Fix Crowdin YAML Bug (#2106)

This commit is contained in:
Jonah Aragon 2023-04-04 21:26:29 -05:00
parent e29ed5de35
commit 6582156917
No known key found for this signature in database
6 changed files with 60 additions and 30 deletions

View File

@ -3,17 +3,20 @@ title: "Android"
icon: 'simple/android' icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
schema: schema:
- "@context": http://schema.org -
"@context": http://schema.org
"@type": WebPage "@type": WebPage
name: Private Android Operating Systems name: Private Android Operating Systems
url: "./" url: "./"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": CreativeWork "@type": CreativeWork
name: Android name: Android
image: /assets/img/android/android.svg image: /assets/img/android/android.svg
url: https://source.android.com/ url: https://source.android.com/
sameAs: https://en.wikipedia.org/wiki/Android_(operating_system) sameAs: https://en.wikipedia.org/wiki/Android_(operating_system)
- "@context": http://schema.org -
"@context": http://schema.org
"@type": CreativeWork "@type": CreativeWork
name: GrapheneOS name: GrapheneOS
image: /assets/img/android/grapheneos.svg image: /assets/img/android/grapheneos.svg
@ -23,7 +26,8 @@ schema:
"@context": http://schema.org "@context": http://schema.org
"@type": WebPage "@type": WebPage
url: "./" url: "./"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": CreativeWork "@type": CreativeWork
name: Divest name: Divest
image: /assets/img/android/divestos.svg image: /assets/img/android/divestos.svg
@ -33,7 +37,8 @@ schema:
"@context": http://schema.org "@context": http://schema.org
"@type": WebPage "@type": WebPage
url: "./" url: "./"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": Product "@type": Product
name: Pixel name: Pixel
brand: brand:
@ -46,22 +51,26 @@ schema:
author: author:
"@type": Organization "@type": Organization
name: Privacy Guides name: Privacy Guides
- "@context": http://schema.org -
"@context": http://schema.org
"@type": MobileApplication "@type": MobileApplication
name: Shelter name: Shelter
applicationCategory: Utilities applicationCategory: Utilities
operatingSystem: Android operatingSystem: Android
- "@context": http://schema.org -
"@context": http://schema.org
"@type": MobileApplication "@type": MobileApplication
name: Auditor name: Auditor
applicationCategory: Utilities applicationCategory: Utilities
operatingSystem: Android operatingSystem: Android
- "@context": http://schema.org -
"@context": http://schema.org
"@type": MobileApplication "@type": MobileApplication
name: Secure Camera name: Secure Camera
applicationCategory: Utilities applicationCategory: Utilities
operatingSystem: Android operatingSystem: Android
- "@context": http://schema.org -
"@context": http://schema.org
"@type": MobileApplication "@type": MobileApplication
name: Secure PDF Viewer name: Secure PDF Viewer
applicationCategory: Utilities applicationCategory: Utilities

