mirror of
https://github.com/privacyguides/privacyguides.org
synced 2024-11-30 15:03:32 +01:00
Add abbreviations to Crowdin (#2049)
This commit is contained in:
parent
4da25bc39a
commit
cc696093ce
@ -12,8 +12,8 @@ files:
|
|||||||
translation_replace:
|
translation_replace:
|
||||||
"en.": ""
|
"en.": ""
|
||||||
skip_untranslated_files: true
|
skip_untranslated_files: true
|
||||||
- source: "/includes/*.en.md"
|
- source: "/includes/*.en.*"
|
||||||
translation: "/includes/%file_name%.%two_letters_code%.md"
|
translation: "/includes/%file_name%.%two_letters_code%.%file_extension%"
|
||||||
translation_replace:
|
translation_replace:
|
||||||
"en.": ""
|
"en.": ""
|
||||||
skip_untranslated_files: true
|
skip_untranslated_files: true
|
||||||
|
@ -13,3 +13,5 @@ We couldn't find the page you were looking for! Maybe you were looking for one o
|
|||||||
- [Best VPN Providers](vpn.md)
|
- [Best VPN Providers](vpn.md)
|
||||||
- [Privacy Guides Forum](https://discuss.privacyguides.net)
|
- [Privacy Guides Forum](https://discuss.privacyguides.net)
|
||||||
- [Our Blog](https://blog.privacyguides.org)
|
- [Our Blog](https://blog.privacyguides.org)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
15
docs/404.es.md
Normal file
15
docs/404.es.md
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
hide:
|
||||||
|
- feedback
|
||||||
|
---
|
||||||
|
|
||||||
|
# 404 - No encontrado
|
||||||
|
|
||||||
|
¡No logramos encontrar la página que buscas! ¿Tal vez buscas alguna de estas?
|
||||||
|
|
||||||
|
- [Introducción a la creación de un modelo de amenazas](basics/threat-modeling.md)
|
||||||
|
- [Proveedores de DNS recomendados](dns.md)
|
||||||
|
- [Mejores navegadores de escritorio](desktop-browsers.md)
|
||||||
|
- [Mejores proveedores de VPN](vpn.md)
|
||||||
|
- [Foro de Privacy Guides](https://discuss.privacyguides.net)
|
||||||
|
- [Nuestro blog](https://blog.privacyguides.org)
|
@ -38,3 +38,5 @@ We have these requirements in regard to developers which wish to submit their pr
|
|||||||
|
|
||||||
- Must state what the exact threat model is with their project.
|
- Must state what the exact threat model is with their project.
|
||||||
- It should be clear to potential users what the project can provide, and what it cannot.
|
- It should be clear to potential users what the project can provide, and what it cannot.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -43,3 +43,5 @@ Privacy Guides is a **non-profit** organization. We use donations for a variety
|
|||||||
: We occasionally purchase products and services for the purposes of testing our [recommended tools](../tools.md).
|
: We occasionally purchase products and services for the purposes of testing our [recommended tools](../tools.md).
|
||||||
|
|
||||||
We are still working with our fiscal host (the Open Collective Foundation) to receive cryptocurrency donations, at the moment the accounting is unfeasible for many smaller transactions, but this should change in the future. In the meantime, if you wish to make a sizable (> $100) cryptocurrency donation, please reach out to [jonah@privacyguides.org](mailto:jonah@privacyguides.org).
|
We are still working with our fiscal host (the Open Collective Foundation) to receive cryptocurrency donations, at the moment the accounting is unfeasible for many smaller transactions, but this should change in the future. In the meantime, if you wish to make a sizable (> $100) cryptocurrency donation, please reach out to [jonah@privacyguides.org](mailto:jonah@privacyguides.org).
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -59,3 +59,5 @@ Our team members review all changes made to the website and handle administrativ
|
|||||||
:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. If you remix, transform, or build upon the content of this website, you may not distribute the modified material.
|
:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. If you remix, transform, or build upon the content of this website, you may not distribute the modified material.
|
||||||
|
|
||||||
This license is in place to prevent people from sharing our work without giving proper credit, and to prevent people from modifying our work in a way that could be used to mislead people. If you find the terms of this license too restrictive for the project you're working on, please reach out to us at `jonah@privacyguides.org`. We are happy to provide alternative licensing options for well-intentioned projects in the privacy space!
|
This license is in place to prevent people from sharing our work without giving proper credit, and to prevent people from modifying our work in a way that could be used to mislead people. If you find the terms of this license too restrictive for the project you're working on, please reach out to us at `jonah@privacyguides.org`. We are happy to provide alternative licensing options for well-intentioned projects in the privacy space!
