Compare commits
10 Commits
Author | SHA1 | Date | |
---|---|---|---|
ca6236da58
|
|||
a5c761c237
|
|||
86f8fda8a5 | |||
fe0f0d1ce3
|
|||
18f76a9068
|
|||
e41d5eae11
|
|||
d03114fd33
|
|||
b1fcc23d0f
|
|||
3d2d6fb726
|
|||
32969c9fc5 |
4
.github/workflows/release.yml
vendored
@ -40,6 +40,10 @@ jobs:
|
|||||||
ssh-key: ${{ secrets.ACTIONS_SSH_KEY }}
|
ssh-key: ${{ secrets.ACTIONS_SSH_KEY }}
|
||||||
submodules: 'true'
|
submodules: 'true'
|
||||||
|
|
||||||
|
- name: Push to production branch
|
||||||
|
run: |
|
||||||
|
git push origin HEAD:production
|
||||||
|
|
||||||
- name: Pages setup
|
- name: Pages setup
|
||||||
uses: actions/configure-pages@v3
|
uses: actions/configure-pages@v3
|
||||||
|
|
||||||
|
1
Brewfile.preview.netlify
Normal file
@ -0,0 +1 @@
|
|||||||
|
brew "pngquant"
|
@ -111,6 +111,8 @@ Translations downloaded from Crowdin are [.gitignore](/.gitignore)'d, so any loc
|
|||||||
|
|
||||||
## Releasing
|
## Releasing
|
||||||
|
|
||||||
|
It is required to create a GitHub release to publish the current site to privacyguides.org. The current `main` branch can be previewed at [https://main.staging.privacyguides.dev](https://main.staging.privacyguides.dev) prior to release.
|
||||||
|
|
||||||
1. Create a new tag: `git tag -s v3.X.X -m 'Some message'`
|
1. Create a new tag: `git tag -s v3.X.X -m 'Some message'`
|
||||||
- [View existing tags](https://github.com/privacyguides/privacyguides.org/tags)
|
- [View existing tags](https://github.com/privacyguides/privacyguides.org/tags)
|
||||||
- Tag [numbering](https://semver.org/): Increment the MINOR (2nd) number when making significant changes (adding/deleting pages, etc.), increment the PATCH (3rd) number when making minor changes (typos, bug fixes). Probably leave the MAJOR number at 3 until a massive revamp (v1 -> v2 was the Jekyll to MkDocs transition, v2 -> v3 was the introduction of translations).
|
- Tag [numbering](https://semver.org/): Increment the MINOR (2nd) number when making significant changes (adding/deleting pages, etc.), increment the PATCH (3rd) number when making minor changes (typos, bug fixes). Probably leave the MAJOR number at 3 until a massive revamp (v1 -> v2 was the Jekyll to MkDocs transition, v2 -> v3 was the introduction of translations).
|
||||||
|
@ -1,7 +1,9 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
|
||||||
title: "Android"
|
title: "Android"
|
||||||
icon: 'simple/android'
|
icon: 'simple/android'
|
||||||
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
|
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
|
||||||
|
cover: android.png
|
||||||
schema:
|
schema:
|
||||||
-
|
-
|
||||||
"@context": http://schema.org
|
"@context": http://schema.org
|
||||||
@ -89,8 +91,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
|
|||||||
|
|
||||||
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md){ .md-button }
|
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md){ .md-button }
|
||||||
|
|
||||||
[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/){ .md-button }
|
|
||||||
|
|
||||||
## AOSP Derivatives
|
## AOSP Derivatives
|
||||||
|
|
||||||
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
|
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
|
||||||
@ -120,6 +120,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
|
|||||||
|
|
||||||
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
|
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
|
||||||
|
|
||||||
|
[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/){ .md-button }
|
||||||
|
|
||||||
### DivestOS
|
### DivestOS
|
||||||
|
|
||||||
!!! recommendation
|
!!! recommendation
|
||||||
@ -225,7 +227,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
|
|||||||
{ align=right }
|
{ align=right }
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
|
**Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
|
||||||
title: "Account Creation"
|
title: "Account Creation"
|
||||||
icon: 'material/account-plus'
|
icon: 'material/account-plus'
|
||||||
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
|
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
|
||||||
title: Email Security
|
title: Email Security
|
||||||
icon: material/email
|
icon: material/email
|
||||||
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
|
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
|
||||||
@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
|
|||||||
|
|
||||||
### How Do I Protect My Private Keys?
|
### How Do I Protect My Private Keys?
|
||||||
|
|
||||||
A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
|
||||||
|
|
||||||
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.
