From 27faa55c0111562879effc5b46a787e4709730c7 Mon Sep 17 00:00:00 2001 From: djoate <56777051+djoate@users.noreply.github.com> Date: Sun, 24 Nov 2019 17:49:37 -0500 Subject: [PATCH] Key all browser content --- _data/languages/en.yml | 402 +++++++++++++- _data/languages/es.yml | 506 +++++++++++++++++- _includes/sections/browser-addons.html | 8 +- _includes/sections/browser-fingerprint.html | 26 +- .../sections/browser-recommendation.html | 27 +- _includes/sections/browser-tweaks.html | 96 ++-- _includes/sections/browser-webrtc.html | 46 +- pages/browsers.html | 1 + weblate-source-file.yml | 404 +++++++++++++- 9 files changed, 1370 insertions(+), 146 deletions(-) diff --git a/_data/languages/en.yml b/_data/languages/en.yml index 974f044e..3b4e832d 100644 --- a/_data/languages/en.yml +++ b/_data/languages/en.yml @@ -5,6 +5,12 @@ About_PrivacyTools_KEY: | About_the_PrivacyTools_organization_and_contributors_to_the_PrivacyTools_website_communities_and_services._KEY: | ZZ +Web_Browsers_KEY: | + ZZ + +These_are_our_current_web_browser_recommendations_and_some_tweaks_you_can_use_to_preserve_your_privacy._KEY: | + ZZ + DNS__Domain_Providers_KEY: | ZZ @@ -368,6 +374,9 @@ View_our_privacy_statement_KEY: | Learn_More_KEY: | ZZ +Browser_Recommendations_For_Desktop_KEY: | + ZZ + Firefox_KEY: | ZZ @@ -422,9 +431,8 @@ httpswww.torproject.orgdownload_KEY: | httpstrac.torproject.orgprojectstor_KEY: | ZZ -Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Dont_forget_to_adjust_the_settings_according_to_ourrecommendations_a_hrefwebr_KEY: | +Browser_Recommendations_For_Android_KEY: | ZZ -recommendations: WebRTC and about:config and get the privacy add-ons. httpswww.mozilla.orgenUSfirefoxmobile_KEY: | ZZ @@ -471,6 +479,30 @@ httpswww.bromite.orgdownloadbromite_KEY: | httpsgithub.combromitebromite_KEY: | ZZ +Worth_Mentioning_for_Android_KEY: | + ZZ + +httpswww.stoutner.comprivacybrowser_KEY: | + ZZ + +Privacy_Browser_KEY: | + ZZ + +An_opensource_web_browser_focused_on_user_privacy._Features_include_integrated_ad_blocking_with_a_hrefhttpseasylist.toEasyLista_a_href_KEY: | + ZZ + +httpsplay.google.comstoreappsdetails?idcom.google.android.webviewhlen_US_KEY: | + ZZ + +Privacy_Browser_relies_on_the_Android_System_WebView_which_needs_to_be_kept_up_to_date_to_fix_security_issues._One_can_update_WebView_by_either_install_KEY: | + ZZ + +Keep_Android_WebView_uptodate_KEY: | + ZZ + +Browser_Recommendations_For_iOS_KEY: | + ZZ + Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Note_Because_of_limitations_set_by_Apple_in_iOS_our_recommended_tweaks_cannot_be_a_KEY: | ZZ @@ -510,6 +542,135 @@ httpsapps.apple.comusappduckduckgoprivacybrowserid663592361_KEY: | httpsgithub.comduckduckgoiOS_KEY: | ZZ +Worth_Mentioning_for_iOS_KEY: | + ZZ + +httpssnowhaze.comenindex.html_KEY: | + ZZ + +SnowHaze_KEY: | + ZZ + +An_opensource_web_browser_with_builtin_ad_tracker_cookie_and_fingerprint_blocking_all_customizable_on_a_persite_basis._KEY: | + ZZ + +Browser_Fingerprint__Is_your_browser_configuration_unique?_KEY: | + ZZ + +Your_Browser_sends_information_that_makes_you_unique_amongst_millions_of_users_and_therefore_easy_to_identify._KEY: | + ZZ + +When_you_visit_a_web_page_your_browser_voluntarily_sends_information_about_its_configuration_such_as_available_fonts_browser_type_and_addons._If_t_KEY: | + ZZ + +httpspanopticlick.eff.org_KEY: | + ZZ + +Test_your_Browser_now_KEY: | + ZZ + +You_need_to_find_what_strongmost_browsersstrong_are_reporting_and_then_use_those_variables_to_bring_your_browser_in_the_same_population._This_mea_KEY: | + ZZ + +Modern_web_browsers_have_not_been_architected_to_assure_personal_web_privacy._Rather_than_worrying_about_being_fingerprinted_it_seems_more_practical_t_KEY: | + ZZ + +Firefox_Addon_CanvasBlocker_KEY: | + ZZ + +httpsaddons.mozilla.orgfirefoxaddoncanvasblocker_KEY: | + ZZ + +addons.mozilla.org_KEY: | + ZZ + +strongCanvasBlockerstrong_allows_users_to_prevent_websites_from_using_some_Javascript_APIs_to_fingerprint_them._Users_can_choose_to_block_the_APIs_KEY: | + ZZ + +Related_Information_KEY: | + ZZ + +httpspanopticlick.eff.orgstaticbrowseruniqueness.pdf_KEY: | + ZZ + +How_Unique_Is_Your_Web_Browser?_Peter_Eckersley_EFF._KEY: | + ZZ + +Our_Firefox_privacy_addons_section._KEY: | + ZZ + +httpswww.browserleaks.com_KEY: | + ZZ + +Web_browser_security_testing_tools_that_tell_you_what_exactly_personal_identity_data_may_be_leaked_without_any_permissions_when_you_surf_the_Internet._KEY: | + ZZ + +WebRTC_IP_Leak_Test__Is_your_IP_address_leaking?_KEY: | + ZZ + +WebRTC_is_a_new_communication_protocol_that_relies_on_JavaScript_that_can_leak_your_actual_IP_address_from_behind_your_VPN._KEY: | + ZZ + +While_software_like_NoScript_prevents_this_its_probably_a_good_idea_to_block_this_protocol_directly_as_well_just_to_be_safe._KEY: | + ZZ + +httpsipleak.net_KEY: | + ZZ + +How_to_disable_WebRTC_in_Firefox?_KEY: | + ZZ + +In_short_Set_media.peerconnection.enabled_to_false_in_aboutconfig._KEY: | + ZZ + +Explained_KEY: | + ZZ + +Enter_aboutconfig_in_the_firefox_address_bar_and_press_enter._KEY: | + ZZ + +Press_the_button_Ill_be_careful_I_promise!_KEY: | + ZZ + +Search_for_media.peerconnection.enabled_KEY: | + ZZ + +Double_click_the_entry_the_column_Value_should_now_be_false_KEY: | + ZZ + +Done._Do_the_WebRTC_leak_test_again._KEY: | + ZZ + +If_you_want_to_make_sure_every_single_WebRTCrelated_setting_is_really_disabled_change_these_settings_KEY: | + ZZ + +Now_you_can_be_100_sure_WebRTC_is_disabled._KEY: | + ZZ + +Test_your_Browser_again_KEY: | + ZZ + +How_to_fix_the_WebRTC_Leak_in_Google_Chrome?_KEY: | + ZZ + +WebRTC_cannot_be_fully_disabled_in_Chrome_however_it_is_possible_to_change_its_routing_settings_and_prevent_leaks_using_an_extension._Two_opensour_KEY: | + ZZ + +What_about_other_browsers?_KEY: | + ZZ + +Chrome_on_iOS_Internet_Explorer_and_Safari_does_not_implement_WebRTC_yet._KEY: | + ZZ + +But_we_recommend_using_Firefox_on_all_devices._KEY: | + ZZ + +Recommended_Browser_Addons_KEY: | + ZZ + +Improve_your_privacy_with_these_browser_addons._KEY: | + ZZ + uBlock_Origin_Block_Ads_and_Trackers_KEY: | ZZ @@ -654,6 +815,12 @@ httpsaddons.opera.comenextensionsdetailsprivacybadger_KEY: | httpsgithub.comEFForgprivacybadger_KEY: | ZZ +For_Power_Users_Only_KEY: | + ZZ + +These_addons_require_quite_a_lot_of_interaction_from_the_user._Some_sites_will_not_work_properly_until_you_have_configured_the_addons._KEY: | + ZZ + uMatrix_Stop_CrossSite_Requests_KEY: | ZZ @@ -693,6 +860,204 @@ httpschrome.google.comwebstoredetailnoscriptdoojmbjmlfjjnbmnoijecmcbfeoakpjm_KEY httpsgithub.comhackademixnoscript_KEY: | ZZ +Firefox_Privacy_Related_aboutconfig_Tweaks_KEY: | + ZZ + +This_is_a_collection_of_privacyrelated_strongaboutconfigstrong_tweaks._Well_show_you_how_to_enhance_the_privacy_of_your_Firefox_browser._KEY: | + ZZ + +Preparation_KEY: | + ZZ + +Follow_the_instructions_below..._KEY: | + ZZ + +Getting_started_KEY: | + ZZ + +A_result_of_the_a_hrefhttpswiki.mozilla.orgSecurityTor_UpliftTor_Uplifta_effort_this_preference_isolates_all_browser_identifier_sources__KEY: | + ZZ + +A_result_of_the_a_hrefhttpswiki.mozilla.orgSecurityTor_UpliftTor_Uplifta_effort_this_preference_makes_Firefox_more_resistant_to_browser_f_KEY: | + ZZ + +FF67_Blocks_Fingerprinting_KEY: | + ZZ + +FF67_Blocks_CryptoMining_KEY: | + ZZ + +This_is_Mozillas_new_builtin_tracking_protection._It_uses_Disconnect.me_filter_list_which_is_redundant_if_you_are_already_using_uBlock_Origin_3rd_pa_KEY: | + ZZ + +The_attribute_would_be_useful_for_letting_websites_track_visitors_clicks._KEY: | + ZZ + +Even_with_Firefox_set_to_not_remember_history_your_closed_tabs_are_stored_temporarily_at_Menu_gt_History_gt_Recently_Closed_Tabs._KEY: | + ZZ + +Disable_preloading_of_autocomplete_URLs._Firefox_preloads_URLs_that_autocomplete_when_a_user_types_into_the_address_bar_which_is_a_concern_if_URLs_are_KEY: | + ZZ + +httpswww.ghacks.net20170724disablepreloadingfirefoxautocompleteurls_KEY: | + ZZ + +Source_KEY: | + ZZ + +Disable_that_websites_can_get_notifications_if_you_copy_paste_or_cut_something_from_a_web_page_and_it_lets_them_know_which_part_of_the_page_had_been_KEY: | + ZZ + +Disables_playback_of_DRMcontrolled_HTML5_content_which_if_enabled_automatically_downloads_the_Widevine_Content_Decryption_Module_provided_by_Google_KEY: | + ZZ + +httpssupport.mozilla.orgkbenabledrmw_optoutofcdmplaybackuninstallcdmsandstopallcdmdownloads_KEY: | + ZZ + +Details_KEY: | + ZZ + +DRMcontrolled_content_that_requires_the_Adobe_Flash_or_Microsoft_Silverlight_NPAPI_plugins_will_still_play_if_installed_and_enabled_in_Firefox._KEY: | + ZZ + +Disables_the_Widevine_Content_Decryption_Module_provided_by_Google_Inc._used_for_the_playback_of_DRMcontrolled_HTML5_content._KEY: | + ZZ + +httpssupport.mozilla.orgkbenabledrmw_disablethegooglewidevinecdmwithoutuninstalling_KEY: | + ZZ + +Websites_can_track_the_microphone_and_camera_status_of_your_device._KEY: | + ZZ + +Disable_cookies_KEY: | + ZZ + +Accept_all_cookies_by_default_KEY: | + ZZ + +Only_accept_from_the_originating_site_block_thirdparty_cookies_KEY: | + ZZ + +Block_all_cookies_by_default_KEY: | + ZZ + +Only_send_codeReferercode_header_when_the_full_hostnames_match._Note_if_you_notice_significant_breakage_you_might_try_code1code_combined_w_KEY: | + ZZ + +httpsfeeding.cloud.geek.nzpoststweakingreferrerforprivacyinfirefox_KEY: | + ZZ + +Send_codeReferercode_in_all_cases_KEY: | + ZZ + +Send_codeReferercode_to_same_eTLD_sites_KEY: | + ZZ + +Send_codeReferercode_only_when_the_full_hostnames_match_KEY: | + ZZ + +When_sending_codeReferercode_across_origins_only_send_scheme_host_and_port_in_the_codeReferercode_header_of_crossorigin_requests._KEY: | + ZZ + +Send_full_url_in_codeReferercode_KEY: | + ZZ + +Send_url_without_query_string_in_codeReferercode_KEY: | + ZZ + +Only_send_scheme_host_and_port_in_codeReferercode_KEY: | + ZZ + +Looking_for_TRR_DoH_or_ESNI?