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -41,3 +41,5 @@ You must not conduct any systematic or automated data collection activities on o
|
|||||||
* Scraping
|
* Scraping
|
||||||
* Data Mining
|
* Data Mining
|
||||||
* 'Framing' (IFrames)
|
* 'Framing' (IFrames)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -59,3 +59,5 @@ In France it's the Commission Nationale de l'Informatique et des Libertés which
|
|||||||
We will post any new versions of this statement [here](privacy-policy.md). We may change how we announce changes in future versions of this document. In the meantime we may update our contact information at any time without announcing a change. Please refer to the [Privacy Policy](privacy-policy.md) for the latest contact information at any time.
|
We will post any new versions of this statement [here](privacy-policy.md). We may change how we announce changes in future versions of this document. In the meantime we may update our contact information at any time without announcing a change. Please refer to the [Privacy Policy](privacy-policy.md) for the latest contact information at any time.
|
||||||
|
|
||||||
A full revision [history](https://github.com/privacyguides/privacyguides.org/commits/main/docs/about/privacy-policy.md) of this page can be found on GitHub.
|
A full revision [history](https://github.com/privacyguides/privacyguides.org/commits/main/docs/about/privacy-policy.md) of this page can be found on GitHub.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -115,3 +115,5 @@ This topic has been discussed extensively within our communities in various loca
|
|||||||
- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/)
|
- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/)
|
||||||
- [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496)
|
- [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496)
|
||||||
- [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20)
|
- [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -36,3 +36,5 @@ Access may be granted upon request to Privacy Guides team members, Matrix modera
|
|||||||
- Availability: Semi-Public
|
- Availability: Semi-Public
|
||||||
We host Invidious primarily to serve embedded YouTube videos on our website, this instance is not intended for general-purpose use and may be limited at any time.
|
We host Invidious primarily to serve embedded YouTube videos on our website, this instance is not intended for general-purpose use and may be limited at any time.
|
||||||
- Source: [github.com/iv-org/invidious](https://github.com/iv-org/invidious)
|
- Source: [github.com/iv-org/invidious](https://github.com/iv-org/invidious)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -33,5 +33,6 @@
|
|||||||
## Invidious
|
## Invidious
|
||||||
|
|
||||||
- דומיין: [invidious.privacyguides.net](https://invidious.privacyguides.net)
|
- דומיין: [invidious.privacyguides.net](https://invidious.privacyguides.net)
|
||||||
- זמינות: חצי ציבורי אנו מארחים את Invidious בעיקר כדי להגיש סרטוני YouTube משובצים באתר האינטרנט שלנו, מופע זה אינו מיועד לשימוש כללי ועשוי להיות מוגבל בכל עת.
|
- זמינות: חצי ציבורי
|
||||||
|
אנו מארחים את Invidious בעיקר כדי להגיש סרטוני YouTube משובצים באתר האינטרנט שלנו, מופע זה אינו מיועד לשימוש כללי ועשוי להיות מוגבל בכל עת.
|
||||||
- מקור: [github.com/iv-org/invidious](https://github.com/iv-org/invidious)
|
- מקור: [github.com/iv-org/invidious](https://github.com/iv-org/invidious)
|
||||||
|
@ -58,3 +58,5 @@ title: Traffic Statistics
|
|||||||
})
|
})
|
||||||
})
|
})
|
||||||
</script>
|
</script>
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -100,3 +100,5 @@ Self-hosting a node in an anonymous routing network does not provide the hoster
|
|||||||
- Less reliable if nodes are selected by randomized routing, some nodes may be very far from the sender and receiver, adding latency or even failing to transmit messages if one of the nodes goes offline.
|
- Less reliable if nodes are selected by randomized routing, some nodes may be very far from the sender and receiver, adding latency or even failing to transmit messages if one of the nodes goes offline.
|
||||||
- More complex to get started, as the creation and secured backup of a cryptographic private key is required.
|
- More complex to get started, as the creation and secured backup of a cryptographic private key is required.
|
||||||
- Just like other decentralized platforms, adding features is more complex for developers than on a centralized platform. Hence, features may be lacking or incompletely implemented, such as offline message relaying or message deletion.
|
- Just like other decentralized platforms, adding features is more complex for developers than on a centralized platform. Hence, features may be lacking or incompletely implemented, such as offline message relaying or message deletion.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -304,3 +304,5 @@ The [EDNS Client Subnet](https://en.wikipedia.org/wiki/EDNS_Client_Subnet) is a
|
|||||||
It's intended to "speed up" delivery of data by giving the client an answer that belongs to a server that is close to them such as a [content delivery network](https://en.wikipedia.org/wiki/Content_delivery_network), which are often used in video streaming and serving JavaScript web apps.
|
It's intended to "speed up" delivery of data by giving the client an answer that belongs to a server that is close to them such as a [content delivery network](https://en.wikipedia.org/wiki/Content_delivery_network), which are often used in video streaming and serving JavaScript web apps.
