1.274 0.093 1.758 0 0.483-0.093 0.088-0.17-0.879-0.17s-1.363 0.077-0.879 0.17" fill="#8c9ccc"/><path d="m269.67 133.79c-1e-3 1.934 0.065 2.774 0.147 1.867 0.082-0.906 0.083-2.488 2e-3 -3.515s-0.148-0.286-0.149 1.648" fill="#3c62ba"/></g></svg>
|
|
Before Width: | Height: | Size: 3.4 KiB |
Before Width: | Height: | Size: 111 KiB After Width: | Height: | Size: 111 KiB |
Before Width: | Height: | Size: 1.4 MiB After Width: | Height: | Size: 1.4 MiB |
@ -1,125 +0,0 @@
|
|||||||
<?xml version="1.0" encoding="UTF-8"?>
|
|
||||||
<!DOCTYPE svg PUBLIC '-//W3C//DTD SVG 1.1//EN' 'http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd'>
|
|
||||||
<svg clip-rule="evenodd" fill-rule="evenodd" stroke-linejoin="round" stroke-miterlimit="2" version="1.1" viewBox="0 0 128 128" xml:space="preserve" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">
|
|
||||||
<g transform="matrix(1.0638 0 0 1.0684 -29.885 -16.775)">
|
|
||||||
<clipPath id="_clip1">
|
|
||||||
<path d="m38.8 34.1v-4.8c0-0.4 0.1-1.1 0.1-1.1l0.2-0.5v-0.2l0.2-0.4 0.1-0.1 0.1-0.2 0.1-0.1v-0.1l0.2-0.2v-0.1l0.7-0.7 0.2-0.1h0.1l0.3-0.2h0.3l0.6-0.3c0.4-0.1 0.7-0.1 1.1-0.1h94.6v9.2h9v-18.4h-103.6c-7.3 0-13.3 6.1-13.3 13.6v4.8h9z"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip1)">
|
|
||||||
<rect x="30.2" y="14.7" width="117.1" height="12" fill="#898b8d"/>
|
|
||||||
</g>
|
|
||||||
<clipPath id="_clip2">
|
|
||||||
<path d="m38.8 34.1v-4.8c0-0.4 0.1-1.1 0.1-1.1l0.2-0.5v-0.2l0.2-0.4 0.1-0.1 0.1-0.2 0.1-0.1v-0.1l0.2-0.2v-0.1l0.7-0.7 0.2-0.1h0.1l0.3-0.2h0.3l0.6-0.3c0.4-0.1 0.7-0.1 1.1-0.1h94.6v9.2h9v-18.4h-103.6c-7.3 0-13.3 6.1-13.3 13.6v4.8h9z"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip2)">
|
|
||||||
<clipPath id="_clip3">
|
|
||||||
<path d="m133.8 27 13.2-7.1 3.7 7.2-13.2 7.1-3.7-7.2z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip3)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.98026 .94825)" x="114.723" y="4.732" width="13.724px" height="15.172px" xlink:href="#_Image4"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<clipPath id="_clip5">
|
|
||||||
<path d="m38.8 34.1v-4.8c0-0.4 0.1-1.1 0.1-1.1l0.2-0.5v-0.2l0.2-0.4 0.1-0.1 0.1-0.2 0.1-0.1v-0.1l0.2-0.2v-0.1l0.7-0.7 0.2-0.1h0.1l0.3-0.2h0.3l0.6-0.3c0.4-0.1 0.7-0.1 1.1-0.1h94.6v9.2h9v-18.4h-103.6c-7.3 0-13.3 6.1-13.3 13.6v4.8h9z"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip5)">
|
|
||||||
<clipPath id="_clip6">
|
|
||||||
<path d="m31.9 21.1 10.7 5.8-3.7 7.2-10.7-5.7 3.7-7.3z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip6)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.97267 .99213)" x="1.869" y="5.815" width="13.617px" height="13.89px" xlink:href="#_Image7"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<rect x="47.8" y="34.1" width="80.9" height="9.2" fill="#403f41"/>
|
|
||||||
<rect x="47.8" y="108" width="80.9" height="9.2" fill="#403f41"/>
|
|
||||||
<clipPath id="_clip8">
|
|
||||||
<path d="m137.7 117.1v4.9c0 0.4-0.1 1.1-0.1 1.1l-0.2 0.5v0.2l-0.2 0.4-0.1 0.1-0.1 0.2-0.1 0.1v0.1l-0.2 0.2v0.1l-0.5 0.5h-0.1l-0.1 0.1-0.2 0.1-0.1 0.1-0.3 0.2h-0.3l-0.5 0.2c-0.4 0.1-0.7 0.1-1.1 0.1h-94.7v-9.2h-9v18.4h103.6c7.3 0 13.3-6.1 13.3-13.6v-4.8h-9z"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip8)">
|
|
||||||
<rect x="29.2" y="124.6" width="117.1" height="12" fill="#898b8d"/>
|
|
||||||
</g>
|
|
||||||
<clipPath id="_clip9">
|
|
||||||
<path d="m137.7 117.1v4.9c0 0.4-0.1 1.1-0.1 1.1l-0.2 0.5v0.2l-0.2 0.4-0.1 0.1-0.1 0.2-0.1 0.1v0.1l-0.2 0.2v0.1l-0.5 0.5h-0.1l-0.1 0.1-0.2 0.1-0.1 0.1-0.3 0.2h-0.3l-0.5 0.2c-0.4 0.1-0.7 0.1-1.1 0.1h-94.7v-9.2h-9v18.4h103.6c7.3 0 13.3-6.1 13.3-13.6v-4.8h-9z"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip9)">
|
|
||||||
<clipPath id="_clip10">
|
|
||||||
<path d="m42.7 124.4-13.2 7.1-3.7-7.3 13.2-7.1 3.7 7.3z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip10)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.98026 .9616)" x="1.854" y="112.667" width="13.724px" height="15.386px" xlink:href="#_Image11"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<clipPath id="_clip12">
|
|
||||||
<path d="m137.7 117.1v4.9c0 0.4-0.1 1.1-0.1 1.1l-0.2 0.5v0.2l-0.2 0.4-0.1 0.1-0.1 0.2-0.1 0.1v0.1l-0.2 0.2v0.1l-0.5 0.5h-0.1l-0.1 0.1-0.2 0.1-0.1 0.1-0.3 0.2h-0.3l-0.5 0.2c-0.4 0.1-0.7 0.1-1.1 0.1h-94.7v-9.2h-9v18.4h103.6c7.3 0 13.3-6.1 13.3-13.6v-4.8h-9z"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip12)">
|
|
||||||
<clipPath id="_clip13">
|
|
||||||
<path d="m144.7 130.2-10.8-5.8 3.7-7.2 10.8 5.7-3.7 7.3z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip13)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.97267 .99213)" x="115.728" y="109.308" width="13.617px" height="13.89px" xlink:href="#_Image14"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<rect x="38.8" y="52.6" width="34.6" height="9.2" fill="#58595b"/>
|
|
||||||
<clipPath id="_clip15">
|
|
||||||
<path d="m69.7 69.2-31.3-16.8 3.7-7.4 31.4 16.8-3.8 7.4z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip15)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.98266 .99448)" x="11.16" y="31.479" width="37.341px" height="25.856px" xlink:href="#_Image16"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<rect x="103.1" y="52.6" width="34.6" height="9.2" fill="#58595b"/>
|
|
||||||
<clipPath id="_clip17">
|
|
||||||
<path d="m106.8 69.2 31.4-16.8-3.8-7.4-31.3 16.8 3.7 7.4z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip17)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.98266 .99448)" x="81.206" y="31.479" width="37.341px" height="25.856px" xlink:href="#_Image16"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<rect x="103.1" y="89.5" width="34.6" height="9.2" fill="#58595b"/>
|
|
||||||
<clipPath id="_clip18">
|
|
||||||
<path d="m106.8 82.1 31.4 16.8-3.8 7.4-31.3-16.8 3.7-7.4z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip18)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.98266 .99448)" x="81.206" y="71.339" width="37.341px" height="25.856px" xlink:href="#_Image16"/>
|
|
||||||
</g>
|
|
||||||
</g>
|
|
||||||
<rect x="38.8" y="89.5" width="34.6" height="9.2" fill="#58595b"/>
|
|
||||||
<clipPath id="_clip19">
|
|
||||||
<path d="m69.7 82.1-31.3 16.8 3.7 7.4 31.4-16.8-3.8-7.4z" clip-rule="nonzero"/>
|
|
||||||
</clipPath>
|
|
||||||
<g clip-path="url(#_clip19)">
|
|
||||||
<g transform="matrix(.93998 -0 -0 .93594 28.091 15.7)">
|
|
||||||
<use transform="scale(.98266 .99448)" x="11.16" y="71.339" width="37.341px" height="25.856px" xlink:href="#_Image16"/>
|
|
||||||
</g>
|
|
||||||
</g><g fill-rule="nonzero">
|
|
||||||
<path d="m73.4 52.6v9.2l-43.6-23.3v-9.2l43.6 23.3z" fill="url(#_Linear20)"/>
|
|
||||||
<path d="m103.1 52.6v9.2l43.6-23.3v-9.2l-43.6 23.3z" fill="url(#_Linear21)"/>
|
|
||||||
<path d="m103.1 98.8v-9.3l43.6 23.3v9.3l-43.6-23.3z" fill="url(#_Linear22)"/>
|
|
||||||
<path d="m73.4 98.8v-9.3l-43.6 23.3v9.3l43.6-23.3z" fill="url(#_Linear23)"/>
|
|
||||||
<path d="m103.1 80.3 25.6 13.7v-9.3l-8.3-4.4h26.3v-9.3h-26.3l8.3-4.4v-9.2l-25.6 13.6v9.3z" fill="#e24525"/>
|
|
||||||
<path d="m47.8 94 25.6-13.7v-9.3l-25.6-13.6v9.2l8.4 4.4h-26.4v9.3h26.3l-8.3 4.4v9.3z" fill="#e24525"/>
|
|
||||||
</g></g>
|
|
||||||
<defs>
|
|
||||||
<image id="_Image4" width="14px" height="16px" xlink:href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAA4AAAAQCAYAAAAmlE46AAAACXBIWXMAAA7EAAAOxAGVKw4bAAAAI0lEQVQokWMsLi7+z0AGYCJH00jRyIguQGwoDyE/jmqkhUYAma0EzxtWDhkAAAAASUVORK5CYII="/>
|
|
||||||
<image id="_Image7" width="14px" height="14px" xlink:href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAA4AAAAOCAYAAAAfSC3RAAAACXBIWXMAAA7EAAAOxAGVKw4bAAAAPklEQVQokWNkgILi4uL/DCQARnI0MTAwMDCRqgFuIzm2UWQjC6kaent7GUm2EaaJZI3IgGiNyLbRx8YhrBEAaikMHGN+VycAAAAASUVORK5CYII="/>
|
|
||||||
<image id="_Image11" width="14px" height="16px" xlink:href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAA4AAAAQCAYAAAAmlE46AAAACXBIWXMAAA7EAAAOxAGVKw4bAAAAKUlEQVQokWM0Njb+z0AEOHv2LCMyn4kYTdjAqMbhoZGR2JRDNRtHgkYALcwFtyg+QT8AAAAASUVORK5CYII="/>
|
|
||||||
<image id="_Image14" width="14px" height="14px" xlink:href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAA4AAAAOCAYAAAAfSC3RAAAACXBIWXMAAA7EAAAOxAGVKw4bAAAAP0lEQVQokWNkQAPGxsb/0cWwASZiFI1UjYzIHGJDlDo2kmIbAwMDAyOpGmCAvqF69uxZRvrZePbsWUYGBgYGAL1XC0kWB9UkAAAAAElFTkSuQmCC"/>
|
|
||||||
<image id="_Image16" width="38px" height="26px" xlink:href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACYAAAAaCAYAAADbhS54AAAACXBIWXMAAA7EAAAOxAGVKw4bAAAAPElEQVRIie3OsRGAIAAAMWRKPPefQyagSKXFZ4Jc637e8UPz68BJMVVMFVPFVDFVTBVTxVQxVUwVU8XUBl5UAj8RVzT1AAAAAElFTkSuQmCC"/>
|
|
||||||
<linearGradient id="_Linear20" x2="1" gradientTransform="matrix(43.56,0,0,43.56,29.84,45.5)" gradientUnits="userSpaceOnUse"><stop stop-color="#a6a8ab" offset="0"/><stop stop-color="#a6a8ab" offset=".24"/><stop stop-color="#404040" offset="1"/></linearGradient>
|
|
||||||
<linearGradient id="_Linear21" x2="1" gradientTransform="matrix(-43.6 5.3395e-15 -5.3395e-15 -43.6 146.7 45.5)" gradientUnits="userSpaceOnUse"><stop stop-color="#a6a8ab" offset="0"/><stop stop-color="#a6a8ab" offset=".24"/><stop stop-color="#404040" offset="1"/></linearGradient>
|
|
||||||
<linearGradient id="_Linear22" x2="1" gradientTransform="matrix(-43.56 5.3346e-15 -5.3346e-15 -43.56 146.68 606)" gradientUnits="userSpaceOnUse"><stop stop-color="#a6a8ab" offset="0"/><stop stop-color="#a6a8ab" offset=".24"/><stop stop-color="#404040" offset="1"/></linearGradient>
|
|
||||||