_KEY: | + ZZ + +They_have_moved_to_a_href_providersdnsicanndns__translate_page_our_DNS_pagea._KEY: | + ZZ + +WebGL_is_a_potential_security_risk._KEY: | + ZZ + +httpssecurity.stackexchange.comquestions13799iswebglasecurityconcern_KEY: | + ZZ + +This_preference_controls_when_to_store_extra_information_about_a_session_contents_of_forms_scrollbar_positions_cookies_and_POST_data._KEY: | + ZZ + +httpkb.mozillazine.orgBrowser.sessionstore.privacy_level_KEY: | + ZZ + +Store_extra_session_data_for_any_site._Default_starting_with_Firefox_4._KEY: | + ZZ + +Store_extra_session_data_for_unencrypted_nonHTTPS_sites_only._Default_before_Firefox_4._KEY: | + ZZ + +Never_store_extra_session_data._KEY: | + ZZ + +Not_rendering_IDNs_as_their_Punycode_equivalent_leaves_you_open_to_phishing_attacks_that_can_be_very_difficult_to_notice._KEY: | + ZZ + +httpskrebsonsecurity.com201803lookalikedomainsandvisualconfusionmore42636_KEY: | + ZZ + +Firefox_user.js_Templates_KEY: | + ZZ + +httpsgithub.comghacksuserjsghacksuser.js_KEY: | + ZZ + +ghacksuser.js_KEY: | + ZZ + +An_ongoing_comprehensive_user.js_template_for_configuring_and_hardening_Firefox_privacy_security_and_antifingerprinting._KEY: | + ZZ + +httpsblog.privacytools.iofirefoxprivacyanintroductiontosafe_KEY: | + ZZ + +Firefox_Privacy_Tips_and_Tricks_for_Better_Browsing_KEY: | + ZZ + +A_good_starting_guide_for_users_looking_to_keep_their_data_private_and_secure._KEY: | + ZZ + +httpsffprofile.com_KEY: | + ZZ + +ffprofile.com_KEY: | + ZZ + +Helps_you_to_create_a_Firefox_profile_with_the_defaults_you_like._KEY: | + ZZ + +httpkb.mozillazine.orgCategorySecurity_and_privacyrelated_preferences_KEY: | + ZZ + +mozillazine.org_KEY: | + ZZ + +Security_and_privacyrelated_preferences._KEY: | + ZZ + +httpsaddons.mozilla.orgfirefoxaddonprivacysettings_KEY: | + ZZ + +Privacy_Settings_KEY: | + ZZ + +A_Firefox_addon_to_alter_builtin_privacy_settings_easily_with_a_toolbar_panel._KEY: | + ZZ + +https12bytes.orgarticlestechfirefoxthefirefoxprivacyguidefordummies_KEY: | + ZZ + +Firefox_Privacy_Guide_For_Dummies_KEY: | + ZZ + +Guide_on_ways_already_discussed_and_others_to_improve_your_privacy_and_safety_on_Firefox._KEY: | + ZZ + Nextcloud_KEY: | ZZ @@ -1647,9 +2012,6 @@ Take_it_a_step_further_and_get_control_of_your_email_with_this_easytodeploy_mail More_KEY: | ZZ -Related_Information_KEY: | - ZZ - httpswww.wired.com201110ecpaturnstwentyfive_KEY: | ZZ @@ -1911,9 +2273,6 @@ Prefer_the_classic_site?_View_a_singlepage_layout._KEY: | Discover_privacycentric_online_services_including_email_providers_VPN_operators_DNS_administrators_and_more!_KEY: | ZZ -Web_Browsers_KEY: | - ZZ - Find_a_web_browser_that_respects_your_privacy_and_discover_how_to_harden_your_browser_against_tracking_and_leaks._KEY: | ZZ @@ -2145,9 +2504,6 @@ Critique_and_information_on_why_to_avoid_Cloudflare_a_big_company_with_a_huge_po Tools_KEY: | ZZ -httpsipleak.net_KEY: | - ZZ - ipleak.net_KEY: | ZZ @@ -2892,6 +3248,30 @@ httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: | httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: | ZZ +httpsplay.google.comstoreappsdetails?idcom.google.android.webviewhlen_US_KEY: | + ZZ + +Browser_Fingerprint__Is_your_browser_configuration_unique?_KEY: | + ZZ + +How_Unique_Is_Your_Web_Browser?_Peter_Eckersley_EFF._KEY: | + ZZ + +WebRTC_IP_Leak_Test__Is_your_IP_address_leaking?_KEY: | + ZZ + +How_to_disable_WebRTC_in_Firefox?_KEY: | + ZZ + +How_to_fix_the_WebRTC_Leak_in_Google_Chrome?_KEY: | + ZZ + +What_about_other_browsers?_KEY: | + ZZ + +Looking_for_TRR_DoH_or_ESNI?_KEY: | + ZZ + httpswww.clawsmail.orgdownloads.php?sectiondownloads_KEY: | ZZ diff --git a/_data/languages/es.yml b/_data/languages/es.yml index b416495e..678f8fe2 100644 --- a/_data/languages/es.yml +++ b/_data/languages/es.yml @@ -5,6 +5,12 @@ About_PrivacyTools_KEY: | About_the_PrivacyTools_organization_and_contributors_to_the_PrivacyTools_website_communities_and_services._KEY: | About the PrivacyTools organization, and contributors to the PrivacyTools website, communities, and services. +Web_Browsers_KEY: | + Web Browsers + +These_are_our_current_web_browser_recommendations_and_some_tweaks_you_can_use_to_preserve_your_privacy._KEY: | + These are our current web browser recommendations and some tweaks you can use to preserve your privacy. + DNS__Domain_Providers_KEY: | DNS / Domain Providers @@ -221,6 +227,54 @@ We_take_the_operation_of_our_various_a_href_services__translate_page_servicesa_v Core_Contributors_KEY: | Core Contributors +Founder_KEY: | + Founder + +I_founded_PrivacyTools_in_2015_to_share_resources_and_tools_allowing_users_to_avoid_international_masssurveillance_programs._KEY: | + I founded PrivacyTools in 2015 to share resources and tools, allowing users to avoid international mass-surveillance programs. + +Administrator_KEY: | + Administrator + +I_run_the_website_and_services_for_PrivacyTools._My_goal_is_to_spread_the_word_about_data_privacy_as_widely_as_possible._KEY: | + I run the website and services for PrivacyTools. My goal is to spread the word about data privacy as widely as possible. + +Community_Manager_KEY: | + Community Manager + +I_research_new_privacy_recommendations_and_moderate_our_communities._My_expertise_is_endpoint_security_and_networking._KEY: | + I research new privacy recommendations and moderate our communities. My expertise is endpoint security and networking. + +ThinkPrivacy_Editor_KEY: | + ThinkPrivacy Editor + +Im_an_author_columnist_and_privacy_advocate_whose_work_has_appeared_in_Time_Huff_Post_OpenSource_and_more._KEY: | + I'm an author, columnist, and privacy advocate whose work has appeared in Time, Huff Post, OpenSource, and more. + +Developer_KEY: | + Developer + +Im_a_student_interested_in_software_development._I_help_improve_PrivacyTools_and_promote_using_free_libre_software._KEY: | + I'm a student interested in software development. I help improve PrivacyTools and promote using free libre software. + +Contributor_KEY: | + Contributor + +I_liaise_with_and_research_privacyfocused_services_to_refine_our_recommendations._My_background_is_infosec_and_network_security._KEY: | + I liaise with and research privacy-focused services to refine our recommendations. My background is infosec and network security. + +I_am_interested_in_instant_messengers._I_review_privacy_tools_and_participate_in_our_forum_Matrix_room_and_issue_tracker._KEY: | + I am interested in instant messengers. I review privacy tools, and participate in our forum, Matrix room, and issue tracker. + +Im_a_privacy_advocate_and_software_developer._I_write_web_extensions_help_research_and_make_updates_to_the_site._KEY: | + I'm a privacy advocate and software developer. I write web extensions, help research, and make updates to the site. + +Subreddit_Mod_KEY: | + Subreddit Mod + +Im_the_moderator_at_rPrivacy_and_rprivacytoolsIO._Day_to_day_I_am_also__iirony_alerti__an_ethical_digital_marketer._KEY: | + I'm the moderator at r/Privacy and r/privacytoolsIO. Day to day, I am also – irony alert – an (ethical) digital marketer. + Of_course_we_couldnt_do_any_of_this_without_our_very_generous_a_hrefhttpsopencollective.comprivacytoolsiofinancial_contributorsa_a_hre_KEY: | Of course, we couldn't do any of this without our very generous financial contributors, website contributors, and the countless community members that help share new ideas and spread the word! @@ -320,6 +374,9 @@ View_our_privacy_statement_KEY: | Learn_More_KEY: | Learn More +Browser_Recommendations_For_Desktop_KEY: | + Browser Recommendations For Desktop + Firefox_KEY: | Firefox @@ -374,9 +431,8 @@ httpswww.torproject.orgdownload_KEY: | httpstrac.torproject.orgprojectstor_KEY: | https://trac.torproject.org/projects/tor -Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Dont_forget_to_adjust_the_settings_according_to_ourrecommendations_a_hrefwebr_KEY: | - Firefox is fast, reliable, open-source, and respects your privacy. Don't forget to adjust the settings according to our -recommendations: WebRTC and about:config and get the privacy add-ons. +Browser_Recommendations_For_Android_KEY: | + Browser Recommendations For Android httpswww.mozilla.orgenUSfirefoxmobile_KEY: | https://www.mozilla.org/en-US/firefox/mobile/ @@ -423,6 +479,30 @@ httpswww.bromite.orgdownloadbromite_KEY: | httpsgithub.combromitebromite_KEY: | https://github.com/bromite/bromite +Worth_Mentioning_for_Android_KEY: | + Worth Mentioning for Android + +httpswww.stoutner.comprivacybrowser_KEY: | + https://www.stoutner.com/privacy-browser/ + +Privacy_Browser_KEY: | + Privacy Browser + +An_opensource_web_browser_focused_on_user_privacy._Features_include_integrated_ad_blocking_with_a_hrefhttpseasylist.toEasyLista_a_href_KEY: | + An open-source web browser focused on user privacy. Features include integrated ad blocking with EasyList, SSL certificate pinning, and Tor Orbot proxy support. + +httpsplay.google.comstoreappsdetails?idcom.google.android.webviewhlen_US_KEY: | + https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US + +Privacy_Browser_relies_on_the_Android_System_WebView_which_needs_to_be_kept_up_to_date_to_fix_security_issues._One_can_update_WebView_by_either_install_KEY: | + Privacy Browser relies on the Android System WebView which needs to be kept up to date to fix security issues. One can update WebView by either installing it from Google Play or Aurora Store which you can get from F-Droid. + +Keep_Android_WebView_uptodate_KEY: | + Keep Android WebView up-to-date + +Browser_Recommendations_For_iOS_KEY: | + Browser Recommendations For iOS + Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Note_Because_of_limitations_set_by_Apple_in_iOS_our_recommended_tweaks_cannot_be_a_KEY: | Firefox is fast, reliable, open-source, and respects your privacy. Note: Because of limitations set by Apple in iOS, our recommended tweaks cannot be applied. However, Firefox for iOS has an Enhanced Tracking Protection feature that uses a list provided by Disconnect to identify and block ad, social, and analytics trackers, as well as cryptominers and fingerprinters. @@ -462,6 +542,135 @@ httpsapps.apple.comusappduckduckgoprivacybrowserid663592361_KEY: | httpsgithub.comduckduckgoiOS_KEY: | https://github.com/duckduckgo/iOS +Worth_Mentioning_for_iOS_KEY: | + Worth Mentioning for iOS + +httpssnowhaze.comenindex.html_KEY: | + https://snowhaze.com/en/index.html + +SnowHaze_KEY: | + SnowHaze + +An_opensource_web_browser_with_builtin_ad_tracker_cookie_and_fingerprint_blocking_all_customizable_on_a_persite_basis._KEY: | + An open-source web browser with built-in ad, tracker, cookie, and fingerprint blocking, all customizable on a per-site basis. + +Browser_Fingerprint__Is_your_browser_configuration_unique?