From: Soren Stoutner Date: Thu, 29 Oct 2020 22:09:07 +0000 (-0700) Subject: Combine the light and dark Guide and About pages. https://redmine.stoutner.com/issue... X-Git-Tag: v3.6~7 X-Git-Url: https://gitweb.stoutner.com/?a=commitdiff_plain;h=39380e8e8bdb3b9e29569a263277c9c3112b44ac;p=PrivacyBrowserAndroid.git Combine the light and dark Guide and About pages. https://redmine.stoutner.com/issues/368 --- diff --git a/.idea/compiler.xml b/.idea/compiler.xml index 9a8b7e5c..8144c3cf 100644 --- a/.idea/compiler.xml +++ b/.idea/compiler.xml @@ -1,8 +1,6 @@ - \ No newline at end of file diff --git a/.idea/dictionaries/soren.xml b/.idea/dictionaries/soren.xml index 60111a3f..9e0f62ac 100644 --- a/.idea/dictionaries/soren.xml +++ b/.idea/dictionaries/soren.xml @@ -37,6 +37,7 @@ cname commitdiff coordinatorlayout + cors customuseragent daeef databaseview @@ -71,6 +72,7 @@ fbee fdfilter fdid + ffffff fileprovider firebase flohic diff --git a/.idea/gradle.xml b/.idea/gradle.xml index 74e816d0..ec19cd7e 100644 --- a/.idea/gradle.xml +++ b/.idea/gradle.xml @@ -16,6 +16,7 @@ diff --git a/.idea/misc.xml b/.idea/misc.xml index 419007b0..eccecb07 100644 --- a/.idea/misc.xml +++ b/.idea/misc.xml @@ -35,7 +35,7 @@ - + diff --git a/.idea/modules.xml b/.idea/modules.xml index 93f58a3b..6ece7516 100644 --- a/.idea/modules.xml +++ b/.idea/modules.xml @@ -2,8 +2,8 @@ - - + + \ No newline at end of file diff --git a/app/build.gradle b/app/build.gradle index 595aab29..e54b4408 100644 --- a/app/build.gradle +++ b/app/build.gradle @@ -84,7 +84,7 @@ dependencies { implementation 'androidx.coordinatorlayout:coordinatorlayout:1.1.0' implementation "androidx.core:core-ktx:1.3.2" implementation 'androidx.drawerlayout:drawerlayout:1.1.1' - implementation 'androidx.preference:preference:1.1.1' + implementation 'androidx.preference:preference-ktx:1.1.1' implementation 'androidx.swiperefreshlayout:swiperefreshlayout:1.1.0' implementation 'androidx.viewpager:viewpager:1.0.0' implementation 'androidx.webkit:webkit:1.3.0' @@ -96,5 +96,5 @@ dependencies { implementation 'com.google.android.material:material:1.2.1' // Only compile Firebase ads for the free flavor. - freeImplementation 'com.google.firebase:firebase-ads:19.4.0' + freeImplementation 'com.google.firebase:firebase-ads:19.5.0' } \ No newline at end of file diff --git a/app/src/free/assets/de/about_permissions.html b/app/src/free/assets/de/about_permissions.html new file mode 100644 index 00000000..960b4f54 --- /dev/null +++ b/app/src/free/assets/de/about_permissions.html @@ -0,0 +1,80 @@ + + + + + + + + + + + + + +

Voller Netzwerkzugriff

+

android.permission.INTERNET

+

Benötigt, damit WebView das Internet nutzen kann. Ohne diese Berechtigung wäre Privacy Browser “Kein Browser: Schützt Ihre Privatsphäre durch Fernbleiben von jeglicher Konnektivität”.

+ +

Verknüpfungen installieren

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

Benötigt, um Verknüpfungen zu Websites auf Ihrer Startseite zu erstellen.

+ +

Speicher lesen

+

android.permission.READ_EXTERNAL_STORAGE

+

Benötigt, um Einstellungen aus öffentlichen Ordnern zu importieren. + Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen nur aus seinem eigenen Ordner importieren, wenn diese Berechtigung nicht erteilt wird.

+ +

Speicher schreiben

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Benötigt, um Einstellungen und Downloads in öffentlichen Ordnern zu speichern. + Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen und Downloads nur in seinem eigenen Ordner speichern, wenn diese Berechtigung nicht erteilt wird.

+ +
+
+
+ +

Zusätzlich zu den oben genannten Berechtigungen zeigt Privacy Browser Free Werbeanzeigen von Google's AdMob-Netzwerk unter Zuhilfenahme des Firebase-Backends. + Für die "Kostenlos"-Plakette ergänzt Firebase die Liste der Berechtigungen um die Folgenden, + obwohl diese nicht im Quellcode der Manifest-Datei + von Privacy Browser aufgeführt werden:

+ +

Netzwerk-Verbindungen anzeigen

+

android.permission.ACCESS_NETWORK_STATE

+

Erlaubt den Werbeanzeigen mitzuteilen, wenn das Gerät mit dem Internet verbunden ist und wann nicht (vermutlich damit nicht versucht wird, Werbeanzeigen neu zu laden, wenn keine Verbindung besteht). + Diese können auch mitteilen, ob eine Verbindung via WLAN, 2G, 3G, 4G, usw. besteht.

+ +

Schlaf-Modus des Telefons verhindern

+

android.permission.WAKE_LOCK

+

Erlaubt den Werbeanzeigen, das Gerät nicht in den Schlaf-Modus zu versetzen und das Display nicht zu dimmen. In Stoutners Tests konnte dieses Verhalten nicht festgestellt werden.

+ +

Play Install Referrer API

+

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

+

Erlaubt anderen Apps mitzuteilen, ob ihre Installation über eine Werbeanzeige innerhalb von Privacy Browser Free ausgelöst wurde.

+ +

Daten aus Internet empfangen

+

com.google.android.c2dm.permission.RECEIVE

+

Erlaubt Google Informationen direkt an AdView zu senden, ohne dass zuvor eine entsprechende Anfrage getätigt wurde (cloud-to-device messaging).

+ + \ No newline at end of file diff --git a/app/src/free/assets/de/about_permissions_dark.html b/app/src/free/assets/de/about_permissions_dark.html deleted file mode 100644 index d9355fc0..00000000 --- a/app/src/free/assets/de/about_permissions_dark.html +++ /dev/null @@ -1,77 +0,0 @@ - - - - - - - - - - -

Voller Netzwerkzugriff

-

android.permission.INTERNET

-

Benötigt, damit WebView das Internet nutzen kann. Ohne diese Berechtigung wäre Privacy Browser “Kein Browser: Schützt Ihre Privatsphäre durch Fernbleiben von jeglicher Konnektivität”.

- -

Verknüpfungen installieren

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Benötigt, um Verknüpfungen zu Websites auf Ihrer Startseite zu erstellen.

- -

Speicher lesen

-

android.permission.READ_EXTERNAL_STORAGE

-

Benötigt, um Einstellungen aus öffentlichen Ordnern zu importieren. - Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen nur aus seinem eigenen Ordner importieren, wenn diese Berechtigung nicht erteilt wird.

- -

Speicher schreiben

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Benötigt, um Einstellungen und Downloads in öffentlichen Ordnern zu speichern. - Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen und Downloads nur in seinem eigenen Ordner speichern, wenn diese Berechtigung nicht erteilt wird.

- -
-
-
- -

Zusätzlich zu den oben genannten Berechtigungen zeigt Privacy Browser Free Werbeanzeigen von Google's AdMob-Netzwerk unter Zuhilfenahme des Firebase-Backends. - Für die "Kostenlos"-Plakette ergänzt Firebase die Liste der Berechtigungen um die Folgenden, - obwohl diese nicht im Quellcode der Manifest-Datei - von Privacy Browser aufgeführt werden:

- -

Netzwerk-Verbindungen anzeigen

-

android.permission.ACCESS_NETWORK_STATE

-

Erlaubt den Werbeanzeigen mitzuteilen, wenn das Gerät mit dem Internet verbunden ist und wann nicht (vermutlich damit nicht versucht wird, Werbeanzeigen neu zu laden, wenn keine Verbindung besteht). - Diese können auch mitteilen, ob eine Verbindung via WLAN, 2G, 3G, 4G, usw. besteht.

- -

Schlaf-Modus des Telefons verhindern

-

android.permission.WAKE_LOCK

-

Erlaubt den Werbeanzeigen, das Gerät nicht in den Schlaf-Modus zu versetzen und das Display nicht zu dimmen. In Stoutners Tests konnte dieses Verhalten nicht festgestellt werden.

- -

Play Install Referrer API

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Erlaubt anderen Apps mitzuteilen, ob ihre Installation über eine Werbeanzeige innerhalb von Privacy Browser Free ausgelöst wurde.

- -

Daten aus Internet empfangen

-

com.google.android.c2dm.permission.RECEIVE

-

Erlaubt Google Informationen direkt an AdView zu senden, ohne dass zuvor eine entsprechende Anfrage getätigt wurde (cloud-to-device messaging).

- - \ No newline at end of file diff --git a/app/src/free/assets/de/about_permissions_light.html b/app/src/free/assets/de/about_permissions_light.html deleted file mode 100644 index 1715f999..00000000 --- a/app/src/free/assets/de/about_permissions_light.html +++ /dev/null @@ -1,77 +0,0 @@ - - - - - - - - - - -

Voller Netzwerkzugriff

-

android.permission.INTERNET

-

Benötigt, damit WebView das Internet nutzen kann. Ohne diese Berechtigung wäre Privacy Browser “Kein Browser: Schützt Ihre Privatsphäre durch Fernbleiben von jeglicher Konnektivität”.

- -

Verknüpfungen installieren

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Benötigt, um Verknüpfungen zu Websites auf Ihrer Startseite zu erstellen.

- -

Speicher lesen

-

android.permission.READ_EXTERNAL_STORAGE

-

Benötigt, um Einstellungen aus öffentlichen Ordnern zu importieren. - Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen nur aus seinem eigenen Ordner importieren, wenn diese Berechtigung nicht erteilt wird.

- -

Speicher schreiben

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Benötigt, um Einstellungen und Downloads in öffentlichen Ordnern zu speichern. - Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen und Downloads nur in seinem eigenen Ordner speichern, wenn diese Berechtigung nicht erteilt wird.

- -
-
-
- -

Zusätzlich zu den oben genannten Berechtigungen zeigt Privacy Browser Free Werbeanzeigen von Google's AdMob-Netzwerk unter Zuhilfenahme des Firebase-Backends. - Für die "Kostenlos"-Plakette ergänzt Firebase die Liste der Berechtigungen um die Folgenden, - obwohl diese nicht im Quellcode der Manifest-Datei - von Privacy Browser aufgeführt werden:

- -

Netzwerk-Verbindungen anzeigen

-

android.permission.ACCESS_NETWORK_STATE

-

Erlaubt den Werbeanzeigen mitzuteilen, wenn das Gerät mit dem Internet verbunden ist und wann nicht (vermutlich damit nicht versucht wird, Werbeanzeigen neu zu laden, wenn keine Verbindung besteht). - Diese können auch mitteilen, ob eine Verbindung via WLAN, 2G, 3G, 4G, usw. besteht.

- -

Schlaf-Modus des Telefons verhindern

-

android.permission.WAKE_LOCK

-

Erlaubt den Werbeanzeigen, das Gerät nicht in den Schlaf-Modus zu versetzen und das Display nicht zu dimmen. In Stoutners Tests konnte dieses Verhalten nicht festgestellt werden.

- -

Play Install Referrer API

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Erlaubt anderen Apps mitzuteilen, ob ihre Installation über eine Werbeanzeige innerhalb von Privacy Browser Free ausgelöst wurde.

- -

Daten aus Internet empfangen

-

com.google.android.c2dm.permission.RECEIVE

-

Erlaubt Google Informationen direkt an AdView zu senden, ohne dass zuvor eine entsprechende Anfrage getätigt wurde (cloud-to-device messaging).

- - \ No newline at end of file diff --git a/app/src/free/assets/de/about_privacy_policy.html b/app/src/free/assets/de/about_privacy_policy.html new file mode 100644 index 00000000..5060287c --- /dev/null +++ b/app/src/free/assets/de/about_privacy_policy.html @@ -0,0 +1,107 @@ + + + + + + + + + + + + + +

Privacy Browser Free

+

Privacy Browser Free sammelt keinerlei Benutzer-Informationen.

+ +

Google Play

+

Google Play hat seine eigene Datenschutzerklärung. + Google stellt Entwicklern anonymisierte Installations-Informationen inklusive der Anzahl der Installationen unterteilt in die folgenden Kategorien bereit:

+
    +
  • Android-Version (z.B. Android 7.1)
  • +
  • Gerät (z.B. Samsung Galaxy S6 [zeroflte])
  • +
  • Tablets (z.B. 10"-Tablet oder höher)
  • +
  • Land (z.B. USA)
  • +
  • Sprache (z.B. Englisch [USA])
  • +
  • App-Version (z.B. 14)
  • +
  • Mobilfunk-Anbieter (z.B. T-Mobile - US)
  • +
+ + +

Google Play Bewertungen

+

Google Play hat seine eigene Datenschutzerklärung. + Google stellt Entwicklern folgende anonymisierte Installations-Informationen bezüglich der Bewertungen bereit:

+
    +
  • Land (z.B. USA)
  • +
  • Sprache (z.B. Englisch)
  • +
  • App-Version (z.B. 14)
  • +
  • Android-Version (z.B. Android 7.1)
  • +
  • Gerät (z.B. Google Nexus 5X [bullhead])
  • +
  • Tablets (z.B. 10"-Tablet oder höher)
  • +
+ + +

Google Play Rezensionen

+

Google Play hat seine eigene Datenschutzerklärung. + Zusätzlich zum Namen des Rezensenten, der Bewertung und dem Text der Rezension (welche alle öffentlich zugänglich sind), + stellt Google dem Entwickler einige oder alle der folgenden Informationen zur Verfügung:

+
    +
  • Versions-Code (z.B. 7)
  • +
  • Versions-Name (z.B. 1.6)
  • +
  • Android-Version (z.B. Android 5.1)
  • +
  • Gerät (z.B. Galaxy S6 Edge+ [zenlte])
  • +
  • Hersteller (z.B. Samsung)
  • +
  • Gerätetyp (z.B. Mobiltelefon)
  • +
  • CPU-Fabrikat (z.B. Samsung)
  • +
  • CPU-Model (z.B. Exynos 7420)
  • +
  • Bildschirm-Auflösung (z.B. 560 dpi)
  • +
  • Bildschirm-Grösse (z.B. 2560 x 1440)
  • +
  • RAM (z.B. 4096 MB)
  • +
  • Native Plattform (z.B. armeabi-v7a,armeabi,arm64v8a)
  • +
  • OpenGL ES Version (z.B. 3.1)
  • +
  • Geräte-Sprache (z.B. Englisch)
  • +
+ + +

Werbeeinblendungen

+

Privacy Browser Free blendet einen Werbebanner unten am Bildschirm ein und verwendet hierfür Googles Netzwerk AdMob, + dessen eigene Datenschutzbestimmungen hier zu finden sind. + Die Ausspielung dieser Werbebanner erfolgt dabei nicht-personalisiert. + AdMob überträgt zudem anonymisierte Zusammenfassungen folgender Informationen an die Entwickler:

+
    +
  • Totale Besuche
  • +
  • Totale Klicks
  • +
  • Platform (z.B. High-End Smartphones, Tablets)
  • +
  • Aktivitäten nach Ländern
  • +
+ + +

Direkte Kommunikation

+

Benutzer können z.B. per Email und Kommentaren auf stoutner.com direkt mit Stoutner Kontakt aufnehmen.

+ +

Daten-Nutzung

+

Stoutner kann diese Informationen nutzen, um die Entwicklung von Privacy Browser zu unterstützen und den Status des Projekts an Benutzer zu melden. + Stoutner wird die Informationen niemals verkaufen oder an Dritte weitergeben, welche diese für Anzeigen oder Marketing nutzen.

+ +
+

Revision 1.7, 14. Mai 2019

+ + \ No newline at end of file diff --git a/app/src/free/assets/de/about_privacy_policy_dark.html b/app/src/free/assets/de/about_privacy_policy_dark.html deleted file mode 100644 index 49fed27d..00000000 --- a/app/src/free/assets/de/about_privacy_policy_dark.html +++ /dev/null @@ -1,104 +0,0 @@ - - - - - - - - - - -

Privacy Browser Free

-

Privacy Browser Free sammelt keinerlei Benutzer-Informationen.

- -

Google Play

-

Google Play hat seine eigene Datenschutzerklärung. - Google stellt Entwicklern anonymisierte Installations-Informationen inklusive der Anzahl der Installationen unterteilt in die folgenden Kategorien bereit:

-
    -
  • Android-Version (z.B. Android 7.1)
  • -
  • Gerät (z.B. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablets (z.B. 10"-Tablet oder höher)
  • -
  • Land (z.B. USA)
  • -
  • Sprache (z.B. Englisch [USA])
  • -
  • App-Version (z.B. 14)
  • -
  • Mobilfunk-Anbieter (z.B. T-Mobile - US)
  • -
- - -

Google Play Bewertungen

-

Google Play hat seine eigene Datenschutzerklärung. - Google stellt Entwicklern folgende anonymisierte Installations-Informationen bezüglich der Bewertungen bereit:

-
    -
  • Land (z.B. USA)
  • -
  • Sprache (z.B. Englisch)
  • -
  • App-Version (z.B. 14)
  • -
  • Android-Version (z.B. Android 7.1)
  • -
  • Gerät (z.B. Google Nexus 5X [bullhead])
  • -
  • Tablets (z.B. 10"-Tablet oder höher)
  • -
- - -

Google Play Rezensionen

-

Google Play hat seine eigene Datenschutzerklärung. - Zusätzlich zum Namen des Rezensenten, der Bewertung und dem Text der Rezension (welche alle öffentlich zugänglich sind), - stellt Google dem Entwickler einige oder alle der folgenden Informationen zur Verfügung:

-
    -
  • Versions-Code (z.B. 7)
  • -
  • Versions-Name (z.B. 1.6)
  • -
  • Android-Version (z.B. Android 5.1)
  • -
  • Gerät (z.B. Galaxy S6 Edge+ [zenlte])
  • -
  • Hersteller (z.B. Samsung)
  • -
  • Gerätetyp (z.B. Mobiltelefon)
  • -
  • CPU-Fabrikat (z.B. Samsung)
  • -
  • CPU-Model (z.B. Exynos 7420)
  • -
  • Bildschirm-Auflösung (z.B. 560 dpi)
  • -
  • Bildschirm-Grösse (z.B. 2560 x 1440)
  • -
  • RAM (z.B. 4096 MB)
  • -
  • Native Plattform (z.B. armeabi-v7a,armeabi,arm64v8a)
  • -
  • OpenGL ES Version (z.B. 3.1)
  • -
  • Geräte-Sprache (z.B. Englisch)
  • -
- - -

Werbeeinblendungen

-

Privacy Browser Free blendet einen Werbebanner unten am Bildschirm ein und verwendet hierfür Googles Netzwerk AdMob, - dessen eigene Datenschutzbestimmungen hier zu finden sind. - Die Ausspielung dieser Werbebanner erfolgt dabei nicht-personalisiert. - AdMob überträgt zudem anonymisierte Zusammenfassungen folgender Informationen an die Entwickler:

-
    -
  • Totale Besuche
  • -
  • Totale Klicks
  • -
  • Platform (z.B. High-End Smartphones, Tablets)
  • -
  • Aktivitäten nach Ländern
  • -
- - -

Direkte Kommunikation

-

Benutzer können z.B. per Email und Kommentaren auf stoutner.com direkt mit Stoutner Kontakt aufnehmen.

- -

Daten-Nutzung

-

Stoutner kann diese Informationen nutzen, um die Entwicklung von Privacy Browser zu unterstützen und den Status des Projekts an Benutzer zu melden. - Stoutner wird die Informationen niemals verkaufen oder an Dritte weitergeben, welche diese für Anzeigen oder Marketing nutzen.

- -
-

Revision 1.7, 14. Mai 2019

- - \ No newline at end of file diff --git a/app/src/free/assets/de/about_privacy_policy_light.html b/app/src/free/assets/de/about_privacy_policy_light.html deleted file mode 100644 index 43382b10..00000000 --- a/app/src/free/assets/de/about_privacy_policy_light.html +++ /dev/null @@ -1,104 +0,0 @@ - - - - - - - - - - -

Privacy Browser Free

-

Privacy Browser Free sammelt keinerlei Benutzer-Informationen.

- -

Google Play

-

Google Play hat seine eigene Datenschutzerklärung. - Google stellt Entwicklern anonymisierte Installations-Informationen inklusive der Anzahl der Installationen unterteilt in die folgenden Kategorien bereit:

-
    -
  • Android-Version (z.B. Android 7.1)
  • -
  • Gerät (z.B. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablets (z.B. 10"-Tablet oder höher)
  • -
  • Land (z.B. USA)
  • -
  • Sprache (z.B. Englisch [USA])
  • -
  • App-Version (z.B. 14)
  • -
  • Mobilfunk-Anbieter (z.B. T-Mobile - US)
  • -
- - -

Google Play Bewertungen

-

Google Play hat seine eigene Datenschutzerklärung. - Google stellt Entwicklern folgende anonymisierte Installations-Informationen bezüglich der Bewertungen bereit:

-
    -
  • Land (z.B. USA)
  • -
  • Sprache (z.B. Englisch)
  • -
  • App-Version (z.B. 14)
  • -
  • Android-Version (z.B. Android 7.1)
  • -
  • Gerät (z.B. Google Nexus 5X [bullhead])
  • -
  • Tablets (z.B. 10"-Tablet oder höher)
  • -
- - -

Google Play Rezensionen

-

Google Play hat seine eigene Datenschutzerklärung. - Zusätzlich zum Namen des Rezensenten, der Bewertung und dem Text der Rezension (welche alle öffentlich zugänglich sind), - stellt Google dem Entwickler einige oder alle der folgenden Informationen zur Verfügung:

-
    -
  • Versions-Code (z.B. 7)
  • -
  • Versions-Name (z.B. 1.6)
  • -
  • Android-Version (z.B. Android 5.1)
  • -
  • Gerät (z.B. Galaxy S6 Edge+ [zenlte])
  • -
  • Hersteller (z.B. Samsung)
  • -
  • Gerätetyp (z.B. Mobiltelefon)
  • -
  • CPU-Fabrikat (z.B. Samsung)
  • -
  • CPU-Model (z.B. Exynos 7420)
  • -
  • Bildschirm-Auflösung (z.B. 560 dpi)
  • -
  • Bildschirm-Grösse (z.B. 2560 x 1440)
  • -
  • RAM (z.B. 4096 MB)
  • -
  • Native Plattform (z.B. armeabi-v7a,armeabi,arm64v8a)
  • -
  • OpenGL ES Version (z.B. 3.1)
  • -
  • Geräte-Sprache (z.B. Englisch)
  • -
- - -

Werbeeinblendungen

-

Privacy Browser Free blendet einen Werbebanner unten am Bildschirm ein und verwendet hierfür Googles Netzwerk AdMob, - dessen eigene Datenschutzbestimmungen hier zu finden sind. - Die Ausspielung dieser Werbebanner erfolgt dabei nicht-personalisiert. - AdMob überträgt zudem anonymisierte Zusammenfassungen folgender Informationen an die Entwickler:

-
    -
  • Totale Besuche
  • -
  • Totale Klicks
  • -
  • Platform (z.B. High-End Smartphones, Tablets)
  • -
  • Aktivitäten nach Ländern
  • -
- - -

Direkte Kommunikation

-

Benutzer können z.B. per Email und Kommentaren auf stoutner.com direkt mit Stoutner Kontakt aufnehmen.

- -

Daten-Nutzung

-

Stoutner kann diese Informationen nutzen, um die Entwicklung von Privacy Browser zu unterstützen und den Status des Projekts an Benutzer zu melden. - Stoutner wird die Informationen niemals verkaufen oder an Dritte weitergeben, welche diese für Anzeigen oder Marketing nutzen.

- -
-

Revision 1.7, 14. Mai 2019

- - \ No newline at end of file diff --git a/app/src/free/assets/en/about_permissions.html b/app/src/free/assets/en/about_permissions.html new file mode 100644 index 00000000..f3c36391 --- /dev/null +++ b/app/src/free/assets/en/about_permissions.html @@ -0,0 +1,72 @@ + + + + + + + + + + + + + +

Have full network access

+

android.permission.INTERNET

+

Required for the WebView to access the internet. Without this permission, Privacy Browser would be “No Browser: Protecting Your Privacy by Staying Completely Off the Internet”.

+ +

Install shortcuts

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

Required to add shortcuts for websites to the launcher desktop.

+ +

Read storage

+

android.permission.READ_EXTERNAL_STORAGE

+

Required to import settings from public folders. On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can import settings from the app’s folders instead.

+ +

Write storage

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Required to export settings and download files to the public folders. + On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can export settings and store downloads in the app’s folders instead.

+ +
+
+
+ +

In addition, Privacy Browser Free displays ads from Google’s AdMob network using the Firebase backend. + For the free flavor, Firebase adds the following permissions even though they are not listed in the source code + manifest file.

+ +

View network connections

+

android.permission.ACCESS_NETWORK_STATE

+

Allows the ads to tell when you are connected to the internet and when you aren’t (presumably so they don’t try to reload an ad when you are disconnected). + They can also tell if you are connected via Wi-Fi, 2G, 3G, 4G, etc.

+ +

Prevent phone from sleeping

+

android.permission.WAKE_LOCK

+

Allows the ads to keep the processor from sleeping and the screen from dimming, although in my testing I don’t think the ads actually do this.

+ +

Play Install Referrer API

+

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

+

Allows other apps to tell if their installation was launched from an ad in Privacy Browser Free.

+ +

Receive data from Internet

+

com.google.android.c2dm.permission.RECEIVE

+

Allows Google to send information directly to the AdView without having to receive a request first (cloud-to-device messaging).

+ + \ No newline at end of file diff --git a/app/src/free/assets/en/about_permissions_dark.html b/app/src/free/assets/en/about_permissions_dark.html deleted file mode 100644 index 3e1908b5..00000000 --- a/app/src/free/assets/en/about_permissions_dark.html +++ /dev/null @@ -1,69 +0,0 @@ - - - - - - - - - - -

Have full network access

-

android.permission.INTERNET

-

Required for the WebView to access the internet. Without this permission, Privacy Browser would be “No Browser: Protecting Your Privacy by Staying Completely Off the Internet”.

- -

Install shortcuts

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Required to add shortcuts for websites to the launcher desktop.

- -

Read storage

-

android.permission.READ_EXTERNAL_STORAGE

-

Required to import settings from public folders. On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can import settings from the app’s folders instead.

- -

Write storage

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Required to export settings and download files to the public folders. - On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can export settings and store downloads in the app’s folders instead.

- -
-
-
- -

In addition, Privacy Browser Free displays ads from Google’s AdMob network using the Firebase backend. - For the free flavor, Firebase adds the following permissions even though they are not listed in the source code - manifest file.

- -

View network connections

-

android.permission.ACCESS_NETWORK_STATE

-

Allows the ads to tell when you are connected to the internet and when you aren’t (presumably so they don’t try to reload an ad when you are disconnected). - They can also tell if you are connected via Wi-Fi, 2G, 3G, 4G, etc.

- -

Prevent phone from sleeping

-

android.permission.WAKE_LOCK

-

Allows the ads to keep the processor from sleeping and the screen from dimming, although in my testing I don’t think the ads actually do this.

- -

Play Install Referrer API

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Allows other apps to tell if their installation was launched from an ad in Privacy Browser Free.

- -

Receive data from Internet

-

com.google.android.c2dm.permission.RECEIVE

-

Allows Google to send information directly to the AdView without having to receive a request first (cloud-to-device messaging).

- - \ No newline at end of file diff --git a/app/src/free/assets/en/about_permissions_light.html b/app/src/free/assets/en/about_permissions_light.html deleted file mode 100644 index 550aee3f..00000000 --- a/app/src/free/assets/en/about_permissions_light.html +++ /dev/null @@ -1,69 +0,0 @@ - - - - - - - - - - -

Have full network access

-

android.permission.INTERNET

-

Required for the WebView to access the internet. Without this permission, Privacy Browser would be “No Browser: Protecting Your Privacy by Staying Completely Off the Internet”.

- -

Install shortcuts

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Required to add shortcuts for websites to the launcher desktop.

- -

Read storage

-

android.permission.READ_EXTERNAL_STORAGE

-

Required to import settings from public folders. On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can import settings from the app’s folders instead.

- -

Write storage

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Required to export settings and download files to the public folders. - On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can export settings and store downloads in the app’s folders instead.

- -
-
-
- -

In addition, Privacy Browser Free displays ads from Google’s AdMob network using the Firebase backend. - For the free flavor, Firebase adds the following permissions even though they are not listed in the source code - manifest file.

- -

View network connections

-

android.permission.ACCESS_NETWORK_STATE

-

Allows the ads to tell when you are connected to the internet and when you aren’t (presumably so they don’t try to reload an ad when you are disconnected). - They can also tell if you are connected via Wi-Fi, 2G, 3G, 4G, etc.

- -

Prevent phone from sleeping

-

android.permission.WAKE_LOCK

-

Allows the ads to keep the processor from sleeping and the screen from dimming, although in my testing I don’t think the ads actually do this.

- -

Play Install Referrer API

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Allows other apps to tell if their installation was launched from an ad in Privacy Browser Free.

- -

Receive data from Internet

-

com.google.android.c2dm.permission.RECEIVE

-

Allows Google to send information directly to the AdView without having to receive a request first (cloud-to-device messaging).

- - \ No newline at end of file diff --git a/app/src/free/assets/en/about_privacy_policy.html b/app/src/free/assets/en/about_privacy_policy.html new file mode 100644 index 00000000..0ec033a6 --- /dev/null +++ b/app/src/free/assets/en/about_privacy_policy.html @@ -0,0 +1,106 @@ + + + + + + + + + + + + + +

Privacy Browser Free

+

Privacy Browser Free does not collect any user information.

+ + +

Google Play

+

Google Play has its own privacy policy. + Google provides anonymized summary installation information to developers, including the number of installs organized by the following categories.

+
    +
  • Android version (eg. Android 7.1)
  • +
  • Device (eg. Samsung Galaxy S6 [zeroflte])
  • +
  • Tablets (eg. Tablets 10" and above)
  • +
  • Country (eg. United States)
  • +
  • Language (eg. English [United States])
  • +
  • App version (eg. 14)
  • +
  • Carrier (eg. T-Mobile - US)
  • +
+ + +

Google Play Ratings

+

Google Play has its own privacy policy. + Google provides developers with anonymized summaries of the following information related to user ratings.

+
    +
  • Country (eg. United States)
  • +
  • Language (eg. English)
  • +
  • App version (eg. 14)
  • +
  • Android version (eg. Android 7.1)
  • +
  • Device (eg. Google Nexus 5X [bullhead])
  • +
  • Tablets (eg. Tablets 10" and above)
  • +
+ + +

Google Play Reviews

+

Google Play has its own privacy policy. + In addition to the name of the reviewer, the rating, and the text of the review (which are all available publicly), Google provides some or all of the following information to the developer.

+
    +
  • Version code (eg. 7)
  • +
  • Version name (eg. 1.6)
  • +
  • Android version (eg. Android 5.1)
  • +
  • Device (eg. Galaxy S6 Edge+ [zenlte])
  • +
  • Manufacturer (eg. Samsung)
  • +
  • Device type (eg. Phone)
  • +
  • CPU make (eg. Samsung)
  • +
  • CPU model (eg. Exynos 7420)
  • +
  • Screen density (eg. 560 dpi)
  • +
  • Screen size (eg. 2560 x 1440)
  • +
  • RAM (eg. 4096 MB)
  • +
  • Native platform (eg. armeabi-v7a,armeabi,arm64v8a)
  • +
  • OpenGL ES version (eg. 3.1)
  • +
  • Device language (eg. English)
  • +
+ + +

Advertisements

+

Privacy Browser Free displays a banner ad across the bottom of the screen using Google's AdMob network, + which has its own privacy policy. + These ads are set to be non-personalized. + AdMob reports anonymized summaries of the following information to developers.

+
    +
  • Total impressions
  • +
  • Total clicks
  • +
  • Platforms (eg. high-end mobile devices, tablets)
  • +
  • Activity by country
  • +
+ + +

Direct Communications

+

Users may choose to send direct communications to Stoutner, like email messages and comments on stoutner.com.

+ + +

Use of Information

+

Stoutner may use this information to assist in the development of Privacy Browser and communicate the status of the project to users. + Stoutner will never sell this information nor transfer it to any third party that would use it for advertising or marketing.

+ +
+

Revision 1.7, 14 May 2019

+ + \ No newline at end of file diff --git a/app/src/free/assets/en/about_privacy_policy_dark.html b/app/src/free/assets/en/about_privacy_policy_dark.html deleted file mode 100644 index b4cc930a..00000000 --- a/app/src/free/assets/en/about_privacy_policy_dark.html +++ /dev/null @@ -1,103 +0,0 @@ - - - - - - - - - - -

Privacy Browser Free

-

Privacy Browser Free does not collect any user information.

- - -

Google Play

-

Google Play has its own privacy policy. - Google provides anonymized summary installation information to developers, including the number of installs organized by the following categories.

-
    -
  • Android version (eg. Android 7.1)
  • -
  • Device (eg. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablets (eg. Tablets 10" and above)
  • -
  • Country (eg. United States)
  • -
  • Language (eg. English [United States])
  • -
  • App version (eg. 14)
  • -
  • Carrier (eg. T-Mobile - US)
  • -
- - -

Google Play Ratings

-

Google Play has its own privacy policy. - Google provides developers with anonymized summaries of the following information related to user ratings.

-
    -
  • Country (eg. United States)
  • -
  • Language (eg. English)
  • -
  • App version (eg. 14)
  • -
  • Android version (eg. Android 7.1)
  • -
  • Device (eg. Google Nexus 5X [bullhead])
  • -
  • Tablets (eg. Tablets 10" and above)
  • -
- - -

Google Play Reviews

-

Google Play has its own privacy policy. - In addition to the name of the reviewer, the rating, and the text of the review (which are all available publicly), Google provides some or all of the following information to the developer.

-
    -
  • Version code (eg. 7)
  • -
  • Version name (eg. 1.6)
  • -
  • Android version (eg. Android 5.1)
  • -
  • Device (eg. Galaxy S6 Edge+ [zenlte])
  • -
  • Manufacturer (eg. Samsung)
  • -
  • Device type (eg. Phone)
  • -
  • CPU make (eg. Samsung)
  • -
  • CPU model (eg. Exynos 7420)
  • -
  • Screen density (eg. 560 dpi)
  • -
  • Screen size (eg. 2560 x 1440)
  • -
  • RAM (eg. 4096 MB)
  • -
  • Native platform (eg. armeabi-v7a,armeabi,arm64v8a)
  • -
  • OpenGL ES version (eg. 3.1)
  • -
  • Device language (eg. English)
  • -
- - -

Advertisements

-

Privacy Browser Free displays a banner ad across the bottom of the screen using Google's AdMob network, - which has its own privacy policy. - These ads are set to be non-personalized. - AdMob reports anonymized summaries of the following information to developers.

-
    -
  • Total impressions
  • -
  • Total clicks
  • -
  • Platforms (eg. high-end mobile devices, tablets)
  • -
  • Activity by country
  • -
- - -

Direct Communications

-

Users may choose to send direct communications to Stoutner, like email messages and comments on stoutner.com.

- - -

Use of Information

-

Stoutner may use this information to assist in the development of Privacy Browser and communicate the status of the project to users. - Stoutner will never sell this information nor transfer it to any third party that would use it for advertising or marketing.

- -
-

Revision 1.7, 14 May 2019

- - \ No newline at end of file diff --git a/app/src/free/assets/en/about_privacy_policy_light.html b/app/src/free/assets/en/about_privacy_policy_light.html deleted file mode 100644 index 2a469bb5..00000000 --- a/app/src/free/assets/en/about_privacy_policy_light.html +++ /dev/null @@ -1,103 +0,0 @@ - - - - - - - - - - -

Privacy Browser Free

-

Privacy Browser Free does not collect any user information.

- - -

Google Play

-

Google Play has its own privacy policy. - Google provides anonymized summary installation information to developers, including the number of installs organized by the following categories.

-
    -
  • Android version (eg. Android 7.1)
  • -
  • Device (eg. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablets (eg. Tablets 10" and above)
  • -
  • Country (eg. United States)
  • -
  • Language (eg. English [United States])
  • -
  • App version (eg. 14)
  • -
  • Carrier (eg. T-Mobile - US)
  • -
- - -

Google Play Ratings

-

Google Play has its own privacy policy. - Google provides developers with anonymized summaries of the following information related to user ratings.

-
    -
  • Country (eg. United States)
  • -
  • Language (eg. English)
  • -
  • App version (eg. 14)
  • -
  • Android version (eg. Android 7.1)
  • -
  • Device (eg. Google Nexus 5X [bullhead])
  • -
  • Tablets (eg. Tablets 10" and above)
  • -
- - -

Google Play Reviews

-

Google Play has its own privacy policy. - In addition to the name of the reviewer, the rating, and the text of the review (which are all available publicly), Google provides some or all of the following information to the developer.

-
    -
  • Version code (eg. 7)
  • -
  • Version name (eg. 1.6)
  • -
  • Android version (eg. Android 5.1)
  • -
  • Device (eg. Galaxy S6 Edge+ [zenlte])
  • -
  • Manufacturer (eg. Samsung)
  • -
  • Device type (eg. Phone)
  • -
  • CPU make (eg. Samsung)
  • -
  • CPU model (eg. Exynos 7420)
  • -
  • Screen density (eg. 560 dpi)
  • -
  • Screen size (eg. 2560 x 1440)
  • -
  • RAM (eg. 4096 MB)
  • -
  • Native platform (eg. armeabi-v7a,armeabi,arm64v8a)
  • -
  • OpenGL ES version (eg. 3.1)
  • -
  • Device language (eg. English)
  • -
- - -

Advertisements

-

Privacy Browser Free displays a banner ad across the bottom of the screen using Google's AdMob network, - which has its own privacy policy. - These ads are set to be non-personalized. - AdMob reports anonymized summaries of the following information to developers.

-
    -
  • Total impressions
  • -
  • Total clicks
  • -
  • Platforms (eg. high-end mobile devices, tablets)
  • -
  • Activity by country
  • -
- - -

Direct Communications

-

Users may choose to send direct communications to Stoutner, like email messages and comments on stoutner.com.

- - -

Use of Information

-

Stoutner may use this information to assist in the development of Privacy Browser and communicate the status of the project to users. - Stoutner will never sell this information nor transfer it to any third party that would use it for advertising or marketing.

- -
-

Revision 1.7, 14 May 2019

- - \ No newline at end of file diff --git a/app/src/free/assets/es/about_permissions.html b/app/src/free/assets/es/about_permissions.html new file mode 100644 index 00000000..1aba7219 --- /dev/null +++ b/app/src/free/assets/es/about_permissions.html @@ -0,0 +1,75 @@ + + + + + + + + + + + + + +

Tener acceso completo a la red

+

android.permission.INTERNET

+

Requerido para que WebView consiga acceso a internet. Sin este permiso, Navegador Privado sería, “Sin Navegador: Protegiendo su privacidad estando completamente desconectado de internet”.

+ +

Instalar accesos directos

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

Requerido para añadir accesos directos de páginas web en el escritorio.

+ +

Almacenamiento de lectura

+

android.permission.READ_EXTERNAL_STORAGE

+

Requerido para importar la configuración de las carpetas públicas. + En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio importar la configuración desde las carpetas de la aplicación.

+ +

Almacenamiento de escritura

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Requerido para exportar la configuración y descargar archivos a las carpetas públicas. + En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio exportar la configuración y almacenar las descargas en las carpetas de la aplicación.

+ +
+
+
+ +

Además, Navegador Privado Gratuito muestra anuncios de Google AdMob usando el proveedor Firebase. + En el sabor gratuito, Firebase añade los siguientes permisos aunque no aparecen en el + archivo de manifiesto de código fuente.

+ +

Ver conexiones de red

+

android.permission.ACCESS_NETWORK_STATE

+

Permite a los anuncios saber si el dispositivo está conectado a internet y cuando no (probablemente para no tratar de recargar un anuncio cuando está desconectado). + También les permite saber si está conectado por wifi, 2G, 3G, 4G, etcétera.

+ +

Impedir que el teléfono entre en modo de suspensión

+

android.permission.WAKE_LOCK

+

Permite a los anuncios impedir al procesador dormir y a la pantalla atenuar, aunque en mis pruebas no parece que los anuncios lo hagan así.

+ +

API Install Referrer de Play

+

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

+

Permite a otras aplicaciones saber si su instalación se ha iniciado desde un anuncio en el Navegador Privado gratuito.

+ +

Recibir datos de internet

+

com.google.android.c2dm.permission.RECEIVE

+

Permite a Google enviar información directamente al AdView sin tener que recibir primero una solicitud (mensajes de nube a dispositivo).

+ + \ No newline at end of file diff --git a/app/src/free/assets/es/about_permissions_dark.html b/app/src/free/assets/es/about_permissions_dark.html deleted file mode 100644 index db3ded6c..00000000 --- a/app/src/free/assets/es/about_permissions_dark.html +++ /dev/null @@ -1,72 +0,0 @@ - - - - - - - - - - -

Tener acceso completo a la red

-

android.permission.INTERNET

-

Requerido para que WebView consiga acceso a internet. Sin este permiso, Navegador Privado sería, “Sin Navegador: Protegiendo su privacidad estando completamente desconectado de internet”.

- -

Instalar accesos directos

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Requerido para añadir accesos directos de páginas web en el escritorio.

- -

Almacenamiento de lectura

-

android.permission.READ_EXTERNAL_STORAGE

-

Requerido para importar la configuración de las carpetas públicas. - En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio importar la configuración desde las carpetas de la aplicación.

- -

Almacenamiento de escritura

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Requerido para exportar la configuración y descargar archivos a las carpetas públicas. - En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio exportar la configuración y almacenar las descargas en las carpetas de la aplicación.

- -
-
-
- -

Además, Navegador Privado Gratuito muestra anuncios de Google AdMob usando el proveedor Firebase. - En el sabor gratuito, Firebase añade los siguientes permisos aunque no aparecen en el - archivo de manifiesto de código fuente.

- -

Ver conexiones de red

-

android.permission.ACCESS_NETWORK_STATE

-

Permite a los anuncios saber si el dispositivo está conectado a internet y cuando no (probablemente para no tratar de recargar un anuncio cuando está desconectado). - También les permite saber si está conectado por wifi, 2G, 3G, 4G, etcétera.

- -

Impedir que el teléfono entre en modo de suspensión

-

android.permission.WAKE_LOCK

-

Permite a los anuncios impedir al procesador dormir y a la pantalla atenuar, aunque en mis pruebas no parece que los anuncios lo hagan así.

- -

API Install Referrer de Play

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Permite a otras aplicaciones saber si su instalación se ha iniciado desde un anuncio en el Navegador Privado gratuito.

- -

Recibir datos de internet

-

com.google.android.c2dm.permission.RECEIVE

-

Permite a Google enviar información directamente al AdView sin tener que recibir primero una solicitud (mensajes de nube a dispositivo).

- - \ No newline at end of file diff --git a/app/src/free/assets/es/about_permissions_light.html b/app/src/free/assets/es/about_permissions_light.html deleted file mode 100644 index e1095f60..00000000 --- a/app/src/free/assets/es/about_permissions_light.html +++ /dev/null @@ -1,72 +0,0 @@ - - - - - - - - - - -

Tener acceso completo a la red

-

android.permission.INTERNET

-

Requerido para que WebView consiga acceso a internet. Sin este permiso, Navegador Privado sería, “Sin Navegador: Protegiendo su privacidad estando completamente desconectado de internet”.

- -

Instalar accesos directos

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Requerido para añadir accesos directos de páginas web en el escritorio.

- -

Almacenamiento de lectura

-

android.permission.READ_EXTERNAL_STORAGE

-

Requerido para importar la configuración de las carpetas públicas. - En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio importar la configuración desde las carpetas de la aplicación.

- -

Almacenamiento de escritura

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Requerido para exportar la configuración y descargar archivos a las carpetas públicas. - En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio exportar la configuración y almacenar las descargas en las carpetas de la aplicación.

- -
-
-
- -

Además, Navegador Privado Gratuito muestra anuncios de Google AdMob usando el proveedor Firebase. - En el sabor gratuito, Firebase añade los siguientes permisos aunque no aparecen en el - archivo de manifiesto de código fuente.

- -

Ver conexiones de red

-

android.permission.ACCESS_NETWORK_STATE

-

Permite a los anuncios saber si el dispositivo está conectado a internet y cuando no (probablemente para no tratar de recargar un anuncio cuando está desconectado). - También les permite saber si está conectado por wifi, 2G, 3G, 4G, etcétera.

- -

Impedir que el teléfono entre en modo de suspensión

-

android.permission.WAKE_LOCK

-

Permite a los anuncios impedir al procesador dormir y a la pantalla atenuar, aunque en mis pruebas no parece que los anuncios lo hagan así.

- -

API Install Referrer de Play

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Permite a otras aplicaciones saber si su instalación se ha iniciado desde un anuncio en el Navegador Privado gratuito.

- -

Recibir datos de internet

-

com.google.android.c2dm.permission.RECEIVE

-

Permite a Google enviar información directamente al AdView sin tener que recibir primero una solicitud (mensajes de nube a dispositivo).

- - \ No newline at end of file diff --git a/app/src/free/assets/es/about_privacy_policy.html b/app/src/free/assets/es/about_privacy_policy.html new file mode 100644 index 00000000..7788e1dc --- /dev/null +++ b/app/src/free/assets/es/about_privacy_policy.html @@ -0,0 +1,108 @@ + + + + + + + + + + + + + +

Navegador Privado Gratuito

+

Navegador Privado Gratuito no recoge ninguna información del usuario.

+ + +

Google Play

+

Google Play tiene su propia política de privacidad. + Google proporciona información resumida y anónima de instalación a los desarrolladores, incluyendo el número de instalaciones, organizadas por las siguientes categorías.

+
    +
  • Versión de Android (p.ej. Android 7.1)
  • +
  • Dispositivo (p.ej. Samsung Galaxy S6 [zeroflte])
  • +
  • Tabletas (p.ej. Tabletas de 10" o más)
  • +
  • País (p.ej. Estados Unidos)
  • +
  • Lenguaje (p.ej. Inglés [Estados Unidos])
  • +
  • Versión de app (p.ej. 14)
  • +
  • Proveedor (p.ej. T-Mobile - US)
  • +
+ + +

Calificaciones de Google Play

+

Google Play tiene su propia política de privacidad. + Google proporciona a los desarrolladores resúmenes anónimos de la siguiente información relativa a las valoraciones de los usuarios.

+
    +
  • País (p.ej. Estados Unidos)
  • +
  • Lenguaje (p.ej. Inglés)
  • +
  • Versión de app (p.ej. 14)
  • +
  • Versión de Android (p.ej. Android 7.1)
  • +
  • Dispositivo (p.ej. Google Nexux 5X [bullhead])
  • +
  • Tabletas (p.ej. Tabletas de 10" o más)
  • +
+ + +

Comentarios de Google Play

+

Google Play tiene su propia política de privacidad. + Además del nombre del comentador, la calificación y el texto del comentario (las cuales están disponibles públicamente), + Google proporciona alguna o toda la siguiente información al desarrollador.

+
    +
  • Código de versión (p.ej. 7)
  • +
  • Nombre de versión (p.ej. 1.6)
  • +
  • Versión de Android (p.ej. Android 5.1)
  • +
  • Dispositivo (p.ej. Galaxy S6 Edge+ [zenitel])
  • +
  • Fabricante (p.ej. Samsung)
  • +
  • Tipo de dispositivo (p.ej. Teléfono)
  • +
  • Fabricante de CPU (p.ej. Samsung)
  • +
  • Modelo de CPU (p.ej. Exynos 7420)
  • +
  • Densidad de pantalla (p.ej. 560 dpi)
  • +
  • Tamaño de pantalla (p.ej. 2560 x 1440)
  • +
  • RAM (p.ej. 4096 MB)
  • +
  • Plataforma nativa (p.ej. armeabi-v7a,armeabi,arm64v8a)
  • +
  • Versión de OpenGL ES (p.ej. 3.1)
  • +
  • Lenguaje del dispositivo (p.ej. Inglés)
  • +
+ + +

Anuncios

+

Navegador Privado Gratuito muestra un banner publicitario en la parte inferior de la pantalla mediante la red AdMob de Google, + que tiene su propia política de privacidad. + Estos anuncios están configurados para ser no personalizados. + AdMob reporta resúmenes anónimos de la siguiente información a los desarrolladores.

+
    +
  • Impresiones totales
  • +
  • Clicks totales
  • +
  • Plataformas (p.ej. dispositivos móviles de gama alta, tabletas)
  • +
  • Actividad por país
  • +
+ + +

Comunicaciones directas

+

Los usuarios pueden elegir enviar comunicaciones directas a Stoutner, como mensajes de correo electrónico y comentarios en stoutner.com.

+ +

Uso de Información

+

Stoutner puede utilizar esta información para ayudar en el desarrollo de Navegador Privado y comunicar el estado del proyecto a los usuarios. + Stoutner nunca vendrá la información ni la transferirá a ninguna tercera parte que la pudiera usar para publicidad o marketing.

+ +
+

Revisión 1.7, 14 de mayo de 2019

+ + \ No newline at end of file diff --git a/app/src/free/assets/es/about_privacy_policy_dark.html b/app/src/free/assets/es/about_privacy_policy_dark.html deleted file mode 100644 index f14b7ecb..00000000 --- a/app/src/free/assets/es/about_privacy_policy_dark.html +++ /dev/null @@ -1,105 +0,0 @@ - - - - - - - - - - -

Navegador Privado Gratuito

-

Navegador Privado Gratuito no recoge ninguna información del usuario.

- - -

Google Play

-

Google Play tiene su propia política de privacidad. - Google proporciona información resumida y anónima de instalación a los desarrolladores, incluyendo el número de instalaciones, organizadas por las siguientes categorías.

-
    -
  • Versión de Android (p.ej. Android 7.1)
  • -
  • Dispositivo (p.ej. Samsung Galaxy S6 [zeroflte])
  • -
  • Tabletas (p.ej. Tabletas de 10" o más)
  • -
  • País (p.ej. Estados Unidos)
  • -
  • Lenguaje (p.ej. Inglés [Estados Unidos])
  • -
  • Versión de app (p.ej. 14)
  • -
  • Proveedor (p.ej. T-Mobile - US)
  • -
- - -

Calificaciones de Google Play

-

Google Play tiene su propia política de privacidad. - Google proporciona a los desarrolladores resúmenes anónimos de la siguiente información relativa a las valoraciones de los usuarios.

-
    -
  • País (p.ej. Estados Unidos)
  • -
  • Lenguaje (p.ej. Inglés)
  • -
  • Versión de app (p.ej. 14)
  • -
  • Versión de Android (p.ej. Android 7.1)
  • -
  • Dispositivo (p.ej. Google Nexux 5X [bullhead])
  • -
  • Tabletas (p.ej. Tabletas de 10" o más)
  • -
- - -

Comentarios de Google Play

-

Google Play tiene su propia política de privacidad. - Además del nombre del comentador, la calificación y el texto del comentario (las cuales están disponibles públicamente), - Google proporciona alguna o toda la siguiente información al desarrollador.

-
    -
  • Código de versión (p.ej. 7)
  • -
  • Nombre de versión (p.ej. 1.6)
  • -
  • Versión de Android (p.ej. Android 5.1)
  • -
  • Dispositivo (p.ej. Galaxy S6 Edge+ [zenitel])
  • -
  • Fabricante (p.ej. Samsung)
  • -
  • Tipo de dispositivo (p.ej. Teléfono)
  • -
  • Fabricante de CPU (p.ej. Samsung)
  • -
  • Modelo de CPU (p.ej. Exynos 7420)
  • -
  • Densidad de pantalla (p.ej. 560 dpi)
  • -
  • Tamaño de pantalla (p.ej. 2560 x 1440)
  • -
  • RAM (p.ej. 4096 MB)
  • -
  • Plataforma nativa (p.ej. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Versión de OpenGL ES (p.ej. 3.1)
  • -
  • Lenguaje del dispositivo (p.ej. Inglés)
  • -
- - -

Anuncios

-

Navegador Privado Gratuito muestra un banner publicitario en la parte inferior de la pantalla mediante la red AdMob de Google, - que tiene su propia política de privacidad. - Estos anuncios están configurados para ser no personalizados. - AdMob reporta resúmenes anónimos de la siguiente información a los desarrolladores.

-
    -
  • Impresiones totales
  • -
  • Clicks totales
  • -
  • Plataformas (p.ej. dispositivos móviles de gama alta, tabletas)
  • -
  • Actividad por país
  • -
- - -

Comunicaciones directas

-

Los usuarios pueden elegir enviar comunicaciones directas a Stoutner, como mensajes de correo electrónico y comentarios en stoutner.com.

- -

Uso de Información

-

Stoutner puede utilizar esta información para ayudar en el desarrollo de Navegador Privado y comunicar el estado del proyecto a los usuarios. - Stoutner nunca vendrá la información ni la transferirá a ninguna tercera parte que la pudiera usar para publicidad o marketing.

- -
-

Revisión 1.7, 14 de mayo de 2019

- - \ No newline at end of file diff --git a/app/src/free/assets/es/about_privacy_policy_light.html b/app/src/free/assets/es/about_privacy_policy_light.html deleted file mode 100644 index 295dc5c7..00000000 --- a/app/src/free/assets/es/about_privacy_policy_light.html +++ /dev/null @@ -1,105 +0,0 @@ - - - - - - - - - - -

Navegador Privado Gratuito

-

Navegador Privado Gratuito no recoge ninguna información del usuario.

- - -

Google Play

-

Google Play tiene su propia política de privacidad. - Google proporciona información resumida y anónima de instalación a los desarrolladores, incluyendo el número de instalaciones, organizadas por las siguientes categorías.

-
    -
  • Versión de Android (p.ej. Android 7.1)
  • -
  • Dispositivo (p.ej. Samsung Galaxy S6 [zeroflte])
  • -
  • Tabletas (p.ej. Tabletas de 10" o más)
  • -
  • País (p.ej. Estados Unidos)
  • -
  • Lenguaje (p.ej. Inglés [Estados Unidos])
  • -
  • Versión de app (p.ej. 14)
  • -
  • Proveedor (p.ej. T-Mobile - US)
  • -
- - -

Calificaciones de Google Play

-

Google Play tiene su propia política de privacidad. - Google proporciona a los desarrolladores resúmenes anónimos de la siguiente información relativa a las valoraciones de los usuarios.

-
    -
  • País (p.ej. Estados Unidos)
  • -
  • Lenguaje (p.ej. Inglés)
  • -
  • Versión de app (p.ej. 14)
  • -
  • Versión de Android (p.ej. Android 7.1)
  • -
  • Dispositivo (p.ej. Google Nexux 5X [bullhead])
  • -
  • Tabletas (p.ej. Tabletas de 10" o más)
  • -
- - -

Comentarios de Google Play

-

Google Play tiene su propia política de privacidad. - Además del nombre del comentador, la calificación y el texto del comentario (las cuales están disponibles públicamente), - Google proporciona alguna o toda la siguiente información al desarrollador.

-
    -
  • Código de versión (p.ej. 7)
  • -
  • Nombre de versión (p.ej. 1.6)
  • -
  • Versión de Android (p.ej. Android 5.1)
  • -
  • Dispositivo (p.ej. Galaxy S6 Edge+ [zenitel])
  • -
  • Fabricante (p.ej. Samsung)
  • -
  • Tipo de dispositivo (p.ej. Teléfono)
  • -
  • Fabricante de CPU (p.ej. Samsung)
  • -
  • Modelo de CPU (p.ej. Exynos 7420)
  • -
  • Densidad de pantalla (p.ej. 560 dpi)
  • -
  • Tamaño de pantalla (p.ej. 2560 x 1440)
  • -
  • RAM (p.ej. 4096 MB)
  • -
  • Plataforma nativa (p.ej. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Versión de OpenGL ES (p.ej. 3.1)
  • -
  • Lenguaje del dispositivo (p.ej. Inglés)
  • -
- - -

Anuncios

-

Navegador Privado Gratuito muestra un banner publicitario en la parte inferior de la pantalla mediante la red AdMob de Google, - que tiene su propia política de privacidad. - Estos anuncios están configurados para ser no personalizados. - AdMob reporta resúmenes anónimos de la siguiente información a los desarrolladores.

-
    -
  • Impresiones totales
  • -
  • Clicks totales
  • -
  • Plataformas (p.ej. dispositivos móviles de gama alta, tabletas)
  • -
  • Actividad por país
  • -
- - -

Comunicaciones directas

-

Los usuarios pueden elegir enviar comunicaciones directas a Stoutner, como mensajes de correo electrónico y comentarios en stoutner.com.

- -

Uso de Información

-

Stoutner puede utilizar esta información para ayudar en el desarrollo de Navegador Privado y comunicar el estado del proyecto a los usuarios. - Stoutner nunca vendrá la información ni la transferirá a ninguna tercera parte que la pudiera usar para publicidad o marketing.

- -
-

Revisión 1.7, 14 de mayo de 2019

- - \ No newline at end of file diff --git a/app/src/free/assets/fr/about_permissions.html b/app/src/free/assets/fr/about_permissions.html new file mode 100644 index 00000000..19406877 --- /dev/null +++ b/app/src/free/assets/fr/about_permissions.html @@ -0,0 +1,76 @@ + + + + + + + + + + + + + +

Disposer d'un accès réseau complet

+

android.permission.INTERNET

+

Requis pour que WebView puisse accéder à Internet. Sans cette autorisation, Privacy Browser serait «No Browser: protégez votre vie privée en restant complètement hors d'Internet».

+ +

Installer les raccourcis

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

Requis pour ajouter des raccourcis pour les sites Web au bureau du programme de lancement.

+ +

Lire le stockage

+

android.permission.READ_EXTERNAL_STORAGE

+

Requis pour importer les paramètres des dossiers publics. Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, + Privacy Browser peut importer les paramètres à partir des dossiers de l'application.

+ +

Mémoire d'écriture

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Requis pour exporter les paramètres et télécharger les fichiers dans les dossiers publics. + Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, + Privacy Browser peut exporter les paramètres et stocker les téléchargements dans les dossiers de l'application.

+ +
+
+
+ +

En outre, Privacy Browser Free affiche les annonces du réseau AdMob de Google à l'aide du backend Firebase. + Pour la version gratuite, Firebase ajoute les autorisations suivantes même si elles ne sont pas répertoriées dans le code source. + manifest file.

+ +

Afficher les connexions réseau

+

android.permission.ACCESS_NETWORK_STATE

+

Permet aux annonces de dire quand vous êtes connecté à Internet et quand vous n'êtes pas (vraisemblablement pour ne pas essayer de recharger une annonce lorsque vous êtes déconnecté). + Ils peuvent également savoir si vous êtes connecté via Wi-Fi, 2G, 3G, 4G, etc.

+ +

Empêcher le téléphone de dormir

+

android.permission.WAKE_LOCK

+

Permet aux annonces d'empêcher le processeur de dormir et l'éclairage de l'écran, bien que lors de mes tests, je ne pense pas que les annonces le fassent réellement.

+ +

Jouer Installer l'API Référent

+

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

+

Permet aux autres applications de savoir si leur installation a été lancée à partir d'une annonce dans Privacy Browser Free.

+ +

Recevoir des données d'Internet

+

com.google.android.c2dm.permission.RECEIVE

+

Permet à Google d'envoyer des informations directement à AdView sans avoir à recevoir de demande préalable (messagerie de périphérique à périphérique).

+ + \ No newline at end of file diff --git a/app/src/free/assets/fr/about_permissions_dark.html b/app/src/free/assets/fr/about_permissions_dark.html deleted file mode 100644 index 6b45a1ce..00000000 --- a/app/src/free/assets/fr/about_permissions_dark.html +++ /dev/null @@ -1,73 +0,0 @@ - - - - - - - - - - -

Disposer d'un accès réseau complet

-

android.permission.INTERNET

-

Requis pour que WebView puisse accéder à Internet. Sans cette autorisation, Privacy Browser serait «No Browser: protégez votre vie privée en restant complètement hors d'Internet».

- -

Installer les raccourcis

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Requis pour ajouter des raccourcis pour les sites Web au bureau du programme de lancement.

- -

Lire le stockage

-

android.permission.READ_EXTERNAL_STORAGE

-

Requis pour importer les paramètres des dossiers publics. Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, - Privacy Browser peut importer les paramètres à partir des dossiers de l'application.

- -

Mémoire d'écriture

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Requis pour exporter les paramètres et télécharger les fichiers dans les dossiers publics. - Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, - Privacy Browser peut exporter les paramètres et stocker les téléchargements dans les dossiers de l'application.

- -
-
-
- -

En outre, Privacy Browser Free affiche les annonces du réseau AdMob de Google à l'aide du backend Firebase. - Pour la version gratuite, Firebase ajoute les autorisations suivantes même si elles ne sont pas répertoriées dans le code source. - manifest file.

- -

Afficher les connexions réseau

-

android.permission.ACCESS_NETWORK_STATE

-

Permet aux annonces de dire quand vous êtes connecté à Internet et quand vous n'êtes pas (vraisemblablement pour ne pas essayer de recharger une annonce lorsque vous êtes déconnecté). - Ils peuvent également savoir si vous êtes connecté via Wi-Fi, 2G, 3G, 4G, etc.

- -

Empêcher le téléphone de dormir

-

android.permission.WAKE_LOCK

-

Permet aux annonces d'empêcher le processeur de dormir et l'éclairage de l'écran, bien que lors de mes tests, je ne pense pas que les annonces le fassent réellement.

- -

Jouer Installer l'API Référent

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Permet aux autres applications de savoir si leur installation a été lancée à partir d'une annonce dans Privacy Browser Free.

- -

Recevoir des données d'Internet

-

com.google.android.c2dm.permission.RECEIVE

-

Permet à Google d'envoyer des informations directement à AdView sans avoir à recevoir de demande préalable (messagerie de périphérique à périphérique).

- - \ No newline at end of file diff --git a/app/src/free/assets/fr/about_permissions_light.html b/app/src/free/assets/fr/about_permissions_light.html deleted file mode 100644 index c23ba4da..00000000 --- a/app/src/free/assets/fr/about_permissions_light.html +++ /dev/null @@ -1,73 +0,0 @@ - - - - - - - - - - -

Disposer d'un accès réseau complet

-

android.permission.INTERNET

-

Requis pour que WebView puisse accéder à Internet. Sans cette autorisation, Privacy Browser serait «No Browser: protégez votre vie privée en restant complètement hors d'Internet».

- -

Installer les raccourcis

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Requis pour ajouter des raccourcis pour les sites Web au bureau du programme de lancement.

- -

Lire le stockage

-

android.permission.READ_EXTERNAL_STORAGE

-

Requis pour importer les paramètres des dossiers publics. Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, - Privacy Browser peut importer les paramètres à partir des dossiers de l'application.

- -

Mémoire d'écriture

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Requis pour exporter les paramètres et télécharger les fichiers dans les dossiers publics. - Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, - Privacy Browser peut exporter les paramètres et stocker les téléchargements dans les dossiers de l'application.

- -
-
-
- -

En outre, Privacy Browser Free affiche les annonces du réseau AdMob de Google à l'aide du backend Firebase. - Pour la version gratuite, Firebase ajoute les autorisations suivantes même si elles ne sont pas répertoriées dans le code source. - manifest file.

- -

Afficher les connexions réseau

-

android.permission.ACCESS_NETWORK_STATE

-

Permet aux annonces de dire quand vous êtes connecté à Internet et quand vous n'êtes pas (vraisemblablement pour ne pas essayer de recharger une annonce lorsque vous êtes déconnecté). - Ils peuvent également savoir si vous êtes connecté via Wi-Fi, 2G, 3G, 4G, etc.

- -

Empêcher le téléphone de dormir

-

android.permission.WAKE_LOCK

-

Permet aux annonces d'empêcher le processeur de dormir et l'éclairage de l'écran, bien que lors de mes tests, je ne pense pas que les annonces le fassent réellement.

- -

Jouer Installer l'API Référent

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Permet aux autres applications de savoir si leur installation a été lancée à partir d'une annonce dans Privacy Browser Free.

- -

Recevoir des données d'Internet

-

com.google.android.c2dm.permission.RECEIVE

-

Permet à Google d'envoyer des informations directement à AdView sans avoir à recevoir de demande préalable (messagerie de périphérique à périphérique).

- - \ No newline at end of file diff --git a/app/src/free/assets/fr/about_privacy_policy.html b/app/src/free/assets/fr/about_privacy_policy.html new file mode 100644 index 00000000..6129ee0b --- /dev/null +++ b/app/src/free/assets/fr/about_privacy_policy.html @@ -0,0 +1,108 @@ + + + + + + + + + + + + + +

Privacy Browser

+

Privacy Browser ne collecte aucune information sur l'utilisateur.

+ + +

Google Play

+

Google Play a sa propre règle de confidentialité . + Google fournit aux développeurs des informations d'installation récapitulatives et anonymisées, notamment le nombre d'installations organisées selon les catégories suivantes.