<linearGradient id="_Linear23" x2="1" gradientTransform="matrix(43.53,0,0,43.53,29.9,606)" gradientUnits="userSpaceOnUse"><stop stop-color="#a6a8ab" offset="0"/><stop stop-color="#a6a8ab" offset=".24"/><stop stop-color="#404040" offset="1"/></linearGradient>
|
|
||||||
</defs>
|
|
||||||
</svg>
|
|
Before Width: | Height: | Size: 9.5 KiB |
@ -78,3 +78,5 @@ In many cases you will need to provide a number that you can receive SMS or call
|
|||||||
### Username and password
|
### Username and password
|
||||||
|
|
||||||
Some services allow you to register without using an email address and only require you to set a username and password. These services may provide increased anonymity when combined with a VPN or Tor. Keep in mind that for these accounts there will most likely be **no way to recover your account** in the event you forget your username or password.
|
Some services allow you to register without using an email address and only require you to set a username and password. These services may provide increased anonymity when combined with a VPN or Tor. Keep in mind that for these accounts there will most likely be **no way to recover your account** in the event you forget your username or password.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -59,3 +59,5 @@ Even when you are able to delete an account, there is no guarantee that all your
|
|||||||
## Avoid New Accounts
|
## Avoid New Accounts
|
||||||
|
|
||||||
As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you!
|
As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you!
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -57,3 +57,5 @@ One of the clearest threat models is one where people *know who you are* and one
|
|||||||
Using Tor can help with this. It is also worth noting that greater anonymity is possible through asynchronous communication: Real-time communication is vulnerable to analysis of typing patterns (i.e. more than a paragraph of text, distributed on a forum, via email, etc.)
|
Using Tor can help with this. It is also worth noting that greater anonymity is possible through asynchronous communication: Real-time communication is vulnerable to analysis of typing patterns (i.e. more than a paragraph of text, distributed on a forum, via email, etc.)
|
||||||
|
|
||||||
[^1]: One notable example of this is the [2021 incident in which University of Minnesota researchers introduced three vulnerabilities into the Linux kernel development project](https://cse.umn.edu/cs/linux-incident).
|
[^1]: One notable example of this is the [2021 incident in which University of Minnesota researchers introduced three vulnerabilities into the Linux kernel development project](https://cse.umn.edu/cs/linux-incident).
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -80,6 +80,8 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit
|
|||||||
|
|
||||||
If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/).
|
If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/).
|
||||||
|
|
||||||
|
In France you can take a look at the [Technolopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net.
|
||||||
|
|
||||||
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
|
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
|
||||||
|
|
||||||
!!! quote "ACLU: [*The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward*](https://www.aclu.org/news/national-security/the-privacy-lesson-of-9-11-mass-surveillance-is-not-the-way-forward)"
|
!!! quote "ACLU: [*The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward*](https://www.aclu.org/news/national-security/the-privacy-lesson-of-9-11-mass-surveillance-is-not-the-way-forward)"
|
||||||
@ -143,3 +145,5 @@ You must always consider the risks of trying to bypass censorship, the potential
|
|||||||
[^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism)
|
[^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism)
|
||||||
[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many adblockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques.
|
[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many adblockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques.
|
||||||
[^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights).
|
[^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights).
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -38,3 +38,5 @@ Email metadata is protected from outside observers with [Opportunistic TLS](http
|
|||||||
### Why Can't Metadata be E2EE?
|
### Why Can't Metadata be E2EE?
|
||||||
|
|
||||||
Email metadata is crucial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into the email protocols originally, instead requiring add-on software like OpenPGP. Because OpenPGP messages still have to work with traditional email providers, it cannot encrypt email metadata, only the message body itself. That means that even when using OpenPGP, outside observers can see lots of information about your messages, such as who you're emailing, the subject lines, when you're emailing, etc.
|
Email metadata is crucial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into the email protocols originally, instead requiring add-on software like OpenPGP. Because OpenPGP messages still have to work with traditional email providers, it cannot encrypt email metadata, only the message body itself. That means that even when using OpenPGP, outside observers can see lots of information about your messages, such as who you're emailing, the subject lines, when you're emailing, etc.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -77,7 +77,7 @@ When you create an account, the public key is sent to the service, then when you
|
|||||||
This presentation discusses the history of password authentication, the pitfalls (such as password reuse), and discussion of FIDO2 and [WebAuthn](https://webauthn.guide) standards.
|
This presentation discusses the history of password authentication, the pitfalls (such as password reuse), and discussion of FIDO2 and [WebAuthn](https://webauthn.guide) standards.
|
||||||
|
|
||||||
<div class="yt-embed">
|
<div class="yt-embed">
|
||||||
<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/aMo4ZlWznao" title="How FIDO2 and WebAuthn Stop Account Takeovers" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
<iframe width="560" height="315" src="https://invidious.privacyguides.net/embed/aMo4ZlWznao?local=true" title="How FIDO2 and WebAuthn Stop Account Takeovers" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
FIDO2 and WebAuthn have superior security and privacy properties when compared to any MFA methods.
|
FIDO2 and WebAuthn have superior security and privacy properties when compared to any MFA methods.
|
||||||
@ -161,3 +161,5 @@ SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How
|
|||||||
### KeePass (and KeePassXC)
|
### KeePass (and KeePassXC)
|
||||||
|
|
||||||
KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website.
|
KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -65,7 +65,7 @@ To generate a diceware passphrase using real dice, follow these steps:
|
|||||||
|
|
||||||
If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords.
|
If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords.
|
||||||
|
|
||||||
We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also other wordlists in different languages, if you do not want your passphrase to be in English.
|
We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
|
||||||
|
|
||||||
??? note "Explanation of entropy and strength of diceware passphrases"
|
??? note "Explanation of entropy and strength of diceware passphrases"
|
||||||
|
|
||||||
@ -108,3 +108,5 @@ There are many good options to choose from, both cloud-based and local. Choose o
|
|||||||
### Backups
|
### Backups
|
||||||
|
|
||||||
You should store an [encrypted](../encryption.md) backup of your passwords on multiple storage devices or a cloud storage provider. This can help you access your passwords if something happens to your primary device or the service you are using.
|
You should store an [encrypted](../encryption.md) backup of your passwords on multiple storage devices or a cloud storage provider. This can help you access your passwords if something happens to your primary device or the service you are using.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -102,3 +102,5 @@ For people looking to increase their privacy and security online, we've compiled
|
|||||||
## Sources
|
## Sources
|
||||||
|
|
||||||
- [EFF Surveillance Self Defense: Your Security Plan](https://ssd.eff.org/en/module/your-security-plan)
|
- [EFF Surveillance Self Defense: Your Security Plan](https://ssd.eff.org/en/module/your-security-plan)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -1,109 +0,0 @@
|
|||||||
---
|
|
||||||
title: "Bedreiging Modellering"
|
|
||||||
icon: 'material/target-account'
|
|
||||||
---
|
|
||||||
|
|
||||||
Een evenwicht vinden tussen veiligheid, privacy en gebruiksvriendelijkheid is een van de eerste en moeilijkste taken die u op uw privacyreis tegenkomt. Alles is een afweging: hoe veiliger iets is, hoe beperkter of onhandiger het over het algemeen is, enzovoort. Vaak vinden mensen het probleem met de hulpmiddelen die ze aanbevolen zien, dat ze gewoon te moeilijk zijn om te beginnen gebruiken!
|
|
||||||
|
|
||||||
Als je de **meest** veilige tools wilt gebruiken, moet je veel ** gebruiksgemak opofferen. En zelfs dan, ==niets is ooit volledig veilig.== Er is **hoge** veiligheid, maar nooit **volledige** veiligheid. Daarom zijn dreigingsmodellen belangrijk.