|
||||||
|
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
|
||||||
title: "Threat Modeling"
|
title: "Threat Modeling"
|
||||||
icon: 'material/target-account'
|
icon: 'material/target-account'
|
||||||
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
|
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
|
||||||
title: VPN Overview
|
title: VPN Overview
|
||||||
icon: material/vpn
|
icon: material/vpn
|
||||||
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
|
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
title: "Calendar Sync"
|
title: "Calendar Sync"
|
||||||
icon: material/calendar
|
icon: material/calendar
|
||||||
description: Calendars contain some of your most sensitive data; use products that implement encryption at rest.
|
description: Calendars contain some of your most sensitive data; use products that implement encryption at rest.
|
||||||
|
cover: calendar.png
|
||||||
---
|
---
|
||||||
Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them.
|
Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them.
|
||||||
|
|
||||||
|
@ -1,7 +1,9 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
|
||||||
title: "Cloud Storage"
|
title: "Cloud Storage"
|
||||||
icon: material/file-cloud
|
icon: material/file-cloud
|
||||||
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
|
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
|
||||||
|
cover: cloud.png
|
||||||
---
|
---
|
||||||
Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE.
|
Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE.
|
||||||
|
|
||||||
|
@ -1,6 +1,8 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
|
||||||
title: Cryptocurrency
|
title: Cryptocurrency
|
||||||
icon: material/bank-circle
|
icon: material/bank-circle
|
||||||
|
cover: cryptocurrency.png
|
||||||
---
|
---
|
||||||
|
|
||||||
Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:
|
Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:
|
||||||
|
@ -1,7 +1,9 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
|
||||||
title: "Data and Metadata Redaction"
|
title: "Data and Metadata Redaction"
|
||||||
icon: material/tag-remove
|
icon: material/tag-remove
|
||||||
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
|
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
|
||||||
|
cover: data-redaction.png
|
||||||
---
|
---
|
||||||
When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata.
|
When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata.
|
||||||
|
|
||||||
|
@ -1,7 +1,9 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
|
||||||
title: "Desktop Browsers"
|
title: "Desktop Browsers"
|
||||||
icon: material/laptop
|
icon: material/laptop
|
||||||
description: These web browsers provide stronger privacy protections than Google Chrome.
|
description: These web browsers provide stronger privacy protections than Google Chrome.
|
||||||
|
cover: desktop-browsers.png
|
||||||
schema:
|
schema:
|
||||||
-
|
-
|
||||||
"@context": http://schema.org
|
"@context": http://schema.org
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
title: "Desktop/PC"
|
title: "Desktop/PC"
|
||||||
icon: simple/linux
|
icon: simple/linux
|
||||||
description: Linux distributions are commonly recommended for privacy protection and software freedom.
|
description: Linux distributions are commonly recommended for privacy protection and software freedom.
|
||||||
|
cover: desktop.png
|
||||||
---
|
---
|
||||||
Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions.
|
Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions.
|
||||||
|
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
title: "DNS Resolvers"
|
title: "DNS Resolvers"
|
||||||
icon: material/dns
|
icon: material/dns
|
||||||
description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration.
|
description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration.
|
||||||
|
cover: dns.png
|
||||||
---
|
---
|
||||||
|
|
||||||
Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity.
|
Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity.
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
title: "Email Clients"
|
title: "Email Clients"
|
||||||
icon: material/email-open
|
icon: material/email-open
|
||||||
description: These email clients are privacy-respecting and support OpenPGP email encryption.
|
description: These email clients are privacy-respecting and support OpenPGP email encryption.
|
||||||
|
cover: email-clients.png
|
||||||
---
|
---
|
||||||
Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft.
|
Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft.
|
||||||
|
|
||||||
|
@ -1,7 +1,9 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
|
||||||
title: "Email Services"
|
title: "Email Services"
|
||||||
icon: material/email
|
icon: material/email
|
||||||
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
|
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
|
||||||
|
cover: email.png
|
||||||
---
|
---
|
||||||
Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy.