_KEY: | + Browser Fingerprint - Is your browser configuration unique? + +Your_Browser_sends_information_that_makes_you_unique_amongst_millions_of_users_and_therefore_easy_to_identify._KEY: | + Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify. + +When_you_visit_a_web_page_your_browser_voluntarily_sends_information_about_its_configuration_such_as_available_fonts_browser_type_and_addons._If_t_KEY: | + When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is. + +httpspanopticlick.eff.org_KEY: | + https://panopticlick.eff.org/ + +Test_your_Browser_now_KEY: | + Test your Browser now + +You_need_to_find_what_strongmost_browsersstrong_are_reporting_and_then_use_those_variables_to_bring_your_browser_in_the_same_population._This_mea_KEY: | + You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user-agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses. + +Modern_web_browsers_have_not_been_architected_to_assure_personal_web_privacy._Rather_than_worrying_about_being_fingerprinted_it_seems_more_practical_t_KEY: | + Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint. + +Firefox_Addon_CanvasBlocker_KEY: | + Firefox Addon: CanvasBlocker + +httpsaddons.mozilla.orgfirefoxaddoncanvasblocker_KEY: | + https://addons.mozilla.org/firefox/addon/canvasblocker/ + +addons.mozilla.org_KEY: | + addons.mozilla.org + +strongCanvasBlockerstrong_allows_users_to_prevent_websites_from_using_some_Javascript_APIs_to_fingerprint_them._Users_can_choose_to_block_the_APIs_KEY: | + CanvasBlocker allows users to prevent websites from using some Javascript APIs to fingerprint them. Users can choose to block the APIs entirely on some or all websites (which may break some websites) or just block or fake its fingerprinting-friendly readout API. + +Related_Information_KEY: | + Related Information + +httpspanopticlick.eff.orgstaticbrowseruniqueness.pdf_KEY: | + https://panopticlick.eff.org/static/browser-uniqueness.pdf + +How_Unique_Is_Your_Web_Browser?_Peter_Eckersley_EFF._KEY: | + How Unique Is Your Web Browser? Peter Eckersley, EFF. + +Our_Firefox_privacy_addons_section._KEY: | + Our Firefox privacy add-ons section. + +httpswww.browserleaks.com_KEY: | + https://www.browserleaks.com/ + +Web_browser_security_testing_tools_that_tell_you_what_exactly_personal_identity_data_may_be_leaked_without_any_permissions_when_you_surf_the_Internet._KEY: | + Web browser security testing tools that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet. + +WebRTC_IP_Leak_Test__Is_your_IP_address_leaking?_KEY: | + WebRTC IP Leak Test - Is your IP address leaking? + +WebRTC_is_a_new_communication_protocol_that_relies_on_JavaScript_that_can_leak_your_actual_IP_address_from_behind_your_VPN._KEY: | + WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN. + +While_software_like_NoScript_prevents_this_its_probably_a_good_idea_to_block_this_protocol_directly_as_well_just_to_be_safe._KEY: | + While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe. + +httpsipleak.net_KEY: | + https://ipleak.net + +How_to_disable_WebRTC_in_Firefox?_KEY: | + How to disable WebRTC in Firefox? + +In_short_Set_media.peerconnection.enabled_to_false_in_aboutconfig._KEY: | + In short: Set "media.peerconnection.enabled" to "false" in "about:config". + +Explained_KEY: | + Explained: + +Enter_aboutconfig_in_the_firefox_address_bar_and_press_enter._KEY: | + Enter "about:config" in the firefox address bar and press enter. + +Press_the_button_Ill_be_careful_I_promise!_KEY: | + Press the button "I'll be careful, I promise!" + +Search_for_media.peerconnection.enabled_KEY: | + Search for "media.peerconnection.enabled" + +Double_click_the_entry_the_column_Value_should_now_be_false_KEY: | + Double click the entry, the column "Value" should now be "false" + +Done._Do_the_WebRTC_leak_test_again._KEY: | + Done. Do the WebRTC leak test again. + +If_you_want_to_make_sure_every_single_WebRTCrelated_setting_is_really_disabled_change_these_settings_KEY: | + If you want to make sure every single WebRTC-related setting is really disabled, change these settings: + +Now_you_can_be_100_sure_WebRTC_is_disabled._KEY: | + Now you can be 100% sure WebRTC is disabled. + +Test_your_Browser_again_KEY: | + Test your Browser again + +How_to_fix_the_WebRTC_Leak_in_Google_Chrome?_KEY: | + How to fix the WebRTC Leak in Google Chrome? + +WebRTC_cannot_be_fully_disabled_in_Chrome_however_it_is_possible_to_change_its_routing_settings_and_prevent_leaks_using_an_extension._Two_opensour_KEY: | + WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings). + +What_about_other_browsers?_KEY: | + What about other browsers? + +Chrome_on_iOS_Internet_Explorer_and_Safari_does_not_implement_WebRTC_yet._KEY: | + Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet. + +But_we_recommend_using_Firefox_on_all_devices._KEY: | + But we recommend using Firefox on all devices. + +Recommended_Browser_Addons_KEY: | + Recommended Browser Add-ons + +Improve_your_privacy_with_these_browser_addons._KEY: | + Improve your privacy with these browser add-ons. + uBlock_Origin_Block_Ads_and_Trackers_KEY: | uBlock Origin: Block Ads and Trackers @@ -606,6 +815,12 @@ httpsaddons.opera.comenextensionsdetailsprivacybadger_KEY: | httpsgithub.comEFForgprivacybadger_KEY: | https://github.com/EFForg/privacybadger +For_Power_Users_Only_KEY: | + For Power Users Only + +These_addons_require_quite_a_lot_of_interaction_from_the_user._Some_sites_will_not_work_properly_until_you_have_configured_the_addons._KEY: | + These addons require quite a lot of interaction from the user. Some sites will not work properly until you have configured the add-ons. + uMatrix_Stop_CrossSite_Requests_KEY: | uMatrix: Stop Cross-Site Requests @@ -645,6 +860,204 @@ httpschrome.google.comwebstoredetailnoscriptdoojmbjmlfjjnbmnoijecmcbfeoakpjm_KEY httpsgithub.comhackademixnoscript_KEY: | https://github.com/hackademix/noscript +Firefox_Privacy_Related_aboutconfig_Tweaks_KEY: | + Firefox: Privacy Related "about:config" Tweaks + +This_is_a_collection_of_privacyrelated_strongaboutconfigstrong_tweaks._Well_show_you_how_to_enhance_the_privacy_of_your_Firefox_browser._KEY: | + This is a collection of privacy-related about:config tweaks. We'll show you how to enhance the privacy of your Firefox browser. + +Preparation_KEY: | + Preparation: + +Follow_the_instructions_below..._KEY: | + Follow the instructions below... + +Getting_started_KEY: | + Getting started: + +A_result_of_the_a_hrefhttpswiki.mozilla.orgSecurityTor_UpliftTor_Uplifta_effort_this_preference_isolates_all_browser_identifier_sources__KEY: | + A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.) + +A_result_of_the_a_hrefhttpswiki.mozilla.orgSecurityTor_UpliftTor_Uplifta_effort_this_preference_makes_Firefox_more_resistant_to_browser_f_KEY: | + A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting. + +FF67_Blocks_Fingerprinting_KEY: | + [FF67+] Blocks Fingerprinting + +FF67_Blocks_CryptoMining_KEY: | + [FF67+] Blocks CryptoMining + +This_is_Mozillas_new_builtin_tracking_protection._It_uses_Disconnect.me_filter_list_which_is_redundant_if_you_are_already_using_uBlock_Origin_3rd_pa_KEY: | + This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities. + +The_attribute_would_be_useful_for_letting_websites_track_visitors_clicks._KEY: | + The attribute would be useful for letting websites track visitors' clicks. + +Even_with_Firefox_set_to_not_remember_history_your_closed_tabs_are_stored_temporarily_at_Menu_gt_History_gt_Recently_Closed_Tabs._KEY: | + Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs. + +Disable_preloading_of_autocomplete_URLs._Firefox_preloads_URLs_that_autocomplete_when_a_user_types_into_the_address_bar_which_is_a_concern_if_URLs_are_KEY: | + Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. + +httpswww.ghacks.net20170724disablepreloadingfirefoxautocompleteurls_KEY: | + https://www.ghacks.net/2017/07/24/disable-preloading-firefox-autocomplete-urls/ + +Source_KEY: | + Source + +Disable_that_websites_can_get_notifications_if_you_copy_paste_or_cut_something_from_a_web_page_and_it_lets_them_know_which_part_of_the_page_had_been_KEY: | + Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected. + +Disables_playback_of_DRMcontrolled_HTML5_content_which_if_enabled_automatically_downloads_the_Widevine_Content_Decryption_Module_provided_by_Google_KEY: | + Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. + +httpssupport.mozilla.orgkbenabledrmw_optoutofcdmplaybackuninstallcdmsandstopallcdmdownloads_KEY: | + https://support.mozilla.org/kb/enable-drm#w_opt-out-of-cdm-playback-uninstall-cdms-and-stop-all-cdm-downloads + +Details_KEY: | + Details + +DRMcontrolled_content_that_requires_the_Adobe_Flash_or_Microsoft_Silverlight_NPAPI_plugins_will_still_play_if_installed_and_enabled_in_Firefox._KEY: | + DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox. + +Disables_the_Widevine_Content_Decryption_Module_provided_by_Google_Inc._used_for_the_playback_of_DRMcontrolled_HTML5_content._KEY: | + Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. + +httpssupport.mozilla.orgkbenabledrmw_disablethegooglewidevinecdmwithoutuninstalling_KEY: | + https://support.mozilla.org/kb/enable-drm#w_disable-the-google-widevine-cdm-without-uninstalling + +Websites_can_track_the_microphone_and_camera_status_of_your_device._KEY: | + Websites can track the microphone and camera status of your device. + +Disable_cookies_KEY: | + Disable cookies + +Accept_all_cookies_by_default_KEY: | + Accept all cookies by default + +Only_accept_from_the_originating_site_block_thirdparty_cookies_KEY: | + Only accept from the originating site (block third-party cookies) + +Block_all_cookies_by_default_KEY: | + Block all cookies by default + +Only_send_codeReferercode_header_when_the_full_hostnames_match._Note_if_you_notice_significant_breakage_you_might_try_code1code_combined_w_KEY: | + Only send Referer header when the full hostnames match. (Note: if you notice significant breakage, you might try 1 combined with an XOriginTrimmingPolicy tweak below.) + +httpsfeeding.cloud.geek.nzpoststweakingreferrerforprivacyinfirefox_KEY: | + https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/ + +Send_codeReferercode_in_all_cases_KEY: | + Send Referer in all cases + +Send_codeReferercode_to_same_eTLD_sites_KEY: | + Send Referer to same eTLD sites + +Send_codeReferercode_only_when_the_full_hostnames_match_KEY: | + Send Referer only when the full hostnames match + +When_sending_codeReferercode_across_origins_only_send_scheme_host_and_port_in_the_codeReferercode_header_of_crossorigin_requests._KEY: | + When sending Referer across origins, only send scheme, host, and port in the Referer header of cross-origin requests. + +Send_full_url_in_codeReferercode_KEY: | + Send full url in Referer + +Send_url_without_query_string_in_codeReferercode_KEY: | + Send url without query string in Referer + +Only_send_scheme_host_and_port_in_codeReferercode_KEY: | + Only send scheme, host, and port in Referer + +Looking_for_TRR_DoH_or_ESNI?