|
|
||||||
|
|
||||||
**Dus, wat zijn deze dreigingsmodellen eigenlijk?**
|
|
||||||
|
|
||||||
==Een bedreigingsmodel is een lijst van de meest waarschijnlijke bedreigingen voor uw veiligheid/privacy inspanningen.== Aangezien het onmogelijk is om jezelf te beschermen tegen **elke** aanval(er), moet je je richten op de **meest waarschijnlijke** bedreigingen. In computerbeveiliging is een bedreiging een potentiële gebeurtenis die uw inspanningen om privé en veilig te blijven kan ondermijnen.
|
|
||||||
|
|
||||||
Door u te concentreren op de bedreigingen die voor u van belang zijn, kunt u beter nadenken over de bescherming die u nodig hebt, zodat u de juiste hulpmiddelen kunt kiezen.
|
|
||||||
|
|
||||||
## Het creëren van uw dreigingsmodel
|
|
||||||
|
|
||||||
Om na te gaan wat er zou kunnen gebeuren met de dingen die u waardeert en om te bepalen tegen wie u ze moet beschermen, moet u deze vijf vragen beantwoorden:
|
|
||||||
|
|
||||||
1. Wat wil ik beschermen?
|
|
||||||
2. Tegen wie wil ik het beschermen?
|
|
||||||
3. Hoe groot is de kans dat ik het zal moeten beschermen?
|
|
||||||
4. Hoe erg zijn de gevolgen als ik faal?
|
|
||||||
5. Hoeveel moeite ben ik bereid te doen om mogelijke gevolgen te voorkomen?
|
|
||||||
|
|
||||||
### Wat wil ik beschermen?
|
|
||||||
|
|
||||||
Een "asset" is iets waar u waarde aan hecht en dat u wilt beschermen. In de context van digitale beveiliging is een activum meestal een soort informatie.== Bijvoorbeeld, uw e-mails, contactlijsten, instant-berichten, locatie en bestanden zijn allemaal mogelijke activa. Uw apparaten zelf kunnen ook activa zijn.
|
|
||||||
|
|
||||||
*Maak een lijst van uw activa: gegevens die u bewaart, waar ze worden bewaard, wie er toegang toe heeft en wat anderen ervan weerhoudt er toegang toe te krijgen.*
|
|
||||||
|
|
||||||
### Tegen wie wil ik het beschermen?
|
|
||||||
|
|
||||||
Om deze vraag te beantwoorden, is het belangrijk na te gaan wie u of uw informatie als doelwit zou willen gebruiken. ==Een persoon of entiteit die een bedreiging vormt voor uw bezittingen is een "tegenstander".== Voorbeelden van potentiële tegenstanders zijn uw baas, uw voormalige partner, uw zakelijke concurrentie, uw regering, of een hacker op een openbaar netwerk.
|
|
||||||
|
|
||||||
*Maak een lijst van uw tegenstanders of van degenen die uw bezittingen in handen zouden willen krijgen. Uw lijst kan personen, een overheidsinstantie of bedrijven omvatten.*
|
|
||||||
|
|
||||||
Afhankelijk van wie uw tegenstanders zijn, kan deze lijst onder bepaalde omstandigheden iets zijn dat u wilt vernietigen nadat u klaar bent met de beveiligingsplanning.
|
|
||||||
|
|
||||||
### Hoe groot is de kans dat ik het zal moeten beschermen?
|
|
||||||
|
|
||||||
== Risico is de kans dat een bepaalde dreiging tegen een bepaald goed zich voordoet.== Het gaat hand in hand met vermogen. Hoewel uw mobiele-telefoonprovider toegang heeft tot al uw gegevens, is het risico klein dat hij uw privégegevens online plaatst om uw reputatie te schaden.
|
|
||||||
|
|
||||||
Het is belangrijk onderscheid te maken tussen wat zou kunnen gebeuren en de waarschijnlijkheid dat het gebeurt. Er bestaat bijvoorbeeld een risico dat uw gebouw instort, maar het risico dat dit gebeurt is veel groter in San Francisco (waar aardbevingen vaak voorkomen) dan in Stockholm (waar dit niet het geval is).
|
|
||||||
|
|
||||||
Risico's inschatten is zowel een persoonlijk als een subjectief proces. Veel mensen vinden bepaalde bedreigingen onaanvaardbaar, ongeacht de waarschijnlijkheid dat zij zich zullen voordoen, omdat alleen al de aanwezigheid van de bedreiging, ongeacht de waarschijnlijkheid, de kosten niet waard is. In andere gevallen veronachtzamen mensen grote risico's omdat ze de dreiging niet als een probleem zien.
|
|
||||||
|
|
||||||
*Schrijf op welke bedreigingen u serieus gaat nemen, en welke te zeldzaam of te onschuldig zijn (of te moeilijk te bestrijden) om u zorgen over te maken.*
|
|
||||||
|
|
||||||
### Hoe erg zijn de gevolgen als ik faal?
|
|
||||||
|
|
||||||
Er zijn vele manieren waarop een tegenstander toegang tot uw gegevens kan krijgen. Een tegenstander kan bijvoorbeeld uw privécommunicatie lezen terwijl die door het netwerk gaat, of hij kan uw gegevens wissen of beschadigen.
|
|
||||||
|
|
||||||
==Een regering die de verspreiding van een video met politiegeweld wil verhinderen, kan ermee volstaan die video te verwijderen of de beschikbaarheid ervan te beperken. Daarentegen kan een politieke tegenstander toegang willen krijgen tot geheime inhoud en die inhoud publiceren zonder dat u dat weet.
|
|
||||||
|
|
||||||
Bij beveiligingsplanning gaat het erom te begrijpen wat de gevolgen kunnen zijn als een tegenstander zich met succes toegang verschaft tot een van uw bedrijfsmiddelen. Om dit te bepalen, moet u het vermogen van uw tegenstander in overweging nemen. De provider van uw mobiele telefoon heeft bijvoorbeeld toegang tot al uw telefoongegevens. Een hacker op een open Wi-Fi-netwerk kan toegang krijgen tot uw onversleutelde communicatie. Uw regering heeft misschien meer mogelijkheden.
|
|
||||||
|
|
||||||
*Schrijf op wat je tegenstander zou willen doen met je privégegevens.*
|
|
||||||
|
|
||||||
### Hoeveel moeite ben ik bereid te doen om mogelijke gevolgen te voorkomen?
|
|
||||||
|
|
||||||
==Er is geen perfecte optie voor beveiliging.== Niet iedereen heeft dezelfde prioriteiten, zorgen, of toegang tot middelen. Aan de hand van uw risicobeoordeling kunt u de juiste strategie voor u uitstippelen, waarbij gemak, kosten en privacy met elkaar in evenwicht worden gebracht.
|
|
||||||
|
|
||||||
Een advocaat die een cliënt vertegenwoordigt in een zaak van nationale veiligheid zal bijvoorbeeld bereid zijn meer moeite te doen om de communicatie over die zaak te beschermen, zoals het gebruik van gecodeerde e-mail, dan een moeder die haar dochter regelmatig grappige kattenvideo's e-mailt.
|
|
||||||
|
|
||||||
*Schrijf op welke opties u hebt om uw unieke bedreigingen te beperken. Noteer of u financiële, technische of sociale beperkingen hebt.*
|
|
||||||
|
|
||||||
### Probeer het zelf: Bescherm uw bezittingen
|
|
||||||
|
|
||||||
Deze vragen kunnen van toepassing zijn op een groot aantal situaties, online en offline. Laten we, als algemene demonstratie van hoe deze vragen werken, een plan opstellen om uw huis en bezittingen veilig te stellen.
|
|
||||||
|
|
||||||
**Wat wil je beschermen? (Of *wat heb je dat de moeite waard is om te beschermen?*)**
|
|
||||||
:
|
|
||||||
|
|
||||||
Uw bezittingen kunnen juwelen, elektronica, belangrijke documenten of foto's zijn.
|
|
||||||
|
|
||||||
**Tegen wie wil je het beschermen?**
|
|
||||||
:
|
|
||||||
|
|
||||||
Uw tegenstanders kunnen inbrekers, huisgenoten of gasten zijn.
|
|
||||||
|
|
||||||
**Hoe groot is de kans dat u het zult moeten beschermen?**
|
|
||||||
:
|
|
||||||
|
|
||||||
Heeft uw buurt een geschiedenis van inbraken? Hoe betrouwbaar zijn uw huisgenoten/gasten? Wat zijn de capaciteiten van uw tegenstanders? Wat zijn de risico's waarmee u rekening moet houden?
|
|
||||||
|
|
||||||
**Hoe erg zijn de gevolgen als je faalt?**
|
|
||||||
:
|
|
||||||
|
|
||||||
Heeft u iets in uw huis dat u niet kunt vervangen? Heb je de tijd of het geld om deze dingen te vervangen? Heeft u een verzekering die goederen dekt die uit uw huis zijn gestolen?
|
|
||||||
|
|
||||||
**Hoeveel moeite bent u bereid te doen om deze gevolgen te voorkomen?**
|
|
||||||
:
|
|
||||||
|
|
||||||
Bent u bereid een kluis te kopen voor gevoelige documenten? Kunt u het zich veroorloven een slot van hoge kwaliteit te kopen? Heeft u tijd om een kluisje te openen bij uw plaatselijke bank en uw waardevolle spullen daar te bewaren?
|
|
||||||
|
|
||||||
Pas als u zichzelf deze vragen hebt gesteld, zult u kunnen beoordelen welke maatregelen u moet nemen. Als uw bezittingen waardevol zijn, maar de kans op inbraak klein, dan wilt u misschien niet te veel geld investeren in een slot. Maar als de kans op inbraak groot is, wilt u het beste slot op de markt en overweegt u een beveiligingssysteem toe te voegen.
|
|
||||||
|
|
||||||
Het opstellen van een beveiligingsplan zal u helpen inzicht te krijgen in de bedreigingen die uniek zijn voor u en een evaluatie te maken van uw activa, uw tegenstanders en de mogelijkheden van uw tegenstanders, samen met de waarschijnlijkheid van de risico's waarmee u wordt geconfronteerd.
|
|
||||||
|
|
||||||
## Meer lezen
|
|
||||||
|
|
||||||
Voor mensen die hun privacy en veiligheid online willen vergroten, hebben we een lijst samengesteld van veelvoorkomende bedreigingen waarmee onze bezoekers te maken krijgen of doelen die onze bezoekers hebben, om u wat inspiratie te geven en de basis van onze aanbevelingen te laten zien.