|
||||||
|
|
||||||
This feature does come at a privacy cost, as it tells the DNS server some information about the client's location.
|
This feature does come at a privacy cost, as it tells the DNS server some information about the client's location.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -77,3 +77,5 @@ If you wish to use Tor for browsing the web, we only recommend the **official**
|
|||||||
- [Tor Browser User Manual](https://tb-manual.torproject.org)
|
- [Tor Browser User Manual](https://tb-manual.torproject.org)
|
||||||
- [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) <small>(YouTube)</small>
|
- [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) <small>(YouTube)</small>
|
||||||
- [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) <small>(YouTube)</small>
|
- [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) <small>(YouTube)</small>
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -351,3 +351,5 @@ That said, the [F-droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](htt
|
|||||||
- Applications on this page must not be applicable to any other software category on the site.
|
- Applications on this page must not be applicable to any other software category on the site.
|
||||||
- General applications should extend or replace core system functionality.
|
- General applications should extend or replace core system functionality.
|
||||||
- Applications should receive regular updates and maintenance.
|
- Applications should receive regular updates and maintenance.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -78,3 +78,5 @@ In many cases you will need to provide a number that you can receive SMS or call
|
|||||||
### Username and password
|
### Username and password
|
||||||
|
|
||||||
Some services allow you to register without using an email address and only require you to set a username and password. These services may provide increased anonymity when combined with a VPN or Tor. Keep in mind that for these accounts there will most likely be **no way to recover your account** in the event you forget your username or password.
|
Some services allow you to register without using an email address and only require you to set a username and password. These services may provide increased anonymity when combined with a VPN or Tor. Keep in mind that for these accounts there will most likely be **no way to recover your account** in the event you forget your username or password.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -59,3 +59,5 @@ Even when you are able to delete an account, there is no guarantee that all your
|
|||||||
## Avoid New Accounts
|
## Avoid New Accounts
|
||||||
|
|
||||||
As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you!
|
As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you!
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -57,3 +57,5 @@ One of the clearest threat models is one where people *know who you are* and one
|
|||||||
Using Tor can help with this. It is also worth noting that greater anonymity is possible through asynchronous communication: Real-time communication is vulnerable to analysis of typing patterns (i.e. more than a paragraph of text, distributed on a forum, via email, etc.)
|
Using Tor can help with this. It is also worth noting that greater anonymity is possible through asynchronous communication: Real-time communication is vulnerable to analysis of typing patterns (i.e. more than a paragraph of text, distributed on a forum, via email, etc.)
|
||||||
|
|
||||||
[^1]: One notable example of this is the [2021 incident in which University of Minnesota researchers introduced three vulnerabilities into the Linux kernel development project](https://cse.umn.edu/cs/linux-incident).
|
[^1]: One notable example of this is the [2021 incident in which University of Minnesota researchers introduced three vulnerabilities into the Linux kernel development project](https://cse.umn.edu/cs/linux-incident).
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -145,3 +145,5 @@ You must always consider the risks of trying to bypass censorship, the potential
|
|||||||
[^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism)
|
[^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism)
|
||||||
[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many adblockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques.
|
[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many adblockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques.
|
||||||
[^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights).
|
[^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights).
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -38,3 +38,5 @@ Email metadata is protected from outside observers with [Opportunistic TLS](http
|
|||||||
### Why Can't Metadata be E2EE?
|
### Why Can't Metadata be E2EE?
|
||||||
|
|
||||||
Email metadata is crucial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into the email protocols originally, instead requiring add-on software like OpenPGP. Because OpenPGP messages still have to work with traditional email providers, it cannot encrypt email metadata, only the message body itself. That means that even when using OpenPGP, outside observers can see lots of information about your messages, such as who you're emailing, the subject lines, when you're emailing, etc.
|
Email metadata is crucial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into the email protocols originally, instead requiring add-on software like OpenPGP. Because OpenPGP messages still have to work with traditional email providers, it cannot encrypt email metadata, only the message body itself. That means that even when using OpenPGP, outside observers can see lots of information about your messages, such as who you're emailing, the subject lines, when you're emailing, etc.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -161,3 +161,5 @@ SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How
|
|||||||
### KeePass (and KeePassXC)
|
### KeePass (and KeePassXC)
|
||||||
|
|
||||||
KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website.
|
KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -108,3 +108,5 @@ There are many good options to choose from, both cloud-based and local. Choose o
|
|||||||
### Backups
|
### Backups
|
||||||
|
|
||||||
You should store an [encrypted](../encryption.md) backup of your passwords on multiple storage devices or a cloud storage provider. This can help you access your passwords if something happens to your primary device or the service you are using.