|
Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy.
|
||||||
|
|
||||||
@ -122,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
|
|||||||
|
|
||||||
#### :material-check:{ .pg-green } Account Security
|
#### :material-check:{ .pg-green } Account Security
|
||||||
|
|
||||||
Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
|
Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
|
||||||
|
|
||||||
#### :material-information-outline:{ .pg-blue } Data Security
|
#### :material-information-outline:{ .pg-blue } Data Security
|
||||||
|
|
||||||
|
@ -1,7 +1,9 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
|
||||||
title: "Encryption Software"
|
title: "Encryption Software"
|
||||||
icon: material/file-lock
|
icon: material/file-lock
|
||||||
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
|
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
|
||||||
|
cover: encryption.png
|
||||||
---
|
---
|
||||||
Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here.
|
Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here.
|
||||||
|
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
title: "File Sharing and Sync"
|
title: "File Sharing and Sync"
|
||||||
icon: material/share-variant
|
icon: material/share-variant
|
||||||
description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
|
description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
|
||||||
|
cover: file-sharing.png
|
||||||
---
|
---
|
||||||
Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
|
Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
|
||||||
|
|
||||||
|
@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Financial Services
|
title: Financial Services
|
||||||
icon: material/bank
|
icon: material/bank
|
||||||
|
cover: financial-services.png
|
||||||
---
|
---
|
||||||
|
|
||||||
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:
|
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:
|
||||||
@ -76,7 +77,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants.
|
**CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" }
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
title: "Frontends"
|
title: "Frontends"
|
||||||
icon: material/flip-to-front
|
icon: material/flip-to-front
|
||||||
description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances.
|
description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances.
|
||||||
|
cover: frontends.png
|
||||||
---
|
---
|
||||||
|
|
||||||
Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions.
|
Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions.
|
||||||
@ -191,7 +192,7 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube
|
|||||||
|
|
||||||
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
||||||
|
|
||||||
!!! Warning
|
!!! warning
|
||||||
|
|
||||||
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
|
||||||
template: overrides/home.en.html
|
template: overrides/home.en.html
|
||||||
hide:
|
hide:
|
||||||
- navigation
|
- navigation
|
||||||
|
@ -1,7 +1,9 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
|
||||||
title: "Mobile Browsers"
|
title: "Mobile Browsers"
|
||||||
icon: material/cellphone-information
|
icon: material/cellphone-information
|
||||||
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
|
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
|
||||||
|
cover: mobile-browsers.png
|
||||||
schema:
|
schema:
|
||||||
-
|
-
|
||||||
"@context": http://schema.org
|
"@context": http://schema.org
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
title: "Multi-Factor Authenticators"
|
title: "Multi-Factor Authenticators"
|
||||||
icon: 'material/two-factor-authentication'
|
icon: 'material/two-factor-authentication'
|
||||||
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
|
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
|
||||||
|
cover: multi-factor-authentication.png
|
||||||
---
|
---
|
||||||
## Hardware Security Keys
|
## Hardware Security Keys
|
||||||
|
|
||||||
@ -48,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
|
|||||||
|
|
||||||
!!! warning
|
!!! warning
|
||||||
|
|
||||||
While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
|
While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
|
||||||
|
|
||||||
!!! warning
|
!!! warning
|
||||||
|
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
title: "News Aggregators"
|
title: "News Aggregators"
|
||||||
icon: material/rss
|
icon: material/rss
|
||||||
description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS.
|
description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS.
|
||||||
|
cover: news-aggregators.png
|
||||||
---
|
---
|
||||||
|
|
||||||
A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites.
|
A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites.