|
|
||||||
|
|
||||||
- [Gemeenschappelijke doelstellingen en bedreigingen :hero-arrow-circle-right-fill:](common-threats.md)
|
|
||||||
|
|
||||||
## Bronnen
|
|
||||||
|
|
||||||
- [EFF Surveillance Zelfverdediging: Uw Beveiligingsplan](https://ssd.eff.org/en/module/your-security-plan)
|
|
@ -74,3 +74,5 @@ For situations like these, or if you have another compelling reason, the VPN pro
|
|||||||
- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/)
|
- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/)
|
||||||
- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/)
|
- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/)
|
||||||
- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/)
|
- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -1,76 +0,0 @@
|
|||||||
---
|
|
||||||
title: VPN-overzicht
|
|
||||||
icon: material/vpn
|
|
||||||
---
|
|
||||||
|
|
||||||
Virtual Private Networks zijn een manier om het einde van uw netwerk uit te breiden tot een uitgang ergens anders in de wereld. Een ISP kan de stroom van internetverkeer zien dat uw netwerkaansluitapparaat (d.w.z. modem) binnenkomt en verlaat.
|
|
||||||
|
|
||||||
Encryptieprotocollen zoals HTTPS worden algemeen gebruikt op het internet, zodat zij misschien niet precies kunnen zien wat u post of leest, maar zij kunnen wel een idee krijgen van de [domeinen die u opvraagt](../advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns).
|
|
||||||
|
|
||||||
Een VPN kan helpen omdat het vertrouwen kan verschuiven naar een server ergens anders in de wereld. Het resultaat is dat de ISP dan alleen ziet dat je verbonden bent met een VPN en niets over de activiteit die je erin doorgeeft.
|
|
||||||
|
|
||||||
## Moet ik een VPN gebruiken?
|
|
||||||
|
|
||||||
**Ja**, tenzij je Tor al gebruikt. Een VPN doet twee dingen: het verschuift de risico's van uw Internet Service Provider naar zichzelf en het verbergt uw IP voor een dienst van derden.
|
|
||||||
|
|
||||||
VPN's kunnen geen gegevens versleutelen buiten de verbinding tussen uw toestel en de VPN-server. VPN providers kunnen uw verkeer zien en wijzigen op dezelfde manier als uw ISP dat kan. En er is geen enkele manier om het "no logging" beleid van een VPN provider te verifiëren.
|
|
||||||
|
|
||||||
Zij verbergen echter wel uw werkelijke IP-adres voor een dienst van derden, op voorwaarde dat er geen IP-lekken zijn. Ze helpen je op te gaan in anderen en IP-gebaseerde opsporing te beperken.
|
|
||||||
|
|
||||||
## Wanneer zou ik geen VPN moeten gebruiken?
|
|
||||||
|
|
||||||
Het gebruik van een VPN in gevallen waarin u uw [bekende identiteit](common-threats.md#common-misconceptions) gebruikt, is waarschijnlijk niet nuttig.
|
|
||||||
|
|
||||||
Dit kan spam- en fraudedetectiesystemen alarmeren, zoals wanneer u zou inloggen op de website van uw bank.
|
|
||||||
|
|
||||||
## Hoe zit het met encryptie?
|
|
||||||
|
|
||||||
De encryptie die door VPN-aanbieders wordt aangeboden, bevindt zich tussen uw apparaten en hun servers. Het garandeert dat deze specifieke link veilig is. Dit is een stap verder dan het gebruik van onversleutelde proxies, waarbij een tegenstander op het netwerk de communicatie tussen uw apparaten en deze proxies kan onderscheppen en wijzigen. De versleuteling tussen uw apps of browsers en de dienstverleners wordt echter niet door deze versleuteling afgehandeld.
|
|
||||||
|
|
||||||
Om wat u doet op de websites die u bezoekt privé en veilig te houden, moet u HTTPS gebruiken. Dit houdt uw wachtwoorden, sessietokens en zoekopdrachten veilig voor de VPN-provider. Overweeg om "HTTPS everywhere" in uw browser in te schakelen om downgrade-aanvallen zoals [SSL Strip](https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf)tegen te gaan.
|
|
||||||
|
|
||||||
## Moet ik gecodeerde DNS gebruiken met een VPN?
|
|
||||||
|
|
||||||
Tenzij uw VPN-provider de gecodeerde DNS-servers host, **no**. Het gebruik van DOH/DOT (of een andere vorm van gecodeerde DNS) met servers van derden zal gewoon meer entiteiten toevoegen om te vertrouwen en doet **absoluut niets** om uw privacy/veiligheid te verbeteren. Uw VPN-provider kan nog steeds zien welke websites u bezoekt op basis van de IP-adressen en andere methoden. In plaats van alleen uw VPN-provider te vertrouwen, vertrouwt u nu zowel de VPN-provider als de DNS-provider.
|
|
||||||
|
|
||||||
Een veelgehoorde reden om gecodeerde DNS aan te bevelen is dat het helpt tegen DNS spoofing. Uw browser zou echter al moeten controleren op [TLS-certificaten](https://en.wikipedia.org/wiki/Transport_Layer_Security#Digital_certificates) met **HTTPS** en u daarvoor moeten waarschuwen. Als u **HTTPS**niet gebruikt, dan kan een tegenstander nog steeds gewoon iets anders dan uw DNS-query's wijzigen en zal het eindresultaat weinig anders zijn.
|
|
||||||
|
|
||||||
Onnodig te zeggen, **dat je geen versleutelde DNS moet gebruiken met Tor**. Dit zou al uw DNS-verzoeken via één enkel circuit leiden en de gecodeerde DNS-provider in staat stellen u te deanonimiseren.
|
|
||||||
|
|
||||||
## Moet ik Tor *gebruiken en* een VPN?
|
|
||||||
|
|
||||||
Door een VPN met Tor te gebruiken, creëer je in wezen een permanent toegangsknooppunt, vaak met een geldspoor eraan vast. Dit levert u geen enkel extra voordeel op, terwijl het aanvalsoppervlak van uw verbinding drastisch wordt vergroot. Als je je Tor gebruik wilt verbergen voor je ISP of je overheid, dan heeft Tor daar een ingebouwde oplossing voor: Tor bridges. [Lees meer over Tor bridges en waarom het gebruik van een VPN niet nodig is](../advanced/tor-overview.md).
|
|
||||||
|
|
||||||
## Wat als ik anonimiteit nodig heb?
|
|
||||||
|
|
||||||
VPN's kunnen geen anonimiteit bieden. Uw VPN-provider ziet nog steeds uw echte IP-adres, en heeft vaak een geldspoor dat direct naar u kan worden teruggeleid. U kunt niet vertrouwen op een "no logging"-beleid om uw gegevens te beschermen. Gebruik in plaats daarvan [Tor](https://www.torproject.org/).
|
|
||||||
|
|
||||||
## Hoe zit het met VPN providers die Tor nodes aanbieden?
|
|
||||||
|
|
||||||
Gebruik die functie niet. Het punt van het gebruik van Tor is dat je je VPN provider niet vertrouwt. Momenteel ondersteunt Tor alleen het [TCP](https://en.wikipedia.org/wiki/Transmission_Control_Protocol) protocol. [UDP](https://en.wikipedia.org/wiki/User_Datagram_Protocol) (gebruikt in [WebRTC](https://en.wikipedia.org/wiki/WebRTC) voor het delen van spraak en video, het nieuwe [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) protocol, enz.), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) en andere pakketten zullen worden gedropt. Om dit te compenseren, routeren VPN-aanbieders gewoonlijk alle niet-TCP-pakketten via hun VPN-server (je eerste hop). Dit is het geval met [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Bovendien, wanneer je deze Tor over VPN setup gebruikt, heb je geen controle over andere belangrijke Tor functies zoals [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (een ander Tor circuit gebruiken voor elk domein dat je bezoekt).
|
|
||||||
|
|
||||||
De functie moet gezien worden als een handige manier om toegang te krijgen tot het Tor Netwerk, niet om anoniem te blijven. Gebruik voor echte anonimiteit de Tor Browser, TorSocks of een Tor gateway.
|
|
||||||
|
|
||||||
## Wanneer zijn VPN's nuttig?
|
|
||||||
|
|
||||||
Een VPN kan nog steeds nuttig zijn voor u in een aantal scenario's, zoals:
|
|
||||||
|
|
||||||
1. Het verbergen van uw verkeer van **is alleen** uw Internet Service Provider.
|
|
||||||
1. Het verbergen van je downloads (zoals torrents) voor je ISP en anti-piraterij organisaties.
|
|
||||||
1. Het verbergen van uw IP-adres voor websites en diensten van derden, zodat IP-gebaseerde tracering wordt voorkomen.
|
|
||||||
|
|
||||||
Voor dit soort situaties, of als je een andere dwingende reden hebt, zijn de VPN-providers die we hierboven hebben opgesomd volgens ons de meest betrouwbare. Het gebruik van een VPN-provider betekent echter nog steeds dat u *vertrouwt op* de provider. In vrijwel elk ander scenario zou je een veilige**-by-design** tool zoals Tor moeten gebruiken.
|
|
||||||
|
|
||||||
## Bronnen en verdere lectuur
|
|
||||||
|
|
||||||
1. [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) door Dennis Schubert
|
|
||||||
1. [Tor Netwerk Overzicht](../advanced/tor-overview.md)
|
|
||||||
1. [IVPN Privacy Gidsen](https://www.ivpn.net/privacy-guides)
|
|
||||||
1. ["Heb ik een VPN nodig?"](https://www.doineedavpn.com), een tool ontwikkeld door IVPN om agressieve VPN-marketing uit te dagen door mensen te helpen beslissen of een VPN geschikt is voor hen.
|
|
||||||
|
|
||||||
## Verwante VPN-informatie
|
|
||||||
|
|
||||||
- [Het probleem met VPN- en privacybeoordelingssites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/)
|
|
||||||
- [Gratis VPN-app onderzoek](https://www.top10vpn.com/free-vpn-app-investigation/)
|
|
||||||
- [Verborgen VPN-eigenaars onthuld: 101 VPN-producten van slechts 23 bedrijven](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/)
|
|
||||||
- [Dit Chinese bedrijf zit in het geheim achter 24 populaire apps die gevaarlijke toestemmingen zoeken](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/)
|
|
@ -66,3 +66,5 @@ Calendars contain some of your most sensitive data; use products that implement
|
|||||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||||
|
|
||||||
- Should integrate with native OS calendar and contact management apps if applicable.