|
You should store an [encrypted](../encryption.md) backup of your passwords on multiple storage devices or a cloud storage provider. This can help you access your passwords if something happens to your primary device or the service you are using.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -102,3 +102,5 @@ For people looking to increase their privacy and security online, we've compiled
|
|||||||
## Sources
|
## Sources
|
||||||
|
|
||||||
- [EFF Surveillance Self Defense: Your Security Plan](https://ssd.eff.org/en/module/your-security-plan)
|
- [EFF Surveillance Self Defense: Your Security Plan](https://ssd.eff.org/en/module/your-security-plan)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -74,3 +74,5 @@ For situations like these, or if you have another compelling reason, the VPN pro
|
|||||||
- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/)
|
- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/)
|
||||||
- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/)
|
- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/)
|
||||||
- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/)
|
- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -66,3 +66,5 @@ Calendars contain some of your most sensitive data; use products that implement
|
|||||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||||
|
|
||||||
- Should integrate with native OS calendar and contact management apps if applicable.
|
- Should integrate with native OS calendar and contact management apps if applicable.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -57,3 +57,5 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
- These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android.
|
- These clients should integrate with native OS tools for cloud storage providers, such as Files app integration on iOS, or DocumentsProvider functionality on Android.
|
||||||
- Should support easy file-sharing with other users.
|
- Should support easy file-sharing with other users.
|
||||||
- Should offer at least basic file preview and editing functionality on the web interface.
|
- Should offer at least basic file preview and editing functionality on the web interface.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -141,3 +141,5 @@ The app offers multiple ways to erase metadata from images. Namely:
|
|||||||
|
|
||||||
- Apps developed for open-source operating systems must be open-source.
|
- Apps developed for open-source operating systems must be open-source.
|
||||||
- Apps must be free and should not include ads or other limitations.
|
- Apps must be free and should not include ads or other limitations.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -258,3 +258,5 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
|
|
||||||
- Must not replicate built-in browser or OS functionality.
|
- Must not replicate built-in browser or OS functionality.
|
||||||
- Must directly impact user privacy, i.e. must not simply provide information.
|
- Must directly impact user privacy, i.e. must not simply provide information.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -179,3 +179,5 @@ Our recommended operating systems:
|
|||||||
- Must support full-disk encryption during installation.
|
- Must support full-disk encryption during installation.
|
||||||
- Must not freeze regular releases for more than 1 year. We [do not recommend](os/linux-overview.md#release-cycle) "Long Term Support" or "stable" distro releases for desktop usage.
|
- Must not freeze regular releases for more than 1 year. We [do not recommend](os/linux-overview.md#release-cycle) "Long Term Support" or "stable" distro releases for desktop usage.
|
||||||
- Must support a wide variety of hardware.
|
- Must support a wide variety of hardware.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -138,3 +138,5 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf
|
|||||||
[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation}
|
[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -234,3 +234,5 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
- Should not collect any telemetry by default.
|
- Should not collect any telemetry by default.
|
||||||
- Should support OpenPGP natively, i.e. without extensions.
|
- Should support OpenPGP natively, i.e. without extensions.
|
||||||
- Should support storing OpenPGP encrypted emails locally.
|
- Should support storing OpenPGP encrypted emails locally.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -483,3 +483,5 @@ Must not have any marketing which is irresponsible:
|
|||||||
### Additional Functionality
|
### Additional Functionality
|
||||||
|
|
||||||
While not strictly requirements, there are some other convenience or privacy factors we looked into when determining which providers to recommend.
|
While not strictly requirements, there are some other convenience or privacy factors we looked into when determining which providers to recommend.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -351,3 +351,5 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
|
|
||||||
- Operating System (FDE) encryption apps should utilize hardware security such as a TPM or Secure Enclave.
|
- Operating System (FDE) encryption apps should utilize hardware security such as a TPM or Secure Enclave.
|
||||||
- File encryption apps should have first- or third-party support for mobile platforms.
|
- File encryption apps should have first- or third-party support for mobile platforms.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -143,3 +143,5 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
|
|
||||||
- Has mobile clients for iOS and Android, which at least support document previews.
|
- Has mobile clients for iOS and Android, which at least support document previews.
|
||||||
- Supports photo backup from iOS and Android, and optionally supports file/folder sync on Android.
|
- Supports photo backup from iOS and Android, and optionally supports file/folder sync on Android.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -264,3 +264,5 @@ Recommended frontends...
|
|||||||
We only consider frontends for websites which are...
|
We only consider frontends for websites which are...
|
||||||
|
|
||||||
- Not normally accessible without JavaScript.