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
title: "Notebooks"
|
title: "Notebooks"
|
||||||
icon: material/notebook-edit-outline
|
icon: material/notebook-edit-outline
|
||||||
description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party.
|
description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party.
|
||||||
|
cover: notebooks.png
|
||||||
---
|
---
|
||||||
|
|
||||||
Keep track of your notes and journalings without giving them to a third-party.
|
Keep track of your notes and journalings without giving them to a third-party.
|
||||||
@ -90,7 +91,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining TODO lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary }
|
||||||
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
[:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation}
|
||||||
|
@ -1,7 +1,9 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
|
||||||
title: "Password Managers"
|
title: "Password Managers"
|
||||||
icon: material/form-textbox-password
|
icon: material/form-textbox-password
|
||||||
description: Password managers allow you to securely store and manage passwords and other credentials.
|
description: Password managers allow you to securely store and manage passwords and other credentials.
|
||||||
|
cover: passwords.png
|
||||||
schema:
|
schema:
|
||||||
-
|
-
|
||||||
"@context": http://schema.org
|
"@context": http://schema.org
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
title: "Productivity Tools"
|
title: "Productivity Tools"
|
||||||
icon: material/file-sign
|
icon: material/file-sign
|
||||||
description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do.
|
description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do.
|
||||||
|
cover: productivity.png
|
||||||
---
|
---
|
||||||
Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints.
|
Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints.
|
||||||
|
|
||||||
|
@ -1,7 +1,9 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "The Best Private Instant Messengers - Privacy Guides"
|
||||||
title: "Real-Time Communication"
|
title: "Real-Time Communication"
|
||||||
icon: material/chat-processing
|
icon: material/chat-processing
|
||||||
description: Other instant messengers make all of your private conversations available to the company that runs them.
|
description: Other instant messengers make all of your private conversations available to the company that runs them.
|
||||||
|
cover: real-time-communication.png
|
||||||
---
|
---
|
||||||
|
|
||||||
These are our recommendations for encrypted real-time communication.
|
These are our recommendations for encrypted real-time communication.
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
title: "Router Firmware"
|
title: "Router Firmware"
|
||||||
icon: material/router-wireless
|
icon: material/router-wireless
|
||||||
description: These alternative operating systems can be used to secure your router or Wi-Fi access point.
|
description: These alternative operating systems can be used to secure your router or Wi-Fi access point.
|
||||||
|
cover: router.png
|
||||||
---
|
---
|
||||||
Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc.
|
Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc.
|
||||||
|
|
||||||
|
@ -1,7 +1,9 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
|
||||||
title: "Search Engines"
|
title: "Search Engines"
|
||||||
icon: material/search-web
|
icon: material/search-web
|
||||||
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
|
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
|
||||||
|
cover: search-engines.png
|
||||||
---
|
---
|
||||||
Use a search engine that doesn't build an advertising profile based on your searches.
|
Use a search engine that doesn't build an advertising profile based on your searches.
|
||||||
|
|
||||||
|
@ -1,4 +1,5 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
|
||||||
title: "Privacy Tools"
|
title: "Privacy Tools"
|
||||||
icon: material/tools
|
icon: material/tools
|
||||||
hide:
|
hide:
|
||||||
|
19
docs/tor.md
@ -1,7 +1,26 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
|
||||||
title: "Tor Network"
|
title: "Tor Network"
|
||||||
icon: simple/torproject
|
icon: simple/torproject
|
||||||
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
|
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
|
||||||
|
cover: tor.png
|
||||||
|
schema:
|
||||||
|
-
|
||||||
|
"@context": http://schema.org
|
||||||
|
"@type": SoftwareApplication
|
||||||
|
name: Tor Browser
|
||||||
|
image: /assets/img/browsers/tor.svg
|
||||||
|
url: https://www.torproject.org
|
||||||
|
sameAs: https://en.wikipedia.org/wiki/Tor_(network)
|
||||||
|
applicationCategory: Web Browser
|
||||||
|
operatingSystem:
|
||||||
|
- Windows
|
||||||
|
- macOS
|
||||||
|
- Linux
|
||||||
|
- Android
|
||||||
|
subjectOf:
|
||||||
|
"@type": WebPage
|
||||||
|
url: "./"
|
||||||
---
|
---
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
@ -2,6 +2,7 @@
|
|||||||
title: "Video Streaming"
|
title: "Video Streaming"
|
||||||
icon: material/video-wireless
|
icon: material/video-wireless
|
||||||
description: These networks allow you to stream internet content without building an advertising profile based on your interests.
|
description: These networks allow you to stream internet content without building an advertising profile based on your interests.
|
||||||
|
cover: video-streaming.png
|
||||||
---
|
---
|
||||||
The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage.
|
The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage.