|
- Should integrate with native OS calendar and contact management apps if applicable.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -42,7 +42,7 @@ Proton Drive's mobile clients were released in December 2022 and are not yet ope
|
|||||||
|
|
||||||
- Must enforce end-to-end encryption.
|
- Must enforce end-to-end encryption.
|
||||||
- Must offer a free plan or trial period for testing.
|
- Must offer a free plan or trial period for testing.
|
||||||
- Must support TOTP or FIDO2 multi-factor authentication support, or Passkey logins.
|
- Must support TOTP or FIDO2 multi-factor authentication, or Passkey logins.
|
||||||
- Must offer a web interface which supports basic file management functionality.
|
- Must offer a web interface which supports basic file management functionality.
|
||||||
- Must allow for easy exports of all files/documents.
|
- Must allow for easy exports of all files/documents.
|
||||||
- Must use standard, audited encryption.
|
- Must use standard, audited encryption.
|
||||||
@ -57,3 +57,5 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
- These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android.
|
- These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android.
|
||||||
- Should support easy file-sharing with other users.
|
- Should support easy file-sharing with other users.
|
||||||
- Should offer at least basic file preview and editing functionality on the web interface.
|
- Should offer at least basic file preview and editing functionality on the web interface.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -141,3 +141,5 @@ The app offers multiple ways to erase metadata from images. Namely:
|
|||||||
|
|
||||||
- Apps developed for open-source operating systems must be open-source.
|
- Apps developed for open-source operating systems must be open-source.
|
||||||
- Apps must be free and should not include ads or other limitations.
|
- Apps must be free and should not include ads or other limitations.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -231,7 +231,7 @@ These are some other [filter lists](https://github.com/gorhill/uBlock/wiki/Dashb
|
|||||||
|
|
||||||
### Minimum Requirements
|
### Minimum Requirements
|
||||||
|
|
||||||
- Open-source.
|
- Must be open-source software.
|
||||||
- Supports automatic updates.
|
- Supports automatic updates.
|
||||||
- Receives engine updates in 0-1 days from upstream release.
|
- Receives engine updates in 0-1 days from upstream release.
|
||||||
- Available on Linux, macOS, and Windows.
|
- Available on Linux, macOS, and Windows.
|
||||||
@ -258,3 +258,5 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
|
|
||||||
- Must not replicate built-in browser or OS functionality.
|
- Must not replicate built-in browser or OS functionality.
|
||||||
- Must directly impact user privacy, i.e. must not simply provide information.
|
- Must directly impact user privacy, i.e. must not simply provide information.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -179,3 +179,5 @@ Our recommended operating systems:
|
|||||||
- Must support full-disk encryption during installation.
|
- Must support full-disk encryption during installation.
|
||||||
- Must not freeze regular releases for more than 1 year. We [do not recommend](os/linux-overview.md#release-cycle) "Long Term Support" or "stable" distro releases for desktop usage.
|
- Must not freeze regular releases for more than 1 year. We [do not recommend](os/linux-overview.md#release-cycle) "Long Term Support" or "stable" distro releases for desktop usage.
|
||||||
- Must support a wide variety of hardware.
|
- Must support a wide variety of hardware.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -138,3 +138,5 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf
|
|||||||
[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation}
|
[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -234,3 +234,5 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
- Should not collect any telemetry by default.
|
- Should not collect any telemetry by default.
|
||||||
- Should support OpenPGP natively, i.e. without extensions.
|
- Should support OpenPGP natively, i.e. without extensions.
|
||||||
- Should support storing OpenPGP encrypted emails locally.
|
- Should support storing OpenPGP encrypted emails locally.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -483,3 +483,5 @@ Must not have any marketing which is irresponsible:
|
|||||||
### Additional Functionality
|
### Additional Functionality
|
||||||
|
|
||||||
While not strictly requirements, there are some other convenience or privacy factors we looked into when determining which providers to recommend.
|
While not strictly requirements, there are some other convenience or privacy factors we looked into when determining which providers to recommend.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -351,3 +351,5 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
|
|
||||||
- Operating System (FDE) encryption apps should utilize hardware security such as a TPM or Secure Enclave.
|
- Operating System (FDE) encryption apps should utilize hardware security such as a TPM or Secure Enclave.
|
||||||
- File encryption apps should have first- or third-party support for mobile platforms.
|
- File encryption apps should have first- or third-party support for mobile platforms.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -54,7 +54,7 @@ ffsend upload --host https://send.vis.ee/ FILE
|
|||||||
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
- Must not store decrypted data on a remote server.
|
- Must not store decrypted data on a remote server.
|
||||||
- Must be open-source.
|
- Must be open-source software.
|
||||||
- Must either have clients for Linux, macOS, and Windows; or have a web interface.
|
- Must either have clients for Linux, macOS, and Windows; or have a web interface.
|
||||||
|
|
||||||
## FreedomBox
|
## FreedomBox
|
||||||
@ -134,7 +134,7 @@ ffsend upload --host https://send.vis.ee/ FILE
|
|||||||
#### Minimum Requirements
|
#### Minimum Requirements
|
||||||
|
|
||||||
- Must not require a third-party remote/cloud server.
|
- Must not require a third-party remote/cloud server.
|
||||||
- Must be open-source.
|
- Must be open-source software.
|
||||||
- Must either have clients for Linux, macOS, and Windows; or have a web interface.
|
- Must either have clients for Linux, macOS, and Windows; or have a web interface.
|
||||||
|
|
||||||
#### Best-Case
|
#### Best-Case
|
||||||
@ -143,3 +143,5 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
|
|
||||||
- Has mobile clients for iOS and Android, which at least support document previews.
|
- Has mobile clients for iOS and Android, which at least support document previews.
|
||||||
- Supports photo backup from iOS and Android, and optionally supports file/folder sync on Android.
|
- Supports photo backup from iOS and Android, and optionally supports file/folder sync on Android.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -257,10 +257,12 @@ When you are using a Piped instance, make sure to read the privacy policy of tha
|
|||||||
|
|
||||||
Recommended frontends...
|
Recommended frontends...
|
||||||
|
|
||||||
- Must be open-source.
|
- Must be open-source software.
|
||||||
- Must be self-hostable.
|
- Must be self-hostable.
|
||||||
- Must provide all basic website functionality available to anonymous users.
|
- Must provide all basic website functionality available to anonymous users.
|
||||||
|
|
||||||
We only consider frontends for websites which are...
|
We only consider frontends for websites which are...
|
||||||
|
|
||||||
- Not normally accessible without JavaScript.
|
- Not normally accessible without JavaScript.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -1,53 +0,0 @@
|
|||||||
---
|
|
||||||
template: overrides/home.fr.html
|
|
||||||
hide:
|
|
||||||
- navigation
|
|
||||||
- toc
|
|
||||||
- feedback
|
|
||||||
---
|
|
||||||
|
|
||||||
<!-- markdownlint-disable-next-line -->
|
|
||||||
<div style="max-width:50rem;margin:auto;" markdown>
|
|
||||||
<div style="max-width:38rem;" markdown>
|
|
||||||
## En quoi ça me concerne ?
|
|
||||||
|
|
||||||
##### "Je n'ai rien à cacher. Pourquoi devrais-je me soucier de ma vie privée ?"
|
|
||||||
|
|
||||||
Tout comme l'abolition de la ségrégation raciale, le suffrage des femmes, la liberté d'expression et bien d'autres, nous n'avons pas toujours eu le droit à la vie privée. Dans plusieurs dictatures, beaucoup n'ont toujours pas ce droit. Nombreux sont nos ancêtres qui se sont battus pour le droit à la vie privée. ==La vie privée est un droit humain inhérent à chacun d'entre nous== auquel nous avons droit sans discrimination.
|
|
||||||
|
|
||||||
Il ne faut pas confondre l'intimité et le secret. Même si on sait ce qui se passe dans la salle de bain, vous fermez quand même la porte. C'est parce que vous voulez de l'intimité, pas du secret. **Tout le monde** a quelque chose à protéger. La vie privée est ce qui fait de nous des humains. [:material-target-account: Menaces Internet Courantes] (basics/common-threats. md){ .md-button .md-button--primary }
|
|
||||||
|
|
||||||
[:material-target-account: Menaces Courantes sur Internet](basics/common-threats.md){ .md-button .md-button--primary }
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="margin-left:auto;margin-right:0;text-align:right;max-width:38rem;" markdown>
|
|
||||||
## Que puis-je faire ?
|
|
||||||
|
|
||||||
##### Tout d'abord, vous devez établir un plan
|
|
||||||
|
|
||||||
C'est compliqué et très peu réalisable de protéger ses données de toutes les menaces possibles. Cela vous prendrait bien trop de temps, d'énergie et d'argent.
|
|
||||||
|
|
||||||
Mais ne vous en faites pas ! La sécurité est un processus, et en y réfléchissant en amont, vous pourrez mettre en place un plan qui vous convient. La sécurité ne concerne pas seulement les outils que vous utilisez ou les logiciels que vous téléchargez. Au contraire, elle commence par une compréhension des menaces uniques auxquelles vous êtes confrontés, et comment les contrer. ==Ce processus d'identification des menaces et de définition des contre-mesures est appelé la **modélisation des menaces**==, et constitue la base de tout bon plan de sécurité et de confidentialité.
|
|
||||||
|
|
||||||
[:material-book-outline: En Savoir Plus sur le Modèle des Menaces](basics/threat-modeling.md){ .md-button .md-button--primary }
|
|
||||||
|
|
||||||
[:material-book-outline: En Savoir Plus sur le Modèle de Menaces](basics/threat-modeling.md){ .md-button .md-button--primary }
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="padding:3em;max-width:960px;margin:auto;text-align:center;" markdown>
|
|
||||||
## On a besoin de vous ! Voici comment vous pouvez vous impliquer
|
|
||||||
|
|
||||||
Il est important pour un site web comme Privacy Guides de toujours rester à jour. Nous avons besoin que notre public garde un œil sur les mises à jour logicielles des applications répertoriées sur notre site et suive l'actualité récente des fournisseurs que nous recommandons. Internet évolue à une vitesse telle, qu'il est difficile de suivre le rythme, mais nous faisons de notre mieux. Si vous repérez une erreur, que vous pensez qu'un fournisseur ne devrait pas figurer dans la liste, remarquez l'absence d'un fournisseur qualifié, pensez qu'un plugin de navigateur n'est plus le meilleur choix ou si vous découvrez tout autre problème, veuillez nous en informer.