+
    +
  • Version d'Android (ex. Android 7.1)
  • +
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • +
  • Tablettes (ex. Tablettes 10" et plus)
  • +
  • Pays (ex. France)
  • +
  • Langage (ex. Français [Canada])
  • +
  • Version d'Application (ex. 14)
  • +
  • Opérateur (eg. Orange - FR)
  • +
+ + +

Notes Google Play

+

Google Play a sa propre règle de confidentialité . + Google fournit aux développeurs des résumés anonymisés des informations suivantes relatives aux évaluations des utilisateurs.

+
    +
  • Pays (ex. France)
  • +
  • Langage (ex. Français [Canada])
  • +
  • Version d'Application (ex. 14)
  • +
  • Version d'Android (ex. Android 7.1)
  • +
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • +
  • Tablettes (ex. Tablettes 10" et plus)
  • +
+ + +

Avis Google Play

+

Google Play a sa propre règle de confidentialité. + Outre le nom du réviseur, l'évaluation et le texte de la révision (tous disponibles publiquement), Google fournit au développeur tout ou partie des informations suivantes.

+
    +
  • Code de Version (ex. 7)
  • +
  • Nom de Version (ex. 1.6)
  • +
  • Version d'Android (ex. Android 7.1)
  • +
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • +
  • Constructeur (ex. Samsung)
  • +
  • Type de terminal (ex. Phone)
  • +
  • La marque du processeur (ex. Samsung)
  • +
  • Le modèle de processeur (ex. Exynos 7420)
  • +
  • Densité d'affichage (ex. 560 dpi)
  • +
  • Taille d'écran (ex. 2560 x 1440)
  • +
  • RAM (ex. 4096 MB)
  • +
  • Plateforme native (ex. armeabi-v7a,armeabi,arm64v8a)
  • +
  • Version OpenGL ES (ex. 3.1)
  • +
  • Langage du terminal (ex. English)
  • +
+ + +

Annonces

+

Privacy Browser Free affiche une bannière publicitaire en bas de l'écran à l'aide du réseau AdMob de Google, + qui a sa propre politique de confidentialité. + Ces annonces sont définies pour être non-personalisées. + AdMob transmet aux développeurs des résumés anonymisés des informations suivantes.

+
    +
  • Total d'affichages
  • +
  • Total de clicks
  • +
  • Plateformes (par exemple, appareils mobiles haut de gamme, tablettes)
  • +
  • Activié par pays
  • +
+ + +

Communications directes

+

Les utilisateurs peuvent choisir d'envoyer des communications directes à Stoutner, telles que des courriels et des commentaires sur stoutner.com.

+ + +

Utilisation de l'information

+

Stoutner peut utiliser ces informations pour contribuer au développement de Privacy Browser et communiquer le statut du projet aux utilisateurs. + Stoutner ne vendra jamais ces informations ni ne les transférera à des tiers qui les utiliseraient à des fins publicitaires ou marketing.

+ +
+

Revision 1.7, 14 Mai 2019

+ + \ No newline at end of file diff --git a/app/src/free/assets/fr/about_privacy_policy_dark.html b/app/src/free/assets/fr/about_privacy_policy_dark.html deleted file mode 100644 index 3536bcd3..00000000 --- a/app/src/free/assets/fr/about_privacy_policy_dark.html +++ /dev/null @@ -1,105 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser ne collecte aucune information sur l'utilisateur.

- - -

Google Play

-

Google Play a sa propre règle de confidentialité . - Google fournit aux développeurs des informations d'installation récapitulatives et anonymisées, notamment le nombre d'installations organisées selon les catégories suivantes.

-
    -
  • Version d'Android (ex. Android 7.1)
  • -
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablettes (ex. Tablettes 10" et plus)
  • -
  • Pays (ex. France)
  • -
  • Langage (ex. Français [Canada])
  • -
  • Version d'Application (ex. 14)
  • -
  • Opérateur (eg. Orange - FR)
  • -
- - -

Notes Google Play

-

Google Play a sa propre règle de confidentialité . - Google fournit aux développeurs des résumés anonymisés des informations suivantes relatives aux évaluations des utilisateurs.

-
    -
  • Pays (ex. France)
  • -
  • Langage (ex. Français [Canada])
  • -
  • Version d'Application (ex. 14)
  • -
  • Version d'Android (ex. Android 7.1)
  • -
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablettes (ex. Tablettes 10" et plus)
  • -
- - -

Avis Google Play

-

Google Play a sa propre règle de confidentialité. - Outre le nom du réviseur, l'évaluation et le texte de la révision (tous disponibles publiquement), Google fournit au développeur tout ou partie des informations suivantes.

-
    -
  • Code de Version (ex. 7)
  • -
  • Nom de Version (ex. 1.6)
  • -
  • Version d'Android (ex. Android 7.1)
  • -
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • -
  • Constructeur (ex. Samsung)
  • -
  • Type de terminal (ex. Phone)
  • -
  • La marque du processeur (ex. Samsung)
  • -
  • Le modèle de processeur (ex. Exynos 7420)
  • -
  • Densité d'affichage (ex. 560 dpi)
  • -
  • Taille d'écran (ex. 2560 x 1440)
  • -
  • RAM (ex. 4096 MB)
  • -
  • Plateforme native (ex. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Version OpenGL ES (ex. 3.1)
  • -
  • Langage du terminal (ex. English)
  • -
- - -

Annonces

-

Privacy Browser Free affiche une bannière publicitaire en bas de l'écran à l'aide du réseau AdMob de Google, - qui a sa propre politique de confidentialité. - Ces annonces sont définies pour être non-personalisées. - AdMob transmet aux développeurs des résumés anonymisés des informations suivantes.

-
    -
  • Total d'affichages
  • -
  • Total de clicks
  • -
  • Plateformes (par exemple, appareils mobiles haut de gamme, tablettes)
  • -
  • Activié par pays
  • -
- - -

Communications directes

-

Les utilisateurs peuvent choisir d'envoyer des communications directes à Stoutner, telles que des courriels et des commentaires sur stoutner.com.

- - -

Utilisation de l'information

-

Stoutner peut utiliser ces informations pour contribuer au développement de Privacy Browser et communiquer le statut du projet aux utilisateurs. - Stoutner ne vendra jamais ces informations ni ne les transférera à des tiers qui les utiliseraient à des fins publicitaires ou marketing.

- -
-

Revision 1.7, 14 Mai 2019

- - \ No newline at end of file diff --git a/app/src/free/assets/fr/about_privacy_policy_light.html b/app/src/free/assets/fr/about_privacy_policy_light.html deleted file mode 100644 index b6a8abfb..00000000 --- a/app/src/free/assets/fr/about_privacy_policy_light.html +++ /dev/null @@ -1,105 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser ne collecte aucune information sur l'utilisateur.

- - -

Google Play

-

Google Play a sa propre règle de confidentialité . - Google fournit aux développeurs des informations d'installation récapitulatives et anonymisées, notamment le nombre d'installations organisées selon les catégories suivantes.

-
    -
  • Version d'Android (ex. Android 7.1)
  • -
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablettes (ex. Tablettes 10" et plus)
  • -
  • Pays (ex. France)
  • -
  • Langage (ex. Français [Canada])
  • -
  • Version d'Application (ex. 14)
  • -
  • Opérateur (eg. Orange - FR)
  • -
- - -

Notes Google Play

-

Google Play a sa propre règle de confidentialité . - Google fournit aux développeurs des résumés anonymisés des informations suivantes relatives aux évaluations des utilisateurs.

-
    -
  • Pays (ex. France)
  • -
  • Langage (ex. Français [Canada])
  • -
  • Version d'Application (ex. 14)
  • -
  • Version d'Android (ex. Android 7.1)
  • -
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablettes (ex. Tablettes 10" et plus)
  • -
- - -

Avis Google Play

-

Google Play a sa propre règle de confidentialité. - Outre le nom du réviseur, l'évaluation et le texte de la révision (tous disponibles publiquement), Google fournit au développeur tout ou partie des informations suivantes.

-
    -
  • Code de Version (ex. 7)
  • -
  • Nom de Version (ex. 1.6)
  • -
  • Version d'Android (ex. Android 7.1)
  • -
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • -
  • Constructeur (ex. Samsung)
  • -
  • Type de terminal (ex. Phone)
  • -
  • La marque du processeur (ex. Samsung)
  • -
  • Le modèle de processeur (ex. Exynos 7420)
  • -
  • Densité d'affichage (ex. 560 dpi)
  • -
  • Taille d'écran (ex. 2560 x 1440)
  • -
  • RAM (ex. 4096 MB)
  • -
  • Plateforme native (ex. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Version OpenGL ES (ex. 3.1)
  • -
  • Langage du terminal (ex. English)
  • -
- - -

Annonces

-

Privacy Browser Free affiche une bannière publicitaire en bas de l'écran à l'aide du réseau AdMob de Google, - qui a sa propre politique de confidentialité. - Ces annonces sont définies pour être non-personalisées. - AdMob transmet aux développeurs des résumés anonymisés des informations suivantes.

-
    -
  • Total d'affichages
  • -
  • Total de clicks
  • -
  • Plateformes (par exemple, appareils mobiles haut de gamme, tablettes)
  • -
  • Activié par pays
  • -
- - -

Communications directes

-

Les utilisateurs peuvent choisir d'envoyer des communications directes à Stoutner, telles que des courriels et des commentaires sur stoutner.com.

- - -

Utilisation de l'information

-

Stoutner peut utiliser ces informations pour contribuer au développement de Privacy Browser et communiquer le statut du projet aux utilisateurs. - Stoutner ne vendra jamais ces informations ni ne les transférera à des tiers qui les utiliseraient à des fins publicitaires ou marketing.

- -
-

Revision 1.7, 14 Mai 2019

- - \ No newline at end of file diff --git a/app/src/free/assets/it/about_permissions.html b/app/src/free/assets/it/about_permissions.html new file mode 100644 index 00000000..26a4801f --- /dev/null +++ b/app/src/free/assets/it/about_permissions.html @@ -0,0 +1,75 @@ + + + + + + + + + + + + + +

Accesso completo alla rete

+

android.permission.INTERNET

+

E' richiesto per permettere l'accesso Internet a WebView. Senza questo permesso, Privacy Browser sarebbe “Nessun Browser: Protegge la tua Privacy restando completamente isolato da Internet”.

+ +

Creazione di collegamenti

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

E' richiesto per poter creare collegamenti a siti web sulla schermata principale del dispositivo.

+ +

Lettura dalla memoria

+

android.permission.READ_EXTERNAL_STORAGE

+

Richiesta per l'importazione delle impostazioni dalle cartelle pubbliche. + A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può importare le impostazioni solo dalle cartelle dell'applicazione.

+ +

Scrittura della memoria

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Richiesta per l'esportazione delle applicazioni e per il download di file nelle cartelle pubbliche. + A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può esportare le impostazioni e salvare i download solo nelle cartelle dell'applicazione.

+ +
+
+
+ +

Oltre ai permessi sopraelencati, Privacy Browser Free mostra gli annunci provenienti dalla Google's AdMob network utilizzando il Firebase backend. + Se si utilizza la versione Free, Firebase aggiunge i seguenti permessi anche se non sono elencati nel codice sorgente del file + “manifest”.

+ +

Visualizzare connessioni di rete

+

android.permission.ACCESS_NETWORK_STATE

+

Permette agli annunci di dire quando si è o non si è connessi a internet (presumibilmente per evitare il tentativo di ricaricare un annuncio quando non si è connessi). + Gli annunci possono anche dire se si è connessi via Wi-Fi, 2G, 3G, 4G, ecc.

+ +

Impedire al dispositivo di entrare in modalità sleeping

+

android.permission.WAKE_LOCK

+

Permette agli annunci di impedire al processore di entrare in modalità sleeping e allo schermo di spegnersi, anche se dopo vari test eseguiti non sembra che il comportamento sia questo.

+ +

API Play Install Referrer

+

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

+

Permette alle altre applicazioni di informare se la loro installazione è stata eseguita attraverso un annuncio pubblicitario in Privacy Browser Free.

+ +

Ricezione dati da Internet

+

com.google.android.c2dm.permission.RECEIVE

+

Permette a Google di inviare informazioni a AdView senza la necessità di ricevere una richiesta preventiva (messaggistica “cloud-to-device”).

+ + \ No newline at end of file diff --git a/app/src/free/assets/it/about_permissions_dark.html b/app/src/free/assets/it/about_permissions_dark.html deleted file mode 100644 index 7d88b49b..00000000 --- a/app/src/free/assets/it/about_permissions_dark.html +++ /dev/null @@ -1,72 +0,0 @@ - - - - - - - - - - -

Accesso completo alla rete

-

android.permission.INTERNET

-

E' richiesto per permettere l'accesso Internet a WebView. Senza questo permesso, Privacy Browser sarebbe “Nessun Browser: Protegge la tua Privacy restando completamente isolato da Internet”.

- -

Creazione di collegamenti

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

E' richiesto per poter creare collegamenti a siti web sulla schermata principale del dispositivo.

- -

Lettura dalla memoria

-

android.permission.READ_EXTERNAL_STORAGE

-

Richiesta per l'importazione delle impostazioni dalle cartelle pubbliche. - A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può importare le impostazioni solo dalle cartelle dell'applicazione.

- -

Scrittura della memoria

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Richiesta per l'esportazione delle applicazioni e per il download di file nelle cartelle pubbliche. - A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può esportare le impostazioni e salvare i download solo nelle cartelle dell'applicazione.

- -
-
-
- -

Oltre ai permessi sopraelencati, Privacy Browser Free mostra gli annunci provenienti dalla Google's AdMob network utilizzando il Firebase backend. - Se si utilizza la versione Free, Firebase aggiunge i seguenti permessi anche se non sono elencati nel codice sorgente del file - “manifest”.

- -

Visualizzare connessioni di rete

-

android.permission.ACCESS_NETWORK_STATE

-

Permette agli annunci di dire quando si è o non si è connessi a internet (presumibilmente per evitare il tentativo di ricaricare un annuncio quando non si è connessi). - Gli annunci possono anche dire se si è connessi via Wi-Fi, 2G, 3G, 4G, ecc.

- -

Impedire al dispositivo di entrare in modalità sleeping

-

android.permission.WAKE_LOCK

-

Permette agli annunci di impedire al processore di entrare in modalità sleeping e allo schermo di spegnersi, anche se dopo vari test eseguiti non sembra che il comportamento sia questo.

- -

API Play Install Referrer

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Permette alle altre applicazioni di informare se la loro installazione è stata eseguita attraverso un annuncio pubblicitario in Privacy Browser Free.

- -

Ricezione dati da Internet

-

com.google.android.c2dm.permission.RECEIVE

-

Permette a Google di inviare informazioni a AdView senza la necessità di ricevere una richiesta preventiva (messaggistica “cloud-to-device”).

- - \ No newline at end of file diff --git a/app/src/free/assets/it/about_permissions_light.html b/app/src/free/assets/it/about_permissions_light.html deleted file mode 100644 index 155a7777..00000000 --- a/app/src/free/assets/it/about_permissions_light.html +++ /dev/null @@ -1,72 +0,0 @@ - - - - - - - - - - -

Accesso completo alla rete

-

android.permission.INTERNET

-

E' richiesto per permettere l'accesso Internet a WebView. Senza questo permesso, Privacy Browser sarebbe “Nessun Browser: Protegge la tua Privacy restando completamente isolato da Internet”.

- -

Creazione di collegamenti

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

E' richiesto per poter creare collegamenti a siti web sulla schermata principale del dispositivo.

- -

Lettura dalla memoria

-

android.permission.READ_EXTERNAL_STORAGE

-

Richiesta per l'importazione delle impostazioni dalle cartelle pubbliche. - A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può importare le impostazioni solo dalle cartelle dell'applicazione.

- -

Scrittura della memoria

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Richiesta per l'esportazione delle applicazioni e per il download di file nelle cartelle pubbliche. - A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può esportare le impostazioni e salvare i download solo nelle cartelle dell'applicazione.

- -
-
-
- -

Oltre ai permessi sopraelencati, Privacy Browser Free mostra gli annunci provenienti dalla Google's AdMob network utilizzando il Firebase backend. - Se si utilizza la versione Free, Firebase aggiunge i seguenti permessi anche se non sono elencati nel codice sorgente del file - “manifest”.

- -

Visualizzare connessioni di rete

-

android.permission.ACCESS_NETWORK_STATE

-

Permette agli annunci di dire quando si è o non si è connessi a internet (presumibilmente per evitare il tentativo di ricaricare un annuncio quando non si è connessi). - Gli annunci possono anche dire se si è connessi via Wi-Fi, 2G, 3G, 4G, ecc.

- -

Impedire al dispositivo di entrare in modalità sleeping

-

android.permission.WAKE_LOCK

-

Permette agli annunci di impedire al processore di entrare in modalità sleeping e allo schermo di spegnersi, anche se dopo vari test eseguiti non sembra che il comportamento sia questo.

- -

API Play Install Referrer

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Permette alle altre applicazioni di informare se la loro installazione è stata eseguita attraverso un annuncio pubblicitario in Privacy Browser Free.

- -

Ricezione dati da Internet

-

com.google.android.c2dm.permission.RECEIVE

-

Permette a Google di inviare informazioni a AdView senza la necessità di ricevere una richiesta preventiva (messaggistica “cloud-to-device”).

- - \ No newline at end of file diff --git a/app/src/free/assets/it/about_privacy_policy.html b/app/src/free/assets/it/about_privacy_policy.html new file mode 100644 index 00000000..f6feef0d --- /dev/null +++ b/app/src/free/assets/it/about_privacy_policy.html @@ -0,0 +1,108 @@ + + + + + + + + + + + + + +

Privacy Browser Free

+

Privacy Browser Free non raccoglie alcuna informazione dagli utenti.

+ + +

Google Play

+

Google Play ha una propria privacy policy. + Google fornisce agli sviluppatori informazioni anonime sulle installazioni, incluso il numero di installazioni, secondo le seguenti categorie.

+
    +
  • Versione Android (es. Android 7.1)
  • +
  • Dispositivo (es. Samsung Galaxy S6 [zeroflte])
  • +
  • Tablet (es. Tablet 10" o superiore)
  • +
  • Nazione (es. United States)
  • +
  • Lingua (es. English [United States])
  • +
  • Versione App (es. 14)
  • +
  • Vettore (es. T-Mobile - US)
  • +
+ + +

Ratings di Google Play

+

Google Play ha una propria privacy policy. + Google fornisce agli sviluppatori sintesi anonime delle seguenti informazioni collegate ai ratings degli utenti.

+
    +
  • Nazione (es. United States)
  • +
  • Lingua (es. English)
  • +
  • Versione App (es. 14)
  • +
  • Versione Android (es. Android 7.1)
  • +
  • Dispositivo (es. Google Nexus 5X [bullhead])
  • +
  • Tablet (es. Tablets 10" o superiore)
  • +
+ + +

Recensioni di Google Play

+

Google Play ha una propria privacy policy. + Oltre al nome del recensore, al rating, e al testo della recensione (i quali sono tutti pubblicamente disponibili), Google fornisce alcune o tutte le seguenti informazioni allo sviluppatore.

+
    +
  • Codice Versione (es. 7)
  • +
  • Nome Versione (es. 1.6)
  • +
  • Versione Android (es. Android 5.1)
  • +
  • Dispositivo (es. Galaxy S6 Edge+ [zenlte])
  • +
  • Costruttore (es. Samsung)
  • +
  • Tipo di dispositivo (es. SmartPhone)
  • +
  • Produttore CPU (es. Samsung)
  • +
  • Modello CPU (es. Exynos 7420)
  • +
  • Risoluzione schermo (es. 560 dpi)
  • +
  • Dimensione Schermo (es. 2560 x 1440)
  • +
  • RAM (es. 4096 MB)
  • +
  • Piattaforma nativa (es. armeabi-v7a,armeabi,arm64v8a)
  • +
  • Versione OpenGL ES (es. 3.1)
  • +
  • Lingua del dispositivo (es. English)
  • +
+ + +

Annunci

+

Privacy Browser Free mostra un banner pubblicitario nella parte inferiore dello schermo utilizzando la Google's AdMob network, + che ha una propria privacy policy. + Questi annunci sono impostati in modo da essere non-personalizzati. + AdMob fornisce agli sviluppatori sintesi anonime delle seguenti informazioni.

+
    +
  • Numero totale di visualizzazioni
  • +
  • Numero totale di click
  • +
  • Piattaforme (es. dispositivi mobili, tablet)
  • +
  • Attività per Nazione
  • +
+ + +

Comunicazioni Dirette

+

E' possibile inviare comunicazioni dirette a Stoutner, ad esempio email o commenti su stoutner.com.

+ + +

Utilizzo delle informazioni

+

Stoutner si riserva l'utilizzo di queste informazioni come supporto per lo sviluppo di Privacy Browser e per comunicazioni sullo stato del progetto verso gli utenti. + Stoutner non rivenderà o comunque non trasferirà mai nessuna informazione a terze parti che potrebbero utilizzarle a scopi pubblicitari o di marketing.

+ +
+

Revisione 1.7, 14 Maggio 2019

+ + \ No newline at end of file diff --git a/app/src/free/assets/it/about_privacy_policy_dark.html b/app/src/free/assets/it/about_privacy_policy_dark.html deleted file mode 100644 index 1f459048..00000000 --- a/app/src/free/assets/it/about_privacy_policy_dark.html +++ /dev/null @@ -1,105 +0,0 @@ - - - - - - - - - - -

Privacy Browser Free

-

Privacy Browser Free non raccoglie alcuna informazione dagli utenti.

- - -

Google Play

-

Google Play ha una propria privacy policy. - Google fornisce agli sviluppatori informazioni anonime sulle installazioni, incluso il numero di installazioni, secondo le seguenti categorie.

-
    -
  • Versione Android (es. Android 7.1)
  • -
  • Dispositivo (es. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablet (es. Tablet 10" o superiore)
  • -
  • Nazione (es. United States)
  • -
  • Lingua (es. English [United States])
  • -
  • Versione App (es. 14)
  • -
  • Vettore (es. T-Mobile - US)
  • -
- - -

Ratings di Google Play

-

Google Play ha una propria privacy policy. - Google fornisce agli sviluppatori sintesi anonime delle seguenti informazioni collegate ai ratings degli utenti.

-
    -
  • Nazione (es. United States)
  • -
  • Lingua (es. English)
  • -
  • Versione App (es. 14)
  • -
  • Versione Android (es. Android 7.1)
  • -
  • Dispositivo (es. Google Nexus 5X [bullhead])
  • -
  • Tablet (es. Tablets 10" o superiore)
  • -
- - -

Recensioni di Google Play

-

Google Play ha una propria privacy policy. - Oltre al nome del recensore, al rating, e al testo della recensione (i quali sono tutti pubblicamente disponibili), Google fornisce alcune o tutte le seguenti informazioni allo sviluppatore.

-
    -
  • Codice Versione (es. 7)
  • -
  • Nome Versione (es. 1.6)
  • -
  • Versione Android (es. Android 5.1)
  • -
  • Dispositivo (es. Galaxy S6 Edge+ [zenlte])
  • -
  • Costruttore (es. Samsung)
  • -
  • Tipo di dispositivo (es. SmartPhone)
  • -
  • Produttore CPU (es. Samsung)
  • -
  • Modello CPU (es. Exynos 7420)
  • -
  • Risoluzione schermo (es. 560 dpi)
  • -
  • Dimensione Schermo (es. 2560 x 1440)
  • -
  • RAM (es. 4096 MB)
  • -
  • Piattaforma nativa (es. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Versione OpenGL ES (es. 3.1)
  • -
  • Lingua del dispositivo (es. English)
  • -
- - -

Annunci

-

Privacy Browser Free mostra un banner pubblicitario nella parte inferiore dello schermo utilizzando la Google's AdMob network, - che ha una propria privacy policy. - Questi annunci sono impostati in modo da essere non-personalizzati. - AdMob fornisce agli sviluppatori sintesi anonime delle seguenti informazioni.

-
    -
  • Numero totale di visualizzazioni
  • -
  • Numero totale di click
  • -
  • Piattaforme (es. dispositivi mobili, tablet)
  • -
  • Attività per Nazione
  • -
- - -

Comunicazioni Dirette

-

E' possibile inviare comunicazioni dirette a Stoutner, ad esempio email o commenti su stoutner.com.

- - -

Utilizzo delle informazioni

-

Stoutner si riserva l'utilizzo di queste informazioni come supporto per lo sviluppo di Privacy Browser e per comunicazioni sullo stato del progetto verso gli utenti. - Stoutner non rivenderà o comunque non trasferirà mai nessuna informazione a terze parti che potrebbero utilizzarle a scopi pubblicitari o di marketing.

- -
-

Revisione 1.7, 14 Maggio 2019

- - \ No newline at end of file diff --git a/app/src/free/assets/it/about_privacy_policy_light.html b/app/src/free/assets/it/about_privacy_policy_light.html deleted file mode 100644 index 32b7fb0d..00000000 --- a/app/src/free/assets/it/about_privacy_policy_light.html +++ /dev/null @@ -1,105 +0,0 @@ - - - - - - - - - - -

Privacy Browser Free

-

Privacy Browser Free non raccoglie alcuna informazione dagli utenti.

- - -

Google Play

-

Google Play ha una propria privacy policy. - Google fornisce agli sviluppatori informazioni anonime sulle installazioni, incluso il numero di installazioni, secondo le seguenti categorie.

-
    -
  • Versione Android (es. Android 7.1)
  • -
  • Dispositivo (es. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablet (es. Tablet 10" o superiore)
  • -
  • Nazione (es. United States)
  • -
  • Lingua (es. English [United States])
  • -
  • Versione App (es. 14)
  • -
  • Vettore (es. T-Mobile - US)
  • -
- - -

Ratings di Google Play

-

Google Play ha una propria privacy policy. - Google fornisce agli sviluppatori sintesi anonime delle seguenti informazioni collegate ai ratings degli utenti.

-
    -
  • Nazione (es. United States)
  • -
  • Lingua (es. English)
  • -
  • Versione App (es. 14)
  • -
  • Versione Android (es. Android 7.1)
  • -
  • Dispositivo (es. Google Nexus 5X [bullhead])
  • -
  • Tablet (es. Tablets 10" o superiore)
  • -
- - -

Recensioni di Google Play

-

Google Play ha una propria privacy policy. - Oltre al nome del recensore, al rating, e al testo della recensione (i quali sono tutti pubblicamente disponibili), Google fornisce alcune o tutte le seguenti informazioni allo sviluppatore.

-
    -
  • Codice Versione (es. 7)
  • -
  • Nome Versione (es. 1.6)
  • -
  • Versione Android (es. Android 5.1)
  • -
  • Dispositivo (es. Galaxy S6 Edge+ [zenlte])
  • -
  • Costruttore (es. Samsung)
  • -
  • Tipo di dispositivo (es. SmartPhone)
  • -
  • Produttore CPU (es. Samsung)
  • -
  • Modello CPU (es. Exynos 7420)
  • -
  • Risoluzione schermo (es. 560 dpi)
  • -
  • Dimensione Schermo (es. 2560 x 1440)
  • -
  • RAM (es. 4096 MB)
  • -
  • Piattaforma nativa (es. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Versione OpenGL ES (es. 3.1)
  • -
  • Lingua del dispositivo (es. English)
  • -
- - -

Annunci

-

Privacy Browser Free mostra un banner pubblicitario nella parte inferiore dello schermo utilizzando la Google's AdMob network, - che ha una propria privacy policy. - Questi annunci sono impostati in modo da essere non-personalizzati. - AdMob fornisce agli sviluppatori sintesi anonime delle seguenti informazioni.

-
    -
  • Numero totale di visualizzazioni
  • -
  • Numero totale di click
  • -
  • Piattaforme (es. dispositivi mobili, tablet)
  • -
  • Attività per Nazione
  • -
- - -

Comunicazioni Dirette

-

E' possibile inviare comunicazioni dirette a Stoutner, ad esempio email o commenti su stoutner.com.

- - -

Utilizzo delle informazioni

-

Stoutner si riserva l'utilizzo di queste informazioni come supporto per lo sviluppo di Privacy Browser e per comunicazioni sullo stato del progetto verso gli utenti. - Stoutner non rivenderà o comunque non trasferirà mai nessuna informazione a terze parti che potrebbero utilizzarle a scopi pubblicitari o di marketing.

- -
-

Revisione 1.7, 14 Maggio 2019

- - \ No newline at end of file diff --git a/app/src/free/assets/ru/about_permissions.html b/app/src/free/assets/ru/about_permissions.html new file mode 100644 index 00000000..56af41fb --- /dev/null +++ b/app/src/free/assets/ru/about_permissions.html @@ -0,0 +1,73 @@ + + + + + + + + + + + + + +

Полный доступ к сети

+

android.permission.INTERNET

+

Требуется для доступа WebView к интернету. Без этого разрешения Privacy Browser будет отображать “Нет браузера: угрозы вашей конфиденциальности нет из-за отсутствия доступа к интернету”.

+ +

Установка ярлыков

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

Требуется для добавления ярлыков веб-сайтов на главный экран.

+ +

Чтение хранилища

+

android.permission.READ_EXTERNAL_STORAGE

+

Требуется для импорта настроек из общих папок. + В Android Marshmallow (API 23) и более поздних версиях, если это разрешение получено не будет, Privacy Browser может импортировать настройки из папок приложения.

+ +

Запись хранилища

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Требуется для экспорта настроек и загрузки файлов в общие папки. + В Android Marshmallow (API 23) и более поздних версиях, если это разрешение получено не будет, Privacy Browser может экспортировать настройки и хранить загрузки в папках приложения.

+ +
+
+
+ +

Кроме того, Privacy Browser Free отображает объявления из сети Google AdMob с использованием бэкенда Firebase. + Для бесплатной версии Firebase добавляет следующие разрешения, даже если они не перечислены в + файле манифеста исходного кода.

+ +

Просмотр сетевых подключений

+

android.permission.ACCESS_NETWORK_STATE

+

Позволяет рекламе узнавать наличие подключения к интернету (возможно, таким образом предотвращаются попытки загрузки рекламы при отсутствии активного соединения). + Кроме того, передается тип подключения - Wi-Fi, 2G, 3G, 4G, и т.д.

+ +

Предотвращение засыпания устройства

+

android.permission.WAKE_LOCK

+

Позволяет рекламе предотвращать переход процессора в режим сна и экран от выключения. Результаты тестировании не свидетельствуют о том, что реклама на самом деле это делает.

+ +

Play Install Referrer API

+

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

+

Позволяет сторонним приложениям сообщать о запуске инсталляции из рекламы в Privacy Browser Free.

+ +

Получение данных из интернета

+

com.google.android.c2dm.permission.RECEIVE

+

Позволяет Google отправлять информацию непосредственно в AdView без необходимости сначала получать запрос (обмен сообщениями между облаком и устройством).

+ + \ No newline at end of file diff --git a/app/src/free/assets/ru/about_permissions_dark.html b/app/src/free/assets/ru/about_permissions_dark.html deleted file mode 100644 index 34d7579b..00000000 --- a/app/src/free/assets/ru/about_permissions_dark.html +++ /dev/null @@ -1,70 +0,0 @@ - - - - - - - - - - -

Полный доступ к сети

-

android.permission.INTERNET

-

Требуется для доступа WebView к интернету. Без этого разрешения Privacy Browser будет отображать “Нет браузера: угрозы вашей конфиденциальности нет из-за отсутствия доступа к интернету”.

- -

Установка ярлыков

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Требуется для добавления ярлыков веб-сайтов на главный экран.

- -

Чтение хранилища

-

android.permission.READ_EXTERNAL_STORAGE

-

Требуется для импорта настроек из общих папок. - В Android Marshmallow (API 23) и более поздних версиях, если это разрешение получено не будет, Privacy Browser может импортировать настройки из папок приложения.

- -

Запись хранилища

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Требуется для экспорта настроек и загрузки файлов в общие папки. - В Android Marshmallow (API 23) и более поздних версиях, если это разрешение получено не будет, Privacy Browser может экспортировать настройки и хранить загрузки в папках приложения.

- -
-
-
- -

Кроме того, Privacy Browser Free отображает объявления из сети Google AdMob с использованием бэкенда Firebase. - Для бесплатной версии Firebase добавляет следующие разрешения, даже если они не перечислены в - файле манифеста исходного кода.

- -

Просмотр сетевых подключений

-

android.permission.ACCESS_NETWORK_STATE

-

Позволяет рекламе узнавать наличие подключения к интернету (возможно, таким образом предотвращаются попытки загрузки рекламы при отсутствии активного соединения). - Кроме того, передается тип подключения - Wi-Fi, 2G, 3G, 4G, и т.д.

- -

Предотвращение засыпания устройства

-

android.permission.WAKE_LOCK

-

Позволяет рекламе предотвращать переход процессора в режим сна и экран от выключения. Результаты тестировании не свидетельствуют о том, что реклама на самом деле это делает.

- -

Play Install Referrer API

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Позволяет сторонним приложениям сообщать о запуске инсталляции из рекламы в Privacy Browser Free.

- -

Получение данных из интернета

-

com.google.android.c2dm.permission.RECEIVE

-

Позволяет Google отправлять информацию непосредственно в AdView без необходимости сначала получать запрос (обмен сообщениями между облаком и устройством).

- - \ No newline at end of file diff --git a/app/src/free/assets/ru/about_permissions_light.html b/app/src/free/assets/ru/about_permissions_light.html deleted file mode 100644 index 74e2be2f..00000000 --- a/app/src/free/assets/ru/about_permissions_light.html +++ /dev/null @@ -1,70 +0,0 @@ - - - - - - - - - - -

Полный доступ к сети

-

android.permission.INTERNET

-

Требуется для доступа WebView к интернету. Без этого разрешения Privacy Browser будет отображать “Нет браузера: угрозы вашей конфиденциальности нет из-за отсутствия доступа к интернету”.

- -

Установка ярлыков

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Требуется для добавления ярлыков веб-сайтов на главный экран.

- -

Чтение хранилища

-

android.permission.READ_EXTERNAL_STORAGE

-

Требуется для импорта настроек из общих папок. - В Android Marshmallow (API 23) и более поздних версиях, если это разрешение получено не будет, Privacy Browser может импортировать настройки из папок приложения.

- -

Запись хранилища

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Требуется для экспорта настроек и загрузки файлов в общие папки. - В Android Marshmallow (API 23) и более поздних версиях, если это разрешение получено не будет, Privacy Browser может экспортировать настройки и хранить загрузки в папках приложения.

- -
-
-
- -

Кроме того, Privacy Browser Free отображает объявления из сети Google AdMob с использованием бэкенда Firebase. - Для бесплатной версии Firebase добавляет следующие разрешения, даже если они не перечислены в - файле манифеста исходного кода.

- -

Просмотр сетевых подключений

-

android.permission.ACCESS_NETWORK_STATE

-

Позволяет рекламе узнавать наличие подключения к интернету (возможно, таким образом предотвращаются попытки загрузки рекламы при отсутствии активного соединения). - Кроме того, передается тип подключения - Wi-Fi, 2G, 3G, 4G, и т.д.

- -

Предотвращение засыпания устройства

-

android.permission.WAKE_LOCK

-

Позволяет рекламе предотвращать переход процессора в режим сна и экран от выключения. Результаты тестировании не свидетельствуют о том, что реклама на самом деле это делает.

- -

Play Install Referrer API

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Позволяет сторонним приложениям сообщать о запуске инсталляции из рекламы в Privacy Browser Free.

- -

Получение данных из интернета

-

com.google.android.c2dm.permission.RECEIVE

-

Позволяет Google отправлять информацию непосредственно в AdView без необходимости сначала получать запрос (обмен сообщениями между облаком и устройством).

- - \ No newline at end of file diff --git a/app/src/free/assets/ru/about_privacy_policy.html b/app/src/free/assets/ru/about_privacy_policy.html new file mode 100644 index 00000000..3854e29e --- /dev/null +++ b/app/src/free/assets/ru/about_privacy_policy.html @@ -0,0 +1,106 @@ + + + + + + + + + + + + + +

Privacy Browser

+

Privacy Browser не собирает никакой пользовательской информации.

+ + +

Google Play

+

Google Play имеет собственную политику конфиденциальности. + Google предоставляет разработчикам сводную анонимизированную информацию об установке, включающую их количество, организованную по следующим категориям.

+
    +
  • Версия Android (напр. Android 7.1)
  • +
  • Устройство (напр. Samsung Galaxy S6 [zeroflte])
  • +
  • Планшеты (напр. Tablets 10" и выше)
  • +
  • Страна (напр. Russian Federation)
  • +
  • Язык (напр. Russian)
  • +
  • Версия приложения (напр. 14)
  • +
  • Оператор (напр. Beeline - RU)
  • +
+ + +

Рейтинги Google Play

+

Google Play имеет собственную политику конфиденциальности. + Google предоставляет разработчикам анонимизированные сводки следующей информации, связанной с пользовательскими рейтингами.

+
    +
  • Страна (напр. Russian Federation)
  • +
  • Язык (напр. Russian)
  • +
  • Версия приложения (напр. 14)
  • +
  • Версия Android (напр. Android 7.1)
  • +
  • Устройство (напр. Google Nexus 5X [bullhead])
  • +
  • Планшеты (напр. Tablets 10" и выше)
  • +
+ + +

Отзывы Google Play

+

Google Play имеет собственную политику конфиденциальности. + Помимо имени автора отзыва, оценки и текста отзыва (все они доступны публично), Google предоставляет разработчику некоторую или всю следующую информацию.

+
    +
  • Код версии (напр. 7)
  • +
  • Имя версии (напр. 1.6)
  • +
  • Версия Android (напр. Android 5.1)
  • +
  • Устройство (напр. Galaxy S6 Edge+ [zenlte])
  • +
  • Производитель (напр. Samsung)
  • +
  • Тип устройства (напр. Phone)
  • +
  • Производитель CPU (напр. Samsung)
  • +
  • Модель CPU (напр. Exynos 7420)
  • +
  • Разрешение экрана (напр. 560 dpi)
  • +
  • Размер экрана (напр. 2560 x 1440)
  • +
  • ОЗУ (напр. 4096 MB)
  • +
  • Собственная платформа (напр. armeabi-v7a,armeabi,arm64v8a)
  • +
  • Версия OpenGL ES (напр. 3.1)
  • +
  • Язык устройства (напр. Russian)
  • +
+ + +

Реклама

+

Privacy Browser Free отображает рекламный баннер в нижней части экрана с помощью сети Google AdMob, + которая имеет собственную политику конфиденциальности. + Эта реклама не персонализируется. + AdMob отправляет анонимные отчеты разработчикам, содержащие следующую информацию.

+
    +
  • Всего показов
  • +
  • Всего кликов
  • +
  • Платформы (напр. высокопроизводительные мобильные устройства, планшеты)
  • +
  • Активность по странам
  • +
+ + +

Прямая связь

+

Пользователи могут напрямую связаться со Stoutner при помощи электронной почты и комментариев на stoutner.com.

+ + +

Использование информации

+

Stoutner может использовать эту информацию, как помощь в разработке Privacy Browser и сообщать о статусе проекта пользователям. + Stoutner никогда не будет продавать эту информацию или передавать ее третьей стороне, которая использовала бы ее для рекламы или маркетинга.

+ +
+

Ревизия 1.7, 14 мая 2019 года

+ + \ No newline at end of file diff --git a/app/src/free/assets/ru/about_privacy_policy_dark.html b/app/src/free/assets/ru/about_privacy_policy_dark.html deleted file mode 100644 index 5387a787..00000000 --- a/app/src/free/assets/ru/about_privacy_policy_dark.html +++ /dev/null @@ -1,103 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser не собирает никакой пользовательской информации.

- - -

Google Play

-

Google Play имеет собственную политику конфиденциальности. - Google предоставляет разработчикам сводную анонимизированную информацию об установке, включающую их количество, организованную по следующим категориям.

-
    -
  • Версия Android (напр. Android 7.1)
  • -
  • Устройство (напр. Samsung Galaxy S6 [zeroflte])
  • -
  • Планшеты (напр. Tablets 10" и выше)
  • -
  • Страна (напр. Russian Federation)
  • -
  • Язык (напр. Russian)
  • -
  • Версия приложения (напр. 14)
  • -
  • Оператор (напр. Beeline - RU)
  • -
- - -

Рейтинги Google Play

-

Google Play имеет собственную политику конфиденциальности. - Google предоставляет разработчикам анонимизированные сводки следующей информации, связанной с пользовательскими рейтингами.

-
    -
  • Страна (напр. Russian Federation)
  • -
  • Язык (напр. Russian)
  • -
  • Версия приложения (напр. 14)
  • -
  • Версия Android (напр. Android 7.1)
  • -
  • Устройство (напр. Google Nexus 5X [bullhead])
  • -
  • Планшеты (напр. Tablets 10" и выше)
  • -
- - -

Отзывы Google Play

-

Google Play имеет собственную политику конфиденциальности. - Помимо имени автора отзыва, оценки и текста отзыва (все они доступны публично), Google предоставляет разработчику некоторую или всю следующую информацию.

-
    -
  • Код версии (напр. 7)
  • -
  • Имя версии (напр. 1.6)
  • -
  • Версия Android (напр. Android 5.1)
  • -
  • Устройство (напр. Galaxy S6 Edge+ [zenlte])
  • -
  • Производитель (напр. Samsung)
  • -
  • Тип устройства (напр. Phone)
  • -
  • Производитель CPU (напр. Samsung)
  • -
  • Модель CPU (напр. Exynos 7420)
  • -
  • Разрешение экрана (напр. 560 dpi)
  • -
  • Размер экрана (напр. 2560 x 1440)
  • -
  • ОЗУ (напр. 4096 MB)
  • -
  • Собственная платформа (напр. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Версия OpenGL ES (напр. 3.1)
  • -
  • Язык устройства (напр. Russian)
  • -
- - -

Реклама

-

Privacy Browser Free отображает рекламный баннер в нижней части экрана с помощью сети Google AdMob, - которая имеет собственную политику конфиденциальности. - Эта реклама не персонализируется. - AdMob отправляет анонимные отчеты разработчикам, содержащие следующую информацию.

-
    -
  • Всего показов
  • -
  • Всего кликов
  • -
  • Платформы (напр. высокопроизводительные мобильные устройства, планшеты)
  • -
  • Активность по странам
  • -
- - -

Прямая связь

-

Пользователи могут напрямую связаться со Stoutner при помощи электронной почты и комментариев на stoutner.com.

- - -

Использование информации

-

Stoutner может использовать эту информацию, как помощь в разработке Privacy Browser и сообщать о статусе проекта пользователям. - Stoutner никогда не будет продавать эту информацию или передавать ее третьей стороне, которая использовала бы ее для рекламы или маркетинга.

- -
-

Ревизия 1.7, 14 мая 2019 года

- - \ No newline at end of file diff --git a/app/src/free/assets/ru/about_privacy_policy_light.html b/app/src/free/assets/ru/about_privacy_policy_light.html deleted file mode 100644 index 9f1895d2..00000000 --- a/app/src/free/assets/ru/about_privacy_policy_light.html +++ /dev/null @@ -1,103 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser не собирает никакой пользовательской информации.

- - -

Google Play

-

Google Play имеет собственную политику конфиденциальности. - Google предоставляет разработчикам сводную анонимизированную информацию об установке, включающую их количество, организованную по следующим категориям.

-
    -
  • Версия Android (напр. Android 7.1)
  • -
  • Устройство (напр. Samsung Galaxy S6 [zeroflte])
  • -
  • Планшеты (напр. Tablets 10" и выше)
  • -
  • Страна (напр. Russian Federation)
  • -
  • Язык (напр. Russian)
  • -
  • Версия приложения (напр. 14)
  • -
  • Оператор (напр. Beeline - RU)
  • -
- - -

Рейтинги Google Play

-

Google Play имеет собственную политику конфиденциальности. - Google предоставляет разработчикам анонимизированные сводки следующей информации, связанной с пользовательскими рейтингами.

-
    -
  • Страна (напр. Russian Federation)
  • -
  • Язык (напр. Russian)
  • -
  • Версия приложения (напр. 14)
  • -
  • Версия Android (напр. Android 7.1)
  • -
  • Устройство (напр. Google Nexus 5X [bullhead])
  • -
  • Планшеты (напр. Tablets 10" и выше)
  • -
- - -

Отзывы Google Play

-

Google Play имеет собственную политику конфиденциальности. - Помимо имени автора отзыва, оценки и текста отзыва (все они доступны публично), Google предоставляет разработчику некоторую или всю следующую информацию.

-
    -
  • Код версии (напр. 7)
  • -
  • Имя версии (напр. 1.6)
  • -
  • Версия Android (напр. Android 5.1)
  • -
  • Устройство (напр. Galaxy S6 Edge+ [zenlte])
  • -
  • Производитель (напр. Samsung)
  • -
  • Тип устройства (напр. Phone)
  • -
  • Производитель CPU (напр. Samsung)
  • -
  • Модель CPU (напр. Exynos 7420)
  • -
  • Разрешение экрана (напр. 560 dpi)
  • -
  • Размер экрана (напр. 2560 x 1440)
  • -
  • ОЗУ (напр. 4096 MB)
  • -
  • Собственная платформа (напр. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Версия OpenGL ES (напр. 3.1)
  • -
  • Язык устройства (напр. Russian)
  • -
- - -

Реклама

-

Privacy Browser Free отображает рекламный баннер в нижней части экрана с помощью сети Google AdMob, - которая имеет собственную политику конфиденциальности. - Эта реклама не персонализируется. - AdMob отправляет анонимные отчеты разработчикам, содержащие следующую информацию.

-
    -
  • Всего показов
  • -
  • Всего кликов
  • -
  • Платформы (напр. высокопроизводительные мобильные устройства, планшеты)
  • -
  • Активность по странам
  • -
- - -

Прямая связь

-

Пользователи могут напрямую связаться со Stoutner при помощи электронной почты и комментариев на stoutner.com.

- - -

Использование информации

-

Stoutner может использовать эту информацию, как помощь в разработке Privacy Browser и сообщать о статусе проекта пользователям. - Stoutner никогда не будет продавать эту информацию или передавать ее третьей стороне, которая использовала бы ее для рекламы или маркетинга.

- -
-

Ревизия 1.7, 14 мая 2019 года

- - \ No newline at end of file diff --git a/app/src/free/assets/tr/about_permissions.html b/app/src/free/assets/tr/about_permissions.html new file mode 100644 index 00000000..3abc919b --- /dev/null +++ b/app/src/free/assets/tr/about_permissions.html @@ -0,0 +1,74 @@ + + + + + + + + + + + + + +

Tam ağ erişimine sahip olma

+

android.permission.INTERNET

+

WebView’ın internete erişimi için gereklidir. Bu izin olmadan, Privacy Browser, “İnternet Olmadan Gizliliğinizi Koruyan Bir Tarayıcı” olacaktır.

+ +

Kısayolları yükleme

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

Başlatıcı masaüstüne web sayfalarının kısayollarını eklemek için gereklidir.

+ +

Depolama okuma

+

android.permission.READ_EXTERNAL_STORAGE

+

Ayarları ortak klasörden içe aktarmak için gereklidir. + Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediğinde, Privacy Browser, uygulama klasörlerinden ayarları içe aktarır.

+ +

Depolama yazma

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Ayarları ve indirilen dosyaları ortak klasörlere aktarmak için gereklidir. + Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediğinde, Privacy Browser, + indirilenleri uygulama klasörlerine depolar ve ayarları uygulama klasörlerine aktarır.

+ +
+
+
+ +

Ek olarak, Privacy Browser Ücretsiz, Firebase backend kullanarak Google'ın AdMob ağından reklamlar görüntüler. + Ücretsiz sürüm için Firebase, kaynak kod bildirim dosyasında + listelenmemiş olsalar bile aşağıdaki izinleri ilave eder.

+ +

Ağ bağlantılarını görüntüle

+

android.permission.ACCESS_NETWORK_STATE

+

Reklamların, internet erişimine ne zaman sahip olup olmadığınızı bilmesine izin verir (internet erişiminiz yoksa muhtemelen reklamı tekrar yüklemeyi denemezler). + Ayrıca internete Wi-Fi, 2g, 3g, 4g vs. bağlantı şekillerinden hangisiyle bağlandığınızı da anlayabilirler.

+ +

Telefonun uyku moduna geçmesini engelleme

+

android.permission.WAKE_LOCK

+

Reklamların, işlemcinin uyku moduna geçmesini ve ekranın kararmasını engellemesine izin verir. Kişisel deneyimime göre reklamların bunu yapabileceğini sanmıyorum.

+ +

Play Install Referrer API

+

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

+

Diğer uygulamaların, kurulumlarının Privacy Browser Ücretsizde görüntülenen bir reklamdan başlatılıp başlatılmadığını anlamasına izin verir.

+ +

Ä°nternetten veri alma

+

com.google.android.c2dm.permission.RECEIVE

+

Google'ın, öncesinde bir istek almasına gerek duymadan, AdView'e doğrudan bilgi göndermesine izin verir (buluttan cihaza iletişim).

+ + \ No newline at end of file diff --git a/app/src/free/assets/tr/about_permissions_dark.html b/app/src/free/assets/tr/about_permissions_dark.html deleted file mode 100644 index 5cbf4039..00000000 --- a/app/src/free/assets/tr/about_permissions_dark.html +++ /dev/null @@ -1,71 +0,0 @@ - - - - - - - - - - -

Tam ağ erişimine sahip olma

-

android.permission.INTERNET

-

WebView’ın internete erişimi için gereklidir. Bu izin olmadan, Privacy Browser, “İnternet Olmadan Gizliliğinizi Koruyan Bir Tarayıcı” olacaktır.

- -

Kısayolları yükleme

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Başlatıcı masaüstüne web sayfalarının kısayollarını eklemek için gereklidir.

- -

Depolama okuma

-

android.permission.READ_EXTERNAL_STORAGE

-

Ayarları ortak klasörden içe aktarmak için gereklidir. - Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediğinde, Privacy Browser, uygulama klasörlerinden ayarları içe aktarır.

- -

Depolama yazma

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Ayarları ve indirilen dosyaları ortak klasörlere aktarmak için gereklidir. - Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediğinde, Privacy Browser, - indirilenleri uygulama klasörlerine depolar ve ayarları uygulama klasörlerine aktarır.

- -
-
-
- -

Ek olarak, Privacy Browser Ücretsiz, Firebase backend kullanarak Google'ın AdMob ağından reklamlar görüntüler. - Ücretsiz sürüm için Firebase, kaynak kod bildirim dosyasında - listelenmemiş olsalar bile aşağıdaki izinleri ilave eder.

- -

Ağ bağlantılarını görüntüle

-

android.permission.ACCESS_NETWORK_STATE

-

Reklamların, internet erişimine ne zaman sahip olup olmadığınızı bilmesine izin verir (internet erişiminiz yoksa muhtemelen reklamı tekrar yüklemeyi denemezler). - Ayrıca internete Wi-Fi, 2g, 3g, 4g vs. bağlantı şekillerinden hangisiyle bağlandığınızı da anlayabilirler.

- -

Telefonun uyku moduna geçmesini engelleme

-

android.permission.WAKE_LOCK

-

Reklamların, işlemcinin uyku moduna geçmesini ve ekranın kararmasını engellemesine izin verir. Kişisel deneyimime göre reklamların bunu yapabileceğini sanmıyorum.

- -

Play Install Referrer API

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Diğer uygulamaların, kurulumlarının Privacy Browser Ücretsizde görüntülenen bir reklamdan başlatılıp başlatılmadığını anlamasına izin verir.

- -

Ä°nternetten veri alma

-

com.google.android.c2dm.permission.RECEIVE

-

Google'ın, öncesinde bir istek almasına gerek duymadan, AdView'e doğrudan bilgi göndermesine izin verir (buluttan cihaza iletişim).

- - \ No newline at end of file diff --git a/app/src/free/assets/tr/about_permissions_light.html b/app/src/free/assets/tr/about_permissions_light.html deleted file mode 100644 index 4a1c6a93..00000000 --- a/app/src/free/assets/tr/about_permissions_light.html +++ /dev/null @@ -1,71 +0,0 @@ - - - - - - - - - - -

Tam ağ erişimine sahip olma

-

android.permission.INTERNET

-

WebView’ın internete erişimi için gereklidir. Bu izin olmadan, Privacy Browser, “İnternet Olmadan Gizliliğinizi Koruyan Bir Tarayıcı” olacaktır.

- -

Kısayolları yükleme

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Başlatıcı masaüstüne web sayfalarının kısayollarını eklemek için gereklidir.

- -

Depolama okuma

-

android.permission.READ_EXTERNAL_STORAGE

-

Ayarları ortak klasörden içe aktarmak için gereklidir. - Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediğinde, Privacy Browser, uygulama klasörlerinden ayarları içe aktarır.

- -

Depolama yazma

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Ayarları ve indirilen dosyaları ortak klasörlere aktarmak için gereklidir. - Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediğinde, Privacy Browser, - indirilenleri uygulama klasörlerine depolar ve ayarları uygulama klasörlerine aktarır.

- -
-
-
- -

Ek olarak, Privacy Browser Ücretsiz, Firebase backend kullanarak Google'ın AdMob ağından reklamlar görüntüler. - Ücretsiz sürüm için Firebase, kaynak kod bildirim dosyasında - listelenmemiş olsalar bile aşağıdaki izinleri ilave eder.

- -

Ağ bağlantılarını görüntüle

-

android.permission.ACCESS_NETWORK_STATE

-

Reklamların, internet erişimine ne zaman sahip olup olmadığınızı bilmesine izin verir (internet erişiminiz yoksa muhtemelen reklamı tekrar yüklemeyi denemezler). - Ayrıca internete Wi-Fi, 2g, 3g, 4g vs. bağlantı şekillerinden hangisiyle bağlandığınızı da anlayabilirler.

- -

Telefonun uyku moduna geçmesini engelleme

-

android.permission.WAKE_LOCK

-

Reklamların, işlemcinin uyku moduna geçmesini ve ekranın kararmasını engellemesine izin verir. Kişisel deneyimime göre reklamların bunu yapabileceğini sanmıyorum.

- -

Play Install Referrer API

-

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

-

Diğer uygulamaların, kurulumlarının Privacy Browser Ücretsizde görüntülenen bir reklamdan başlatılıp başlatılmadığını anlamasına izin verir.

- -

Ä°nternetten veri alma

-

com.google.android.c2dm.permission.RECEIVE

-

Google'ın, öncesinde bir istek almasına gerek duymadan, AdView'e doğrudan bilgi göndermesine izin verir (buluttan cihaza iletişim).

- - \ No newline at end of file diff --git a/app/src/free/assets/tr/about_privacy_policy.html b/app/src/free/assets/tr/about_privacy_policy.html new file mode 100644 index 00000000..90aaff9b --- /dev/null +++ b/app/src/free/assets/tr/about_privacy_policy.html @@ -0,0 +1,106 @@ + + + + + + + + + + + + + +

Privacy Browser

+

Privacy Browser herhangi bir kullanıcı bilgisi toplamaz.

+ + +

Google Play

+

Google Play kendisine özgü gizlilik politikasına sahiptir. + Google, aşağıdaki kategorilerce düzenlenen, indirme sayıları da dahil, anonimleştirilmiş özet kurulum bilgilerini geliştiricilere verir.

+
    +
  • Android versiyonu (örn. Android 7.1)
  • +
  • Cihaz (örn. Samsung Galaxy S6 [zeroflte])
  • +
  • Tabletler (örn. Tablets 10" ve üzeri)
  • +
  • Ülke (örn. Amerika Birleşik Devletleri)
  • +
  • Dil (örn. Ä°ngilizce [Amerika Birleşik Devletleri])
  • +
  • Uygulama versiyonu (örn. 14)
  • +
  • Telefon operatörü (örn. T-Mobile - US)
  • +
+ + +

Google Play Derecelendirmeleri

+

Google Play kendisine özgü gizlilik politikasına sahiptir. + Google, kullanıcı değerlendirmeleriyle ilişkili aşağıdaki bilgilerin anonimleştirilmiş özetlerini geliştiricilere verir.

+
    +
  • Ülke (örn. Amerika Birleşik Devletleri)
  • +
  • Dil (örn. Ä°ngilizce)
  • +
  • Uygulama versiyonu (örn. 14)
  • +
  • Android versiyonu (örn. Android 7.1)
  • +
  • Cihaz (örn. Google Nexus 5X [bullhead])
  • +
  • Tabletler (örn. Tablets 10" ve üzeri)
  • +
+ + +

Google Play Kritikleri

+

Google Play kendisine özgü gizlilik politikasına sahiptir. + Google, inceleme yapan kişinin ismine, değerlendirmeye ve inceleme metninine (tümü halka açıktır) ek olarak, aşağıdaki bilgilerin bir kısmını ya da tamamını geliştiricilere verir.

+
    +
  • Versiyon kodu (örn. 7)
  • +
  • Versiyon adı (örn. 1.6)
  • +
  • Android versiyonu (örn. Android 5.1)
  • +
  • Cihaz (örn. Galaxy S6 Edge+ [zenlte])
  • +
  • Üretici (örn. Samsung)
  • +
  • Cihaz tipi (örn. Telefon)
  • +
  • CPU markası (örn. Samsung)
  • +
  • CPU modeli (örn. Exynos 7420)
  • +
  • Piksel yoğunluğu (örn. 560 dpi)
  • +
  • Ekran boyutu (örn. 2560 x 1440)
  • +
  • RAM (örn. 4096 MB)
  • +
  • Native platformu (örn. armeabi-v7a,armeabi,arm64v8a)
  • +
  • OpenGL ES versiyonu (örn. 3.1)
  • +
  • Cihaz dili (örn. Ä°ngilizce)
  • +
+ + +

Reklamlar

+

Privacy Browser Ücretsiz, Google'ın, kendisine özgü gizlilik politikası olan + AdMob ağını kullanarak ekranın alt kısmında bir banner reklam gösterir. + Bu reklamlar kişiselleştirilmemiş olarak ayarlanmıştır. + AdMob, geliştiricilere aşağıdaki bilgilerin anonimleştirilmiş özetlerini rapor eder.

+
    +
  • Toplam gösterimler
  • +
  • Toplam tıklamalar
  • +
  • Platformlar (örn. en üst seviye mobil cihazlar, tabletler)
  • +
  • Ülkeye göre etkinlik
  • +
+ + +

Doğrudan İletişim

+

Kullanıcılar, stoutner.com üzerinden Stoutner ile doğrudan iletişime (E-posta atmak ya da yorum yapmak gibi) geçebilir.

+ + +

Bilgilerin Kullanımı

+

Stoutner bu bilgileri, Privacy Browser'ın geliştirilmesine yardımcı olması ve kullanıcılarla projenin durumuyla ilgili iletişime geçmek için kullanabilir. + Stoutner asla bu bilgileri, reklam ve pazarlama için kullanacak üçüncü kişilere vermez ya da satmaz.

+ +
+

Revizyon 1.7, 14 Mayıs 2019

+ + \ No newline at end of file diff --git a/app/src/free/assets/tr/about_privacy_policy_dark.html b/app/src/free/assets/tr/about_privacy_policy_dark.html deleted file mode 100644 index 3cdc3ae5..00000000 --- a/app/src/free/assets/tr/about_privacy_policy_dark.html +++ /dev/null @@ -1,103 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser herhangi bir kullanıcı bilgisi toplamaz.

- - -

Google Play

-

Google Play kendisine özgü gizlilik politikasına sahiptir. - Google, aşağıdaki kategorilerce düzenlenen, indirme sayıları da dahil, anonimleştirilmiş özet kurulum bilgilerini geliştiricilere verir.

-
    -
  • Android versiyonu (örn. Android 7.1)
  • -
  • Cihaz (örn. Samsung Galaxy S6 [zeroflte])
  • -
  • Tabletler (örn. Tablets 10" ve üzeri)
  • -
  • Ülke (örn. Amerika Birleşik Devletleri)
  • -
  • Dil (örn. Ä°ngilizce [Amerika Birleşik Devletleri])
  • -
  • Uygulama versiyonu (örn. 14)
  • -
  • Telefon operatörü (örn. T-Mobile - US)
  • -
- - -

Google Play Derecelendirmeleri

-

Google Play kendisine özgü gizlilik politikasına sahiptir. - Google, kullanıcı değerlendirmeleriyle ilişkili aşağıdaki bilgilerin anonimleştirilmiş özetlerini geliştiricilere verir.

-
    -
  • Ülke (örn. Amerika Birleşik Devletleri)
  • -
  • Dil (örn. Ä°ngilizce)
  • -
  • Uygulama versiyonu (örn. 14)
  • -
  • Android versiyonu (örn. Android 7.1)
  • -
  • Cihaz (örn. Google Nexus 5X [bullhead])
  • -
  • Tabletler (örn. Tablets 10" ve üzeri)
  • -
- - -

Google Play Kritikleri

-

Google Play kendisine özgü gizlilik politikasına sahiptir. - Google, inceleme yapan kişinin ismine, değerlendirmeye ve inceleme metninine (tümü halka açıktır) ek olarak, aşağıdaki bilgilerin bir kısmını ya da tamamını geliştiricilere verir.

-
    -
  • Versiyon kodu (örn. 7)
  • -
  • Versiyon adı (örn. 1.6)
  • -
  • Android versiyonu (örn. Android 5.1)
  • -
  • Cihaz (örn. Galaxy S6 Edge+ [zenlte])
  • -
  • Üretici (örn. Samsung)
  • -
  • Cihaz tipi (örn. Telefon)
  • -
  • CPU markası (örn. Samsung)
  • -
  • CPU modeli (örn. Exynos 7420)
  • -
  • Piksel yoğunluğu (örn. 560 dpi)
  • -
  • Ekran boyutu (örn. 2560 x 1440)
  • -
  • RAM (örn. 4096 MB)
  • -
  • Native platformu (örn. armeabi-v7a,armeabi,arm64v8a)
  • -
  • OpenGL ES versiyonu (örn. 3.1)
  • -
  • Cihaz dili (örn. Ä°ngilizce)
  • -
- - - <

Reklamlar

-

Privacy Browser Ücretsiz, Google'ın, kendisine özgü gizlilik politikası olan - AdMob ağını kullanarak ekranın alt kısmında bir banner reklam gösterir. - Bu reklamlar kişiselleştirilmemiş olarak ayarlanmıştır. - AdMob, geliştiricilere aşağıdaki bilgilerin anonimleştirilmiş özetlerini rapor eder.

-
    -
  • Toplam gösterimler
  • -
  • Toplam tıklamalar
  • -
  • Platformlar (örn. en üst seviye mobil cihazlar, tabletler)
  • -
  • Ülkeye göre etkinlik
  • -
- - -

Doğrudan İletişim

-

Kullanıcılar, stoutner.com üzerinden Stoutner ile doğrudan iletişime (E-posta atmak ya da yorum yapmak gibi) geçebilir.

- - -

Bilgilerin Kullanımı

-

Stoutner bu bilgileri, Privacy Browser'ın geliştirilmesine yardımcı olması ve kullanıcılarla projenin durumuyla ilgili iletişime geçmek için kullanabilir. - Stoutner asla bu bilgileri, reklam ve pazarlama için kullanacak üçüncü kişilere vermez ya da satmaz.

- -
-

Revizyon 1.7, 14 Mayıs 2019

- - \ No newline at end of file diff --git a/app/src/free/assets/tr/about_privacy_policy_light.html b/app/src/free/assets/tr/about_privacy_policy_light.html deleted file mode 100644 index afcd8a65..00000000 --- a/app/src/free/assets/tr/about_privacy_policy_light.html +++ /dev/null @@ -1,103 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser herhangi bir kullanıcı bilgisi toplamaz.

- - -

Google Play

-

Google Play kendisine özgü gizlilik politikasına sahiptir. - Google, aşağıdaki kategorilerce düzenlenen, indirme sayıları da dahil, anonimleştirilmiş özet kurulum bilgilerini geliştiricilere verir.

-
    -
  • Android versiyonu (örn. Android 7.1)
  • -
  • Cihaz (örn. Samsung Galaxy S6 [zeroflte])
  • -
  • Tabletler (örn. Tablets 10" ve üzeri)
  • -
  • Ülke (örn. Amerika Birleşik Devletleri)
  • -
  • Dil (örn. Ä°ngilizce [Amerika Birleşik Devletleri])
  • -
  • Uygulama versiyonu (örn. 14)
  • -
  • Telefon operatörü (örn. T-Mobile - US)
  • -
- - -

Google Play Derecelendirmeleri

-

Google Play kendisine özgü gizlilik politikasına sahiptir. - Google, kullanıcı değerlendirmeleriyle ilişkili aşağıdaki bilgilerin anonimleştirilmiş özetlerini geliştiricilere verir.

-
    -
  • Ülke (örn. Amerika Birleşik Devletleri)
  • -
  • Dil (örn. Ä°ngilizce)
  • -
  • Uygulama versiyonu (örn. 14)
  • -
  • Android versiyonu (örn. Android 7.1)
  • -
  • Cihaz (örn. Google Nexus 5X [bullhead])
  • -
  • Tabletler (örn. Tablets 10" ve üzeri)
  • -
- - -

Google Play Kritikleri

-

Google Play kendisine özgü gizlilik politikasına sahiptir. - Google, inceleme yapan kişinin ismine, değerlendirmeye ve inceleme metninine (tümü halka açıktır) ek olarak, aşağıdaki bilgilerin bir kısmını ya da tamamını geliştiricilere verir.