|
||||||
|
|
||||||
|
@ -1,7 +1,9 @@
|
|||||||
---
|
---
|
||||||
|
meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
|
||||||
title: "VPN Services"
|
title: "VPN Services"
|
||||||
icon: material/vpn
|
icon: material/vpn
|
||||||
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
|
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
|
||||||
|
cover: vpn.png
|
||||||
---
|
---
|
||||||
|
|
||||||
If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest:
|
If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest:
|
||||||
|
@ -43,3 +43,7 @@ nav:
|
|||||||
Changelog: Changelog
|
Changelog: Changelog
|
||||||
Forum: Forum
|
Forum: Forum
|
||||||
Blog: Blog
|
Blog: Blog
|
||||||
|
|
||||||
|
site:
|
||||||
|
translation: |
|
||||||
|
You're viewing the English copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!
|
||||||
|
@ -22,6 +22,9 @@
|
|||||||
publish = "site/"
|
publish = "site/"
|
||||||
command = "crowdin download && mkdocs build --config-file config/mkdocs.en.yml && mkdocs build --config-file config/mkdocs.es.yml && mkdocs build --config-file config/mkdocs.he.yml && mkdocs build --config-file config/mkdocs.fr.yml && mkdocs build --config-file config/mkdocs.nl.yml && mv _redirects site/"
|
command = "crowdin download && mkdocs build --config-file config/mkdocs.en.yml && mkdocs build --config-file config/mkdocs.es.yml && mkdocs build --config-file config/mkdocs.he.yml && mkdocs build --config-file config/mkdocs.fr.yml && mkdocs build --config-file config/mkdocs.nl.yml && mv _redirects site/"
|
||||||
|
|
||||||
|
[context.deploy-preview]
|
||||||
|
command = "mkdocs build --config-file config/mkdocs.en.yml && mv _redirects site/"
|
||||||
|
|
||||||
[[headers]]
|
[[headers]]
|
||||||
for = "/*"
|
for = "/*"
|
||||||
[headers.values]
|
[headers.values]
|
||||||
|
7
theme/assets/img/cover/README.md
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
# Cover images
|
||||||
|
|
||||||
|
The cover images in this folder were obtained from Unsplash.
|
||||||
|
|
||||||
|
## License
|
||||||
|
|
||||||
|
See the [Unsplash License](https://unsplash.com/license) for details.
|
BIN
theme/assets/img/cover/android.png
Normal file
After Width: | Height: | Size: 556 KiB |
BIN
theme/assets/img/cover/calendar.png
Normal file
After Width: | Height: | Size: 417 KiB |
BIN
theme/assets/img/cover/cloud.png
Normal file
After Width: | Height: | Size: 717 KiB |
BIN
theme/assets/img/cover/cryptocurrency.png
Normal file
After Width: | Height: | Size: 639 KiB |
BIN
theme/assets/img/cover/data-redaction.png
Normal file
After Width: | Height: | Size: 918 KiB |
BIN
theme/assets/img/cover/desktop-browsers.png
Normal file
After Width: | Height: | Size: 945 KiB |
BIN
theme/assets/img/cover/desktop.png
Normal file
After Width: | Height: | Size: 526 KiB |
BIN
theme/assets/img/cover/dns.png
Normal file
After Width: | Height: | Size: 1.0 MiB |
BIN
theme/assets/img/cover/email-clients.png
Normal file
After Width: | Height: | Size: 793 KiB |
BIN
theme/assets/img/cover/email.png
Normal file
After Width: | Height: | Size: 442 KiB |
BIN
theme/assets/img/cover/encryption.png
Normal file
After Width: | Height: | Size: 929 KiB |
BIN
theme/assets/img/cover/file-sharing.png
Normal file
After Width: | Height: | Size: 794 KiB |
BIN
theme/assets/img/cover/financial-services.png
Normal file
After Width: | Height: | Size: 735 KiB |
BIN
theme/assets/img/cover/frontends.png
Normal file
After Width: | Height: | Size: 627 KiB |
BIN
theme/assets/img/cover/mobile-browsers.png
Normal file
After Width: | Height: | Size: 425 KiB |
BIN
theme/assets/img/cover/multi-factor-authentication.png
Normal file
After Width: | Height: | Size: 1.2 MiB |