_KEY: | + Looking for TRR, DoH or ESNI? + +They_have_moved_to_a_href_providersdnsicanndns__translate_page_our_DNS_pagea._KEY: | + They have moved to our DNS page. + +WebGL_is_a_potential_security_risk._KEY: | + WebGL is a potential security risk. + +httpssecurity.stackexchange.comquestions13799iswebglasecurityconcern_KEY: | + https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern + +This_preference_controls_when_to_store_extra_information_about_a_session_contents_of_forms_scrollbar_positions_cookies_and_POST_data._KEY: | + This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data. + +httpkb.mozillazine.orgBrowser.sessionstore.privacy_level_KEY: | + http://kb.mozillazine.org/Browser.sessionstore.privacy_level + +Store_extra_session_data_for_any_site._Default_starting_with_Firefox_4._KEY: | + Store extra session data for any site. (Default starting with Firefox 4.) + +Store_extra_session_data_for_unencrypted_nonHTTPS_sites_only._Default_before_Firefox_4._KEY: | + Store extra session data for unencrypted (non-HTTPS) sites only. (Default before Firefox 4.) + +Never_store_extra_session_data._KEY: | + Never store extra session data. + +Not_rendering_IDNs_as_their_Punycode_equivalent_leaves_you_open_to_phishing_attacks_that_can_be_very_difficult_to_notice._KEY: | + Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice. + +httpskrebsonsecurity.com201803lookalikedomainsandvisualconfusionmore42636_KEY: | + https://krebsonsecurity.com/2018/03/look-alike-domains-and-visual-confusion/#more-42636 + +Firefox_user.js_Templates_KEY: | + Firefox user.js Templates + +httpsgithub.comghacksuserjsghacksuser.js_KEY: | + https://github.com/ghacksuserjs/ghacks-user.js + +ghacksuser.js_KEY: | + ghacks-user.js + +An_ongoing_comprehensive_user.js_template_for_configuring_and_hardening_Firefox_privacy_security_and_antifingerprinting._KEY: | + An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting. + +httpsblog.privacytools.iofirefoxprivacyanintroductiontosafe_KEY: | + https://blog.privacytools.io/firefox-privacy-an-introduction-to-safe/ + +Firefox_Privacy_Tips_and_Tricks_for_Better_Browsing_KEY: | + Firefox Privacy: Tips and Tricks for Better Browsing + +A_good_starting_guide_for_users_looking_to_keep_their_data_private_and_secure._KEY: | + A good starting guide for users looking to keep their data private and secure. + +httpsffprofile.com_KEY: | + https://ffprofile.com/ + +ffprofile.com_KEY: | + ffprofile.com + +Helps_you_to_create_a_Firefox_profile_with_the_defaults_you_like._KEY: | + Helps you to create a Firefox profile with the defaults you like. + +httpkb.mozillazine.orgCategorySecurity_and_privacyrelated_preferences_KEY: | + http://kb.mozillazine.org/Category:Security_and_privacy-related_preferences + +mozillazine.org_KEY: | + mozillazine.org + +Security_and_privacyrelated_preferences._KEY: | + Security and privacy-related preferences. + +httpsaddons.mozilla.orgfirefoxaddonprivacysettings_KEY: | + https://addons.mozilla.org/firefox/addon/privacy-settings/ + +Privacy_Settings_KEY: | + Privacy Settings + +A_Firefox_addon_to_alter_builtin_privacy_settings_easily_with_a_toolbar_panel._KEY: | + A Firefox add-on to alter built-in privacy settings easily with a toolbar panel. + +https12bytes.orgarticlestechfirefoxthefirefoxprivacyguidefordummies_KEY: | + https://12bytes.org/articles/tech/firefox/the-firefox-privacy-guide-for-dummies/ + +Firefox_Privacy_Guide_For_Dummies_KEY: | + Firefox Privacy Guide For Dummies + +Guide_on_ways_already_discussed_and_others_to_improve_your_privacy_and_safety_on_Firefox._KEY: | + Guide on ways (already discussed and others) to improve your privacy and safety on Firefox. + Nextcloud_KEY: | Nextcloud @@ -1344,6 +1757,51 @@ httpswww.isc.orgdnssec_KEY: | DNSSEC_and_BIND_9a_by_the_ISC_KEY: | DNSSEC and BIND 9 by the ISC +Donate_via_OpenCollective_KEY: | + Donate via OpenCollective + +If_you_are_able_please_consider_contributing_to_our_development_and_outreach_programs._KEY: | + If you are able, please consider contributing to our development and outreach programs. + +Contributions_via_OpenCollective_to__site.name__are_tax_deductible_for_US_taxpayers._KEY: | + Contributions via OpenCollective to {{ site.name }} are tax deductible for US taxpayers. + +These_funds_are_transparently_and_primarily_used_to_cover_server_costs._KEY: | + These funds are transparently and primarily used to cover server costs. + +Contribute_KEY: | + Contribute + +More_Info_KEY: | + More Info + +Please_Donate_KEY: | + Please Donate + +Our_website_is_free_of_advertisements_and_not_affiliated_with_any_listed_providers._KEY: | + Our website is free of advertisements and not affiliated with any listed providers. + +Your_donation_will_cover_our_costs_for_servers_domains_coffee_beer_and_pizza._KEY: | + Your donation will cover our costs for servers, domains, coffee, beer, and pizza. + +You_may_also_contribute_via_the_cryptocurrencies_below_however_we_will_not_be_able_to_provide_a_receipt_for_your_contribution._KEY: | + You may also contribute via the cryptocurrencies below; however, we will not be able to provide a receipt for your contribution. + +Your_contribution_will_be_considered_an_anonymous_unrestricted_contribution_and_paid_to_our_Fiscal_Host_at_OpenCollective_when_we_convert_to_currency._KEY: | + Your contribution will be considered an anonymous, unrestricted contribution and paid to our Fiscal Host at OpenCollective when we convert to currency. + +We_prefer_Bitcoin_donations_to_be_above_5_due_to_the_state_of_the_networks_transaction_fees._You_are_welcome_to_donate_any_smaller_or_larger_amount_o_KEY: | + We prefer Bitcoin donations to be above $5 due to the state of the network's transaction fees. You are welcome to donate any smaller or larger amount on any other cryptocurrency, such as Bitcoin Cash, Ethereum, or Stellar. + +More_Cryptocurrencies_KEY: | + More Cryptocurrencies + +The_a_href_contact__translate_page__site.name__teama_does_not_necessarily_endorse_all_of_the_cryptocurrencies_listed_on_this_page._KEY: | + The {{ site.name }} team does not necessarily endorse all of the cryptocurrencies listed on this page. Please conduct your own research before purchasing any cryptocurrencies. + +Thanks_for_your_support._You_are_awesome!_KEY: | + Thanks for your support. You are awesome! + Thunderbird_KEY: | Thunderbird @@ -1554,9 +2012,6 @@ Take_it_a_step_further_and_get_control_of_your_email_with_this_easytodeploy_mail More_KEY: | More: -Related_Information_KEY: | - Related Information - httpswww.wired.com201110ecpaturnstwentyfive_KEY: | https://www.wired.com/2011/10/ecpa-turns-twenty-five/ @@ -1818,9 +2273,6 @@ Prefer_the_classic_site?_View_a_singlepage_layout._KEY: | Discover_privacycentric_online_services_including_email_providers_VPN_operators_DNS_administrators_and_more!_KEY: | Discover privacy-centric online services, including email providers, VPN operators, DNS administrators, and more! -Web_Browsers_KEY: | - Web Browsers - Find_a_web_browser_that_respects_your_privacy_and_discover_how_to_harden_your_browser_against_tracking_and_leaks._KEY: | Find a web browser that respects your privacy, and discover how to harden your browser against tracking and leaks. @@ -2052,9 +2504,6 @@ Critique_and_information_on_why_to_avoid_Cloudflare_a_big_company_with_a_huge_po Tools_KEY: | Tools -httpsipleak.net_KEY: | - https://ipleak.net/ - ipleak.net_KEY: | ipleak.net @@ -2799,6 +3248,30 @@ httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: | httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: | https://play.google.com/store/apps/details?id=org.torproject.torbrowser +httpsplay.google.comstoreappsdetails?idcom.google.android.webviewhlen_US_KEY: | + https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US + +Browser_Fingerprint__Is_your_browser_configuration_unique?_KEY: | + Browser Fingerprint - Is your browser configuration unique? + +How_Unique_Is_Your_Web_Browser?_Peter_Eckersley_EFF._KEY: | + How Unique Is Your Web Browser? Peter Eckersley, EFF. + +WebRTC_IP_Leak_Test__Is_your_IP_address_leaking?_KEY: | + WebRTC IP Leak Test - Is your IP address leaking? + +How_to_disable_WebRTC_in_Firefox?_KEY: | + How to disable WebRTC in Firefox? + +How_to_fix_the_WebRTC_Leak_in_Google_Chrome?_KEY: | + How to fix the WebRTC Leak in Google Chrome? + +What_about_other_browsers?_KEY: | + What about other browsers? + +Looking_for_TRR_DoH_or_ESNI?_KEY: | + Looking for TRR, DoH or ESNI? + httpswww.clawsmail.orgdownloads.php?sectiondownloads_KEY: | https://www.claws-mail.org/downloads.php?section=downloads @@ -3993,9 +4466,6 @@ Tor_Myths_KEY: | FAQ_KEY: | FAQ -More_Info_KEY: | - More Info - Our_VPN_Provider_Criteria_KEY: | Our VPN Provider Criteria @@ -4260,9 +4730,3 @@ httpsgist.github.comkennwhite1f3bc4d889b02b35d8aa_KEY: | Dont_use_LT2P_IPSec_use_other_protocols._KEY: | Don't use LT2P IPSec, use other protocols. -httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: | - https://play.google.com/store/apps/details?id=org.mozilla.firefox - -httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: | - https://play.google.com/store/apps/details?id=org.torproject.torbrowser - diff --git a/_includes/sections/browser-addons.html b/_includes/sections/browser-addons.html index 023f05bf..9c591e55 100644 --- a/_includes/sections/browser-addons.html +++ b/_includes/sections/browser-addons.html @@ -1,7 +1,7 @@ -