-
    -
  • Versiyon kodu (örn. 7)
  • -
  • Versiyon adı (örn. 1.6)
  • -
  • Android versiyonu (örn. Android 5.1)
  • -
  • Cihaz (örn. Galaxy S6 Edge+ [zenlte])
  • -
  • Üretici (örn. Samsung)
  • -
  • Cihaz tipi (örn. Telefon)
  • -
  • CPU markası (örn. Samsung)
  • -
  • CPU modeli (örn. Exynos 7420)
  • -
  • Piksel yoğunluğu (örn. 560 dpi)
  • -
  • Ekran boyutu (örn. 2560 x 1440)
  • -
  • RAM (örn. 4096 MB)
  • -
  • Native platformu (örn. armeabi-v7a,armeabi,arm64v8a)
  • -
  • OpenGL ES versiyonu (örn. 3.1)
  • -
  • Cihaz dili (örn. Ä°ngilizce)
  • -
- - -

Reklamlar

-

Privacy Browser Ücretsiz, Google'ın, kendisine özgü gizlilik politikası olan - AdMob ağını kullanarak ekranın alt kısmında bir banner reklam gösterir. - Bu reklamlar kişiselleştirilmemiş olarak ayarlanmıştır. - AdMob, geliştiricilere aşağıdaki bilgilerin anonimleştirilmiş özetlerini rapor eder.

-
    -
  • Toplam gösterimler
  • -
  • Toplam tıklamalar
  • -
  • Platformlar (örn. en üst seviye mobil cihazlar, tabletler)
  • -
  • Ülkeye göre etkinlik
  • -
- - -

Doğrudan İletişim

-

Kullanıcılar, stoutner.com üzerinden Stoutner ile doğrudan iletişime (E-posta atmak ya da yorum yapmak gibi) geçebilir.

- - -

Bilgilerin Kullanımı

-

Stoutner bu bilgileri, Privacy Browser'ın geliştirilmesine yardımcı olması ve kullanıcılarla projenin durumuyla ilgili iletişime geçmek için kullanabilir. - Stoutner asla bu bilgileri, reklam ve pazarlama için kullanacak üçüncü kişilere vermez ya da satmaz.

- -
-

Revizyon 1.7, 14 Mayıs 2019

- - \ No newline at end of file diff --git a/app/src/main/assets/css/dark_theme.css b/app/src/main/assets/css/dark_theme.css deleted file mode 100644 index 353dacce..00000000 --- a/app/src/main/assets/css/dark_theme.css +++ /dev/null @@ -1,88 +0,0 @@ -/* - * Copyright © 2017-2019 Soren Stoutner . - * - * This file is part of Privacy Browser . - * - * Privacy Browser is free software: you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation, either version 3 of the License, or - * (at your option) any later version. - * - * Privacy Browser is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with Privacy Browser. If not, see . - */ - -/* Gray 850 */ -body { - background-color: #313131; - color: #BDBDBD; -} - -/* Blue 700 */ -a { - color: #1976D2; - text-decoration: none; -} - -/* Blue 900 */ -::selection { - background: #0D47A1; -} - -/* Blue 600 */ -h3 { - color: #1E88E5; -} - -/* Half of Red 900 */ -strong.red { - color: #A71919; -} - -/* Blue 400 */ -strong.blue { - color: #42A5F5; -} - -/* Blue 400 */ -item { - color: #42A5F5; - font-weight: bold; -} - -img.inline { - height: 16; - width: 16; -} - -img.title { - vertical-align: bottom; - height: 32; - width: 32; -} - -img.icon { - vertical-align: middle; - height: 32; - width: 32; -} - -img.left { - float: left; - height: 32; - width: 32; -} - -/* An image must be a block to be centered. */ -img.center { - display: block; - margin-left: auto; - margin-right: auto; - height: 720; - width: 360; -} \ No newline at end of file diff --git a/app/src/main/assets/css/light_theme.css b/app/src/main/assets/css/light_theme.css deleted file mode 100644 index 484d4bb2..00000000 --- a/app/src/main/assets/css/light_theme.css +++ /dev/null @@ -1,77 +0,0 @@ -/* - * Copyright © 2017-2019 Soren Stoutner . - * - * This file is part of Privacy Browser . - * - * Privacy Browser is free software: you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation, either version 3 of the License, or - * (at your option) any later version. - * - * Privacy Browser is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with Privacy Browser. If not, see . - */ - -/* Blue 700 */ -a { - color: #1976D2; - text-decoration: none; -} - -/* Blue 900 */ -h3 { - color: #0D47A1; -} - -/* Red 900 */ -strong.red { - color: #B71C1C; -} - -/* Blue 800 */ -strong.blue { - color: #1565C0; -} - -/* Blue 700 */ -item { - color: #1976D2; - font-weight: bold; -} - -img.inline { - height: 16; - width: 16; -} - -img.title { - vertical-align: bottom; - height: 32; - width: 32; -} - -img.icon { - vertical-align: middle; - height: 32; - width: 32; -} - -img.left { - float: left; - height: 32; - width: 32; -} - -/* An image must be a block to be centered. */ -img.center { - display: block; - margin-left: auto; - margin-right: auto; - height: 720; - width: 360; -} \ No newline at end of file diff --git a/app/src/main/assets/css/theme.css b/app/src/main/assets/css/theme.css new file mode 100644 index 00000000..ca403a07 --- /dev/null +++ b/app/src/main/assets/css/theme.css @@ -0,0 +1,142 @@ +/* + * Copyright © 2017-2020 Soren Stoutner . + * + * This file is part of Privacy Browser . + * + * Privacy Browser is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * Privacy Browser is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with Privacy Browser. If not, see . + */ + +/* Dark colors. */ +@media (prefers-color-scheme: dark) { + body { + color: #C1C1C1; /* Gray 350 */ + background-color: #303030; /* Gray 860 */ + } +} + +/* Hyperlinks. */ +a { + color: #1976D2; /* Blue 700 */ + text-decoration: none; +} + +@media (prefers-color-scheme: dark) { + a { + color: #5785C5; /* Violet 700 */ + } +} + +/* Headers. */ +h3 { + color: #0D47A1; /* Blue 900 */ +} + +@media (prefers-color-scheme: dark) { + h3 { + color: #8AB4F8; /* Violet 500 */ + } +} + +/* Red bold text */ +strong.red { + color: #B71C1C; /* Red 900. */ +} + +@media (prefers-color-scheme: dark) { + strong.red { + color: #930606; /* Red 1100. */ + } +} + +/* Blue bold text */ +strong.blue { + color: #1565C0; /* Blue 800. */ +} + +/* List items. */ +item { + color: #1565C0; /* Blue 800. */ + font-weight: bold; +} + +/* Header images do not allow the icon to be themed. */ +img.header { + vertical-align: bottom; + height: 32; + width: 32; +} + +/* Header SVGs allow the icon to be themed. */ +svg.header { + vertical-align: bottom; + height: 32; + width: 32; + fill: #0D47A1; /* Blue 900 */ +} + +@media (prefers-color-scheme: dark) { + svg.header { + fill: #8AB4F8; /* Violet 500 */ + } +} + +/* Left aligned images do not allow the icon to be themed. */ +img.left { + float: left; + height: 32; + width: 32; +} + +/* Left aligned SVGs allow the icon to be themed. */ +svg.left { + float: left; + height: 32; + width: 32; + fill: #000000; /* Black */ +} + +@media (prefers-color-scheme: dark) { + svg.left { + fill: #FFFFFF; /* White */ + } +} + +/* Inline images. */ +img.inline { + height: 16; + width: 16; +} + +/* SVG icons. */ +svg.icon { + vertical-align: middle; + height: 32; + width: 32; + fill: #000000; /* Black */ +} + +@media (prefers-color-scheme: dark) { + svg.icon { + fill: #FFFFFF; /* White */ + } +} + +/* Centered screenshot images. An image must be a block to be centered. */ +img.center { + display: block; + margin-left: auto; + margin-right: auto; + height: 720; + width: 360; +} \ No newline at end of file diff --git a/app/src/main/assets/de/about_changelog.html b/app/src/main/assets/de/about_changelog.html new file mode 100644 index 00000000..7eb2960f --- /dev/null +++ b/app/src/main/assets/de/about_changelog.html @@ -0,0 +1,697 @@ + + + + + + + + + + + + + +

3.5.1 (version code 51)

+

28. August 2020 - Mindest-API 19, Ziel-API 29

+
    +
  • Fehler behoben, durch den neue Intents (Aufrufe aus anderen Apps) nicht ausgeführt wurden, + wenn Privacy Browser vom Betriebssystem im Hintergrund geschlossen wurde.
  • +
  • Fehler behoben, durch den die App nicht korrekt initialisiert wurde, + wenn das App-Theme gegenteilig zum Betriebsystem-Theme eingestellt wurde.
  • +
+ +

3.5 (version code 50)

+

18. August 2020 - Mindest-API 19, Ziel-API 29

+ + +

3.4.1 (version code 49)

+

1. April 2020 - Mindest-API 19, Ziel-API 29

+ + +

3.4 (version code 48)

+

28. März 2020 - Mindest-API 19, Ziel-API 29

+ + +

3.3 (version code 47)

+

3. Januar 2020 - Mindest-API 19, Ziel-API 29

+ + +

3.2 (version code 46)

+

20. Juli 2019 - Mindest-API 19, Ziel-API 28

+ + +

3.1 (version code 45)

+

27. Mai 2019 - Mindest-API 19, Ziel-API 28

+ + +

3.0.1 (version code 44)

+

2. Mai 2019 - Mindest-API 19, Ziel-API 28

+ + +

3.0 (version code 43)

+

26. April 2019 - Mindest-API 19, Ziel-API 28

+
    +
  • Tabbed Browsing hinzugefügt.
  • +
  • Bug behoben, der dazu führte, dass die Webview-Anzeige unten abgeschnitten wurde, wenn das Scrollen der App-Leiste deaktiviert wurde.
  • +
  • Bug behoben, der dazu führte, dass Privacy Browser neu startete wenn eine Bluetooth-Tastatur verbunden oder getrennt wurde.
  • +
  • Aktualisierte deutsche Übersetzung von Bernhard G. Keller.
  • +
  • Aktualisierte italienische Übersetzung von Francesco Buratti.
  • +
  • Aktualisierte russische Übersetzung.
  • +
  • Aktualisierte spanische Übersetzung von Jose A. León.
  • +
  • Teilweise türkische Übersetzung.
  • +
+ +

2.17.1 (version code 42)

+

5. März 2019 - Mindest-API 19, Ziel-API 28

+
    +
  • Fix eines Bugs, der Privacy Browser bei Bookmarks von Seiten mit sehr grossen Fav-Icons abstürzen liess.
  • +
  • Privacy Browser kann nun auch auf SD-Karten verschoben werden.
  • +
+ +

2.17 (version code 41)

+

27. Februar 2019 - Mindest-API 19, Ziel-API 28

+ + +

2.16 (version code 40)

+

31. Januar 2019 - Mindest-API 19, Ziel-API 28

+ + +

2.15.1 (version code 39)

+

27. Dezember 2018 - Mindest-API 19, Ziel-API 28

+ + +

2.15 (version code 38)

+

24. Dezember 2018 - Mindest-API 19, Ziel-API 28

+ + +

2.14 (version code 37)

+

8. Dezember 2018 - Mindest-API 19, Ziel-API 28

+ + +

2.13 (version code 36)

+

29. Oktober 2018 - Mindest-API 19, Ziel-API 28

+ + +

2.12 (version code 35)

+

31. Juli 2018 - Mindest-API 19, Ziel-API 27

+ + +

2.11 (version code 34)

+

10. Juli 2018 - Mindest-API 19, Ziel-API 27

+ + +

2.10 (version code 33)

+

24. Mai 2018 - Mindest-API 19, Ziel-API 27

+ + +

2.9 (version code 32)

+

9. Mai 2018 - Mindest-API 19, Ziel-API 27

+ + +

2.8.1 (version code 31)

+

1. März 2018 - Mindest-API 19, Ziel-API 27

+ + +

2.8 (version code 30)

+

22. Februar 2018 - Mindest-API 19, Ziel-API 27

+ + +

2.7.2 (version code 29)

+

22. November 2017 - Mindest-API 19, Ziel-API 26

+ + +

2.7.1 (version code 28)

+

9. November 2017 - Mindest-API 19, Ziel-API 26

+ + +

2.7 (version code 27)

+

7. November 2017 - Mindest-API 19, Ziel-API 26

+
    +
  • Add a bookmarks drawer that is accessed by sliding from the right.
  • +
  • Prevent Night Mode from flashing a white background when loading new pages.
  • +
  • Update the user agents.
  • +
  • Bump target API to 26 (Android Oreo, 8.0.0).
  • +
  • Aktualisierte italienische Übersetzung von Francesco Buratti.
  • +
  • Aktualisierte spanische Übersetzung von Jose A. León.
  • +
+ +

2.6 (version code 26)

+

18. September 2017 - Mindest-API 19, Ziel-API 25

+ + +

2.5 (version code 25)

+

26. August 2017 - Mindest-API 19, Ziel-API 25

+ + +

2.4 (version code 24)

+

23. Juni 2017 - Mindest-API 19, Ziel-API 25

+ + +

2.3 (version code 23)

+

26. Mai 2017 - Mindest-API 19, Ziel-API 25

+ + +

2.2 (version code 22)

+

27. April 2017 - Mindest-API 19, Ziel-API 25

+ + +

2.1 (version code 21)

+

25. März 2017 - Mindest-API 19, Ziel-API 25

+ + +

2.0.1 (version code 20)

+

21. März 2017 - Mindest-API 19, Ziel-API 25

+ + +

2.0 (version code 19)

+

16. März 2017 - Mindest-API 19, Ziel-API 25

+ + +

1.15 (version code 18)

+

11. Februar 2017 - Mindest-API 19, Ziel-API 25

+ + +

1.14.1 (version code 17)

+

4. Januar 2017 - Mindest-API 19, Ziel-API 25

+ + +

1.14 (version code 16)

+

26. Dezember 2016 - Mindest-API 19, Ziel-API 25

+ + +

1.13 (version code 15)

+

28. November 2016 - Mindest-API 19, Ziel-API 24

+ + +

1.12 (version code 14)

+

9. November 2016 - Mindest-API 19, Ziel-API 24

+ + +

1.11 (version code 13)

+

22. Oktober 2016 - Mindest-API 19, Ziel-API 24

+
    +
  • Ziel-API auf 24 hochgestuft, um Multi-Window auf Android Nougat zu ermöglichen.
  • +
  • Fehler behoben, der seit Version 1.10 exisiterte und große Auslastung der CPU ohne wirklichen Grund verursachte.
  • +
  • Funktion zum Drucken hinzugefügt.
  • +
  • Fehler bezüglich Dateidownloads auf KitKat und Lollipop behoben.
  • +
  • Deutsche Übersetzung durch Aaron Gerlach fur die neuen Funktionen aktualisiert.
  • +
+ +

1.10 (version code 12)

+

15. September 2016 - Mindest-API 19, Ziel-API 23

+
    +
  • Unterstützung für TOR Orbot Proxy hinzugefügt.
  • +
  • Do Not Track-Option hinzugefügt.
  • +
  • Einen Download-Dialog hinzugefügt, mit dem der User den Dateinamen ändern kann, + bevor der Download startet.
  • +
  • Optionale zusätzliche Funktionsbuttons für Cookies, DOM-Speicher und Formulardaten hinzugefügt.
  • +
  • Aktualisierung der wählbaren User Agents; Safari auf iOS und OS X hinzugefügt.
  • +
  • StartPage und Qwant zur Liste der Suchmaschinen hinzugefügt.
  • +
  • Deutsche Übersetzung durch Aaron Gerlach fur die neuen Funktionen aktualisiert.
  • +
+ +

1.9.1 (version code 11)

+

27. August 2016 - Mindest-API 19, Ziel-API 23

+
    +
  • Bilder-Verknüpfungen zu relativen Pfaden geändert, sodass Privacy Browser in F-Droid geladen wird.
  • +
+ +

1.9 (version code 10)

+

26. August 2016 - Mindest-API 19, Ziel-API 23

+ + +

1.8 (version code 9)

+

16. Juli 2016 - Mindest-API 19, Ziel-API 23

+ + +

1.7 (version code 8)

+

16. Juni 2016 - Mindest-API 19, Ziel-API 23

+ + +

1.6 (version code 7)

+

11. Mai 2016 - Mindest-API 15, Ziel-API 23

+ + +

1.5 (version code 6)

+

5. Mai 2016 - Mindest-API 15, Ziel-API 23

+
    +
  • Option hinzugefügt, mit der man das "Herunterziehen zum Aktualisieren" deaktivieren kann, damit bestimmte Websites wie Google Maps korrekt funktionieren.
  • +
+ +

1.4 (version code 5)

+

28. April 2016 - Mindest-API 15, Ziel-API 23

+
    +
  • Steuerung für Drittanbieter-Cookies hinzugefügt.
  • +
  • Fehlerbehebung für Vollbild-Videowiedergabe.
  • +
+ +

1.3 (version code 4)

+

7. April 2016 - Mindest-API 15, Ziel-API 23

+ + +

1.2 (version code 3)

+

23. März 2016 - Mindest-API 15, Ziel-API 23

+ + +

1.1 (version code 2)

+

9. März 2016 - Mindest-API 10, Ziel-API 23

+
    +
  • Die Standard- und die kostenlosen Varianten getrennt, damit die App korrekt in F-Droid gezeigt wird.
  • +
+ +

1.0 (version code 1)

+

24. Februar 2016 - Mindest-API 10, Ziel-API 23

+
    +
  • Option zum (De-)Aktivieren von Javascript, DOM-Speicher und Cookies hinzugefügt.
  • +
  • Standardmäßige Aktivierung von Javascript, DOM-Speicher und Cookies gesetzt.
  • +
  • DOM-Speicher und Cookies leerbar.
  • +
  • Shortcuts für Launcher hinzugefügt.
  • +
  • Mehr Funktionalität des Download-Managers.
  • +
  • Vorwärts und zurück navigieren.
  • +
  • URLs ausschneiden, kopieren und einsetzen.
  • +
  • URLs teilen.
  • +
  • Homepage bestimmen.
  • +
  • URL-Leiste scrollbar.
  • +
  • WebView-Position beim Rotieren des Bildschirms angepasst.
  • +
  • Herunterziehen zum Aktualisieren im WebView.
  • +
  • Videos im Vollbild-Modus (Javascript muss aktiviert sein).
  • +
  • Leeren und Verlassen Menü-Option.
  • +
+ + \ No newline at end of file diff --git a/app/src/main/assets/de/about_changelog_dark.html b/app/src/main/assets/de/about_changelog_dark.html deleted file mode 100644 index 2d76163c..00000000 --- a/app/src/main/assets/de/about_changelog_dark.html +++ /dev/null @@ -1,694 +0,0 @@ - - - - - - - - - - -

3.5.1 (version code 51)

-

28. August 2020 - Mindest-API 19, Ziel-API 29

-
    -
  • Fehler behoben, durch den neue Intents (Aufrufe aus anderen Apps) nicht ausgeführt wurden, - wenn Privacy Browser vom Betriebssystem im Hintergrund geschlossen wurde.
  • -
  • Fehler behoben, durch den die App nicht korrekt initialisiert wurde, - wenn das App-Theme gegenteilig zum Betriebsystem-Theme eingestellt wurde.
  • -
- -

3.5 (version code 50)

-

18. August 2020 - Mindest-API 19, Ziel-API 29

- - -

3.4.1 (version code 49)

-

1. April 2020 - Mindest-API 19, Ziel-API 29

- - -

3.4 (version code 48)

-

28. März 2020 - Mindest-API 19, Ziel-API 29

- - -

3.3 (version code 47)

-

3. Januar 2020 - Mindest-API 19, Ziel-API 29

- - -

3.2 (version code 46)

-

20. Juli 2019 - Mindest-API 19, Ziel-API 28

- - -

3.1 (version code 45)

-

27. Mai 2019 - Mindest-API 19, Ziel-API 28

- - -

3.0.1 (version code 44)

-

2. Mai 2019 - Mindest-API 19, Ziel-API 28

- - -

3.0 (version code 43)

-

26. April 2019 - Mindest-API 19, Ziel-API 28

-
    -
  • Tabbed Browsing hinzugefügt.
  • -
  • Bug behoben, der dazu führte, dass die Webview-Anzeige unten abgeschnitten wurde, wenn das Scrollen der App-Leiste deaktiviert wurde.
  • -
  • Bug behoben, der dazu führte, dass Privacy Browser neu startete wenn eine Bluetooth-Tastatur verbunden oder getrennt wurde.
  • -
  • Aktualisierte deutsche Übersetzung von Bernhard G. Keller.
  • -
  • Aktualisierte italienische Übersetzung von Francesco Buratti.
  • -
  • Aktualisierte russische Übersetzung.
  • -
  • Aktualisierte spanische Übersetzung von Jose A. León.
  • -
  • Teilweise türkische Übersetzung.
  • -
- -

2.17.1 (version code 42)

-

5. März 2019 - Mindest-API 19, Ziel-API 28

-
    -
  • Fix eines Bugs, der Privacy Browser bei Bookmarks von Seiten mit sehr grossen Fav-Icons abstürzen liess.
  • -
  • Privacy Browser kann nun auch auf SD-Karten verschoben werden.
  • -
- -

2.17 (version code 41)

-

27. Februar 2019 - Mindest-API 19, Ziel-API 28

- - -

2.16 (version code 40)

-

31. Januar 2019 - Mindest-API 19, Ziel-API 28

- - -

2.15.1 (version code 39)

-

27. Dezember 2018 - Mindest-API 19, Ziel-API 28

- - -

2.15 (version code 38)

-

24. Dezember 2018 - Mindest-API 19, Ziel-API 28

- - -

2.14 (version code 37)

-

8. Dezember 2018 - Mindest-API 19, Ziel-API 28

- - -

2.13 (version code 36)

-

29. Oktober 2018 - Mindest-API 19, Ziel-API 28

- - -

2.12 (version code 35)

-

31. Juli 2018 - Mindest-API 19, Ziel-API 27

- - -

2.11 (version code 34)

-

10. Juli 2018 - Mindest-API 19, Ziel-API 27

- - -

2.10 (version code 33)

-

24. Mai 2018 - Mindest-API 19, Ziel-API 27

- - -

2.9 (version code 32)

-

9. Mai 2018 - Mindest-API 19, Ziel-API 27

- - -

2.8.1 (version code 31)

-

1. März 2018 - Mindest-API 19, Ziel-API 27

- - -

2.8 (version code 30)

-

22. Februar 2018 - Mindest-API 19, Ziel-API 27

- - -

2.7.2 (version code 29)

-

22. November 2017 - Mindest-API 19, Ziel-API 26

- - -

2.7.1 (version code 28)

-

9. November 2017 - Mindest-API 19, Ziel-API 26

- - -

2.7 (version code 27)

-

7. November 2017 - Mindest-API 19, Ziel-API 26

-
    -
  • Add a bookmarks drawer that is accessed by sliding from the right.
  • -
  • Prevent Night Mode from flashing a white background when loading new pages.
  • -
  • Update the user agents.
  • -
  • Bump target API to 26 (Android Oreo, 8.0.0).
  • -
  • Aktualisierte italienische Übersetzung von Francesco Buratti.
  • -
  • Aktualisierte spanische Übersetzung von Jose A. León.
  • -
- -

2.6 (version code 26)

-

18. September 2017 - Mindest-API 19, Ziel-API 25

- - -

2.5 (version code 25)

-

26. August 2017 - Mindest-API 19, Ziel-API 25

- - -

2.4 (version code 24)

-

23. Juni 2017 - Mindest-API 19, Ziel-API 25

- - -

2.3 (version code 23)

-

26. Mai 2017 - Mindest-API 19, Ziel-API 25

- - -

2.2 (version code 22)

-

27. April 2017 - Mindest-API 19, Ziel-API 25

- - -

2.1 (version code 21)

-

25. März 2017 - Mindest-API 19, Ziel-API 25

- - -

2.0.1 (version code 20)

-

21. März 2017 - Mindest-API 19, Ziel-API 25

- - -

2.0 (version code 19)

-

16. März 2017 - Mindest-API 19, Ziel-API 25

- - -

1.15 (version code 18)

-

11. Februar 2017 - Mindest-API 19, Ziel-API 25

- - -

1.14.1 (version code 17)

-

4. Januar 2017 - Mindest-API 19, Ziel-API 25

- - -

1.14 (version code 16)

-

26. Dezember 2016 - Mindest-API 19, Ziel-API 25

- - -

1.13 (version code 15)

-

28. November 2016 - Mindest-API 19, Ziel-API 24

- - -

1.12 (version code 14)

-

9. November 2016 - Mindest-API 19, Ziel-API 24

- - -

1.11 (version code 13)

-

22. Oktober 2016 - Mindest-API 19, Ziel-API 24

-
    -
  • Ziel-API auf 24 hochgestuft, um Multi-Window auf Android Nougat zu ermöglichen.
  • -
  • Fehler behoben, der seit Version 1.10 exisiterte und große Auslastung der CPU ohne wirklichen Grund verursachte.
  • -
  • Funktion zum Drucken hinzugefügt.
  • -
  • Fehler bezüglich Dateidownloads auf KitKat und Lollipop behoben.
  • -
  • Deutsche Übersetzung durch Aaron Gerlach fur die neuen Funktionen aktualisiert.
  • -
- -

1.10 (version code 12)

-

15. September 2016 - Mindest-API 19, Ziel-API 23

-
    -
  • Unterstützung für TOR Orbot Proxy hinzugefügt.
  • -
  • Do Not Track-Option hinzugefügt.
  • -
  • Einen Download-Dialog hinzugefügt, mit dem der User den Dateinamen ändern kann, - bevor der Download startet.
  • -
  • Optionale zusätzliche Funktionsbuttons für Cookies, DOM-Speicher und Formulardaten hinzugefügt.
  • -
  • Aktualisierung der wählbaren User Agents; Safari auf iOS und OS X hinzugefügt.
  • -
  • StartPage und Qwant zur Liste der Suchmaschinen hinzugefügt.
  • -
  • Deutsche Übersetzung durch Aaron Gerlach fur die neuen Funktionen aktualisiert.
  • -
- -

1.9.1 (version code 11)

-

27. August 2016 - Mindest-API 19, Ziel-API 23

-
    -
  • Bilder-Verknüpfungen zu relativen Pfaden geändert, sodass Privacy Browser in F-Droid geladen wird.
  • -
- -

1.9 (version code 10)

-

26. August 2016 - Mindest-API 19, Ziel-API 23

- - -

1.8 (version code 9)

-

16. Juli 2016 - Mindest-API 19, Ziel-API 23

- - -

1.7 (version code 8)

-

16. Juni 2016 - Mindest-API 19, Ziel-API 23

- - -

1.6 (version code 7)

-

11. Mai 2016 - Mindest-API 15, Ziel-API 23

- - -

1.5 (version code 6)

-

5. Mai 2016 - Mindest-API 15, Ziel-API 23

-
    -
  • Option hinzugefügt, mit der man das "Herunterziehen zum Aktualisieren" deaktivieren kann, damit bestimmte Websites wie Google Maps korrekt funktionieren.
  • -
- -

1.4 (version code 5)

-

28. April 2016 - Mindest-API 15, Ziel-API 23

-
    -
  • Steuerung für Drittanbieter-Cookies hinzugefügt.
  • -
  • Fehlerbehebung für Vollbild-Videowiedergabe.
  • -
- -

1.3 (version code 4)

-

7. April 2016 - Mindest-API 15, Ziel-API 23

- - -

1.2 (version code 3)

-

23. März 2016 - Mindest-API 15, Ziel-API 23

- - -

1.1 (version code 2)

-

9. März 2016 - Mindest-API 10, Ziel-API 23

-
    -
  • Die Standard- und die kostenlosen Varianten getrennt, damit die App korrekt in F-Droid gezeigt wird.
  • -
- -

1.0 (version code 1)

-

24. Februar 2016 - Mindest-API 10, Ziel-API 23

-
    -
  • Option zum (De-)Aktivieren von Javascript, DOM-Speicher und Cookies hinzugefügt.
  • -
  • Standardmäßige Aktivierung von Javascript, DOM-Speicher und Cookies gesetzt.
  • -
  • DOM-Speicher und Cookies leerbar.
  • -
  • Shortcuts für Launcher hinzugefügt.
  • -
  • Mehr Funktionalität des Download-Managers.
  • -
  • Vorwärts und zurück navigieren.
  • -
  • URLs ausschneiden, kopieren und einsetzen.
  • -
  • URLs teilen.
  • -
  • Homepage bestimmen.
  • -
  • URL-Leiste scrollbar.
  • -
  • WebView-Position beim Rotieren des Bildschirms angepasst.
  • -
  • Herunterziehen zum Aktualisieren im WebView.
  • -
  • Videos im Vollbild-Modus (Javascript muss aktiviert sein).
  • -
  • Leeren und Verlassen Menü-Option.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/de/about_changelog_light.html b/app/src/main/assets/de/about_changelog_light.html deleted file mode 100644 index 9dfe7549..00000000 --- a/app/src/main/assets/de/about_changelog_light.html +++ /dev/null @@ -1,694 +0,0 @@ - - - - - - - - - - -

3.5.1 (version code 51)

-

28. August 2020 - Mindest-API 19, Ziel-API 29

-
    -
  • Fehler behoben, durch den neue Intents (Aufrufe aus anderen Apps) nicht ausgeführt wurden, - wenn Privacy Browser vom Betriebssystem im Hintergrund geschlossen wurde.
  • -
  • Fehler behoben, durch den die App nicht korrekt initialisiert wurde, - wenn das App-Theme gegenteilig zum Betriebsystem-Theme eingestellt wurde.
  • -
- -

3.5 (version code 50)

-

18. August 2020 - Mindest-API 19, Ziel-API 29

- - -

3.4.1 (version code 49)

-

1. April 2020 - Mindest-API 19, Ziel-API 29

- - -

3.4 (version code 48)

-

28. März 2020 - Mindest-API 19, Ziel-API 29

- - -

3.3 (version code 47)

-

3. Januar 2020 - Mindest-API 19, Ziel-API 29

- - -

3.2 (version code 46)

-

20. Juli 2019 - Mindest-API 19, Ziel-API 28

- - -

3.1 (version code 45)

-

27. Mai 2019 - Mindest-API 19, Ziel-API 28

- - -

3.0.1 (version code 44)

-

2. Mai 2019 - Mindest-API 19, Ziel-API 28

- - -

3.0 (version code 43)

-

26. April 2019 - Mindest-API 19, Ziel-API 28

-
    -
  • Tabbed Browsing hinzugefügt.
  • -
  • Bug behoben, der dazu führte, dass die Webview-Anzeige unten abgeschnitten wurde, wenn das Scrollen der App-Leiste deaktiviert wurde.
  • -
  • Bug behoben, der dazu führte, dass Privacy Browser neu startete wenn eine Bluetooth-Tastatur verbunden oder getrennt wurde.
  • -
  • Aktualisierte deutsche Übersetzung von Bernhard G. Keller.
  • -
  • Aktualisierte italienische Übersetzung von Francesco Buratti.
  • -
  • Aktualisierte russische Übersetzung.
  • -
  • Aktualisierte spanische Übersetzung von Jose A. León.
  • -
  • Teilweise türkische Übersetzung.
  • -
- -

2.17.1 (version code 42)

-

5. März 2019 - Mindest-API 19, Ziel-API 28

-
    -
  • Fix eines Bugs, der Privacy Browser bei Bookmarks von Seiten mit sehr grossen Fav-Icons abstürzen liess.
  • -
  • Privacy Browser kann nun auch auf SD-Karten verschoben werden.
  • -
- -

2.17 (version code 41)

-

27. Februar 2019 - Mindest-API 19, Ziel-API 28

- - -

2.16 (version code 40)

-

31. Januar 2019 - Mindest-API 19, Ziel-API 28

- - -

2.15.1 (version code 39)

-

27. Dezember 2018 - Mindest-API 19, Ziel-API 28

- - -

2.15 (version code 38)

-

24. Dezember 2018 - Mindest-API 19, Ziel-API 28

- - -

2.14 (version code 37)

-

8. Dezember 2018 - Mindest-API 19, Ziel-API 28

- - -

2.13 (version code 36)

-

29. Oktober 2018 - Mindest-API 19, Ziel-API 28

- - -

2.12 (version code 35)

-

31. Juli 2018 - Mindest-API 19, Ziel-API 27

- - -

2.11 (version code 34)

-

10. Juli 2018 - Mindest-API 19, Ziel-API 27

- - -

2.10 (version code 33)

-

24. Mai 2018 - Mindest-API 19, Ziel-API 27

- - -

2.9 (version code 32)

-

9. Mai 2018 - Mindest-API 19, Ziel-API 27

- - -

2.8.1 (version code 31)

-

1. März 2018 - Mindest-API 19, Ziel-API 27

- - -

2.8 (version code 30)

-

22. Februar 2018 - Mindest-API 19, Ziel-API 27

- - -

2.7.2 (version code 29)

-

22. November 2017 - Mindest-API 19, Ziel-API 26

- - -

2.7.1 (version code 28)

-

9. November 2017 - Mindest-API 19, Ziel-API 26

- - -

2.7 (version code 27)

-

7. November 2017 - Mindest-API 19, Ziel-API 26

-
    -
  • Add a bookmarks drawer that is accessed by sliding from the right.
  • -
  • Prevent Night Mode from flashing a white background when loading new pages.
  • -
  • Update the user agents.
  • -
  • Bump target API to 26 (Android Oreo, 8.0.0).
  • -
  • Aktualisierte italienische Übersetzung von Francesco Buratti.
  • -
  • Aktualisierte spanische Übersetzung von Jose A. León.
  • -
- -

2.6 (version code 26)

-

18. September 2017 - Mindest-API 19, Ziel-API 25

- - -

2.5 (version code 25)

-

26. August 2017 - Mindest-API 19, Ziel-API 25

- - -

2.4 (version code 24)

-

23. Juni 2017 - Mindest-API 19, Ziel-API 25

- - -

2.3 (version code 23)

-

26. Mai 2017 - Mindest-API 19, Ziel-API 25

- - -

2.2 (version code 22)

-

27. April 2017 - Mindest-API 19, Ziel-API 25

- - -

2.1 (version code 21)

-

25. März 2017 - Mindest-API 19, Ziel-API 25

- - -

2.0.1 (version code 20)

-

21. März 2017 - Mindest-API 19, Ziel-API 25

- - -

2.0 (version code 19)

-

16. März 2017 - Mindest-API 19, Ziel-API 25

- - -

1.15 (version code 18)

-

11. Februar 2017 - Mindest-API 19, Ziel-API 25

- - -

1.14.1 (version code 17)

-

4. Januar 2017 - Mindest-API 19, Ziel-API 25

- - -

1.14 (version code 16)

-

26. Dezember 2016 - Mindest-API 19, Ziel-API 25

- - -

1.13 (version code 15)

-

28. November 2016 - Mindest-API 19, Ziel-API 24

- - -

1.12 (version code 14)

-

9. November 2016 - Mindest-API 19, Ziel-API 24

- - -

1.11 (version code 13)

-

22. Oktober 2016 - Mindest-API 19, Ziel-API 24

-
    -
  • Ziel-API auf 24 hochgestuft, um Multi-Window auf Android Nougat zu ermöglichen.
  • -
  • Fehler behoben, der seit Version 1.10 exisiterte und große Auslastung der CPU ohne wirklichen Grund verursachte.
  • -
  • Funktion zum Drucken hinzugefügt.
  • -
  • Fehler bezüglich Dateidownloads auf KitKat und Lollipop behoben.
  • -
  • Deutsche Übersetzung durch Aaron Gerlach fur die neuen Funktionen aktualisiert.
  • -
- -

1.10 (version code 12)

-

15. September 2016 - Mindest-API 19, Ziel-API 23

-
    -
  • Unterstützung für TOR Orbot Proxy hinzugefügt.
  • -
  • Do Not Track-Option hinzugefügt.
  • -
  • Einen Download-Dialog hinzugefügt, mit dem der User den Dateinamen ändern kann, - bevor der Download startet.
  • -
  • Optionale zusätzliche Funktionsbuttons für Cookies, DOM-Speicher und Formulardaten hinzugefügt.
  • -
  • Aktualisierung der wählbaren User Agents; Safari auf iOS und OS X hinzugefügt.
  • -
  • StartPage und Qwant zur Liste der Suchmaschinen hinzugefügt.
  • -
  • Deutsche Übersetzung durch Aaron Gerlach fur die neuen Funktionen aktualisiert.
  • -
- -

1.9.1 (version code 11)

-

27. August 2016 - Mindest-API 19, Ziel-API 23

-
    -
  • Bilder-Verknüpfungen zu relativen Pfaden geändert, sodass Privacy Browser in F-Droid geladen wird.
  • -
- -

1.9 (version code 10)

-

26. August 2016 - Mindest-API 19, Ziel-API 23

- - -

1.8 (version code 9)

-

16. Juli 2016 - Mindest-API 19, Ziel-API 23

- - -

1.7 (version code 8)

-

16. Juni 2016 - Mindest-API 19, Ziel-API 23

- - -

1.6 (version code 7)

-

11. Mai 2016 - Mindest-API 15, Ziel-API 23

- - -

1.5 (version code 6)

-

5. Mai 2016 - Mindest-API 15, Ziel-API 23

-
    -
  • Option hinzugefügt, mit der man das "Herunterziehen zum Aktualisieren" deaktivieren kann, damit bestimmte Websites wie Google Maps korrekt funktionieren.
  • -
- -

1.4 (version code 5)

-

28. April 2016 - Mindest-API 15, Ziel-API 23

-
    -
  • Steuerung für Drittanbieter-Cookies hinzugefügt.
  • -
  • Fehlerbehebung für Vollbild-Videowiedergabe.
  • -
- -

1.3 (version code 4)

-

7. April 2016 - Mindest-API 15, Ziel-API 23

- - -

1.2 (version code 3)

-

23. März 2016 - Mindest-API 15, Ziel-API 23

- - -

1.1 (version code 2)

-

9. März 2016 - Mindest-API 10, Ziel-API 23

-
    -
  • Die Standard- und die kostenlosen Varianten getrennt, damit die App korrekt in F-Droid gezeigt wird.
  • -
- -

1.0 (version code 1)

-

24. Februar 2016 - Mindest-API 10, Ziel-API 23

-
    -
  • Option zum (De-)Aktivieren von Javascript, DOM-Speicher und Cookies hinzugefügt.
  • -
  • Standardmäßige Aktivierung von Javascript, DOM-Speicher und Cookies gesetzt.
  • -
  • DOM-Speicher und Cookies leerbar.
  • -
  • Shortcuts für Launcher hinzugefügt.
  • -
  • Mehr Funktionalität des Download-Managers.
  • -
  • Vorwärts und zurück navigieren.
  • -
  • URLs ausschneiden, kopieren und einsetzen.
  • -
  • URLs teilen.
  • -
  • Homepage bestimmen.
  • -
  • URL-Leiste scrollbar.
  • -
  • WebView-Position beim Rotieren des Bildschirms angepasst.
  • -
  • Herunterziehen zum Aktualisieren im WebView.
  • -
  • Videos im Vollbild-Modus (Javascript muss aktiviert sein).
  • -
  • Leeren und Verlassen Menü-Option.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/de/about_contributors.html b/app/src/main/assets/de/about_contributors.html new file mode 100644 index 00000000..ee884cbf --- /dev/null +++ b/app/src/main/assets/de/about_contributors.html @@ -0,0 +1,56 @@ + + + + + + + + + + + + + +

Leitender Entwickler

+

Privacy Browser wird primär von Soren Stoutner entwickelt.

+ +

Weitere Entwickler

+ Thomas Jensen
+ Hendrik Knackstedt + +

Mitwirkende

+ Bernhard G. Keller: Deutsch
+ Thiago Nazareno Conceição Silva de Jesus: Brasilianisches Portugiesisch
+ Kévin LE FLOHIC: Französisch
+ Francesco Buratti: Italienisch
+ Jose A. León: Spanisch + +

Frühere Mitwirkende

+ Stefan Erhardt: Deutsch
+ Aaron Gerlach: Deutsch + +
+
+

Mitwirkung ist willkommen in Form von Code und Übersetzung.

+ + \ No newline at end of file diff --git a/app/src/main/assets/de/about_contributors_dark.html b/app/src/main/assets/de/about_contributors_dark.html deleted file mode 100644 index 326c2177..00000000 --- a/app/src/main/assets/de/about_contributors_dark.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - - - - - - - -

Leitender Entwickler

-

Privacy Browser wird primär von Soren Stoutner entwickelt.

- -

Weitere Entwickler

- Thomas Jensen
- Hendrik Knackstedt - -

Mitwirkende

- Bernhard G. Keller: Deutsch
- Thiago Nazareno Conceição Silva de Jesus: Brasilianisches Portugiesisch
- Kévin LE FLOHIC: Französisch
- Francesco Buratti: Italienisch
- Jose A. León: Spanisch - -

Frühere Mitwirkende

- Stefan Erhardt: Deutsch
- Aaron Gerlach: Deutsch - -
-
-

Mitwirkung ist willkommen in Form von Code und Übersetzung.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/about_contributors_light.html b/app/src/main/assets/de/about_contributors_light.html deleted file mode 100644 index a8a3a6d0..00000000 --- a/app/src/main/assets/de/about_contributors_light.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - - - - - - - -

Leitender Entwickler

-

Privacy Browser wird primär von Soren Stoutner entwickelt.

- -

Weitere Entwickler

- Thomas Jensen
- Hendrik Knackstedt - -

Mitwirkende

- Bernhard G. Keller: Deutsch
- Thiago Nazareno Conceição Silva de Jesus: Brasilianisches Portugiesisch
- Kévin LE FLOHIC: Französisch
- Francesco Buratti: Italienisch
- Jose A. León: Spanisch - -

Frühere Mitwirkende

- Stefan Erhardt: Deutsch
- Aaron Gerlach: Deutsch - -
-
-

Mitwirkung ist willkommen in Form von Code und Übersetzung.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/about_licenses.html b/app/src/main/assets/de/about_licenses.html new file mode 100644 index 00000000..d42d4098 --- /dev/null +++ b/app/src/main/assets/de/about_licenses.html @@ -0,0 +1,1071 @@ + + + + + + + + + + + + +

Copyright:

+

Privacy Browser ist copyright © 2015-2020 von Soren Stoutner.

+ +

Lizenz:

+

Privacy Browser ist veröffentlicht unter der GPLv3+ Lizenz. The full text of the license is below. + The source code is available from git.stoutner.com.

+ +

Blocklists:

+

EasyList and EasyPrivacy + are dual licensed under the GPLv3+ + and the Creative Commons Attribution-ShareAlike 3.0+ Unported licenses. + Privacy Browser incorporates them using the GPLv3+ option.

+ +

Fanboy’s Annoyance List and Fanboy’s Social Blocking List + are released under the Creative Commons Attribution 3.0 Unported license, + which is compatible with the GPLv3+. The lists are included unchanged in Privacy Browser.

+ +

More information about the blocklists can be found on the EasyList website.

+ +

Bibliotheken:

+

Privacy Browser baut auf den AndroidX-Bibliotheken, + den Kotlin-Bibliotheken + und Code des Google Material Maven repository, + auf, welche unter der Apache Lizenz 2.0 veröffentlicht werden.

+ +

Die kostenlose Variante von Privacy Browser verwendet Firebase Ads, + welche unter der Android Software Development Kit Lizenz veröffentlicht werden.

+ +

Classes:

+

com.stoutner.privacybrowser.views.CheckedLinearLayout is a modified version of a class contained in the + Android Camera source code. + The original file was released under the Apache License 2.0. + The modified file is released under the GPLv3+ license.

+ +

Icons:

+

+ are derived from security and language, + which are part of the Android Material icon set and are released under the Apache License 2.0. + The full text of the license is below. Modifications copyright © 2016 Soren Stoutner. + The resulting images are released under the GPLv3+ license.

+

is derived from elements of folder and exit_to_app, + which are part of the Android Material icon set + and are released under the Apache License 2.0. + Modifications copyright © 2017 Soren Stoutner. + The resulting image is released under the GPLv3+ license.

+

is derived from elements of bookmark and create_new_folder, which are part of the + Android Material icon set and are released under the Apache License 2.0. + Modifications copyright © 2017 Soren Stoutner. + The resulting image is released under the GPLv3+ license.

+

is derived from create_new_folder, + which is part of the Android Material icon set and is released under the Apache License 2.0. + Modifications copyright © 2017 Soren Stoutner. + The resulting image is released under the GPLv3+ license.

+

is derived from exit_to_app, which is part of the Android Material icon set + and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner. + The resulting image is released under the GPLv3+ license.

+

is derived from compare, which is part of the Android Material icon set + and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner. + The resulting image is released under the GPLv3+ license.

+

is derived from sort, which is part of the Android Material icon set + and is released under the Apache License 2.0. Modifications copyright © 2019 Soren Stoutner. + The resulting image is released under the GPLv3+ license.

+

cookie was created by Google. + It is released under the Apache License 2.0 + and can be downloaded from Material Design Icons. It is unchanged except for layout information like color and size.

+

The following icons come from the Android Material icon set, + which is released under the Apache License 2.0. + They are unchanged except for layout information like color and size. Some of them have been renamed to match their use in the code. The original icons and names are shown below.

+

add.

+

arrow_back.

+

arrow_forward.

+

bookmarks.

+

bug_report.

+

camera_enhance.

+

chrome_reader_mode.

+

close.

+

delete.

+

delete_forever.

+

devices_other.

+

dns.

+

donut_small.

+

edit.

+

expand_less.

+

expand_more.

+

file_copy.

+

file_download.

+

find_in_page.

+

folder.

+

home.

+

image.

+

import_contacts.

+

import_export.

+

important_devices.

+

info_outline.

+

language.

+

link_off.

+

list.

+

local_activity.

+

location_off.

+

lock.

+

map.

+

more.

+

new releases.

+

open_in_browser.

+

payment.

+

question_answer.

+

refresh.

+

save.

+

search.

+

select_all.

+

settings.

+

settings_overscan.

+

share.

+

smartphone.

+

sort.

+

style.

+

subtitles.

+

tab.

+

text_fields.

+

thumbs_up_down.

+

vertical_align_bottom.

+

vertical_align_top.

+

visibility_off.

+

vpn_key.

+

vpn_lock.

+

web.

+ +
+ +

GNU General Public License

+

Offizielle deutsche Übersetzung der GNU General Public License

+ +

Version 3, 29 June 2007

+ +

Copyright © 2007 Free Software Foundation, Inc. + <http://fsf.org/>

+ +

Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed.

+ +

Preamble

+ +

The GNU General Public License is a free, copyleft license for + software and other kinds of works.

+ +

The licenses for most software and other practical works are designed + to take away your freedom to share and change the works. By contrast, + the GNU General Public License is intended to guarantee your freedom to + share and change all versions of a program—to make sure it remains free + software for all its users. We, the Free Software Foundation, use the + GNU General Public License for most of our software; it applies also to + any other work released this way by its authors. You can apply it to + your programs, too.

+ +

When we speak of free software, we are referring to freedom, not + price. Our General Public Licenses are designed to make sure that you + have the freedom to distribute copies of free software (and charge for + them if you wish), that you receive source code or can get it if you + want it, that you can change the software or use pieces of it in new + free programs, and that you know you can do these things.

+ +

To protect your rights, we need to prevent others from denying you + these rights or asking you to surrender the rights. Therefore, you have + certain responsibilities if you distribute copies of the software, or if + you modify it: responsibilities to respect the freedom of others.

+ +

For example, if you distribute copies of such a program, whether + gratis or for a fee, you must pass on to the recipients the same + freedoms that you received. You must make sure that they, too, receive + or can get the source code. And you must show them these terms so they + know their rights.

+ +

Developers that use the GNU GPL protect your rights with two steps: + (1) assert copyright on the software, and (2) offer you this License + giving you legal permission to copy, distribute and/or modify it.

+ +

For the developers’ and authors’ protection, the GPL clearly explains + that there is no warranty for this free software. For both users’ and + authors’ sake, the GPL requires that modified versions be marked as + changed, so that their problems will not be attributed erroneously to + authors of previous versions.

+ +

Some devices are designed to deny users access to install or run + modified versions of the software inside them, although the manufacturer + can do so. This is fundamentally incompatible with the aim of + protecting users’ freedom to change the software. The systematic + pattern of such abuse occurs in the area of products for individuals to + use, which is precisely where it is most unacceptable. Therefore, we + have designed this version of the GPL to prohibit the practice for those + products. If such problems arise substantially in other domains, we + stand ready to extend this provision to those domains in future versions + of the GPL, as needed to protect the freedom of users.

+ +

Finally, every program is threatened constantly by software patents. + States should not allow patents to restrict development and use of + software on general-purpose computers, but in those that do, we wish to + avoid the special danger that patents applied to a free program could + make it effectively proprietary. To prevent this, the GPL assures that + patents cannot be used to render the program non-free.

+ +

The precise terms and conditions for copying, distribution and + modification follow.

+ +

TERMS AND CONDITIONS

+ +

0. Definitions.

+ +

“This License” refers to version 3 of the GNU General Public License.

+ +

“Copyright” also means copyright-like laws that apply to other kinds of + works, such as semiconductor masks.

+ +

“The Program” refers to any copyrightable work licensed under this + License. Each licensee is addressed as “you”. “Licensees” and + “recipients” may be individuals or organizations.

+ +

To “modify” a work means to copy from or adapt all or part of the work + in a fashion requiring copyright permission, other than the making of an + exact copy. The resulting work is called a “modified version” of the + earlier work or a work “based on” the earlier work.

+ +

A “covered work” means either the unmodified Program or a work based + on the Program.

+ +

To “propagate” a work means to do anything with it that, without + permission, would make you directly or secondarily liable for + infringement under applicable copyright law, except executing it on a + computer or modifying a private copy. Propagation includes copying, + distribution (with or without modification), making available to the + public, and in some countries other activities as well.

+ +

To “convey” a work means any kind of propagation that enables other + parties to make or receive copies. Mere interaction with a user through + a computer network, with no transfer of a copy, is not conveying.

+ +

An interactive user interface displays “Appropriate Legal Notices” + to the extent that it includes a convenient and prominently visible + feature that (1) displays an appropriate copyright notice, and (2) + tells the user that there is no warranty for the work (except to the + extent that warranties are provided), that licensees may convey the + work under this License, and how to view a copy of this License. If + the interface presents a list of user commands or options, such as a + menu, a prominent item in the list meets this criterion.

+ +

1. Source Code.

+ +

The “source code” for a work means the preferred form of the work + for making modifications to it. “Object code” means any non-source + form of a work.

+ +

A “Standard Interface” means an interface that either is an official + standard defined by a recognized standards body, or, in the case of + interfaces specified for a particular programming language, one that + is widely used among developers working in that language.

+ +

The “System Libraries” of an executable work include anything, other + than the work as a whole, that (a) is included in the normal form of + packaging a Major Component, but which is not part of that Major + Component, and (b) serves only to enable use of the work with that + Major Component, or to implement a Standard Interface for which an + implementation is available to the public in source code form. A + “Major Component”, in this context, means a major essential component + (kernel, window system, and so on) of the specific operating system + (if any) on which the executable work runs, or a compiler used to + produce the work, or an object code interpreter used to run it.

+ +

The “Corresponding Source” for a work in object code form means all + the source code needed to generate, install, and (for an executable + work) run the object code and to modify the work, including scripts to + control those activities. However, it does not include the work’s + System Libraries, or general-purpose tools or generally available free + programs which are used unmodified in performing those activities but + which are not part of the work. For example, Corresponding Source + includes interface definition files associated with source files for + the work, and the source code for shared libraries and dynamically + linked subprograms that the work is specifically designed to require, + such as by intimate data communication or control flow between those + subprograms and other parts of the work.

+ +

The Corresponding Source need not include anything that users + can regenerate automatically from other parts of the Corresponding + Source.

+ +

The Corresponding Source for a work in source code form is that + same work.

+ +

2. Basic Permissions.

+ +

All rights granted under this License are granted for the term of + copyright on the Program, and are irrevocable provided the stated + conditions are met. This License explicitly affirms your unlimited + permission to run the unmodified Program. The output from running a + covered work is covered by this License only if the output, given its + content, constitutes a covered work. This License acknowledges your + rights of fair use or other equivalent, as provided by copyright law.

+ +

You may make, run and propagate covered works that you do not + convey, without conditions so long as your license otherwise remains + in force. You may convey covered works to others for the sole purpose + of having them make modifications exclusively for you, or provide you + with facilities for running those works, provided that you comply with + the terms of this License in conveying all material for which you do + not control copyright. Those thus making or running the covered works + for you must do so exclusively on your behalf, under your direction + and control, on terms that prohibit them from making any copies of + your copyrighted material outside their relationship with you.

+ +

Conveying under any other circumstances is permitted solely under + the conditions stated below. Sublicensing is not allowed; section 10 + makes it unnecessary.

+ +

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

+ +

No covered work shall be deemed part of an effective technological + measure under any applicable law fulfilling obligations under article + 11 of the WIPO copyright treaty adopted on 20 December 1996, or + similar laws prohibiting or restricting circumvention of such + measures.

+ +

When you convey a covered work, you waive any legal power to forbid + circumvention of technological measures to the extent such circumvention + is effected by exercising rights under this License with respect to + the covered work, and you disclaim any intention to limit operation or + modification of the work as a means of enforcing, against the work’s + users, your or third parties’ legal rights to forbid circumvention of + technological measures.

+ +

4. Conveying Verbatim Copies.

+ +

You may convey verbatim copies of the Program’s source code as you + receive it, in any medium, provided that you conspicuously and + appropriately publish on each copy an appropriate copyright notice; + keep intact all notices stating that this License and any + non-permissive terms added in accord with section 7 apply to the code; + keep intact all notices of the absence of any warranty; and give all + recipients a copy of this License along with the Program.

+ +

You may charge any price or no price for each copy that you convey, + and you may offer support or warranty protection for a fee.

+ +

5. Conveying Modified Source Versions.

+ +

You may convey a work based on the Program, or the modifications to + produce it from the Program, in the form of source code under the + terms of section 4, provided that you also meet all of these conditions:

+ +
    +
  • a) The work must carry prominent notices stating that you modified + it, and giving a relevant date.
  • + +
  • b) The work must carry prominent notices stating that it is + released under this License and any conditions added under section + 7. This requirement modifies the requirement in section 4 to + “keep intact all notices”.
  • + +
  • c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it.
  • + +
  • d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so.
  • +
+ +

A compilation of a covered work with other separate and independent + works, which are not by their nature extensions of the covered work, + and which are not combined with it such as to form a larger program, + in or on a volume of a storage or distribution medium, is called an + “aggregate” if the compilation and its resulting copyright are not + used to limit the access or legal rights of the compilation’s users + beyond what the individual works permit. Inclusion of a covered work + in an aggregate does not cause this License to apply to the other + parts of the aggregate.

+ +

6. Conveying Non-Source Forms.

+ +

You may convey a covered work in object code form under the terms + of sections 4 and 5, provided that you also convey the + machine-readable Corresponding Source under the terms of this License, + in one of these ways:

+ +
    +
  • a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange.
  • + +
  • b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the + Corresponding Source from a network server at no charge.
  • + +
  • c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b.
  • + +
  • d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements.
  • + +
  • e) Convey the object code using peer-to-peer transmission, provided + you inform other peers where the object code and Corresponding + Source of the work are being offered to the general public at no + charge under subsection 6d.
  • +
+ +

A separable portion of the object code, whose source code is excluded + from the Corresponding Source as a System Library, need not be + included in conveying the object code work.

+ +

A “User Product” is either (1) a “consumer product”, which means any + tangible personal property which is normally used for personal, family, + or household purposes, or (2) anything designed or sold for incorporation + into a dwelling. In determining whether a product is a consumer product, + doubtful cases shall be resolved in favor of coverage. For a particular + product received by a particular user, “normally used” refers to a + typical or common use of that class of product, regardless of the status + of the particular user or of the way in which the particular user + actually uses, or expects or is expected to use, the product. A product + is a consumer product regardless of whether the product has substantial + commercial, industrial or non-consumer uses, unless such uses represent + the only significant mode of use of the product.

+ +

“Installation Information” for a User Product means any methods, + procedures, authorization keys, or other information required to install + and execute modified versions of a covered work in that User Product from + a modified version of its Corresponding Source. The information must + suffice to ensure that the continued functioning of the modified object + code is in no case prevented or interfered with solely because + modification has been made.

+ +

If you convey an object code work under this section in, or with, or + specifically for use in, a User Product, and the conveying occurs as + part of a transaction in which the right of possession and use of the + User Product is transferred to the recipient in perpetuity or for a + fixed term (regardless of how the transaction is characterized), the + Corresponding Source conveyed under this section must be accompanied + by the Installation Information. But this requirement does not apply + if neither you nor any third party retains the ability to install + modified object code on the User Product (for example, the work has + been installed in ROM).

+ +

The requirement to provide Installation Information does not include a + requirement to continue to provide support service, warranty, or updates + for a work that has been modified or installed by the recipient, or for + the User Product in which it has been modified or installed. Access to a + network may be denied when the modification itself materially and + adversely affects the operation of the network or violates the rules and + protocols for communication across the network.

+ +

Corresponding Source conveyed, and Installation Information provided, + in accord with this section must be in a format that is publicly + documented (and with an implementation available to the public in + source code form), and must require no special password or key for + unpacking, reading or copying.

+ +

7. Additional Terms.

+ +

“Additional permissions” are terms that supplement the terms of this + License by making exceptions from one or more of its conditions. + Additional permissions that are applicable to the entire Program shall + be treated as though they were included in this License, to the extent + that they are valid under applicable law. If additional permissions + apply only to part of the Program, that part may be used separately + under those permissions, but the entire Program remains governed by + this License without regard to the additional permissions.

+ +

When you convey a copy of a covered work, you may at your option + remove any additional permissions from that copy, or from any part of + it. (Additional permissions may be written to require their own + removal in certain cases when you modify the work.) You may place + additional permissions on material, added by you to a covered work, + for which you have or can give appropriate copyright permission.

+ +

Notwithstanding any other provision of this License, for material you + add to a covered work, you may (if authorized by the copyright holders of + that material) supplement the terms of this License with terms:

+ +
    +
  • a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or
  • + +
  • b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or
  • + +
  • c) Prohibiting misrepresentation of the origin of that material, or + requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or
  • + +
  • d) Limiting the use for publicity purposes of names of licensors or + authors of the material; or
  • + +
  • e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or
  • + +
  • f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions of + it) with contractual assumptions of liability to the recipient, for + any liability that these contractual assumptions directly impose on + those licensors and authors.
  • +
+ +

All other non-permissive additional terms are considered “further + restrictions” within the meaning of section 10. If the Program as you + received it, or any part of it, contains a notice stating that it is + governed by this License along with a term that is a further + restriction, you may remove that term. If a license document contains + a further restriction but permits relicensing or conveying under this + License, you may add to a covered work material governed by the terms + of that license document, provided that the further restriction does + not survive such relicensing or conveying.

+ +

If you add terms to a covered work in accord with this section, you + must place, in the relevant source files, a statement of the + additional terms that apply to those files, or a notice indicating + where to find the applicable terms.

+ +

Additional terms, permissive or non-permissive, may be stated in the + form of a separately written license, or stated as exceptions; + the above requirements apply either way.

+ +

8. Termination.

+ +

You may not propagate or modify a covered work except as expressly + provided under this License. Any attempt otherwise to propagate or + modify it is void, and will automatically terminate your rights under + this License (including any patent licenses granted under the third + paragraph of section 11).

+ +

However, if you cease all violation of this License, then your + license from a particular copyright holder is reinstated (a) + provisionally, unless and until the copyright holder explicitly and + finally terminates your license, and (b) permanently, if the copyright + holder fails to notify you of the violation by some reasonable means + prior to 60 days after the cessation.

+ +

Moreover, your license from a particular copyright holder is + reinstated permanently if the copyright holder notifies you of the + violation by some reasonable means, this is the first time you have + received notice of violation of this License (for any work) from that + copyright holder, and you cure the violation prior to 30 days after + your receipt of the notice.

+ +

Termination of your rights under this section does not terminate the + licenses of parties who have received copies or rights from you under + this License. If your rights have been terminated and not permanently + reinstated, you do not qualify to receive new licenses for the same + material under section 10.

+ +

9. Acceptance Not Required for Having Copies.

+ +

You are not required to accept this License in order to receive or + run a copy of the Program. Ancillary propagation of a covered work + occurring solely as a consequence of using peer-to-peer transmission + to receive a copy likewise does not require acceptance. However, + nothing other than this License grants you permission to propagate or + modify any covered work. These actions infringe copyright if you do + not accept this License. Therefore, by modifying or propagating a + covered work, you indicate your acceptance of this License to do so.

+ +

10. Automatic Licensing of Downstream Recipients.

+ +

Each time you convey a covered work, the recipient automatically + receives a license from the original licensors, to run, modify and + propagate that work, subject to this License. You are not responsible + for enforcing compliance by third parties with this License.

+ +

An “entity transaction” is a transaction transferring control of an + organization, or substantially all assets of one, or subdividing an + organization, or merging organizations. If propagation of a covered + work results from an entity transaction, each party to that + transaction who receives a copy of the work also receives whatever + licenses to the work the party’s predecessor in interest had or could + give under the previous paragraph, plus a right to possession of the + Corresponding Source of the work from the predecessor in interest, if + the predecessor has it or can get it with reasonable efforts.

+ +

You may not impose any further restrictions on the exercise of the + rights granted or affirmed under this License. For example, you may + not impose a license fee, royalty, or other charge for exercise of + rights granted under this License, and you may not initiate litigation + (including a cross-claim or counterclaim in a lawsuit) alleging that + any patent claim is infringed by making, using, selling, offering for + sale, or importing the Program or any portion of it.

+ +

11. Patents.

+ +

A “contributor” is a copyright holder who authorizes use under this + License of the Program or a work on which the Program is based. The + work thus licensed is called the contributor’s “contributor version”.

+ +

A contributor’s “essential patent claims” are all patent claims + owned or controlled by the contributor, whether already acquired or + hereafter acquired, that would be infringed by some manner, permitted + by this License, of making, using, or selling its contributor version, + but do not include claims that would be infringed only as a + consequence of further modification of the contributor version. For + purposes of this definition, “control” includes the right to grant + patent sublicenses in a manner consistent with the requirements of + this License.

+ +

Each contributor grants you a non-exclusive, worldwide, royalty-free + patent license under the contributor’s essential patent claims, to + make, use, sell, offer for sale, import and otherwise run, modify and + propagate the contents of its contributor version.

+ +

In the following three paragraphs, a “patent license” is any express + agreement or commitment, however denominated, not to enforce a patent + (such as an express permission to practice a patent or covenant not to + sue for patent infringement). To “grant” such a patent license to a + party means to make such an agreement or commitment not to enforce a + patent against the party.

+ +

If you convey a covered work, knowingly relying on a patent license, + and the Corresponding Source of the work is not available for anyone + to copy, free of charge and under the terms of this License, through a + publicly available network server or other readily accessible means, + then you must either (1) cause the Corresponding Source to be so + available, or (2) arrange to deprive yourself of the benefit of the + patent license for this particular work, or (3) arrange, in a manner + consistent with the requirements of this License, to extend the patent + license to downstream recipients. “Knowingly relying” means you have + actual knowledge that, but for the patent license, your conveying the + covered work in a country, or your recipient’s use of the covered work + in a country, would infringe one or more identifiable patents in that + country that you have reason to believe are valid.

+ +

If, pursuant to or in connection with a single transaction or + arrangement, you convey, or propagate by procuring conveyance of, a + covered work, and grant a patent license to some of the parties + receiving the covered work authorizing them to use, propagate, modify + or convey a specific copy of the covered work, then the patent license + you grant is automatically extended to all recipients of the covered + work and works based on it.

+ +

A patent license is “discriminatory” if it does not include within + the scope of its coverage, prohibits the exercise of, or is + conditioned on the non-exercise of one or more of the rights that are + specifically granted under this License. You may not convey a covered + work if you are a party to an arrangement with a third party that is + in the business of distributing software, under which you make payment + to the third party based on the extent of your activity of conveying + the work, and under which the third party grants, to any of the + parties who would receive the covered work from you, a discriminatory + patent license (a) in connection with copies of the covered work + conveyed by you (or copies made from those copies), or (b) primarily + for and in connection with specific products or compilations that + contain the covered work, unless you entered into that arrangement, + or that patent license was granted, prior to 28 March 2007.

+ +

Nothing in this License shall be construed as excluding or limiting + any implied license or other defenses to infringement that may + otherwise be available to you under applicable patent law.

+ +

12. No Surrender of Others’ Freedom.

+ +

If conditions are imposed on you (whether by court order, agreement or + otherwise) that contradict the conditions of this License, they do not + excuse you from the conditions of this License. If you cannot convey a + covered work so as to satisfy simultaneously your obligations under this + License and any other pertinent obligations, then as a consequence you may + not convey it at all. For example, if you agree to terms that obligate you + to collect a royalty for further conveying from those to whom you convey + the Program, the only way you could satisfy both those terms and this + License would be to refrain entirely from conveying the Program.

+ +

13. Use with the GNU Affero General Public License.

+ +

Notwithstanding any other provision of this License, you have + permission to link or combine any covered work with a work licensed + under version 3 of the GNU Affero General Public License into a single + combined work, and to convey the resulting work. The terms of this + License will continue to apply to the part which is the covered work, + but the special requirements of the GNU Affero General Public License, + section 13, concerning interaction through a network will apply to the + combination as such.