BIN
theme/assets/img/cover/news-aggregators.png
Normal file
After Width: | Height: | Size: 1.1 MiB |
BIN
theme/assets/img/cover/notebooks.png
Normal file
After Width: | Height: | Size: 706 KiB |
BIN
theme/assets/img/cover/passwords.png
Normal file
After Width: | Height: | Size: 532 KiB |
BIN
theme/assets/img/cover/productivity.png
Normal file
After Width: | Height: | Size: 616 KiB |
BIN
theme/assets/img/cover/real-time-communication.png
Normal file
After Width: | Height: | Size: 755 KiB |
BIN
theme/assets/img/cover/router.png
Normal file
After Width: | Height: | Size: 713 KiB |
BIN
theme/assets/img/cover/search-engines.png
Normal file
After Width: | Height: | Size: 436 KiB |
BIN
theme/assets/img/cover/tor.png
Normal file
After Width: | Height: | Size: 660 KiB |
BIN
theme/assets/img/cover/video-streaming.png
Normal file
After Width: | Height: | Size: 753 KiB |
BIN
theme/assets/img/cover/vpn.png
Normal file
After Width: | Height: | Size: 652 KiB |
@ -454,3 +454,31 @@ div[class="md-source__icon md-icon"], div[class="md-source__repository md-source
|
|||||||
path[d="M20.71 7.04c.39-.39.39-1.04 0-1.41l-2.34-2.34c-.37-.39-1.02-.39-1.41 0l-1.84 1.83 3.75 3.75M3 17.25V21h3.75L17.81 9.93l-3.75-3.75L3 17.25Z"] {
|
path[d="M20.71 7.04c.39-.39.39-1.04 0-1.41l-2.34-2.34c-.37-.39-1.02-.39-1.41 0l-1.84 1.83 3.75 3.75M3 17.25V21h3.75L17.81 9.93l-3.75-3.75L3 17.25Z"] {
|
||||||
d: path('M16.937 3.722a2.363 2.363 0 1 1 3.341 3.341L19.342 8 16 4.658l.937-.936ZM13.467 7 3 17.467V21h3.532L17 10.533 13.465 7h.001Z')
|
d: path('M16.937 3.722a2.363 2.363 0 1 1 3.341 3.341L19.342 8 16 4.658l.937-.936ZM13.467 7 3 17.467V21h3.532L17 10.533 13.465 7h.001Z')
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* Cover images */
|
||||||
|
.center-cropped {
|
||||||
|
width: 100%;
|
||||||
|
height: 200px;
|
||||||
|
background-position: center center;
|
||||||
|
background-size: cover;
|
||||||
|
background-repeat: no-repeat;
|
||||||
|
overflow: hidden;
|
||||||
|
position: relative;
|
||||||
|
text-align: center;
|
||||||
|
border-radius: 0.5em;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Set the image to fill its parent and make transparent */
|
||||||
|
.center-cropped img {
|
||||||
|
min-height: 100%;
|
||||||
|
min-width: 100%;
|
||||||
|
opacity: 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
.center-cropped h1 {
|
||||||
|
position: absolute;
|
||||||
|
top: 50%;
|
||||||
|
left: 50%;
|
||||||
|
transform: translate(-50%, -50%);
|
||||||
|
color: white;
|
||||||
|
}
|
||||||
|
@ -55,6 +55,17 @@
|
|||||||
<link rel="icon" href="{{ config.theme.favicon | url }}">
|
<link rel="icon" href="{{ config.theme.favicon | url }}">
|
||||||
<meta name="generator" content="mkdocs-{{ mkdocs_version }}, mkdocs-material-9.1.0+insiders-4.32.2">
|
<meta name="generator" content="mkdocs-{{ mkdocs_version }}, mkdocs-material-9.1.0+insiders-4.32.2">
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
|
{% block htmltitle %}
|
||||||
|
{% if page.meta and page.meta.meta_title and config.theme.language == "en" %}
|
||||||
|
<title>{{ page.meta.meta_title }}</title>
|
||||||
|
{% elif page.meta and page.meta.title %}
|
||||||
|
<title>{{ page.meta.title }} - {{ config.site_name }}</title>
|
||||||
|
{% elif page.title and not page.is_homepage %}
|
||||||
|
<title>{{ page.title | striptags }} - {{ config.site_name }}</title>
|
||||||
|
{% else %}
|
||||||
|
<title>{{ config.site_name }}</title>
|
||||||
|
{% endif %}
|
||||||
|
{% endblock %}
|
||||||
{% block announce %}{% if config.extra.offline %}
|
{% block announce %}{% if config.extra.offline %}
|
||||||
You're viewing an offline copy of Privacy Guides built on {{ build_date_utc }}.