|
- Not normally accessible without JavaScript.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -48,3 +48,5 @@ It's important for a website like Privacy Guides to always stay up-to-date. We n
|
|||||||
|
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
51
docs/index.id.md
Normal file
51
docs/index.id.md
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
---
|
||||||
|
template: overrides/home.en.html
|
||||||
|
hide:
|
||||||
|
- navigation
|
||||||
|
- toc
|
||||||
|
- feedback
|
||||||
|
---
|
||||||
|
|
||||||
|
<!-- markdownlint-disable-next-line -->
|
||||||
|
<div style="max-width:50rem;margin:auto;" markdown>
|
||||||
|
<div style="max-width:38rem;" markdown>
|
||||||
|
## Mengapa saya harus peduli?
|
||||||
|
|
||||||
|
##### “Saya tidak memiliki apa-apa untuk disembunyikan. Mengapa saya harus peduli dengan privasi saya?”
|
||||||
|
|
||||||
|
Sama seperti hak untuk menikah antar ras, hak pilih perempuan, kebebasan berbicara, dan banyak lainnya, hak kita untuk mendapatkan privasi tidak selalu ditegakkan. Dalam beberapa kediktatoran, masih belum. Generasi sebelum kita memperjuangkan untuk hak privasi kita. ==Privasi adalah hak asasi manusia, yang melekat pada kita semua,== yang berhak kita dapatkan (tanpa diskriminasi).
|
||||||
|
|
||||||
|
Anda tidak harus bingung antara privasi dengan kerahasiaan. Kami tahu apa yang terjadi di kamar mandi, tapi Anda tetap menutup pintunya. Itu karena Anda menginginkan privasi, bukan kerahasiaan. **Setiap orang** memiliki sesuatu yang harus dilindungi. Privasi adalah sesuatu yang membuat kita menjadi manusia.
|
||||||
|
|
||||||
|
[:material-target-account: Serangan Internet Umum](basics/common-threats.md){ .md-button .md-button--primary }
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div style="margin-left:auto;margin-right:0;text-align:right;max-width:38rem;" markdown>
|
||||||
|
## Apa yang harus saya lakukan?
|
||||||
|
|
||||||
|
##### Pertama, Anda perlu membuat rencana
|
||||||
|
|
||||||
|
Mencoba melindungi semua data Anda dari semua orang setiap saat tidaklah praktis, mahal, dan melelahkan. Tetapi jangan khawatir! Keamanan adalah sebuah proses, dan dengan berpikir ke depan, Anda dapat menyusun rencana yang tepat untuk Anda. Keamanan bukan hanya tentang alat yang Anda gunakan atau perangkat lunak yang Anda unduh. Sebaliknya, itu dimulai dengan memahami ancaman unik yang Anda hadapi, dan bagaimana Anda dapat memitigasinya.
|
||||||
|
|
||||||
|
==Proses mengidentifikasi ancaman dan mendefinisikan tindakan penanggulangan disebut **pemodelan ancaman**==, dan ini menjadi dasar dari setiap rencana keamanan dan privasi yang baik.
|
||||||
|
|
||||||
|
[:material-book-outline: Pelajari Lebih Lanjut Tentang Pemodelan Ancaman](basics/threat-modeling.md){ .md-button .md-button--primary }
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
|
||||||
|
<div style="padding:3em;max-width:960px;margin:auto;text-align:center;" markdown>
|
||||||
|
## Kami membutuhkan Anda! Inilah cara untuk terlibat:
|
||||||
|
|
||||||
|
Ini penting bagi situs web seperti Privacy Guides untuk selalu mendapatkan informasi yang terbaru. Kami membutuhkan audiens kami untuk mengawasi pembaruan perangkat lunak untuk aplikasi yang terdaftar di situs kami dan mengikuti berita terbaru tentang penyedia yang kami rekomendasikan. Memang sulit untuk mengimbangi kecepatan internet yang begitu cepat, tetapi kami berusaha sebaik mungkin. Jika Anda menemukan kesalahan, merasa bahwa sebuah penyedia tidak seharusnya terdaftar, melihat penyedia yang memenuhi syarat tidak ada, merasa plugin peramban tidak lagi menjadi pilihan terbaik, atau menemukan masalah lain, silakan beri tahu kami.
|
||||||
|
|
||||||
|
<div class="grid cards" style="margin:auto;max-width:800px;text-align:center;" markdown>
|
||||||
|
|
||||||
|
- [:simple-discourse: Bergabunglah dengan forum kami](https://discuss.privacyguides.net/)
|
||||||
|
- [:simple-mastodon: Ikuti kami di Mastodon](https://mastodon.neat.computer/@privacyguides){ rel=me }
|
||||||
|
- [:material-book-edit: Berkontribusi ke situs web ini](https://github.com/privacyguides/privacyguides.org)
|
||||||
|
- [:simple-matrix: Obrol dengan kami di Matrix](https://matrix.to/#/#privacyguides:matrix.org)
|
||||||
|
- [:material-information-outline: Pelajari lebih lanjut tentang kami](about/index.md)
|
||||||
|
- [:material-hand-coin-outline: Dukung proyek ini](about/donate.md)
|
||||||
|
|
||||||
|
</div>
|
||||||
|
</div>
|
@ -13,3 +13,5 @@ Some pages that used to be in our knowledge base can now be found on our blog:
|
|||||||
- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/)
|
- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/)
|
||||||
- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/)
|
- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/)
|
||||||
- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/)
|
- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -20,3 +20,5 @@ Additional branding guidelines can be found at [github.com/privacyguides/brand](
|
|||||||
"Privacy Guides" and the shield logo are trademarks owned by Jonah Aragon, unlimited usage is granted to the Privacy Guides project.