|
|
||||||
|
|
||||||
<div class="grid cards" style="margin:auto;max-width:800px;text-align:center;" markdown>
|
|
||||||
|
|
||||||
- [:simple-discourse: Join our forum](https://discuss.privacyguides.net/)
|
|
||||||
- [:simple-mastodon: Suivez-nous sur Mastodon](https://mastodon.social/@privacyguides){ rel=me }
|
|
||||||
- [:material-book-edit: Contribuez à ce site web](https://github.com/privacyguides/privacyguides.org)
|
|
||||||
- [:simple-matrix: Discutez avec nous sur Matrix](https://matrix.to/#/#privacyguides:matrix.org)
|
|
||||||
- [:material-information-outline: En savoir plus sur nous](about/index.md)
|
|
||||||
- [:material-hand-coin-outline: Soutenir le projet](about/donate.md)
|
|
||||||
|
|
||||||
</div>
|
|
||||||
</div>
|
|
@ -1,51 +0,0 @@
|
|||||||
---
|
|
||||||
template: overrides/home.en.html
|
|
||||||
hide:
|
|
||||||
- navigation
|
|
||||||
- toc
|
|
||||||
- feedback
|
|
||||||
---
|
|
||||||
|
|
||||||
<!-- markdownlint-disable-next-line -->
|
|
||||||
<div style="max-width:50rem;margin:auto;" markdown>
|
|
||||||
<div style="max-width:38rem;" markdown>
|
|
||||||
## Miért érdekeljen?
|
|
||||||
|
|
||||||
##### “Nincs semmi rejtegetnivalóm. Miért kellene törődnöm a magánéletemmel?”
|
|
||||||
|
|
||||||
A kultúrák közötti házassághoz, a női választójoghoz, a szólásszabadsághoz és sok minden máshoz hasonlóan a magánélethez való jog sem volt mindig biztosított. Számos diktatúrában még mindig nem. Generációink előtt nemzedékek harcoltak a mi magánélethez való jogunkért. ==A magánélet mindannyiunk emberi joga==, amelyhez (megkülönböztetés nélkül) jogunk van.
|
|
||||||
|
|
||||||
Nem szabad összekeverni a magánéletet a titoktartással. Tudjuk, hogy mi történik a fürdőszobában, de az ajtó mégis csukva marad. Ez azért van, mert magánéletet akarsz, nem titkolózást. **Mindenkinek** van valami, amit meg akar védeni. A magánélet olyasmi, ami emberré tesz minket.
|
|
||||||
|
|
||||||
[:material-target-account: Gyakori Internetes Veszélyek](basics/common-threats.md){ .md-button .md-button--primary }
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="margin-left:auto;margin-right:0;text-align:right;max-width:38rem;" markdown>
|
|
||||||
## Mihez kezdjek?
|
|
||||||
|
|
||||||
##### Először is, tervet kell készítened
|
|
||||||
|
|
||||||
Megpróbálni megvédeni az összes adatodat mindenkitő, mindig nem praktikus, költséges és fárasztó. De ne aggódj! Az adatbiztonság egy folyamat, és ha előre gondolkodsz, akkor összeállíthatsz egy neked megfelelő tervet. A biztonság nem csak a használt eszközökről vagy a letöltött szoftverekről szól. Inkább annak megértésével kezdődik, hogy milyen egyedi fenyegetésekkel kell szembenézned, és hogyan tudsz ellenük védekezni.
|
|
||||||
|
|
||||||
==A fenyegetések azonosításának és az ellenintézkedések meghatározásának ezt a folyamatát **védelmi modellezésnek**== nevezik, és ez képezi minden jó adatbiztonsági és adatvédelmi terv alapját.
|
|
||||||
|
|
||||||
[:material-book-outline: További Információk a Védelmi Modellezésről](basics/threat-modeling.md){ .md-button .md-button--primary }
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="padding:3em;max-width:960px;margin:auto;text-align:center;" markdown>
|
|
||||||
## Szükségünk van rád! Így veheted ki a részed:
|
|
||||||
|
|
||||||
Fontos, hogy egy olyan weboldal, mint a Privacy Guides, mindig naprakész maradjon. Szükségünk van arra, hogy a közönségünk figyelemmel kísérje az oldalunkon felsorolt alkalmazások szoftverfrissítéseit, és kövesse az általunk ajánlott szolgáltatókkal kapcsolatos legújabb híreket. Nehéz lépést tartani az internet gyors tempójával, de megteszünk minden tőlünk telhetőt. Ha hibát észlelsz, úgy gondolod, hogy egy szolgáltatónak nem kellene szerepelnie a listán, észreveszed, hogy egy alkalmas szolgáltató hiányzik, úgy véled, hogy egy böngésző plugin már nem a legjobb választás, vagy ha bármilyen más problémát észlelsz, kérjük, jelezd nekünk.
|
|
||||||
|
|
||||||
<div class="grid cards" style="margin:auto;max-width:800px;text-align:center;" markdown>
|
|
||||||
|
|
||||||
- [:simple-discourse: Csatlakozz a fórumhoz](https://discuss.privacyguides.net/)
|
|
||||||
- [:simple-mastodon: Kövessen minket Mastodonon](https://mastodon.neat.computer/@privacyguides){ rel=me }
|
|
||||||
- [:material-book-edit: Járulj hozzá a weboldalhoz](https://github.com/privacyguides/privacyguides.org)
|
|
||||||
- [:simple-matrix: Csevegj velünk Matrixon](https://matrix.to/#/#privacyguides:matrix.org)
|
|
||||||
- [:material-information-outline: Tudj meg többet rólunk](about/index.md)
|
|
||||||
- [:material-hand-coin-outline: Támogasd a projektet](about/donate.md)
|
|
||||||
|
|
||||||
</div>
|
|
||||||
</div>
|
|
@ -1,51 +0,0 @@
|
|||||||
---
|
|
||||||
template: overrides/home.en.html
|
|
||||||
hide:
|
|
||||||
- navigation
|
|
||||||
- toc
|
|
||||||
- feedback
|
|
||||||
---
|
|
||||||
|
|
||||||
<!-- markdownlint-disable-next-line -->
|
|
||||||
<div style="max-width:50rem;margin:auto;" markdown>
|
|
||||||
<div style="max-width:38rem;" markdown>
|
|
||||||
## Perché dovrebbe importarmi?
|
|
||||||
|
|
||||||
##### “Non ho nulla da nascondere. Perché dovrei preoccuparmi della mia privacy?".
|
|
||||||
|
|
||||||
Proprio come il diritto al matrimonio interrazziale, il suffragio femminile, la libertà di parola e molti altri, non abbiamo sempre avuto il diritto alla privacy. In diverse dittature, molti ancora non lo hanno. Le generazioni prima della nostra hanno combattuto per il nostro diritto alla privacy. ==La privacy è un diritto umano inerente a tutti noi== che ci spetta senza discriminazione.
|
|
||||||
|
|
||||||
Non bisogna confondere la privacy con la segretezza. Sappiamo cosa succede in bagno, ma chiudi lo stesso la porta. Questo perché vuoi la privacy, non la segretezza. **Tutti** hanno qualcosa da proteggere. La privacy è qualcosa che ci rende umani.
|
|
||||||
|
|
||||||
[:material-target-account: Minacce di internet comuni](basics/common-threats.md){ .md-button .md-button--primary }
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="margin-left:auto;margin-right:0;text-align:right;max-width:38rem;" markdown>
|
|
||||||
## Cosa dovrei fare?
|
|
||||||
|
|
||||||
##### Per prima cosa, devi avere un piano.
|
|
||||||
|
|
||||||
Cercare di proteggere tutti i dati da tutti, in ogni momento, è poco pratico, costoso ed estenuante. Ma non preoccuparti! La sicurezza è un processo e, pensando in anticipo, potete mettere a punto un piano adatto a voi. La sicurezza non riguarda solo gli strumenti utilizzati o il software scaricato. Piuttosto, inizia con la comprensione delle minacce personali che dovi affrontare e di come puoi mitigarle.
|
|
||||||
|
|
||||||
== Questo processo di identificazione delle minacce e di definizione delle contromisure si chiama **modellazione delle minacce**== e costituisce la base di ogni buon piano di sicurezza e privacy.
|
|
||||||
|
|
||||||
[:material-book-outline: Per saperne di più sulla modellazione delle minacce](basics/threat-modeling.md){ .md-button .md-button--primary }
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="padding:3em;max-width:960px;margin:auto;text-align:center;" markdown>
|
|
||||||
## Abbiamo bisogno di te! Ecco come contribuire:
|
|
||||||
|
|
||||||
È importante che un sito web come Privacy Guides sia sempre aggiornato. Abbiamo bisogno che il nostro pubblico tenga d'occhio gli aggiornamenti software per le applicazioni elencate sul nostro sito e segua le notizie recenti sui fornitori che raccomandiamo. È difficile tenere il passo con il ritmo veloce di Internet, ma facciamo del nostro meglio. Se noti un errore, pensi che un provider non dovrebbe essere elencato, noti la mancanza di un provider qualificato, ritieni che un plugin del browser non sia più la scelta migliore o scopri qualsiasi altro problema, faccelo sapere.
|
|
||||||
|
|
||||||
<div class="grid cards" style="margin:auto;max-width:800px;text-align:center;" markdown>
|
|
||||||
|
|
||||||
- [:simple-discourse: Iscriviti al nostro forum](https://discuss.privacyguides.org/)
|
|
||||||
- [:simple-mastodon: Seguici su Mastodon](https://mastodon.neat.computer/@privacyguides){ rel=me }
|
|
||||||
- [:material-book-edit: Contribuisci a questo sito](https://github.com/privacyguides/privacyguides.org)
|
|
||||||
- [:simple-matrix: Scrivici su Matrix](https://matrix.to/#/#privacyguides:matrix.org)
|
|
||||||
- [:material-information-outline: Scopri di più su di noi](about/index.md)
|
|
||||||
- [:material-hand-coin-outline: Supporta il progetto](about/donate.md)
|
|
||||||
|
|
||||||
</div>
|
|
||||||
</div>
|
|
@ -6,8 +6,6 @@ hide:
|
|||||||
- feedback
|
- feedback
|
||||||
---
|
---
|
||||||
<!-- markdownlint-disable-next-line -->
|
<!-- markdownlint-disable-next-line -->
|
||||||
<div style="max-width:50rem;margin:auto;" markdown>
|
|
||||||
<div style="max-width:38rem;" markdown>
|
|
||||||
## Why should I care?
|
## Why should I care?
|
||||||
|
|
||||||
##### “I have nothing to hide. Why should I care about my privacy?”
|
##### “I have nothing to hide. Why should I care about my privacy?”
|
||||||
@ -17,9 +15,7 @@ Much like the right to interracial marriage, woman's suffrage, freedom of speech
|
|||||||
You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human.