|
You're viewing an offline copy of Privacy Guides built on {{ build_date_utc }}.
|
||||||
<a href="https://www.privacyguides.org/">
|
<a href="https://www.privacyguides.org/">
|
||||||
@ -66,9 +77,57 @@
|
|||||||
<a href="https://www.privacyguides.org/">
|
<a href="https://www.privacyguides.org/">
|
||||||
<strong>Visit privacyguides.org for current advice.</strong>
|
<strong>Visit privacyguides.org for current advice.</strong>
|
||||||
</a>
|
</a>
|
||||||
|
{% elif config.extra.context == "branch-deploy" %}
|
||||||
|
You're viewing a <strong>staging branch</strong> of Privacy Guides built on {{ build_date_utc }}.
|
||||||
|
The information on this page may be incomplete or otherwise not yet meet our editorial release standards.
|
||||||
|
<a href="https://www.privacyguides.org/">
|
||||||
|
<strong>Visit privacyguides.org for current advice.</strong>
|
||||||
|
</a>
|
||||||
{% else %}{% endif %}{% endblock %}
|
{% else %}{% endif %}{% endblock %}
|
||||||
{% block extrahead %}{% if page and page.meta and page.meta.schema %}
|
{% block extrahead %}
|
||||||
|
<meta name="robots" content="max-snippet:-1, max-image-preview:large">
|
||||||
|
{% if page and page.meta and page.meta.schema %}
|
||||||
<script type="application/ld+json">
|
<script type="application/ld+json">
|
||||||
{{ page.meta.schema|tojson }}
|
{{ page.meta.schema|tojson }}
|
||||||
</script>
|
</script>
|
||||||
{% endif %}{% endblock %}
|
{% endif %}{% endblock %}
|
||||||
|
{% block content %}
|
||||||
|
{% if page and page.meta and page.meta.cover %}
|
||||||
|
<div class="center-cropped" style="background-image:linear-gradient(rgba(0, 0, 0, 0.6), rgba(0, 0, 0, 0.6)), url('/en/assets/img/cover/{{ page.meta.cover }}');">
|
||||||
|
<h1>{{ page.title | d(config.site_name, true)}}</h1>
|
||||||
|
<img src="/en/assets/img/cover/{{ page.meta.cover }}" alt="{{ page.title | d(config.site_name, true)}} cover image" title="{{ page.title | d(config.site_name, true)}}">
|
||||||
|
</div>
|
||||||
|
{% endif %}
|
||||||
|
{% if "material/tags" in config.plugins %}
|
||||||
|
{% include "partials/tags.html" %}
|
||||||
|
{% endif %}
|
||||||
|
{% include "partials/actions.html" %}
|
||||||
|
{% if "\x3ch1" not in page.content and not page.meta.cover %}
|
||||||
|
<h1>{{ page.title | d(config.site_name, true)}}</h1>
|
||||||
|
{% endif %}
|
||||||
|
{{ page.content }}
|
||||||
|
{% include "partials/source-file.html" %}
|
||||||
|
{% include "partials/feedback.html" %}
|
||||||
|
{% include "partials/comments.html" %}
|
||||||
|
{% if config.theme.language == "es" %}
|
||||||
|
<div class="admonition info">
|
||||||
|
<p>Está viendo la copia en español de Privacy Guides, traducidas por nuestro fantástico equipo lingüístico en <a href="https://crowdin.com/project/privacyguides">Crowdin</a>. Si nota un error o ve alguna sección sin traducir en esta página, ¡<a href="https://matrix.to/#/#pg-i18n:aragon.sh">considere ayudar</a>!</p>
|
||||||
|
<p>You're viewing the Spanish copy of Privacy Guides, translated by our fantastic language team on <a href="https://crowdin.com/project/privacyguides">Crowdin</a>. If you notice an error, or see any untranslated sections on this page, please consider <a href="https://matrix.to/#/#pg-i18n:aragon.sh">helping out</a>!</p>
|
||||||
|
</div>
|
||||||
|
{% elif config.theme.language == "fr" %}
|
||||||
|
<div class="admonition info">