View File

@ -3,28 +3,33 @@ title: "Common Misconceptions"
icon: 'material/robot-confused' icon: 'material/robot-confused'
description: Privacy isn't a straightforward topic, and it's easy to get caught up in marketing claims and other disinformation. description: Privacy isn't a straightforward topic, and it's easy to get caught up in marketing claims and other disinformation.
schema: schema:
- "@context": https://schema.org -
"@context": https://schema.org
"@type": FAQPage "@type": FAQPage
mainEntity: mainEntity:
- "@type": Question -
"@type": Question
name: Is open source software inherently secure? name: Is open source software inherently secure?
acceptedAnswer: acceptedAnswer:
"@type": Answer "@type": Answer
text: | text: |
Whether the source code is available and how software is licensed does not inherently affect its security in any way. Open-source software has the potential to be more secure than proprietary software, but there is absolutely no guarantee this is the case. When you evaluate software, you should look at the reputation and security of each tool on an individual basis. Whether the source code is available and how software is licensed does not inherently affect its security in any way. Open-source software has the potential to be more secure than proprietary software, but there is absolutely no guarantee this is the case. When you evaluate software, you should look at the reputation and security of each tool on an individual basis.
- "@type": Question -
"@type": Question
name: Can shifting trust to another provider increase privacy? name: Can shifting trust to another provider increase privacy?
acceptedAnswer: acceptedAnswer:
"@type": Answer "@type": Answer
text: | text: |
We talk about "shifting trust" a lot when discussing solutions like VPNs (which shift the trust you place in your ISP to the VPN provider). While this protects your browsing data from your ISP specifically, the VPN provider you choose still has access to your browsing data: Your data isn't completely secured from all parties. We talk about "shifting trust" a lot when discussing solutions like VPNs (which shift the trust you place in your ISP to the VPN provider). While this protects your browsing data from your ISP specifically, the VPN provider you choose still has access to your browsing data: Your data isn't completely secured from all parties.
- "@type": Question -
"@type": Question
name: Are privacy-focused solutions inherently trustworthy? name: Are privacy-focused solutions inherently trustworthy?
acceptedAnswer: acceptedAnswer:
"@type": Answer "@type": Answer
text: | text: |
Focusing solely on the privacy policies and marketing of a tool or provider can blind you to its weaknesses. When you're looking for a more private solution, you should determine what the underlying problem is and find technical solutions to that problem. For example, you may want to avoid Google Drive, which gives Google access to all of your data. The underlying problem in this case is lack of E2EE, so you should make sure that the provider you switch to actually implements E2EE, or use a tool (like Cryptomator) which provides E2EE on any cloud provider. Switching to a "privacy-focused" provider (that doesn't implement E2EE) doesn't solve your problem: it just shifts trust from Google to that provider. Focusing solely on the privacy policies and marketing of a tool or provider can blind you to its weaknesses. When you're looking for a more private solution, you should determine what the underlying problem is and find technical solutions to that problem. For example, you may want to avoid Google Drive, which gives Google access to all of your data. The underlying problem in this case is lack of E2EE, so you should make sure that the provider you switch to actually implements E2EE, or use a tool (like Cryptomator) which provides E2EE on any cloud provider. Switching to a "privacy-focused" provider (that doesn't implement E2EE) doesn't solve your problem: it just shifts trust from Google to that provider.
- "@type": Question -
"@type": Question
name: How complicated should my threat model be? name: How complicated should my threat model be?
acceptedAnswer: acceptedAnswer:
"@type": Answer "@type": Answer

View File

@ -3,12 +3,14 @@ title: "Desktop Browsers"
icon: material/laptop icon: material/laptop
description: Firefox and Brave are our recommendations for standard/non-anonymous browsing. description: Firefox and Brave are our recommendations for standard/non-anonymous browsing.
schema: schema:
- "@context": http://schema.org -
"@context": http://schema.org
"@type": WebPage "@type": WebPage
name: Private Desktop Browser Recommendations name: Private Desktop Browser Recommendations
url: "./" url: "./"
relatedLink: "../mobile-browsers/" relatedLink: "../mobile-browsers/"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": SoftwareApplication "@type": SoftwareApplication
name: Firefox name: Firefox
image: /assets/img/browsers/firefox.svg image: /assets/img/browsers/firefox.svg
@ -21,7 +23,8 @@ schema:
subjectOf: subjectOf:
"@type": WebPage "@type": WebPage
url: "./" url: "./"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": SoftwareApplication "@type": SoftwareApplication
name: Brave name: Brave
image: /assets/img/browsers/brave.svg image: /assets/img/browsers/brave.svg

View File

@ -5,7 +5,8 @@ hide:
- toc - toc
- feedback - feedback
schema: schema:
- "@context": https://schema.org -
"@context": https://schema.org
"@type": Organization "@type": Organization
"@id": https://www.privacyguides.org/ "@id": https://www.privacyguides.org/
name: Privacy Guides name: Privacy Guides
@ -18,7 +19,8 @@ schema:
- https://opencollective.com/privacyguides - https://opencollective.com/privacyguides
- https://www.youtube.com/@privacyguides - https://www.youtube.com/@privacyguides
- https://mastodon.neat.computer/@privacyguides - https://mastodon.neat.computer/@privacyguides
- "@context": https://schema.org -
"@context": https://schema.org
"@type": WebSite "@type": WebSite
name: Privacy Guides name: Privacy Guides
url: "https://www.privacyguides.org/" url: "https://www.privacyguides.org/"

