Signed-off-by: Daniel Gray <dngray@privacyguides.org>
12 KiB
title | icon | description |
---|---|---|
Navegadores Móviles | material/cellphone-information | These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. |
Estos son nuestros navegadores web para móviles y configuraciones recomendadas actualmente para la navegación estándar/no anónima por Internet. Si necesitas navegar por Internet de forma anónima, deberías utilizar Tor . En general, recomendamos mantener las extensiones al mínimo; tienen acceso privilegiado dentro de su navegador, requieren que confíe en el desarrollador, pueden hacerte destacar, y debilitar el aislamiento del sitio.
Android
En Android, Firefox es incluso menos seguro que las alternativas basadas en Chromium: El motor de Mozilla, GeckoView, aún no soporta el aislamiento de sitios ni habilita ProcesoAislado.
Brave
!!! recomendación
![Brave logo](assets/img/browsers/brave.svg){ align=right }
**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default.
Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues.
[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary }
[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" }
[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
??? notas de descarga
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser)
- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases)
Firefox
Tor Browser is the only way to truly browse the internet anonymously. Cuando uses Brave, te recomendamos cambiar la siguiente configuración para proteger tu privacidad de ciertas partes, pero todos los navegadores que no sean el navegador Tor serán rastreables por alguien en algún sentido u otro.
Estas opciones se pueden encontrar en :material-menu: → Configuración → Protecciones y privacidad de Brave
Shields
Brave includes some anti-fingerprinting measures in its Shields feature. We suggest configuring these options globally across all pages that you visit.
Brave shields global defaults
Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following:
- Selecciona Agresivo en Bloquear rastreadores y anuncios
??? warning "Use default filter lists"
Brave allows you to select additional content filters within the internal brave://adblock
page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use.
- (Opcional) Selecciona Bloquear Scripts (1)
- Selecciona Estricto, puede dañar los sitios en Bloquear fingerprint
- This option provides functionality similar to uBlock Origin's advanced blocking modes or the NoScript extension.
IPFS
- Selecciona Borrar datos al salir
Bloqueo de redes sociales
- Uncheck all social media components
Otros ajustes de privacidad
- Select Disable non-proxied UDP under WebRTC IP Handling Policy
- Uncheck Allow sites to check if you have payment methods saved
- Uncheck IPFS Gateway (1)
- Select Close tabs on exit
- Uncheck Allow privacy-preserving product analytics (P3A)
- Uncheck Automatically send diagnostic reports
- Uncheck Automatically send daily usage ping to Brave
- InterPlanetary File System (IPFS) is a decentralized, peer-to-peer network for storing and sharing data in a distributed filesystem. Unless you use the feature, disable it.
Brave Sync
Brave Sync allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
iOS
On iOS, any app that can browse the web is restricted to using an Apple-provided WebKit framework, so there is little reason to use a third-party web browser.
Safari
!!! recomendación
![Safari logo](assets/img/browsers/safari.svg){ align=right }
**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as Intelligent Tracking Protection, Privacy Report, isolated Private Browsing tabs, iCloud Private Relay, and automatic HTTPS upgrades.
[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
Firefox
These options can be found in ⚙️ Settings → Safari → Privacy and Security.
Cross-Site Tracking Prevention
- Enable Prevent Cross-Site Tracking
This enables WebKit's Intelligent Tracking Protection. The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability.
Privacy Report
Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time.
Privacy Report is accessible via the Page Settings menu.
Privacy Preserving Ad Measurement
- Disable Privacy Preserving Ad Measurement
Ad click measurement has traditionally used tracking technology that infringes on user privacy. Private Click Measurement is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy.
The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature.
Always-on Private Browsing
Open Safari and tap the Tabs button, located in the bottom right. Then, expand the Tab Groups list.
- Select Private
Safari's Private Browsing mode offers additional privacy protections. Private Browsing uses a new ephemeral session for each tab, meaning tabs are isolated from one another. There are also other smaller privacy benefits with Private Browsing, such as not sending a webpage’s address to Apple when using Safari's translation feature.
Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed into sites. This may be an inconvenience.
iCloud Sync
Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are not. Apple can decrypt and access them in accordance with their privacy policy.
You can enable E2EE for you Safari bookmarks and downloads by enabling Advanced Data Protection. Go to your Apple ID name → iCloud → Advanced Data Protection.
- Turn On Advanced Data Protection
If you use iCloud with Advanced Data Protection disabled, we also recommend checking to ensure Safari's default download location is set to locally on your device. This option can be found in ⚙️ Settings → Safari → General → Downloads.
AdGuard
!!! recomendación
![AdGuard logo](assets/img/browsers/adguard.svg){ align=right }
**AdGuard for iOS** is a free and open-source content-blocking extension for Safari that uses the native [Content Blocker API](https://developer.apple.com/documentation/safariservices/creating_a_content_blocker).
AdGuard for iOS has some premium features; however, standard Safari content blocking is free of charge.
[:octicons-home-16: Homepage](https://adguard.com/en/adguard-ios/overview.html){ .md-button .md-button--primary }
[:octicons-eye-16:](https://adguard.com/privacy/ios.html){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://kb.adguard.com/ios){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Source Code" }
??? downloads
- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162)
Additional filter lists do slow things down and may increase your attack surface, so only apply what you need.
Criteria
Please note we are not affiliated with any of the projects we recommend. In addition to our standard criteria, we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
!!! example "This section is new"
We are working on establishing defined criteria for every section of our site, and this may be subject to change. If you have any questions about our criteria, please [ask on our forum](https://discuss.privacyguides.net/latest) and don't assume we didn't consider something when making our recommendations if it is not listed here. There are many factors considered and discussed when we recommend a project, and documenting every single one is a work-in-progress.
Minimum Requirements
- Must support automatic updates.
- Must receive engine updates in 0-1 days from upstream release.
- Any changes required to make the browser more privacy-respecting should not negatively impact user experience.
- Android browsers must use the Chromium engine.
- Unfortunately, Mozilla GeckoView is still less secure than Chromium on Android.
- iOS browsers are limited to WebKit.
Extension Criteria
- Must not replicate built-in browser or OS functionality.
- Must directly impact user privacy, i.e. must not simply provide information.