+ +

14. Revised Versions of this License.

+ +

The Free Software Foundation may publish revised and/or new versions of + the GNU General Public License from time to time. Such new versions will + be similar in spirit to the present version, but may differ in detail to + address new problems or concerns.

+ +

Each version is given a distinguishing version number. If the + Program specifies that a certain numbered version of the GNU General + Public License “or any later version” applies to it, you have the + option of following the terms and conditions either of that numbered + version or of any later version published by the Free Software + Foundation. If the Program does not specify a version number of the + GNU General Public License, you may choose any version ever published + by the Free Software Foundation.

+ +

If the Program specifies that a proxy can decide which future + versions of the GNU General Public License can be used, that proxy’s + public statement of acceptance of a version permanently authorizes you + to choose that version for the Program.

+ +

Later license versions may give you additional or different + permissions. However, no additional obligations are imposed on any + author or copyright holder as a result of your choosing to follow a + later version.

+ +

15. Disclaimer of Warranty.

+ +

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY + APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT + HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY + OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, + THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM + IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF + ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

+ +

16. Limitation of Liability.

+ +

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING + WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS + THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY + GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE + USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF + DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD + PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), + EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF + SUCH DAMAGES.

+ +

17. Interpretation of Sections 15 and 16.

+ +

If the disclaimer of warranty and limitation of liability provided + above cannot be given local legal effect according to their terms, + reviewing courts shall apply local law that most closely approximates + an absolute waiver of all civil liability in connection with the + Program, unless a warranty or assumption of liability accompanies a + copy of the Program in return for a fee.

+ +

END OF TERMS AND CONDITIONS

+ +

How to Apply These Terms to Your New Programs

+ +

If you develop a new program, and you want it to be of the greatest + possible use to the public, the best way to achieve this is to make it + free software which everyone can redistribute and change under these terms.

+ +

To do so, attach the following notices to the program. It is safest + to attach them to the start of each source file to most effectively + state the exclusion of warranty; and each file should have at least + the “copyright” line and a pointer to where the full notice is found.

+ +
<one line to give the program’s name
+and a brief idea of what it does.>
+Copyright (C) <year>  <name of author>
+
+This program is free software: you can
+redistribute it and/or modify
+it under the terms of the GNU General
+Public License as published by the Free
+Software Foundation, either version 3
+of the License, or(at your option)
+any later version.
+
+This program is distributed in the hope
+that it will be useful, but WITHOUT ANY
+WARRANTY; without even the implied
+warranty of MERCHANTABILITY or FITNESS
+FOR A PARTICULAR PURPOSE.  See the GNU
+General Public License for more details.
+
+You should have received a copy of the
+GNU General Public License along with
+this program.  If not, see
+<http://www.gnu.org/licenses/>.
+ +

Also add information on how to contact you by electronic and paper mail.

+ +

If the program does terminal interaction, make it output a short + notice like this when it starts in an interactive mode:

+ +
<program>  Copyright (C) <year>
+<name of author>
+This program comes with ABSOLUTELY NO
+WARRANTY; for details type `show w'.
+This is free software, and you are
+welcome to redistribute it under
+certain conditions; type `show c'
+for details.
+ +

The hypothetical commands `show w' and `show c' should show the appropriate + parts of the General Public License. Of course, your program’s commands + might be different; for a GUI interface, you would use an “about box”.

+ +

You should also get your employer (if you work as a programmer) or school, + if any, to sign a “copyright disclaimer” for the program, if necessary. + For more information on this, and how to apply and follow the GNU GPL, see + <http://www.gnu.org/licenses/>.

+ +

The GNU General Public License does not permit incorporating your program + into proprietary programs. If your program is a subroutine library, you + may consider it more useful to permit linking proprietary applications with + the library. If this is what you want to do, use the GNU Lesser General + Public License instead of this License. But first, please read + <http://www.gnu.org/philosophy/why-not-lgpl.html>.

+ +
+ +

Apache License

+

Version 2.0, January 2004

+

http://www.apache.org/licenses/

+ +

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

+ +

1. Definitions.

+ +

“License” shall mean the terms and conditions for use, reproduction, and + distribution as defined by Sections 1 through 9 of this document.

+ +

“Licensor” shall mean the copyright owner or entity authorized by the + copyright owner that is granting the License.

+ +

“Legal Entity” shall mean the union of the acting entity and all other + entities that control, are controlled by, or are under common control with + that entity. For the purposes of this definition, “control” means (i) the + power, direct or indirect, to cause the direction or management of such + entity, whether by contract or otherwise, or (ii) ownership of fifty + percent (50%) or more of the outstanding shares, or (iii) beneficial + ownership of such entity.

+ +

“You” (or “Your”) shall mean an individual or Legal Entity exercising + permissions granted by this License.

+ +

“Source” form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation source, + and configuration files.

+ +

“Object” form shall mean any form resulting from mechanical transformation + or translation of a Source form, including but not limited to compiled + object code, generated documentation, and conversions to other media types.

+ +

“Work” shall mean the work of authorship, whether in Source or Object form, + made available under the License, as indicated by a copyright notice that + is included in or attached to the work (an example is provided in the + Appendix below).

+ +

“Derivative Works” shall mean any work, whether in Source or Object form, + that is based on (or derived from) the Work and for which the editorial + revisions, annotations, elaborations, or other modifications represent, as + a whole, an original work of authorship. For the purposes of this License, + Derivative Works shall not include works that remain separable from, or + merely link (or bind by name) to the interfaces of, the Work and Derivative + Works thereof.

+ +

“Contribution” shall mean any work of authorship, including the original + version of the Work and any modifications or additions to that Work or + Derivative Works thereof, that is intentionally submitted to Licensor for + inclusion in the Work by the copyright owner or by an individual or Legal + Entity authorized to submit on behalf of the copyright owner. For the + purposes of this definition, “submitted” means any form of electronic, + verbal, or written communication sent to the Licensor or its + representatives, including but not limited to communication on electronic + mailing lists, source code control systems, and issue tracking systems that + are managed by, or on behalf of, the Licensor for the purpose of discussing + and improving the Work, but excluding communication that is conspicuously + marked or otherwise designated in writing by the copyright owner as “Not a + Contribution.”

+ +

“Contributor” shall mean Licensor and any individual or Legal Entity on + behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work.

+ +

2. Grant of Copyright License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby + grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, + irrevocable copyright license to reproduce, prepare Derivative Works of, publicly + display, publicly perform, sublicense, and distribute the Work and such + Derivative Works in Source or Object form.

+ +

3. Grant of Patent License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby grants + to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, use, + offer to sell, sell, import, and otherwise transfer the Work, where such + license applies only to those patent claims licensable by such Contributor + that are necessarily infringed by their Contribution(s) alone or by + combination of their Contribution(s) with the Work to which such + Contribution(s) was submitted. If You institute patent litigation against + any entity (including a cross-claim or counterclaim in a lawsuit) alleging + that the Work or a Contribution incorporated within the Work constitutes + direct or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate as of the + date such litigation is filed.

+ +

4. Redistribution.

+ +

You may reproduce and distribute copies of the Work or Derivative Works thereof + in any medium, with or without modifications, and in Source or Object form, provided + that You meet the following conditions:

+ +
    +
  1. You must give any other recipients of the Work or Derivative Works a + copy of this License; and
  2. + +
  3. You must cause any modified files to carry prominent notices stating + that You changed the files; and
  4. + +
  5. You must retain, in the Source form of any Derivative Works that You + distribute, all copyright, patent, trademark, and attribution notices from + the Source form of the Work, excluding those notices that do not pertain to + any part of the Derivative Works; and
  6. + +
  7. If the Work includes a “NOTICE” text file as part of its distribution, + then any Derivative Works that You distribute must include a readable copy + of the attribution notices contained within such NOTICE file, excluding + those notices that do not pertain to any part of the Derivative Works, in + at least one of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or documentation, + if provided along with the Derivative Works; or, within a display generated + by the Derivative Works, if and wherever such third-party notices normally + appear. The contents of the NOTICE file are for informational purposes only + and do not modify the License. You may add Your own attribution notices + within Derivative Works that You distribute, alongside or as an addendum to + the NOTICE text from the Work, provided that such additional attribution + notices cannot be construed as modifying the License. +
    +
    + You may add Your own copyright statement to Your modifications and may + provide additional or different license terms and conditions for use, + reproduction, or distribution of Your modifications, or for any such + Derivative Works as a whole, provided Your use, reproduction, and + distribution of the Work otherwise complies with the conditions stated in + this License.
  8. +
+ +

5. Submission of Contributions.

+ +

Unless You explicitly state otherwise, any Contribution intentionally submitted for + inclusion in the Work by You to the Licensor shall be under the terms and + conditions of this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify the + terms of any separate license agreement you may have executed with Licensor + regarding such Contributions.

+ +

6. Trademarks.

+ +

This License does not grant permission to use the trade names, trademarks, service marks, + or product names of the Licensor, except as required for reasonable and customary use + in describing the origin of the Work and reproducing the content of the + NOTICE file.

+ +

7. Disclaimer of Warranty.

+ +

Unless required by applicable law or agreed to in writing, Licensor provides the Work + (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT + WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, + without limitation, any warranties or conditions of TITLE, + NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You + are solely responsible for determining the appropriateness of using or + redistributing the Work and assume any risks associated with Your exercise + of permissions under this License.

+ +

8. Limitation of Liability.

+ +

In no event and under no legal theory, whether in tort (including negligence), contract, + or otherwise, unless required by applicable law (such as deliberate and + grossly negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a result + of this License or out of the use or inability to use the Work (including + but not limited to damages for loss of goodwill, work stoppage, computer + failure or malfunction, or any and all other commercial damages or losses), + even if such Contributor has been advised of the possibility of such + damages.

+ +

9. Accepting Warranty or Additional Liability.

+ +

While redistributing the Work or Derivative Works thereof, You may choose + to offer, and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this License. + However, in accepting such obligations, You may act only on Your own behalf + and on Your sole responsibility, not on behalf of any other Contributor, + and only if You agree to indemnify, defend, and hold each Contributor + harmless for any liability incurred by, or claims asserted against, such + Contributor by reason of your accepting any such warranty or additional + liability.

+ +

END OF TERMS AND CONDITIONS

+ +

APPENDIX: How to apply the Apache License to your work

+ +

To apply the Apache License to your work, attach the following boilerplate + notice, with the fields enclosed by brackets “[]” replaced with your own + identifying information. (Don’t include the brackets!) The text should be + enclosed in the appropriate comment syntax for the file format. We also + recommend that a file or class name and description of purpose be included + on the same “printed page” as the copyright notice for easier + identification within third-party archives.

+
Copyright [yyyy] [name of copyright owner]
+
+Licensed under the Apache License,
+Version 2.0 (the “License”);
+you may not use this file except
+in compliance with the License.
+You may obtain a copy of the License at
+
+http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law
+or agreed to in writing, software
+distributed under the License is
+distributed on an “AS IS” BASIS,
+WITHOUT WARRANTIES OR CONDITIONS
+OF ANY KIND, either express or implied.
+See the License for the specific
+language governing permissions and
+limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/de/about_licenses_dark.html b/app/src/main/assets/de/about_licenses_dark.html deleted file mode 100644 index 5234e446..00000000 --- a/app/src/main/assets/de/about_licenses_dark.html +++ /dev/null @@ -1,1068 +0,0 @@ - - - - - - - - - - -

Copyright:

-

Privacy Browser ist copyright © 2015-2020 von Soren Stoutner.

- -

Lizenz:

-

Privacy Browser ist veröffentlicht unter der GPLv3+ Lizenz. The full text of the license is below. - The source code is available from git.stoutner.com.

- -

Blocklists:

-

EasyList and EasyPrivacy - are dual licensed under the GPLv3+ - and the Creative Commons Attribution-ShareAlike 3.0+ Unported licenses. - Privacy Browser incorporates them using the GPLv3+ option.

- -

Fanboy’s Annoyance List and Fanboy’s Social Blocking List - are released under the Creative Commons Attribution 3.0 Unported license, - which is compatible with the GPLv3+. The lists are included unchanged in Privacy Browser.

- -

More information about the blocklists can be found on the EasyList website.

- -

Bibliotheken:

-

Privacy Browser baut auf den AndroidX-Bibliotheken, - den Kotlin-Bibliotheken - und Code des Google Material Maven repository, - auf, welche unter der Apache Lizenz 2.0 veröffentlicht werden.

- -

Die kostenlose Variante von Privacy Browser verwendet Firebase Ads, - welche unter der Android Software Development Kit Lizenz veröffentlicht werden.

- -

Classes:

-

com.stoutner.privacybrowser.views.CheckedLinearLayout is a modified version of a class contained in the - Android Camera source code. - The original file was released under the Apache License 2.0. - The modified file is released under the GPLv3+ license.

- -

Icons:

-

- are derived from security and language, - which are part of the Android Material icon set and are released under the Apache License 2.0. - The full text of the license is below. Modifications copyright © 2016 Soren Stoutner. - The resulting images are released under the GPLv3+ license.

-

is derived from elements of folder and exit_to_app, which are part of the - Android Material icon set and are released under the Apache License 2.0. - Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from elements of bookmark and create_new_folder, which are part of the - Android Material icon set and are released under the Apache License 2.0. - Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from create_new_folder, - which is part of the Android Material icon set and is released under the Apache License 2.0. - Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from exit_to_app, which is part of the Android Material icon set - and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from compare, which is part of the Android Material icon set - and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from sort, which is part of the Android Material icon set - and is released under the Apache License 2.0. Modifications copyright © 2019 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

cookie was created by Google. - It is released under the Apache License 2.0 - and can be downloaded from Material Design Icons. It is unchanged except for layout information like color and size.

-

The following icons come from the Android Material icon set, - which is released under the Apache License 2.0. - They are unchanged except for layout information like color and size. Some of them have been renamed to match their use in the code. The original icons and names are shown below.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

- -
- -

GNU General Public License

-

Offizielle deutsche Übersetzung der GNU General Public License

- -

Version 3, 29 June 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.

- -

Preamble

- -

The GNU General Public License is a free, copyleft license for - software and other kinds of works.

- -

The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a program—to make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.

- -

When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.

- -

To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.

- -

For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.

- -

Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.

- -

For the developers’ and authors’ protection, the GPL clearly explains - that there is no warranty for this free software. For both users’ and - authors’ sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.

- -

Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting users’ freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.

- -

Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.

- -

The precise terms and conditions for copying, distribution and - modification follow.

- -

TERMS AND CONDITIONS

- -

0. Definitions.

- -

“This License” refers to version 3 of the GNU General Public License.

- -

“Copyright” also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.

- -

“The Program” refers to any copyrightable work licensed under this - License. Each licensee is addressed as “you”. “Licensees” and - “recipients” may be individuals or organizations.

- -

To “modify” a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a “modified version” of the - earlier work or a work “based on” the earlier work.

- -

A “covered work” means either the unmodified Program or a work based - on the Program.

- -

To “propagate” a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.

- -

To “convey” a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.

- -

An interactive user interface displays “Appropriate Legal Notices” - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.

- -

1. Source Code.

- -

The “source code” for a work means the preferred form of the work - for making modifications to it. “Object code” means any non-source - form of a work.

- -

A “Standard Interface” means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.

- -

The “System Libraries” of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - “Major Component”, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.

- -

The “Corresponding Source” for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the work’s - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.

- -

The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.

- -

The Corresponding Source for a work in source code form is that - same work.

- -

2. Basic Permissions.

- -

All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.

- -

You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.

- -

Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.

- -

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

- -

No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.

- -

When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the work’s - users, your or third parties’ legal rights to forbid circumvention of - technological measures.

- -

4. Conveying Verbatim Copies.

- -

You may convey verbatim copies of the Program’s source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.

- -

You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.

- -

5. Conveying Modified Source Versions.

- -

You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:

- -
    -
  • a) The work must carry prominent notices stating that you modified - it, and giving a relevant date.
  • - -
  • b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - “keep intact all notices”.
  • - -
  • c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it.
  • - -
  • d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so.
  • -
- -

A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - “aggregate” if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilation’s users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.

- -

6. Conveying Non-Source Forms.

- -

You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:

- -
    -
  • a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange.
  • - -
  • b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge.
  • - -
  • c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b.
  • - -
  • d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements.
  • - -
  • e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d.
  • -
- -

A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.

- -

A “User Product” is either (1) a “consumer product”, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, “normally used” refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.

- -

“Installation Information” for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.

- -

If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).

- -

The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.

- -

Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.

- -

7. Additional Terms.

- -

“Additional permissions” are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.

- -

When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.

- -

Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:

- -
    -
  • a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or
  • - -
  • b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or
  • - -
  • c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or
  • - -
  • d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or
  • - -
  • e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or
  • - -
  • f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors.
  • -
- -

All other non-permissive additional terms are considered “further - restrictions” within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.

- -

If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.

- -

Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.

- -

8. Termination.

- -

You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).

- -

However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.

- -

Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.

- -

Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.

- -

9. Acceptance Not Required for Having Copies.

- -

You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.

- -

10. Automatic Licensing of Downstream Recipients.

- -

Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.

- -

An “entity transaction” is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the party’s predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.

- -

You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.

- -

11. Patents.

- -

A “contributor” is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributor’s “contributor version”.

- -

A contributor’s “essential patent claims” are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, “control” includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.

- -

Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributor’s essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.

- -

In the following three paragraphs, a “patent license” is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To “grant” such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.

- -

If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. “Knowingly relying” means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipient’s use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.

- -

If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.

- -

A patent license is “discriminatory” if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.

- -

Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.

- -

12. No Surrender of Others’ Freedom.

- -

If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.

- -

13. Use with the GNU Affero General Public License.

- -

Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.

- -

14. Revised Versions of this License.

- -

The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.

- -

Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License “or any later version” applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.

- -

If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxy’s - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.

- -

Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.

- -

15. Disclaimer of Warranty.

- -

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

- -

16. Limitation of Liability.

- -

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.

- -

17. Interpretation of Sections 15 and 16.

- -

If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.

- -

END OF TERMS AND CONDITIONS

- -

How to Apply These Terms to Your New Programs

- -

If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.

- -

To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the “copyright” line and a pointer to where the full notice is found.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Also add information on how to contact you by electronic and paper mail.

- -

If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your program’s commands - might be different; for a GUI interface, you would use an “about box”.

- -

You should also get your employer (if you work as a programmer) or school, - if any, to sign a “copyright disclaimer” for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.

- -

The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/de/about_licenses_light.html b/app/src/main/assets/de/about_licenses_light.html deleted file mode 100644 index 734d04b2..00000000 --- a/app/src/main/assets/de/about_licenses_light.html +++ /dev/null @@ -1,1068 +0,0 @@ - - - - - - - - - -

Copyright:

-

Privacy Browser ist copyright © 2015-2020 von Soren Stoutner.

- -

Lizenz:

-

Privacy Browser ist veröffentlicht unter der GPLv3+ Lizenz. The full text of the license is below. - The source code is available from git.stoutner.com.

- -

Blocklists:

-

EasyList and EasyPrivacy - are dual licensed under the GPLv3+ - and the Creative Commons Attribution-ShareAlike 3.0+ Unported licenses. - Privacy Browser incorporates them using the GPLv3+ option.

- -

Fanboy’s Annoyance List and Fanboy’s Social Blocking List - are released under the Creative Commons Attribution 3.0 Unported license, - which is compatible with the GPLv3+. The lists are included unchanged in Privacy Browser.

- -

More information about the blocklists can be found on the EasyList website.

- -

Bibliotheken:

-

Privacy Browser baut auf den AndroidX-Bibliotheken, - den Kotlin-Bibliotheken - und Code des Google Material Maven repository, - auf, welche unter der Apache Lizenz 2.0 veröffentlicht werden.

- -

Die kostenlose Variante von Privacy Browser verwendet Firebase Ads, - welche unter der Android Software Development Kit Lizenz veröffentlicht werden.

- -

Classes:

-

com.stoutner.privacybrowser.views.CheckedLinearLayout is a modified version of a class contained in the - Android Camera source code. - The original file was released under the Apache License 2.0. - The modified file is released under the GPLv3+ license.

- -

Icons:

-

- are derived from security and language, - which are part of the Android Material icon set and are released under the Apache License 2.0. - The full text of the license is below. Modifications copyright © 2016 Soren Stoutner. - The resulting images are released under the GPLv3+ license.

-

is derived from elements of folder and exit_to_app, - which are part of the Android Material icon set - and are released under the Apache License 2.0. - Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from elements of bookmark and create_new_folder, which are part of the - Android Material icon set and are released under the Apache License 2.0. - Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from create_new_folder, - which is part of the Android Material icon set and is released under the Apache License 2.0. - Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from exit_to_app, which is part of the Android Material icon set - and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from compare, which is part of the Android Material icon set - and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from sort, which is part of the Android Material icon set - and is released under the Apache License 2.0. Modifications copyright © 2019 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

cookie was created by Google. - It is released under the Apache License 2.0 - and can be downloaded from Material Design Icons. It is unchanged except for layout information like color and size.

-

The following icons come from the Android Material icon set, - which is released under the Apache License 2.0. - They are unchanged except for layout information like color and size. Some of them have been renamed to match their use in the code. The original icons and names are shown below.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

- -
- -

GNU General Public License

-

Offizielle deutsche Übersetzung der GNU General Public License

- -

Version 3, 29 June 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.

- -

Preamble

- -

The GNU General Public License is a free, copyleft license for - software and other kinds of works.

- -

The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a program—to make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.

- -

When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.

- -

To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.

- -

For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.

- -

Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.

- -

For the developers’ and authors’ protection, the GPL clearly explains - that there is no warranty for this free software. For both users’ and - authors’ sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.

- -

Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting users’ freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.

- -

Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.

- -

The precise terms and conditions for copying, distribution and - modification follow.

- -

TERMS AND CONDITIONS

- -

0. Definitions.

- -

“This License” refers to version 3 of the GNU General Public License.

- -

“Copyright” also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.

- -

“The Program” refers to any copyrightable work licensed under this - License. Each licensee is addressed as “you”. “Licensees” and - “recipients” may be individuals or organizations.

- -

To “modify” a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a “modified version” of the - earlier work or a work “based on” the earlier work.

- -

A “covered work” means either the unmodified Program or a work based - on the Program.

- -

To “propagate” a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.

- -

To “convey” a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.

- -

An interactive user interface displays “Appropriate Legal Notices” - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.

- -

1. Source Code.

- -

The “source code” for a work means the preferred form of the work - for making modifications to it. “Object code” means any non-source - form of a work.

- -

A “Standard Interface” means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.

- -

The “System Libraries” of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - “Major Component”, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.

- -

The “Corresponding Source” for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the work’s - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.

- -

The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.

- -

The Corresponding Source for a work in source code form is that - same work.

- -

2. Basic Permissions.

- -

All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.

- -

You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.

- -

Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.

- -

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

- -

No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.

- -

When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the work’s - users, your or third parties’ legal rights to forbid circumvention of - technological measures.

- -

4. Conveying Verbatim Copies.

- -

You may convey verbatim copies of the Program’s source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.

- -

You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.

- -

5. Conveying Modified Source Versions.

- -

You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:

- -
    -
  • a) The work must carry prominent notices stating that you modified - it, and giving a relevant date.
  • - -
  • b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - “keep intact all notices”.
  • - -
  • c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it.
  • - -
  • d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so.
  • -
- -

A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - “aggregate” if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilation’s users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.

- -

6. Conveying Non-Source Forms.

- -

You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:

- -
    -
  • a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange.
  • - -
  • b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge.
  • - -
  • c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b.
  • - -
  • d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements.
  • - -
  • e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d.
  • -
- -

A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.

- -

A “User Product” is either (1) a “consumer product”, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, “normally used” refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.

- -

“Installation Information” for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.

- -

If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).

- -

The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.

- -

Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.

- -

7. Additional Terms.

- -

“Additional permissions” are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.

- -

When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.

- -

Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:

- -
    -
  • a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or
  • - -
  • b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or
  • - -
  • c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or
  • - -
  • d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or
  • - -
  • e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or
  • - -
  • f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors.
  • -
- -

All other non-permissive additional terms are considered “further - restrictions” within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.

- -

If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.

- -

Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.

- -

8. Termination.

- -

You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).

- -

However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.

- -

Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.

- -

Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.

- -

9. Acceptance Not Required for Having Copies.

- -

You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.

- -

10. Automatic Licensing of Downstream Recipients.

- -

Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.

- -

An “entity transaction” is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the party’s predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.

- -

You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.

- -

11. Patents.

- -

A “contributor” is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributor’s “contributor version”.

- -

A contributor’s “essential patent claims” are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, “control” includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.

- -

Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributor’s essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.

- -

In the following three paragraphs, a “patent license” is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To “grant” such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.

- -

If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. “Knowingly relying” means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipient’s use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.

- -

If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.

- -

A patent license is “discriminatory” if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.

- -

Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.

- -

12. No Surrender of Others’ Freedom.

- -

If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.

- -

13. Use with the GNU Affero General Public License.

- -

Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.

- -

14. Revised Versions of this License.

- -

The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.

- -

Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License “or any later version” applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.

- -

If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxy’s - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.

- -

Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.

- -

15. Disclaimer of Warranty.

- -

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

- -

16. Limitation of Liability.

- -

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.

- -

17. Interpretation of Sections 15 and 16.

- -

If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.

- -

END OF TERMS AND CONDITIONS

- -

How to Apply These Terms to Your New Programs

- -

If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.

- -

To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the “copyright” line and a pointer to where the full notice is found.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Also add information on how to contact you by electronic and paper mail.

- -

If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your program’s commands - might be different; for a GUI interface, you would use an “about box”.

- -

You should also get your employer (if you work as a programmer) or school, - if any, to sign a “copyright disclaimer” for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.

- -

The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/de/about_links.html b/app/src/main/assets/de/about_links.html new file mode 100644 index 00000000..b36d2ae3 --- /dev/null +++ b/app/src/main/assets/de/about_links.html @@ -0,0 +1,51 @@ + + + + + + + + + + + + + +

Websites

+ +

+ Neuigkeiten

+ +

+ Roadmap

+ +

+ Bug-Tracker und Feature-Anfragen

+ +

+ Forum

+ +

+ GitWeb

+ + \ No newline at end of file diff --git a/app/src/main/assets/de/about_links_dark.html b/app/src/main/assets/de/about_links_dark.html deleted file mode 100644 index ceff2b4d..00000000 --- a/app/src/main/assets/de/about_links_dark.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - - - - - - - -

Websites

- -

- Neuigkeiten

- -

- Roadmap

- -

- Bug-Tracker und Feature-Anfragen

- -

- Forum

- -

- GitWeb

- - \ No newline at end of file diff --git a/app/src/main/assets/de/about_links_light.html b/app/src/main/assets/de/about_links_light.html deleted file mode 100644 index eb21ce41..00000000 --- a/app/src/main/assets/de/about_links_light.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - - - - - - - -

Websites

- -

- Neuigkeiten

- -

- Roadmap

- -

- Bug-Tracker und Feature-Anfragen

- -

- Forum

- -

- GitWeb

- - \ No newline at end of file diff --git a/app/src/main/assets/de/about_permissions.html b/app/src/main/assets/de/about_permissions.html new file mode 100644 index 00000000..bd90da57 --- /dev/null +++ b/app/src/main/assets/de/about_permissions.html @@ -0,0 +1,53 @@ + + + + + + + + + + + + + +

Voller Netzwerkzugriff

+

android.permission.INTERNET

+

Benötigt, damit WebView das Internet nutzen kann. Ohne diese Berechtigung wäre Privacy Browser “Kein Browser: Schützt Ihre Privatsphäre durch Fernbleiben von jeglicher Konnektivität”.

+ +

Verknüpfungen installieren

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

Benötigt, um Verknüpfungen zu Websites auf Ihrer Startseite zu erstellen.

+ +

Speicher lesen

+

android.permission.READ_EXTERNAL_STORAGE

+

Benötigt, um Einstellungen aus öffentlichen Ordnern zu importieren. Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen nur aus seinem eigenen Ordner importieren, wenn diese Berechtigung nicht erteilt wird.

+ +

Speicher schreiben

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Benötigt, um Einstellungen und Downloads in öffentlichen Ordnern zu speichern. + Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen und Downloads nur in seinem eigenen Ordner speichern, wenn diese Berechtigung nicht erteilt wird.

+ + \ No newline at end of file diff --git a/app/src/main/assets/de/about_permissions_dark.html b/app/src/main/assets/de/about_permissions_dark.html deleted file mode 100644 index dbda03a0..00000000 --- a/app/src/main/assets/de/about_permissions_dark.html +++ /dev/null @@ -1,50 +0,0 @@ - - - - - - - - - - -

Voller Netzwerkzugriff

-

android.permission.INTERNET

-

Benötigt, damit WebView das Internet nutzen kann. Ohne diese Berechtigung wäre Privacy Browser “Kein Browser: Schützt Ihre Privatsphäre durch Fernbleiben von jeglicher Konnektivität”.

- -

Verknüpfungen installieren

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Benötigt, um Verknüpfungen zu Websites auf Ihrer Startseite zu erstellen.

- -

Speicher lesen

-

android.permission.READ_EXTERNAL_STORAGE

-

Benötigt, um Einstellungen aus öffentlichen Ordnern zu importieren. Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen nur aus seinem eigenen Ordner importieren, wenn diese Berechtigung nicht erteilt wird.

- -

Speicher schreiben

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Benötigt, um Einstellungen und Downloads in öffentlichen Ordnern zu speichern. - Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen und Downloads nur in seinem eigenen Ordner speichern, wenn diese Berechtigung nicht erteilt wird.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/about_permissions_light.html b/app/src/main/assets/de/about_permissions_light.html deleted file mode 100644 index ecaf7b57..00000000 --- a/app/src/main/assets/de/about_permissions_light.html +++ /dev/null @@ -1,50 +0,0 @@ - - - - - - - - - - -

Voller Netzwerkzugriff

-

android.permission.INTERNET

-

Benötigt, damit WebView das Internet nutzen kann. Ohne diese Berechtigung wäre Privacy Browser “Kein Browser: Schützt Ihre Privatsphäre durch Fernbleiben von jeglicher Konnektivität”.

- -

Verknüpfungen installieren

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Benötigt, um Verknüpfungen zu Websites auf Ihrer Startseite zu erstellen.

- -

Speicher lesen

-

android.permission.READ_EXTERNAL_STORAGE

-

Benötigt, um Einstellungen aus öffentlichen Ordnern zu importieren. Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen nur aus seinem eigenen Ordner importieren, wenn diese Berechtigung nicht erteilt wird.

- -

Speicher schreiben

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Benötigt, um Einstellungen und Downloads in öffentlichen Ordnern zu speichern. - Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen und Downloads nur in seinem eigenen Ordner speichern, wenn diese Berechtigung nicht erteilt wird.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/about_privacy_policy.html b/app/src/main/assets/de/about_privacy_policy.html new file mode 100644 index 00000000..43e6bcb4 --- /dev/null +++ b/app/src/main/assets/de/about_privacy_policy.html @@ -0,0 +1,94 @@ + + + + + + + + + + + + + +

Privacy Browser

+

Privacy Browser sammelt keinerlei Benutzer-Informationen.

+ + +

Google Play

+

Google Play hat seine eigene Datenschutzerklärung. + Google stellt Entwicklern anonymisierte Installations-Informationen inklusive der Anzahl der Installationen unterteilt in die folgenden Kategorien bereit:

+
    +
  • Android-Version (z.B. Android 7.1)
  • +
  • Gerät (z.B. Samsung Galaxy S6 [zeroflte])
  • +
  • Tablets (z.B. 10"-Tablet oder höher)
  • +
  • Land (z.B. USA)
  • +
  • Sprache (z.B. Englisch [USA])
  • +
  • App-Version (z.B. 14)
  • +
  • Mobilfunk-Anbieter (z.B. T-Mobile - US)
  • +
+ + +

Google Play Bewertungen

+

Google Play hat seine eigene Datenschutzerklärung. + Google stellt Entwicklern folgende anonymisierte Installations-Informationen bezüglich der Bewertungen bereit:

+
    +
  • Land (z.B. USA)
  • +
  • Sprache (z.B. Englisch)
  • +
  • App-Version (z.B. 14)
  • +
  • Android-Version (z.B. Android 7.1)
  • +
  • Gerät (z.B. Google Nexus 5X [bullhead])
  • +
  • Tablets (z.B. 10"-Tablet oder höher)
  • +
+ + +

Google Play Rezensionen

+

Google Play hat seine eigene Datenschutzerklärung. + Zusätzlich zum Namen des Rezensenten, der Bewertung und dem Text der Rezension (welche alle öffentlich zugänglich sind), stellt Google dem Entwickler einige oder alle der folgenden Informationen zur Verfügung:

+
    +
  • Versions-Code (z.B. 7)
  • +
  • Versions-Name (z.B. 1.6)
  • +
  • Android-Version (z.B. Android 5.1)
  • +
  • Gerät (z.B. Galaxy S6 Edge+ [zenlte])
  • +
  • Hersteller (z.B. Samsung)
  • +
  • Gerätetyp (z.B. Mobiltelefon)
  • +
  • CPU-Fabrikat (z.B. Samsung)
  • +
  • CPU-Model (z.B. Exynos 7420)
  • +
  • Bildschirm-Auflösung (z.B. 560 dpi)
  • +
  • Bildschirm-Grösse (z.B. 2560 x 1440)
  • +
  • RAM (z.B. 4096 MB)
  • +
  • Native Plattform (z.B. armeabi-v7a,armeabi,arm64v8a)
  • +
  • OpenGL ES Version (z.B. 3.1)
  • +
  • Geräte-Sprache (z.B. Englisch)
  • +
+ + +

Direkte Kommunication

+

Benutzer können z.B. per Email und Kommentaren auf stoutner.com direkt mit Stoutner Kontakt aufnehmen.

+ +

Daten-Nutzung

+

Stoutner kann diese Informationen nutzen, um die Entwicklung von Privacy Browser zu unterstützen und den Status des Projekts an Benutzer zu melden. + Stoutner wird die Informationen niemals verkaufen oder an Dritte weitergeben, welche diese für Anzeigen oder Marketing nutzen.

+ +
+

Revision 1.7, 14. Mai 2019

+ + \ No newline at end of file diff --git a/app/src/main/assets/de/about_privacy_policy_dark.html b/app/src/main/assets/de/about_privacy_policy_dark.html deleted file mode 100644 index 62a05e73..00000000 --- a/app/src/main/assets/de/about_privacy_policy_dark.html +++ /dev/null @@ -1,91 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser sammelt keinerlei Benutzer-Informationen.

- - -

Google Play

-

Google Play hat seine eigene Datenschutzerklärung. - Google stellt Entwicklern anonymisierte Installations-Informationen inklusive der Anzahl der Installationen unterteilt in die folgenden Kategorien bereit:

-
    -
  • Android-Version (z.B. Android 7.1)
  • -
  • Gerät (z.B. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablets (z.B. 10"-Tablet oder höher)
  • -
  • Land (z.B. USA)
  • -
  • Sprache (z.B. Englisch [USA])
  • -
  • App-Version (z.B. 14)
  • -
  • Mobilfunk-Anbieter (z.B. T-Mobile - US)
  • -
- - -

Google Play Bewertungen

-

Google Play hat seine eigene Datenschutzerklärung. - Google stellt Entwicklern folgende anonymisierte Installations-Informationen bezüglich der Bewertungen bereit:

-
    -
  • Land (z.B. USA)
  • -
  • Sprache (z.B. Englisch)
  • -
  • App-Version (z.B. 14)
  • -
  • Android-Version (z.B. Android 7.1)
  • -
  • Gerät (z.B. Google Nexus 5X [bullhead])
  • -
  • Tablets (z.B. 10"-Tablet oder höher)
  • -
- - -

Google Play Rezensionen

-

Google Play hat seine eigene Datenschutzerklärung. - Zusätzlich zum Namen des Rezensenten, der Bewertung und dem Text der Rezension (welche alle öffentlich zugänglich sind), stellt Google dem Entwickler einige oder alle der folgenden Informationen zur Verfügung:

-
    -
  • Versions-Code (z.B. 7)
  • -
  • Versions-Name (z.B. 1.6)
  • -
  • Android-Version (z.B. Android 5.1)
  • -
  • Gerät (z.B. Galaxy S6 Edge+ [zenlte])
  • -
  • Hersteller (z.B. Samsung)
  • -
  • Gerätetyp (z.B. Mobiltelefon)
  • -
  • CPU-Fabrikat (z.B. Samsung)
  • -
  • CPU-Model (z.B. Exynos 7420)
  • -
  • Bildschirm-Auflösung (z.B. 560 dpi)
  • -
  • Bildschirm-Grösse (z.B. 2560 x 1440)
  • -
  • RAM (z.B. 4096 MB)
  • -
  • Native Plattform (z.B. armeabi-v7a,armeabi,arm64v8a)
  • -
  • OpenGL ES Version (z.B. 3.1)
  • -
  • Geräte-Sprache (z.B. Englisch)
  • -
- - -

Direkte Kommunication

-

Benutzer können z.B. per Email und Kommentaren auf stoutner.com direkt mit Stoutner Kontakt aufnehmen.

- -

Daten-Nutzung

-

Stoutner kann diese Informationen nutzen, um die Entwicklung von Privacy Browser zu unterstützen und den Status des Projekts an Benutzer zu melden. - Stoutner wird die Informationen niemals verkaufen oder an Dritte weitergeben, welche diese für Anzeigen oder Marketing nutzen.

- -
-

Revision 1.6, 22. Mai 2018

- - \ No newline at end of file diff --git a/app/src/main/assets/de/about_privacy_policy_light.html b/app/src/main/assets/de/about_privacy_policy_light.html deleted file mode 100644 index dccd9447..00000000 --- a/app/src/main/assets/de/about_privacy_policy_light.html +++ /dev/null @@ -1,91 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser sammelt keinerlei Benutzer-Informationen.

- - -

Google Play

-

Google Play hat seine eigene Datenschutzerklärung. - Google stellt Entwicklern anonymisierte Installations-Informationen inklusive der Anzahl der Installationen unterteilt in die folgenden Kategorien bereit:

-
    -
  • Android-Version (z.B. Android 7.1)
  • -
  • Gerät (z.B. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablets (z.B. 10"-Tablet oder höher)
  • -
  • Land (z.B. USA)
  • -
  • Sprache (z.B. Englisch [USA])
  • -
  • App-Version (z.B. 14)
  • -
  • Mobilfunk-Anbieter (z.B. T-Mobile - US)
  • -
- - -

Google Play Bewertungen

-

Google Play hat seine eigene Datenschutzerklärung. - Google stellt Entwicklern folgende anonymisierte Installations-Informationen bezüglich der Bewertungen bereit:

-
    -
  • Land (z.B. USA)
  • -
  • Sprache (z.B. Englisch)
  • -
  • App-Version (z.B. 14)
  • -
  • Android-Version (z.B. Android 7.1)
  • -
  • Gerät (z.B. Google Nexus 5X [bullhead])
  • -
  • Tablets (z.B. 10"-Tablet oder höher)
  • -
- - -

Google Play Rezensionen

-

Google Play hat seine eigene Datenschutzerklärung. - Zusätzlich zum Namen des Rezensenten, der Bewertung und dem Text der Rezension (welche alle öffentlich zugänglich sind), stellt Google dem Entwickler einige oder alle der folgenden Informationen zur Verfügung:

-
    -
  • Versions-Code (z.B. 7)
  • -
  • Versions-Name (z.B. 1.6)
  • -
  • Android-Version (z.B. Android 5.1)
  • -
  • Gerät (z.B. Galaxy S6 Edge+ [zenlte])
  • -
  • Hersteller (z.B. Samsung)
  • -
  • Gerätetyp (z.B. Mobiltelefon)
  • -
  • CPU-Fabrikat (z.B. Samsung)
  • -
  • CPU-Model (z.B. Exynos 7420)
  • -
  • Bildschirm-Auflösung (z.B. 560 dpi)
  • -
  • Bildschirm-Grösse (z.B. 2560 x 1440)
  • -
  • RAM (z.B. 4096 MB)
  • -
  • Native Plattform (z.B. armeabi-v7a,armeabi,arm64v8a)
  • -
  • OpenGL ES Version (z.B. 3.1)
  • -
  • Geräte-Sprache (z.B. Englisch)
  • -
- - -

Direkte Kommunication

-

Benutzer können z.B. per Email und Kommentaren auf stoutner.com direkt mit Stoutner Kontakt aufnehmen.

- -

Daten-Nutzung

-

Stoutner kann diese Informationen nutzen, um die Entwicklung von Privacy Browser zu unterstützen und den Status des Projekts an Benutzer zu melden. - Stoutner wird die Informationen niemals verkaufen oder an Dritte weitergeben, welche diese für Anzeigen oder Marketing nutzen.

- -
-

Revision 1.6, 22. Mai 2018

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_domain_settings.html b/app/src/main/assets/de/guide_domain_settings.html new file mode 100644 index 00000000..ffabdebc --- /dev/null +++ b/app/src/main/assets/de/guide_domain_settings.html @@ -0,0 +1,44 @@ + + + + + + + + + + + + + +

Sicheres Internet-Surfen

+ +

Privacy Browser’s Vorgabe ist das Surfen ohne JavaScript, Cookies und DOM-Speicher. + Allerdings gibt es Websites, die nur korrekt funktionieren, wenn eine oder mehrere dieser Funktionen aktiviert sind. + Sie können daher eine oder mehrere dieser Funktionen automatisch aktivieren, wenn Sie eine solche Seite (Domain) besuchen.

+ + + +

Wenn Sie ein Seite besuchen, für die zuvor bereits entsprechende Einstellungen getätigt wurden, wird der Hintergrund der URL-Textbox grün dargestellt.

+ + + + \ No newline at end of file diff --git a/app/src/main/assets/de/guide_domain_settings_dark.html b/app/src/main/assets/de/guide_domain_settings_dark.html deleted file mode 100644 index 2c0f2322..00000000 --- a/app/src/main/assets/de/guide_domain_settings_dark.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -

Sicheres Internet-Surfen

- -

Privacy Browser’s Vorgabe ist das Surfen ohne JavaScript, Cookies und DOM-Speicher. - Allerdings gibt es Websites, die nur korrekt funktionieren, wenn eine oder mehrere dieser Funktionen aktiviert sind. - Sie können daher eine oder mehrere dieser Funktionen automatisch aktivieren, wenn Sie eine solche Seite (Domain) besuchen.

- -

- -

Wenn Sie ein Seite besuchen, für die zuvor bereits entsprechende Einstellungen getätigt wurden, wird der Hintergrund der URL-Textbox grün dargestellt.

- -

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_domain_settings_light.html b/app/src/main/assets/de/guide_domain_settings_light.html deleted file mode 100644 index abd39a41..00000000 --- a/app/src/main/assets/de/guide_domain_settings_light.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -

Sicheres Internet-Surfen

- -

Privacy Browser’s Vorgabe ist das Surfen ohne JavaScript, Cookies und DOM-Speicher. - Allerdings gibt es Websites, die nur korrekt funktionieren, wenn eine oder mehrere dieser Funktionen aktiviert sind. - Sie können daher eine oder mehrere dieser Funktionen automatisch aktivieren, wenn Sie eine solche Seite (Domain) besuchen.

- -

- -

Wenn Sie ein Seite besuchen, für die zuvor bereits entsprechende Einstellungen getätigt wurden, wird der Hintergrund der URL-Textbox grün dargestellt.

- -

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_javascript.html b/app/src/main/assets/de/guide_javascript.html new file mode 100644 index 00000000..11e56059 --- /dev/null +++ b/app/src/main/assets/de/guide_javascript.html @@ -0,0 +1,63 @@ + + + + + + + + + + + + + +

JavaScript ist mächtig

+ +

In den frühen Tagen des Internets waren Websites statisch, zeigten also nur Text und Bilder, welche auf dem Bildschirm sichtbar sind, veränderten sich oder interagierten aber nicht. + Natürlich passierte auf solch statischen Websites nicht viel Interessantes. Viele verschiedene Technologien wurden für dynamische Websites entwickelt. Javascript war eine davon.

+ +

Javascript ist eine Programmiersprache. Viele Webserver hosten in Javascript geschriebene Programme, welche als Teil der Website an die abrufenden Geräte gesandt werden. + Das Gerät führt die Skripts dann auf dem lokalen Gerät aus und folgt den Anweisungen des Programms, um beispielsweise Bilder zu animieren, Menüs zu öffnen und andere derartige Dinge.

+ +

JavaScript ist gefährlich

+ +

Natürlich birgt das Konzept von willkürlich ausgeführten Programmen aus einer Website heraus auch ein großes Gefahrenprotenzial. + Also werden Limitierungen in Javascript gesetzt, die etwa Viren verhindern sollen, jedoch nicht immer wirksam sind. + Das Bild unten zeigt einen Screenshot von webkay, + einer Website die Beispiele für von einem Gerät produzierten Informationen bietet, wenn Javascript auf einem Gerät läuft. + Browser Leaks ist eine andere gute Quelle.

+ +

+ +

Zum Schutz der Privatsphäre wäre es ideal, das Web ohne Javascript zu nutzen. Jedoch benötigen manche Websites legitimerweise + JavaScript, um ihre Zwecke zu erfüllen und andere funktionieren nicht korrekt ohne Javascript, selbst wenn sie dazu umprogrammiert werden könnten. + Privacy Browser geht auf diese Problematik ein und macht es einfach, Javascript zu (de-)aktivieren. Ein Knopfdruck auf das Privatsphäre-Schild wechselt zwischen blau + oder gelb (beide zeigen an, dass + JavaScript aus ist) und rot (JavaScript aktiviert) und aktualisiert die Website. + Der Vergleich der verschiedenen Informationen, die webkay mit und ohne Javascript sammeln kann, ist sehr informativ.

+ +

Im Internet ohne Javascript unterwegs zu sein oder dieses nur bei Bedarf zu aktivieren, ist ein daher wichtiger Schritt, um die Privatsphäre zu schützen. + Darüber hinaus werden von den meisten modernen Websites nervige Werbebanner und und überflüssiger Müll mit Javascript geladen. + Wird Javascript deaktiviert, laden Websites daher meist wesentlich schneller, brauchen weniger Datenvolumen und CPU-Leistung, was auch die Lebenszeit der Batterien verlängert.

+ + \ No newline at end of file diff --git a/app/src/main/assets/de/guide_javascript_dark.html b/app/src/main/assets/de/guide_javascript_dark.html deleted file mode 100644 index 24829871..00000000 --- a/app/src/main/assets/de/guide_javascript_dark.html +++ /dev/null @@ -1,60 +0,0 @@ - - - - - - - - - - -

JavaScript ist mächtig

- -

In den frühen Tagen des Internets waren Websites statisch, zeigten also nur Text und Bilder, welche auf dem Bildschirm sichtbar sind, veränderten sich oder interagierten aber nicht. - Natürlich passierte auf solch statischen Websites nicht viel Interessantes. Viele verschiedene Technologien wurden für dynamische Websites entwickelt. Javascript war eine davon.

- -

Javascript ist eine Programmiersprache. Viele Webserver hosten in Javascript geschriebene Programme, welche als Teil der Website an die abrufenden Geräte gesandt werden. - Das Gerät führt die Skripts dann auf dem lokalen Gerät aus und folgt den Anweisungen des Programms, um beispielsweise Bilder zu animieren, Menüs zu öffnen und andere derartige Dinge.

- -

JavaScript ist gefährlich

- -

Natürlich birgt das Konzept von willkürlich ausgeführten Programmen aus einer Website heraus auch ein großes Gefahrenprotenzial. - Also werden Limitierungen in Javascript gesetzt, die etwa Viren verhindern sollen, jedoch nicht immer wirksam sind. - Das Bild unten zeigt einen Screenshot von webkay, - einer Website die Beispiele für von einem Gerät produzierten Informationen bietet, wenn Javascript auf einem Gerät läuft. - Browser Leaks ist eine andere gute Quelle.

- -

- -

Zum Schutz der Privatsphäre wäre es ideal, das Web ohne Javascript zu nutzen. Jedoch benötigen manche Websites legitimerweise - JavaScript, um ihre Zwecke zu erfüllen und andere funktionieren nicht korrekt ohne Javascript, selbst wenn sie dazu umprogrammiert werden könnten. - Privacy Browser geht auf diese Problematik ein und macht es einfach, Javascript zu (de-)aktivieren. Ein Knopfdruck auf das Privatsphäre-Schild wechselt zwischen blau - oder gelb (beide zeigen an, dass - JavaScript aus ist) und rot (JavaScript aktiviert) und aktualisiert die Website. - Der Vergleich der verschiedenen Informationen, die webkay mit und ohne Javascript sammeln kann, ist sehr informativ.

- -

Im Internet ohne Javascript unterwegs zu sein oder dieses nur bei Bedarf zu aktivieren, ist ein daher wichtiger Schritt, um die Privatsphäre zu schützen. - Darüber hinaus werden von den meisten modernen Websites nervige Werbebanner und und überflüssiger Müll mit Javascript geladen. - Wird Javascript deaktiviert, laden Websites daher meist wesentlich schneller, brauchen weniger Datenvolumen und CPU-Leistung, was auch die Lebenszeit der Batterien verlängert.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_javascript_light.html b/app/src/main/assets/de/guide_javascript_light.html deleted file mode 100644 index e85c348f..00000000 --- a/app/src/main/assets/de/guide_javascript_light.html +++ /dev/null @@ -1,60 +0,0 @@ - - - - - - - - - - -

JavaScript ist mächtig

- -

In den frühen Tagen des Internets waren Websites statisch, zeigten also nur Text und Bilder, welche auf dem Bildschirm sichtbar sind, veränderten sich oder interagierten aber nicht. - Natürlich passierte auf solch statischen Websites nicht viel Interessantes. Viele verschiedene Technologien wurden für dynamische Websites entwickelt. Javascript war eine davon.

- -

Javascript ist eine Programmiersprache. Viele Webserver hosten in Javascript geschriebene Programme, welche als Teil der Website an die abrufenden Geräte gesandt werden. - Das Gerät führt die Skripts dann auf dem lokalen Gerät aus und folgt den Anweisungen des Programms, um beispielsweise Bilder zu animieren, Menüs zu öffnen und andere derartige Dinge.

- -

JavaScript ist gefährlich

- -

Natürlich birgt das Konzept von willkürlich ausgeführten Programmen aus einer Website heraus auch ein großes Gefahrenprotenzial. - Also werden Limitierungen in Javascript gesetzt, die etwa Viren verhindern sollen, jedoch nicht immer wirksam sind. - Das Bild unten zeigt einen Screenshot von webkay, - einer Website die Beispiele für von einem Gerät produzierten Informationen bietet, wenn Javascript auf einem Gerät läuft. - Browser Leaks ist eine andere gute Quelle.

- -

- -

Zum Schutz der Privatsphäre wäre es ideal, das Web ohne Javascript zu nutzen. Jedoch benötigen manche Websites legitimerweise - JavaScript, um ihre Zwecke zu erfüllen und andere funktionieren nicht korrekt ohne Javascript, selbst wenn sie dazu umprogrammiert werden könnten. - Privacy Browser geht auf diese Problematik ein und macht es einfach, Javascript zu (de-)aktivieren. Ein Knopfdruck auf das Privatsphäre-Schild wechselt zwischen blau - oder gelb (beide zeigen an, dass - JavaScript aus ist) und rot (JavaScript aktiviert) und aktualisiert die Website. - Der Vergleich der verschiedenen Informationen, die webkay mit und ohne Javascript sammeln kann, ist sehr informativ.

- -

Im Internet ohne Javascript unterwegs zu sein oder dieses nur bei Bedarf zu aktivieren, ist ein daher wichtiger Schritt, um die Privatsphäre zu schützen. - Darüber hinaus werden von den meisten modernen Websites nervige Werbebanner und und überflüssiger Müll mit Javascript geladen. - Wird Javascript deaktiviert, laden Websites daher meist wesentlich schneller, brauchen weniger Datenvolumen und CPU-Leistung, was auch die Lebenszeit der Batterien verlängert.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_local_storage.html b/app/src/main/assets/de/guide_local_storage.html new file mode 100644 index 00000000..04d3b5a6 --- /dev/null +++ b/app/src/main/assets/de/guide_local_storage.html @@ -0,0 +1,96 @@ + + + + + + + + + + + + +

Erstanbieter-Cookies

+ +

Cookies können in zwei Typen unterteilt werden: Erstanbieter-Cookies sind Cookies, die von der aktuell besuchten Website gesetzt werden.

+ +

Mit solchen Erstanbieter-Cookies können Websites z.B. Informationen auf einem Computer speichern, um diese bei späteren Aufrufen derselben Seite wieder zu verwenden. + Zum Beispiel kann eine Internet-Seite, die das Wetter anzeigt, den Benutzer nach seiner Postleitzahl fragen und diese in einem Cookie speichern. + Beim nächsten Besuch der Website wird dem Benutzer dann automatisch das Wetter für diese Postleitzahl/Region angezeigt, ohne dass der Benutzer diese erneut eingeben muss.

+ +

Wie viele anderen Dingen im Internet werden solche Cookies jedoch mittlerweile auch für Zwecke missbraucht, die Website-Besucher normalerweise nicht gestatten würden, wenn sie davon wüssten. + Zum Beispiel können Websites eindeutige Kennzeichen oder Seriennummern in Cookies speichern. + Jedes Mal wenn der Benutzer dann mit seinem Gerät diese Website aufruft, können dessen Bewegungen mit dem Profil dieser Seriennummer verknüpft werden, + auch wenn dem Gerät inzwischen eine andere IP-Adresse zugewiesen wurde. So entstehen umfangreiche Profile über die Vorlieben von Website-Besuchern.

+ +

Nahezu alle Webseiten, bei denen eine Anmeldung notwendig ist, nutzen Erstanbieter-Cookies für den Anmeldevorgang. + Damit wird sichergestellt, dass nur der angemeldete Benutzer Zugang zu den entsprechenden Informationen hat. Dies ist meiner Meinung nach eine der wenigen legitimen Verwendungen von Cookies.

+ +

Wenn Erstanbieter-Cookies aktiviert sind, aber Javascript deaktiviert, ist das Privatsphäre-Icon als Warnung gelb .

+ +

Drittanbieter-Cookies

+ +

Drittanbieter-Cookies werden von Teilen einer Website gesetzt, die von einem anderen Server als dem aktuell besuchten geladen werden. + Beispielsweise laden viele Websites Werbungen von einem Drittanbieter-Broker wie Googles Ad Sense. + Jedes Mal wenn die Website lädt, fragt diese bei dem Werbe-Broker an, dass er Werbung zeigen soll. + Der Werbe-Broker analysiert jegliche information, die er über den Nutzer hat, vergleicht diese mit dem aktuell gezahlten Satz der werbenden Firmen, + die die Werbung platziert haben wollen und wählt die anzuzeigenden Werbungen aus. + Der Bereich der Website, auf dem die Werbung angezeigt wird, wird vom Drittanbieter-Broker statt von der eigentlich besuchten Website geladen.

+ +

Weil die meisten Werbungen im Internet von ein paar wenigen Brokern betrieben werden, hat es nicht lange gedauert, bis diese gemerkt haben, + dass sie einfach ein Tracking-Cookie auf dem Gerät des Benutzers hinterlassen können, um immer Bescheid zu wissen, wo sich dieser - auch über Seiten- und Domain-Grenzen hinweg - im Internet bewegt. + Jedes Mal, wenn eine Werbung von einem Broker geladen wird, ist es dessen erste Aufgabe, das Gerät auf eine einmalige Seriennummer in einem cookie zu überprüfen. + Wenn es diesen hat, sucht er das Profil für diese Seriennummer heraus und merkt sich die neu besuchte Seite. + Deshalb kann der Nutzer auf einer Seite nach einem Produkt suchen, nach dem er normalerweise nicht sucht, wie z. B. Walnüsse, + und plötzlich auf jeder anderen besuchten Website Werbungen für Walnüsse angezeigt bekommen.

+ +

Zusätzlich zu Werbe-Brokern machen Social-Media-Plattformen das Gleiche. + Vor ein paar Jahren haben die großen Plattformen wie Facebook und Twitter eine große Auswahl von Websites ausgemacht, auf denen es in ihrem größten Interesse wäre, Social Media-Icons zu platzieren. + Das sind nicht nur Bilder, sondern auch eingebettete Codes, + welche zurück auf die Social-Media-Plattform verlinken und - neben anderen Dingen - ein Drittanbieter-Cookie auf dem Gerät hinterlassen. + Diese Cookies werden selbst dann gesetzt, wenn der Benutzer keinen Account bei der Social-Media-Plattform hat. + Mit der Zeit bauten Firmen wie Facebook (welche ebenfalls einen Werbe-Broker betreiben) eine große Anzahl von detaillierten Profilen über Personen an, die + niemals einen Account auf ihrer Seite erstellt haben.

+ +

Es gibt daher kaum einen Grund, solche Drittanbieter-Cookies zuzulassen. Auf Geräten mit Android KitKat oder älter (version <= 4.4.4 or API <= 20) kann + Webkit leider nicht zwischen Erstanbieter- und Drittanbieter-Cookies unterscheiden. + Daher werden auf diesen Geräten + auch Drittanbieter-Cookies erlaubt, wenn Erstanbieter-Cookies zugelassen werden.

+ +

DOM-Speicher

+ +

DOM-Speicher (Document Object Model-Speicher) - auch bekannt als "Web Storage" - ist ein andere Art, mit der Websites Informationen speichern können. + Während der gesamte Speicherplatz für Cookies einer Webseite auf maximal 4 Kilobytes begrenzt ist, können im DOM-Speicher + Megabytes pro Seite gespeichert werden - diese Art der Speicherung ist daher gewissermassen Cookies auf Steroiden. + Da der DOM-Speicher jedoch Javascript benötigt um Daten zu schreiben oder zu lesen, kann er nicht aktiviert werden, solange nicht auch JavaScript aktiviert ist.

+ +

Formulardaten

+ +

Formulardaten umfassen Informationen, die in Web-Formulare eingetippt werden, wie etwa Namen, Adressen, Telefonnummern, usw. + Diese werden in Drop-Down-Listen angezeigt, wenn die betreffenden Seiten später wieder aufgerufen werden. + Anders als die oben genannten Formen lokal gespeicherter Informationen werden Formulardaten dabei nicht ohne bewusste Interaktion des Benutzers + (z.B. Abschicken eines Formulars) an einen Webserver geschickt. + Ab Android Oreo (8.0) verwendet WebView den Autofill-Service. + Daher werden die entsprechenden Wahlmöglichkeiten für Formulardaten bei neueren Android-Geräten nicht mehr angezeigt.

+ + \ No newline at end of file diff --git a/app/src/main/assets/de/guide_local_storage_dark.html b/app/src/main/assets/de/guide_local_storage_dark.html deleted file mode 100644 index a31c0fca..00000000 --- a/app/src/main/assets/de/guide_local_storage_dark.html +++ /dev/null @@ -1,94 +0,0 @@ - - - - - - - - - - -

Erstanbieter-Cookies

- -

Cookies können in zwei Typen unterteilt werden: Erstanbieter-Cookies sind Cookies, die von der aktuell besuchten Website gesetzt werden.

- -

Mit solchen Erstanbieter-Cookies können Websites z.B. Informationen auf einem Computer speichern, um diese bei späteren Aufrufen derselben Seite wieder zu verwenden. - Zum Beispiel kann eine Internet-Seite, die das Wetter anzeigt, den Benutzer nach seiner Postleitzahl fragen und diese in einem Cookie speichern. - Beim nächsten Besuch der Website wird dem Benutzer dann automatisch das Wetter für diese Postleitzahl/Region angezeigt, ohne dass der Benutzer diese erneut eingeben muss.

- -

Wie viele anderen Dingen im Internet werden solche Cookies jedoch mittlerweile auch für Zwecke missbraucht, die Website-Besucher normalerweise nicht gestatten würden, wenn sie davon wüssten. - Zum Beispiel können Websites eindeutige Kennzeichen oder Seriennummern in Cookies speichern. - Jedes Mal wenn der Benutzer dann mit seinem Gerät diese Website aufruft, können dessen Bewegungen mit dem Profil dieser Seriennummer verknüpft werden, - auch wenn dem Gerät inzwischen eine andere IP-Adresse zugewiesen wurde. So entstehen umfangreiche Profile über die Vorlieben von Website-Besuchern.

- -

Nahezu alle Webseiten, bei denen eine Anmeldung notwendig ist, nutzen Erstanbieter-Cookies für den Anmeldevorgang. - Damit wird sichergestellt, dass nur der angemeldete Benutzer Zugang zu den entsprechenden Informationen hat. Dies ist meiner Meinung nach eine der wenigen legitimen Verwendungen von Cookies.

- -

Wenn Erstanbieter-Cookies aktiviert sind, aber Javascript deaktiviert, ist das Privatsphäre-Icon als Warnung gelb .

- -

Drittanbieter-Cookies

- -

Drittanbieter-Cookies werden von Teilen einer Website gesetzt, die von einem anderen Server als dem aktuell besuchten geladen werden. - Beispielsweise laden viele Websites Werbungen von einem Drittanbieter-Broker wie Googles Ad Sense. - Jedes Mal wenn die Website lädt, fragt diese bei dem Werbe-Broker an, dass er Werbung zeigen soll. - Der Werbe-Broker analysiert jegliche information, die er über den Nutzer hat, vergleicht diese mit dem aktuell gezahlten Satz der werbenden Firmen, - die die Werbung platziert haben wollen und wählt die anzuzeigenden Werbungen aus. - Der Bereich der Website, auf dem die Werbung angezeigt wird, wird vom Drittanbieter-Broker statt von der eigentlich besuchten Website geladen.

- -

Weil die meisten Werbungen im Internet von ein paar wenigen Brokern betrieben werden, hat es nicht lange gedauert, bis diese gemerkt haben, - dass sie einfach ein Tracking-Cookie auf dem Gerät des Benutzers hinterlassen können, um immer Bescheid zu wissen, wo sich dieser - auch über Seiten- und Domain-Grenzen hinweg - im Internet bewegt. - Jedes Mal, wenn eine Werbung von einem Broker geladen wird, ist es dessen erste Aufgabe, das Gerät auf eine einmalige Seriennummer in einem cookie zu überprüfen. - Wenn es diesen hat, sucht er das Profil für diese Seriennummer heraus und merkt sich die neu besuchte Seite. - Deshalb kann der Nutzer auf einer Seite nach einem Produkt suchen, nach dem er normalerweise nicht sucht, wie z. B. Walnüsse, - und plötzlich auf jeder anderen besuchten Website Werbungen für Walnüsse angezeigt bekommen.

- -

Zusätzlich zu Werbe-Brokern machen Social-Media-Plattformen das Gleiche. - Vor ein paar Jahren haben die großen Plattformen wie Facebook und Twitter eine große Auswahl von Websites ausgemacht, auf denen es in ihrem größten Interesse wäre, Social Media-Icons zu platzieren. - Das sind nicht nur Bilder, sondern auch eingebettete Codes, - welche zurück auf die Social-Media-Plattform verlinken und - neben anderen Dingen - ein Drittanbieter-Cookie auf dem Gerät hinterlassen. - Diese Cookies werden selbst dann gesetzt, wenn der Benutzer keinen Account bei der Social-Media-Plattform hat. - Mit der Zeit bauten Firmen wie Facebook (welche ebenfalls einen Werbe-Broker betreiben) eine große Anzahl von detaillierten Profilen über Personen an, die - niemals einen Account auf ihrer Seite erstellt haben.

- -

Es gibt daher kaum einen Grund, solche Drittanbieter-Cookies zuzulassen. Auf Geräten mit Android KitKat oder älter (version <= 4.4.4 or API <= 20) kann - Webkit leider nicht zwischen Erstanbieter- und Drittanbieter-Cookies unterscheiden. - Daher werden auf diesen Geräten - auch Drittanbieter-Cookies erlaubt, wenn Erstanbieter-Cookies zugelassen werden.

- -

DOM-Speicher

- -

DOM-Speicher (Document Object Model-Speicher) - auch bekannt als "Web Storage" - ist ein andere Art, mit der Websites Informationen speichern können. - Während der gesamte Speicherplatz für Cookies einer Webseite auf maximal 4 Kilobytes begrenzt ist, können im DOM-Speicher - Megabytes pro Seite gespeichert werden - diese Art der Speicherung ist daher gewissermassen Cookies auf Steroiden. - Da der DOM-Speicher jedoch Javascript benötigt um Daten zu schreiben oder zu lesen, kann er nicht aktiviert werden, solange nicht auch JavaScript aktiviert ist.

- -

Formulardaten

- -

Formulardaten umfassen Informationen, die in Web-Formulare eingetippt werden, wie etwa Namen, Adressen, Telefonnummern, usw. - Diese werden in Drop-Down-Listen angezeigt, wenn die betreffenden Seiten später wieder aufgerufen werden. - Anders als die oben genannten Formen lokal gespeicherter Informationen werden Formulardaten dabei nicht ohne bewusste Interaktion des Benutzers - (z.B. Abschicken eines Formulars) an einen Webserver geschickt. - Ab Android Oreo (8.0) verwendet WebView den Autofill-Service. - Daher werden die entsprechenden Wahlmöglichkeiten für Formulardaten bei neueren Android-Geräten nicht mehr angezeigt.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_local_storage_light.html b/app/src/main/assets/de/guide_local_storage_light.html deleted file mode 100644 index a6cd9d5c..00000000 --- a/app/src/main/assets/de/guide_local_storage_light.html +++ /dev/null @@ -1,93 +0,0 @@ - - - - - - - - - -

Erstanbieter-Cookies

- -

Cookies können in zwei Typen unterteilt werden: Erstanbieter-Cookies sind Cookies, die von der aktuell besuchten Website gesetzt werden.