|
You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human.
|
||||||
|
|
||||||
[:material-target-account: Common Internet Threats](basics/common-threats.md){ .md-button .md-button--primary }
|
[:material-target-account: Common Internet Threats](basics/common-threats.md){ .md-button .md-button--primary }
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="margin-left:auto;margin-right:0;text-align:right;max-width:38rem;" markdown>
|
|
||||||
## What should I do?
|
## What should I do?
|
||||||
|
|
||||||
##### First, you need to make a plan
|
##### First, you need to make a plan
|
||||||
@ -29,22 +25,19 @@ Trying to protect all your data from everyone all the time is impractical, expen
|
|||||||
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
|
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
|
||||||
|
|
||||||
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ .md-button .md-button--primary }
|
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ .md-button .md-button--primary }
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="padding:3em;max-width:960px;margin:auto;text-align:center;" markdown>
|
---
|
||||||
|
|
||||||
## We need you! Here's how to get involved:
|
## We need you! Here's how to get involved:
|
||||||
|
|
||||||
|
[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" }
|
||||||
|
[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
|
||||||
|
[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
|
||||||
|
[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
|
||||||
|
[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
|
||||||
|
[:material-information-outline:](about/index.md){ title="Learn more about us" }
|
||||||
|
[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
|
||||||
|
|
||||||
It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
|
It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
|
||||||
|
|
||||||
<div class="grid cards" style="margin:auto;max-width:800px;text-align:center;" markdown>
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
|
||||||
- [:simple-discourse: Join our forum](https://discuss.privacyguides.net/)
|
|
||||||
- [:simple-mastodon: Follow us on Mastodon](https://mastodon.neat.computer/@privacyguides){ rel=me }
|
|
||||||
- [:material-book-edit: Contribute to this website](https://github.com/privacyguides/privacyguides.org)
|
|
||||||
- [:simple-matrix: Chat with us on Matrix](https://matrix.to/#/#privacyguides:matrix.org)
|
|
||||||
- [:material-information-outline: Learn more about us](about/index.md)
|
|
||||||
- [:material-hand-coin-outline: Support the project](about/donate.md)
|
|
||||||
|
|
||||||
</div>
|
|
||||||
</div>
|
|
@ -1,53 +0,0 @@
|
|||||||
---
|
|
||||||
template: overrides/home.en.html
|
|
||||||
hide:
|
|
||||||
- navigation
|
|
||||||
- toc
|
|
||||||
- feedback
|
|
||||||
---
|
|
||||||
|
|
||||||
<!-- markdownlint-disable-next-line -->
|
|
||||||
<div style="max-width:50rem;margin:auto;" markdown>
|
|
||||||
<div style="max-width:38rem;" markdown>
|
|
||||||
## Waarom zou ik me daar zorgen over maken?
|
|
||||||
|
|
||||||
##### "Ik heb niets te verbergen. Waarom zou ik me zorgen maken over mijn privacy?"
|
|
||||||
|
|
||||||
Net zoals het recht op interraciale huwelijken, het kiesrecht voor vrouwen, de vrijheid van meningsuiting en vele andere, hadden wij niet altijd recht op privacy. In verschillende dictaturen hebben velen dat nog steeds niet. Generaties voor ons vochten voor ons recht op privacy. ==Privacy is een mensenrecht dat inherent is aan ons allen== waar we zonder onderscheid recht op hebben.
|
|
||||||
|
|
||||||
Je moet privacy niet verwarren met geheimzinnigheid. We weten wat er in de badkamer gebeurt, maar je doet nog steeds de deur dicht. Dat is omdat je privacy wilt, geen geheimzinnigheid. **Iedereen** heeft iets te beschermen. Privacy is iets dat je menselijk maakt.
|
|
||||||
|
|
||||||
[:material-target-account: Common Internet Threats](basics/common-threats.md){ .md-button .md-button--primary }
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="margin-left:auto;margin-right:0;text-align:right;max-width:38rem;" markdown>
|
|
||||||
## Wat moet ik doen?
|
|
||||||
|
|
||||||
##### Eerst moet je een plan maken
|
|
||||||
|
|
||||||
Het is onpraktisch, duur en vermoeiend om te proberen al jouw gegevens altijd tegen iedereen te beschermen.
|
|
||||||
|
|
||||||
Maar maak je geen zorgen! Maar maak je geen zorgen! Veiligheid is een proces, en door vooruit te denken kunt je een plan samenstellen dat voor je geschikt is. Veiligheid gaat niet alleen over de tools die je gebruikt of de software die je downloadt. Integendeel, het begint met het begrijpen van de unieke bedreigingen waarmee je wordt geconfronteerd en hoe je deze kunt verminderen.
|
|
||||||
|
|
||||||
==Dit proces van het identificeren van bedreigingen en het vaststellen van tegenmaatregelen wordt **bedreigingsmodellering**== genoemd, en het vormt de basis van elk goed beveiligings- en privacyplan.
|
|
||||||
|
|
||||||
[:material-book-outline: Meer informatie over dreigingsmodellering](basics/threat-modeling.md){ .md-button .md-button--primary }
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="padding:3em;max-width:960px;margin:auto;text-align:center;" markdown>
|
|
||||||
## We hebben je nodig! Zo kunt u meedoen
|
|
||||||
|
|
||||||
Het is belangrijk voor een website als Privacy Guides om altijd up-to-date te blijven. Ons publiek moet software-updates in de gaten houden voor de toepassingen die op onze site staan en recent nieuws volgen over aanbieders die wij aanbevelen. Het is moeilijk om het hoge tempo van het internet bij te houden, maar we doen ons best. Als je een fout ziet, denkt dat een provider niet in de lijst thuishoort, merkt dat een gekwalificeerde provider ontbreekt, denkt dat een browserplugin niet langer de beste keuze is, of een ander probleem ontdekt, laat het ons dan weten.
|
|
||||||
|
|
||||||
<div class="grid cards" style="margin:auto;max-width:800px;text-align:center;" markdown>
|
|
||||||
|
|
||||||
-:simple-discourse: Word lid van ons forum](https://discuss.privacyguides.net/)
|
|
||||||
- [:simple-mastodon: Volg ons op Mastodon](https://mastodon.neat.computer/@privacyguides){ rel=me }
|
|
||||||
-:material-book-edit: Draag bij aan deze website](https://github.com/privacyguides/privacyguides.org)
|
|
||||||
- [:simple-matrix: Chat met ons op Matrix](https://matrix.to/#/#privacyguides:matrix.org)
|
|
||||||
- [:material-information-outline: Leer meer over ons](about/index.md)
|
|
||||||
- [:material-hand-coin-outline: Steun het project](about/donate.md)
|
|
||||||
|
|
||||||
</div>
|
|
||||||
</div>
|
|
@ -1,51 +0,0 @@
|
|||||||
---
|
|
||||||
template: overrides/home.en.html
|
|
||||||
hide:
|
|
||||||
- 导航
|
|
||||||
- toc
|
|
||||||
- 反馈
|
|
||||||
---
|
|
||||||
|
|
||||||
<!-- markdownlint-disable-next-line -->
|
|
||||||
<div style="max-width:50rem;margin:auto;" markdown>
|
|
||||||
<div style="max-width:38rem;" markdown>
|
|
||||||
## 我为什么要关心?
|
|
||||||
|
|
||||||
##### “我没有什么好藏的。 我为什么要关心自己的隐私? ”
|
|
||||||
|
|
||||||
就像异族通婚的权利,女性的投票权,言论自由等等,我们的隐私权并不总是得到保护。 在几个独裁国家中,近乎完全不存在隐私。 我们之前的几代人为我们的隐私权而斗争。 ==隐私权是一项人权,是我们所有人固有的权利, == 我们应当不受歧视地享有。
|
|
||||||
|
|
||||||
您不应将隐私与保密混为一谈。 我们知道浴室里发生了什么,但你还是关上了门。 那是因为你想要隐私,而不是保密。 **每个人**都有需要保护的东西。 隐私是我们之所以为人的原因。
|
|
||||||
|
|
||||||
[:material-target-account: 常见互联网威胁] (basics/common-treats.md){ .md-button .md-button--primary }
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="margin-left:auto;margin-right:0;text-align:right;max-width:38rem;" markdown>
|
|
||||||
我应该怎么办?
|
|
||||||
|
|
||||||
##### 首先,你需要指定一个计划
|
|
||||||
|
|
||||||
想一直保护你所有的数据不被任何人发现很不切实际,并且花费高昂且令人疲惫。 但是别担心! 安全是一个过程,并且通过向前思考,你可以制定出一个适合你的计划。 安全并不仅仅是指你使用的工具或你下载的软件。 相反,它始于了解你所面临的独特的威胁,以及解决它们的办法。
|
|
||||||
|
|
||||||
==这种了解威胁和给出对策的过程称作**威胁建模**==,而它又构成了所有良好的安全和隐私计划的基础
|
|
||||||
|
|
||||||
[:material-book-outline: 了解有关威胁建模的更多信息](basics/threat-modeling.md){ .md-button .md-button--primary }
|
|
||||||
</div>
|
|
||||||
</div>
|
|
||||||
|
|
||||||
<div style="padding:3em;max-width:960px;margin:auto;text-align:center;" markdown>
|
|
||||||
## 我们需要你! 以下是如何参与的方法:
|
|
||||||
|
|
||||||
对于像Privacy Guides这样的网站来说,始终保持更新是很重要的。 我们需要我们的用户关注我们网站上列出的应用程序的软件更新,并关注我们推荐的提供商的最新消息。 要跟上互联网的快节奏很难,但是我们会尽我们所能。 如果你发现了一处错误;或者觉得某个提供商不应被列出;或者注意到缺少了某个合格的提供商;或者认为某个浏览器插件不再是最好的选择;或者是发现了其他的问题,请告知我们。
|
|
||||||
|
|
||||||
<div class="grid cards" style="margin:auto;max-width:800px;text-align:center;" markdown>
|
|
||||||
|
|
||||||
- [:simple-discourse: 加入我们的论坛](https://discuss.privacyguides.net/)
|
|
||||||
- [:simple-mastodon: 在Mastodon上关注我们](https://mastodon.neat.computer/@privacyguides){ rel=me }
|
|
||||||
- [:material-book-edit: 对网站做贡献](https://github.com/privacyguides/privacyguides.org)
|
|
||||||
- [:simple-matrix: 在Matrix上跟我们交流](https://matrix.to/#/#privacyguides:matrix.org)
|
|
||||||
- [:material-information-outline: 关于我们](about/index.md)
|
|
||||||
- [:material-hand-coin-outline: 支持该项目](about/donate.md)
|
|
||||||
|
|
||||||
</div>
|
|
||||||
</div>
|
|
@ -13,3 +13,5 @@ Some pages that used to be in our knowledge base can now be found on our blog:
|
|||||||
- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/)
|
- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/)
|
||||||
- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/)
|
- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/)
|
||||||
- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/)
|
- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -20,3 +20,5 @@ Additional branding guidelines can be found at [github.com/privacyguides/brand](
|
|||||||
"Privacy Guides" and the shield logo are trademarks owned by Jonah Aragon, unlimited usage is granted to the Privacy Guides project.
