Add support for localization (#995)

This commit is contained in:
Jonah Aragon 2022-04-13 19:19:13 -05:00 committed by GitHub
parent 7f71093e33
commit e39f063568
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
41 changed files with 113 additions and 150 deletions

View file

@ -1,8 +1,5 @@
---
layout: page
permalink: /terms-and-notices/
title: "Notices and Disclaimers"
description: "Privacy Guides is provided with good intentions on an "as-is" basis, without warranty, and disclaiming liability for damages."
icon: material/message-alert
hide:
- toc

View file

@ -1,8 +1,5 @@
---
layout: page
permalink: /privacy-policy/
title: "Privacy Policy"
description: "This Privacy Statement explains what information Privacy Guides and its related entities collect about its users, what we do with that information, and how we handle the content you place in our products and services."
icon: material/file-search
---

View file

@ -1,5 +1,5 @@
---
title: Browser Recommendations
title: "Web Browsers"
icon: octicons/browser-16
---
These are our current web browser recommendations and settings. We recommend keeping extensions to a minimum: they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation.

View file

@ -1,5 +1,5 @@
---
title: Calendar and Contact Sync Tools
title: "Calendar and Contact Sync"
icon: material/calendar
---
Calendaring and contacts are some of the most sensitive data posess. Use only products that use end-to-end encryption (E2EE) at rest. This prevents a provider from reading your data.

View file

@ -1,5 +1,5 @@
---
title: Cloud Storage
title: "Cloud Storage"
icon: material/file-cloud
---
If you are currently using a Cloud Storage Service like Dropbox, Google Drive, Microsoft OneDrive or Apple iCloud, you are putting complete trust in your service provider to not look at your files.

View file

@ -1,5 +1,5 @@
---
title: Email Clients
title: "Email Clients"
icon: material/email-open
---
Our recommendation list contains email clients that support both [OpenPGP](/encryption/#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](/multi-factor-authentication) and prevent account theft.

View file

@ -1,5 +1,5 @@
---
title: Private Email Providers
title: "Private Email Providers"
icon: material/email
---

View file

@ -1,5 +1,5 @@
---
title: Encryption Software
title: "Encryption Software"
icon: material/file-lock
---
Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails, or files, you should pick an option here.

View file

@ -1,5 +1,5 @@
---
title: File Sharing and Sync
title: "File Sharing and Sync"
icon: material/share-variant
---
Discover how to privately share your files between your devices, with your friends and family, or anonymously online.

View file

@ -1,5 +1,5 @@
---
template: overrides/home.html
template: overrides/home.en.html
hide:
- navigation
- toc

View file

@ -1,5 +1,5 @@
---
title: Linux
title: "Linux"
icon: fontawesome/brands/linux
---
Linux distributions are commonly recommended for privacy protection and user freedom. Below are some suggestions with some general privacy and security improvements.

View file

@ -1,5 +1,5 @@
---
title: Metadata Removal Tools
title: "Metadata Removal Tools"
icon: material/tag-remove
---
When sharing files, be sure to remove associated metadata. Image files commonly include [EXIF](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include [GPS](https://en.wikipedia.org/wiki/Global_Positioning_System) coordinates in the file metadata.

View file

@ -1,5 +1,5 @@
---
title: Multi-Factor Authenticator Recommendations
title: "Multi-Factor Authenticators"
icon: 'material/two-factor-authentication'
---
## Hardware Security Keys

View file

@ -1,5 +1,5 @@
---
title: News Aggregators
title: "News Aggregators"
icon: octicons/rss-24
---

View file

@ -1,5 +1,5 @@
---
title: Notebooks
title: "Notebooks"
icon: material/notebook-edit-outline
---

View file

@ -1,5 +1,5 @@
---
title: Password Managers
title: "Password Managers"
icon: material/form-textbox-password
---
Stay safe and secure online with an encrypted and open-source password manager.

View file

@ -1,5 +1,5 @@
---
title: Productivity Tools
title: "Productivity Tools"
icon: material/file-sign
---
Get working and collaborating without sharing your documents with a middleman or trusting a cloud provider.

View file

@ -1,5 +1,5 @@
---
title: Qubes OS
title: "Qubes OS"
icon: pg/qubes-os
---
Qubes OS is a distribution of Linux that uses [Xen](https://en.wikipedia.org/wiki/Xen) to provide app isolation.

View file

@ -1,5 +1,5 @@
---
title: Real-Time Communication Tools
title: "Real-Time Communication"
icon: material/chat-processing
---
## Encrypted Instant Messengers

View file

@ -1,5 +1,5 @@
---
title: Router Firmware
title: "Router Firmware"
icon: material/router-wireless
---
Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points etc.

View file

@ -1,5 +1,5 @@
---
title: Search Engines
title: "Search Engines"
icon: material/search-web
---
Use a search engine that doesn't build an advertising profile based on your searches.

View file

@ -1,6 +1,5 @@
---
title: Multi-factor Authentication
description: "Using strong MFA can stop over 99% of unauthorized account accesses, and it's easy to set up on the services you already use."
title: "Multi-factor Authentication"
icon: 'material/two-factor-authentication'
---
**Multi-factor authentication** (MFA, or 2FA) is a security mechanism that requires additional steps beyond entering your username (or email) and password. The most common method are time limited codes you might receive from an SMS or app.

View file

@ -1,5 +1,5 @@
---
title: Self-Contained Networks
title: "Self-Contained Networks"
icon: material/security-network
---
If you are currently browsing clearnet and want to access the dark web, this section is for you.

View file

@ -1,6 +1,5 @@
---
title: Integrating Metadata Removal
description: "Guides for integrating metadata removal solutions in a native fashion."
title: "Integrating Metadata Removal"
icon: 'material/data-matrix-remove'
---

View file

@ -1,6 +1,5 @@
---
layout: evergreen
title: What are threat models?
title: "What are threat models?"
icon: 'material/target-account'
---

View file

@ -1,5 +1,5 @@
---
title: Recommended Privacy Tools
title: "Privacy Tools"
icon: material/tools
hide:
- toc

View file

@ -1,5 +1,5 @@
---
title: Video Streaming
title: "Video Streaming"
icon: material/video-wireless
---
The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](/vpn) or [Tor](https://www.torproject.org/) to make it harder to profile your usage.

View file

@ -1,5 +1,5 @@
---
title: VPN Services
title: "VPN Services"
icon: material/vpn
---