- -

Mit solchen Erstanbieter-Cookies können Websites z.B. Informationen auf einem Computer speichern, um diese bei späteren Aufrufen derselben Seite wieder zu verwenden. - Zum Beispiel kann eine Internet-Seite, die das Wetter anzeigt, den Benutzer nach seiner Postleitzahl fragen und diese in einem Cookie speichern. - Beim nächsten Besuch der Website wird dem Benutzer dann automatisch das Wetter für diese Postleitzahl/Region angezeigt, ohne dass der Benutzer diese erneut eingeben muss.

- -

Wie viele anderen Dingen im Internet werden solche Cookies jedoch mittlerweile auch für Zwecke missbraucht, die Website-Besucher normalerweise nicht gestatten würden, wenn sie davon wüssten. - Zum Beispiel können Websites eindeutige Kennzeichen oder Seriennummern in Cookies speichern. - Jedes Mal wenn der Benutzer dann mit seinem Gerät diese Website aufruft, können dessen Bewegungen mit dem Profil dieser Seriennummer verknüpft werden, - auch wenn dem Gerät inzwischen eine andere IP-Adresse zugewiesen wurde. So entstehen umfangreiche Profile über die Vorlieben von Website-Besuchern.

- -

Nahezu alle Webseiten, bei denen eine Anmeldung notwendig ist, nutzen Erstanbieter-Cookies für den Anmeldevorgang. - Damit wird sichergestellt, dass nur der angemeldete Benutzer Zugang zu den entsprechenden Informationen hat. Dies ist meiner Meinung nach eine der wenigen legitimen Verwendungen von Cookies.

- -

Wenn Erstanbieter-Cookies aktiviert sind, aber Javascript deaktiviert, ist das Privatsphäre-Icon als Warnung gelb .

- -

Drittanbieter-Cookies

- -

Drittanbieter-Cookies werden von Teilen einer Website gesetzt, die von einem anderen Server als dem aktuell besuchten geladen werden. - Beispielsweise laden viele Websites Werbungen von einem Drittanbieter-Broker wie Googles Ad Sense. - Jedes Mal wenn die Website lädt, fragt diese bei dem Werbe-Broker an, dass er Werbung zeigen soll. - Der Werbe-Broker analysiert jegliche information, die er über den Nutzer hat, vergleicht diese mit dem aktuell gezahlten Satz der werbenden Firmen, - die die Werbung platziert haben wollen und wählt die anzuzeigenden Werbungen aus. - Der Bereich der Website, auf dem die Werbung angezeigt wird, wird vom Drittanbieter-Broker statt von der eigentlich besuchten Website geladen.

- -

Weil die meisten Werbungen im Internet von ein paar wenigen Brokern betrieben werden, hat es nicht lange gedauert, bis diese gemerkt haben, - dass sie einfach ein Tracking-Cookie auf dem Gerät des Benutzers hinterlassen können, um immer Bescheid zu wissen, wo sich dieser - auch über Seiten- und Domain-Grenzen hinweg - im Internet bewegt. - Jedes Mal, wenn eine Werbung von einem Broker geladen wird, ist es dessen erste Aufgabe, das Gerät auf eine einmalige Seriennummer in einem cookie zu überprüfen. - Wenn es diesen hat, sucht er das Profil für diese Seriennummer heraus und merkt sich die neu besuchte Seite. - Deshalb kann der Nutzer auf einer Seite nach einem Produkt suchen, nach dem er normalerweise nicht sucht, wie z. B. Walnüsse, - und plötzlich auf jeder anderen besuchten Website Werbungen für Walnüsse angezeigt bekommen.

- -

Zusätzlich zu Werbe-Brokern machen Social-Media-Plattformen das Gleiche. - Vor ein paar Jahren haben die großen Plattformen wie Facebook und Twitter eine große Auswahl von Websites ausgemacht, auf denen es in ihrem größten Interesse wäre, Social Media-Icons zu platzieren. - Das sind nicht nur Bilder, sondern auch eingebettete Codes, - welche zurück auf die Social-Media-Plattform verlinken und - neben anderen Dingen - ein Drittanbieter-Cookie auf dem Gerät hinterlassen. - Diese Cookies werden selbst dann gesetzt, wenn der Benutzer keinen Account bei der Social-Media-Plattform hat. - Mit der Zeit bauten Firmen wie Facebook (welche ebenfalls einen Werbe-Broker betreiben) eine große Anzahl von detaillierten Profilen über Personen an, die - niemals einen Account auf ihrer Seite erstellt haben.

- -

Es gibt daher kaum einen Grund, solche Drittanbieter-Cookies zuzulassen. Auf Geräten mit Android KitKat oder älter (version <= 4.4.4 or API <= 20) kann - Webkit leider nicht zwischen Erstanbieter- und Drittanbieter-Cookies unterscheiden. - Daher werden auf diesen Geräten - auch Drittanbieter-Cookies erlaubt, wenn Erstanbieter-Cookies zugelassen werden.

- -

DOM-Speicher

- -

DOM-Speicher (Document Object Model-Speicher) - auch bekannt als "Web Storage" - ist ein andere Art, mit der Websites Informationen speichern können. - Während der gesamte Speicherplatz für Cookies einer Webseite auf maximal 4 Kilobytes begrenzt ist, können im DOM-Speicher - Megabytes pro Seite gespeichert werden - diese Art der Speicherung ist daher gewissermassen Cookies auf Steroiden. - Da der DOM-Speicher jedoch Javascript benötigt um Daten zu schreiben oder zu lesen, kann er nicht aktiviert werden, solange nicht auch JavaScript aktiviert ist.

- -

Formulardaten

- -

Formulardaten umfassen Informationen, die in Web-Formulare eingetippt werden, wie etwa Namen, Adressen, Telefonnummern, usw. - Diese werden in Drop-Down-Listen angezeigt, wenn die betreffenden Seiten später wieder aufgerufen werden. - Anders als die oben genannten Formen lokal gespeicherter Informationen werden Formulardaten dabei nicht ohne bewusste Interaktion des Benutzers - (z.B. Abschicken eines Formulars) an einen Webserver geschickt. - Ab Android Oreo (8.0) verwendet WebView den Autofill-Service. - Daher werden die entsprechenden Wahlmöglichkeiten für Formulardaten bei neueren Android-Geräten nicht mehr angezeigt.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_overview.html b/app/src/main/assets/de/guide_overview.html new file mode 100644 index 00000000..1af07eee --- /dev/null +++ b/app/src/main/assets/de/guide_overview.html @@ -0,0 +1,54 @@ + + + + + + + + + + + + + +

Echte Privatsphäre

+ +

Privacy Browser wurde entwickelt, um Ihnen während des Surfens die maximal mögliche Kontrolle über Ihre Privatsphäre zu gewähren. + Wenn Sie sich mit einer Website verbinden, werden bestimmte Informationen, die zum Verarbeiten der Verbindung nötig sind, an den Server gesandt. + Der Server erhält beispielsweise Ihre IP-Adresse und eine Port-Nummer, welche er benötigt, damit er weiß, wohin er antworten soll. + Diese Informationen werden häufig gespeichert, damit der Webseitenbetreiber Statistiken darüber generieren kann, + wie oft eine Website geladen wird und wie viele verschiedene IP-Adressen bzw. Besucher sie besucht haben.

+ +

Darüber hinaus wollen viele Webseitenbetreiber das Surfverhalten ihrer Besucher im ganzen Internet und nicht nur auf einem einzigen Server nachverfolgen. + Sie nutzen dabei verschiedene technische Möglichkeiten. Einige davon nutzen das Anfragen oder Platzieren von bestimmten Informationen auf Ihrem Gerät, die das Nachverfolgen ermöglichen. + Nahezu alle Browser nehmen freiwillig an dieser Verfolgung Teil, ohne den Nutzer darüber zu informieren. + Privacy Browser ist dazu entwickelt, dass der Benutzer so viel Information und Kontrolle wie möglich über diese Verfolgungstechniken erhält.

+ +

Android's WebView Einschränkungen

+ +

Privacy Browser nutzt Android's eingebaute WebView-Komponente zum Anzeigen von Websites. + Daher gibt es einige Einschränkungen in Bezug auf die von WebView bereitgestellten Kontrollmöglichkeiten der Privatsphäre-Einstellungen. + Zum Beispiel ist es nicht möglich, manche JavaScript-Kommandos zu aktivieren und andere zu deaktivieren. + Für die Zukunft ist geplant, dass Privacy Browser zu einer eigenen WebView-Komponente namens Privacy WebView wechselt.

+ + \ No newline at end of file diff --git a/app/src/main/assets/de/guide_overview_dark.html b/app/src/main/assets/de/guide_overview_dark.html deleted file mode 100644 index 89aa1f5b..00000000 --- a/app/src/main/assets/de/guide_overview_dark.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - - - - - - -

Echte Privatsphäre

- -

Privacy Browser wurde entwickelt, um Ihnen während des Surfens die maximal mögliche Kontrolle über Ihre Privatsphäre zu gewähren. - Wenn Sie sich mit einer Website verbinden, werden bestimmte Informationen, die zum Verarbeiten der Verbindung nötig sind, an den Server gesandt. - Der Server erhält beispielsweise Ihre IP-Adresse und eine Port-Nummer, welche er benötigt, damit er weiß, wohin er antworten soll. - Diese Informationen werden häufig gespeichert, damit der Webseitenbetreiber Statistiken darüber generieren kann, - wie oft eine Website geladen wird und wie viele verschiedene IP-Adressen bzw. Besucher sie besucht haben.

- -

Darüber hinaus wollen viele Webseitenbetreiber das Surfverhalten ihrer Besucher im ganzen Internet und nicht nur auf einem einzigen Server nachverfolgen. - Sie nutzen dabei verschiedene technische Möglichkeiten. Einige davon nutzen das Anfragen oder Platzieren von bestimmten Informationen auf Ihrem Gerät, die das Nachverfolgen ermöglichen. - Nahezu alle Browser nehmen freiwillig an dieser Verfolgung Teil, ohne den Nutzer darüber zu informieren. - Privacy Browser ist dazu entwickelt, dass der Benutzer so viel Information und Kontrolle wie möglich über diese Verfolgungstechniken erhält.

- -

Android's WebView Einschränkungen

- -

Privacy Browser nutzt Android's eingebaute WebView-Komponente zum Anzeigen von Websites. - Daher gibt es einige Einschränkungen in Bezug auf die von WebView bereitgestellten Kontrollmöglichkeiten der Privatsphäre-Einstellungen. - Zum Beispiel ist es nicht möglich, manche JavaScript-Kommandos zu aktivieren und andere zu deaktivieren. - Für die Zukunft ist geplant, dass Privacy Browser zu einer eigenen WebView-Komponente namens Privacy WebView wechselt.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_overview_light.html b/app/src/main/assets/de/guide_overview_light.html deleted file mode 100644 index 38d4fc5d..00000000 --- a/app/src/main/assets/de/guide_overview_light.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - - - - - - -

Echte Privatsphäre

- -

Privacy Browser wurde entwickelt, um Ihnen während des Surfens die maximal mögliche Kontrolle über Ihre Privatsphäre zu gewähren. - Wenn Sie sich mit einer Website verbinden, werden bestimmte Informationen, die zum Verarbeiten der Verbindung nötig sind, an den Server gesandt. - Der Server erhält beispielsweise Ihre IP-Adresse und eine Port-Nummer, welche er benötigt, damit er weiß, wohin er antworten soll. - Diese Informationen werden häufig gespeichert, damit der Webseitenbetreiber Statistiken darüber generieren kann, - wie oft eine Website geladen wird und wie viele verschiedene IP-Adressen bzw. Besucher sie besucht haben.

- -

Darüber hinaus wollen viele Webseitenbetreiber das Surfverhalten ihrer Besucher im ganzen Internet und nicht nur auf einem einzigen Server nachverfolgen. - Sie nutzen dabei verschiedene technische Möglichkeiten. Einige davon nutzen das Anfragen oder Platzieren von bestimmten Informationen auf Ihrem Gerät, die das Nachverfolgen ermöglichen. - Nahezu alle Browser nehmen freiwillig an dieser Verfolgung Teil, ohne den Nutzer darüber zu informieren. - Privacy Browser ist dazu entwickelt, dass der Benutzer so viel Information und Kontrolle wie möglich über diese Verfolgungstechniken erhält.

- -

Android's WebView Einschränkungen

- -

Privacy Browser nutzt Android's eingebaute WebView-Komponente zum Anzeigen von Websites. - Daher gibt es einige Einschränkungen in Bezug auf die von WebView bereitgestellten Kontrollmöglichkeiten der Privatsphäre-Einstellungen. - Zum Beispiel ist es nicht möglich, manche JavaScript-Kommandos zu aktivieren und andere zu deaktivieren. - Für die Zukunft ist geplant, dass Privacy Browser zu einer eigenen WebView-Komponente namens Privacy WebView wechselt.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_proxies.html b/app/src/main/assets/de/guide_proxies.html new file mode 100644 index 00000000..f6e5f6fe --- /dev/null +++ b/app/src/main/assets/de/guide_proxies.html @@ -0,0 +1,91 @@ + + + + + + + + + + + + + +

Proxies deren Einschränkungen

+ +

Faktoren, die die Privatsphäre im Web einschränken wollen, lassen sich hauptsächlich in zwei verschiedene Kategorien unterteilen: + Neugierige Behörden mit Zugriff auf Internetprovider und grosse Konzerne, die "soziale" und Werbe-Netzwerke betreiben. + Proxies wie TOR (The Onion Router) und + I2P (Invisible Internet Project) können hilfreich sein, + um Ihre Privatsphäre vor böswilligen Obrigkeiten (welche Ihren Datenverkehr ausspionieren) zu schützen, nicht jedoch vor Megafirmen (welche Schadcode auf Webservern einbinden).

+ + +

Neugierige Behörden

+ +

Oft spähen neugierige Behörden Bürger aus, um Fehlverhalten und Menschenrechtsaktivitäten zu bestrafen. + Üblicherweise betreiben sie entweder die Internetprovider selbst oder sie können Provider dazu zwingen, Informationen über jede besuchte IP-Adresse und die zugehörigen Benutzer herauszugeben. + Proxy-Server (layered proxies) versuchen solche Verstöße zu unterbinden, indem der Netzwerk-Verkehr eines Geräts verschlüsselt und über mehrere Server im Internet geleitet wird, + bevor er zum endgültigen Ziel geschickt wird. + Dadurch soll sichergestellt werden, dass Internet-Provider, + Server oder Websites weder die IP-Adresse des Gerätes noch die IP-Adresse des endgültigen Ziel-Webservers kennen. + Böswillige Obrigkeiten und von Ihnen kontrollierte Internet-Provider können so nicht erkennen, + auf welche Webserver ein Benutzer zugreift - sie können jedoch feststellen, dass der Benutzer einen Proxy-Service nutzt. + In einigen Teilen der Welt kann die Nutzung von Proxies als Anzeichen von illegalem Verhalten gewertet ("Wenn Du nichts zu verbergen hättest, würdest Du Deinen Datenverkehr nicht verschlüsseln") + und Benutzer belangt werden, weil Obrigkeiten annehmen, dass Nutzer damit Verbotenes tun. Daher können Proxies hilfreich sein, stellen jedoch kein Allheilmittel dar.

+ + +

Megafirmen

+ +

Wenn ein Benutzer sich mit einem Webserver verbindet, kann der Webserver seine IP-Adresse sehen. + Obwohl es keine ausgereifte Methode ist, können IP-Adressen in physische Adressen umgewandelt werden - mit erstaunlicher Genauigkeit. + Kleinere Webserver verlassen sich üblicherweise auf die IP-Adresse, um den Standort von Benutzern, die Ihre Internet-Seiten besuchen, festzustellen. + Proxies sind in solchen Fällen eine gute Lösung, um den Standort eines Benutzers vor den Serverbetreibern zu verschleiern. + Große Megafirmen, die "soziale" und Werbe-Netzwerke betreiben, nutzen jedoch Profile an Informationen, um Benutzer über ihre Geräte und IP-Adressen hinweg zu tracken. + Diese Profile nutzen verschiedene Techniken um Benutzer ausfindig zu machen, inklusive JavaScript, Cookies, Tracking-IDs und den sogenannten + "Browser-Fingerabdruck" (fingerprinting). + Weil die große Mehrheit der Websites im Internet Werbung entweder von großen Werbenetzwerken oder von eingebetteten Social-Media-Buttons mit ihrem zugewiesenen JavaScript lädt, + haben die großen Megafirmen Profile von so gut wie jedem Internetnutzer angefertigt und verfolgen deren Aktivitäten über zueinander unabhängige Seiten.

+ +

Sie verfolgen jede besuchte Seite, Alles online Gekaufte, jede für Einkäufe genutzte Kreditkarte, jede Adresse, + an die Waren verschickt werden, und die GPS-Metadaten von jedem ins Internet hochgeladene Foto. + Sie fertigen Profile an, die Alter, Geschlecht, Beziehungsstatus, Adresse, politische und religiöse Ansichten, familiäre Umstände, + Anzahl der Haustiere und alles Andere, was sie über einen Nutzer herausfinden können, beinhalten. + Sie kaufen sogar ganze Datenbanken mit Informationen über Kreditkartennutzungen in Geschäften auf, damit sie das Offline-Einkaufsverhalten von Nutzern in ihren Profilen nachverfolgen können. + Da sie damit bereits wesentlich genauere Adress-Informationen über einen Benutzer haben als eine IP-Adresse offenlegt, bieten Proxies keinen nennenswerten Privatsphäre-Schutz gegen Megafirmen.

+ +

Der einzige und beste Schutz der Privatsphäre gegen Megafirmen ist es, mit deaktivieren JavaScript durchs Web zu surfen, gefolgt von geblockten Werbenetzwerken, + deaktivierten Cookies und DOM-Speicher und das Benutzen eines Browsers, der schwierig zu "fingerprinten" ist.

+ + +

Nutzung von Proxies

+ +

Trotz ihrer Einschränkungen können Proxies unter bestimmen Umständen durchaus nützlich sein. + Tor und I2P + existieren Android-Apps, die die einfache Nutzung dieser Proxy-Netzwerke ermöglichen. + Wird die Nutzung dieser Proxy-Netzwerke in Privacy Browser aktiviert, wird die App-Leiste mit einem hellblauen statt hellgrauen Hintergrund versehen. + Da der Datenverkehr in solchen Fällen jedoch über mehrere Proxy-Knoten geleitet wird, + ist die Übertragungsgeschwindigkeit bei der Nutzung von Proxies meist deutlich langsamer als bei direkten Internet-Verbindungen.

+ + + + \ No newline at end of file diff --git a/app/src/main/assets/de/guide_proxies_dark.html b/app/src/main/assets/de/guide_proxies_dark.html deleted file mode 100644 index 47f80d81..00000000 --- a/app/src/main/assets/de/guide_proxies_dark.html +++ /dev/null @@ -1,88 +0,0 @@ - - - - - - - - - - -

Proxies deren Einschränkungen

- -

Faktoren, die die Privatsphäre im Web einschränken wollen, lassen sich hauptsächlich in zwei verschiedene Kategorien unterteilen: - Neugierige Behörden mit Zugriff auf Internetprovider und grosse Konzerne, die "soziale" und Werbe-Netzwerke betreiben. - Proxies wie TOR (The Onion Router) und - I2P (Invisible Internet Project) können hilfreich sein, - um Ihre Privatsphäre vor böswilligen Obrigkeiten (welche Ihren Datenverkehr ausspionieren) zu schützen, nicht jedoch vor Megafirmen (welche Schadcode auf Webservern einbinden).

- - -

Neugierige Behörden

- -

Oft spähen neugierige Behörden Bürger aus, um Fehlverhalten und Menschenrechtsaktivitäten zu bestrafen. - Üblicherweise betreiben sie entweder die Internetprovider selbst oder sie können Provider dazu zwingen, Informationen über jede besuchte IP-Adresse und die zugehörigen Benutzer herauszugeben. - Proxy-Server (layered proxies) versuchen solche Verstöße zu unterbinden, indem der Netzwerk-Verkehr eines Geräts verschlüsselt und über mehrere Server im Internet geleitet wird, - bevor er zum endgültigen Ziel geschickt wird. - Dadurch soll sichergestellt werden, dass Internet-Provider, - Server oder Websites weder die IP-Adresse des Gerätes noch die IP-Adresse des endgültigen Ziel-Webservers kennen. - Böswillige Obrigkeiten und von Ihnen kontrollierte Internet-Provider können so nicht erkennen, - auf welche Webserver ein Benutzer zugreift - sie können jedoch feststellen, dass der Benutzer einen Proxy-Service nutzt. - In einigen Teilen der Welt kann die Nutzung von Proxies als Anzeichen von illegalem Verhalten gewertet ("Wenn Du nichts zu verbergen hättest, würdest Du Deinen Datenverkehr nicht verschlüsseln") - und Benutzer belangt werden, weil Obrigkeiten annehmen, dass Nutzer damit Verbotenes tun. Daher können Proxies hilfreich sein, stellen jedoch kein Allheilmittel dar.

- - -

Megafirmen

- -

Wenn ein Benutzer sich mit einem Webserver verbindet, kann der Webserver seine IP-Adresse sehen. - Obwohl es keine ausgereifte Methode ist, können IP-Adressen in physische Adressen umgewandelt werden - mit erstaunlicher Genauigkeit. - Kleinere Webserver verlassen sich üblicherweise auf die IP-Adresse, um den Standort von Benutzern, die Ihre Internet-Seiten besuchen, festzustellen. - Proxies sind in solchen Fällen eine gute Lösung, um den Standort eines Benutzers vor den Serverbetreibern zu verschleiern. - Große Megafirmen, die "soziale" und Werbe-Netzwerke betreiben, nutzen jedoch Profile an Informationen, um Benutzer über ihre Geräte und IP-Adressen hinweg zu tracken. - Diese Profile nutzen verschiedene Techniken um Benutzer ausfindig zu machen, inklusive JavaScript, Cookies, Tracking-IDs und den sogenannten - "Browser-Fingerabdruck" (fingerprinting). - Weil die große Mehrheit der Websites im Internet Werbung entweder von großen Werbenetzwerken oder von eingebetteten Social-Media-Buttons mit ihrem zugewiesenen JavaScript lädt, - haben die großen Megafirmen Profile von so gut wie jedem Internetnutzer angefertigt und verfolgen deren Aktivitäten über zueinander unabhängige Seiten.

- -

Sie verfolgen jede besuchte Seite, Alles online Gekaufte, jede für Einkäufe genutzte Kreditkarte, jede Adresse, - an die Waren verschickt werden, und die GPS-Metadaten von jedem ins Internet hochgeladene Foto. - Sie fertigen Profile an, die Alter, Geschlecht, Beziehungsstatus, Adresse, politische und religiöse Ansichten, familiäre Umstände, - Anzahl der Haustiere und alles Andere, was sie über einen Nutzer herausfinden können, beinhalten. - Sie kaufen sogar ganze Datenbanken mit Informationen über Kreditkartennutzungen in Geschäften auf, damit sie das Offline-Einkaufsverhalten von Nutzern in ihren Profilen nachverfolgen können. - Da sie damit bereits wesentlich genauere Adress-Informationen über einen Benutzer haben als eine IP-Adresse offenlegt, bieten Proxies keinen nennenswerten Privatsphäre-Schutz gegen Megafirmen.

- -

Der einzige und beste Schutz der Privatsphäre gegen Megafirmen ist es, mit deaktivieren JavaScript durchs Web zu surfen, gefolgt von geblockten Werbenetzwerken, - deaktivierten Cookies und DOM-Speicher und das Benutzen eines Browsers, der schwierig zu "fingerprinten" ist.

- - -

Nutzung von Proxies

- -

Trotz ihrer Einschränkungen können Proxies unter bestimmen Umständen durchaus nützlich sein. - Tor und I2P - existieren Android-Apps, die die einfache Nutzung dieser Proxy-Netzwerke ermöglichen. - Wird die Nutzung dieser Proxy-Netzwerke in Privacy Browser aktiviert, wird die App-Leiste mit einem hellblauen statt hellgrauen Hintergrund versehen. - Da der Datenverkehr in solchen Fällen jedoch über mehrere Proxy-Knoten geleitet wird, - ist die Übertragungsgeschwindigkeit bei der Nutzung von Proxies meist deutlich langsamer als bei direkten Internet-Verbindungen.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_proxies_light.html b/app/src/main/assets/de/guide_proxies_light.html deleted file mode 100644 index 1dc53edc..00000000 --- a/app/src/main/assets/de/guide_proxies_light.html +++ /dev/null @@ -1,88 +0,0 @@ - - - - - - - - - - -

Proxies deren Einschränkungen

- -

Faktoren, die die Privatsphäre im Web einschränken wollen, lassen sich hauptsächlich in zwei verschiedene Kategorien unterteilen: - Neugierige Behörden mit Zugriff auf Internetprovider und grosse Konzerne, die "soziale" und Werbe-Netzwerke betreiben. - Proxies wie TOR (The Onion Router) und - I2P (Invisible Internet Project) können hilfreich sein, - um Ihre Privatsphäre vor böswilligen Obrigkeiten (welche Ihren Datenverkehr ausspionieren) zu schützen, nicht jedoch vor Megafirmen (welche Schadcode auf Webservern einbinden).

- - -

Neugierige Behörden

- -

Oft spähen neugierige Behörden Bürger aus, um Fehlverhalten und Menschenrechtsaktivitäten zu bestrafen. - Üblicherweise betreiben sie entweder die Internetprovider selbst oder sie können Provider dazu zwingen, Informationen über jede besuchte IP-Adresse und die zugehörigen Benutzer herauszugeben. - Proxy-Server (layered proxies) versuchen solche Verstöße zu unterbinden, indem der Netzwerk-Verkehr eines Geräts verschlüsselt und über mehrere Server im Internet geleitet wird, - bevor er zum endgültigen Ziel geschickt wird. - Dadurch soll sichergestellt werden, dass Internet-Provider, - Server oder Websites weder die IP-Adresse des Gerätes noch die IP-Adresse des endgültigen Ziel-Webservers kennen. - Böswillige Obrigkeiten und von Ihnen kontrollierte Internet-Provider können so nicht erkennen, - auf welche Webserver ein Benutzer zugreift - sie können jedoch feststellen, dass der Benutzer einen Proxy-Service nutzt. - In einigen Teilen der Welt kann die Nutzung von Proxies als Anzeichen von illegalem Verhalten gewertet ("Wenn Du nichts zu verbergen hättest, würdest Du Deinen Datenverkehr nicht verschlüsseln") - und Benutzer belangt werden, weil Obrigkeiten annehmen, dass Nutzer damit Verbotenes tun. Daher können Proxies hilfreich sein, stellen jedoch kein Allheilmittel dar.

- - -

Megafirmen

- -

Wenn ein Benutzer sich mit einem Webserver verbindet, kann der Webserver seine IP-Adresse sehen. - Obwohl es keine ausgereifte Methode ist, können IP-Adressen in physische Adressen umgewandelt werden - mit erstaunlicher Genauigkeit. - Kleinere Webserver verlassen sich üblicherweise auf die IP-Adresse, um den Standort von Benutzern, die Ihre Internet-Seiten besuchen, festzustellen. - Proxies sind in solchen Fällen eine gute Lösung, um den Standort eines Benutzers vor den Serverbetreibern zu verschleiern. - Große Megafirmen, die "soziale" und Werbe-Netzwerke betreiben, nutzen jedoch Profile an Informationen, um Benutzer über ihre Geräte und IP-Adressen hinweg zu tracken. - Diese Profile nutzen verschiedene Techniken um Benutzer ausfindig zu machen, inklusive JavaScript, Cookies, Tracking-IDs und den sogenannten - "Browser-Fingerabdruck" (fingerprinting). - Weil die große Mehrheit der Websites im Internet Werbung entweder von großen Werbenetzwerken oder von eingebetteten Social-Media-Buttons mit ihrem zugewiesenen JavaScript lädt, - haben die großen Megafirmen Profile von so gut wie jedem Internetnutzer angefertigt und verfolgen deren Aktivitäten über zueinander unabhängige Seiten.

- -

Sie verfolgen jede besuchte Seite, Alles online Gekaufte, jede für Einkäufe genutzte Kreditkarte, jede Adresse, - an die Waren verschickt werden, und die GPS-Metadaten von jedem ins Internet hochgeladene Foto. - Sie fertigen Profile an, die Alter, Geschlecht, Beziehungsstatus, Adresse, politische und religiöse Ansichten, familiäre Umstände, - Anzahl der Haustiere und alles Andere, was sie über einen Nutzer herausfinden können, beinhalten. - Sie kaufen sogar ganze Datenbanken mit Informationen über Kreditkartennutzungen in Geschäften auf, damit sie das Offline-Einkaufsverhalten von Nutzern in ihren Profilen nachverfolgen können. - Da sie damit bereits wesentlich genauere Adress-Informationen über einen Benutzer haben als eine IP-Adresse offenlegt, bieten Proxies keinen nennenswerten Privatsphäre-Schutz gegen Megafirmen.

- -

Der einzige und beste Schutz der Privatsphäre gegen Megafirmen ist es, mit deaktivieren JavaScript durchs Web zu surfen, gefolgt von geblockten Werbenetzwerken, - deaktivierten Cookies und DOM-Speicher und das Benutzen eines Browsers, der schwierig zu "fingerprinten" ist.

- - -

Nutzung von Proxies

- -

Trotz ihrer Einschränkungen können Proxies unter bestimmen Umständen durchaus nützlich sein. - Tor und I2P - existieren Android-Apps, die die einfache Nutzung dieser Proxy-Netzwerke ermöglichen. - Wird die Nutzung dieser Proxy-Netzwerke in Privacy Browser aktiviert, wird die App-Leiste mit einem hellblauen statt hellgrauen Hintergrund versehen. - Da der Datenverkehr in solchen Fällen jedoch über mehrere Proxy-Knoten geleitet wird, - ist die Übertragungsgeschwindigkeit bei der Nutzung von Proxies meist deutlich langsamer als bei direkten Internet-Verbindungen.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_requests.html b/app/src/main/assets/de/guide_requests.html new file mode 100644 index 00000000..c19bb39b --- /dev/null +++ b/app/src/main/assets/de/guide_requests.html @@ -0,0 +1,87 @@ + + + + + + + + + + + + + +

Resourcen-Zugriffe

+ +

Wenn eine URL geladen wird, wird üblicherweise eine Menge Anfragen für mit der Seite verbundene Ressourcen wie Bilder, CSS-, JavaScript- und andere Dateien an den betreffenden Webserver gestellt. + Details dazu können in der Ansicht "Zugriffe" betrachtet werden, welche über das Navigations-Menü links erreicht werden kann. + In dieser Ansicht wird auch dargestellt, wie viele (und welche) Anfragen geblockt wurden. + Durch Antippen der betreffenden Anfragen können weitere Details dazu angezeigt werden, die zeigen, warum die Anfrage erlaubt oder blockiert wurde.

+ + + +

Privacy Browser enthält vier gebräuchliche Filterlisten, die auf der Adblock-Syntax basieren: + EasyList, EasyPrivacy, Fanboy’s Annoyance Filterliste und Fanboy’s Social Blocking Filterliste. + Diese werden in 22 Unter-Listen aufgeteilt, welche die Ressourcen-Zugriffe in der folgenden Reihenfolge überprüfen:

+ +
    +
  1. Haupt-Positivliste
  2. +
  3. Positivliste (URL-Ende)
  4. +
  5. Domänen-Positivliste
  6. +
  7. Domänen-Positivliste (URL-Anfang)
  8. +
  9. Domänen-Positivliste (URL-Ende)
  10. +
  11. Drittanbieter-Positivliste
  12. +
  13. Drittanbieter-Domänen-Positivliste
  14. +
  15. Drittanbieter-Domänen-Positivliste (URL-Anfang)
  16. +
  17. Haupt-Negativliste
  18. +
  19. Negativliste (URL-Anfang)
  20. +
  21. Negativliste (URL-Ende)
  22. +
  23. Domänen-Negativliste
  24. +
  25. Domänen-Negativliste (URL-Anfang)
  26. +
  27. Domänen-Negativliste (URL-Ende)
  28. +
  29. Domänen-Negativliste mit regulären Ausdrücken
  30. +
  31. Drittanbieter-Negativliste
  32. +
  33. Drittanbieter-Negativliste (URL-Anfang)
  34. +
  35. Drittanbieter-Domänen-Negativliste
  36. +
  37. Drittanbieter-Domänen-Negativliste (URL-Anfang)
  38. +
  39. Drittanbieter-Negativliste mit regulären Ausdrücken
  40. +
  41. Drittanbieter-Domänen-Negativliste mit regulären Ausdrücken
  42. +
  43. Negativliste mit regulären Ausdrücken
  44. +
+ +

Listen mit "(URL-Anfang)" prüfen gegen den Anfang einer URL, solche mit "(URL-Ende)" gegen das Ende der URL. Domänen-Listen prüfen gegen bestimmte Domains. + Drittanbieter-Listen greifen nur, wenn die Domain der Anfrage eine andere ist als die Domain der aufgerufenen URL. + Listen mit regulären Ausdrücken folgen der Syntax für reguläre Ausdrücke. Jede Unter-Liste hat dabei einen oder mehrere Einträge. + Bei Domänen-Unterlisten werden die Ressourcen-Zugriffe nur dann überprüft, wenn der erste Eintrag der Domain der aufgerufenen URL entspricht.

+ +

Aufgrund von Einschränkungen in Android’s WebView und um die Geschwindigkeit von Anfragen zu steigern, verwendet Privacy Browser eine vereinfachte Auswertung der Adblock-Syntax. + Dies kann manchmal zu "false positives" führen, bei denen Ressourcen erlaubt oder blockiert werden, die in den originalen Einträgen anders intendiert wären. + Eine detailiertere Beschreibung, wie die Listen-Einträge abgearbeitet werden, ist unter stoutner.com verfügbar.

+ +

Privacy Browser verfügt über drei zusätzliche Filterlisten: + UltraList und UltraPrivacy + blockieren Werbung und Tracker, die EasyList und EasyPrivacy durchlassen. Die dritte Filterliste blockiert alle Drittanbieter-Anfragen. + Eine Anfrage wird dabei nur als Drittanbieter-Anfrage gewertet, wenn die Basis-Domain der Anfrage eine andere ist als die Basis-Domain der angefragten URL. + Lädt zum Beispiel die Seite www.website.com ein Bild von images.website.com, wird diese Anfrage nicht als Drittanbieter-Anfrage gewertet, + da die beiden Anfragen dieselbe Basis-Domain website.com haben. + Alle Drittanbieter-Anfragen zu blockieren verbessert zwar die Privatsphäre, diese Einstellung ist jedoch standardmäßig deaktiviert, da dadurch viele Webseiten verunstaltet werden können.

+ + \ No newline at end of file diff --git a/app/src/main/assets/de/guide_requests_dark.html b/app/src/main/assets/de/guide_requests_dark.html deleted file mode 100644 index 072b885f..00000000 --- a/app/src/main/assets/de/guide_requests_dark.html +++ /dev/null @@ -1,84 +0,0 @@ - - - - - - - - - - -

Resourcen-Zugriffe

- -

Wenn eine URL geladen wird, wird üblicherweise eine Menge Anfragen für mit der Seite verbundene Ressourcen wie Bilder, CSS-, JavaScript- und andere Dateien an den betreffenden Webserver gestellt. - Details dazu können in der Ansicht "Zugriffe" betrachtet werden, welche über das Navigations-Menü links erreicht werden kann. - In dieser Ansicht wird auch dargestellt, wie viele (und welche) Anfragen geblockt wurden. - Durch Antippen der betreffenden Anfragen können weitere Details dazu angezeigt werden, die zeigen, warum die Anfrage erlaubt oder blockiert wurde.

- -

- -

Privacy Browser enthält vier gebräuchliche Filterlisten, die auf der Adblock-Syntax basieren: - EasyList, EasyPrivacy, Fanboy’s Annoyance Filterliste und Fanboy’s Social Blocking Filterliste. - Diese werden in 22 Unter-Listen aufgeteilt, welche die Ressourcen-Zugriffe in der folgenden Reihenfolge überprüfen:

- -
    -
  1. Haupt-Positivliste
  2. -
  3. Positivliste (URL-Ende)
  4. -
  5. Domänen-Positivliste
  6. -
  7. Domänen-Positivliste (URL-Anfang)
  8. -
  9. Domänen-Positivliste (URL-Ende)
  10. -
  11. Drittanbieter-Positivliste
  12. -
  13. Drittanbieter-Domänen-Positivliste
  14. -
  15. Drittanbieter-Domänen-Positivliste (URL-Anfang)
  16. -
  17. Haupt-Negativliste
  18. -
  19. Negativliste (URL-Anfang)
  20. -
  21. Negativliste (URL-Ende)
  22. -
  23. Domänen-Negativliste
  24. -
  25. Domänen-Negativliste (URL-Anfang)
  26. -
  27. Domänen-Negativliste (URL-Ende)
  28. -
  29. Domänen-Negativliste mit regulären Ausdrücken
  30. -
  31. Drittanbieter-Negativliste
  32. -
  33. Drittanbieter-Negativliste (URL-Anfang)
  34. -
  35. Drittanbieter-Domänen-Negativliste
  36. -
  37. Drittanbieter-Domänen-Negativliste (URL-Anfang)
  38. -
  39. Drittanbieter-Negativliste mit regulären Ausdrücken
  40. -
  41. Drittanbieter-Domänen-Negativliste mit regulären Ausdrücken
  42. -
  43. Negativliste mit regulären Ausdrücken
  44. -
- -

Listen mit "(URL-Anfang)" prüfen gegen den Anfang einer URL, solche mit "(URL-Ende)" gegen das Ende der URL. Domänen-Listen prüfen gegen bestimmte Domains. - Drittanbieter-Listen greifen nur, wenn die Domain der Anfrage eine andere ist als die Domain der aufgerufenen URL. - Listen mit regulären Ausdrücken folgen der Syntax für reguläre Ausdrücke. Jede Unter-Liste hat dabei einen oder mehrere Einträge. - Bei Domänen-Unterlisten werden die Ressourcen-Zugriffe nur dann überprüft, wenn der erste Eintrag der Domain der aufgerufenen URL entspricht.

- -

Aufgrund von Einschränkungen in Android’s WebView und um die Geschwindigkeit von Anfragen zu steigern, verwendet Privacy Browser eine vereinfachte Auswertung der Adblock-Syntax. - Dies kann manchmal zu "false positives" führen, bei denen Ressourcen erlaubt oder blockiert werden, die in den originalen Einträgen anders intendiert wären. - Eine detailiertere Beschreibung, wie die Listen-Einträge abgearbeitet werden, ist unter stoutner.com verfügbar.

- -

Privacy Browser verfügt über drei zusätzliche Filterlisten: - UltraList und UltraPrivacy - blockieren Werbung und Tracker, die EasyList und EasyPrivacy durchlassen. Die dritte Filterliste blockiert alle Drittanbieter-Anfragen. - Eine Anfrage wird dabei nur als Drittanbieter-Anfrage gewertet, wenn die Basis-Domain der Anfrage eine andere ist als die Basis-Domain der angefragten URL. - Lädt zum Beispiel die Seite www.website.com ein Bild von images.website.com, wird diese Anfrage nicht als Drittanbieter-Anfrage gewertet, - da die beiden Anfragen dieselbe Basis-Domain website.com haben. - Alle Drittanbieter-Anfragen zu blockieren verbessert zwar die Privatsphäre, diese Einstellung ist jedoch standardmäßig deaktiviert, da dadurch viele Webseiten verunstaltet werden können.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_requests_light.html b/app/src/main/assets/de/guide_requests_light.html deleted file mode 100644 index 531d87f3..00000000 --- a/app/src/main/assets/de/guide_requests_light.html +++ /dev/null @@ -1,84 +0,0 @@ - - - - - - - - - - -

Resourcen-Zugriffe

- -

Wenn eine URL geladen wird, wird üblicherweise eine Menge Anfragen für mit der Seite verbundene Ressourcen wie Bilder, CSS-, JavaScript- und andere Dateien an den betreffenden Webserver gestellt. - Details dazu können in der Ansicht "Zugriffe" betrachtet werden, welche über das Navigations-Menü links erreicht werden kann. - In dieser Ansicht wird auch dargestellt, wie viele (und welche) Anfragen geblockt wurden. - Durch Antippen der betreffenden Anfragen können weitere Details dazu angezeigt werden, die zeigen, warum die Anfrage erlaubt oder blockiert wurde.

- -

- -

Privacy Browser enthält vier gebräuchliche Filterlisten, die auf der Adblock-Syntax basieren: - EasyList, EasyPrivacy, Fanboy’s Annoyance Filterliste und Fanboy’s Social Blocking Filterliste. - Diese werden in 22 Unter-Listen aufgeteilt, welche die Ressourcen-Zugriffe in der folgenden Reihenfolge überprüfen:

- -
    -
  1. Haupt-Positivliste
  2. -
  3. Positivliste (URL-Ende)
  4. -
  5. Domänen-Positivliste
  6. -
  7. Domänen-Positivliste (URL-Anfang)
  8. -
  9. Domänen-Positivliste (URL-Ende)
  10. -
  11. Drittanbieter-Positivliste
  12. -
  13. Drittanbieter-Domänen-Positivliste
  14. -
  15. Drittanbieter-Domänen-Positivliste (URL-Anfang)
  16. -
  17. Haupt-Negativliste
  18. -
  19. Negativliste (URL-Anfang)
  20. -
  21. Negativliste (URL-Ende)
  22. -
  23. Domänen-Negativliste
  24. -
  25. Domänen-Negativliste (URL-Anfang)
  26. -
  27. Domänen-Negativliste (URL-Ende)
  28. -
  29. Domänen-Negativliste mit regulären Ausdrücken
  30. -
  31. Drittanbieter-Negativliste
  32. -
  33. Drittanbieter-Negativliste (URL-Anfang)
  34. -
  35. Drittanbieter-Domänen-Negativliste
  36. -
  37. Drittanbieter-Domänen-Negativliste (URL-Anfang)
  38. -
  39. Drittanbieter-Negativliste mit regulären Ausdrücken
  40. -
  41. Drittanbieter-Domänen-Negativliste mit regulären Ausdrücken
  42. -
  43. Negativliste mit regulären Ausdrücken
  44. -
- -

Listen mit "(URL-Anfang)" prüfen gegen den Anfang einer URL, solche mit "(URL-Ende)" gegen das Ende der URL. Domänen-Listen prüfen gegen bestimmte Domains. - Drittanbieter-Listen greifen nur, wenn die Domain der Anfrage eine andere ist als die Domain der aufgerufenen URL. - Listen mit regulären Ausdrücken folgen der Syntax für reguläre Ausdrücke. Jede Unter-Liste hat dabei einen oder mehrere Einträge. - Bei Domänen-Unterlisten werden die Ressourcen-Zugriffe nur dann überprüft, wenn der erste Eintrag der Domain der aufgerufenen URL entspricht.

- -

Aufgrund von Einschränkungen in Android’s WebView und um die Geschwindigkeit von Anfragen zu steigern, verwendet Privacy Browser eine vereinfachte Auswertung der Adblock-Syntax. - Dies kann manchmal zu "false positives" führen, bei denen Ressourcen erlaubt oder blockiert werden, die in den originalen Einträgen anders intendiert wären. - Eine detailiertere Beschreibung, wie die Listen-Einträge abgearbeitet werden, ist unter stoutner.com verfügbar.

- -

Privacy Browser verfügt über drei zusätzliche Filterlisten: - UltraList und UltraPrivacy - blockieren Werbung und Tracker, die EasyList und EasyPrivacy durchlassen. Die dritte Filterliste blockiert alle Drittanbieter-Anfragen. - Eine Anfrage wird dabei nur als Drittanbieter-Anfrage gewertet, wenn die Basis-Domain der Anfrage eine andere ist als die Basis-Domain der angefragten URL. - Lädt zum Beispiel die Seite www.website.com ein Bild von images.website.com, wird diese Anfrage nicht als Drittanbieter-Anfrage gewertet, - da die beiden Anfragen dieselbe Basis-Domain website.com haben. - Alle Drittanbieter-Anfragen zu blockieren verbessert zwar die Privatsphäre, diese Einstellung ist jedoch standardmäßig deaktiviert, da dadurch viele Webseiten verunstaltet werden können.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_ssl_certificates.html b/app/src/main/assets/de/guide_ssl_certificates.html new file mode 100644 index 00000000..9541a77e --- /dev/null +++ b/app/src/main/assets/de/guide_ssl_certificates.html @@ -0,0 +1,59 @@ + + + + + + + + + + + + + +

Verbindungen mit Vertrauen

+ +

Wenn Sie verschlüsselte URLs (also solche, die mit HTTPS beginnen) besuchen, verwendet der Webserver ein SSL-Zertifikat, + um einerseits die zum Browser gesendeten Informationen zu verschlüsseln und andererseits um sich selbst zu identifizieren. + Der Zweck der Server-Identifikation ist dabei, zu verhindern, dass ein Rechner zwischen Server und Ihrem Browser geschaltet werden kann, + der vorgibt der Server zu sein und die übertragenen Informationen auf dem Transportweg entschlüsseln oder verändern kann. Solche Angriffe werden als "Man-in-the-Middle-Atacken" (MITM) bezeichnet. + SSL-Zertifikate werden von Zertifikats-Stellen generiert, d.h. Unternehmen, die die Identität eines Servers überprüfen und dafür (meist gegen Entgelt) ein Zertifikat ausstellen. + Android beinhaltet eine Liste zuverlässiger Zertifikats-Stellen und akzeptiert jedes von einer solchen ausgestellte Zertifikat einer Webseite. + Es wird dabei davon ausgegangen, dass eine Organisation kein SSL-Zertifikat für eine Domain beantragen kann, die nicht ihr gehört. + In der Praxis konnten dies jedoch bereits viele Regierungen und große Unternehmen tun.

+ +

Mittels Zertifikats-Verankerung ("Pinning") kann Privacy Browser angewiesen werden, nur ein spezielles SSL-Zertifikat für eine Domäne zuzulassen. + Jedes andere Zertifikat - auch wenn dies gültig ist - wird in diesem Fall abgelehnt.

+ + + +

SSL-Zertifikate laufen zu einem festgelegten Datum ab, sodass auch verankerte Zertifikate legitimerweise von Zeit zu Zeit aktualisiert werden müssen. + In der Regel müssen SSL-Zertifikate in der Mehrzahl der Fälle nicht verankert werden. Für jene, die jedoch damit rechnen müssen, dass mächtige Organisationen auf sie abzielen, + kann das verankern von SSL-Zertifikaten Man-in-the-middle-Attacken aufdecken und ggf. vereiteln. Privacy Browser bietet auch die Möglichkeit, IP-Adressen zu verankern.

+ + + +

SSL-Zertifikate können in den Domänen-Einstellungen verankert werden. + Neben dem Schutz gegen MITM-Attacken kann das Verankern von Zertifikaten auch für selbst-erzeugte Zertifikate genutzt werden (z.B. bei WLAN-Routern oder Access-Points). + In diesen Fällen werden die sonst üblichen Fehlermeldungen unterdrückt, wenn die Website des Geräts geladen wird. + Durch Antippen des aktiven Tabs wird das SSL-Zertifikat der aktuell darin angezeigten Webseite angezeigt.

+ + \ No newline at end of file diff --git a/app/src/main/assets/de/guide_ssl_certificates_dark.html b/app/src/main/assets/de/guide_ssl_certificates_dark.html deleted file mode 100644 index 7f1c0761..00000000 --- a/app/src/main/assets/de/guide_ssl_certificates_dark.html +++ /dev/null @@ -1,56 +0,0 @@ - - - - - - - - - - -

Verbindungen mit Vertrauen

- -

Wenn Sie verschlüsselte URLs (also solche, die mit HTTPS beginnen) besuchen, verwendet der Webserver ein SSL-Zertifikat, - um einerseits die zum Browser gesendeten Informationen zu verschlüsseln und andererseits um sich selbst zu identifizieren. - Der Zweck der Server-Identifikation ist dabei, zu verhindern, dass ein Rechner zwischen Server und Ihrem Browser geschaltet werden kann, - der vorgibt der Server zu sein und die übertragenen Informationen auf dem Transportweg entschlüsseln oder verändern kann. Solche Angriffe werden als "Man-in-the-Middle-Atacken" (MITM) bezeichnet. - SSL-Zertifikate werden von Zertifikats-Stellen generiert, d.h. Unternehmen, die die Identität eines Servers überprüfen und dafür (meist gegen Entgelt) ein Zertifikat ausstellen. - Android beinhaltet eine Liste zuverlässiger Zertifikats-Stellen und akzeptiert jedes von einer solchen ausgestellte Zertifikat einer Webseite. - Es wird dabei davon ausgegangen, dass eine Organisation kein SSL-Zertifikat für eine Domain beantragen kann, die nicht ihr gehört. - In der Praxis konnten dies jedoch bereits viele Regierungen und große Unternehmen tun.

- -

Mittels Zertifikats-Verankerung ("Pinning") kann Privacy Browser angewiesen werden, nur ein spezielles SSL-Zertifikat für eine Domäne zuzulassen. - Jedes andere Zertifikat - auch wenn dies gültig ist - wird in diesem Fall abgelehnt.

- -

- -

SSL-Zertifikate laufen zu einem festgelegten Datum ab, sodass auch verankerte Zertifikate legitimerweise von Zeit zu Zeit aktualisiert werden müssen. - In der Regel müssen SSL-Zertifikate in der Mehrzahl der Fälle nicht verankert werden. Für jene, die jedoch damit rechnen müssen, dass mächtige Organisationen auf sie abzielen, - kann das verankern von SSL-Zertifikaten Man-in-the-middle-Attacken aufdecken und ggf. vereiteln. Privacy Browser bietet auch die Möglichkeit, IP-Adressen zu verankern.

- -

- -

SSL-Zertifikate können in den Domänen-Einstellungen verankert werden. - Neben dem Schutz gegen MITM-Attacken kann das Verankern von Zertifikaten auch für selbst-erzeugte Zertifikate genutzt werden (z.B. bei WLAN-Routern oder Access-Points). - In diesen Fällen werden die sonst üblichen Fehlermeldungen unterdrückt, wenn die Website des Geräts geladen wird. - Durch Antippen des aktiven Tabs wird das SSL-Zertifikat der aktuell darin angezeigten Webseite angezeigt.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_ssl_certificates_light.html b/app/src/main/assets/de/guide_ssl_certificates_light.html deleted file mode 100644 index 620cb164..00000000 --- a/app/src/main/assets/de/guide_ssl_certificates_light.html +++ /dev/null @@ -1,56 +0,0 @@ - - - - - - - - - - -

Verbindungen mit Vertrauen

- -

Wenn Sie verschlüsselte URLs (also solche, die mit HTTPS beginnen) besuchen, verwendet der Webserver ein SSL-Zertifikat, - um einerseits die zum Browser gesendeten Informationen zu verschlüsseln und andererseits um sich selbst zu identifizieren. - Der Zweck der Server-Identifikation ist dabei, zu verhindern, dass ein Rechner zwischen Server und Ihrem Browser geschaltet werden kann, - der vorgibt der Server zu sein und die übertragenen Informationen auf dem Transportweg entschlüsseln oder verändern kann. Solche Angriffe werden als "Man-in-the-Middle-Atacken" (MITM) bezeichnet. - SSL-Zertifikate werden von Zertifikats-Stellen generiert, d.h. Unternehmen, die die Identität eines Servers überprüfen und dafür (meist gegen Entgelt) ein Zertifikat ausstellen. - Android beinhaltet eine Liste zuverlässiger Zertifikats-Stellen und akzeptiert jedes von einer solchen ausgestellte Zertifikat einer Webseite. - Es wird dabei davon ausgegangen, dass eine Organisation kein SSL-Zertifikat für eine Domain beantragen kann, die nicht ihr gehört. - In der Praxis konnten dies jedoch bereits viele Regierungen und große Unternehmen tun.

- -

Mittels Zertifikats-Verankerung ("Pinning") kann Privacy Browser angewiesen werden, nur ein spezielles SSL-Zertifikat für eine Domäne zuzulassen. - Jedes andere Zertifikat - auch wenn dies gültig ist - wird in diesem Fall abgelehnt.

- -

- -

SSL-Zertifikate laufen zu einem festgelegten Datum ab, sodass auch verankerte Zertifikate legitimerweise von Zeit zu Zeit aktualisiert werden müssen. - In der Regel müssen SSL-Zertifikate in der Mehrzahl der Fälle nicht verankert werden. Für jene, die jedoch damit rechnen müssen, dass mächtige Organisationen auf sie abzielen, - kann das verankern von SSL-Zertifikaten Man-in-the-middle-Attacken aufdecken und ggf. vereiteln. Privacy Browser bietet auch die Möglichkeit, IP-Adressen zu verankern.

- -

- -

SSL-Zertifikate können in den Domänen-Einstellungen verankert werden. - Neben dem Schutz gegen MITM-Attacken kann das Verankern von Zertifikaten auch für selbst-erzeugte Zertifikate genutzt werden (z.B. bei WLAN-Routern oder Access-Points). - In diesen Fällen werden die sonst üblichen Fehlermeldungen unterdrückt, wenn die Website des Geräts geladen wird. - Durch Antippen des aktiven Tabs wird das SSL-Zertifikat der aktuell darin angezeigten Webseite angezeigt.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_tracking_ids.html b/app/src/main/assets/de/guide_tracking_ids.html new file mode 100644 index 00000000..8c0379d6 --- /dev/null +++ b/app/src/main/assets/de/guide_tracking_ids.html @@ -0,0 +1,49 @@ + + + + + + + + + + + + + +

Do-Not-Track

+ +

Vor einigen Jahren wurde vom W3C (World Wide Web Consortium) ein Mechanismus für Internet-Browser entwickelt, der Webserver davon in Kenntnis setzen sollte, + dass deren Benutzer nicht getrackt werden wollen. + Dies wird über den DNT-Header (Do-Not-Track-Header) innerhalb von Ressourcen-Anfragen bewerkstelligt.

+ +

Der DNT-Header bewirkt jedoch de facto so gut wie keine Privatsphäre, da er von den meisten Webservern schlicht ignoriert wird. + So ignorieren zum Beispiel mit Yahoo, Google, Microsoft und Facebook so gut wie alle grossen Internet-Anbieter zumindest einige DNT-Header.

+ + +

URL-Bereinigung

+ +

Privacy Browser entfernt Tracking-relevante Teile aus URLs, wie z.B. ?utm_ von Google Analytics und + ?fbclick= von Facebook. Die URL-Bereinigung kann in den Einstellungen deaktiviert werden, sollte sie Probleme verursachen.

+ + \ No newline at end of file diff --git a/app/src/main/assets/de/guide_tracking_ids_dark.html b/app/src/main/assets/de/guide_tracking_ids_dark.html deleted file mode 100644 index 8f2e6c09..00000000 --- a/app/src/main/assets/de/guide_tracking_ids_dark.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -

Do-Not-Track

- -

Vor einigen Jahren wurde vom W3C (World Wide Web Consortium) ein Mechanismus für Internet-Browser entwickelt, der Webserver davon in Kenntnis setzen sollte, - dass deren Benutzer nicht getrackt werden wollen. - Dies wird über den DNT-Header (Do-Not-Track-Header) innerhalb von Ressourcen-Anfragen bewerkstelligt.

- -

Der DNT-Header bewirkt jedoch de facto so gut wie keine Privatsphäre, da er von den meisten Webservern schlicht ignoriert wird. - So ignorieren zum Beispiel mit Yahoo, Google, Microsoft und Facebook so gut wie alle grossen Internet-Anbieter zumindest einige DNT-Header.

- - -

URL-Bereinigung

- -

Privacy Browser entfernt Tracking-relevante Teile aus URLs, wie z.B. ?utm_ von Google Analytics und - ?fbclick= von Facebook. Die URL-Bereinigung kann in den Einstellungen deaktiviert werden, sollte sie Probleme verursachen.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_tracking_ids_light.html b/app/src/main/assets/de/guide_tracking_ids_light.html deleted file mode 100644 index 1cf57698..00000000 --- a/app/src/main/assets/de/guide_tracking_ids_light.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -

Do-Not-Track

- -

Vor einigen Jahren wurde vom W3C (World Wide Web Consortium) ein Mechanismus für Internet-Browser entwickelt, der Webserver davon in Kenntnis setzen sollte, - dass deren Benutzer nicht getrackt werden wollen. - Dies wird über den DNT-Header (Do-Not-Track-Header) innerhalb von Ressourcen-Anfragen bewerkstelligt.

- -

Der DNT-Header bewirkt jedoch de facto so gut wie keine Privatsphäre, da er von den meisten Webservern schlicht ignoriert wird. - So ignorieren zum Beispiel mit Yahoo, Google, Microsoft und Facebook so gut wie alle grossen Internet-Anbieter zumindest einige DNT-Header.

- - -

URL-Bereinigung

- -

Privacy Browser entfernt Tracking-relevante Teile aus URLs, wie z.B. ?utm_ von Google Analytics und - ?fbclick= von Facebook. Die URL-Bereinigung kann in den Einstellungen deaktiviert werden, sollte sie Probleme verursachen.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_user_agent.html b/app/src/main/assets/de/guide_user_agent.html new file mode 100644 index 00000000..77e6e2cf --- /dev/null +++ b/app/src/main/assets/de/guide_user_agent.html @@ -0,0 +1,74 @@ + + + + + + + + + + + + + +

Browser-Identifikation

+ +

Wenn sich Internet-Browser mit Webseiten verbinden, senden Sie automatisch den sog. "User-Agent", welcher den Browser und dessen Anzeige-Fähigkeiten ausweist. + Der Webserver kann diese Informationen dann nutzen, um verschiedene Versionen der Webseite an unterschiedliche Browser auszuliefern. + Zum Beispiel haben viele Internet-Seiten unterschiedliche Versionen für Desktop- und Mobil-Browser, + damit die Seiten in Anhängigkeit von der Displaygrösse möglichst optimal genutzt werden können.

+ +

In der Voreinstellung nutzt Privacy Browser seinen eigenen User-Agent, welcher PrivacyBrowser/1.0 lautet. + Damit wird lediglich ein Minimum an Informationen an den jeweiligen Webserver gesendet. + Da jedoch manche Webserver diesen User-Agent nicht als mobilen Browser erkennen, liefern sie ggf. die Desktop-Version der betreffenden Webseite aus.

+ +

Im Vergleich dazu plaudert der Standard-User-Agent von WebView eine grosse Menge an Informationen über die Hard- und Software des genutzten Geräts aus. + Wird auf der Einstellungen-Seite von Privacy Browser WebView-Standard als User-Agent ausgewählt, + wird der dadurch übermittelte User-Agent angezeigt. + Der Screenshot unterhalb zeigt ein Pixel 2 XL mit Android 10 und Android WebView 84.0.4147.125. + Die meisten Webserver erkennen diesen User-Agent als Mobil-Browser und liefern eine Mobil-Version der Seite aus, so eine solche existiert.

+ + + +

Der User-Agent beinhaltet normalerweise genügend Informationen, dass nur wenige Besucher einer Webseite denselben haben. + Wenn der User-Agent daher mit anderen nicht-eindeutigen Identifizierungs-Informationen kombiniert wird, kann dies ausreichen, um einen eindeutigen Fingerabdruck zu ergeben. + Die Electronic Frontier Foundation hat das Werkzeug Panopticlick geschaffen, + um zu zeigen, wie viele Informationen aus diesen Quellen gesammelt werden kann. + Wenn dieser Test mit aktiviertem JavaScript absolviert wird, steigt die Menge der offengelegten Informationen drastisch an. + Browser Leaks und Am I Unique sind ebenfalls gute Quellen für Informationen zu diesem Thema.

+ + + +

Privacy Browser bietet verschiedene Voreinstellungen für den User-Agent an, um sich als gebräuchliche Browser und Betriebssysteme auszugeben. + Dabei gilt grundsätzlich: Je unüblicher der User-Agent ist, des einfacher ist das Tracking. + Wenn Privacy Browser gebräuchlicher wird und viele Personen den User-Agent PrivacyBrowser/1.0 nutzen, wird dies eine gute Wahl für die Privatsphäre sein. + Firefox und Chrome sind aktuell die gebräuchlichsten Browser. + Da sie jedoch häufig aktualisiert werden und in deren User-Agent auch die jeweilige Browser-Version mitsenden, kann es sein, + dass die in Privacy Browser mitgelieferten User-Agents für Firefox und Chrome wiederum in den Server-Logs auffallen.

+ +

Manche Websites funktionieren nicht korrekt, wenn sie einen User-Agent nicht erkennen. + Wird für derartige Webseiten in den Domänen-Einstellungen von Privacy Browser der User-Agent WebView Standard oder ein anderer gebräuchlicher User-Agent ausgewählt, + verschwinden diese Probleme meist. + Androids WebView erlaubt keinen leeren User Agent. Wenn das der Fall ist, wird der Standard-User Agent an den Server gesandt.

+ + \ No newline at end of file diff --git a/app/src/main/assets/de/guide_user_agent_dark.html b/app/src/main/assets/de/guide_user_agent_dark.html deleted file mode 100644 index 7b7e20ff..00000000 --- a/app/src/main/assets/de/guide_user_agent_dark.html +++ /dev/null @@ -1,71 +0,0 @@ - - - - - - - - - - -

Browser-Identifikation

- -

Wenn sich Internet-Browser mit Webseiten verbinden, senden Sie automatisch den sog. "User-Agent", welcher den Browser und dessen Anzeige-Fähigkeiten ausweist. - Der Webserver kann diese Informationen dann nutzen, um verschiedene Versionen der Webseite an unterschiedliche Browser auszuliefern. - Zum Beispiel haben viele Internet-Seiten unterschiedliche Versionen für Desktop- und Mobil-Browser, - damit die Seiten in Anhängigkeit von der Displaygrösse möglichst optimal genutzt werden können.

- -

In der Voreinstellung nutzt Privacy Browser seinen eigenen User-Agent, welcher PrivacyBrowser/1.0 lautet. - Damit wird lediglich ein Minimum an Informationen an den jeweiligen Webserver gesendet. - Da jedoch manche Webserver diesen User-Agent nicht als mobilen Browser erkennen, liefern sie ggf. die Desktop-Version der betreffenden Webseite aus.

- -

Im Vergleich dazu plaudert der Standard-User-Agent von WebView eine grosse Menge an Informationen über die Hard- und Software des genutzten Geräts aus. - Wird auf der Einstellungen-Seite von Privacy Browser WebView-Standard als User-Agent ausgewählt, - wird der dadurch übermittelte User-Agent angezeigt. - Der Screenshot unterhalb zeigt ein Pixel 2 XL mit Android 10 und Android WebView 84.0.4147.125. - Die meisten Webserver erkennen diesen User-Agent als Mobil-Browser und liefern eine Mobil-Version der Seite aus, so eine solche existiert.

- - - -

Der User-Agent beinhaltet normalerweise genügend Informationen, dass nur wenige Besucher einer Webseite denselben haben. - Wenn der User-Agent daher mit anderen nicht-eindeutigen Identifizierungs-Informationen kombiniert wird, kann dies ausreichen, um einen eindeutigen Fingerabdruck zu ergeben. - Die Electronic Frontier Foundation hat das Werkzeug Panopticlick geschaffen, - um zu zeigen, wie viele Informationen aus diesen Quellen gesammelt werden kann. - Wenn dieser Test mit aktiviertem JavaScript absolviert wird, steigt die Menge der offengelegten Informationen drastisch an. - Browser Leaks und Am I Unique sind ebenfalls gute Quellen für Informationen zu diesem Thema.

- - - -

Privacy Browser bietet verschiedene Voreinstellungen für den User-Agent an, um sich als gebräuchliche Browser und Betriebssysteme auszugeben. - Dabei gilt grundsätzlich: Je unüblicher der User-Agent ist, des einfacher ist das Tracking. - Wenn Privacy Browser gebräuchlicher wird und viele Personen den User-Agent PrivacyBrowser/1.0 nutzen, wird dies eine gute Wahl für die Privatsphäre sein. - Firefox und Chrome sind aktuell die gebräuchlichsten Browser. - Da sie jedoch häufig aktualisiert werden und in deren User-Agent auch die jeweilige Browser-Version mitsenden, kann es sein, - dass die in Privacy Browser mitgelieferten User-Agents für Firefox und Chrome wiederum in den Server-Logs auffallen.

- -

Manche Websites funktionieren nicht korrekt, wenn sie einen User-Agent nicht erkennen. - Wird für derartige Webseiten in den Domänen-Einstellungen von Privacy Browser der User-Agent WebView Standard oder ein anderer gebräuchlicher User-Agent ausgewählt, - verschwinden diese Probleme meist. - Androids WebView erlaubt keinen leeren User Agent. Wenn das der Fall ist, wird der Standard-User Agent an den Server gesandt.

- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_user_agent_light.html b/app/src/main/assets/de/guide_user_agent_light.html deleted file mode 100644 index 76b940c2..00000000 --- a/app/src/main/assets/de/guide_user_agent_light.html +++ /dev/null @@ -1,71 +0,0 @@ - - - - - - - - - - -

Browser-Identifikation

- -

Wenn sich Internet-Browser mit Webseiten verbinden, senden Sie automatisch den sog. "User-Agent", welcher den Browser und dessen Anzeige-Fähigkeiten ausweist. - Der Webserver kann diese Informationen dann nutzen, um verschiedene Versionen der Webseite an unterschiedliche Browser auszuliefern. - Zum Beispiel haben viele Internet-Seiten unterschiedliche Versionen für Desktop- und Mobil-Browser, - damit die Seiten in Anhängigkeit von der Displaygrösse möglichst optimal genutzt werden können.

- -

In der Voreinstellung nutzt Privacy Browser seinen eigenen User-Agent, welcher PrivacyBrowser/1.0 lautet. - Damit wird lediglich ein Minimum an Informationen an den jeweiligen Webserver gesendet. - Da jedoch manche Webserver diesen User-Agent nicht als mobilen Browser erkennen, liefern sie ggf. die Desktop-Version der betreffenden Webseite aus.

- -

Im Vergleich dazu plaudert der Standard-User-Agent von WebView eine grosse Menge an Informationen über die Hard- und Software des genutzten Geräts aus. - Wird auf der Einstellungen-Seite von Privacy Browser WebView-Standard als User-Agent ausgewählt, - wird der dadurch übermittelte User-Agent angezeigt. - Der Screenshot unterhalb zeigt ein Pixel 2 XL mit Android 10 und Android WebView 84.0.4147.125. - Die meisten Webserver erkennen diesen User-Agent als Mobil-Browser und liefern eine Mobil-Version der Seite aus, so eine solche existiert.

- - - -

Der User-Agent beinhaltet normalerweise genügend Informationen, dass nur wenige Besucher einer Webseite denselben haben. - Wenn der User-Agent daher mit anderen nicht-eindeutigen Identifizierungs-Informationen kombiniert wird, kann dies ausreichen, um einen eindeutigen Fingerabdruck zu ergeben. - Die Electronic Frontier Foundation hat das Werkzeug Panopticlick geschaffen, - um zu zeigen, wie viele Informationen aus diesen Quellen gesammelt werden kann. - Wenn dieser Test mit aktiviertem JavaScript absolviert wird, steigt die Menge der offengelegten Informationen drastisch an. - Browser Leaks und Am I Unique sind ebenfalls gute Quellen für Informationen zu diesem Thema.

- - - -

Privacy Browser bietet verschiedene Voreinstellungen für den User-Agent an, um sich als gebräuchliche Browser und Betriebssysteme auszugeben. - Dabei gilt grundsätzlich: Je unüblicher der User-Agent ist, des einfacher ist das Tracking. - Wenn Privacy Browser gebräuchlicher wird und viele Personen den User-Agent PrivacyBrowser/1.0 nutzen, wird dies eine gute Wahl für die Privatsphäre sein. - Firefox und Chrome sind aktuell die gebräuchlichsten Browser. - Da sie jedoch häufig aktualisiert werden und in deren User-Agent auch die jeweilige Browser-Version mitsenden, kann es sein, - dass die in Privacy Browser mitgelieferten User-Agents für Firefox und Chrome wiederum in den Server-Logs auffallen.

- -

Manche Websites funktionieren nicht korrekt, wenn sie einen User-Agent nicht erkennen. - Wird für derartige Webseiten in den Domänen-Einstellungen von Privacy Browser der User-Agent WebView Standard oder ein anderer gebräuchlicher User-Agent ausgewählt, - verschwinden diese Probleme meist. - Androids WebView erlaubt keinen leeren User Agent. Wenn das der Fall ist, wird der Standard-User Agent an den Server gesandt.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_changelog.html b/app/src/main/assets/en/about_changelog.html new file mode 100644 index 00000000..0a64681b --- /dev/null +++ b/app/src/main/assets/en/about_changelog.html @@ -0,0 +1,684 @@ + + + + + + + + + + + + + +

3.5.1 (version code 51)

+

28 August 2020 - minimum API 19, target API 29

+
    +
  • Fix a bug that caused new intents (links from other apps) to not load if Privacy Browser had been killed by the OS in the background.
  • +
  • Fix a bug that caused the app to initialize incorrectly if the app theme was set to the opposite of the OS theme.
  • +
+ +

3.5 (version code 50)

+

18 August 2020 - minimum API 19, target API 29

+ + +

3.4.1 (version code 49)

+

1 April 2020 - minimum API 19, target API 29

+ + +

3.4 (version code 48)

+

28 March 2020 - minimum API 19, target API 29

+ + +

3.3 (version code 47)

+

3 January 2020 - minimum API 19, target API 29

+ + +

3.2 (version code 46)

+

20 July 2019 - minimum API 19, target API 28

+ + +

3.1 (version code 45)

+

27 May 2019 - minimum API 19, target API 28

+ + +

3.0.1 (version code 44)

+

2 May 2019 - minimum API 19, target API 28

+ + +

3.0 (version code 43)

+

26 April 2019 - minimum API 19, target API 28

+
    +
  • Add tabbed browsing.
  • +
  • Fix a bug that caused the bottom of the WebView to be cut off when scrolling the app bar was disabled.
  • +
  • Fix a bug that caused Privacy Browser to restart whenever a Bluetooth keyboard was connected/disconnected.
  • +
  • Updated German translation provided by Bernhard G. Keller.
  • +
  • Updated Italian translation provided by Francesco Buratti.
  • +
  • Updated Russian translation.
  • +
  • Updated Spanish translation provided by Jose A. León.
  • +
  • Partial Turkish translation.
  • +
+ +

2.17.1 (version code 42)

+

5 March 2019 - minimum API 19, target API 28

+ + +

2.17 (version code 41)

+

27 February 2019 - minimum API 19, target API 28

+ + +

2.16 (version code 40)

+

31 January 2019 - minimum API 19, target API 28

+ + +

2.15.1 (version code 39)

+

27 December 2018 - minimum API 19, target API 28

+ + +

2.15 (version code 38)

+

24 December 2018 - minimum API 19, target API 28

+ + +

2.14 (version code 37)

+

8 December 2018 - minimum API 19, target API 28

+ + +

2.13 (version code 36)

+

29 October 2018 - minimum API 19, target API 28

+ + +

2.12 (version code 35)

+

31 July 2018 - minimum API 19, target API 27

+ + +

2.11 (version code 34)

+

10 July 2018 - minimum API 19, target API 27

+ + +

2.10 (version code 33)

+

24 May 2018 - minimum API 19, target API 27

+ + +

2.9 (version code 32)

+

9 May 2018 - minimum API 19, target API 27

+ + +

2.8.1 (version code 31)

+

1 March 2018 - minimum API 19, target API 27

+ + +

2.8 (version code 30)

+

22 February 2018 - minimum API 19, target API 27

+ + +

2.7.2 (version code 29)

+

22 November 2017 - minimum API 19, target API 26

+ + +

2.7.1 (version code 28)

+

9 November 2017 - minimum API 19, target API 26

+ + +

2.7 (version code 27)

+

7 November 2017 - minimum API 19, target API 26

+
    +
  • Add a bookmarks drawer that is accessed by sliding from the right.
  • +
  • Prevent Night Mode from flashing a white background when loading new pages.
  • +
  • Update the user agents.
  • +
  • Bump target API to 26 (Android Oreo, 8.0.0).
  • +
  • Updated Italian translation provided by Francesco Buratti.
  • +
  • Updated Spanish translation provided by Jose A. León.
  • +
+ +

2.6 (version code 26)

+

18 September 2017 - minimum API 19, target API 25

+ + +

2.5 (version code 25)

+

26 August 2017 - minimum API 19, target API 25

+ + +

2.4 (version code 24)

+

23 June 2017 - minimum API 19, target API 25

+ + +

2.3 (version code 23)

+

26 May 2017 - minimum API 19, target API 25

+ + +

2.2 (version code 22)

+

27 April 2017 - minimum API 19, target API 25

+ + +

2.1 (version code 21)

+

25 March 2017 - minimum API 19, target API 25

+ + +

2.0.1 (version code 20)

+

21 March 2017 - minimum API 19, target API 25

+ + +

2.0 (version code 19)

+

16 March 2017 - minimum API 19, target API 25

+ + +

1.15 (version code 18)

+

11 February 2017 - minimum API 19, target API 25

+ + +

1.14.1 (version code 17)

+

4 January 2017 - minimum API 19, target API 25

+ + +

1.14 (version code 16)

+

26 December 2016 - minimum API 19, target API 25

+ + +

1.13 (version code 15)

+

28 November 2016 - minimum API 19, target API 24

+ + +

1.12 (version code 14)

+

9 November 2016 - minimum API 19, target API 24

+ + +

1.11 (version code 13)

+

22 October 2016 - minimum API 19, target API 24

+ + +

1.10 (version code 12)

+

15 September 2016 - minimum API 19, target API 23

+ + +

1.9.1 (version code 11)

+

27 August 2016 - minimum API 19, target API 23

+
    +
  • Changed asset image links to relative paths so Privacy Browser will build on F-Droid.
  • +
+ +

1.9 (version code 10)

+

26 August 2016 - minimum API 19, target API 23

+ + +

1.8 (version code 9)

+

16 July 2016 - minimum API 19, target API 23

+ + +

1.7 (version code 8)

+

16 June 2016 - minimum API 19, target API 23

+ + +

1.6 (version code 7)

+

11 May 2016 - minimum API 15, target API 23

+ + +

1.5 (version code 6)

+

5 May 2016 - minimum API 15, target API 23

+
    +
  • Add the option to disable swipe to refresh so that certain websites, like Google Maps, will function correctly.
  • +
+ +

1.4 (version code 5)

+

28 April 2016 - minimum API 15, target API 23

+ + +

1.3 (version code 4)

+

7 April 2016 - minimum API 15, target API 23

+ + +

1.2 (version code 3)

+

23 March 2016 - minimum API 15, target API 23

+ + +

1.1 (version code 2)

+

9 March 2016 - minimum API 10, target API 23

+
    +
  • Separate the standard and the free flavors so that Privacy Browser builds correctly on F-Droid.
  • +
+ +

1.0 (version code 1)

+

24 February 2016 - minimum API 10, target API 23

+
    +
  • Toggle JavaScript, DOM storage, and cookies.
  • +
  • Set default enabled status for JavaScript, DOM storage, and cookies.
  • +
  • Clear DOM storage and cookies.
  • +
  • Add shortcuts to the home screen.
  • +
  • Utilize download manager.
  • +
  • Navigate forward and back.
  • +
  • Cut, copy, paste URLs.
  • +
  • Share URLs.
  • +
  • Set homepage.
  • +
  • Scroll URL bar.
  • +
  • Maintain WebView scroll location when rotating screen.
  • +
  • Swipe to refresh WebView.
  • +
  • Play full screen videos (requires JavaScript to be enabled).
  • +
  • Clear and Exit menu item.
  • +
+ + \ No newline at end of file diff --git a/app/src/main/assets/en/about_changelog_dark.html b/app/src/main/assets/en/about_changelog_dark.html deleted file mode 100644 index 67526ba8..00000000 --- a/app/src/main/assets/en/about_changelog_dark.html +++ /dev/null @@ -1,681 +0,0 @@ - - - - - - - - - - -

3.5.1 (version code 51)

-

28 August 2020 - minimum API 19, target API 29

-
    -
  • Fix a bug that caused new intents (links from other apps) to not load if Privacy Browser had been killed by the OS in the background.
  • -
  • Fix a bug that caused the app to initialize incorrectly if the app theme was set to the opposite of the OS theme.
  • -
- -

3.5 (version code 50)

-

18 August 2020 - minimum API 19, target API 29

- - -

3.4.1 (version code 49)

-

1 April 2020 - minimum API 19, target API 29

- - -

3.4 (version code 48)

-

28 March 2020 - minimum API 19, target API 29

- - -

3.3 (version code 47)

-

3 January 2020 - minimum API 19, target API 29

- - -

3.2 (version code 46)

-

20 July 2019 - minimum API 19, target API 28

- - -

3.1 (version code 45)

-

27 May 2019 - minimum API 19, target API 28

- - -

3.0.1 (version code 44)

-

2 May 2019 - minimum API 19, target API 28

- - -

3.0 (version code 43)

-

26 April 2019 - minimum API 19, target API 28

-
    -
  • Add tabbed browsing.
  • -
  • Fix a bug that caused the bottom of the WebView to be cut off when scrolling the app bar was disabled.
  • -
  • Fix a bug that caused Privacy Browser to restart whenever a Bluetooth keyboard was connected/disconnected.
  • -
  • Updated German translation provided by Bernhard G. Keller.
  • -
  • Updated Italian translation provided by Francesco Buratti.
  • -
  • Updated Russian translation.
  • -
  • Updated Spanish translation provided by Jose A. León.
  • -
  • Partial Turkish translation.
  • -
- -

2.17.1 (version code 42)

-

5 March 2019 - minimum API 19, target API 28

- - -

2.17 (version code 41)

-

27 February 2019 - minimum API 19, target API 28

- - -

2.16 (version code 40)

-

31 January 2019 - minimum API 19, target API 28

- - -

2.15.1 (version code 39)

-

27 December 2018 - minimum API 19, target API 28

- - -

2.15 (version code 38)

-

24 December 2018 - minimum API 19, target API 28

- - -

2.14 (version code 37)

-

8 December 2018 - minimum API 19, target API 28

- - -

2.13 (version code 36)

-

29 October 2018 - minimum API 19, target API 28

- - -

2.12 (version code 35)

-

31 July 2018 - minimum API 19, target API 27

- - -

2.11 (version code 34)

-

10 July 2018 - minimum API 19, target API 27

- - -

2.10 (version code 33)

-

24 May 2018 - minimum API 19, target API 27

- - -

2.9 (version code 32)

-

9 May 2018 - minimum API 19, target API 27

- - -

2.8.1 (version code 31)

-

1 March 2018 - minimum API 19, target API 27

- - -

2.8 (version code 30)

-

22 February 2018 - minimum API 19, target API 27

- - -

2.7.2 (version code 29)

-

22 November 2017 - minimum API 19, target API 26

- - -

2.7.1 (version code 28)

-

9 November 2017 - minimum API 19, target API 26

- - -

2.7 (version code 27)

-

7 November 2017 - minimum API 19, target API 26

-
    -
  • Add a bookmarks drawer that is accessed by sliding from the right.
  • -
  • Prevent Night Mode from flashing a white background when loading new pages.
  • -
  • Update the user agents.
  • -
  • Bump target API to 26 (Android Oreo, 8.0.0).
  • -
  • Updated Italian translation provided by Francesco Buratti.
  • -
  • Updated Spanish translation provided by Jose A. León.
  • -
- -

2.6 (version code 26)

-

18 September 2017 - minimum API 19, target API 25

- - -

2.5 (version code 25)

-

26 August 2017 - minimum API 19, target API 25

- - -

2.4 (version code 24)

-

23 June 2017 - minimum API 19, target API 25

- - -

2.3 (version code 23)

-

26 May 2017 - minimum API 19, target API 25

- - -

2.2 (version code 22)

-

27 April 2017 - minimum API 19, target API 25

- - -

2.1 (version code 21)

-

25 March 2017 - minimum API 19, target API 25

- - -

2.0.1 (version code 20)

-

21 March 2017 - minimum API 19, target API 25

- - -

2.0 (version code 19)

-

16 March 2017 - minimum API 19, target API 25

- - -

1.15 (version code 18)

-

11 February 2017 - minimum API 19, target API 25

- - -

1.14.1 (version code 17)

-

4 January 2017 - minimum API 19, target API 25

- - -

1.14 (version code 16)

-

26 December 2016 - minimum API 19, target API 25

- - -

1.13 (version code 15)

-

28 November 2016 - minimum API 19, target API 24

- - -

1.12 (version code 14)

-

9 November 2016 - minimum API 19, target API 24

- - -

1.11 (version code 13)

-

22 October 2016 - minimum API 19, target API 24

- - -

1.10 (version code 12)

-

15 September 2016 - minimum API 19, target API 23

- - -

1.9.1 (version code 11)

-

27 August 2016 - minimum API 19, target API 23

-
    -
  • Changed asset image links to relative paths so Privacy Browser will build on F-Droid.
  • -
- -

1.9 (version code 10)

-

26 August 2016 - minimum API 19, target API 23

- - -

1.8 (version code 9)

-

16 July 2016 - minimum API 19, target API 23

- - -

1.7 (version code 8)

-

16 June 2016 - minimum API 19, target API 23

- - -

1.6 (version code 7)

-

11 May 2016 - minimum API 15, target API 23

- - -

1.5 (version code 6)

-

5 May 2016 - minimum API 15, target API 23

-
    -
  • Add the option to disable swipe to refresh so that certain websites, like Google Maps, will function correctly.
  • -
- -

1.4 (version code 5)

-

28 April 2016 - minimum API 15, target API 23

- - -

1.3 (version code 4)

-

7 April 2016 - minimum API 15, target API 23

- - -

1.2 (version code 3)

-

23 March 2016 - minimum API 15, target API 23

- - -

1.1 (version code 2)

-

9 March 2016 - minimum API 10, target API 23

-
    -
  • Separate the standard and the free flavors so that Privacy Browser builds correctly on F-Droid.
  • -
- -

1.0 (version code 1)

-

24 February 2016 - minimum API 10, target API 23

-
    -
  • Toggle JavaScript, DOM storage, and cookies.
  • -
  • Set default enabled status for JavaScript, DOM storage, and cookies.
  • -
  • Clear DOM storage and cookies.
  • -
  • Add shortcuts to the home screen.
  • -
  • Utilize download manager.
  • -
  • Navigate forward and back.
  • -
  • Cut, copy, paste URLs.
  • -
  • Share URLs.
  • -
  • Set homepage.
  • -
  • Scroll URL bar.
  • -
  • Maintain WebView scroll location when rotating screen.
  • -
  • Swipe to refresh WebView.
  • -
  • Play full screen videos (requires JavaScript to be enabled).
  • -
  • Clear and Exit menu item.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_changelog_light.html b/app/src/main/assets/en/about_changelog_light.html deleted file mode 100644 index 0bf674fb..00000000 --- a/app/src/main/assets/en/about_changelog_light.html +++ /dev/null @@ -1,681 +0,0 @@ - - - - - - - - - - -

3.5.1 (version code 51)

-

28 August 2020 - minimum API 19, target API 29

-
    -
  • Fix a bug that caused new intents (links from other apps) to not load if Privacy Browser had been killed by the OS in the background.
  • -
  • Fix a bug that caused the app to initialize incorrectly if the app theme was set to the opposite of the OS theme.
  • -
- -

3.5 (version code 50)

-

18 August 2020 - minimum API 19, target API 29

- - -

3.4.1 (version code 49)

-

1 April 2020 - minimum API 19, target API 29

- - -

3.4 (version code 48)

-

28 March 2020 - minimum API 19, target API 29

- - -

3.3 (version code 47)

-

3 January 2020 - minimum API 19, target API 29

- - -

3.2 (version code 46)

-

20 July 2019 - minimum API 19, target API 28

- - -

3.1 (version code 45)

-

27 May 2019 - minimum API 19, target API 28

- - -

3.0.1 (version code 44)

-

2 May 2019 - minimum API 19, target API 28

- - -

3.0 (version code 43)

-

26 April 2019 - minimum API 19, target API 28

-
    -
  • Add tabbed browsing.
  • -
  • Fix a bug that caused the bottom of the WebView to be cut off when scrolling the app bar was disabled.
  • -
  • Fix a bug that caused Privacy Browser to restart whenever a Bluetooth keyboard was connected/disconnected.
  • -
  • Updated German translation provided by Bernhard G. Keller.
  • -
  • Updated Italian translation provided by Francesco Buratti.
  • -
  • Updated Russian translation.
  • -
  • Updated Spanish translation provided by Jose A. León.
  • -
  • Partial Turkish translation.
  • -
- -

2.17.1 (version code 42)

-

5 March 2019 - minimum API 19, target API 28

- - -

2.17 (version code 41)

-

27 February 2019 - minimum API 19, target API 28

- - -

2.16 (version code 40)

-

31 January 2019 - minimum API 19, target API 28

- - -

2.15.1 (version code 39)

-

27 December 2018 - minimum API 19, target API 28

- - -

2.15 (version code 38)

-

24 December 2018 - minimum API 19, target API 28

- - -

2.14 (version code 37)

-

8 December 2018 - minimum API 19, target API 28

- - -

2.13 (version code 36)

-

29 October 2018 - minimum API 19, target API 28

- - -

2.12 (version code 35)

-

31 July 2018 - minimum API 19, target API 27

- - -

2.11 (version code 34)

-

10 July 2018 - minimum API 19, target API 27

- - -

2.10 (version code 33)

-

24 May 2018 - minimum API 19, target API 27

- - -

2.9 (version code 32)

-

9 May 2018 - minimum API 19, target API 27

- - -

2.8.1 (version code 31)

-

1 March 2018 - minimum API 19, target API 27

- - -

2.8 (version code 30)

-

22 February 2018 - minimum API 19, target API 27

- - -

2.7.2 (version code 29)

-

22 November 2017 - minimum API 19, target API 26

- - -

2.7.1 (version code 28)

-

9 November 2017 - minimum API 19, target API 26

- - -

2.7 (version code 27)

-

7 November 2017 - minimum API 19, target API 26

-
    -
  • Add a bookmarks drawer that is accessed by sliding from the right.
  • -
  • Prevent Night Mode from flashing a white background when loading new pages.
  • -
  • Update the user agents.
  • -
  • Bump target API to 26 (Android Oreo, 8.0.0).
  • -
  • Updated Italian translation provided by Francesco Buratti.
  • -
  • Updated Spanish translation provided by Jose A. León.
  • -
- -

2.6 (version code 26)

-

18 September 2017 - minimum API 19, target API 25

- - -

2.5 (version code 25)

-

26 August 2017 - minimum API 19, target API 25

- - -

2.4 (version code 24)

-

23 June 2017 - minimum API 19, target API 25

- - -

2.3 (version code 23)

-

26 May 2017 - minimum API 19, target API 25

- - -

2.2 (version code 22)

-

27 April 2017 - minimum API 19, target API 25

- - -

2.1 (version code 21)

-

25 March 2017 - minimum API 19, target API 25

- - -

2.0.1 (version code 20)

-

21 March 2017 - minimum API 19, target API 25

- - -

2.0 (version code 19)

-

16 March 2017 - minimum API 19, target API 25

- - -

1.15 (version code 18)

-

11 February 2017 - minimum API 19, target API 25

- - -

1.14.1 (version code 17)

-

4 January 2017 - minimum API 19, target API 25

- - -

1.14 (version code 16)

-

26 December 2016 - minimum API 19, target API 25

- - -

1.13 (version code 15)

-

28 November 2016 - minimum API 19, target API 24

- - -

1.12 (version code 14)

-

9 November 2016 - minimum API 19, target API 24

- - -

1.11 (version code 13)

-

22 October 2016 - minimum API 19, target API 24

- - -

1.10 (version code 12)

-

15 September 2016 - minimum API 19, target API 23

- - -

1.9.1 (version code 11)

-

27 August 2016 - minimum API 19, target API 23

-
    -
  • Changed asset image links to relative paths so Privacy Browser will build on F-Droid.
  • -
- -

1.9 (version code 10)

-

26 August 2016 - minimum API 19, target API 23

- - -

1.8 (version code 9)

-

16 July 2016 - minimum API 19, target API 23

- - -

1.7 (version code 8)

-

16 June 2016 - minimum API 19, target API 23

- - -

1.6 (version code 7)

-

11 May 2016 - minimum API 15, target API 23

- - -

1.5 (version code 6)

-

5 May 2016 - minimum API 15, target API 23

-
    -
  • Add the option to disable swipe to refresh so that certain websites, like Google Maps, will function correctly.
  • -
- -

1.4 (version code 5)

-

28 April 2016 - minimum API 15, target API 23

- - -

1.3 (version code 4)

-

7 April 2016 - minimum API 15, target API 23

- - -

1.2 (version code 3)

-

23 March 2016 - minimum API 15, target API 23

- - -

1.1 (version code 2)

-

9 March 2016 - minimum API 10, target API 23

-
    -
  • Separate the standard and the free flavors so that Privacy Browser builds correctly on F-Droid.
  • -
- -

1.0 (version code 1)

-

24 February 2016 - minimum API 10, target API 23

-
    -
  • Toggle JavaScript, DOM storage, and cookies.
  • -
  • Set default enabled status for JavaScript, DOM storage, and cookies.
  • -
  • Clear DOM storage and cookies.
  • -
  • Add shortcuts to the home screen.
  • -
  • Utilize download manager.
  • -
  • Navigate forward and back.
  • -
  • Cut, copy, paste URLs.
  • -
  • Share URLs.
  • -
  • Set homepage.
  • -
  • Scroll URL bar.
  • -
  • Maintain WebView scroll location when rotating screen.
  • -
  • Swipe to refresh WebView.
  • -
  • Play full screen videos (requires JavaScript to be enabled).
  • -
  • Clear and Exit menu item.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_contributors.html b/app/src/main/assets/en/about_contributors.html new file mode 100644 index 00000000..ea79099b --- /dev/null +++ b/app/src/main/assets/en/about_contributors.html @@ -0,0 +1,52 @@ + + + + + + + + + + + + + +

Principal Developer

+

Privacy Browser is primarily developed by Soren Stoutner.

+ +

Coders

+ Thomas Jensen
+ Hendrik Knackstedt + +

Translators

+ Thiago Nazareno Conceição Silva de Jesus: Brazilian Portuguese
+ Kévin LE FLOHIC: French
+ Bernhard G. Keller: German
+ Francesco Buratti: Italian
+ Jose A. León: Spanish + +

Past Translators

+ Stefan Erhardt: German
+ Aaron Gerlach: German + +
+
+

Contributors are welcome to submit both code and translations.

+ + \ No newline at end of file diff --git a/app/src/main/assets/en/about_contributors_dark.html b/app/src/main/assets/en/about_contributors_dark.html deleted file mode 100644 index 5a461758..00000000 --- a/app/src/main/assets/en/about_contributors_dark.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - - - - - - - -

Principal Developer

-

Privacy Browser is primarily developed by Soren Stoutner.

- -

Coders

- Thomas Jensen
- Hendrik Knackstedt - -

Translators

- Thiago Nazareno Conceição Silva de Jesus: Brazilian Portuguese
- Kévin LE FLOHIC: French
- Bernhard G. Keller: German
- Francesco Buratti: Italian
- Jose A. León: Spanish - -

Past Translators

- Stefan Erhardt: German
- Aaron Gerlach: German - -
-
-

Contributors are welcome to submit both code and translations.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_contributors_light.html b/app/src/main/assets/en/about_contributors_light.html deleted file mode 100644 index 284880b3..00000000 --- a/app/src/main/assets/en/about_contributors_light.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - - - - - - - -

Principal Developer

-

Privacy Browser is primarily developed by Soren Stoutner.

- -

Coders

- Thomas Jensen
- Hendrik Knackstedt - -

Translators

- Thiago Nazareno Conceição Silva de Jesus: Brazilian Portuguese
- Kévin LE FLOHIC: French
- Bernhard G. Keller: German
- Francesco Buratti: Italian
- Jose A. León: Spanish - -

Past Translators

- Stefan Erhardt: German
- Aaron Gerlach: German - -
-
-

Contributors are welcome to submit both code and translations.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_licenses.html b/app/src/main/assets/en/about_licenses.html new file mode 100644 index 00000000..5b94176e --- /dev/null +++ b/app/src/main/assets/en/about_licenses.html @@ -0,0 +1,1068 @@ + + + + + + + + + + + + + +

Copyright

+

Privacy Browser copyright © 2015-2020 Soren Stoutner.

+ +

License

+

Privacy Browser is released under the GPLv3+ license. The full text of the license is below. + The source code is available from git.stoutner.com.

+ +

Blocklists

+

EasyList and EasyPrivacy + are dual licensed under the GPLv3+ + and the Creative Commons Attribution-ShareAlike 3.0+ Unported licenses. + Privacy Browser incorporates them using the GPLv3+ option.

+ +

Fanboy’s Annoyance List and Fanboy’s Social Blocking List + are released under the Creative Commons Attribution 3.0 Unported license, + which is compatible with the GPLv3+. The lists are included unchanged in Privacy Browser.

+ +

More information about the blocklists can be found on the EasyList website.

+ +

Libraries

+

Privacy Browser is built with the AndroidX Libraries, + the Kotlin libraries, + and code from the Google Material Maven repository, + which are released under the Apache License 2.0.

+ +

The free flavor of Privacy Browser is built with Firebase Ads, + which is released under the Android Software Development Kit License.

+ +

Classes

+

com.stoutner.privacybrowser.views.CheckedLinearLayout is a modified version of a class contained in the + Android Camera source code. + The original file was released under the Apache License 2.0. + The modified file is released under the GPLv3+ license.

+ +

Icons

+

+ are derived from security and language, + which are part of the Android Material icon set and are released under the Apache License 2.0. + The full text of the license is below. Modifications copyright © 2016 Soren Stoutner. + The resulting images are released under the GPLv3+ license.

+

is derived from elements of folder and exit_to_app, + which are part of the Android Material icon set + and are released under the Apache License 2.0. + Modifications copyright © 2017 Soren Stoutner. + The resulting image is released under the GPLv3+ license.

+

is derived from elements of bookmark and create_new_folder, which are part of the + Android Material icon set and are released under the Apache License 2.0. + Modifications copyright © 2017 Soren Stoutner. + The resulting image is released under the GPLv3+ license.

+

is derived from create_new_folder, + which is part of the Android Material icon set and is released under the Apache License 2.0. + Modifications copyright © 2017 Soren Stoutner. + The resulting image is released under the GPLv3+ license.

+

is derived from exit_to_app, + which is part of the Android Material icon set and is released under the Apache License 2.0. + Modifications copyright © 2017 Soren Stoutner. + The resulting image is released under the GPLv3+ license.

+

is derived from compare, + which is part of the Android Material icon set and is released under the Apache License 2.0. + Modifications copyright © 2017 Soren Stoutner. + The resulting image is released under the GPLv3+ license.

+

is derived from sort, which is part of the Android Material icon set + and is released under the Apache License 2.0. Modifications copyright © 2019 Soren Stoutner. + The resulting image is released under the GPLv3+ license.

+

cookie was created by Google. + It is released under the Apache License 2.0 + and can be downloaded from Material Design Icons. It is unchanged except for layout information like color and size.

+

The following icons come from the Android Material icon set, + which is released under the Apache License 2.0. + They are unchanged except for layout information like color and size. Some of them have been renamed to match their use in the code. The original icons and names are shown below.

+

add.

+

arrow_back.

+

arrow_forward.

+

bookmarks.

+

bug_report.

+

camera_enhance.

+

chrome_reader_mode.

+

close.

+

delete.

+

delete_forever.

+

devices_other.

+

dns.

+

donut_small.

+

edit.

+

expand_less.

+

expand_more.

+

file_copy.

+

file_download.

+

find_in_page.

+

folder.

+

home.

+

image.

+

import_contacts.

+

import_export.

+

important_devices.

+

info_outline.

+

language.

+

link_off.

+

list.

+

local_activity.

+

location_off.

+

lock.

+

map.

+

more.

+

new releases.

+

open_in_browser.

+

payment.

+

question_answer.

+

refresh.

+

save.

+

search.

+

select_all.

+

settings.

+

settings_overscan.

+

share.

+

smartphone.

+

sort.

+

style.

+

subtitles.

+

tab.

+

text_fields.

+

thumbs_up_down.

+

vertical_align_bottom.

+

vertical_align_top.

+

visibility_off.

+

vpn_key.

+

vpn_lock.

+

web.

+ +
+ +

GNU General Public License

+

Version 3, 29 June 2007

+ +

Copyright © 2007 Free Software Foundation, Inc. + <http://fsf.org/>

+ +

Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed.

+ +

Preamble

+ +

The GNU General Public License is a free, copyleft license for + software and other kinds of works.

+ +

The licenses for most software and other practical works are designed + to take away your freedom to share and change the works. By contrast, + the GNU General Public License is intended to guarantee your freedom to + share and change all versions of a program—to make sure it remains free + software for all its users. We, the Free Software Foundation, use the + GNU General Public License for most of our software; it applies also to + any other work released this way by its authors. You can apply it to + your programs, too.

+ +

When we speak of free software, we are referring to freedom, not + price. Our General Public Licenses are designed to make sure that you + have the freedom to distribute copies of free software (and charge for + them if you wish), that you receive source code or can get it if you + want it, that you can change the software or use pieces of it in new + free programs, and that you know you can do these things.

+ +

To protect your rights, we need to prevent others from denying you + these rights or asking you to surrender the rights. Therefore, you have + certain responsibilities if you distribute copies of the software, or if + you modify it: responsibilities to respect the freedom of others.

+ +

For example, if you distribute copies of such a program, whether + gratis or for a fee, you must pass on to the recipients the same + freedoms that you received. You must make sure that they, too, receive + or can get the source code. And you must show them these terms so they + know their rights.

+ +

Developers that use the GNU GPL protect your rights with two steps: + (1) assert copyright on the software, and (2) offer you this License + giving you legal permission to copy, distribute and/or modify it.

+ +

For the developers’ and authors’ protection, the GPL clearly explains + that there is no warranty for this free software. For both users’ and + authors’ sake, the GPL requires that modified versions be marked as + changed, so that their problems will not be attributed erroneously to + authors of previous versions.

+ +

Some devices are designed to deny users access to install or run + modified versions of the software inside them, although the manufacturer + can do so. This is fundamentally incompatible with the aim of + protecting users’ freedom to change the software. The systematic + pattern of such abuse occurs in the area of products for individuals to + use, which is precisely where it is most unacceptable. Therefore, we + have designed this version of the GPL to prohibit the practice for those + products. If such problems arise substantially in other domains, we + stand ready to extend this provision to those domains in future versions + of the GPL, as needed to protect the freedom of users.

+ +

Finally, every program is threatened constantly by software patents. + States should not allow patents to restrict development and use of + software on general-purpose computers, but in those that do, we wish to + avoid the special danger that patents applied to a free program could + make it effectively proprietary. To prevent this, the GPL assures that + patents cannot be used to render the program non-free.

+ +

The precise terms and conditions for copying, distribution and + modification follow.

+ +

TERMS AND CONDITIONS

+ +

0. Definitions.

+ +

“This License” refers to version 3 of the GNU General Public License.

+ +

“Copyright” also means copyright-like laws that apply to other kinds of + works, such as semiconductor masks.

+ +

“The Program” refers to any copyrightable work licensed under this + License. Each licensee is addressed as “you”. “Licensees” and + “recipients” may be individuals or organizations.

+ +

To “modify” a work means to copy from or adapt all or part of the work + in a fashion requiring copyright permission, other than the making of an + exact copy. The resulting work is called a “modified version” of the + earlier work or a work “based on” the earlier work.

+ +

A “covered work” means either the unmodified Program or a work based + on the Program.

+ +

To “propagate” a work means to do anything with it that, without + permission, would make you directly or secondarily liable for + infringement under applicable copyright law, except executing it on a + computer or modifying a private copy. Propagation includes copying, + distribution (with or without modification), making available to the + public, and in some countries other activities as well.

+ +

To “convey” a work means any kind of propagation that enables other + parties to make or receive copies. Mere interaction with a user through + a computer network, with no transfer of a copy, is not conveying.

+ +

An interactive user interface displays “Appropriate Legal Notices” + to the extent that it includes a convenient and prominently visible + feature that (1) displays an appropriate copyright notice, and (2) + tells the user that there is no warranty for the work (except to the + extent that warranties are provided), that licensees may convey the + work under this License, and how to view a copy of this License. If + the interface presents a list of user commands or options, such as a + menu, a prominent item in the list meets this criterion.

+ +

1. Source Code.

+ +

The “source code” for a work means the preferred form of the work + for making modifications to it. “Object code” means any non-source + form of a work.

+ +

A “Standard Interface” means an interface that either is an official + standard defined by a recognized standards body, or, in the case of + interfaces specified for a particular programming language, one that + is widely used among developers working in that language.

+ +

The “System Libraries” of an executable work include anything, other + than the work as a whole, that (a) is included in the normal form of + packaging a Major Component, but which is not part of that Major + Component, and (b) serves only to enable use of the work with that + Major Component, or to implement a Standard Interface for which an + implementation is available to the public in source code form. A + “Major Component”, in this context, means a major essential component + (kernel, window system, and so on) of the specific operating system + (if any) on which the executable work runs, or a compiler used to + produce the work, or an object code interpreter used to run it.

+ +

The “Corresponding Source” for a work in object code form means all + the source code needed to generate, install, and (for an executable + work) run the object code and to modify the work, including scripts to + control those activities. However, it does not include the work’s + System Libraries, or general-purpose tools or generally available free + programs which are used unmodified in performing those activities but + which are not part of the work. For example, Corresponding Source + includes interface definition files associated with source files for + the work, and the source code for shared libraries and dynamically + linked subprograms that the work is specifically designed to require, + such as by intimate data communication or control flow between those + subprograms and other parts of the work.

+ +

The Corresponding Source need not include anything that users + can regenerate automatically from other parts of the Corresponding + Source.

+ +

The Corresponding Source for a work in source code form is that + same work.

+ +

2. Basic Permissions.

+ +

All rights granted under this License are granted for the term of + copyright on the Program, and are irrevocable provided the stated + conditions are met. This License explicitly affirms your unlimited + permission to run the unmodified Program. The output from running a + covered work is covered by this License only if the output, given its + content, constitutes a covered work. This License acknowledges your + rights of fair use or other equivalent, as provided by copyright law.

+ +

You may make, run and propagate covered works that you do not + convey, without conditions so long as your license otherwise remains + in force. You may convey covered works to others for the sole purpose + of having them make modifications exclusively for you, or provide you + with facilities for running those works, provided that you comply with + the terms of this License in conveying all material for which you do + not control copyright. Those thus making or running the covered works + for you must do so exclusively on your behalf, under your direction + and control, on terms that prohibit them from making any copies of + your copyrighted material outside their relationship with you.

+ +

Conveying under any other circumstances is permitted solely under + the conditions stated below. Sublicensing is not allowed; section 10 + makes it unnecessary.

+ +

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

+ +

No covered work shall be deemed part of an effective technological + measure under any applicable law fulfilling obligations under article + 11 of the WIPO copyright treaty adopted on 20 December 1996, or + similar laws prohibiting or restricting circumvention of such + measures.

+ +

When you convey a covered work, you waive any legal power to forbid + circumvention of technological measures to the extent such circumvention + is effected by exercising rights under this License with respect to + the covered work, and you disclaim any intention to limit operation or + modification of the work as a means of enforcing, against the work’s + users, your or third parties’ legal rights to forbid circumvention of + technological measures.

+ +

4. Conveying Verbatim Copies.

+ +

You may convey verbatim copies of the Program’s source code as you + receive it, in any medium, provided that you conspicuously and + appropriately publish on each copy an appropriate copyright notice; + keep intact all notices stating that this License and any + non-permissive terms added in accord with section 7 apply to the code; + keep intact all notices of the absence of any warranty; and give all + recipients a copy of this License along with the Program.

+ +

You may charge any price or no price for each copy that you convey, + and you may offer support or warranty protection for a fee.

+ +

5. Conveying Modified Source Versions.

+ +

You may convey a work based on the Program, or the modifications to + produce it from the Program, in the form of source code under the + terms of section 4, provided that you also meet all of these conditions:

+ +
    +
  • a) The work must carry prominent notices stating that you modified + it, and giving a relevant date.
  • + +
  • b) The work must carry prominent notices stating that it is + released under this License and any conditions added under section + 7. This requirement modifies the requirement in section 4 to + “keep intact all notices”.
  • + +
  • c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it.
  • + +
  • d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so.
  • +
+ +

A compilation of a covered work with other separate and independent + works, which are not by their nature extensions of the covered work, + and which are not combined with it such as to form a larger program, + in or on a volume of a storage or distribution medium, is called an + “aggregate” if the compilation and its resulting copyright are not + used to limit the access or legal rights of the compilation’s users + beyond what the individual works permit. Inclusion of a covered work + in an aggregate does not cause this License to apply to the other + parts of the aggregate.

+ +

6. Conveying Non-Source Forms.

+ +

You may convey a covered work in object code form under the terms + of sections 4 and 5, provided that you also convey the + machine-readable Corresponding Source under the terms of this License, + in one of these ways:

+ +
    +
  • a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange.
  • + +
  • b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the + Corresponding Source from a network server at no charge.
  • + +
  • c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b.
  • + +
  • d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements.
  • + +
  • e) Convey the object code using peer-to-peer transmission, provided + you inform other peers where the object code and Corresponding + Source of the work are being offered to the general public at no + charge under subsection 6d.
  • +
+ +

A separable portion of the object code, whose source code is excluded + from the Corresponding Source as a System Library, need not be + included in conveying the object code work.

+ +

A “User Product” is either (1) a “consumer product”, which means any + tangible personal property which is normally used for personal, family, + or household purposes, or (2) anything designed or sold for incorporation + into a dwelling. In determining whether a product is a consumer product, + doubtful cases shall be resolved in favor of coverage. For a particular + product received by a particular user, “normally used” refers to a + typical or common use of that class of product, regardless of the status + of the particular user or of the way in which the particular user + actually uses, or expects or is expected to use, the product. A product + is a consumer product regardless of whether the product has substantial + commercial, industrial or non-consumer uses, unless such uses represent + the only significant mode of use of the product.

+ +

“Installation Information” for a User Product means any methods, + procedures, authorization keys, or other information required to install + and execute modified versions of a covered work in that User Product from + a modified version of its Corresponding Source. The information must + suffice to ensure that the continued functioning of the modified object + code is in no case prevented or interfered with solely because + modification has been made.

+ +

If you convey an object code work under this section in, or with, or + specifically for use in, a User Product, and the conveying occurs as + part of a transaction in which the right of possession and use of the + User Product is transferred to the recipient in perpetuity or for a + fixed term (regardless of how the transaction is characterized), the + Corresponding Source conveyed under this section must be accompanied + by the Installation Information. But this requirement does not apply + if neither you nor any third party retains the ability to install + modified object code on the User Product (for example, the work has + been installed in ROM).

+ +

The requirement to provide Installation Information does not include a + requirement to continue to provide support service, warranty, or updates + for a work that has been modified or installed by the recipient, or for + the User Product in which it has been modified or installed. Access to a + network may be denied when the modification itself materially and + adversely affects the operation of the network or violates the rules and + protocols for communication across the network.

+ +

Corresponding Source conveyed, and Installation Information provided, + in accord with this section must be in a format that is publicly + documented (and with an implementation available to the public in + source code form), and must require no special password or key for + unpacking, reading or copying.

+ +

7. Additional Terms.

+ +

“Additional permissions” are terms that supplement the terms of this + License by making exceptions from one or more of its conditions. + Additional permissions that are applicable to the entire Program shall + be treated as though they were included in this License, to the extent + that they are valid under applicable law. If additional permissions + apply only to part of the Program, that part may be used separately + under those permissions, but the entire Program remains governed by + this License without regard to the additional permissions.

+ +

When you convey a copy of a covered work, you may at your option + remove any additional permissions from that copy, or from any part of + it. (Additional permissions may be written to require their own + removal in certain cases when you modify the work.) You may place + additional permissions on material, added by you to a covered work, + for which you have or can give appropriate copyright permission.

+ +

Notwithstanding any other provision of this License, for material you + add to a covered work, you may (if authorized by the copyright holders of + that material) supplement the terms of this License with terms:

+ +
    +
  • a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or
  • + +
  • b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or
  • + +
  • c) Prohibiting misrepresentation of the origin of that material, or + requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or
  • + +
  • d) Limiting the use for publicity purposes of names of licensors or + authors of the material; or
  • + +
  • e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or
  • + +
  • f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions of + it) with contractual assumptions of liability to the recipient, for + any liability that these contractual assumptions directly impose on + those licensors and authors.
  • +
+ +

All other non-permissive additional terms are considered “further + restrictions” within the meaning of section 10. If the Program as you + received it, or any part of it, contains a notice stating that it is + governed by this License along with a term that is a further + restriction, you may remove that term. If a license document contains + a further restriction but permits relicensing or conveying under this + License, you may add to a covered work material governed by the terms + of that license document, provided that the further restriction does + not survive such relicensing or conveying.

+ +

If you add terms to a covered work in accord with this section, you + must place, in the relevant source files, a statement of the + additional terms that apply to those files, or a notice indicating + where to find the applicable terms.

+ +

Additional terms, permissive or non-permissive, may be stated in the + form of a separately written license, or stated as exceptions; + the above requirements apply either way.

+ +

8. Termination.

+ +

You may not propagate or modify a covered work except as expressly + provided under this License. Any attempt otherwise to propagate or + modify it is void, and will automatically terminate your rights under + this License (including any patent licenses granted under the third + paragraph of section 11).

+ +

However, if you cease all violation of this License, then your + license from a particular copyright holder is reinstated (a) + provisionally, unless and until the copyright holder explicitly and + finally terminates your license, and (b) permanently, if the copyright + holder fails to notify you of the violation by some reasonable means + prior to 60 days after the cessation.

+ +

Moreover, your license from a particular copyright holder is + reinstated permanently if the copyright holder notifies you of the + violation by some reasonable means, this is the first time you have + received notice of violation of this License (for any work) from that + copyright holder, and you cure the violation prior to 30 days after + your receipt of the notice.

+ +

Termination of your rights under this section does not terminate the + licenses of parties who have received copies or rights from you under + this License. If your rights have been terminated and not permanently + reinstated, you do not qualify to receive new licenses for the same + material under section 10.

+ +

9. Acceptance Not Required for Having Copies.

+ +

You are not required to accept this License in order to receive or + run a copy of the Program. Ancillary propagation of a covered work + occurring solely as a consequence of using peer-to-peer transmission + to receive a copy likewise does not require acceptance. However, + nothing other than this License grants you permission to propagate or + modify any covered work. These actions infringe copyright if you do + not accept this License. Therefore, by modifying or propagating a + covered work, you indicate your acceptance of this License to do so.

+ +

10. Automatic Licensing of Downstream Recipients.

+ +

Each time you convey a covered work, the recipient automatically + receives a license from the original licensors, to run, modify and + propagate that work, subject to this License. You are not responsible + for enforcing compliance by third parties with this License.

+ +

An “entity transaction” is a transaction transferring control of an + organization, or substantially all assets of one, or subdividing an + organization, or merging organizations. If propagation of a covered + work results from an entity transaction, each party to that + transaction who receives a copy of the work also receives whatever + licenses to the work the party’s predecessor in interest had or could + give under the previous paragraph, plus a right to possession of the + Corresponding Source of the work from the predecessor in interest, if + the predecessor has it or can get it with reasonable efforts.

+ +

You may not impose any further restrictions on the exercise of the + rights granted or affirmed under this License. For example, you may + not impose a license fee, royalty, or other charge for exercise of + rights granted under this License, and you may not initiate litigation + (including a cross-claim or counterclaim in a lawsuit) alleging that + any patent claim is infringed by making, using, selling, offering for + sale, or importing the Program or any portion of it.

+ +

11. Patents.

+ +

A “contributor” is a copyright holder who authorizes use under this + License of the Program or a work on which the Program is based. The + work thus licensed is called the contributor’s “contributor version”.

+ +

A contributor’s “essential patent claims” are all patent claims + owned or controlled by the contributor, whether already acquired or + hereafter acquired, that would be infringed by some manner, permitted + by this License, of making, using, or selling its contributor version, + but do not include claims that would be infringed only as a + consequence of further modification of the contributor version. For + purposes of this definition, “control” includes the right to grant + patent sublicenses in a manner consistent with the requirements of + this License.

+ +

Each contributor grants you a non-exclusive, worldwide, royalty-free + patent license under the contributor’s essential patent claims, to + make, use, sell, offer for sale, import and otherwise run, modify and + propagate the contents of its contributor version.

+ +

In the following three paragraphs, a “patent license” is any express + agreement or commitment, however denominated, not to enforce a patent + (such as an express permission to practice a patent or covenant not to + sue for patent infringement). To “grant” such a patent license to a + party means to make such an agreement or commitment not to enforce a + patent against the party.

+ +

If you convey a covered work, knowingly relying on a patent license, + and the Corresponding Source of the work is not available for anyone + to copy, free of charge and under the terms of this License, through a + publicly available network server or other readily accessible means, + then you must either (1) cause the Corresponding Source to be so + available, or (2) arrange to deprive yourself of the benefit of the + patent license for this particular work, or (3) arrange, in a manner + consistent with the requirements of this License, to extend the patent + license to downstream recipients. “Knowingly relying” means you have + actual knowledge that, but for the patent license, your conveying the + covered work in a country, or your recipient’s use of the covered work + in a country, would infringe one or more identifiable patents in that + country that you have reason to believe are valid.

+ +

If, pursuant to or in connection with a single transaction or + arrangement, you convey, or propagate by procuring conveyance of, a + covered work, and grant a patent license to some of the parties + receiving the covered work authorizing them to use, propagate, modify + or convey a specific copy of the covered work, then the patent license + you grant is automatically extended to all recipients of the covered + work and works based on it.

+ +

A patent license is “discriminatory” if it does not include within + the scope of its coverage, prohibits the exercise of, or is + conditioned on the non-exercise of one or more of the rights that are + specifically granted under this License. You may not convey a covered + work if you are a party to an arrangement with a third party that is + in the business of distributing software, under which you make payment + to the third party based on the extent of your activity of conveying + the work, and under which the third party grants, to any of the + parties who would receive the covered work from you, a discriminatory + patent license (a) in connection with copies of the covered work + conveyed by you (or copies made from those copies), or (b) primarily + for and in connection with specific products or compilations that + contain the covered work, unless you entered into that arrangement, + or that patent license was granted, prior to 28 March 2007.

+ +

Nothing in this License shall be construed as excluding or limiting + any implied license or other defenses to infringement that may + otherwise be available to you under applicable patent law.

+ +

12. No Surrender of Others’ Freedom.

+ +

If conditions are imposed on you (whether by court order, agreement or + otherwise) that contradict the conditions of this License, they do not + excuse you from the conditions of this License. If you cannot convey a + covered work so as to satisfy simultaneously your obligations under this + License and any other pertinent obligations, then as a consequence you may + not convey it at all. For example, if you agree to terms that obligate you + to collect a royalty for further conveying from those to whom you convey + the Program, the only way you could satisfy both those terms and this + License would be to refrain entirely from conveying the Program.

+ +

13. Use with the GNU Affero General Public License.

+ +

Notwithstanding any other provision of this License, you have + permission to link or combine any covered work with a work licensed + under version 3 of the GNU Affero General Public License into a single + combined work, and to convey the resulting work. The terms of this + License will continue to apply to the part which is the covered work, + but the special requirements of the GNU Affero General Public License, + section 13, concerning interaction through a network will apply to the + combination as such.

+ +

14. Revised Versions of this License.

+ +

The Free Software Foundation may publish revised and/or new versions of + the GNU General Public License from time to time. Such new versions will + be similar in spirit to the present version, but may differ in detail to + address new problems or concerns.

+ +

Each version is given a distinguishing version number. If the + Program specifies that a certain numbered version of the GNU General + Public License “or any later version” applies to it, you have the + option of following the terms and conditions either of that numbered + version or of any later version published by the Free Software + Foundation. If the Program does not specify a version number of the + GNU General Public License, you may choose any version ever published + by the Free Software Foundation.

+ +

If the Program specifies that a proxy can decide which future + versions of the GNU General Public License can be used, that proxy’s + public statement of acceptance of a version permanently authorizes you + to choose that version for the Program.

+ +

Later license versions may give you additional or different + permissions. However, no additional obligations are imposed on any + author or copyright holder as a result of your choosing to follow a + later version.

+ +

15. Disclaimer of Warranty.

+ +

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY + APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT + HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY + OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, + THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM + IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF + ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

+ +

16. Limitation of Liability.

+ +

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING + WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS + THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY + GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE + USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF + DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD + PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), + EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF + SUCH DAMAGES.

+ +

17. Interpretation of Sections 15 and 16.

+ +

If the disclaimer of warranty and limitation of liability provided + above cannot be given local legal effect according to their terms, + reviewing courts shall apply local law that most closely approximates + an absolute waiver of all civil liability in connection with the + Program, unless a warranty or assumption of liability accompanies a + copy of the Program in return for a fee.

+ +

END OF TERMS AND CONDITIONS

+ +

How to Apply These Terms to Your New Programs

+ +

If you develop a new program, and you want it to be of the greatest + possible use to the public, the best way to achieve this is to make it + free software which everyone can redistribute and change under these terms.

+ +

To do so, attach the following notices to the program. It is safest + to attach them to the start of each source file to most effectively + state the exclusion of warranty; and each file should have at least + the “copyright” line and a pointer to where the full notice is found.

+ +
<one line to give the program’s name
+and a brief idea of what it does.>
+Copyright (C) <year>  <name of author>
+
+This program is free software: you can
+redistribute it and/or modify
+it under the terms of the GNU General
+Public License as published by the Free
+Software Foundation, either version 3
+of the License, or(at your option)
+any later version.
+
+This program is distributed in the hope
+that it will be useful, but WITHOUT ANY
+WARRANTY; without even the implied
+warranty of MERCHANTABILITY or FITNESS
+FOR A PARTICULAR PURPOSE.  See the GNU
+General Public License for more details.
+
+You should have received a copy of the
+GNU General Public License along with
+this program.  If not, see
+<http://www.gnu.org/licenses/>.
+ +

Also add information on how to contact you by electronic and paper mail.

+ +

If the program does terminal interaction, make it output a short + notice like this when it starts in an interactive mode:

+ +
<program>  Copyright (C) <year>
+<name of author>
+This program comes with ABSOLUTELY NO
+WARRANTY; for details type `show w'.
+This is free software, and you are
+welcome to redistribute it under
+certain conditions; type `show c'
+for details.
+ +

The hypothetical commands `show w' and `show c' should show the appropriate + parts of the General Public License. Of course, your program’s commands + might be different; for a GUI interface, you would use an “about box”.

+ +

You should also get your employer (if you work as a programmer) or school, + if any, to sign a “copyright disclaimer” for the program, if necessary. + For more information on this, and how to apply and follow the GNU GPL, see + <http://www.gnu.org/licenses/>.

+ +

The GNU General Public License does not permit incorporating your program + into proprietary programs. If your program is a subroutine library, you + may consider it more useful to permit linking proprietary applications with + the library. If this is what you want to do, use the GNU Lesser General + Public License instead of this License. But first, please read + <http://www.gnu.org/philosophy/why-not-lgpl.html>.

+ +
+ +

Apache License

+

Version 2.0, January 2004

+

http://www.apache.org/licenses/

+ +

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

+ +

1. Definitions.

+ +

“License” shall mean the terms and conditions for use, reproduction, and + distribution as defined by Sections 1 through 9 of this document.

+ +

“Licensor” shall mean the copyright owner or entity authorized by the + copyright owner that is granting the License.

+ +

“Legal Entity” shall mean the union of the acting entity and all other + entities that control, are controlled by, or are under common control with + that entity. For the purposes of this definition, “control” means (i) the + power, direct or indirect, to cause the direction or management of such + entity, whether by contract or otherwise, or (ii) ownership of fifty + percent (50%) or more of the outstanding shares, or (iii) beneficial + ownership of such entity.

+ +

“You” (or “Your”) shall mean an individual or Legal Entity exercising + permissions granted by this License.

+ +

“Source” form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation source, + and configuration files.

+ +

“Object” form shall mean any form resulting from mechanical transformation + or translation of a Source form, including but not limited to compiled + object code, generated documentation, and conversions to other media types.

+ +

“Work” shall mean the work of authorship, whether in Source or Object form, + made available under the License, as indicated by a copyright notice that + is included in or attached to the work (an example is provided in the + Appendix below).

+ +

“Derivative Works” shall mean any work, whether in Source or Object form, + that is based on (or derived from) the Work and for which the editorial + revisions, annotations, elaborations, or other modifications represent, as + a whole, an original work of authorship. For the purposes of this License, + Derivative Works shall not include works that remain separable from, or + merely link (or bind by name) to the interfaces of, the Work and Derivative + Works thereof.

+ +

“Contribution” shall mean any work of authorship, including the original + version of the Work and any modifications or additions to that Work or + Derivative Works thereof, that is intentionally submitted to Licensor for + inclusion in the Work by the copyright owner or by an individual or Legal + Entity authorized to submit on behalf of the copyright owner. For the + purposes of this definition, “submitted” means any form of electronic, + verbal, or written communication sent to the Licensor or its + representatives, including but not limited to communication on electronic + mailing lists, source code control systems, and issue tracking systems that + are managed by, or on behalf of, the Licensor for the purpose of discussing + and improving the Work, but excluding communication that is conspicuously + marked or otherwise designated in writing by the copyright owner as “Not a + Contribution.”

+ +

“Contributor” shall mean Licensor and any individual or Legal Entity on + behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work.

+ +

2. Grant of Copyright License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby + grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, + irrevocable copyright license to reproduce, prepare Derivative Works of, publicly + display, publicly perform, sublicense, and distribute the Work and such + Derivative Works in Source or Object form.

+ +

3. Grant of Patent License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby grants + to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, use, + offer to sell, sell, import, and otherwise transfer the Work, where such + license applies only to those patent claims licensable by such Contributor + that are necessarily infringed by their Contribution(s) alone or by + combination of their Contribution(s) with the Work to which such + Contribution(s) was submitted. If You institute patent litigation against + any entity (including a cross-claim or counterclaim in a lawsuit) alleging + that the Work or a Contribution incorporated within the Work constitutes + direct or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate as of the + date such litigation is filed.

+ +

4. Redistribution.

+ +

You may reproduce and distribute copies of the Work or Derivative Works thereof + in any medium, with or without modifications, and in Source or Object form, provided + that You meet the following conditions:

+ +
    +
  1. You must give any other recipients of the Work or Derivative Works a + copy of this License; and
  2. + +
  3. You must cause any modified files to carry prominent notices stating + that You changed the files; and
  4. + +
  5. You must retain, in the Source form of any Derivative Works that You + distribute, all copyright, patent, trademark, and attribution notices from + the Source form of the Work, excluding those notices that do not pertain to + any part of the Derivative Works; and
  6. + +
  7. If the Work includes a “NOTICE” text file as part of its distribution, + then any Derivative Works that You distribute must include a readable copy + of the attribution notices contained within such NOTICE file, excluding + those notices that do not pertain to any part of the Derivative Works, in + at least one of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or documentation, + if provided along with the Derivative Works; or, within a display generated + by the Derivative Works, if and wherever such third-party notices normally + appear. The contents of the NOTICE file are for informational purposes only + and do not modify the License. You may add Your own attribution notices + within Derivative Works that You distribute, alongside or as an addendum to + the NOTICE text from the Work, provided that such additional attribution + notices cannot be construed as modifying the License. +
    +
    + You may add Your own copyright statement to Your modifications and may + provide additional or different license terms and conditions for use, + reproduction, or distribution of Your modifications, or for any such + Derivative Works as a whole, provided Your use, reproduction, and + distribution of the Work otherwise complies with the conditions stated in + this License.
  8. +
+ +

5. Submission of Contributions.

+ +

Unless You explicitly state otherwise, any Contribution intentionally submitted for + inclusion in the Work by You to the Licensor shall be under the terms and + conditions of this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify the + terms of any separate license agreement you may have executed with Licensor + regarding such Contributions.

+ +

6. Trademarks.

+ +

This License does not grant permission to use the trade names, trademarks, service marks, + or product names of the Licensor, except as required for reasonable and customary use + in describing the origin of the Work and reproducing the content of the + NOTICE file.

+ +

7. Disclaimer of Warranty.

+ +

Unless required by applicable law or agreed to in writing, Licensor provides the Work + (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT + WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, + without limitation, any warranties or conditions of TITLE, + NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You + are solely responsible for determining the appropriateness of using or + redistributing the Work and assume any risks associated with Your exercise + of permissions under this License.

+ +

8. Limitation of Liability.

+ +

In no event and under no legal theory, whether in tort (including negligence), contract, + or otherwise, unless required by applicable law (such as deliberate and + grossly negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a result + of this License or out of the use or inability to use the Work (including + but not limited to damages for loss of goodwill, work stoppage, computer + failure or malfunction, or any and all other commercial damages or losses), + even if such Contributor has been advised of the possibility of such + damages.

+ +

9. Accepting Warranty or Additional Liability.

+ +

While redistributing the Work or Derivative Works thereof, You may choose + to offer, and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this License. + However, in accepting such obligations, You may act only on Your own behalf + and on Your sole responsibility, not on behalf of any other Contributor, + and only if You agree to indemnify, defend, and hold each Contributor + harmless for any liability incurred by, or claims asserted against, such + Contributor by reason of your accepting any such warranty or additional + liability.

+ +

END OF TERMS AND CONDITIONS

+ +

APPENDIX: How to apply the Apache License to your work

+ +

To apply the Apache License to your work, attach the following boilerplate + notice, with the fields enclosed by brackets “[]” replaced with your own + identifying information. (Don’t include the brackets!) The text should be + enclosed in the appropriate comment syntax for the file format. We also + recommend that a file or class name and description of purpose be included + on the same “printed page” as the copyright notice for easier + identification within third-party archives.

+
Copyright [yyyy] [name of copyright owner]
+
+Licensed under the Apache License,
+Version 2.0 (the “License”);
+you may not use this file except
+in compliance with the License.
+You may obtain a copy of the License at
+
+http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law
+or agreed to in writing, software
+distributed under the License is
+distributed on an “AS IS” BASIS,
+WITHOUT WARRANTIES OR CONDITIONS
+OF ANY KIND, either express or implied.
+See the License for the specific
+language governing permissions and
+limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/en/about_licenses_dark.html b/app/src/main/assets/en/about_licenses_dark.html deleted file mode 100644 index d5686eae..00000000 --- a/app/src/main/assets/en/about_licenses_dark.html +++ /dev/null @@ -1,1062 +0,0 @@ - - - - - - - - - - -

Copyright

-

Privacy Browser copyright © 2015-2020 Soren Stoutner.

- -

License

-

Privacy Browser is released under the GPLv3+ license. The full text of the license is below. - The source code is available from git.stoutner.com.

- -

Blocklists

-

EasyList and EasyPrivacy - are dual licensed under the GPLv3+ - and the Creative Commons Attribution-ShareAlike 3.0+ Unported licenses. - Privacy Browser incorporates them using the GPLv3+ option.

- -

Fanboy’s Annoyance List and Fanboy’s Social Blocking List - are released under the Creative Commons Attribution 3.0 Unported license, - which is compatible with the GPLv3+. The lists are included unchanged in Privacy Browser.

- -

More information about the blocklists can be found on the EasyList website.

- -

Libraries

-

Privacy Browser is built with the AndroidX Libraries, - the Kotlin libraries, - and code from the Google Material Maven repository, - which are released under the Apache License 2.0.

- -

The free flavor of Privacy Browser is built with Firebase Ads, - which is released under the Android Software Development Kit License.

- -

Classes

-

com.stoutner.privacybrowser.views.CheckedLinearLayout is a modified version of a class contained in the - Android Camera source code. - The original file was released under the Apache License 2.0. - The modified file is released under the GPLv3+ license.

- -

Icons

-

- are derived from security and language, - which are part of the Android Material icon set and are released under the Apache License 2.0. - The full text of the license is below. Modifications copyright © 2016 Soren Stoutner. - The resulting images are released under the GPLv3+ license.

-

is derived from elements of folder and exit_to_app, which are part of the - Android Material icon set and are released under the Apache License 2.0. - Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from elements of bookmark and create_new_folder, which are part of the - Android Material icon set and are released under the Apache License 2.0. - Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from create_new_folder, - which is part of the Android Material icon set and is released under the Apache License 2.0. - Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from exit_to_app, which is part of the Android Material icon set - and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from compare, which is part of the Android Material icon set - and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from sort, which is part of the Android Material icon set - and is released under the Apache License 2.0. Modifications copyright © 2019 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

cookie was created by Google. - It is released under the Apache License 2.0 - and can be downloaded from Material Design Icons. It is unchanged except for layout information like color and size.

-

The following icons come from the Android Material icon set, - which is released under the Apache License 2.0. - They are unchanged except for layout information like color and size. Some of them have been renamed to match their use in the code. The original icons and names are shown below.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

- -
- -

GNU General Public License

-

Version 3, 29 June 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.

- -

Preamble

- -

The GNU General Public License is a free, copyleft license for - software and other kinds of works.

- -

The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a program—to make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.

- -

When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.

- -

To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.

- -

For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.

- -

Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.

- -

For the developers’ and authors’ protection, the GPL clearly explains - that there is no warranty for this free software. For both users’ and - authors’ sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.

- -

Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting users’ freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.

- -

Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.

- -

The precise terms and conditions for copying, distribution and - modification follow.

- -

TERMS AND CONDITIONS

- -

0. Definitions.

- -

“This License” refers to version 3 of the GNU General Public License.

- -

“Copyright” also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.

- -

“The Program” refers to any copyrightable work licensed under this - License. Each licensee is addressed as “you”. “Licensees” and - “recipients” may be individuals or organizations.

- -

To “modify” a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a “modified version” of the - earlier work or a work “based on” the earlier work.

- -

A “covered work” means either the unmodified Program or a work based - on the Program.