|
"Privacy Guides" and the shield logo are trademarks owned by Jonah Aragon, unlimited usage is granted to the Privacy Guides project.
|
||||||
|
|
||||||
Without waiving any of its rights, Privacy Guides does not advise others on the scope of its intellectual property rights. Privacy Guides does not permit or consent to any use of its trademarks in any manner that is likely to cause confusion by implying association with or sponsorship by Privacy Guides. If you are aware of any such use, please contact Jonah Aragon at jonah@privacyguides.org. Consult your legal counsel if you have questions.
|
Without waiving any of its rights, Privacy Guides does not advise others on the scope of its intellectual property rights. Privacy Guides does not permit or consent to any use of its trademarks in any manner that is likely to cause confusion by implying association with or sponsorship by Privacy Guides. If you are aware of any such use, please contact Jonah Aragon at jonah@privacyguides.org. Consult your legal counsel if you have questions.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -43,3 +43,5 @@ If you are working on your own branch, run these commands before submitting a PR
|
|||||||
git fetch origin
|
git fetch origin
|
||||||
git rebase origin/main
|
git rebase origin/main
|
||||||
```
|
```
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -87,3 +87,5 @@ scour --set-precision=5 \
|
|||||||
--protect-ids-noninkscape \
|
--protect-ids-noninkscape \
|
||||||
input.svg output.svg
|
input.svg output.svg
|
||||||
```
|
```
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -85,3 +85,5 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversatio
|
|||||||
> - “must not” for a prohibition
|
> - “must not” for a prohibition
|
||||||
> - “may” for a discretionary action
|
> - “may” for a discretionary action
|
||||||
> - “should” for a recommendation
|
> - “should” for a recommendation
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -188,3 +188,5 @@ Additional filter lists do slow things down and may increase your attack surface
|
|||||||
|
|
||||||
- Must not replicate built-in browser or OS functionality.
|
- Must not replicate built-in browser or OS functionality.
|
||||||
- Must directly impact user privacy, i.e. must not simply provide information.
|
- Must directly impact user privacy, i.e. must not simply provide information.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -139,3 +139,5 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative
|
|||||||
- Must not require internet connectivity.
|
- Must not require internet connectivity.
|
||||||
- Must not sync to a third-party cloud sync/backup service.
|
- Must not sync to a third-party cloud sync/backup service.
|
||||||
- **Optional** E2EE sync support with OS-native tools is acceptable, e.g. encrypted sync via iCloud.
|
- **Optional** E2EE sync support with OS-native tools is acceptable, e.g. encrypted sync via iCloud.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -169,3 +169,5 @@ You can subscribe YouTube channels without logging in and associating usage info
|
|||||||
```text
|
```text
|
||||||
https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID]
|
https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID]
|
||||||
```
|
```
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -111,3 +111,5 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si
|
|||||||
|
|
||||||
- Local backup/sync functionality should support encryption.
|
- Local backup/sync functionality should support encryption.
|
||||||
- Cloud-based platforms should support document sharing.
|
- Cloud-based platforms should support document sharing.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -130,3 +130,5 @@ You will either be given the option to delete your advertising ID or to *Opt out
|
|||||||
[SafetyNet](https://developer.android.com/training/safetynet/attestation) and the [Play Integrity APIs](https://developer.android.com/google/play/integrity) are generally used for [banking apps](https://grapheneos.org/usage#banking-apps). Many banking apps will work fine in GrapheneOS with sandboxed Play services, however some non-financial apps have their own crude anti-tampering mechanisms which might fail. GrapheneOS passes the `basicIntegrity` check, but not the certification check `ctsProfileMatch`. Devices with Android 8 or later have hardware attestation support which cannot be bypassed without leaked keys or serious vulnerabilities.
|
[SafetyNet](https://developer.android.com/training/safetynet/attestation) and the [Play Integrity APIs](https://developer.android.com/google/play/integrity) are generally used for [banking apps](https://grapheneos.org/usage#banking-apps). Many banking apps will work fine in GrapheneOS with sandboxed Play services, however some non-financial apps have their own crude anti-tampering mechanisms which might fail. GrapheneOS passes the `basicIntegrity` check, but not the certification check `ctsProfileMatch`. Devices with Android 8 or later have hardware attestation support which cannot be bypassed without leaked keys or serious vulnerabilities.
