diff --git a/crowdin.yml b/crowdin.yml index 98732de9..729f851e 100644 --- a/crowdin.yml +++ b/crowdin.yml @@ -12,8 +12,8 @@ files: translation_replace: "en.": "" skip_untranslated_files: true -- source: "/includes/*.en.md" - translation: "/includes/%file_name%.%two_letters_code%.md" +- source: "/includes/*.en.*" + translation: "/includes/%file_name%.%two_letters_code%.%file_extension%" translation_replace: "en.": "" skip_untranslated_files: true diff --git a/docs/404.en.md b/docs/404.en.md index 650acf73..9f3290b8 100644 --- a/docs/404.en.md +++ b/docs/404.en.md @@ -13,3 +13,5 @@ We couldn't find the page you were looking for! Maybe you were looking for one o - [Best VPN Providers](vpn.md) - [Privacy Guides Forum](https://discuss.privacyguides.net) - [Our Blog](https://blog.privacyguides.org) + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/404.es.md b/docs/404.es.md new file mode 100644 index 00000000..126c35d6 --- /dev/null +++ b/docs/404.es.md @@ -0,0 +1,15 @@ +--- +hide: + - feedback +--- + +# 404 - No encontrado + +¡No logramos encontrar la página que buscas! ¿Tal vez buscas alguna de estas? + +- [Introducción a la creación de un modelo de amenazas](basics/threat-modeling.md) +- [Proveedores de DNS recomendados](dns.md) +- [Mejores navegadores de escritorio](desktop-browsers.md) +- [Mejores proveedores de VPN](vpn.md) +- [Foro de Privacy Guides](https://discuss.privacyguides.net) +- [Nuestro blog](https://blog.privacyguides.org) diff --git a/docs/about/criteria.en.md b/docs/about/criteria.en.md index 3084230b..e132b294 100644 --- a/docs/about/criteria.en.md +++ b/docs/about/criteria.en.md @@ -38,3 +38,5 @@ We have these requirements in regard to developers which wish to submit their pr - Must state what the exact threat model is with their project. - It should be clear to potential users what the project can provide, and what it cannot. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/about/donate.en.md b/docs/about/donate.en.md index a5c81222..b737de2e 100644 --- a/docs/about/donate.en.md +++ b/docs/about/donate.en.md @@ -43,3 +43,5 @@ Privacy Guides is a **non-profit** organization. We use donations for a variety : We occasionally purchase products and services for the purposes of testing our [recommended tools](../tools.md). We are still working with our fiscal host (the Open Collective Foundation) to receive cryptocurrency donations, at the moment the accounting is unfeasible for many smaller transactions, but this should change in the future. In the meantime, if you wish to make a sizable (> $100) cryptocurrency donation, please reach out to [jonah@privacyguides.org](mailto:jonah@privacyguides.org). + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/about/index.en.md b/docs/about/index.en.md index 7658f29b..cb370045 100644 --- a/docs/about/index.en.md +++ b/docs/about/index.en.md @@ -59,3 +59,5 @@ Our team members review all changes made to the website and handle administrativ :fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. If you remix, transform, or build upon the content of this website, you may not distribute the modified material. This license is in place to prevent people from sharing our work without giving proper credit, and to prevent people from modifying our work in a way that could be used to mislead people. If you find the terms of this license too restrictive for the project you're working on, please reach out to us at `jonah@privacyguides.org`. We are happy to provide alternative licensing options for well-intentioned projects in the privacy space! + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/about/notices.en.md b/docs/about/notices.en.md index 63b443d2..4227867f 100644 --- a/docs/about/notices.en.md +++ b/docs/about/notices.en.md @@ -41,3 +41,5 @@ You must not conduct any systematic or automated data collection activities on o * Scraping * Data Mining * 'Framing' (IFrames) + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/about/privacy-policy.en.md b/docs/about/privacy-policy.en.md index 84bd11de..249e71fb 100644 --- a/docs/about/privacy-policy.en.md +++ b/docs/about/privacy-policy.en.md @@ -59,3 +59,5 @@ In France it's the Commission Nationale de l'Informatique et des Libertés which We will post any new versions of this statement [here](privacy-policy.md). We may change how we announce changes in future versions of this document. In the meantime we may update our contact information at any time without announcing a change. Please refer to the [Privacy Policy](privacy-policy.md) for the latest contact information at any time. A full revision [history](https://github.com/privacyguides/privacyguides.org/commits/main/docs/about/privacy-policy.md) of this page can be found on GitHub. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/about/privacytools.en.md b/docs/about/privacytools.en.md index 182b43ea..2660b519 100644 --- a/docs/about/privacytools.en.md +++ b/docs/about/privacytools.en.md @@ -115,3 +115,5 @@ This topic has been discussed extensively within our communities in various loca - [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/about/services.en.md b/docs/about/services.en.md index 0307723a..6206caa9 100644 --- a/docs/about/services.en.md +++ b/docs/about/services.en.md @@ -36,3 +36,5 @@ Access may be granted upon request to Privacy Guides team members, Matrix modera - Availability: Semi-Public We host Invidious primarily to serve embedded YouTube videos on our website, this instance is not intended for general-purpose use and may be limited at any time. - Source: [github.com/iv-org/invidious](https://github.com/iv-org/invidious) + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/about/services.he.md b/docs/about/services.he.md index 4943b8d0..ef8357cf 100644 --- a/docs/about/services.he.md +++ b/docs/about/services.he.md @@ -33,5 +33,6 @@ ## Invidious - דומיין: [invidious.privacyguides.net](https://invidious.privacyguides.net) -- זמינות: חצי ציבורי אנו מארחים את Invidious בעיקר כדי להגיש סרטוני YouTube משובצים באתר האינטרנט שלנו, מופע זה אינו מיועד לשימוש כללי ועשוי להיות מוגבל בכל עת. +- זמינות: חצי ציבורי + אנו מארחים את Invidious בעיקר כדי להגיש סרטוני YouTube משובצים באתר האינטרנט שלנו, מופע זה אינו מיועד לשימוש כללי ועשוי להיות מוגבל בכל עת. - מקור: [github.com/iv-org/invidious](https://github.com/iv-org/invidious) diff --git a/docs/about/statistics.en.md b/docs/about/statistics.en.md index 1aa20129..e62d152c 100644 --- a/docs/about/statistics.en.md +++ b/docs/about/statistics.en.md @@ -58,3 +58,5 @@ title: Traffic Statistics }) }) + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/advanced/communication-network-types.en.md b/docs/advanced/communication-network-types.en.md index a41ff542..92c36167 100644 --- a/docs/advanced/communication-network-types.en.md +++ b/docs/advanced/communication-network-types.en.md @@ -100,3 +100,5 @@ Self-hosting a node in an anonymous routing network does not provide the hoster - Less reliable if nodes are selected by randomized routing, some nodes may be very far from the sender and receiver, adding latency or even failing to transmit messages if one of the nodes goes offline. - More complex to get started, as the creation and secured backup of a cryptographic private key is required. - Just like other decentralized platforms, adding features is more complex for developers than on a centralized platform. Hence, features may be lacking or incompletely implemented, such as offline message relaying or message deletion. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/advanced/dns-overview.en.md b/docs/advanced/dns-overview.en.md index ea6dee14..fb30303e 100644 --- a/docs/advanced/dns-overview.en.md +++ b/docs/advanced/dns-overview.en.md @@ -304,3 +304,5 @@ The [EDNS Client Subnet](https://en.wikipedia.org/wiki/EDNS_Client_Subnet) is a It's intended to "speed up" delivery of data by giving the client an answer that belongs to a server that is close to them such as a [content delivery network](https://en.wikipedia.org/wiki/Content_delivery_network), which are often used in video streaming and serving JavaScript web apps. This feature does come at a privacy cost, as it tells the DNS server some information about the client's location. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/advanced/tor-overview.en.md b/docs/advanced/tor-overview.en.md index 4658729a..c8e21573 100644 --- a/docs/advanced/tor-overview.en.md +++ b/docs/advanced/tor-overview.en.md @@ -77,3 +77,5 @@ If you wish to use Tor for browsing the web, we only recommend the **official** - [Tor Browser User Manual](https://tb-manual.torproject.org) - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/android.en.md b/docs/android.en.md index 923abcd5..d5c1cdad 100644 --- a/docs/android.en.md +++ b/docs/android.en.md @@ -351,3 +351,5 @@ That said, the [F-droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](htt - Applications on this page must not be applicable to any other software category on the site. - General applications should extend or replace core system functionality. - Applications should receive regular updates and maintenance. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/basics/account-creation.en.md b/docs/basics/account-creation.en.md index 275a8e0f..6554931f 100644 --- a/docs/basics/account-creation.en.md +++ b/docs/basics/account-creation.en.md @@ -78,3 +78,5 @@ In many cases you will need to provide a number that you can receive SMS or call ### Username and password Some services allow you to register without using an email address and only require you to set a username and password. These services may provide increased anonymity when combined with a VPN or Tor. Keep in mind that for these accounts there will most likely be **no way to recover your account** in the event you forget your username or password. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/basics/account-deletion.en.md b/docs/basics/account-deletion.en.md index b9b3bf57..d2acad68 100644 --- a/docs/basics/account-deletion.en.md +++ b/docs/basics/account-deletion.en.md @@ -59,3 +59,5 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/basics/common-misconceptions.en.md b/docs/basics/common-misconceptions.en.md index 8dee95f4..5ebcbc64 100644 --- a/docs/basics/common-misconceptions.en.md +++ b/docs/basics/common-misconceptions.en.md @@ -57,3 +57,5 @@ One of the clearest threat models is one where people *know who you are* and one Using Tor can help with this. It is also worth noting that greater anonymity is possible through asynchronous communication: Real-time communication is vulnerable to analysis of typing patterns (i.e. more than a paragraph of text, distributed on a forum, via email, etc.) [^1]: One notable example of this is the [2021 incident in which University of Minnesota researchers introduced three vulnerabilities into the Linux kernel development project](https://cse.umn.edu/cs/linux-incident). + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/basics/common-threats.en.md b/docs/basics/common-threats.en.md index 332f7e6d..d2e71842 100644 --- a/docs/basics/common-threats.en.md +++ b/docs/basics/common-threats.en.md @@ -145,3 +145,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) [^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many adblockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/basics/email-security.en.md b/docs/basics/email-security.en.md index f2a99a3d..f714e3e6 100644 --- a/docs/basics/email-security.en.md +++ b/docs/basics/email-security.en.md @@ -38,3 +38,5 @@ Email metadata is protected from outside observers with [Opportunistic TLS](http ### Why Can't Metadata be E2EE? Email metadata is crucial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into the email protocols originally, instead requiring add-on software like OpenPGP. Because OpenPGP messages still have to work with traditional email providers, it cannot encrypt email metadata, only the message body itself. That means that even when using OpenPGP, outside observers can see lots of information about your messages, such as who you're emailing, the subject lines, when you're emailing, etc. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/basics/multi-factor-authentication.en.md b/docs/basics/multi-factor-authentication.en.md index 690cfcf0..db4dcdac 100644 --- a/docs/basics/multi-factor-authentication.en.md +++ b/docs/basics/multi-factor-authentication.en.md @@ -161,3 +161,5 @@ SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How ### KeePass (and KeePassXC) KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/basics/passwords-overview.en.md b/docs/basics/passwords-overview.en.md index eb587265..9c8ee03f 100644 --- a/docs/basics/passwords-overview.en.md +++ b/docs/basics/passwords-overview.en.md @@ -108,3 +108,5 @@ There are many good options to choose from, both cloud-based and local. Choose o ### Backups You should store an [encrypted](../encryption.md) backup of your passwords on multiple storage devices or a cloud storage provider. This can help you access your passwords if something happens to your primary device or the service you are using. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/basics/threat-modeling.en.md b/docs/basics/threat-modeling.en.md index cdcdec91..25e1948a 100644 --- a/docs/basics/threat-modeling.en.md +++ b/docs/basics/threat-modeling.en.md @@ -102,3 +102,5 @@ For people looking to increase their privacy and security online, we've compiled ## Sources - [EFF Surveillance Self Defense: Your Security Plan](https://ssd.eff.org/en/module/your-security-plan) + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/basics/vpn-overview.en.md b/docs/basics/vpn-overview.en.md index f0744ca1..97875a78 100644 --- a/docs/basics/vpn-overview.en.md +++ b/docs/basics/vpn-overview.en.md @@ -74,3 +74,5 @@ For situations like these, or if you have another compelling reason, the VPN pro - [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) - [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) - [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/calendar.en.md b/docs/calendar.en.md index c0dedcf2..10e25eb8 100644 --- a/docs/calendar.en.md +++ b/docs/calendar.en.md @@ -66,3 +66,5 @@ Calendars contain some of your most sensitive data; use products that implement Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Should integrate with native OS calendar and contact management apps if applicable. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/cloud.en.md b/docs/cloud.en.md index 07af6194..5385a4eb 100644 --- a/docs/cloud.en.md +++ b/docs/cloud.en.md @@ -57,3 +57,5 @@ Our best-case criteria represents what we would like to see from the perfect pro - These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android. - Should support easy file-sharing with other users. - Should offer at least basic file preview and editing functionality on the web interface. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/data-redaction.en.md b/docs/data-redaction.en.md index b905a349..ef4affdd 100644 --- a/docs/data-redaction.en.md +++ b/docs/data-redaction.en.md @@ -141,3 +141,5 @@ The app offers multiple ways to erase metadata from images. Namely: - Apps developed for open-source operating systems must be open-source. - Apps must be free and should not include ads or other limitations. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/desktop-browsers.en.md b/docs/desktop-browsers.en.md index 87035443..b39b85bd 100644 --- a/docs/desktop-browsers.en.md +++ b/docs/desktop-browsers.en.md @@ -258,3 +258,5 @@ Our best-case criteria represents what we would like to see from the perfect pro - Must not replicate built-in browser or OS functionality. - Must directly impact user privacy, i.e. must not simply provide information. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/desktop.en.md b/docs/desktop.en.md index fbc73f94..0dd0d179 100644 --- a/docs/desktop.en.md +++ b/docs/desktop.en.md @@ -179,3 +179,5 @@ Our recommended operating systems: - Must support full-disk encryption during installation. - Must not freeze regular releases for more than 1 year. We [do not recommend](os/linux-overview.md#release-cycle) "Long Term Support" or "stable" distro releases for desktop usage. - Must support a wide variety of hardware. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/dns.en.md b/docs/dns.en.md index 0f95150b..27441888 100644 --- a/docs/dns.en.md +++ b/docs/dns.en.md @@ -138,3 +138,5 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf [:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/email-clients.en.md b/docs/email-clients.en.md index bdc839ba..ca1e44d7 100644 --- a/docs/email-clients.en.md +++ b/docs/email-clients.en.md @@ -234,3 +234,5 @@ Our best-case criteria represents what we would like to see from the perfect pro - Should not collect any telemetry by default. - Should support OpenPGP natively, i.e. without extensions. - Should support storing OpenPGP encrypted emails locally. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/email.en.md b/docs/email.en.md index ad03545f..fd904e4f 100644 --- a/docs/email.en.md +++ b/docs/email.en.md @@ -483,3 +483,5 @@ Must not have any marketing which is irresponsible: ### Additional Functionality While not strictly requirements, there are some other convenience or privacy factors we looked into when determining which providers to recommend. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/encryption.en.md b/docs/encryption.en.md index f130a214..f979d6b2 100644 --- a/docs/encryption.en.md +++ b/docs/encryption.en.md @@ -351,3 +351,5 @@ Our best-case criteria represents what we would like to see from the perfect pro - Operating System (FDE) encryption apps should utilize hardware security such as a TPM or Secure Enclave. - File encryption apps should have first- or third-party support for mobile platforms. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/file-sharing.en.md b/docs/file-sharing.en.md index 57c0c16a..9d02a307 100644 --- a/docs/file-sharing.en.md +++ b/docs/file-sharing.en.md @@ -143,3 +143,5 @@ Our best-case criteria represents what we would like to see from the perfect pro - Has mobile clients for iOS and Android, which at least support document previews. - Supports photo backup from iOS and Android, and optionally supports file/folder sync on Android. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/frontends.en.md b/docs/frontends.en.md index 5f4d7c28..4e496f60 100644 --- a/docs/frontends.en.md +++ b/docs/frontends.en.md @@ -264,3 +264,5 @@ Recommended frontends... We only consider frontends for websites which are... - Not normally accessible without JavaScript. + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/index.en.md b/docs/index.en.md index a64d4c42..e18fdcdd 100644 --- a/docs/index.en.md +++ b/docs/index.en.md @@ -48,3 +48,5 @@ It's important for a website like Privacy Guides to always stay up-to-date. We n + +--8<-- "includes/abbreviations.en.txt" diff --git a/docs/index.id.md b/docs/index.id.md new file mode 100644 index 00000000..b34f845a --- /dev/null +++ b/docs/index.id.md @@ -0,0 +1,51 @@ +--- +template: overrides/home.en.html +hide: + - navigation + - toc + - feedback +--- + + +