|
||||||
|
<p>Vous êtes en train de consulter la copie française de Privacy Guides, traduite par notre fantastique équipe de traducteurs sur <a href="https://crowdin.com/project/privacyguides">Crowdin</a>. Si vous remarquez une erreur, ou si vous voyez des sections non traduites sur cette page, <a href="https://matrix.to/#/#pg-i18n:aragon.sh">n'hésitez pas à nous aider</a> !</p>
|
||||||
|
<p>You're viewing the French copy of Privacy Guides, translated by our fantastic language team on <a href="https://crowdin.com/project/privacyguides">Crowdin</a>. If you notice an error, or see any untranslated sections on this page, please consider <a href="https://matrix.to/#/#pg-i18n:aragon.sh">helping out</a>!</p>
|
||||||
|
</div>
|
||||||
|
{% elif config.theme.language == "he" %}
|
||||||
|
<div class="admonition info">
|
||||||
|
<p>אתה צופה בעותק העברי של Privacy Guides, שתורגם על ידי צוות השפה הפנטסטי שלנו ב-<a href="https://crowdin.com/project/privacyguides">Crowdin</a>. אם אתה מבחין בשגיאה, או רואה קטעים לא מתורגמים בדף זה, <a href="https://matrix.to/#/#pg-i18n:aragon.sh">אנא שקול לעזור!</a></p>
|
||||||
|
<p>You're viewing the Hebrew copy of Privacy Guides, translated by our fantastic language team on <a href="https://crowdin.com/project/privacyguides">Crowdin</a>. If you notice an error, or see any untranslated sections on this page, please consider <a href="https://matrix.to/#/#pg-i18n:aragon.sh">helping out</a></p>
|
||||||
|
</div>
|
||||||
|
{% elif config.theme.language == "nl" %}
|
||||||
|
<div class="admonition info">
|
||||||
|
<p>Je bekijkt de Nederlandse versie van Privacy Guides, vertaald door ons fantastische taalteam op <a href="https://crowdin.com/project/privacyguides">Crowdin</a>. Als u een fout opmerkt of onvertaalde gedeelten op deze pagina ziet, <a href="https://matrix.to/#/#pg-i18n:aragon.sh">overweeg dan om te helpen</a>!</p>
|
||||||
|
<p>You're viewing the Dutch copy of Privacy Guides, translated by our fantastic language team on <a href="https://crowdin.com/project/privacyguides">Crowdin</a>. If you notice an error, or see any untranslated sections on this page, please consider <a href="https://matrix.to/#/#pg-i18n:aragon.sh">helping out</a></p>
|
||||||
|
</div>
|
||||||
|
{% endif %}
|
||||||
|
{% endblock %}
|
||||||
|
@ -23,6 +23,10 @@
|
|||||||
{% extends "main.html" %}
|
{% extends "main.html" %}
|
||||||
{% block extrahead %}
|
{% block extrahead %}
|
||||||
<link rel="stylesheet" href="{{ 'assets/stylesheets/home.css?v=3.3.0' | url }}">
|
<link rel="stylesheet" href="{{ 'assets/stylesheets/home.css?v=3.3.0' | url }}">
|
||||||
|
<link rel="alternate" type="application/rss+xml" title="Privacy Guides Release Changelog" href="https://discuss.privacyguides.net/c/site-development/changelog/9.rss">
|
||||||
|
<link rel="alternate" type="application/rss+xml" title="Privacy Guides Blog Feed" href="https://blog.privacyguides.org/feed_rss_created.xml">
|
||||||
|
<link rel="alternate" type="application/rss+xml" title="Privacy Guides Web Stories Feed" href="https://share.privacyguides.org/web-stories/feed/">
|
||||||
|
<link rel="alternate" type="application/rss+xml" title="Latest Privacy Guides Forum Topics" href="https://discuss.privacyguides.net/latest.rss" />
|
||||||
{{ super() }}
|
{{ super() }}
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
{% block tabs %}
|
{% block tabs %}
|
||||||
|