|
"Privacy Guides" and the shield logo are trademarks owned by Jonah Aragon, unlimited usage is granted to the Privacy Guides project.
|
||||||
|
|
||||||
Without waiving any of its rights, Privacy Guides does not advise others on the scope of its intellectual property rights. Privacy Guides does not permit or consent to any use of its trademarks in any manner that is likely to cause confusion by implying association with or sponsorship by Privacy Guides. If you are aware of any such use, please contact Jonah Aragon at jonah@privacyguides.org. Consult your legal counsel if you have questions.
|
Without waiving any of its rights, Privacy Guides does not advise others on the scope of its intellectual property rights. Privacy Guides does not permit or consent to any use of its trademarks in any manner that is likely to cause confusion by implying association with or sponsorship by Privacy Guides. If you are aware of any such use, please contact Jonah Aragon at jonah@privacyguides.org. Consult your legal counsel if you have questions.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -43,3 +43,5 @@ If you are working on your own branch, run these commands before submitting a PR
|
|||||||
git fetch origin
|
git fetch origin
|
||||||
git rebase origin/main
|
git rebase origin/main
|
||||||
```
|
```
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -87,3 +87,5 @@ scour --set-precision=5 \
|
|||||||
--protect-ids-noninkscape \
|
--protect-ids-noninkscape \
|
||||||
input.svg output.svg
|
input.svg output.svg
|
||||||
```
|
```
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -85,3 +85,5 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversatio
|
|||||||
> - “must not” for a prohibition
|
> - “must not” for a prohibition
|
||||||
> - “may” for a discretionary action
|
> - “may” for a discretionary action
|
||||||
> - “should” for a recommendation
|
> - “should” for a recommendation
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -188,3 +188,5 @@ Additional filter lists do slow things down and may increase your attack surface
|
|||||||
|
|
||||||
- Must not replicate built-in browser or OS functionality.
|
- Must not replicate built-in browser or OS functionality.
|
||||||
- Must directly impact user privacy, i.e. must not simply provide information.
|
- Must directly impact user privacy, i.e. must not simply provide information.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -135,7 +135,9 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative
|
|||||||
|
|
||||||
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
- Must be open-source.
|
- Must be open-source software.
|
||||||
- Must not require internet connectivity.
|
- Must not require internet connectivity.
|
||||||
- Must not sync to a third-party cloud sync/backup service.
|
- Must not sync to a third-party cloud sync/backup service.
|
||||||
- **Optional** E2EE sync support with OS-native tools is acceptable, e.g. encrypted sync via iCloud.
|
- **Optional** E2EE sync support with OS-native tools is acceptable, e.g. encrypted sync via iCloud.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -129,7 +129,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k
|
|||||||
|
|
||||||
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
- Must be open-source.
|
- Must be open-source software.
|
||||||
- Must operate locally, i.e. must not be a cloud service.
|
- Must operate locally, i.e. must not be a cloud service.
|
||||||
|
|
||||||
## Social Media RSS Support
|
## Social Media RSS Support
|
||||||
@ -169,3 +169,5 @@ You can subscribe YouTube channels without logging in and associating usage info
|
|||||||
```text
|
```text
|
||||||
https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID]
|
https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID]
|
||||||
```
|
```
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -35,7 +35,8 @@ If you are currently using an application like Evernote, Google Keep, or Microso
|
|||||||
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
|
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
|
||||||
|
|
||||||
Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key.
|
Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key.
|
||||||
|
Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z).
|
||||||
|
|
||||||
### Standard Notes
|
### Standard Notes
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
@ -111,3 +112,5 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si
|
|||||||
|
|
||||||
- Local backup/sync functionality should support encryption.
|
- Local backup/sync functionality should support encryption.
|
||||||
- Cloud-based platforms should support document sharing.
|
- Cloud-based platforms should support document sharing.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -130,3 +130,5 @@ You will either be given the option to delete your advertising ID or to *Opt out
|
|||||||
[SafetyNet](https://developer.android.com/training/safetynet/attestation) and the [Play Integrity APIs](https://developer.android.com/google/play/integrity) are generally used for [banking apps](https://grapheneos.org/usage#banking-apps). Many banking apps will work fine in GrapheneOS with sandboxed Play services, however some non-financial apps have their own crude anti-tampering mechanisms which might fail. GrapheneOS passes the `basicIntegrity` check, but not the certification check `ctsProfileMatch`. Devices with Android 8 or later have hardware attestation support which cannot be bypassed without leaked keys or serious vulnerabilities.
|
[SafetyNet](https://developer.android.com/training/safetynet/attestation) and the [Play Integrity APIs](https://developer.android.com/google/play/integrity) are generally used for [banking apps](https://grapheneos.org/usage#banking-apps). Many banking apps will work fine in GrapheneOS with sandboxed Play services, however some non-financial apps have their own crude anti-tampering mechanisms which might fail. GrapheneOS passes the `basicIntegrity` check, but not the certification check `ctsProfileMatch`. Devices with Android 8 or later have hardware attestation support which cannot be bypassed without leaked keys or serious vulnerabilities.
|
||||||
|
|
||||||
As for Google Wallet, we don't recommend this due to their [privacy policy](https://payments.google.com/payments/apis-secure/get_legal_document?ldo=0&ldt=privacynotice&ldl=en), which states you must opt-out if you don't want your credit rating and personal information shared with affiliate marketing services.
|
As for Google Wallet, we don't recommend this due to their [privacy policy](https://payments.google.com/payments/apis-secure/get_legal_document?ldo=0&ldt=privacynotice&ldl=en), which states you must opt-out if you don't want your credit rating and personal information shared with affiliate marketing services.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -33,7 +33,7 @@ For frozen distributions such as [Debian](https://www.debian.org/security/faq#ha
|
|||||||
We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this:
|
We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this:
|
||||||
|
|
||||||
<div class="yt-embed">
|
<div class="yt-embed">
|
||||||
<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/i8c0mg_mS7U" title="Regular Releases are Wrong, Roll for your life" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
<iframe width="560" height="315" src="https://invidious.privacyguides.net/embed/i8c0mg_mS7U?local=true" title="Regular Releases are Wrong, Roll for your life" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
### Traditional vs Atomic updates
|
### Traditional vs Atomic updates
|
||||||
@ -47,7 +47,7 @@ A transactional update system creates a snapshot that is made before and after a
|
|||||||
The Atomic update method is used for immutable distributions like Silverblue, Tumbleweed, and NixOS and can achieve reliability with this model. [Adam Šamalík](https://twitter.com/adsamalik) provided a presentation on how `rpm-ostree` works with Silverblue:
|
The Atomic update method is used for immutable distributions like Silverblue, Tumbleweed, and NixOS and can achieve reliability with this model. [Adam Šamalík](https://twitter.com/adsamalik) provided a presentation on how `rpm-ostree` works with Silverblue:
|
||||||
|
|
||||||
<div class="yt-embed">
|
<div class="yt-embed">
|
||||||
<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/-hpV5l-gJnQ" title="Let's try Fedora Silverblue — an immutable desktop OS! - Adam Šamalik" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
<iframe width="560" height="315" src="https://invidious.privacyguides.net/embed/-hpV5l-gJnQ?local=true" title="Let's try Fedora Silverblue — an immutable desktop OS! - Adam Šamalik" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
### “Security-focused” distributions
|
### “Security-focused” distributions
|
||||||
@ -138,3 +138,5 @@ The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Co
|
|||||||
This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer.
|
This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer.
|
||||||
|
|
||||||
openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file.
|
openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -51,3 +51,5 @@ For additional information we encourage you to consult the extensive Qubes OS do
|
|||||||
- J. Rutkowska: [*Software compartmentalization vs. physical separation*](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf)
|
- J. Rutkowska: [*Software compartmentalization vs. physical separation*](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf)
|
||||||
- J. Rutkowska: [*Partitioning my digital life into security domains*](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html)
|
- J. Rutkowska: [*Partitioning my digital life into security domains*](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html)
|
||||||
- Qubes OS: [*Related Articles*](https://www.qubes-os.org/news/categories/#articles)
|
- Qubes OS: [*Related Articles*](https://www.qubes-os.org/news/categories/#articles)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -226,3 +226,5 @@ These products are minimal password managers that can be used within scripting a
|
|||||||
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
- Must be cross-platform.
|
- Must be cross-platform.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
@ -70,7 +70,7 @@ In general, we define collaboration platforms as full-fledged suites which could
|
|||||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||||
|
|
||||||
- Should store files in a conventional filesystem.
|
- Should store files in a conventional filesystem.
|
||||||
- Should support TOTP or WebAuthn multi-factor authentication, or Passkey authentication.
|
- Should support TOTP or FIDO2 multi-factor authentication support, or Passkey logins.
|
||||||
|
|
||||||
## Office Suites
|
## Office Suites
|
||||||
|
|
||||||
@ -132,7 +132,7 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
In general, we define office suites as applications which could reasonably act as a replacement for Microsoft Word for most needs.
|
In general, we define office suites as applications which could reasonably act as a replacement for Microsoft Word for most needs.
|
||||||
|
|
||||||
- Must be cross-platform.
|
- Must be cross-platform.
|
||||||
- Must be open-source.
|
- Must be open-source software.
|
||||||
- Must function offline.
|
- Must function offline.
|
||||||
- Must support editing documents, spreadsheets, and slideshows.
|
- Must support editing documents, spreadsheets, and slideshows.
|
||||||
- Must export files to standard document formats.
|
- Must export files to standard document formats.
|
||||||
@ -151,3 +151,5 @@ In general, we define office suites as applications which could reasonably act a
|
|||||||
[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"}
|
[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"}
|
||||||
[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation}
|
[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|