Recommended Browser Add-ons

+

{% t Recommended Browser Add-ons %}

{% include cardv2.html @@ -87,10 +87,10 @@ chrome="https://chrome.google.com/webstore/detail/privacy-badger/pkehgijcmpdhfbd opera="https://addons.opera.com/en/extensions/details/privacy-badger/" %} -

For Power Users Only

+

{% t For Power Users Only %}

{% include cardv2.html diff --git a/_includes/sections/browser-fingerprint.html b/_includes/sections/browser-fingerprint.html index 6b3e1859..72026aed 100644 --- a/_includes/sections/browser-fingerprint.html +++ b/_includes/sections/browser-fingerprint.html @@ -1,31 +1,31 @@ -

Browser Fingerprint - Is your browser configuration unique?

+

{% t Browser Fingerprint - Is your browser configuration unique? %}

-

When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is.

+

{% t When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is. %}

- - Test your Browser now + + {% t Test your Browser now %}

-

You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user-agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.

+

{% t You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user-agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses. %}

-

Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.

+

{% t Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint. %}

-

Firefox Addon: CanvasBlocker

+

{% t Firefox Addon: CanvasBlocker %}

-

Related Information

+

{% t Related Information %}

diff --git a/_includes/sections/browser-recommendation.html b/_includes/sections/browser-recommendation.html index 6237aaba..bfc4d427 100644 --- a/_includes/sections/browser-recommendation.html +++ b/_includes/sections/browser-recommendation.html @@ -1,6 +1,6 @@

- Browser Recommendations For Desktop + {% t Browser Recommendations For Desktop %}

{% include cardv2.html @@ -33,14 +33,13 @@ linux="https://www.torproject.org/download/"

- Browser Recommendations For Android + {% t Browser Recommendations For Android %}

{% include cardv2.html title="Firefox" image="/assets/img/tools/Firefox.png" -description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our -recommendations: WebRTC and about:config and get the privacy add-ons.' +description='Firefox is fast, reliable, open-source, and respects your privacy. Don\'t forget to adjust the settings according to our recommendations: WebRTC and about:config and get the privacy add-ons.' website="https://www.mozilla.org/en-US/firefox/mobile/" forum="https://forum.privacytools.io/t/discussion-firefox/279" source="https://github.com/mozilla-mobile" @@ -73,23 +72,23 @@ fdroid="https://www.bromite.org/fdroid" android="https://www.bromite.org/#download-bromite" %} -

Worth Mentioning for Android

+

{% t Worth Mentioning for Android %}

-

Browser Recommendations For iOS

+

{% t Browser Recommendations For iOS %}

{% include cardv2.html title="Firefox" @@ -124,11 +123,11 @@ github="https://github.com/duckduckgo/iOS" ios="https://apps.apple.com/us/app/duckduckgo-privacy-browser/id663592361" %} -

Worth Mentioning for iOS

+

{% t Worth Mentioning for iOS %}

diff --git a/_includes/sections/browser-tweaks.html b/_includes/sections/browser-tweaks.html index 04977e5d..ee3f41da 100644 --- a/_includes/sections/browser-tweaks.html +++ b/_includes/sections/browser-tweaks.html @@ -1,65 +1,65 @@ -

Firefox: Privacy Related "about:config" Tweaks

+

{% t Firefox: Privacy Related "about:config" Tweaks %}

- + -

Preparation:

+

{% t Preparation: %}

    -
  1. Enter "about:config" in the firefox address bar and press enter.
  2. -
  3. Press the button "I'll be careful, I promise!"
  4. -
  5. Follow the instructions below...
  6. +
  7. {% t Enter "about:config" in the firefox address bar and press enter. %}
  8. +
  9. {% t Press the button "I'll be careful, I promise!" %}
  10. +
  11. {% t Follow the instructions below... %}
-

Getting started:

+

{% t Getting started: %}

privacy.firstparty.isolate = true
-
A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.)
+
{% t A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.) %}
privacy.resistFingerprinting = true
-
A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting.
+
{% t A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting. %}
privacy.trackingprotection.fingerprinting.enabled = true
-
[FF67+] Blocks Fingerprinting
+
{% t [FF67+] Blocks Fingerprinting %}
privacy.trackingprotection.cryptomining.enabled = true
-
[FF67+] Blocks CryptoMining
+
{% t [FF67+] Blocks CryptoMining %}
privacy.trackingprotection.enabled = true
-
This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities.
+
{% t This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities. %}
browser.send_pings = false
-
The attribute would be useful for letting websites track visitors' clicks.
+
{% t The attribute would be useful for letting websites track visitors' clicks. %}
browser.sessionstore.max_tabs_undo = 0
-
Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs.
+
{% t Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs. %}
browser.urlbar.speculativeConnect.enabled = false
-
Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. Source
+
{% t Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to.%} {% t Source %}
dom.event.clipboardevents.enabled = false
-
Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected.
+
{% t Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected. %}
media.eme.enabled = false
-

Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. Details

-

DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox.