|
||||||
|
|
||||||
As for Google Wallet, we don't recommend this due to their [privacy policy](https://payments.google.com/payments/apis-secure/get_legal_document?ldo=0&ldt=privacynotice&ldl=en), which states you must opt-out if you don't want your credit rating and personal information shared with affiliate marketing services.
|
As for Google Wallet, we don't recommend this due to their [privacy policy](https://payments.google.com/payments/apis-secure/get_legal_document?ldo=0&ldt=privacynotice&ldl=en), which states you must opt-out if you don't want your credit rating and personal information shared with affiliate marketing services.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -138,3 +138,5 @@ The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Co
|
|||||||
This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer.
|
This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer.
|
||||||
|
|
||||||
openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file.
|
openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -51,3 +51,5 @@ For additional information we encourage you to consult the extensive Qubes OS do
|
|||||||
- J. Rutkowska: [*Software compartmentalization vs. physical separation*](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf)
|
- J. Rutkowska: [*Software compartmentalization vs. physical separation*](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf)
|
||||||
- J. Rutkowska: [*Partitioning my digital life into security domains*](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html)
|
- J. Rutkowska: [*Partitioning my digital life into security domains*](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html)
|
||||||
- Qubes OS: [*Related Articles*](https://www.qubes-os.org/news/categories/#articles)
|
- Qubes OS: [*Related Articles*](https://www.qubes-os.org/news/categories/#articles)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -226,3 +226,5 @@ These products are minimal password managers that can be used within scripting a
|
|||||||
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
|
||||||
|
|
||||||
- Must be cross-platform.
|
- Must be cross-platform.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -151,3 +151,5 @@ In general, we define office suites as applications which could reasonably act a
|
|||||||
[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"}
|
[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"}
|
||||||
[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation}
|
[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation}
|
||||||
[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -191,3 +191,5 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
- Should be decentralized, i.e. federated or P2P.
|
- Should be decentralized, i.e. federated or P2P.
|
||||||
- Should use E2EE for all messages by default.
|
- Should use E2EE for all messages by default.
|
||||||
- Should support Linux, macOS, Windows, Android, and iOS.
|
- Should support Linux, macOS, Windows, Android, and iOS.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -46,3 +46,5 @@ OPNsense was originally developed as a fork of [pfSense](https://en.wikipedia.or
|
|||||||
- Must be open source.
|
- Must be open source.
|
||||||
- Must receive regular updates.
|
- Must receive regular updates.
|
||||||
- Must support a wide variety of hardware.
|
- Must support a wide variety of hardware.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -104,3 +104,5 @@ Our best-case criteria represents what we would like to see from the perfect pro
|
|||||||
|
|
||||||
- Should be based on open-source software.
|
- Should be based on open-source software.
|
||||||
- Should not block Tor exit node IP addresses.
|
- Should not block Tor exit node IP addresses.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -439,3 +439,5 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
[Learn more :material-arrow-right-drop-circle:](video-streaming.md)
|
[Learn more :material-arrow-right-drop-circle:](video-streaming.md)
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -36,7 +36,7 @@ Ha további információt szeretnél megtudni az egyes projektekről, hogy miér
|
|||||||
|
|
||||||
[További információ :material-arrow-right-drop-circle:](desktop-browsers.md)
|
[További információ :material-arrow-right-drop-circle:](desktop-browsers.md)
|
||||||
|
|
||||||
### További Erőforrások
|
### Android
|
||||||
|
|
||||||
<div class="grid cards" markdown>
|
<div class="grid cards" markdown>
|
||||||
|
|
||||||
|
@ -120,3 +120,5 @@ For resistance against traffic analysis attacks, consider enabling *Isolate Dest
|
|||||||
Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours.
|
Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours.
|
||||||
|
|
||||||
Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy.
|
Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -47,3 +47,5 @@ You can disable *Save hosting data to help the LBRY network* option in :gear: **
|
|||||||
|
|
||||||
- Must not require a centralized account to view videos.
|
- Must not require a centralized account to view videos.
|
||||||
- Decentralized authentication, such as via a mobile wallet's private key is acceptable.
|
- Decentralized authentication, such as via a mobile wallet's private key is acceptable.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -319,3 +319,5 @@ Responsible marketing that is both educational and useful to the consumer could
|
|||||||
### Additional Functionality
|
### Additional Functionality
|
||||||
|
|
||||||
While not strictly requirements, there are some factors we looked into when determining which providers to recommend. These include adblocking/tracker-blocking functionality, warrant canaries, multihop connections, excellent customer support, the number of allowed simultaneous connections, etc.