View File

@ -3,12 +3,14 @@ title: "Mobile Browsers"
icon: material/cellphone-information icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
schema: schema:
- "@context": http://schema.org -
"@context": http://schema.org
"@type": WebPage "@type": WebPage
name: Private Mobile Browser Recommendations name: Private Mobile Browser Recommendations
url: "./" url: "./"
relatedLink: "../desktop-browsers/" relatedLink: "../desktop-browsers/"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": MobileApplication "@type": MobileApplication
name: Brave name: Brave
image: /assets/img/browsers/brave.svg image: /assets/img/browsers/brave.svg
@ -19,7 +21,8 @@ schema:
subjectOf: subjectOf:
"@type": WebPage "@type": WebPage
url: "./" url: "./"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": MobileApplication "@type": MobileApplication
name: Safari name: Safari
image: /assets/img/browsers/safari.svg image: /assets/img/browsers/safari.svg

View File

@ -3,11 +3,13 @@ title: "Password Managers"
icon: material/form-textbox-password icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials. description: Password managers allow you to securely store and manage passwords and other credentials.
schema: schema:
- "@context": http://schema.org -
"@context": http://schema.org
"@type": WebPage "@type": WebPage
name: Password Manager Recommendations name: Password Manager Recommendations
url: "./" url: "./"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": SoftwareApplication "@type": SoftwareApplication
name: Bitwarden name: Bitwarden
image: /assets/img/password-management/bitwarden.svg image: /assets/img/password-management/bitwarden.svg
@ -24,7 +26,8 @@ schema:
"@context": http://schema.org "@context": http://schema.org
"@type": WebPage "@type": WebPage
url: "./" url: "./"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": SoftwareApplication "@type": SoftwareApplication
name: 1Password name: 1Password
image: /assets/img/password-management/1password.svg image: /assets/img/password-management/1password.svg
@ -41,7 +44,8 @@ schema:
"@context": http://schema.org "@context": http://schema.org
"@type": WebPage "@type": WebPage
url: "./" url: "./"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": SoftwareApplication "@type": SoftwareApplication
name: Psono name: Psono
image: /assets/img/password-management/psono.svg image: /assets/img/password-management/psono.svg
@ -54,7 +58,8 @@ schema:
"@context": http://schema.org "@context": http://schema.org
"@type": WebPage "@type": WebPage
url: "./" url: "./"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": SoftwareApplication "@type": SoftwareApplication
name: KeePassXC name: KeePassXC
image: /assets/img/password-management/keepassxc.svg image: /assets/img/password-management/keepassxc.svg
@ -69,7 +74,8 @@ schema:
"@context": http://schema.org "@context": http://schema.org
"@type": WebPage "@type": WebPage
url: "./" url: "./"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": SoftwareApplication "@type": SoftwareApplication
name: KeePassDX name: KeePassDX
image: /assets/img/password-management/keepassdx.svg image: /assets/img/password-management/keepassdx.svg
@ -80,7 +86,8 @@ schema:
"@context": http://schema.org "@context": http://schema.org
"@type": WebPage "@type": WebPage
url: "./" url: "./"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": SoftwareApplication "@type": SoftwareApplication
name: Strongbox name: Strongbox
image: /assets/img/password-management/strongbox.svg image: /assets/img/password-management/strongbox.svg
@ -91,7 +98,8 @@ schema:
"@context": http://schema.org "@context": http://schema.org
"@type": WebPage "@type": WebPage
url: "./" url: "./"
- "@context": http://schema.org -
"@context": http://schema.org
"@type": SoftwareApplication "@type": SoftwareApplication
name: gopass name: gopass
image: /assets/img/password-management/gopass.svg image: /assets/img/password-management/gopass.svg