+

{% t Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc.%} {% t Details %}

+

{% t DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox. %}

media.gmp-widevinecdm.enabled = false
-
Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. Details
+
{% t Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content.%} {% t Details %}
media.navigator.enabled = false
-
Websites can track the microphone and camera status of your device.
+
{% t Websites can track the microphone and camera status of your device. %}
network.cookie.cookieBehavior = 1
- Disable cookies + {% t Disable cookies %}
@@ -67,57 +67,57 @@
network.http.referer.XOriginPolicy = 2
- Only send Referer header when the full hostnames match. (Note: if you notice significant breakage, you might try 1 combined with an XOriginTrimmingPolicy tweak below.) Source + {% t Only send Referer header when the full hostnames match. (Note: if you notice significant breakage, you might try 1 combined with an XOriginTrimmingPolicy tweak below.)%} {% t Source %}
network.http.referer.XOriginTrimmingPolicy = 2
- When sending Referer across origins, only send scheme, host, and port in the Referer header of cross-origin requests. Source + {% t When sending Referer across origins, only send scheme, host, and port in the Referer header of cross-origin requests.%} {% t Source %}
-
Looking for TRR, DoH or ESNI?
-
They have moved to our DNS page.
+
{% t Looking for TRR, DoH or ESNI? %}
+
{% t They have moved to our DNS page. %}
webgl.disabled = true
-
WebGL is a potential security risk. Source
+
{% t WebGL is a potential security risk.%} {% t Source %}
browser.sessionstore.privacy_level = 2
- This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data. Details + {% t This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data.%} {% t Details %}
network.IDN_show_punycode = true
-
Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice. Source
+
{% t Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice.%} {% t Source %}
-

Firefox user.js Templates

+

{% t Firefox user.js Templates %}

-

Related Information

+

{% t Related Information %}

diff --git a/_includes/sections/browser-webrtc.html b/_includes/sections/browser-webrtc.html index 9271f5a3..133efb33 100644 --- a/_includes/sections/browser-webrtc.html +++ b/_includes/sections/browser-webrtc.html @@ -1,47 +1,47 @@ -

WebRTC IP Leak Test - Is your IP address leaking?

+

{% t WebRTC IP Leak Test - Is your IP address leaking? %}

-

While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe.

+

{% t While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe. %}

-Test your Browser now +{% t Test your Browser now %}

-

How to disable WebRTC in Firefox?

+

{% t How to disable WebRTC in Firefox? %}

-

In short: Set "media.peerconnection.enabled" to "false" in "about:config".

-

Explained:

+

{% t In short: Set "media.peerconnection.enabled" to "false" in "about:config".%}

+

{% t Explained: %}

    -
  1. Enter "about:config" in the firefox address bar and press enter.
  2. -
  3. Press the button "I'll be careful, I promise!"
  4. -
  5. Search for "media.peerconnection.enabled"
  6. -
  7. Double click the entry, the column "Value" should now be "false"
  8. -
  9. Done. Do the WebRTC leak test again.
  10. +
  11. {% t Enter "about:config" in the firefox address bar and press enter. %} +
  12. {% t Press the button "I'll be careful, I promise!" %} +
  13. {% t Search for "media.peerconnection.enabled" %} +
  14. {% t Double click the entry, the column "Value" should now be "false" %} +
  15. {% t Done. Do the WebRTC leak test again. %}
-

If you want to make sure every single WebRTC-related setting is really disabled change these settings:

+

{% t If you want to make sure every single WebRTC-related setting is really disabled, change these settings: %}

    -
  1. media.peerconnection.turn.disable = true
  2. -
  3. media.peerconnection.use_document_iceservers = false
  4. -
  5. media.peerconnection.video.enabled = false
  6. -
  7. media.peerconnection.identity.timeout = 1
  8. +
  9. media.peerconnection.turn.disable = true +
  10. media.peerconnection.use_document_iceservers = false +
  11. media.peerconnection.video.enabled = false +
  12. media.peerconnection.identity.timeout = 1
-

Now you can be 100% sure WebRTC is disabled.

+

{% t Now you can be 100% sure WebRTC is disabled. %}

-Test your Browser again +{% t Test your Browser again %}

-

How to fix the WebRTC Leak in Google Chrome?

+

{% t How to fix the WebRTC Leak in Google Chrome? %}

-

WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).

+

{% t WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).%}

-

What about other browsers?

+

{% t What about other browsers? %}

-

Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet. But we recommend using Firefox on all devices.

+

{% t Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet.%} {% t But we recommend using Firefox on all devices. %}