- -

To “propagate” a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.

- -

To “convey” a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.

- -

An interactive user interface displays “Appropriate Legal Notices” - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.

- -

1. Source Code.

- -

The “source code” for a work means the preferred form of the work - for making modifications to it. “Object code” means any non-source - form of a work.

- -

A “Standard Interface” means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.

- -

The “System Libraries” of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - “Major Component”, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.

- -

The “Corresponding Source” for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the work’s - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.

- -

The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.

- -

The Corresponding Source for a work in source code form is that - same work.

- -

2. Basic Permissions.

- -

All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.

- -

You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.

- -

Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.

- -

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

- -

No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.

- -

When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the work’s - users, your or third parties’ legal rights to forbid circumvention of - technological measures.

- -

4. Conveying Verbatim Copies.

- -

You may convey verbatim copies of the Program’s source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.

- -

You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.

- -

5. Conveying Modified Source Versions.

- -

You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:

- -
    -
  • a) The work must carry prominent notices stating that you modified - it, and giving a relevant date.
  • - -
  • b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - “keep intact all notices”.
  • - -
  • c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it.
  • - -
  • d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so.
  • -
- -

A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - “aggregate” if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilation’s users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.

- -

6. Conveying Non-Source Forms.

- -

You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:

- -
    -
  • a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange.
  • - -
  • b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge.
  • - -
  • c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b.
  • - -
  • d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements.
  • - -
  • e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d.
  • -
- -

A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.

- -

A “User Product” is either (1) a “consumer product”, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, “normally used” refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.

- -

“Installation Information” for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.

- -

If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).

- -

The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.

- -

Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.

- -

7. Additional Terms.

- -

“Additional permissions” are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.

- -

When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.

- -

Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:

- -
    -
  • a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or
  • - -
  • b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or
  • - -
  • c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or
  • - -
  • d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or
  • - -
  • e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or
  • - -
  • f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors.
  • -
- -

All other non-permissive additional terms are considered “further - restrictions” within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.

- -

If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.

- -

Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.

- -

8. Termination.

- -

You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).

- -

However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.

- -

Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.

- -

Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.

- -

9. Acceptance Not Required for Having Copies.

- -

You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.

- -

10. Automatic Licensing of Downstream Recipients.

- -

Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.

- -

An “entity transaction” is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the party’s predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.

- -

You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.

- -

11. Patents.

- -

A “contributor” is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributor’s “contributor version”.

- -

A contributor’s “essential patent claims” are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, “control” includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.

- -

Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributor’s essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.

- -

In the following three paragraphs, a “patent license” is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To “grant” such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.

- -

If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. “Knowingly relying” means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipient’s use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.

- -

If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.

- -

A patent license is “discriminatory” if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.

- -

Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.

- -

12. No Surrender of Others’ Freedom.

- -

If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.

- -

13. Use with the GNU Affero General Public License.

- -

Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.

- -

14. Revised Versions of this License.

- -

The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.

- -

Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License “or any later version” applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.

- -

If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxy’s - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.

- -

Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.

- -

15. Disclaimer of Warranty.

- -

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

- -

16. Limitation of Liability.

- -

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.

- -

17. Interpretation of Sections 15 and 16.

- -

If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.

- -

END OF TERMS AND CONDITIONS

- -

How to Apply These Terms to Your New Programs

- -

If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.

- -

To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the “copyright” line and a pointer to where the full notice is found.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Also add information on how to contact you by electronic and paper mail.

- -

If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your program’s commands - might be different; for a GUI interface, you would use an “about box”.

- -

You should also get your employer (if you work as a programmer) or school, - if any, to sign a “copyright disclaimer” for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.

- -

The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/en/about_licenses_light.html b/app/src/main/assets/en/about_licenses_light.html deleted file mode 100644 index 84b93359..00000000 --- a/app/src/main/assets/en/about_licenses_light.html +++ /dev/null @@ -1,1063 +0,0 @@ - - - - - - - - - - -

Copyright

-

Privacy Browser copyright © 2015-2020 Soren Stoutner.

- -

License

-

Privacy Browser is released under the GPLv3+ license. The full text of the license is below. - The source code is available from git.stoutner.com.

- -

Blocklists

-

EasyList and EasyPrivacy - are dual licensed under the GPLv3+ - and the Creative Commons Attribution-ShareAlike 3.0+ Unported licenses. - Privacy Browser incorporates them using the GPLv3+ option.

- -

Fanboy’s Annoyance List and Fanboy’s Social Blocking List - are released under the Creative Commons Attribution 3.0 Unported license, - which is compatible with the GPLv3+. The lists are included unchanged in Privacy Browser.

- -

More information about the blocklists can be found on the EasyList website.

- -

Libraries

-

Privacy Browser is built with the AndroidX Libraries, - the Kotlin libraries, - and code from the Google Material Maven repository, - which are released under the Apache License 2.0.

- -

The free flavor of Privacy Browser is built with Firebase Ads, - which is released under the Android Software Development Kit License.

- -

Classes

-

com.stoutner.privacybrowser.views.CheckedLinearLayout is a modified version of a class contained in the - Android Camera source code. - The original file was released under the Apache License 2.0. - The modified file is released under the GPLv3+ license.

- -

Icons

-

- are derived from security and language, - which are part of the Android Material icon set and are released under the Apache License 2.0. - The full text of the license is below. Modifications copyright © 2016 Soren Stoutner. - The resulting images are released under the GPLv3+ license.

-

is derived from elements of folder and exit_to_app, - which are part of the Android Material icon set - and are released under the Apache License 2.0. - Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from elements of bookmark and create_new_folder, which are part of the - Android Material icon set and are released under the Apache License 2.0. - Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from create_new_folder, - which is part of the Android Material icon set and is released under the Apache License 2.0. - Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from exit_to_app, which is part of the Android Material icon set - and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from compare, which is part of the Android Material icon set - and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

is derived from sort, which is part of the Android Material icon set - and is released under the Apache License 2.0. Modifications copyright © 2019 Soren Stoutner. - The resulting image is released under the GPLv3+ license.

-

cookie was created by Google. - It is released under the Apache License 2.0 - and can be downloaded from Material Design Icons. It is unchanged except for layout information like color and size.

-

The following icons come from the Android Material icon set, - which is released under the Apache License 2.0. - They are unchanged except for layout information like color and size. Some of them have been renamed to match their use in the code. The original icons and names are shown below.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

- -
- -

GNU General Public License

-

Version 3, 29 June 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.

- -

Preamble

- -

The GNU General Public License is a free, copyleft license for - software and other kinds of works.

- -

The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a program—to make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.

- -

When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.

- -

To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.

- -

For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.

- -

Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.

- -

For the developers’ and authors’ protection, the GPL clearly explains - that there is no warranty for this free software. For both users’ and - authors’ sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.

- -

Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting users’ freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.

- -

Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.

- -

The precise terms and conditions for copying, distribution and - modification follow.

- -

TERMS AND CONDITIONS

- -

0. Definitions.

- -

“This License” refers to version 3 of the GNU General Public License.

- -

“Copyright” also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.

- -

“The Program” refers to any copyrightable work licensed under this - License. Each licensee is addressed as “you”. “Licensees” and - “recipients” may be individuals or organizations.

- -

To “modify” a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a “modified version” of the - earlier work or a work “based on” the earlier work.

- -

A “covered work” means either the unmodified Program or a work based - on the Program.

- -

To “propagate” a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.

- -

To “convey” a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.

- -

An interactive user interface displays “Appropriate Legal Notices” - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.

- -

1. Source Code.

- -

The “source code” for a work means the preferred form of the work - for making modifications to it. “Object code” means any non-source - form of a work.

- -

A “Standard Interface” means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.

- -

The “System Libraries” of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - “Major Component”, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.

- -

The “Corresponding Source” for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the work’s - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.

- -

The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.

- -

The Corresponding Source for a work in source code form is that - same work.

- -

2. Basic Permissions.

- -

All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.

- -

You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.

- -

Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.

- -

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

- -

No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.

- -

When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the work’s - users, your or third parties’ legal rights to forbid circumvention of - technological measures.

- -

4. Conveying Verbatim Copies.

- -

You may convey verbatim copies of the Program’s source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.

- -

You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.

- -

5. Conveying Modified Source Versions.

- -

You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:

- -
    -
  • a) The work must carry prominent notices stating that you modified - it, and giving a relevant date.
  • - -
  • b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - “keep intact all notices”.
  • - -
  • c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it.
  • - -
  • d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so.
  • -
- -

A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - “aggregate” if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilation’s users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.

- -

6. Conveying Non-Source Forms.

- -

You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:

- -
    -
  • a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange.
  • - -
  • b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge.
  • - -
  • c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b.
  • - -
  • d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements.
  • - -
  • e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d.
  • -
- -

A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.

- -

A “User Product” is either (1) a “consumer product”, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, “normally used” refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.

- -

“Installation Information” for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.

- -

If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).

- -

The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.

- -

Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.

- -

7. Additional Terms.

- -

“Additional permissions” are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.

- -

When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.

- -

Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:

- -
    -
  • a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or
  • - -
  • b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or
  • - -
  • c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or
  • - -
  • d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or
  • - -
  • e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or
  • - -
  • f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors.
  • -
- -

All other non-permissive additional terms are considered “further - restrictions” within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.

- -

If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.

- -

Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.

- -

8. Termination.

- -

You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).

- -

However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.

- -

Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.

- -

Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.

- -

9. Acceptance Not Required for Having Copies.

- -

You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.

- -

10. Automatic Licensing of Downstream Recipients.

- -

Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.

- -

An “entity transaction” is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the party’s predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.

- -

You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.

- -

11. Patents.

- -

A “contributor” is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributor’s “contributor version”.

- -

A contributor’s “essential patent claims” are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, “control” includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.

- -

Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributor’s essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.

- -

In the following three paragraphs, a “patent license” is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To “grant” such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.

- -

If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. “Knowingly relying” means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipient’s use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.

- -

If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.

- -

A patent license is “discriminatory” if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.

- -

Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.

- -

12. No Surrender of Others’ Freedom.

- -

If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.

- -

13. Use with the GNU Affero General Public License.

- -

Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.

- -

14. Revised Versions of this License.

- -

The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.

- -

Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License “or any later version” applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.

- -

If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxy’s - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.

- -

Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.

- -

15. Disclaimer of Warranty.

- -

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

- -

16. Limitation of Liability.

- -

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.

- -

17. Interpretation of Sections 15 and 16.

- -

If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.

- -

END OF TERMS AND CONDITIONS

- -

How to Apply These Terms to Your New Programs

- -

If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.

- -

To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the “copyright” line and a pointer to where the full notice is found.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Also add information on how to contact you by electronic and paper mail.

- -

If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your program’s commands - might be different; for a GUI interface, you would use an “about box”.

- -

You should also get your employer (if you work as a programmer) or school, - if any, to sign a “copyright disclaimer” for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.

- -

The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/en/about_links.html b/app/src/main/assets/en/about_links.html new file mode 100644 index 00000000..20fc7da6 --- /dev/null +++ b/app/src/main/assets/en/about_links.html @@ -0,0 +1,47 @@ + + + + + + + + + + + + + +

Websites

+ +

+ News

+ +

+ Roadmap

+ +

+ Bug Tracker and Feature Requests

+ +

+ Forum

+ +

+ GitWeb

+ + \ No newline at end of file diff --git a/app/src/main/assets/en/about_links_dark.html b/app/src/main/assets/en/about_links_dark.html deleted file mode 100644 index 7f5cd124..00000000 --- a/app/src/main/assets/en/about_links_dark.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - - - - - - - -

Websites

- -

- News

- -

- Roadmap

- -

- Bug Tracker and Feature Requests

- -

- Forum

- -

- GitWeb

- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_links_light.html b/app/src/main/assets/en/about_links_light.html deleted file mode 100644 index 8bc38d67..00000000 --- a/app/src/main/assets/en/about_links_light.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - - - - - - - -

Websites

- -

- News

- -

- Roadmap

- -

- Bug Tracker and Feature Requests

- -

- Forum

- -

- GitWeb

- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_permissions.html b/app/src/main/assets/en/about_permissions.html new file mode 100644 index 00000000..71629fdf --- /dev/null +++ b/app/src/main/assets/en/about_permissions.html @@ -0,0 +1,47 @@ + + + + + + + + + + + + + +

Have full network access

+

android.permission.INTERNET

+

Required for the WebView to access the internet. Without this permission, Privacy Browser would be “No Browser: Protecting Your Privacy by Staying Completely Off the Internet”.

+ +

Install shortcuts

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

Required to add shortcuts for websites to the launcher desktop.

+ +

Read storage

+

android.permission.READ_EXTERNAL_STORAGE

+

Required to import settings from public folders. On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can import settings from the app’s folders instead.

+ +

Write storage

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Required to export settings and download files to the public folders. + On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can export settings and store downloads in the app’s folders instead.

+ + \ No newline at end of file diff --git a/app/src/main/assets/en/about_permissions_dark.html b/app/src/main/assets/en/about_permissions_dark.html deleted file mode 100644 index 5da4b04d..00000000 --- a/app/src/main/assets/en/about_permissions_dark.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - - - - - - - -

Have full network access

-

android.permission.INTERNET

-

Required for the WebView to access the internet. Without this permission, Privacy Browser would be “No Browser: Protecting Your Privacy by Staying Completely Off the Internet”.

- -

Install shortcuts

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Required to add shortcuts for websites to the launcher desktop.

- -

Read storage

-

android.permission.READ_EXTERNAL_STORAGE

-

Required to import settings from public folders. On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can import settings from the app’s folders instead.

- -

Write storage

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Required to export settings and download files to the public folders. - On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can export settings and store downloads in the app’s folders instead.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_permissions_light.html b/app/src/main/assets/en/about_permissions_light.html deleted file mode 100644 index 7a293538..00000000 --- a/app/src/main/assets/en/about_permissions_light.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - - - - - - - -

Have full network access

-

android.permission.INTERNET

-

Required for the WebView to access the internet. Without this permission, Privacy Browser would be “No Browser: Protecting Your Privacy by Staying Completely Off the Internet”.

- -

Install shortcuts

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Required to add shortcuts for websites to the launcher desktop.

- -

Read storage

-

android.permission.READ_EXTERNAL_STORAGE

-

Required to import settings from public folders. On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can import settings from the app’s folders instead.

- -

Write storage

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Required to export settings and download files to the public folders. - On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can export settings and store downloads in the app’s folders instead.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_privacy_policy.html b/app/src/main/assets/en/about_privacy_policy.html new file mode 100644 index 00000000..f9828196 --- /dev/null +++ b/app/src/main/assets/en/about_privacy_policy.html @@ -0,0 +1,93 @@ + + + + + + + + + + + + + +

Privacy Browser

+

Privacy Browser does not collect any user information.

+ + +

Google Play

+

Google Play has its own privacy policy. + Google provides anonymized summary installation information to developers, including the number of installs organized by the following categories.

+
    +
  • Android version (eg. Android 7.1)
  • +
  • Device (eg. Samsung Galaxy S6 [zeroflte])
  • +
  • Tablets (eg. Tablets 10" and above)
  • +
  • Country (eg. United States)
  • +
  • Language (eg. English [United States])
  • +
  • App version (eg. 14)
  • +
  • Carrier (eg. T-Mobile - US)
  • +
+ + +

Google Play Ratings

+

Google Play has its own privacy policy. + Google provides developers with anonymized summaries of the following information related to user ratings.

+
    +
  • Country (eg. United States)
  • +
  • Language (eg. English)
  • +
  • App version (eg. 14)
  • +
  • Android version (eg. Android 7.1)
  • +
  • Device (eg. Google Nexus 5X [bullhead])
  • +
  • Tablets (eg. Tablets 10" and above)
  • +
+ + +

Google Play Reviews

+

Google Play has its own privacy policy. + In addition to the name of the reviewer, the rating, and the text of the review (which are all available publicly), Google provides some or all of the following information to the developer.

+
    +
  • Version code (eg. 7)
  • +
  • Version name (eg. 1.6)
  • +
  • Android version (eg. Android 5.1)
  • +
  • Device (eg. Galaxy S6 Edge+ [zenlte])
  • +
  • Manufacturer (eg. Samsung)
  • +
  • Device type (eg. Phone)
  • +
  • CPU make (eg. Samsung)
  • +
  • CPU model (eg. Exynos 7420)
  • +
  • Screen density (eg. 560 dpi)
  • +
  • Screen size (eg. 2560 x 1440)
  • +
  • RAM (eg. 4096 MB)
  • +
  • Native platform (eg. armeabi-v7a,armeabi,arm64v8a)
  • +
  • OpenGL ES version (eg. 3.1)
  • +
  • Device language (eg. English)
  • +
+ + +

Direct Communications

+

Users may choose to send direct communications to Stoutner, like email messages and comments on stoutner.com.

+ + +

Use of Information

+

Stoutner may use this information to assist in the development of Privacy Browser and communicate the status of the project to users. + Stoutner will never sell this information nor transfer it to any third party that would use it for advertising or marketing.

+ +
+

Revision 1.7, 14 May 2019

+ + \ No newline at end of file diff --git a/app/src/main/assets/en/about_privacy_policy_dark.html b/app/src/main/assets/en/about_privacy_policy_dark.html deleted file mode 100644 index 1ded6ebf..00000000 --- a/app/src/main/assets/en/about_privacy_policy_dark.html +++ /dev/null @@ -1,90 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser does not collect any user information.

- - -

Google Play

-

Google Play has its own privacy policy. - Google provides anonymized summary installation information to developers, including the number of installs organized by the following categories.

-
    -
  • Android version (eg. Android 7.1)
  • -
  • Device (eg. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablets (eg. Tablets 10" and above)
  • -
  • Country (eg. United States)
  • -
  • Language (eg. English [United States])
  • -
  • App version (eg. 14)
  • -
  • Carrier (eg. T-Mobile - US)
  • -
- - -

Google Play Ratings

-

Google Play has its own privacy policy. - Google provides developers with anonymized summaries of the following information related to user ratings.

-
    -
  • Country (eg. United States)
  • -
  • Language (eg. English)
  • -
  • App version (eg. 14)
  • -
  • Android version (eg. Android 7.1)
  • -
  • Device (eg. Google Nexus 5X [bullhead])
  • -
  • Tablets (eg. Tablets 10" and above)
  • -
- - -

Google Play Reviews

-

Google Play has its own privacy policy. - In addition to the name of the reviewer, the rating, and the text of the review (which are all available publicly), Google provides some or all of the following information to the developer.

-
    -
  • Version code (eg. 7)
  • -
  • Version name (eg. 1.6)
  • -
  • Android version (eg. Android 5.1)
  • -
  • Device (eg. Galaxy S6 Edge+ [zenlte])
  • -
  • Manufacturer (eg. Samsung)
  • -
  • Device type (eg. Phone)
  • -
  • CPU make (eg. Samsung)
  • -
  • CPU model (eg. Exynos 7420)
  • -
  • Screen density (eg. 560 dpi)
  • -
  • Screen size (eg. 2560 x 1440)
  • -
  • RAM (eg. 4096 MB)
  • -
  • Native platform (eg. armeabi-v7a,armeabi,arm64v8a)
  • -
  • OpenGL ES version (eg. 3.1)
  • -
  • Device language (eg. English)
  • -
- - -

Direct Communications

-

Users may choose to send direct communications to Stoutner, like email messages and comments on stoutner.com.

- - -

Use of Information

-

Stoutner may use this information to assist in the development of Privacy Browser and communicate the status of the project to users. - Stoutner will never sell this information nor transfer it to any third party that would use it for advertising or marketing.

- -
-

Revision 1.6, 22 May 2018

- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_privacy_policy_light.html b/app/src/main/assets/en/about_privacy_policy_light.html deleted file mode 100644 index 6dd9a17e..00000000 --- a/app/src/main/assets/en/about_privacy_policy_light.html +++ /dev/null @@ -1,90 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser does not collect any user information.

- - -

Google Play

-

Google Play has its own privacy policy. - Google provides anonymized summary installation information to developers, including the number of installs organized by the following categories.

-
    -
  • Android version (eg. Android 7.1)
  • -
  • Device (eg. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablets (eg. Tablets 10" and above)
  • -
  • Country (eg. United States)
  • -
  • Language (eg. English [United States])
  • -
  • App version (eg. 14)
  • -
  • Carrier (eg. T-Mobile - US)
  • -
- - -

Google Play Ratings

-

Google Play has its own privacy policy. - Google provides developers with anonymized summaries of the following information related to user ratings.

-
    -
  • Country (eg. United States)
  • -
  • Language (eg. English)
  • -
  • App version (eg. 14)
  • -
  • Android version (eg. Android 7.1)
  • -
  • Device (eg. Google Nexus 5X [bullhead])
  • -
  • Tablets (eg. Tablets 10" and above)
  • -
- - -

Google Play Reviews

-

Google Play has its own privacy policy. - In addition to the name of the reviewer, the rating, and the text of the review (which are all available publicly), Google provides some or all of the following information to the developer.

-
    -
  • Version code (eg. 7)
  • -
  • Version name (eg. 1.6)
  • -
  • Android version (eg. Android 5.1)
  • -
  • Device (eg. Galaxy S6 Edge+ [zenlte])
  • -
  • Manufacturer (eg. Samsung)
  • -
  • Device type (eg. Phone)
  • -
  • CPU make (eg. Samsung)
  • -
  • CPU model (eg. Exynos 7420)
  • -
  • Screen density (eg. 560 dpi)
  • -
  • Screen size (eg. 2560 x 1440)
  • -
  • RAM (eg. 4096 MB)
  • -
  • Native platform (eg. armeabi-v7a,armeabi,arm64v8a)
  • -
  • OpenGL ES version (eg. 3.1)
  • -
  • Device language (eg. English)
  • -
- - -

Direct Communications

-

Users may choose to send direct communications to Stoutner, like email messages and comments on stoutner.com.

- - -

Use of Information

-

Stoutner may use this information to assist in the development of Privacy Browser and communicate the status of the project to users. - Stoutner will never sell this information nor transfer it to any third party that would use it for advertising or marketing.

- -
-

Revision 1.6, 22 May 2018

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_domain_settings.html b/app/src/main/assets/en/guide_domain_settings.html new file mode 100644 index 00000000..28d90e2b --- /dev/null +++ b/app/src/main/assets/en/guide_domain_settings.html @@ -0,0 +1,42 @@ + + + + + + + + + + + + + +

Secure Web Browsing

+ +

Privacy Browser’s default is to browse with JavaScript, cookies, and DOM storage disabled. + However, some websites legitimately need these features enabled to function correctly. + Domain settings can automatically turn on a specified set of features when visiting a designated domain.

+ + + +

When visiting a domain that has domain settings specified, the background of the URL text box is green.

+ + + + \ No newline at end of file diff --git a/app/src/main/assets/en/guide_domain_settings_dark.html b/app/src/main/assets/en/guide_domain_settings_dark.html deleted file mode 100644 index 73e661fa..00000000 --- a/app/src/main/assets/en/guide_domain_settings_dark.html +++ /dev/null @@ -1,39 +0,0 @@ - - - - - - - - - - -

Secure Web Browsing

- -

Privacy Browser’s default is to browse with JavaScript, cookies, and DOM storage disabled. - However, some websites legitimately need these features enabled to function correctly. - Domain settings can automatically turn on a specified set of features when visiting a designated domain.

- -

- -

When visiting a domain that has domain settings specified, the background of the URL text box is green.

- -

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_domain_settings_light.html b/app/src/main/assets/en/guide_domain_settings_light.html deleted file mode 100644 index 4e9a8956..00000000 --- a/app/src/main/assets/en/guide_domain_settings_light.html +++ /dev/null @@ -1,39 +0,0 @@ - - - - - - - - - - -

Secure Web Browsing

- -

Privacy Browser’s default is to browse with JavaScript, cookies, and DOM storage disabled. - However, some websites legitimately need these features enabled to function correctly. - Domain settings can automatically turn on a specified set of features when visiting a designated domain.

- -

- -

When visiting a domain that has domain settings specified, the background of the URL text box is green.

- -

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_javascript.html b/app/src/main/assets/en/guide_javascript.html new file mode 100644 index 00000000..419dd0b2 --- /dev/null +++ b/app/src/main/assets/en/guide_javascript.html @@ -0,0 +1,61 @@ + + + + + + + + + + + + + +

JavaScript Is Powerful

+ +

Back in the early days of the internet, web pages were static, meaning they they contained text and images that were displayed on the screen but didn’t change or interact with the user. + Of course, only so much that is interesting can happen with static content. Several different technologies were developed to facilitate dynamic web pages. + JavaScript is one of these technologies.

+ +

JavaScript is a programming language. Many web servers host programs written in JavaScript, which are sent to devices as part of the web page. + The device runs the JavaScript on its local processor and follows the commands of the program, which can animate images on the website, popup a menu, and do many other useful things.

+ + +

JavaScript Is Dangerous

+ +

Of course, the concept of running arbitrary programs from a website is potentially dangerous. So there are limitations placed on JavaScript to keep it from doing things like installing viruses. + However, it turns out that these limitations are overly broad. + Below is a screenshot from webkay, which is a website that demonstrates the type of information that JavaScript can produce about a device. + Browser Leaks is another good resource.

+ +

+ +

For privacy purposes, the ideal would be to browse the internet with JavaScript disabled. + However, there are some websites that legitimately require JavaScript to accomplish their purposes + and others that don’t work correctly without JavaScript even though they could be programmed to do so. + Privacy Browser addresses this by making it easy to toggle JavaScript on and off. + Tapping the privacy shield will toggle it between blue or yellow + (both of which indicate that JavaScript is disabled) and red (JavaScript enabled). + Looking at the different information webkay can collect with JavaScript enabled and disabled is informative.

+ +

Browsing the internet with JavaScript disabled, and only enabling it if needed, goes a long way toward protecting privacy. + In addition, JavaScript is used to load much of the annoying advertisements and extra cruft that comes along with most modern websites. + With it disabled, websites will load faster, consume less network traffic, and use less CPU power, which leads to longer battery life.

+ + \ No newline at end of file diff --git a/app/src/main/assets/en/guide_javascript_dark.html b/app/src/main/assets/en/guide_javascript_dark.html deleted file mode 100644 index 0a03a68d..00000000 --- a/app/src/main/assets/en/guide_javascript_dark.html +++ /dev/null @@ -1,58 +0,0 @@ - - - - - - - - - - -

JavaScript Is Powerful

- -

Back in the early days of the internet, web pages were static, meaning they they contained text and images that were displayed on the screen but didn’t change or interact with the user. - Of course, only so much that is interesting can happen with static content. Several different technologies were developed to facilitate dynamic web pages. - JavaScript is one of these technologies.

- -

JavaScript is a programming language. Many web servers host programs written in JavaScript, which are sent to devices as part of the web page. - The device runs the JavaScript on its local processor and follows the commands of the program, which can animate images on the website, popup a menu, and do many other useful things.

- - -

JavaScript Is Dangerous

- -

Of course, the concept of running arbitrary programs from a website is potentially dangerous. So there are limitations placed on JavaScript to keep it from doing things like installing viruses. - However, it turns out that these limitations are overly broad. - Below is a screenshot from webkay, which is a website that demonstrates the type of information that JavaScript can produce about a device. - Browser Leaks is another good resource.

- -

- -

For privacy purposes, the ideal would be to browse the internet with JavaScript disabled. - However, there are some websites that legitimately require JavaScript to accomplish their purposes - and others that don’t work correctly without JavaScript even though they could be programmed to do so. - Privacy Browser addresses this by making it easy to toggle JavaScript on and off. - Tapping the privacy shield will toggle it between blue or yellow - (both of which indicate that JavaScript is disabled) and red (JavaScript enabled). - Looking at the different information webkay can collect with JavaScript enabled and disabled is informative.

- -

Browsing the internet with JavaScript disabled, and only enabling it if needed, goes a long way toward protecting privacy. - In addition, JavaScript is used to load much of the annoying advertisements and extra cruft that comes along with most modern websites. - With it disabled, websites will load faster, consume less network traffic, and use less CPU power, which leads to longer battery life.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_javascript_light.html b/app/src/main/assets/en/guide_javascript_light.html deleted file mode 100644 index 0e5c3d62..00000000 --- a/app/src/main/assets/en/guide_javascript_light.html +++ /dev/null @@ -1,58 +0,0 @@ - - - - - - - - - - -

JavaScript Is Powerful

- -

Back in the early days of the internet, web pages were static, meaning they they contained text and images that were displayed on the screen but didn’t change or interact with the user. - Of course, only so much that is interesting can happen with static content. Several different technologies were developed to facilitate dynamic web pages. - JavaScript is one of these technologies.

- -

JavaScript is a programming language. Many web servers host programs written in JavaScript, which are sent to devices as part of the web page. - The device runs the JavaScript on its local processor and follows the commands of the program, which can animate images on the website, popup a menu, and do many other useful things.

- - -

JavaScript Is Dangerous

- -

Of course, the concept of running arbitrary programs from a website is potentially dangerous. So there are limitations placed on JavaScript to keep it from doing things like installing viruses. - However, it turns out that these limitations are overly broad. - Below is a screenshot from webkay, which is a website that demonstrates the type of information that JavaScript can produce about a device. - Browser Leaks is another good resource.

- -

- -

For privacy purposes, the ideal would be to browse the internet with JavaScript disabled. - However, there are some websites that legitimately require JavaScript to accomplish their purposes - and others that don’t work correctly without JavaScript even though they could be programmed to do so. - Privacy Browser addresses this by making it easy to toggle JavaScript on and off. - Tapping the privacy shield will toggle it between blue or yellow - (both of which indicate that JavaScript is disabled) and red (JavaScript enabled). - Looking at the different information webkay can collect with JavaScript enabled and disabled is informative.

- -

Browsing the internet with JavaScript disabled, and only enabling it if needed, goes a long way toward protecting privacy. - In addition, JavaScript is used to load much of the annoying advertisements and extra cruft that comes along with most modern websites. - With it disabled, websites will load faster, consume less network traffic, and use less CPU power, which leads to longer battery life.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_local_storage.html b/app/src/main/assets/en/guide_local_storage.html new file mode 100644 index 00000000..dcc22eba --- /dev/null +++ b/app/src/main/assets/en/guide_local_storage.html @@ -0,0 +1,92 @@ + + + + + + + + + + + + + +

First-Party Cookies

+ +

First-party cookies are set by the website in the URL bar at the top of the page.

+ +

From the early days of the internet, it became obvious that it would be advantageous for websites to be able to store information on a computer for future access. + For example, a website that displays weather information could ask the user for a zip code, and then store it in a cookie. + The next time the user visited the website, weather information would automatically load for that zip code, without the user having to enter it again.

+ +

Like everything else on the web, clever people figured out all types of ways to abuse cookies to do things that users would not approve of if they knew they were happening. + For example, a website can set a cookie with a unique serial number on a device. + Then, every time a user visits the website on that device, it can be linked to a unique profile the server maintains for that serial number, + even if the device connects from different IP addresses.

+ +

Almost all websites with logins require first-party cookies to be enabled for a user to log in. + That is how they make sure it is still you as you move from page to page on the site, and is, in my opinion, one of the few legitimate uses for cookies.

+ +

If first-party cookies are enabled but JavaScript is disabled, the privacy icon will be yellow as a warning.

+ + +

Third-Party Cookies

+ +

Third-party cookies are set by portions of a website that are loaded from servers different from the URL at the top of the page. + For example, most website that have advertisements load them from a third-party ad broker, like Google’s Ad Sense. + Every time the website loads, it requests the ad broker to display an ad. + The ad broker analyzes any information they may have about the user, looks at the current rate advertisers are willing to pay for their ads, and selects the one to display. + The section of the website that displays the ads is loaded from the third-party broker’s server instead of the main server.

+ +

Because most of the advertisements on the internet are processed by only a few brokers, + it didn’t take long for them to realize that they could set a tracking cookie on the user’s device and know every place that user goes. + Every time an ad loads from a broker, the first thing it does it check to see if if the device already has a unique serial number in a tracking cookie. + If it does, it looks up the profile for that serial number and makes a note of the new site. + This is why a user can do a search on one website for a product they typically don’t look for, like walnuts, + and then suddenly start seeing advertisements for walnuts on every website they visit.

+ +

In addition to ad brokers, social media sites discovered they could get in on the action. + A few years ago, the major social media sites like Facebook and Twitter convinced a large number of websites + that it would be in their best interest to place little social media icons on their pages. + These are not just images. They contain embedded code that links back to the social media site, and, among other things, + loads a third-party cookie on the device. These cookies are placed even if the user does not have an account with the social media platform. + Over time, companies like Facebook (which also runs an ad network) have built up quite a large number of detailed profiles about people who have + never even created an account on their site.

+ +

There is no good reason to ever enable third-party cookies. On devices with Android KitKat or older (version <= 4.4.4 or API <= 20), WebView does not + differentiate + between first-party and third-party cookies. Thus, enabling first-party cookies will also enable third-party cookies.

+ + +

DOM Storage

+ +

Document Object Model storage, also known as web storage, is like cookies on steroids. + Whereas the maximum combined storage size for all cookies from a single URL is 4 kilobytes, + DOM storage can hold megabytes per site. + Because DOM storage uses JavaScript to read and write data, it cannot be enabled unless JavaScript is also enabled.

+ + +

Form Data

+ +

Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. + Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. + Beginning in Android Oreo (8.0), WebView’s form data was replaced by the Autofill service. + As such, controls for form data no longer appear on newer Android devices.

+ + \ No newline at end of file diff --git a/app/src/main/assets/en/guide_local_storage_dark.html b/app/src/main/assets/en/guide_local_storage_dark.html deleted file mode 100644 index cc94112b..00000000 --- a/app/src/main/assets/en/guide_local_storage_dark.html +++ /dev/null @@ -1,88 +0,0 @@ - - - - - - - - - - -

First-Party Cookies

- -

First-party cookies are set by the website in the URL bar at the top of the page.

- -

From the early days of the internet, it became obvious that it would be advantageous for websites to be able to store information on a computer for future access. - For example, a website that displays weather information could ask the user for a zip code, and then store it in a cookie. - The next time the user visited the website, weather information would automatically load for that zip code, without the user having to enter it again.

- -

Like everything else on the web, clever people figured out all types of ways to abuse cookies to do things that users would not approve of if they knew they were happening. - For example, a website can set a cookie with a unique serial number on a device. - Then, every time a user visits the website on that device, it can be linked to a unique profile the server maintains for that serial number, - even if the device connects from different IP addresses.

- -

Almost all websites with logins require first-party cookies to be enabled for a user to log in. - That is how they make sure it is still you as you move from page to page on the site, and is, in my opinion, one of the few legitimate uses for cookies.

- -

If first-party cookies are enabled but JavaScript is disabled, the privacy icon will be yellow as a warning.

- - -

Third-Party Cookies

- -

Third-party cookies are set by portions of a website that are loaded from servers different from the URL at the top of the page. - For example, most website that have advertisements load them from a third-party ad broker, like Google’s Ad Sense. - Every time the website loads, it requests the ad broker to display an ad. - The ad broker analyzes any information they may have about the user, looks at the current rate advertisers are willing to pay for their ads, and selects the one to display. - The section of the website that displays the ads is loaded from the third-party broker’s server instead of the main server.

- -

Because most of the advertisements on the internet are processed by only a few brokers, - it didn’t take long for them to realize that they could set a tracking cookie on the user’s device and know every place that user goes. - Every time an ad loads from a broker, the first thing it does it check to see if if the device already has a unique serial number in a tracking cookie. - If it does, it looks up the profile for that serial number and makes a note of the new site. - This is why a user can do a search on one website for a product they typically don’t look for, like walnuts, - and then suddenly start seeing advertisements for walnuts on every website they visit.

- -

In addition to ad brokers, social media sites discovered they could get in on the action. - A few years ago, the major social media sites like Facebook and Twitter convinced a large number of websites - that it would be in their best interest to place little social media icons on their pages. - These are not just images. They contain embedded code that links back to the social media site, and, among other things, - loads a third-party cookie on the device. These cookies are placed even if the user does not have an account with the social media platform. - Over time, companies like Facebook (which also runs an ad network) have built up quite a large number of detailed profiles about people who have - never even created an account on their site.

- -

There is no good reason to ever enable third-party cookies. On devices with Android KitKat or older (version <= 4.4.4 or API <= 20), WebView does not - differentiate - between first-party and third-party cookies. Thus, enabling first-party cookies will also enable third-party cookies.

- -

DOM Storage

- -

Document Object Model storage, also known as web storage, is like cookies on steroids. - Whereas the maximum combined storage size for all cookies from a single URL is 4 kilobytes, - DOM storage can hold megabytes per site. - Because DOM storage uses JavaScript to read and write data, it cannot be enabled unless JavaScript is also enabled.

- - -

Form Data

- -

Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. - Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. - Beginning in Android Oreo (8.0), WebView’s form data was replaced by the Autofill service. - As such, controls for form data no longer appear on newer Android devices.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_local_storage_light.html b/app/src/main/assets/en/guide_local_storage_light.html deleted file mode 100644 index 280986be..00000000 --- a/app/src/main/assets/en/guide_local_storage_light.html +++ /dev/null @@ -1,89 +0,0 @@ - - - - - - - - - - -

First-Party Cookies

- -

First-party cookies are set by the website in the URL bar at the top of the page.

- -

From the early days of the internet, it became obvious that it would be advantageous for websites to be able to store information on a computer for future access. - For example, a website that displays weather information could ask the user for a zip code, and then store it in a cookie. - The next time the user visited the website, weather information would automatically load for that zip code, without the user having to enter it again.

- -

Like everything else on the web, clever people figured out all types of ways to abuse cookies to do things that users would not approve of if they knew they were happening. - For example, a website can set a cookie with a unique serial number on a device. - Then, every time a user visits the website on that device, it can be linked to a unique profile the server maintains for that serial number, - even if the device connects from different IP addresses.

- -

Almost all websites with logins require first-party cookies to be enabled for a user to log in. - That is how they make sure it is still you as you move from page to page on the site, and is, in my opinion, one of the few legitimate uses for cookies.

- -

If first-party cookies are enabled but JavaScript is disabled, the privacy icon will be yellow as a warning.

- - -

Third-Party Cookies

- -

Third-party cookies are set by portions of a website that are loaded from servers different from the URL at the top of the page. - For example, most website that have advertisements load them from a third-party ad broker, like Google’s Ad Sense. - Every time the website loads, it requests the ad broker to display an ad. - The ad broker analyzes any information they may have about the user, looks at the current rate advertisers are willing to pay for their ads, and selects the one to display. - The section of the website that displays the ads is loaded from the third-party broker’s server instead of the main server.

- -

Because most of the advertisements on the internet are processed by only a few brokers, - it didn’t take long for them to realize that they could set a tracking cookie on the user’s device and know every place that user goes. - Every time an ad loads from a broker, the first thing it does it check to see if if the device already has a unique serial number in a tracking cookie. - If it does, it looks up the profile for that serial number and makes a note of the new site. - This is why a user can do a search on one website for a product they typically don’t look for, like walnuts, - and then suddenly start seeing advertisements for walnuts on every website they visit.

- -

In addition to ad brokers, social media sites discovered they could get in on the action. - A few years ago, the major social media sites like Facebook and Twitter convinced a large number of websites - that it would be in their best interest to place little social media icons on their pages. - These are not just images. They contain embedded code that links back to the social media site, and, among other things, - loads a third-party cookie on the device. These cookies are placed even if the user does not have an account with the social media platform. - Over time, companies like Facebook (which also runs an ad network) have built up quite a large number of detailed profiles about people who have - never even created an account on their site.

- -

There is no good reason to ever enable third-party cookies. On devices with Android KitKat or older (version <= 4.4.4 or API <= 20), WebView does not - differentiate - between first-party and third-party cookies. Thus, enabling first-party cookies will also enable third-party cookies.

- - -

DOM Storage

- -

Document Object Model storage, also known as web storage, is like cookies on steroids. - Whereas the maximum combined storage size for all cookies from a single URL is 4 kilobytes, - DOM storage can hold megabytes per site. - Because DOM storage uses JavaScript to read and write data, it cannot be enabled unless JavaScript is also enabled.

- - -

Form Data

- -

Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. - Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. - Beginning in Android Oreo (8.0), WebView’s form data was replaced by the Autofill service. - As such, controls for form data no longer appear on newer Android devices.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_overview.html b/app/src/main/assets/en/guide_overview.html new file mode 100644 index 00000000..4cda1de3 --- /dev/null +++ b/app/src/main/assets/en/guide_overview.html @@ -0,0 +1,49 @@ + + + + + + + + + + + + + +

True Privacy

+ +

Privacy Browser is designed to let you take as much control of your privacy as possible while still browsing the internet. + When a browser connects to a website, certain pieces of information which are necessary to facilitate the connection are transferred to the server. + For example, the server will receive your IP address and a port number, which are necessary for it to know where to send the response. + This information is often logged by the server, allowing the website developer to produce reports showing how often a webpage was loaded and how many different IP addresses accessed it.

+ +

However, most website operators want more information about their visitors, including tracking their web browsing across multiple websites. + There are many different techniques, including requesting or placing extra information on a user’s device, that facilitate this tracking. + Almost all browsers will voluntarily participate in this tracking without informing the user they are doing so. + Privacy Browser is designed to grant the user as much information and control over these tracking techniques as possible.

+ + +

Android’s WebView Limitations

+ +

Privacy Browser uses Android’s built-in WebView to render websites. There are some limitations in the controls WebView exposes for managing privacy settings. + For example, it isn’t possible to enable some JavaScript commands while disabling others. + In the future, Privacy Browser will switch to a custom WebView called Privacy WebView.

+ + \ No newline at end of file diff --git a/app/src/main/assets/en/guide_overview_dark.html b/app/src/main/assets/en/guide_overview_dark.html deleted file mode 100644 index 29fc4917..00000000 --- a/app/src/main/assets/en/guide_overview_dark.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -

True Privacy

- -

Privacy Browser is designed to let you take as much control of your privacy as possible while still browsing the internet. - When a browser connects to a website, certain pieces of information which are necessary to facilitate the connection are transferred to the server. - For example, the server will receive your IP address and a port number, which are necessary for it to know where to send the response. - This information is often logged by the server, allowing the website developer to produce reports showing how often a webpage was loaded and how many different IP addresses accessed it.

- -

However, most website operators want more information about their visitors, including tracking their web browsing across multiple websites. - There are many different techniques, including requesting or placing extra information on a user’s device, that facilitate this tracking. - Almost all browsers will voluntarily participate in this tracking without informing the user they are doing so. - Privacy Browser is designed to grant the user as much information and control over these tracking techniques as possible.

- - -

Android’s WebView Limitations

- -

Privacy Browser uses Android’s built-in WebView to render websites. There are some limitations in the controls WebView exposes for managing privacy settings. - For example, it isn’t possible to enable some JavaScript commands while disabling others. - In the future, Privacy Browser will switch to a custom WebView called Privacy WebView.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_overview_light.html b/app/src/main/assets/en/guide_overview_light.html deleted file mode 100644 index ef717bcc..00000000 --- a/app/src/main/assets/en/guide_overview_light.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -

True Privacy

- -

Privacy Browser is designed to let you take as much control of your privacy as possible while still browsing the internet. - When a browser connects to a website, certain pieces of information which are necessary to facilitate the connection are transferred to the server. - For example, the server will receive your IP address and a port number, which are necessary for it to know where to send the response. - This information is often logged by the server, allowing the website developer to produce reports showing how often a webpage was loaded and how many different IP addresses accessed it.

- -

However, most website operators want more information about their visitors, including tracking their web browsing across multiple websites. - There are many different techniques, including requesting or placing extra information on a user’s device, that facilitate this tracking. - Almost all browsers will voluntarily participate in this tracking without informing the user they are doing so. - Privacy Browser is designed to grant the user as much information and control over these tracking techniques as possible.

- - -

Android’s WebView Limitations

- -

Privacy Browser uses Android’s built-in WebView to render websites. There are some limitations in the controls WebView exposes for managing privacy settings. - For example, it isn’t possible to enable some JavaScript commands while disabling others. - In the future, Privacy Browser will switch to a custom WebView called Privacy WebView.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_proxies.html b/app/src/main/assets/en/guide_proxies.html new file mode 100644 index 00000000..31d810dc --- /dev/null +++ b/app/src/main/assets/en/guide_proxies.html @@ -0,0 +1,80 @@ + + + + + + + + + + + + + +

Proxies and Their Limits

+ +

There are two general categories of bad actors that want to infringe on the privacy of the web: + malicious governments with access to ISPs (Internet Service Providers) and mega corporations that run social and advertising networks. + Proxies like TOR (The Onion Router) and I2P (the Invisible Internet Project) are useful in protecting privacy from malicious governments (which spy on traffic in transit) + but not from mega corporations (which embed malicious code on web servers).

+ + +

Malicious Governments

+ +

Malicious governments often spy on their citizens to punish dissent or human rights activity. + They commonly either operate the local ISPs or they can force them to disclose information showing every IP address that is visited by each user. + Layered proxies are designed to defeat this infringement of privacy by encrypting the traffic from a user’s device and routing it through multiple servers on the internet + before sending it on to the final destination. + This means that no individual ISP, server, or website, can know both the IP address of the user’s device and the IP address of the final web server. + Malicious governments and the ISPs they control cannot tell which web servers a user is accessing, although they can tell that the user is using a layered proxy service. + In some parts of the world, using proxies could be construed as an evidence of illegal behavior (“If you didn’t have anything to hide you wouldn’t be encrypting your traffic”) + and users could be punished because governments assume they are doing something that is prohibited. Thus, proxies can be helpful, but they aren’t a panacea.

+ + +

Mega Corporations

+ +

When a user connects to a web server, the web server can see the user’s IP address. + Although it isn’t a perfect science, IP addresses can be turned into physical addresses with a fair amount of accuracy. + Small web servers typically rely on IP addresses to identify the location of the users visiting their site. Proxies are a good solution to mask the user’s location from these servers. + But large mega corporations that own social media and advertising networks use a whole profile of information that is designed to track users across devices and IP addresses. + These profiles employ a variety of techniques to identify users, including JavaScript, cookies, tracking IDs, and browser fingerprinting. + Because the vast majority of the websites on the internet either load an ad from one of the major networks or embed social media icons with their associated JavaScript, + these corporations have built profiles for almost every online user and can track their internet activity across unrelated sites.

+ +

They track every site that is visited, everything that is purchased, every credit card that is used to make a purchase, every address that items are shipped to, + and the GPS metadata of every picture that is uploaded to the internet. + They build a profile of a user’s age, gender, marital status, address, political affiliations, religious affiliations, family circumstances, number of pets, + and everything else they can get their hands on. + They even buy up databases of credit card transactions at local stores, so they can track the off-line purchasing patterns of the users in their profiles. + Because they already have much more accurate address information about a user than an IP address discloses, proxies provides no real privacy protection against mega corporations.

+ +

The single best privacy protection against mega corporations is to browse the web with JavaScript disabled, followed by blocking ad networks, disabling cookies and DOM storage, + and using a browser that is difficult to fingerprint.

+ + +

Using Proxies

+ +

Despite their limitations, proxies can be useful in some circumstances. + Tor and I2P + have Android apps that make it easy to use their proxy networks. When proxying is turned on in Privacy Browser, the app bar will have a light blue background instead of the default light grey. + Because traffic is being routed through several proxy nodes, using a layered proxy is often much slower than connecting directly to the internet.

+ + + + \ No newline at end of file diff --git a/app/src/main/assets/en/guide_proxies_dark.html b/app/src/main/assets/en/guide_proxies_dark.html deleted file mode 100644 index 1ba63a18..00000000 --- a/app/src/main/assets/en/guide_proxies_dark.html +++ /dev/null @@ -1,77 +0,0 @@ - - - - - - - - - - -

Proxies and Their Limits

- -

There are two general categories of bad actors that want to infringe on the privacy of the web: - malicious governments with access to ISPs (Internet Service Providers) and mega corporations that run social and advertising networks. - Proxies like TOR (The Onion Router) and I2P (the Invisible Internet Project) are useful in protecting privacy from malicious governments (which spy on traffic in transit) - but not from mega corporations (which embed malicious code on web servers).

- - -

Malicious Governments

- -

Malicious governments often spy on their citizens to punish dissent or human rights activity. - They commonly either operate the local ISPs or they can force them to disclose information showing every IP address that is visited by each user. - Layered proxies are designed to defeat this infringement of privacy by encrypting the traffic from a user’s device and routing it through multiple servers on the internet - before sending it on to the final destination. - This means that no individual ISP, server, or website, can know both the IP address of the user’s device and the IP address of the final web server. - Malicious governments and the ISPs they control cannot tell which web servers a user is accessing, although they can tell that the user is using a layered proxy service. - In some parts of the world, using proxies could be construed as an evidence of illegal behavior (“If you didn’t have anything to hide you wouldn’t be encrypting your traffic”) - and users could be punished because governments assume they are doing something that is prohibited. Thus, proxies can be helpful, but they aren’t a panacea.

- - -

Mega Corporations

- -

When a user connects to a web server, the web server can see the user’s IP address. - Although it isn’t a perfect science, IP addresses can be turned into physical addresses with a fair amount of accuracy. - Small web servers typically rely on IP addresses to identify the location of the users visiting their site. Proxies are a good solution to mask the user’s location from these servers. - But large mega corporations that own social media and advertising networks use a whole profile of information that is designed to track users across devices and IP addresses. - These profiles employ a variety of techniques to identify users, including JavaScript, cookies, tracking IDs, and browser fingerprinting. - Because the vast majority of the websites on the internet either load an ad from one of the major networks or embed social media icons with their associated JavaScript, - these corporations have built profiles for almost every online user and can track their internet activity across unrelated sites.

- -

They track every site that is visited, everything that is purchased, every credit card that is used to make a purchase, every address that items are shipped to, - and the GPS metadata of every picture that is uploaded to the internet. - They build a profile of a user’s age, gender, marital status, address, political affiliations, religious affiliations, family circumstances, number of pets, - and everything else they can get their hands on. - They even buy up databases of credit card transactions at local stores, so they can track the off-line purchasing patterns of the users in their profiles. - Because they already have much more accurate address information about a user than an IP address discloses, proxies provides no real privacy protection against mega corporations.

- -

The single best privacy protection against mega corporations is to browse the web with JavaScript disabled, followed by blocking ad networks, disabling cookies and DOM storage, - and using a browser that is difficult to fingerprint.

- - -

Using Proxies

- -

Despite their limitations, proxies can be useful in some circumstances. - Tor and I2P - have Android apps that make it easy to use their proxy networks. When proxying is turned on in Privacy Browser, the app bar will have a light blue background instead of the default light grey. - Because traffic is being routed through several proxy nodes, using a layered proxy is often much slower than connecting directly to the internet.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_proxies_light.html b/app/src/main/assets/en/guide_proxies_light.html deleted file mode 100644 index 8e305119..00000000 --- a/app/src/main/assets/en/guide_proxies_light.html +++ /dev/null @@ -1,77 +0,0 @@ - - - - - - - - - - -

Proxies and Their Limits

- -

There are two general categories of bad actors that want to infringe on the privacy of the web: - malicious governments with access to ISPs (Internet Service Providers) and mega corporations that run social and advertising networks. - Proxies like TOR (The Onion Router) and I2P (the Invisible Internet Project) are useful in protecting privacy from malicious governments (which spy on traffic in transit) - but not from mega corporations (which embed malicious code on web servers).

- - -

Malicious Governments

- -

Malicious governments often spy on their citizens to punish dissent or human rights activity. - They commonly either operate the local ISPs or they can force them to disclose information showing every IP address that is visited by each user. - Layered proxies are designed to defeat this infringement of privacy by encrypting the traffic from a user’s device and routing it through multiple servers on the internet - before sending it on to the final destination. - This means that no individual ISP, server, or website, can know both the IP address of the user’s device and the IP address of the final web server. - Malicious governments and the ISPs they control cannot tell which web servers a user is accessing, although they can tell that the user is using a layered proxy service. - In some parts of the world, using proxies could be construed as an evidence of illegal behavior (“If you didn’t have anything to hide you wouldn’t be encrypting your traffic”) - and users could be punished because governments assume they are doing something that is prohibited. Thus, proxies can be helpful, but they aren’t a panacea.

- - -

Mega Corporations

- -

When a user connects to a web server, the web server can see the user’s IP address. - Although it isn’t a perfect science, IP addresses can be turned into physical addresses with a fair amount of accuracy. - Small web servers typically rely on IP addresses to identify the location of the users visiting their site. Proxies are a good solution to mask the user’s location from these servers. - But large mega corporations that own social media and advertising networks use a whole profile of information that is designed to track users across devices and IP addresses. - These profiles employ a variety of techniques to identify users, including JavaScript, cookies, tracking IDs, and browser fingerprinting. - Because the vast majority of the websites on the internet either load an ad from one of the major networks or embed social media icons with their associated JavaScript, - these corporations have built profiles for almost every online user and can track their internet activity across unrelated sites.

- -

They track every site that is visited, everything that is purchased, every credit card that is used to make a purchase, every address that items are shipped to, - and the GPS metadata of every picture that is uploaded to the internet. - They build a profile of a user’s age, gender, marital status, address, political affiliations, religious affiliations, family circumstances, number of pets, - and everything else they can get their hands on. - They even buy up databases of credit card transactions at local stores, so they can track the off-line purchasing patterns of the users in their profiles. - Because they already have much more accurate address information about a user than an IP address discloses, proxies provides no real privacy protection against mega corporations.

- -

The single best privacy protection against mega corporations is to browse the web with JavaScript disabled, followed by blocking ad networks, disabling cookies and DOM storage, - and using a browser that is difficult to fingerprint.

- - -

Using Proxies

- -

Despite their limitations, proxies can be useful in some circumstances. - Tor and I2P - have Android apps that make it easy to use their proxy networks. When proxying is turned on in Privacy Browser, the app bar will have a light blue background instead of the default light grey. - Because traffic is being routed through several proxy nodes, using a layered proxy is often much slower than connecting directly to the internet.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_requests.html b/app/src/main/assets/en/guide_requests.html new file mode 100644 index 00000000..bfd6d8fa --- /dev/null +++ b/app/src/main/assets/en/guide_requests.html @@ -0,0 +1,83 @@ + + + + + + + + + + + + + +

Resource Requests

+ +

When a URL is loaded, it typically makes a number of resource requests for CCS, JavaScript, image, and other files. Details about these requests can be viewed in the Requests activity. + The navigation drawer has a link to the Requests activity and also shows how many requests were blocked. Tapping on a request displays details about why it was allowed or blocked.

+ + + +

Privacy Browser includes four common blocklists based on the Adblock syntax: + EasyList, EasyPrivacy, Fanboy’s Annoyance List, and Fanboy’s Social Blocking List. + These blocklists are processed by Privacy Browser into the following 22 sublists, which check resource requests in the order listed.

+ +
    +
  1. Main Whitelist
  2. +
  3. Final Whitelist
  4. +
  5. Domain Whitelist
  6. +
  7. Domain Initial Whitelist
  8. +
  9. Domain Final Whitelist
  10. +
  11. Third-Party Whitelist
  12. +
  13. Third-Party Domain Whitelist
  14. +
  15. Third-Party Domain Initial Whitelist
  16. +
  17. Main Blacklist
  18. +
  19. Initial Blacklist
  20. +
  21. Final Blacklist
  22. +
  23. Domain Blacklist
  24. +
  25. Domain Initial Blacklist
  26. +
  27. Domain Final Blacklist
  28. +
  29. Domain Regular Expression Blacklist
  30. +
  31. Third-Party Blacklist
  32. +
  33. Third-Party Initial Blacklist
  34. +
  35. Third-Party Domain Blacklist
  36. +
  37. Third-Party Domain Initial Blacklist
  38. +
  39. Third-Party Regular Expression Blacklist
  40. +
  41. Third-Party Domain Regular Expression Blacklist
  42. +
  43. Regular Expression Blacklist
  44. +
+ +

Initial lists check against the beginning of the URL. Final lists check against the end of the URL. Domain lists only check against certain domains. + Third-party lists only apply if the root domain of the request is different than the root domain of the main URL. + Regular expression lists follow the regular expression syntax. Each sublist item has one or more entry. + In the case of domain sublists, the resource request is only checked against the item if the first entry matches the domain of the main URL.

+ +

Because of limitations in Android’s WebView, and to speed up processing of requests, Privacy Browser implements a simplified interpretation of the Adblock syntax. + This can sometimes lead to false positives, where resources are allowed or blocked in ways that weren’t intended by the original entry. + A more detailed description of how the blocklist entries are processed is available at stoutner.com.

+ +

Privacy Browser has three additional blocklists. + UltraList and UltraPrivacy + block ads and trackers that EasyList and EasyPrivacy do not. The third blocks all third-party requests. + A request is only considered third-party if the base domain of the request is different than the base domain of the URL. + For example, if www.website.com loads a picture from images.website.com, + this is not blocked as a third-party request because they both share the same base domain of website.com. + Blocking all third-party requests increases privacy, but this blocklist is disabled by default because it breaks a large number of websites.

+ + \ No newline at end of file diff --git a/app/src/main/assets/en/guide_requests_dark.html b/app/src/main/assets/en/guide_requests_dark.html deleted file mode 100644 index 0f5c33c3..00000000 --- a/app/src/main/assets/en/guide_requests_dark.html +++ /dev/null @@ -1,80 +0,0 @@ - - - - - - - - - - -

Resource Requests

- -

When a URL is loaded, it typically makes a number of resource requests for CCS, JavaScript, image, and other files. Details about these requests can be viewed in the Requests activity. - The navigation drawer has a link to the Requests activity and also shows how many requests were blocked. Tapping on a request displays details about why it was allowed or blocked.

- -

- -

Privacy Browser includes four common blocklists based on the Adblock syntax: - EasyList, EasyPrivacy, Fanboy’s Annoyance List, and Fanboy’s Social Blocking List. - These blocklists are processed by Privacy Browser into the following 22 sublists, which check resource requests in the order listed.

- -
    -
  1. Main Whitelist
  2. -
  3. Final Whitelist
  4. -
  5. Domain Whitelist
  6. -
  7. Domain Initial Whitelist
  8. -
  9. Domain Final Whitelist
  10. -
  11. Third-Party Whitelist
  12. -
  13. Third-Party Domain Whitelist
  14. -
  15. Third-Party Domain Initial Whitelist
  16. -
  17. Main Blacklist
  18. -
  19. Initial Blacklist
  20. -
  21. Final Blacklist
  22. -
  23. Domain Blacklist
  24. -
  25. Domain Initial Blacklist
  26. -
  27. Domain Final Blacklist
  28. -
  29. Domain Regular Expression Blacklist
  30. -
  31. Third-Party Blacklist
  32. -
  33. Third-Party Initial Blacklist
  34. -
  35. Third-Party Domain Blacklist
  36. -
  37. Third-Party Domain Initial Blacklist
  38. -
  39. Third-Party Regular Expression Blacklist
  40. -
  41. Third-Party Domain Regular Expression Blacklist
  42. -
  43. Regular Expression Blacklist
  44. -
- -

Initial lists check against the beginning of the URL. Final lists check against the end of the URL. Domain lists only check against certain domains. - Third-party lists only apply if the root domain of the request is different than the root domain of the main URL. - Regular expression lists follow the regular expression syntax. Each sublist item has one or more entry. - In the case of domain sublists, the resource request is only checked against the item if the first entry matches the domain of the main URL.

- -

Because of limitations in Android’s WebView, and to speed up processing of requests, Privacy Browser implements a simplified interpretation of the Adblock syntax. - This can sometimes lead to false positives, where resources are allowed or blocked in ways that weren’t intended by the original entry. - A more detailed description of how the blocklist entries are processed is available at stoutner.com.

- -

Privacy Browser has three additional blocklists. - UltraList and UltraPrivacy - block ads and trackers that EasyList and EasyPrivacy do not. The third blocks all third-party requests. - A request is only considered third-party if the base domain of the request is different than the base domain of the URL. - For example, if www.website.com loads a picture from images.website.com, - this is not blocked as a third-party request because they both share the same base domain of website.com. - Blocking all third-party requests increases privacy, but this blocklist is disabled by default because it breaks a large number of websites.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_requests_light.html b/app/src/main/assets/en/guide_requests_light.html deleted file mode 100644 index 87ac5ad4..00000000 --- a/app/src/main/assets/en/guide_requests_light.html +++ /dev/null @@ -1,80 +0,0 @@ - - - - - - - - - - -

Resource Requests

- -

When a URL is loaded, it typically makes a number of resource requests for CCS, JavaScript, image, and other files. Details about these requests can be viewed in the Requests activity. - The navigation drawer has a link to the Requests activity and also shows how many requests were blocked. Tapping on a request displays details about why it was allowed or blocked.

- -

- -

Privacy Browser includes four common blocklists based on the Adblock syntax: - EasyList, EasyPrivacy, Fanboy’s Annoyance List, and Fanboy’s Social Blocking List. - These blocklists are processed by Privacy Browser into the following 22 sublists, which check resource requests in the order listed.

- -
    -
  1. Main Whitelist
  2. -
  3. Final Whitelist
  4. -
  5. Domain Whitelist
  6. -
  7. Domain Initial Whitelist
  8. -
  9. Domain Final Whitelist
  10. -
  11. Third-Party Whitelist
  12. -
  13. Third-Party Domain Whitelist
  14. -
  15. Third-Party Domain Initial Whitelist
  16. -
  17. Main Blacklist
  18. -
  19. Initial Blacklist
  20. -
  21. Final Blacklist
  22. -
  23. Domain Blacklist
  24. -
  25. Domain Initial Blacklist
  26. -
  27. Domain Final Blacklist
  28. -
  29. Domain Regular Expression Blacklist
  30. -
  31. Third-Party Blacklist
  32. -
  33. Third-Party Initial Blacklist
  34. -
  35. Third-Party Domain Blacklist
  36. -
  37. Third-Party Domain Initial Blacklist
  38. -
  39. Third-Party Regular Expression Blacklist
  40. -
  41. Third-Party Domain Regular Expression Blacklist
  42. -
  43. Regular Expression Blacklist
  44. -
- -

Initial lists check against the beginning of the URL. Final lists check against the end of the URL. Domain lists only check against certain domains. - Third-party lists only apply if the root domain of the request is different than the root domain of the main URL. - Regular expression lists follow the regular expression syntax. Each sublist item has one or more entry. - In the case of domain sublists, the resource request is only checked against the item if the first entry matches the domain of the main URL.

- -

Because of limitations in Android’s WebView, and to speed up processing of requests, Privacy Browser implements a simplified interpretation of the Adblock syntax. - This can sometimes lead to false positives, where resources are allowed or blocked in ways that weren’t intended by the original entry. - A more detailed description of how the blocklist entries are processed is available at stoutner.com.

- -

Privacy Browser has three additional blocklists. - UltraList and UltraPrivacy - block ads and trackers that EasyList and EasyPrivacy do not. The third blocks all third-party requests. - A request is only considered third-party if the base domain of the request is different than the base domain of the URL. - For example, if www.website.com loads a picture from images.website.com, - this is not blocked as a third-party request because they both share the same base domain of website.com. - Blocking all third-party requests increases privacy, but this blocklist is disabled by default because it breaks a large number of websites.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_ssl_certificates.html b/app/src/main/assets/en/guide_ssl_certificates.html new file mode 100644 index 00000000..d0eea92c --- /dev/null +++ b/app/src/main/assets/en/guide_ssl_certificates.html @@ -0,0 +1,56 @@ + + + + + + + + + + + + + +

Connect with Confidence

+ +

When visiting an encrypted URL (one that begins with HTTPS), the webserver uses an SSL certificate to both encrypt the information sent to the browser and to identify the server. + The purpose of the server identification is to prevent a machine located between the browser and the webserver from pretending to be the server and decrypting the information in transit. + This type of attack is known as a Man In The Middle (MITM) attack. + SSL certificates are generated by certificate authorities: companies that verify a server’s identity and produce a certificate for a fee. + Android has a list of trusted certificate authorities, and will accept any of their certificates for any website. + It isn’t supposed to be possible for an organization to acquire an SSL certificate for a domain they do not control, + but in practice many governments and large corporations have been able to do so.

+ +

Pinning an SSL certificate tells the browser that only one specific SSL certificate is to be trusted for a particular domain. Any other certificate, even if it is valid, will be rejected.

+ + + +

SSL certificates expire on a specified date, so even pinned SSL certificates will legitimately need to be updated from time to time. + As a general rule, pinning SSL certificates probably isn’t needed in the majority of cases. + But for those who suspect that powerful organizations may be targeting them, SSL certificate pinning can detect and thwart a MITM attack. + Privacy Browser also has the ability to pin IP addresses.

+ + + +

SSL certificates can be pinned in Domain Settings. + Besides protecting against MITM attacks, + pinning a self-signed certificate for a device like a wireless router or access point will remove the error message that is normally presented every time its website is loaded. + Tapping on the active tab displays the current website SSL certificate.

+ + \ No newline at end of file diff --git a/app/src/main/assets/en/guide_ssl_certificates_dark.html b/app/src/main/assets/en/guide_ssl_certificates_dark.html deleted file mode 100644 index 52dfccd5..00000000 --- a/app/src/main/assets/en/guide_ssl_certificates_dark.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - - - - - - - -

Connect with Confidence

- -

When visiting an encrypted URL (one that begins with HTTPS), the webserver uses an SSL certificate to both encrypt the information sent to the browser and to identify the server. - The purpose of the server identification is to prevent a machine located between the browser and the webserver from pretending to be the server and decrypting the information in transit. - This type of attack is known as a Man In The Middle (MITM) attack. - SSL certificates are generated by certificate authorities: companies that verify a server’s identity and produce a certificate for a fee. - Android has a list of trusted certificate authorities, and will accept any of their certificates for any website. - It isn’t supposed to be possible for an organization to acquire an SSL certificate for a domain they do not control, - but in practice many governments and large corporations have been able to do so.