|
While not strictly requirements, there are some factors we looked into when determining which providers to recommend. These include adblocking/tracker-blocking functionality, warrant canaries, multihop connections, excellent customer support, the number of allowed simultaneous connections, etc.
|
||||||
|
|
||||||
|
--8<-- "includes/abbreviations.en.txt"
|
||||||
|
@ -1,4 +1,3 @@
|
|||||||
<!-- markdownlint-disable -->
|
|
||||||
*[2FA]: 2-Factor Authentication
|
*[2FA]: 2-Factor Authentication
|
||||||
*[ADB]: Android Debug Bridge
|
*[ADB]: Android Debug Bridge
|
||||||
*[AOSP]: Android Open Source Project
|
*[AOSP]: Android Open Source Project
|
@ -3,8 +3,6 @@ site_url: "https://www.privacyguides.org/"
|
|||||||
site_dir: 'site'
|
site_dir: 'site'
|
||||||
|
|
||||||
site_name: Privacy Guides
|
site_name: Privacy Guides
|
||||||
site_description: |
|
|
||||||
Privacy Guides is your central privacy and security resource to protect yourself online.
|
|
||||||
|
|
||||||
extra:
|
extra:
|
||||||
social:
|
social:
|
||||||
@ -160,9 +158,7 @@ markdown_extensions:
|
|||||||
pymdownx.keys: {}
|
pymdownx.keys: {}
|
||||||
pymdownx.mark: {}
|
pymdownx.mark: {}
|
||||||
pymdownx.tilde: {}
|
pymdownx.tilde: {}
|
||||||
pymdownx.snippets:
|
pymdownx.snippets: {}
|
||||||
auto_append:
|
|
||||||
- includes/abbreviations.en.md
|
|
||||||
pymdownx.tasklist:
|
pymdownx.tasklist:
|
||||||
custom_checkbox: true
|
custom_checkbox: true
|
||||||
attr_list: {}
|
attr_list: {}
|
||||||
|
@ -1,4 +1,8 @@
|
|||||||
{% extends "base.html" %}
|
{% extends "base.html" %}
|
||||||
|
{% block site_meta %}
|
||||||
|
{{ super() }}
|
||||||
|
<meta name="description" content="{{ lang.t('site.description') }}">
|
||||||
|
{% endblock %}
|
||||||
{% block extrahead %}
|
{% block extrahead %}
|
||||||
<link rel="preload" href="{{ 'assets/brand/WOFF/bagnard/Bagnard.woff' | url }}" as="font" type="font/woff" crossorigin>
|
<link rel="preload" href="{{ 'assets/brand/WOFF/bagnard/Bagnard.woff' | url }}" as="font" type="font/woff" crossorigin>
|
||||||
{% endblock %}
|
{% endblock %}
|
||||||
|
@ -1,5 +1,27 @@
|
|||||||
{% macro t(key) %}{{ {
|
{% macro t(key) %}{{ {
|
||||||
|
|
||||||
"language": "he"
|
"language": "he",
|
||||||
|
|
||||||
|
"site.description": "Privacy Guides (מדריכי פרטיות) הם משאב הפרטיות והאבטחה המרכזי שלכם כדי להגן על עצמכם באופן מקוון.",
|
||||||
|
|
||||||
|
"theme.light": "עבור למצב בהיר",
|
||||||
|
|
||||||
|
"theme.dark": "עבור למצב כהה",
|
||||||
|
|
||||||
|
"theme.auto": "עבור לערכת הנושא של המערכת",
|
||||||
|
|
||||||
|
"feedback.title": "האם הדף הזה עזר לך?",
|
||||||
|
|
||||||
|
"feedback.helpful.name": "הדף הזה היה מועיל",
|
||||||
|
|
||||||
|
"feedback.helpful.note": "תודה על המשוב שלך!",
|
||||||
|
|
||||||
|
"feedback.improve.name": "דף זה יכול להשתפר",
|
||||||
|
|
||||||
|
"feedback.improve.note": "תודה על המשוב שלך! עזור לנו לשפר את הדף הזה על ידי פתיחת <a href='https://discuss.privacyguides.net/'>דיון בפורום שלנו</a>.",
|
||||||
|
|
||||||
|
"copyright.intro": "<b>Privacy Guides</b> הוא אתר ללא מטרות רווח, בעל מוטיבציה חברתית, המספק מידע להגנה על אבטחת הנתונים ופרטיותך.",
|
||||||
|
|
||||||
|
"copyright.affiliates": "אנחנו לא מרוויחים כסף מהמלצה על מוצרים מסוימים, ואיננו משתמשים בקישורי שותפים."
|
||||||
|
|
||||||
}[key] }}{% endmacro %}
|
}[key] }}{% endmacro %}
|
||||||
|
Loading…
Reference in New Issue
Block a user