diff --git a/pages/browsers.html b/pages/browsers.html index 17f98cec..345e2058 100644 --- a/pages/browsers.html +++ b/pages/browsers.html @@ -3,6 +3,7 @@ layout: page permalink: /browsers/ title: "Web Browsers" description: "These are our current web browser recommendations and some tweaks you can use to preserve your privacy." +translate: true --- {% include sections/browser-recommendation.html %} diff --git a/weblate-source-file.yml b/weblate-source-file.yml index 7ecf8205..678f8fe2 100644 --- a/weblate-source-file.yml +++ b/weblate-source-file.yml @@ -5,6 +5,12 @@ About_PrivacyTools_KEY: | About_the_PrivacyTools_organization_and_contributors_to_the_PrivacyTools_website_communities_and_services._KEY: | About the PrivacyTools organization, and contributors to the PrivacyTools website, communities, and services. +Web_Browsers_KEY: | + Web Browsers + +These_are_our_current_web_browser_recommendations_and_some_tweaks_you_can_use_to_preserve_your_privacy._KEY: | + These are our current web browser recommendations and some tweaks you can use to preserve your privacy. + DNS__Domain_Providers_KEY: | DNS / Domain Providers @@ -368,6 +374,9 @@ View_our_privacy_statement_KEY: | Learn_More_KEY: | Learn More +Browser_Recommendations_For_Desktop_KEY: | + Browser Recommendations For Desktop + Firefox_KEY: | Firefox @@ -422,9 +431,8 @@ httpswww.torproject.orgdownload_KEY: | httpstrac.torproject.orgprojectstor_KEY: | https://trac.torproject.org/projects/tor -Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Dont_forget_to_adjust_the_settings_according_to_ourrecommendations_a_hrefwebr_KEY: | - Firefox is fast, reliable, open-source, and respects your privacy. Don't forget to adjust the settings according to our -recommendations: WebRTC and about:config and get the privacy add-ons. +Browser_Recommendations_For_Android_KEY: | + Browser Recommendations For Android httpswww.mozilla.orgenUSfirefoxmobile_KEY: | https://www.mozilla.org/en-US/firefox/mobile/ @@ -471,6 +479,30 @@ httpswww.bromite.orgdownloadbromite_KEY: | httpsgithub.combromitebromite_KEY: | https://github.com/bromite/bromite +Worth_Mentioning_for_Android_KEY: | + Worth Mentioning for Android + +httpswww.stoutner.comprivacybrowser_KEY: | + https://www.stoutner.com/privacy-browser/ + +Privacy_Browser_KEY: | + Privacy Browser + +An_opensource_web_browser_focused_on_user_privacy._Features_include_integrated_ad_blocking_with_a_hrefhttpseasylist.toEasyLista_a_href_KEY: | + An open-source web browser focused on user privacy. Features include integrated ad blocking with EasyList, SSL certificate pinning, and Tor Orbot proxy support. + +httpsplay.google.comstoreappsdetails?idcom.google.android.webviewhlen_US_KEY: | + https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US + +Privacy_Browser_relies_on_the_Android_System_WebView_which_needs_to_be_kept_up_to_date_to_fix_security_issues._One_can_update_WebView_by_either_install_KEY: | + Privacy Browser relies on the Android System WebView which needs to be kept up to date to fix security issues. One can update WebView by either installing it from Google Play or Aurora Store which you can get from F-Droid. + +Keep_Android_WebView_uptodate_KEY: | + Keep Android WebView up-to-date + +Browser_Recommendations_For_iOS_KEY: | + Browser Recommendations For iOS + Firefox_is_fast_reliable_opensource_and_respects_your_privacy._Note_Because_of_limitations_set_by_Apple_in_iOS_our_recommended_tweaks_cannot_be_a_KEY: | Firefox is fast, reliable, open-source, and respects your privacy. Note: Because of limitations set by Apple in iOS, our recommended tweaks cannot be applied. However, Firefox for iOS has an Enhanced Tracking Protection feature that uses a list provided by Disconnect to identify and block ad, social, and analytics trackers, as well as cryptominers and fingerprinters. @@ -510,6 +542,135 @@ httpsapps.apple.comusappduckduckgoprivacybrowserid663592361_KEY: | httpsgithub.comduckduckgoiOS_KEY: | https://github.com/duckduckgo/iOS +Worth_Mentioning_for_iOS_KEY: | + Worth Mentioning for iOS + +httpssnowhaze.comenindex.html_KEY: | + https://snowhaze.com/en/index.html + +SnowHaze_KEY: | + SnowHaze + +An_opensource_web_browser_with_builtin_ad_tracker_cookie_and_fingerprint_blocking_all_customizable_on_a_persite_basis._KEY: | + An open-source web browser with built-in ad, tracker, cookie, and fingerprint blocking, all customizable on a per-site basis. + +Browser_Fingerprint__Is_your_browser_configuration_unique?_KEY: | + Browser Fingerprint - Is your browser configuration unique? + +Your_Browser_sends_information_that_makes_you_unique_amongst_millions_of_users_and_therefore_easy_to_identify._KEY: | + Your Browser sends information that makes you unique amongst millions of users and therefore easy to identify. + +When_you_visit_a_web_page_your_browser_voluntarily_sends_information_about_its_configuration_such_as_available_fonts_browser_type_and_addons._If_t_KEY: | + When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is. + +httpspanopticlick.eff.org_KEY: | + https://panopticlick.eff.org/ + +Test_your_Browser_now_KEY: | + Test your Browser now + +You_need_to_find_what_strongmost_browsersstrong_are_reporting_and_then_use_those_variables_to_bring_your_browser_in_the_same_population._This_mea_KEY: | + You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user-agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses. + +Modern_web_browsers_have_not_been_architected_to_assure_personal_web_privacy._Rather_than_worrying_about_being_fingerprinted_it_seems_more_practical_t_KEY: | + Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins like Privacy Badger and uBlock Origin. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint. + +Firefox_Addon_CanvasBlocker_KEY: | + Firefox Addon: CanvasBlocker + +httpsaddons.mozilla.orgfirefoxaddoncanvasblocker_KEY: | + https://addons.mozilla.org/firefox/addon/canvasblocker/ + +addons.mozilla.org_KEY: | + addons.mozilla.org + +strongCanvasBlockerstrong_allows_users_to_prevent_websites_from_using_some_Javascript_APIs_to_fingerprint_them._Users_can_choose_to_block_the_APIs_KEY: | + CanvasBlocker allows users to prevent websites from using some Javascript APIs to fingerprint them. Users can choose to block the APIs entirely on some or all websites (which may break some websites) or just block or fake its fingerprinting-friendly readout API. + +Related_Information_KEY: | + Related Information + +httpspanopticlick.eff.orgstaticbrowseruniqueness.pdf_KEY: | + https://panopticlick.eff.org/static/browser-uniqueness.pdf + +How_Unique_Is_Your_Web_Browser?_Peter_Eckersley_EFF._KEY: | + How Unique Is Your Web Browser? Peter Eckersley, EFF. + +Our_Firefox_privacy_addons_section._KEY: | + Our Firefox privacy add-ons section. + +httpswww.browserleaks.com_KEY: | + https://www.browserleaks.com/ + +Web_browser_security_testing_tools_that_tell_you_what_exactly_personal_identity_data_may_be_leaked_without_any_permissions_when_you_surf_the_Internet._KEY: | + Web browser security testing tools that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet. + +WebRTC_IP_Leak_Test__Is_your_IP_address_leaking?_KEY: | + WebRTC IP Leak Test - Is your IP address leaking? + +WebRTC_is_a_new_communication_protocol_that_relies_on_JavaScript_that_can_leak_your_actual_IP_address_from_behind_your_VPN._KEY: | + WebRTC is a new communication protocol that relies on JavaScript that can leak your actual IP address from behind your VPN. + +While_software_like_NoScript_prevents_this_its_probably_a_good_idea_to_block_this_protocol_directly_as_well_just_to_be_safe._KEY: | + While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe. + +httpsipleak.net_KEY: | + https://ipleak.net + +How_to_disable_WebRTC_in_Firefox?_KEY: | + How to disable WebRTC in Firefox? + +In_short_Set_media.peerconnection.enabled_to_false_in_aboutconfig._KEY: | + In short: Set "media.peerconnection.enabled" to "false" in "about:config". + +Explained_KEY: | + Explained: + +Enter_aboutconfig_in_the_firefox_address_bar_and_press_enter._KEY: | + Enter "about:config" in the firefox address bar and press enter. + +Press_the_button_Ill_be_careful_I_promise!_KEY: | + Press the button "I'll be careful, I promise!" + +Search_for_media.peerconnection.enabled_KEY: | + Search for "media.peerconnection.enabled" + +Double_click_the_entry_the_column_Value_should_now_be_false_KEY: | + Double click the entry, the column "Value" should now be "false" + +Done._Do_the_WebRTC_leak_test_again._KEY: | + Done. Do the WebRTC leak test again. + +If_you_want_to_make_sure_every_single_WebRTCrelated_setting_is_really_disabled_change_these_settings_KEY: | + If you want to make sure every single WebRTC-related setting is really disabled, change these settings: + +Now_you_can_be_100_sure_WebRTC_is_disabled._KEY: | + Now you can be 100% sure WebRTC is disabled. + +Test_your_Browser_again_KEY: | + Test your Browser again + +How_to_fix_the_WebRTC_Leak_in_Google_Chrome?_KEY: | + How to fix the WebRTC Leak in Google Chrome? + +WebRTC_cannot_be_fully_disabled_in_Chrome_however_it_is_possible_to_change_its_routing_settings_and_prevent_leaks_using_an_extension._Two_opensour_KEY: | + WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings). + +What_about_other_browsers?_KEY: | + What about other browsers? + +Chrome_on_iOS_Internet_Explorer_and_Safari_does_not_implement_WebRTC_yet._KEY: | + Chrome on iOS, Internet Explorer and Safari does not implement WebRTC yet. + +But_we_recommend_using_Firefox_on_all_devices._KEY: | + But we recommend using Firefox on all devices. + +Recommended_Browser_Addons_KEY: | + Recommended Browser Add-ons + +Improve_your_privacy_with_these_browser_addons._KEY: | + Improve your privacy with these browser add-ons. + uBlock_Origin_Block_Ads_and_Trackers_KEY: | uBlock Origin: Block Ads and Trackers @@ -654,6 +815,12 @@ httpsaddons.opera.comenextensionsdetailsprivacybadger_KEY: | httpsgithub.comEFForgprivacybadger_KEY: | https://github.com/EFForg/privacybadger +For_Power_Users_Only_KEY: | + For Power Users Only + +These_addons_require_quite_a_lot_of_interaction_from_the_user._Some_sites_will_not_work_properly_until_you_have_configured_the_addons._KEY: | + These addons require quite a lot of interaction from the user. Some sites will not work properly until you have configured the add-ons. + uMatrix_Stop_CrossSite_Requests_KEY: | uMatrix: Stop Cross-Site Requests @@ -693,6 +860,204 @@ httpschrome.google.comwebstoredetailnoscriptdoojmbjmlfjjnbmnoijecmcbfeoakpjm_KEY httpsgithub.comhackademixnoscript_KEY: | https://github.com/hackademix/noscript +Firefox_Privacy_Related_aboutconfig_Tweaks_KEY: | + Firefox: Privacy Related "about:config" Tweaks + +This_is_a_collection_of_privacyrelated_strongaboutconfigstrong_tweaks._Well_show_you_how_to_enhance_the_privacy_of_your_Firefox_browser._KEY: | + This is a collection of privacy-related about:config tweaks. We'll show you how to enhance the privacy of your Firefox browser. + +Preparation_KEY: | + Preparation: + +Follow_the_instructions_below..._KEY: | + Follow the instructions below... + +Getting_started_KEY: | + Getting started: + +A_result_of_the_a_hrefhttpswiki.mozilla.orgSecurityTor_UpliftTor_Uplifta_effort_this_preference_isolates_all_browser_identifier_sources__KEY: | + A result of the Tor Uplift effort, this preference isolates all browser identifier sources (e.g. cookies) to the first party domain, with the goal of preventing tracking across different domains. (Don't do this if you are using the Firefox Addon "Cookie AutoDelete" with Firefox v58 or below.) + +A_result_of_the_a_hrefhttpswiki.mozilla.orgSecurityTor_UpliftTor_Uplifta_effort_this_preference_makes_Firefox_more_resistant_to_browser_f_KEY: | + A result of the Tor Uplift effort, this preference makes Firefox more resistant to browser fingerprinting. + +FF67_Blocks_Fingerprinting_KEY: | + [FF67+] Blocks Fingerprinting + +FF67_Blocks_CryptoMining_KEY: | + [FF67+] Blocks CryptoMining + +This_is_Mozillas_new_builtin_tracking_protection._It_uses_Disconnect.me_filter_list_which_is_redundant_if_you_are_already_using_uBlock_Origin_3rd_pa_KEY: | + This is Mozilla's new built-in tracking protection. It uses Disconnect.me filter list, which is redundant if you are already using uBlock Origin 3rd party filters, therefore you should set it to false if you are using the add-on functionalities. + +The_attribute_would_be_useful_for_letting_websites_track_visitors_clicks._KEY: | + The attribute would be useful for letting websites track visitors' clicks. + +Even_with_Firefox_set_to_not_remember_history_your_closed_tabs_are_stored_temporarily_at_Menu_gt_History_gt_Recently_Closed_Tabs._KEY: | + Even with Firefox set to not remember history, your closed tabs are stored temporarily at Menu -> History -> Recently Closed Tabs. + +Disable_preloading_of_autocomplete_URLs._Firefox_preloads_URLs_that_autocomplete_when_a_user_types_into_the_address_bar_which_is_a_concern_if_URLs_are_KEY: | + Disable preloading of autocomplete URLs. Firefox preloads URLs that autocomplete when a user types into the address bar, which is a concern if URLs are suggested that the user does not want to connect to. + +httpswww.ghacks.net20170724disablepreloadingfirefoxautocompleteurls_KEY: | + https://www.ghacks.net/2017/07/24/disable-preloading-firefox-autocomplete-urls/ + +Source_KEY: | + Source + +Disable_that_websites_can_get_notifications_if_you_copy_paste_or_cut_something_from_a_web_page_and_it_lets_them_know_which_part_of_the_page_had_been_KEY: | + Disable that websites can get notifications if you copy, paste, or cut something from a web page, and it lets them know which part of the page had been selected. + +Disables_playback_of_DRMcontrolled_HTML5_content_which_if_enabled_automatically_downloads_the_Widevine_Content_Decryption_Module_provided_by_Google_KEY: | + Disables playback of DRM-controlled HTML5 content, which, if enabled, automatically downloads the Widevine Content Decryption Module provided by Google Inc. + +httpssupport.mozilla.orgkbenabledrmw_optoutofcdmplaybackuninstallcdmsandstopallcdmdownloads_KEY: | + https://support.mozilla.org/kb/enable-drm#w_opt-out-of-cdm-playback-uninstall-cdms-and-stop-all-cdm-downloads + +Details_KEY: | + Details + +DRMcontrolled_content_that_requires_the_Adobe_Flash_or_Microsoft_Silverlight_NPAPI_plugins_will_still_play_if_installed_and_enabled_in_Firefox._KEY: | + DRM-controlled content that requires the Adobe Flash or Microsoft Silverlight NPAPI plugins will still play, if installed and enabled in Firefox. + +Disables_the_Widevine_Content_Decryption_Module_provided_by_Google_Inc._used_for_the_playback_of_DRMcontrolled_HTML5_content._KEY: | + Disables the Widevine Content Decryption Module provided by Google Inc., used for the playback of DRM-controlled HTML5 content. + +httpssupport.mozilla.orgkbenabledrmw_disablethegooglewidevinecdmwithoutuninstalling_KEY: | + https://support.mozilla.org/kb/enable-drm#w_disable-the-google-widevine-cdm-without-uninstalling + +Websites_can_track_the_microphone_and_camera_status_of_your_device._KEY: | + Websites can track the microphone and camera status of your device. + +Disable_cookies_KEY: | + Disable cookies + +Accept_all_cookies_by_default_KEY: | + Accept all cookies by default + +Only_accept_from_the_originating_site_block_thirdparty_cookies_KEY: | + Only accept from the originating site (block third-party cookies) + +Block_all_cookies_by_default_KEY: | + Block all cookies by default + +Only_send_codeReferercode_header_when_the_full_hostnames_match._Note_if_you_notice_significant_breakage_you_might_try_code1code_combined_w_KEY: | + Only send Referer header when the full hostnames match. (Note: if you notice significant breakage, you might try 1 combined with an XOriginTrimmingPolicy tweak below.) + +httpsfeeding.cloud.geek.nzpoststweakingreferrerforprivacyinfirefox_KEY: | + https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/ + +Send_codeReferercode_in_all_cases_KEY: | + Send Referer in all cases + +Send_codeReferercode_to_same_eTLD_sites_KEY: | + Send Referer to same eTLD sites + +Send_codeReferercode_only_when_the_full_hostnames_match_KEY: | + Send Referer only when the full hostnames match + +When_sending_codeReferercode_across_origins_only_send_scheme_host_and_port_in_the_codeReferercode_header_of_crossorigin_requests._KEY: | + When sending Referer across origins, only send scheme, host, and port in the Referer header of cross-origin requests. + +Send_full_url_in_codeReferercode_KEY: | + Send full url in Referer + +Send_url_without_query_string_in_codeReferercode_KEY: | + Send url without query string in Referer + +Only_send_scheme_host_and_port_in_codeReferercode_KEY: | + Only send scheme, host, and port in Referer + +Looking_for_TRR_DoH_or_ESNI?_KEY: | + Looking for TRR, DoH or ESNI? + +They_have_moved_to_a_href_providersdnsicanndns__translate_page_our_DNS_pagea._KEY: | + They have moved to our DNS page. + +WebGL_is_a_potential_security_risk._KEY: | + WebGL is a potential security risk. + +httpssecurity.stackexchange.comquestions13799iswebglasecurityconcern_KEY: | + https://security.stackexchange.com/questions/13799/is-webgl-a-security-concern + +This_preference_controls_when_to_store_extra_information_about_a_session_contents_of_forms_scrollbar_positions_cookies_and_POST_data._KEY: | + This preference controls when to store extra information about a session: contents of forms, scrollbar positions, cookies, and POST data. + +httpkb.mozillazine.orgBrowser.sessionstore.privacy_level_KEY: | + http://kb.mozillazine.org/Browser.sessionstore.privacy_level + +Store_extra_session_data_for_any_site._Default_starting_with_Firefox_4._KEY: | + Store extra session data for any site. (Default starting with Firefox 4.) + +Store_extra_session_data_for_unencrypted_nonHTTPS_sites_only._Default_before_Firefox_4._KEY: | + Store extra session data for unencrypted (non-HTTPS) sites only. (Default before Firefox 4.) + +Never_store_extra_session_data._KEY: | + Never store extra session data. + +Not_rendering_IDNs_as_their_Punycode_equivalent_leaves_you_open_to_phishing_attacks_that_can_be_very_difficult_to_notice._KEY: | + Not rendering IDNs as their Punycode equivalent leaves you open to phishing attacks that can be very difficult to notice. + +httpskrebsonsecurity.com201803lookalikedomainsandvisualconfusionmore42636_KEY: | + https://krebsonsecurity.com/2018/03/look-alike-domains-and-visual-confusion/#more-42636 + +Firefox_user.js_Templates_KEY: | + Firefox user.js Templates + +httpsgithub.comghacksuserjsghacksuser.js_KEY: | + https://github.com/ghacksuserjs/ghacks-user.js + +ghacksuser.js_KEY: | + ghacks-user.js + +An_ongoing_comprehensive_user.js_template_for_configuring_and_hardening_Firefox_privacy_security_and_antifingerprinting._KEY: | + An ongoing comprehensive user.js template for configuring and hardening Firefox privacy, security and anti-fingerprinting. + +httpsblog.privacytools.iofirefoxprivacyanintroductiontosafe_KEY: | + https://blog.privacytools.io/firefox-privacy-an-introduction-to-safe/ + +Firefox_Privacy_Tips_and_Tricks_for_Better_Browsing_KEY: | + Firefox Privacy: Tips and Tricks for Better Browsing + +A_good_starting_guide_for_users_looking_to_keep_their_data_private_and_secure._KEY: | + A good starting guide for users looking to keep their data private and secure. + +httpsffprofile.com_KEY: | + https://ffprofile.com/ + +ffprofile.com_KEY: | + ffprofile.com + +Helps_you_to_create_a_Firefox_profile_with_the_defaults_you_like._KEY: | + Helps you to create a Firefox profile with the defaults you like. + +httpkb.mozillazine.orgCategorySecurity_and_privacyrelated_preferences_KEY: | + http://kb.mozillazine.org/Category:Security_and_privacy-related_preferences + +mozillazine.org_KEY: | + mozillazine.org + +Security_and_privacyrelated_preferences._KEY: | + Security and privacy-related preferences. + +httpsaddons.mozilla.orgfirefoxaddonprivacysettings_KEY: | + https://addons.mozilla.org/firefox/addon/privacy-settings/ + +Privacy_Settings_KEY: | + Privacy Settings + +A_Firefox_addon_to_alter_builtin_privacy_settings_easily_with_a_toolbar_panel._KEY: | + A Firefox add-on to alter built-in privacy settings easily with a toolbar panel. + +https12bytes.orgarticlestechfirefoxthefirefoxprivacyguidefordummies_KEY: | + https://12bytes.org/articles/tech/firefox/the-firefox-privacy-guide-for-dummies/ + +Firefox_Privacy_Guide_For_Dummies_KEY: | + Firefox Privacy Guide For Dummies + +Guide_on_ways_already_discussed_and_others_to_improve_your_privacy_and_safety_on_Firefox._KEY: | + Guide on ways (already discussed and others) to improve your privacy and safety on Firefox. + Nextcloud_KEY: | Nextcloud @@ -1647,9 +2012,6 @@ Take_it_a_step_further_and_get_control_of_your_email_with_this_easytodeploy_mail More_KEY: | More: -Related_Information_KEY: | - Related Information - httpswww.wired.com201110ecpaturnstwentyfive_KEY: | https://www.wired.com/2011/10/ecpa-turns-twenty-five/ @@ -1911,9 +2273,6 @@ Prefer_the_classic_site?_View_a_singlepage_layout._KEY: | Discover_privacycentric_online_services_including_email_providers_VPN_operators_DNS_administrators_and_more!_KEY: | Discover privacy-centric online services, including email providers, VPN operators, DNS administrators, and more! -Web_Browsers_KEY: | - Web Browsers - Find_a_web_browser_that_respects_your_privacy_and_discover_how_to_harden_your_browser_against_tracking_and_leaks._KEY: | Find a web browser that respects your privacy, and discover how to harden your browser against tracking and leaks. @@ -2145,9 +2504,6 @@ Critique_and_information_on_why_to_avoid_Cloudflare_a_big_company_with_a_huge_po Tools_KEY: | Tools -httpsipleak.net_KEY: | - https://ipleak.net/ - ipleak.net_KEY: | ipleak.net @@ -2892,6 +3248,30 @@ httpsplay.google.comstoreappsdetails?idorg.mozilla.firefox_KEY: | httpsplay.google.comstoreappsdetails?idorg.torproject.torbrowser_KEY: | https://play.google.com/store/apps/details?id=org.torproject.torbrowser +httpsplay.google.comstoreappsdetails?idcom.google.android.webviewhlen_US_KEY: | + https://play.google.com/store/apps/details?id=com.google.android.webview&hl=en_US + +Browser_Fingerprint__Is_your_browser_configuration_unique?_KEY: | + Browser Fingerprint - Is your browser configuration unique? + +How_Unique_Is_Your_Web_Browser?_Peter_Eckersley_EFF._KEY: | + How Unique Is Your Web Browser? Peter Eckersley, EFF. + +WebRTC_IP_Leak_Test__Is_your_IP_address_leaking?_KEY: | + WebRTC IP Leak Test - Is your IP address leaking? + +How_to_disable_WebRTC_in_Firefox?_KEY: | + How to disable WebRTC in Firefox? + +How_to_fix_the_WebRTC_Leak_in_Google_Chrome?_KEY: | + How to fix the WebRTC Leak in Google Chrome? + +What_about_other_browsers?_KEY: | + What about other browsers? + +Looking_for_TRR_DoH_or_ESNI?_KEY: | + Looking for TRR, DoH or ESNI? + httpswww.clawsmail.orgdownloads.php?sectiondownloads_KEY: | https://www.claws-mail.org/downloads.php?section=downloads