- -

Pinning an SSL certificate tells the browser that only one specific SSL certificate is to be trusted for a particular domain. Any other certificate, even if it is valid, will be rejected.

- -

- -

SSL certificates expire on a specified date, so even pinned SSL certificates will legitimately need to be updated from time to time. - As a general rule, pinning SSL certificates probably isn’t needed in the majority of cases. - But for those who suspect that powerful organizations may be targeting them, SSL certificate pinning can detect and thwart a MITM attack. - Privacy Browser also has the ability to pin IP addresses.

- -

- -

SSL certificates can be pinned in Domain Settings. - Besides protecting against MITM attacks, - pinning a self-signed certificate for a device like a wireless router or access point will remove the error message that is normally presented every time its website is loaded. - Tapping on the active tab displays the current website SSL certificate.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_ssl_certificates_light.html b/app/src/main/assets/en/guide_ssl_certificates_light.html deleted file mode 100644 index 73e08222..00000000 --- a/app/src/main/assets/en/guide_ssl_certificates_light.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - - - - - - - -

Connect with Confidence

- -

When visiting an encrypted URL (one that begins with HTTPS), the webserver uses an SSL certificate to both encrypt the information sent to the browser and to identify the server. - The purpose of the server identification is to prevent a machine located between the browser and the webserver from pretending to be the server and decrypting the information in transit. - This type of attack is known as a Man In The Middle (MITM) attack. - SSL certificates are generated by certificate authorities: companies that verify a server’s identity and produce a certificate for a fee. - Android has a list of trusted certificate authorities, and will accept any of their certificates for any website. - It isn’t supposed to be possible for an organization to acquire an SSL certificate for a domain they do not control, - but in practice many governments and large corporations have been able to do so.

- -

Pinning an SSL certificate tells the browser that only one specific SSL certificate is to be trusted for a particular domain. Any other certificate, even if it is valid, will be rejected.

- -

- -

SSL certificates expire on a specified date, so even pinned SSL certificates will legitimately need to be updated from time to time. - As a general rule, pinning SSL certificates probably isn’t needed in the majority of cases. - But for those who suspect that powerful organizations may be targeting them, SSL certificate pinning can detect and thwart a MITM attack. - Privacy Browser also has the ability to pin IP addresses.

- -

- -

SSL certificates can be pinned in Domain Settings. - Besides protecting against MITM attacks, - pinning a self-signed certificate for a device like a wireless router or access point will remove the error message that is normally presented every time its website is loaded. - Tapping on the active tab displays the current website SSL certificate.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_tracking_ids.html b/app/src/main/assets/en/guide_tracking_ids.html new file mode 100644 index 00000000..ce93eca9 --- /dev/null +++ b/app/src/main/assets/en/guide_tracking_ids.html @@ -0,0 +1,43 @@ + + + + + + + + + + + + + +

Do Not Track

+ +

A few years ago the W3C (World Wide Web Consortium) created a mechanism for browsers to inform web servers that they would not like to be tracked. + This is accomplished by including a DNT (Do Not Track) header with web requests.

+ +

The DNT header doesn't really provide any privacy because most web servers ignore it. For example, Yahoo, Google, Microsoft, and Facebook all ignore at least some DNT headers.

+ + +

URL Modification

+ +

Privacy Browser removes tracking ID sections of URLs, like ?utm_ from Google Analytics and + ?fbclick= from Facebook. URL modification can be turned off in the settings if it is causing issues.

+ + \ No newline at end of file diff --git a/app/src/main/assets/en/guide_tracking_ids_dark.html b/app/src/main/assets/en/guide_tracking_ids_dark.html deleted file mode 100644 index ed492368..00000000 --- a/app/src/main/assets/en/guide_tracking_ids_dark.html +++ /dev/null @@ -1,40 +0,0 @@ - - - - - - - - - - -

Do Not Track

- -

A few years ago the W3C (World Wide Web Consortium) created a mechanism for browsers to inform web servers that they would not like to be tracked. - This is accomplished by including a DNT (Do Not Track) header with web requests.

- -

The DNT header doesn't really provide any privacy because most web servers ignore it. For example, Yahoo, Google, Microsoft, and Facebook all ignore at least some DNT headers.

- - -

URL Modification

- -

Privacy Browser removes tracking ID sections of URLs, like ?utm_ from Google Analytics and - ?fbclick= from Facebook. URL modification can be turned off in the settings if it is causing issues.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_tracking_ids_light.html b/app/src/main/assets/en/guide_tracking_ids_light.html deleted file mode 100644 index 36ccc1d0..00000000 --- a/app/src/main/assets/en/guide_tracking_ids_light.html +++ /dev/null @@ -1,40 +0,0 @@ - - - - - - - - - - -

Do Not Track

- -

A few years ago the W3C (World Wide Web Consortium) created a mechanism for browsers to inform web servers that they would not like to be tracked. - This is accomplished by including a DNT (Do Not Track) header with web requests.

- -

The DNT header doesn't really provide any privacy because most web servers ignore it. For example, Yahoo, Google, Microsoft, and Facebook all ignore at least some DNT headers.

- - -

URL Modification

- -

Privacy Browser removes tracking ID sections of URLs, like ?utm_ from Google Analytics and - ?fbclick= from Facebook. URL modification can be turned off in the settings if it is causing issues.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_user_agent.html b/app/src/main/assets/en/guide_user_agent.html new file mode 100644 index 00000000..6f8feb5e --- /dev/null +++ b/app/src/main/assets/en/guide_user_agent.html @@ -0,0 +1,63 @@ + + + + + + + + + + + + + +

Browser Identification

+ +

When web browsers connect to websites, they send a user agent, which identifies the browser and the rendering capabilities it possesses. + The web server can use this information to decide which version of the website to send to the browser. + For example, many websites have different versions for desktop and mobile browsers.

+ +

By default, Privacy Browser uses its own user agent, which is PrivacyBrowser/1.0. This sends a minimum of information to the web server. + Because web servers do not recognize this to be a mobile user agent, they typically display the desktop version of the site.

+ +

By comparison, WebView’s default user agent divulges a large amount of information about the hardware and software of the device. + On the Settings screen, selecting WebView Default as the User agent displays the user agent that will be sent. + The screenshot below shows a Pixel 2 XL running Android 10 with Android System WebView 84.0.4147.125 installed. + Most web servers will recognize this as a mobile browser and will display the mobile version of the site if they have one.

+ + + +

There is enough information in the user agent that sometimes only a few visitors to a website will be the same. + If the user agent is combined with another piece of non-unique identifying information, often it results in a unique fingerprint. + The Electronic Frontier Foundation created a tool called Panopticlick to demonstrate how much information can be gleaned from these sources. + If this test is run with JavaScript enabled the amount of information that is disclosed increases greatly. + Browser Leaks and Am I Unique are also good sources of information on this topic.

+ + + +

There are several preset user agents that match common browsers and operating systems. For browser fingerprinting purposes, anything that is rare is easier to track. + If Privacy Browser becomes common and many people use PrivacyBrowser/1.0 as their user agent, it will be a good choice for privacy. + Firefox or Chrome are the most common user agents, but they auto-update and their version numbers change so quickly that it is likely the user agents included in Privacy Browser + will often be out of step with the majority of user agents in the server logs.

+ +

Some websites do not function correctly if they do not recognize the user agent. + Using domain settings to set the user agent to WebView Default, or another user agent that is commonly recognized, usually resolves the problem. + Android’s WebView does not allow the user agent to be blank. If it is, WebView simply sends the default user agent to the server.

+ + \ No newline at end of file diff --git a/app/src/main/assets/en/guide_user_agent_dark.html b/app/src/main/assets/en/guide_user_agent_dark.html deleted file mode 100644 index e30e822d..00000000 --- a/app/src/main/assets/en/guide_user_agent_dark.html +++ /dev/null @@ -1,60 +0,0 @@ - - - - - - - - - - -

Browser Identification

- -

When web browsers connect to websites, they send a user agent, which identifies the browser and the rendering capabilities it possesses. - The web server can use this information to decide which version of the website to send to the browser. - For example, many websites have different versions for desktop and mobile browsers.

- -

By default, Privacy Browser uses its own user agent, which is PrivacyBrowser/1.0. This sends a minimum of information to the web server. - Because web servers do not recognize this to be a mobile user agent, they typically display the desktop version of the site.

- -

By comparison, WebView’s default user agent divulges a large amount of information about the hardware and software of the device. - On the Settings screen, selecting WebView Default as the User agent displays the user agent that will be sent. - The screenshot below shows a Pixel 2 XL running Android 10 with Android System WebView 84.0.4147.125 installed. - Most web servers will recognize this as a mobile browser and will display the mobile version of the site if they have one.

- - - -

There is enough information in the user agent that sometimes only a few visitors to a website will be the same. - If the user agent is combined with another piece of non-unique identifying information, often it results in a unique fingerprint. - The Electronic Frontier Foundation created a tool called Panopticlick to demonstrate how much information can be gleaned from these sources. - If this test is run with JavaScript enabled the amount of information that is disclosed increases greatly. - Browser Leaks and Am I Unique are also good sources of information on this topic.

- - - -

There are several preset user agents that match common browsers and operating systems. For browser fingerprinting purposes, anything that is rare is easier to track. - If Privacy Browser becomes common and many people use PrivacyBrowser/1.0 as their user agent, it will be a good choice for privacy. - Firefox or Chrome are the most common user agents, but they auto-update and their version numbers change so quickly that it is likely the user agents included in Privacy Browser - will often be out of step with the majority of user agents in the server logs.

- -

Some websites do not function correctly if they do not recognize the user agent. - Using domain settings to set the user agent to WebView Default, or another user agent that is commonly recognized, usually resolves the problem. - Android’s WebView does not allow the user agent to be blank. If it is, WebView simply sends the default user agent to the server.

- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_user_agent_light.html b/app/src/main/assets/en/guide_user_agent_light.html deleted file mode 100644 index dc4068b8..00000000 --- a/app/src/main/assets/en/guide_user_agent_light.html +++ /dev/null @@ -1,60 +0,0 @@ - - - - - - - - - - -

Browser Identification

- -

When web browsers connect to websites, they send a user agent, which identifies the browser and the rendering capabilities it possesses. - The web server can use this information to decide which version of the website to send to the browser. - For example, many websites have different versions for desktop and mobile browsers.

- -

By default, Privacy Browser uses its own user agent, which is PrivacyBrowser/1.0. This sends a minimum of information to the web server. - Because web servers do not recognize this to be a mobile user agent, they typically display the desktop version of the site.

- -

By comparison, WebView’s default user agent divulges a large amount of information about the hardware and software of the device. - On the Settings screen, selecting WebView Default as the User agent displays the user agent that will be sent. - The screenshot below shows a Pixel 2 XL running Android 10 with Android System WebView 84.0.4147.125 installed. - Most web servers will recognize this as a mobile browser and will display the mobile version of the site if they have one.

- - - -

There is enough information in the user agent that sometimes only a few visitors to a website will be the same. - If the user agent is combined with another piece of non-unique identifying information, often it results in a unique fingerprint. - The Electronic Frontier Foundation created a tool called Panopticlick to demonstrate how much information can be gleaned from these sources. - If this test is run with JavaScript enabled the amount of information that is disclosed increases greatly. - Browser Leaks and Am I Unique are also good sources of information on this topic.

- - - -

There are several preset user agents that match common browsers and operating systems. For browser fingerprinting purposes, anything that is rare is easier to track. - If Privacy Browser becomes common and many people use PrivacyBrowser/1.0 as their user agent, it will be a good choice for privacy. - Firefox or Chrome are the most common user agents, but they auto-update and their version numbers change so quickly that it is likely the user agents included in Privacy Browser - will often be out of step with the majority of user agents in the server logs.

- -

Some websites do not function correctly if they do not recognize the user agent. - Using domain settings to set the user agent to WebView Default, or another user agent that is commonly recognized, usually resolves the problem. - Android’s WebView does not allow the user agent to be blank. If it is, WebView simply sends the default user agent to the server.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_changelog.html b/app/src/main/assets/es/about_changelog.html new file mode 100644 index 00000000..aa2872aa --- /dev/null +++ b/app/src/main/assets/es/about_changelog.html @@ -0,0 +1,693 @@ + + + + + + + + + + + + + +

3.5.1 (código de versión 51)

+

28 de agosto de 2020 - API mínimo 19, API dirigido 29

+
    +
  • Corregir un error que provocaba que los nuevos intentos (enlaces de otras aplicaciones) no se cargaran + si Navegador Privado había sido "matado" por el SO en segundo plano.
  • +
  • Corregir un error que causaba que la aplicación se iniciara incorrectamente + si el tema de la aplicación estaba configurado al contrario del tema del sistema operativo.
  • +
+ +

3.5 (código de versión 50)

+

18 de agosto de 2020 - API mínimo 19, API dirigido 29

+ + +

3.4.1 (código de versión 49)

+

1 de abril de 2020 - API mínimo 19, API dirigido 29

+ + +

3.4 (código de versión 48)

+

28 de marzo de 2020 - API mínimo 19, API dirigido 29

+ + +

3.3 (código de versión 47)

+

3 de enero de 2020 - API mínimo 19, API dirigido 29

+ + +

3.2 (código de versión 46)

+

20 de julio de 2019 - API mínimo 19, API dirigido 28

+ + +

3.1 (código de versión 45)

+

27 de mayo de 2019 - API mínimo 19, API dirigido 28

+ + +

3.0.1 (código de versión 44)

+

2 de mayo de 2019 - API mínimo 19, API dirigido 28

+ + +

3.0 (código de versión 43)

+

26 de abril de 2019 - API mínimo 19, API dirigido 28

+
    +
  • Añadir navegación por pestañas.
  • +
  • Se corrigió un error que provocaba que se cortara la parte inferior de la vista web + cuando se desactivaba el desplazamiento de la barra de aplicaciones.
  • +
  • Se corrigió un error que provocaba que se reiniciara Navegador Privado cada vez que se conectaba/desconectaba un teclado Bluetooth.
  • +
  • Actualizada la traducción al español proporcionada por Jose A. León.
  • +
  • Actualizada la traducción al alemán proporcionada por Bernhard G. Keller.
  • +
  • Actualizada la traducción al italiano proporcionada por Francesco Buratti.
  • +
  • Actualizada la traducción al ruso.
  • +
  • Traducción parcial al turco.
  • +
+ +

2.17.1 (código de versión 42)

+

5 de marzo de 2019 - API mínimo 19, API dirigido 28

+ + +

2.17 (código de versión 41)

+

27 de febrero de 2019 - API mínimo 19, API dirigido 28

+ + +

2.16 (código de versión 40)

+

31 de enero de 2019 - API mínimo 19, API dirigido 28

+ + +

2.15.1 (código de versión 39)

+

27 de diciembre de 2018 - API mínimo 19, API dirigido 28

+ + +

2.15 (código de versión 38)

+

24 de diciembre de 2018 - API mínimo 19, API dirigido 28

+ + +

2.14 (código de versión 37)

+

8 de diciembre de 2018 - API mínimo 19, API dirigido 28

+ + +

2.13 (código de versión 36)

+

29 de octubre de 2018 - API mínimo 19, API dirigido 28

+ + +

2.12 (código de versión 35)

+

31 de julio de 2018 - API mínimo 19, API dirigido 27

+ + +

2.11 (código de versión 34)

+

10 de julio de 2018 - API mínimo 19, API dirigido 27

+ + +

2.10 (código de versión 33)

+

24 de mayo de 2018 - API mínimo 19, API dirigido 27

+ + +

2.9 (código de versión 32)

+

9 de mayo de 2018 - API mínimo 19, API dirigido 27

+ + +

2.8.1 (código de versión 31)

+

1 de marzo de 2018 - API mínimo 19, API dirigido 27

+ + +

2.8 (código de versión 30)

+

22 de febrero de 2018 - API mínimo 19, API dirigido 27

+ + +

2.7.2 (código de versión 29)

+

22 de noviembre de 2017 - API mínimo 19, API dirigido 26

+ + +

2.7.1 (código de versión 28)

+

9 de noviembre de 2017 - API mínimo 19, API dirigido 26

+ + +

2.7 (código de versión 27)

+

7 de noviembre de 2017 - API mínimo 19, API dirigido 26

+
    +
  • Añadir un cajón de favoritos al que se accede deslizando desde la derecha.
  • +
  • Evitar que el Modo Noche parpadee sobre un fondo blanco al cargar páginas nuevas.
  • +
  • Actualizar los agentes de usuario.
  • +
  • Incrementar la API dirigido hacia la 26 (Android Oreo, 8.0.0).
  • +
  • Actualizada la traducción al español proporcionada por Jose A. León.
  • +
  • Actualizada la traducción al italiano proporcionada por Francesco Buratti.
  • +
+ +

2.6 (código de versión 26)

+

18 de septiembre de 2017 - API mínimo 19, API dirigido 25

+ + +

2.5 (código de versión 25)

+

26 de agosto de 2017 - API mínimo 19, API dirigido 25

+ + +

2.4 (código de versión 24)

+

23 de junio de 2017 - API mínimo 19, API dirigido 25

+ + +

2.3 (código de versión 23)

+

26 de mayo de 2017 - API mínimo 19, API dirigido 25

+ + +

2.2 (código de versión 22)

+

27 de abril de 2017 - API mínimo 19, API dirigido 25

+ + +

2.1 (código de versión 21)

+

25 de marzo de 2017 - API mínimo 19, API dirigido 25

+ + +

2.0.1 (código de versión 20)

+

21 de marzo de 2017 - API mínimo 19, API dirigido 25

+ + +

2.0 (código de versión 19)

+

16 de marzo de 2017 - API mínimo 19, API dirigido 25

+ + +

1.15 (código de versión 18)

+

11 de febrero de 2017 - API mínimo 19, API dirigido 25

+ + +

1.14.1 (código de versión 17)

+

4 de enero de 2017 - API mínimo 19, API dirigido 25

+ + +

1.14 (código de versión 16)

+

26 de diciembre de 2016 - API mínimo 19, API dirigido 25

+ + +

1.13 (código de versión 15)

+

28 de noviembre de 2016 - API mínimo 19, API dirigido 24

+ + +

1.12 (código de versión 14)

+

9 de noviembre de 2016 - API mínimo 19, API dirigido 24

+ + +

1.11 (código de versión 13)

+

22 de octubre de 2016 - API mínimo 19, API dirigido 24

+ + +

01.10 (código de versión 12)

+

15 de septiembre de 2016 - API mínimo 19, API dirigido 23

+
    +
  • Añadir compatibilidad con Tor Orbot.
  • +
  • Añadir compatibilidad con No rastrear.
  • +
  • Añadir un diálogo para descargas que permite al usuario + modificar el nombre del archivo antes de comenzar la descarga.
  • +
  • Añadir botones opcionales adicionales para cookies, almacenamiento DOM, y datos de formularios.
  • +
  • Actualizar los agentes de usuario y agregar Safari en iOS y OS X.
  • +
  • Añadir StartPage y Qwant a la lista de buscadores.
  • +
  • Traducción al alemán actualizada por Aaron Gerlach.
  • +
+ +

1.9.1 (código de versión 11)

+

27 de agosto de 2016 - API mínimo 19, API dirigido 23

+
    +
  • Cambiar las rutas de los imágenes activas para ser relativas para que Navegador Privado sea compatible con F-Droid.
  • +
+ +

1.9 (código de versión 10)

+

26 de agosto de 2016 - API mínimo 19, API dirigido 23

+ + +

1.8 (código de versión 9)

+

16 de julio de 2016 - API mínimo 19, API dirigido 23

+ + +

1.7 (código de versión 8)

+

16 de junio de 2016 - API mínimo 19, API dirigido 23

+ + +

1.6 (código de versión 7)

+

11 de mayo de 2016 - API mínimo 15, API dirigido 23

+ + +

1.5 (código de versión 6)

+

5 de mayo de 2016 - API mínimo 15, API dirigido 23

+
    +
  • Añadir la opción para deshabilitar “Deslizar para actualizar” para que ciertas páginas web, como Mapas de Google, funcionen correctamente.
  • +
+ +

1.4 (código de versión 5)

+

28 de abril de 2016 - API mínimo 15, API dirigido 23

+ + +

1.3 (código de versión 4)

+

7 de abril de 2016 - API mínimo 15, API dirigido 23

+ + +

1.2 (código de versión 3)

+

23 de marzo de 2016 - API mínimo 15, API dirigido 23

+ + +

1.1 (código de versión 2)

+

9 de marzo de 2016 - API mínimo 10, API dirigido 23

+
    +
  • Separar los sabores estándar y gratuito para que Navegador Privado sea compatible con F-Droid.
  • +
+ +

1.0 (código de versión 1)

+

24 de febrero de 2016 - API mínimo 10, API dirigido 23

+
    +
  • Controlar JavaScript, almacenamiento DOM, y cookies.
  • +
  • Establecer el estado por defecto de JavaScript, almacenamiento DOM, y cookies.
  • +
  • Borrar almacenamiento DOM y cookies.
  • +
  • Añadir accesos directos a la pantalla de inicio.
  • +
  • Utilizar el sistema de descargas de Android.
  • +
  • Navegar hacia delante y hacia atrás.
  • +
  • Cortar, copiar, y pegar los URL.
  • +
  • Compartir los URL.
  • +
  • Especificar la página principal.
  • +
  • Desplazar la barra de URL.
  • +
  • Mantener la posición en el WebView cuando se gira la pantalla.
  • +
  • Deslizar para actualizar el WebView.
  • +
  • Reproducir videos en pantalla completa (requiere que Javascript sea habilitado).
  • +
  • Opción de “Eliminar y salir” en el menú.
  • +
+ + \ No newline at end of file diff --git a/app/src/main/assets/es/about_changelog_dark.html b/app/src/main/assets/es/about_changelog_dark.html deleted file mode 100644 index 6fbf28f3..00000000 --- a/app/src/main/assets/es/about_changelog_dark.html +++ /dev/null @@ -1,690 +0,0 @@ - - - - - - - - - - -

3.5.1 (código de versión 51)

-

28 de agosto de 2020 - API mínimo 19, API dirigido 29

-
    -
  • Corregir un error que provocaba que los nuevos intentos (enlaces de otras aplicaciones) no se cargaran - si Navegador Privado había sido "matado" por el SO en segundo plano.
  • -
  • Corregir un error que causaba que la aplicación se iniciara incorrectamente - si el tema de la aplicación estaba configurado al contrario del tema del sistema operativo.
  • -
- -

3.5 (código de versión 50)

-

18 de agosto de 2020 - API mínimo 19, API dirigido 29

- - -

3.4.1 (código de versión 49)

-

1 de abril de 2020 - API mínimo 19, API dirigido 29

- - -

3.4 (código de versión 48)

-

28 de marzo de 2020 - API mínimo 19, API dirigido 29

- - -

3.3 (código de versión 47)

-

3 de enero de 2020 - API mínimo 19, API dirigido 29

- - -

3.2 (código de versión 46)

-

20 de julio de 2019 - API mínimo 19, API dirigido 28

- - -

3.1 (código de versión 45)

-

27 de mayo de 2019 - API mínimo 19, API dirigido 28

- - -

3.0.1 (código de versión 44)

-

2 de mayo de 2019 - API mínimo 19, API dirigido 28

- - -

3.0 (código de versión 43)

-

26 de abril de 2019 - API mínimo 19, API dirigido 28

-
    -
  • Añadir navegación por pestañas.
  • -
  • Se corrigió un error que provocaba que se cortara la parte inferior de la vista web - cuando se desactivaba el desplazamiento de la barra de aplicaciones.
  • -
  • Se corrigió un error que provocaba que se reiniciara Navegador Privado cada vez que se conectaba/desconectaba un teclado Bluetooth.
  • -
  • Actualizada la traducción al español proporcionada por Jose A. León.
  • -
  • Actualizada la traducción al alemán proporcionada por Bernhard G. Keller.
  • -
  • Actualizada la traducción al italiano proporcionada por Francesco Buratti.
  • -
  • Actualizada la traducción al ruso.
  • -
  • Traducción parcial al turco.
  • -
- -

2.17.1 (código de versión 42)

-

5 de marzo de 2019 - API mínimo 19, API dirigido 28

- - -

2.17 (código de versión 41)

-

27 de febrero de 2019 - API mínimo 19, API dirigido 28

- - -

2.16 (código de versión 40)

-

31 de enero de 2019 - API mínimo 19, API dirigido 28

- - -

2.15.1 (código de versión 39)

-

27 de diciembre de 2018 - API mínimo 19, API dirigido 28

- - -

2.15 (código de versión 38)

-

24 de diciembre de 2018 - API mínimo 19, API dirigido 28

- - -

2.14 (código de versión 37)

-

8 de diciembre de 2018 - API mínimo 19, API dirigido 28

- - -

2.13 (código de versión 36)

-

29 de octubre de 2018 - API mínimo 19, API dirigido 28

- - -

2.12 (código de versión 35)

-

31 de julio de 2018 - API mínimo 19, API dirigido 27

- - -

2.11 (código de versión 34)

-

10 de julio de 2018 - API mínimo 19, API dirigido 27

- - -

2.10 (código de versión 33)

-

24 de mayo de 2018 - API mínimo 19, API dirigido 27

- - -

2.9 (código de versión 32)

-

9 de mayo de 2018 - API mínimo 19, API dirigido 27

- - -

2.8.1 (código de versión 31)

-

1 de marzo de 2018 - API mínimo 19, API dirigido 27

- - -

2.8 (código de versión 30)

-

22 de febrero de 2018 - API mínimo 19, API dirigido 27

- - -

2.7.2 (código de versión 29)

-

22 de noviembre de 2017 - API mínimo 19, API dirigido 26

- - -

2.7.1 (código de versión 28)

-

9 de noviembre de 2017 - API mínimo 19, API dirigido 26

- - -

2.7 (código de versión 27)

-

7 de noviembre de 2017 - API mínimo 19, API dirigido 26

-
    -
  • Añadir un cajón de favoritos al que se accede deslizando desde la derecha.
  • -
  • Evitar que el Modo Noche parpadee sobre un fondo blanco al cargar páginas nuevas.
  • -
  • Actualizar los agentes de usuario.
  • -
  • Incrementar la API dirigido hacia la 26 (Android Oreo, 8.0.0).
  • -
  • Actualizada la traducción al español proporcionada por Jose A. León.
  • -
  • Actualizada la traducción al italiano proporcionada por Francesco Buratti.
  • -
- -

2.6 (código de versión 26)

-

18 de septiembre de 2017 - API mínimo 19, API dirigido 25

- - -

2.5 (código de versión 25)

-

26 de agosto de 2017 - API mínimo 19, API dirigido 25

- - -

2.4 (código de versión 24)

-

23 de junio de 2017 - API mínimo 19, API dirigido 25

- - -

2.3 (código de versión 23)

-

26 de mayo de 2017 - API mínimo 19, API dirigido 25

- - -

2.2 (código de versión 22)

-

27 de abril de 2017 - API mínimo 19, API dirigido 25

- - -

2.1 (código de versión 21)

-

25 de marzo de 2017 - API mínimo 19, API dirigido 25

- - -

2.0.1 (código de versión 20)

-

21 de marzo de 2017 - API mínimo 19, API dirigido 25

- - -

2.0 (código de versión 19)

-

16 de marzo de 2017 - API mínimo 19, API dirigido 25

- - -

1.15 (código de versión 18)

-

11 de febrero de 2017 - API mínimo 19, API dirigido 25

- - -

1.14.1 (código de versión 17)

-

4 de enero de 2017 - API mínimo 19, API dirigido 25

- - -

1.14 (código de versión 16)

-

26 de diciembre de 2016 - API mínimo 19, API dirigido 25

- - -

1.13 (código de versión 15)

-

28 de noviembre de 2016 - API mínimo 19, API dirigido 24

- - -

1.12 (código de versión 14)

-

9 de noviembre de 2016 - API mínimo 19, API dirigido 24

- - -

1.11 (código de versión 13)

-

22 de octubre de 2016 - API mínimo 19, API dirigido 24

- - -

01.10 (código de versión 12)

-

15 de septiembre de 2016 - API mínimo 19, API dirigido 23

-
    -
  • Añadir compatibilidad con Tor Orbot.
  • -
  • Añadir compatibilidad con No rastrear.
  • -
  • Añadir un diálogo para descargas que permite al usuario - modificar el nombre del archivo antes de comenzar la descarga.
  • -
  • Añadir botones opcionales adicionales para cookies, almacenamiento DOM, y datos de formularios.
  • -
  • Actualizar los agentes de usuario y agregar Safari en iOS y OS X.
  • -
  • Añadir StartPage y Qwant a la lista de buscadores.
  • -
  • Traducción al alemán actualizada por Aaron Gerlach.
  • -
- -

1.9.1 (código de versión 11)

-

27 de agosto de 2016 - API mínimo 19, API dirigido 23

-
    -
  • Cambiar las rutas de los imágenes activas para ser relativas para que Navegador Privado sea compatible con F-Droid.
  • -
- -

1.9 (código de versión 10)

-

26 de agosto de 2016 - API mínimo 19, API dirigido 23

- - -

1.8 (código de versión 9)

-

16 de julio de 2016 - API mínimo 19, API dirigido 23

- - -

1.7 (código de versión 8)

-

16 de junio de 2016 - API mínimo 19, API dirigido 23

- - -

1.6 (código de versión 7)

-

11 de mayo de 2016 - API mínimo 15, API dirigido 23

- - -

1.5 (código de versión 6)

-

5 de mayo de 2016 - API mínimo 15, API dirigido 23

-
    -
  • Añadir la opción para deshabilitar “Deslizar para actualizar” para que ciertas páginas web, como Mapas de Google, funcionen correctamente.
  • -
- -

1.4 (código de versión 5)

-

28 de abril de 2016 - API mínimo 15, API dirigido 23

- - -

1.3 (código de versión 4)

-

7 de abril de 2016 - API mínimo 15, API dirigido 23

- - -

1.2 (código de versión 3)

-

23 de marzo de 2016 - API mínimo 15, API dirigido 23

- - -

1.1 (código de versión 2)

-

9 de marzo de 2016 - API mínimo 10, API dirigido 23

-
    -
  • Separar los sabores estándar y gratuito para que Navegador Privado sea compatible con F-Droid.
  • -
- -

1.0 (código de versión 1)

-

24 de febrero de 2016 - API mínimo 10, API dirigido 23

-
    -
  • Controlar JavaScript, almacenamiento DOM, y cookies.
  • -
  • Establecer el estado por defecto de JavaScript, almacenamiento DOM, y cookies.
  • -
  • Borrar almacenamiento DOM y cookies.
  • -
  • Añadir accesos directos a la pantalla de inicio.
  • -
  • Utilizar el sistema de descargas de Android.
  • -
  • Navegar hacia delante y hacia atrás.
  • -
  • Cortar, copiar, y pegar los URL.
  • -
  • Compartir los URL.
  • -
  • Especificar la página principal.
  • -
  • Desplazar la barra de URL.
  • -
  • Mantener la posición en el WebView cuando se gira la pantalla.
  • -
  • Deslizar para actualizar el WebView.
  • -
  • Reproducir videos en pantalla completa (requiere que Javascript sea habilitado).
  • -
  • Opción de “Eliminar y salir” en el menú.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_changelog_light.html b/app/src/main/assets/es/about_changelog_light.html deleted file mode 100644 index fec818f8..00000000 --- a/app/src/main/assets/es/about_changelog_light.html +++ /dev/null @@ -1,690 +0,0 @@ - - - - - - - - - - -

3.5.1 (código de versión 51)

-

28 de agosto de 2020 - API mínimo 19, API dirigido 29

-
    -
  • Corregir un error que provocaba que los nuevos intentos (enlaces de otras aplicaciones) no se cargaran - si Navegador Privado había sido "matado" por el SO en segundo plano.
  • -
  • Corregir un error que causaba que la aplicación se iniciara incorrectamente - si el tema de la aplicación estaba configurado al contrario del tema del sistema operativo.
  • -
- -

3.5 (código de versión 50)

-

18 de agosto de 2020 - API mínimo 19, API dirigido 29

- - -

3.4.1 (código de versión 49)

-

1 de abril de 2020 - API mínimo 19, API dirigido 29

- - -

3.4 (código de versión 48)

-

28 de marzo de 2020 - API mínimo 19, API dirigido 29

- - -

3.3 (código de versión 47)

-

3 de enero de 2020 - API mínimo 19, API dirigido 29

- - -

3.2 (código de versión 46)

-

20 de julio de 2019 - API mínimo 19, API dirigido 28

- - -

3.1 (código de versión 45)

-

27 de mayo de 2019 - API mínimo 19, API dirigido 28

- - -

3.0.1 (código de versión 44)

-

2 de mayo de 2019 - API mínimo 19, API dirigido 28

- - -

3.0 (código de versión 43)

-

26 de abril de 2019 - API mínimo 19, API dirigido 28

-
    -
  • Añadir navegación por pestañas.
  • -
  • Se corrigió un error que provocaba que se cortara la parte inferior de la vista web - cuando se desactivaba el desplazamiento de la barra de aplicaciones.
  • -
  • Se corrigió un error que provocaba que se reiniciara Navegador Privado cada vez que se conectaba/desconectaba un teclado Bluetooth.
  • -
  • Actualizada la traducción al español proporcionada por Jose A. León.
  • -
  • Actualizada la traducción al alemán proporcionada por Bernhard G. Keller.
  • -
  • Actualizada la traducción al italiano proporcionada por Francesco Buratti.
  • -
  • Actualizada la traducción al ruso.
  • -
  • Traducción parcial al turco.
  • -
- -

2.17.1 (código de versión 42)

-

5 de marzo de 2019 - API mínimo 19, API dirigido 28

- - -

2.17 (código de versión 41)

-

27 de febrero de 2019 - API mínimo 19, API dirigido 28

- - -

2.16 (código de versión 40)

-

31 de enero de 2019 - API mínimo 19, API dirigido 28

- - -

2.15.1 (código de versión 39)

-

27 de diciembre de 2018 - API mínimo 19, API dirigido 28

- - -

2.15 (código de versión 38)

-

24 de diciembre de 2018 - API mínimo 19, API dirigido 28

- - -

2.14 (código de versión 37)

-

8 de diciembre de 2018 - API mínimo 19, API dirigido 28

- - -

2.13 (código de versión 36)

-

29 de octubre de 2018 - API mínimo 19, API dirigido 28

- - -

2.12 (código de versión 35)

-

31 de julio de 2018 - API mínimo 19, API dirigido 27

- - -

2.11 (código de versión 34)

-

10 de julio de 2018 - API mínimo 19, API dirigido 27

- - -

2.10 (código de versión 33)

-

24 de mayo de 2018 - API mínimo 19, API dirigido 27

- - -

2.9 (código de versión 32)

-

9 de mayo de 2018 - API mínimo 19, API dirigido 27

- - -

2.8.1 (código de versión 31)

-

1 de marzo de 2018 - API mínimo 19, API dirigido 27

- - -

2.8 (código de versión 30)

-

22 de febrero de 2018 - API mínimo 19, API dirigido 27

- - -

2.7.2 (código de versión 29)

-

22 de noviembre de 2017 - API mínimo 19, API dirigido 26

- - -

2.7.1 (código de versión 28)

-

9 de noviembre de 2017 - API mínimo 19, API dirigido 26

- - -

2.7 (código de versión 27)

-

7 de noviembre de 2017 - API mínimo 19, API dirigido 26

-
    -
  • Añadir un cajón de favoritos al que se accede deslizando desde la derecha.
  • -
  • Evitar que el Modo Noche parpadee sobre un fondo blanco al cargar páginas nuevas.
  • -
  • Actualizar los agentes de usuario.
  • -
  • Incrementar la API dirigido hacia la 26 (Android Oreo, 8.0.0).
  • -
  • Actualizada la traducción al español proporcionada por Jose A. León.
  • -
  • Actualizada la traducción al italiano proporcionada por Francesco Buratti.
  • -
- -

2.6 (código de versión 26)

-

18 de septiembre de 2017 - API mínimo 19, API dirigido 25

- - -

2.5 (código de versión 25)

-

26 de agosto de 2017 - API mínimo 19, API dirigido 25

- - -

2.4 (código de versión 24)

-

23 de junio de 2017 - API mínimo 19, API dirigido 25

- - -

2.3 (código de versión 23)

-

26 de mayo de 2017 - API mínimo 19, API dirigido 25

- - -

2.2 (código de versión 22)

-

27 de abril de 2017 - API mínimo 19, API dirigido 25

- - -

2.1 (código de versión 21)

-

25 de marzo de 2017 - API mínimo 19, API dirigido 25

- - -

2.0.1 (código de versión 20)

-

21 de marzo de 2017 - API mínimo 19, API dirigido 25

- - -

2.0 (código de versión 19)

-

16 de marzo de 2017 - API mínimo 19, API dirigido 25

- - -

1.15 (código de versión 18)

-

11 de febrero de 2017 - API mínimo 19, API dirigido 25

- - -

1.14.1 (código de versión 17)

-

4 de enero de 2017 - API mínimo 19, API dirigido 25

- - -

1.14 (código de versión 16)

-

26 de diciembre de 2016 - API mínimo 19, API dirigido 25

- - -

1.13 (código de versión 15)

-

28 de noviembre de 2016 - API mínimo 19, API dirigido 24

- - -

1.12 (código de versión 14)

-

9 de noviembre de 2016 - API mínimo 19, API dirigido 24

- - -

1.11 (código de versión 13)

-

22 de octubre de 2016 - API mínimo 19, API dirigido 24

- - -

01.10 (código de versión 12)

-

15 de septiembre de 2016 - API mínimo 19, API dirigido 23

-
    -
  • Añadir compatibilidad con Tor Orbot.
  • -
  • Añadir compatibilidad con No rastrear.
  • -
  • Añadir un diálogo para descargas que permite al usuario - modificar el nombre del archivo antes de comenzar la descarga.
  • -
  • Añadir botones opcionales adicionales para cookies, almacenamiento DOM, y datos de formularios.
  • -
  • Actualizar los agentes de usuario y agregar Safari en iOS y OS X.
  • -
  • Añadir StartPage y Qwant a la lista de buscadores.
  • -
  • Traducción al alemán actualizada por Aaron Gerlach.
  • -
- -

1.9.1 (código de versión 11)

-

27 de agosto de 2016 - API mínimo 19, API dirigido 23

-
    -
  • Cambiar las rutas de los imágenes activas para ser relativas para que Navegador Privado sea compatible con F-Droid.
  • -
- -

1.9 (código de versión 10)

-

26 de agosto de 2016 - API mínimo 19, API dirigido 23

- - -

1.8 (código de versión 9)

-

16 de julio de 2016 - API mínimo 19, API dirigido 23

- - -

1.7 (código de versión 8)

-

16 de junio de 2016 - API mínimo 19, API dirigido 23

- - -

1.6 (código de versión 7)

-

11 de mayo de 2016 - API mínimo 15, API dirigido 23

- - -

1.5 (código de versión 6)

-

5 de mayo de 2016 - API mínimo 15, API dirigido 23

-
    -
  • Añadir la opción para deshabilitar “Deslizar para actualizar” para que ciertas páginas web, como Mapas de Google, funcionen correctamente.
  • -
- -

1.4 (código de versión 5)

-

28 de abril de 2016 - API mínimo 15, API dirigido 23

- - -

1.3 (código de versión 4)

-

7 de abril de 2016 - API mínimo 15, API dirigido 23

- - -

1.2 (código de versión 3)

-

23 de marzo de 2016 - API mínimo 15, API dirigido 23

- - -

1.1 (código de versión 2)

-

9 de marzo de 2016 - API mínimo 10, API dirigido 23

-
    -
  • Separar los sabores estándar y gratuito para que Navegador Privado sea compatible con F-Droid.
  • -
- -

1.0 (código de versión 1)

-

24 de febrero de 2016 - API mínimo 10, API dirigido 23

-
    -
  • Controlar JavaScript, almacenamiento DOM, y cookies.
  • -
  • Establecer el estado por defecto de JavaScript, almacenamiento DOM, y cookies.
  • -
  • Borrar almacenamiento DOM y cookies.
  • -
  • Añadir accesos directos a la pantalla de inicio.
  • -
  • Utilizar el sistema de descargas de Android.
  • -
  • Navegar hacia delante y hacia atrás.
  • -
  • Cortar, copiar, y pegar los URL.
  • -
  • Compartir los URL.
  • -
  • Especificar la página principal.
  • -
  • Desplazar la barra de URL.
  • -
  • Mantener la posición en el WebView cuando se gira la pantalla.
  • -
  • Deslizar para actualizar el WebView.
  • -
  • Reproducir videos en pantalla completa (requiere que Javascript sea habilitado).
  • -
  • Opción de “Eliminar y salir” en el menú.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_contributors.html b/app/src/main/assets/es/about_contributors.html new file mode 100644 index 00000000..0057c4dc --- /dev/null +++ b/app/src/main/assets/es/about_contributors.html @@ -0,0 +1,54 @@ + + + + + + + + + + + + + +

Desarrollador principal

+

Navegador Privado es desarrollado principalmente por Soren Stoutner.

+ +

Programadores

+ Thomas Jensen
+ Hendrik Knackstedt + +

Traductores

+ Jose A. León: Español
+ Thiago Nazareno Conceição Silva de Jesus: Portugués brasileño
+ Kévin LE FLOHIC: Francés
+ Bernhard G. Keller: Alemán
+ Francesco Buratti: Italiano + +

Traductores anteriores

+ Stefan Erhardt: Alemán
+ Aaron Gerlach: Alemán + +
+
+

Los colaboradores son bienvenidos para enviar tanto código como traducciones.

+ + \ No newline at end of file diff --git a/app/src/main/assets/es/about_contributors_dark.html b/app/src/main/assets/es/about_contributors_dark.html deleted file mode 100644 index bd46d0f6..00000000 --- a/app/src/main/assets/es/about_contributors_dark.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - - - - - - -

Desarrollador principal

-

Navegador Privado es desarrollado principalmente por Soren Stoutner.

- -

Programadores

- Thomas Jensen
- Hendrik Knackstedt - -

Traductores

- Jose A. León: Español
- Thiago Nazareno Conceição Silva de Jesus: Portugués brasileño
- Kévin LE FLOHIC: Francés
- Bernhard G. Keller: Alemán
- Francesco Buratti: Italiano - -

Traductores anteriores

- Stefan Erhardt: Alemán
- Aaron Gerlach: Alemán - -
-
-

Los colaboradores son bienvenidos para enviar tanto código como traducciones.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_contributors_light.html b/app/src/main/assets/es/about_contributors_light.html deleted file mode 100644 index 7211860e..00000000 --- a/app/src/main/assets/es/about_contributors_light.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - - - - - - -

Desarrollador principal

-

Navegador Privado es desarrollado principalmente por Soren Stoutner.

- -

Programadores

- Thomas Jensen
- Hendrik Knackstedt - -

Traductores

- Jose A. León: Español
- Thiago Nazareno Conceição Silva de Jesus: Portugués brasileño
- Kévin LE FLOHIC: Francés
- Bernhard G. Keller: Alemán
- Francesco Buratti: Italiano - -

Traductores anteriores

- Stefan Erhardt: Alemán
- Aaron Gerlach: Alemán - -
-
-

Los colaboradores son bienvenidos para enviar tanto código como traducciones.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_licenses.html b/app/src/main/assets/es/about_licenses.html new file mode 100644 index 00000000..faedae76 --- /dev/null +++ b/app/src/main/assets/es/about_licenses.html @@ -0,0 +1,1070 @@ + + + + + + + + + + + + + +

Derechos de autor

+

Navegador Privado tiene derechos de autor © 2015-2020 por Soren Stoutner.

+ +

Licencia

+

Navegador Privado está liberado bajo la licencia GPLv3+. + El texto completo de la licencia se encuentra en la parte inferior de este documento (se deja en el idioma original). + El código fuente está disponible en git.stoutner.com.

+ +

Listas de bloqueo

+

EasyList y EasyPrivacy + tienen licencia dual bajo las licencias GPLv3+ + y Creative Commons Attribution-ShareAlike 3.0+ Unported. Navegador Privado las incorpora usando la opción GPLv3+.

+ +

La lista molesta de Fanboy y la lista de bloqueo social de Fanboy + se liberan bajo la licencia Creative Commons Attribution 3.0 Unported, + la cual es compatible con la GPLv3+. Las listas se incluyen sin cambios en Navegador Privado.

+ +

Más información sobre las listas de bloqueo puede encontrarse en la página web de EasyList.

+ +

Librerías

+

Navegador Privado está construido con las librerías de AndroidX, + las librerías de Kotlin, + y código del repositorio de Google Material Maven, + que se publican bajo la Licencia Apache 2.0.

+ +

El sabor o versión libre de Navegador Privado está construido con anuncios de Firebase, + que se libera bajo la Licencia del Android Software Development Kit.

+ +

Clases

+

com.stoutner.privacybrowser.views.CheckedLinearLayout es una versión modificada de una clase incluida en el código fuente de + Android Camera. + El archivo original se liberó bajo la Licencia Apache 2.0. + El archivo modificado se libera bajo la licencia GPLv3+.

+ +

Iconos

+

+ derivan de security y de language, + que son parte del conjunto de iconos Android Material + y son liberados bajo la Licencia Apache 2.0. + El texto completo de la licencia se encuentra debajo. Copyright de modificaciones © 2016 Soren Stoutner. + Las imágenes resultantes se liberan bajo la licencia GPLv3+.

+

deriva de elementos de folder y exit_to_app, que son parte del + conjunto de iconos Android Material y son liberados bajo la Licencia Apache 2.0. + Copyright de modificaciones © 2017 Soren Stoutner. + La imagen resultante se libera bajo la licencia GPLv3+.

+

deriva de elementos de bookmark y create_new_folder, que son parte del + conjunto de iconos Android Material y son liberados bajo la Licencia Apache 2.0. + Copyright de modificaciones © 2017 Soren Stoutner. + La imagen resultante se libera bajo la licencia GPLv3+.

+

deriva de create_new_folder, + que es parte del conjunto de iconos Android Material y es liberado bajo la Licencia Apache 2.0. + Copyright de modificaciones © 2017 Soren Stoutner. + La imagen resultante se libera bajo la licencia GPLv3+.

+

deriva de exit_to_app, que es parte del conjunto de iconos Android Material + y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2017 Soren Stoutner. + La imagen resultante se libera bajo la licencia GPLv3+.

+

deriva de compare, que es parte del conjunto de iconos Android Material + y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2017 Soren Stoutner. + La imagen resultante se libera bajo la licencia GPLv3+.

+

deriva de sort, que es parte del conjunto de iconos Android Material + y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2019 Soren Stoutner. + La imagen resultante se libera bajo la licencia GPLv3+.

+

cookie fue creado por Google. + Es liberado bajo la licencia Apache 2.0 + y puede ser descargado desde Material Design Icons. + Está sin cambios, excepto por la información de diseño como el color y el tamaño.

+

Los siguientes iconos proceden de conjunto de iconos Android Material, + el cual es liberado bajo la licencia Apache 2.0. + Están sin cambios, excepto por la información de diseño como el color y el tamaño. Algunos de ellos se han renombrado para que coincida con su uso en el código. + Los iconos y los nombres originales se muestran a continuación.

+

add.

+

arrow_back.

+

arrow_forward.

+

bookmarks.

+

bug_report.

+

camera_enhance.

+

chrome_reader_mode.

+

close.

+

delete.

+

delete_forever.

+

devices_other.

+

dns.

+

donut_small.

+

edit.

+

expand_less.

+

expand_more.

+

file_copy.

+

file_download.

+

find_in_page.

+

folder.

+

home.

+

image.

+

import_contacts.

+

import_export.

+

important_devices.

+

info_outline.

+

language.

+

link_off.

+

list.

+

local_activity.

+

location_off.

+

lock.

+

map.

+

more.

+

new releases.

+

open_in_browser.

+

payment.

+

question_answer.

+

refresh.

+

save.

+

search.

+

select_all.

+

settings.

+

settings_overscan.

+

share.

+

smartphone.

+

sort.

+

style.

+

subtitles.

+

tab.

+

text_fields.

+

thumbs_up_down.

+

vertical_align_bottom.

+

vertical_align_top.

+

visibility_off.

+

vpn_key.

+

vpn_lock.

+

web.

+ +
+ +

GNU General Public License

+

Version 3, 29 June 2007

+ +

Copyright © 2007 Free Software Foundation, Inc. + <http://fsf.org/>

+ +

Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed.

+ +

Preamble

+ +

The GNU General Public License is a free, copyleft license for + software and other kinds of works.

+ +

The licenses for most software and other practical works are designed + to take away your freedom to share and change the works. By contrast, + the GNU General Public License is intended to guarantee your freedom to + share and change all versions of a program--to make sure it remains free + software for all its users. We, the Free Software Foundation, use the + GNU General Public License for most of our software; it applies also to + any other work released this way by its authors. You can apply it to + your programs, too.

+ +

When we speak of free software, we are referring to freedom, not + price. Our General Public Licenses are designed to make sure that you + have the freedom to distribute copies of free software (and charge for + them if you wish), that you receive source code or can get it if you + want it, that you can change the software or use pieces of it in new + free programs, and that you know you can do these things.

+ +

To protect your rights, we need to prevent others from denying you + these rights or asking you to surrender the rights. Therefore, you have + certain responsibilities if you distribute copies of the software, or if + you modify it: responsibilities to respect the freedom of others.

+ +

For example, if you distribute copies of such a program, whether + gratis or for a fee, you must pass on to the recipients the same + freedoms that you received. You must make sure that they, too, receive + or can get the source code. And you must show them these terms so they + know their rights.

+ +

Developers that use the GNU GPL protect your rights with two steps: + (1) assert copyright on the software, and (2) offer you this License + giving you legal permission to copy, distribute and/or modify it.

+ +

For the developers' and authors' protection, the GPL clearly explains + that there is no warranty for this free software. For both users' and + authors' sake, the GPL requires that modified versions be marked as + changed, so that their problems will not be attributed erroneously to + authors of previous versions.

+ +

Some devices are designed to deny users access to install or run + modified versions of the software inside them, although the manufacturer + can do so. This is fundamentally incompatible with the aim of + protecting users' freedom to change the software. The systematic + pattern of such abuse occurs in the area of products for individuals to + use, which is precisely where it is most unacceptable. Therefore, we + have designed this version of the GPL to prohibit the practice for those + products. If such problems arise substantially in other domains, we + stand ready to extend this provision to those domains in future versions + of the GPL, as needed to protect the freedom of users.

+ +

Finally, every program is threatened constantly by software patents. + States should not allow patents to restrict development and use of + software on general-purpose computers, but in those that do, we wish to + avoid the special danger that patents applied to a free program could + make it effectively proprietary. To prevent this, the GPL assures that + patents cannot be used to render the program non-free.

+ +

The precise terms and conditions for copying, distribution and + modification follow.

+ +

TERMS AND CONDITIONS

+ +

0. Definitions.

+ +

“This License” refers to version 3 of the GNU General Public License.

+ +

“Copyright” also means copyright-like laws that apply to other kinds of + works, such as semiconductor masks.

+ +

“The Program” refers to any copyrightable work licensed under this + License. Each licensee is addressed as “you”. “Licensees” and + “recipients” may be individuals or organizations.

+ +

To “modify” a work means to copy from or adapt all or part of the work + in a fashion requiring copyright permission, other than the making of an + exact copy. The resulting work is called a “modified version” of the + earlier work or a work “based on” the earlier work.

+ +

A “covered work” means either the unmodified Program or a work based + on the Program.

+ +

To “propagate” a work means to do anything with it that, without + permission, would make you directly or secondarily liable for + infringement under applicable copyright law, except executing it on a + computer or modifying a private copy. Propagation includes copying, + distribution (with or without modification), making available to the + public, and in some countries other activities as well.

+ +

To “convey” a work means any kind of propagation that enables other + parties to make or receive copies. Mere interaction with a user through + a computer network, with no transfer of a copy, is not conveying.

+ +

An interactive user interface displays “Appropriate Legal Notices” + to the extent that it includes a convenient and prominently visible + feature that (1) displays an appropriate copyright notice, and (2) + tells the user that there is no warranty for the work (except to the + extent that warranties are provided), that licensees may convey the + work under this License, and how to view a copy of this License. If + the interface presents a list of user commands or options, such as a + menu, a prominent item in the list meets this criterion.

+ +

1. Source Code.

+ +

The “source code” for a work means the preferred form of the work + for making modifications to it. “Object code” means any non-source + form of a work.

+ +

A “Standard Interface” means an interface that either is an official + standard defined by a recognized standards body, or, in the case of + interfaces specified for a particular programming language, one that + is widely used among developers working in that language.

+ +

The “System Libraries” of an executable work include anything, other + than the work as a whole, that (a) is included in the normal form of + packaging a Major Component, but which is not part of that Major + Component, and (b) serves only to enable use of the work with that + Major Component, or to implement a Standard Interface for which an + implementation is available to the public in source code form. A + “Major Component”, in this context, means a major essential component + (kernel, window system, and so on) of the specific operating system + (if any) on which the executable work runs, or a compiler used to + produce the work, or an object code interpreter used to run it.

+ +

The “Corresponding Source” for a work in object code form means all + the source code needed to generate, install, and (for an executable + work) run the object code and to modify the work, including scripts to + control those activities. However, it does not include the work's + System Libraries, or general-purpose tools or generally available free + programs which are used unmodified in performing those activities but + which are not part of the work. For example, Corresponding Source + includes interface definition files associated with source files for + the work, and the source code for shared libraries and dynamically + linked subprograms that the work is specifically designed to require, + such as by intimate data communication or control flow between those + subprograms and other parts of the work.

+ +

The Corresponding Source need not include anything that users + can regenerate automatically from other parts of the Corresponding + Source.

+ +

The Corresponding Source for a work in source code form is that + same work.

+ +

2. Basic Permissions.

+ +

All rights granted under this License are granted for the term of + copyright on the Program, and are irrevocable provided the stated + conditions are met. This License explicitly affirms your unlimited + permission to run the unmodified Program. The output from running a + covered work is covered by this License only if the output, given its + content, constitutes a covered work. This License acknowledges your + rights of fair use or other equivalent, as provided by copyright law.

+ +

You may make, run and propagate covered works that you do not + convey, without conditions so long as your license otherwise remains + in force. You may convey covered works to others for the sole purpose + of having them make modifications exclusively for you, or provide you + with facilities for running those works, provided that you comply with + the terms of this License in conveying all material for which you do + not control copyright. Those thus making or running the covered works + for you must do so exclusively on your behalf, under your direction + and control, on terms that prohibit them from making any copies of + your copyrighted material outside their relationship with you.

+ +

Conveying under any other circumstances is permitted solely under + the conditions stated below. Sublicensing is not allowed; section 10 + makes it unnecessary.

+ +

3. Protecting Users' Legal Rights From Anti-Circumvention Law.

+ +

No covered work shall be deemed part of an effective technological + measure under any applicable law fulfilling obligations under article + 11 of the WIPO copyright treaty adopted on 20 December 1996, or + similar laws prohibiting or restricting circumvention of such + measures.

+ +

When you convey a covered work, you waive any legal power to forbid + circumvention of technological measures to the extent such circumvention + is effected by exercising rights under this License with respect to + the covered work, and you disclaim any intention to limit operation or + modification of the work as a means of enforcing, against the work's + users, your or third parties' legal rights to forbid circumvention of + technological measures.

+ +

4. Conveying Verbatim Copies.

+ +

You may convey verbatim copies of the Program's source code as you + receive it, in any medium, provided that you conspicuously and + appropriately publish on each copy an appropriate copyright notice; + keep intact all notices stating that this License and any + non-permissive terms added in accord with section 7 apply to the code; + keep intact all notices of the absence of any warranty; and give all + recipients a copy of this License along with the Program.

+ +

You may charge any price or no price for each copy that you convey, + and you may offer support or warranty protection for a fee.

+ +

5. Conveying Modified Source Versions.

+ +

You may convey a work based on the Program, or the modifications to + produce it from the Program, in the form of source code under the + terms of section 4, provided that you also meet all of these conditions:

+ +
    +
  • a) The work must carry prominent notices stating that you modified + it, and giving a relevant date.
  • + +
  • b) The work must carry prominent notices stating that it is + released under this License and any conditions added under section + 7. This requirement modifies the requirement in section 4 to + “keep intact all notices”.
  • + +
  • c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it.
  • + +
  • d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so.
  • +
+ +

A compilation of a covered work with other separate and independent + works, which are not by their nature extensions of the covered work, + and which are not combined with it such as to form a larger program, + in or on a volume of a storage or distribution medium, is called an + “aggregate” if the compilation and its resulting copyright are not + used to limit the access or legal rights of the compilation's users + beyond what the individual works permit. Inclusion of a covered work + in an aggregate does not cause this License to apply to the other + parts of the aggregate.

+ +

6. Conveying Non-Source Forms.

+ +

You may convey a covered work in object code form under the terms + of sections 4 and 5, provided that you also convey the + machine-readable Corresponding Source under the terms of this License, + in one of these ways:

+ +
    +
  • a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange.
  • + +
  • b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the + Corresponding Source from a network server at no charge.
  • + +
  • c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b.
  • + +
  • d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements.
  • + +
  • e) Convey the object code using peer-to-peer transmission, provided + you inform other peers where the object code and Corresponding + Source of the work are being offered to the general public at no + charge under subsection 6d.
  • +
+ +

A separable portion of the object code, whose source code is excluded + from the Corresponding Source as a System Library, need not be + included in conveying the object code work.

+ +

A “User Product” is either (1) a “consumer product”, which means any + tangible personal property which is normally used for personal, family, + or household purposes, or (2) anything designed or sold for incorporation + into a dwelling. In determining whether a product is a consumer product, + doubtful cases shall be resolved in favor of coverage. For a particular + product received by a particular user, “normally used” refers to a + typical or common use of that class of product, regardless of the status + of the particular user or of the way in which the particular user + actually uses, or expects or is expected to use, the product. A product + is a consumer product regardless of whether the product has substantial + commercial, industrial or non-consumer uses, unless such uses represent + the only significant mode of use of the product.

+ +

“Installation Information” for a User Product means any methods, + procedures, authorization keys, or other information required to install + and execute modified versions of a covered work in that User Product from + a modified version of its Corresponding Source. The information must + suffice to ensure that the continued functioning of the modified object + code is in no case prevented or interfered with solely because + modification has been made.

+ +

If you convey an object code work under this section in, or with, or + specifically for use in, a User Product, and the conveying occurs as + part of a transaction in which the right of possession and use of the + User Product is transferred to the recipient in perpetuity or for a + fixed term (regardless of how the transaction is characterized), the + Corresponding Source conveyed under this section must be accompanied + by the Installation Information. But this requirement does not apply + if neither you nor any third party retains the ability to install + modified object code on the User Product (for example, the work has + been installed in ROM).

+ +

The requirement to provide Installation Information does not include a + requirement to continue to provide support service, warranty, or updates + for a work that has been modified or installed by the recipient, or for + the User Product in which it has been modified or installed. Access to a + network may be denied when the modification itself materially and + adversely affects the operation of the network or violates the rules and + protocols for communication across the network.

+ +

Corresponding Source conveyed, and Installation Information provided, + in accord with this section must be in a format that is publicly + documented (and with an implementation available to the public in + source code form), and must require no special password or key for + unpacking, reading or copying.

+ +

7. Additional Terms.

+ +

“Additional permissions” are terms that supplement the terms of this + License by making exceptions from one or more of its conditions. + Additional permissions that are applicable to the entire Program shall + be treated as though they were included in this License, to the extent + that they are valid under applicable law. If additional permissions + apply only to part of the Program, that part may be used separately + under those permissions, but the entire Program remains governed by + this License without regard to the additional permissions.

+ +

When you convey a copy of a covered work, you may at your option + remove any additional permissions from that copy, or from any part of + it. (Additional permissions may be written to require their own + removal in certain cases when you modify the work.) You may place + additional permissions on material, added by you to a covered work, + for which you have or can give appropriate copyright permission.

+ +

Notwithstanding any other provision of this License, for material you + add to a covered work, you may (if authorized by the copyright holders of + that material) supplement the terms of this License with terms:

+ +
    +
  • a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or
  • + +
  • b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or
  • + +
  • c) Prohibiting misrepresentation of the origin of that material, or + requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or
  • + +
  • d) Limiting the use for publicity purposes of names of licensors or + authors of the material; or
  • + +
  • e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or
  • + +
  • f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions of + it) with contractual assumptions of liability to the recipient, for + any liability that these contractual assumptions directly impose on + those licensors and authors.
  • +
+ +

All other non-permissive additional terms are considered “further + restrictions” within the meaning of section 10. If the Program as you + received it, or any part of it, contains a notice stating that it is + governed by this License along with a term that is a further + restriction, you may remove that term. If a license document contains + a further restriction but permits relicensing or conveying under this + License, you may add to a covered work material governed by the terms + of that license document, provided that the further restriction does + not survive such relicensing or conveying.

+ +

If you add terms to a covered work in accord with this section, you + must place, in the relevant source files, a statement of the + additional terms that apply to those files, or a notice indicating + where to find the applicable terms.

+ +

Additional terms, permissive or non-permissive, may be stated in the + form of a separately written license, or stated as exceptions; + the above requirements apply either way.

+ +

8. Termination.

+ +

You may not propagate or modify a covered work except as expressly + provided under this License. Any attempt otherwise to propagate or + modify it is void, and will automatically terminate your rights under + this License (including any patent licenses granted under the third + paragraph of section 11).

+ +

However, if you cease all violation of this License, then your + license from a particular copyright holder is reinstated (a) + provisionally, unless and until the copyright holder explicitly and + finally terminates your license, and (b) permanently, if the copyright + holder fails to notify you of the violation by some reasonable means + prior to 60 days after the cessation.

+ +

Moreover, your license from a particular copyright holder is + reinstated permanently if the copyright holder notifies you of the + violation by some reasonable means, this is the first time you have + received notice of violation of this License (for any work) from that + copyright holder, and you cure the violation prior to 30 days after + your receipt of the notice.

+ +

Termination of your rights under this section does not terminate the + licenses of parties who have received copies or rights from you under + this License. If your rights have been terminated and not permanently + reinstated, you do not qualify to receive new licenses for the same + material under section 10.

+ +

9. Acceptance Not Required for Having Copies.

+ +

You are not required to accept this License in order to receive or + run a copy of the Program. Ancillary propagation of a covered work + occurring solely as a consequence of using peer-to-peer transmission + to receive a copy likewise does not require acceptance. However, + nothing other than this License grants you permission to propagate or + modify any covered work. These actions infringe copyright if you do + not accept this License. Therefore, by modifying or propagating a + covered work, you indicate your acceptance of this License to do so.

+ +

10. Automatic Licensing of Downstream Recipients.

+ +

Each time you convey a covered work, the recipient automatically + receives a license from the original licensors, to run, modify and + propagate that work, subject to this License. You are not responsible + for enforcing compliance by third parties with this License.

+ +

An “entity transaction” is a transaction transferring control of an + organization, or substantially all assets of one, or subdividing an + organization, or merging organizations. If propagation of a covered + work results from an entity transaction, each party to that + transaction who receives a copy of the work also receives whatever + licenses to the work the party's predecessor in interest had or could + give under the previous paragraph, plus a right to possession of the + Corresponding Source of the work from the predecessor in interest, if + the predecessor has it or can get it with reasonable efforts.

+ +

You may not impose any further restrictions on the exercise of the + rights granted or affirmed under this License. For example, you may + not impose a license fee, royalty, or other charge for exercise of + rights granted under this License, and you may not initiate litigation + (including a cross-claim or counterclaim in a lawsuit) alleging that + any patent claim is infringed by making, using, selling, offering for + sale, or importing the Program or any portion of it.

+ +

11. Patents.

+ +

A “contributor” is a copyright holder who authorizes use under this + License of the Program or a work on which the Program is based. The + work thus licensed is called the contributor's “contributor version”.

+ +

A contributor's “essential patent claims” are all patent claims + owned or controlled by the contributor, whether already acquired or + hereafter acquired, that would be infringed by some manner, permitted + by this License, of making, using, or selling its contributor version, + but do not include claims that would be infringed only as a + consequence of further modification of the contributor version. For + purposes of this definition, “control” includes the right to grant + patent sublicenses in a manner consistent with the requirements of + this License.

+ +

Each contributor grants you a non-exclusive, worldwide, royalty-free + patent license under the contributor's essential patent claims, to + make, use, sell, offer for sale, import and otherwise run, modify and + propagate the contents of its contributor version.

+ +

In the following three paragraphs, a “patent license” is any express + agreement or commitment, however denominated, not to enforce a patent + (such as an express permission to practice a patent or covenant not to + sue for patent infringement). To “grant” such a patent license to a + party means to make such an agreement or commitment not to enforce a + patent against the party.

+ +

If you convey a covered work, knowingly relying on a patent license, + and the Corresponding Source of the work is not available for anyone + to copy, free of charge and under the terms of this License, through a + publicly available network server or other readily accessible means, + then you must either (1) cause the Corresponding Source to be so + available, or (2) arrange to deprive yourself of the benefit of the + patent license for this particular work, or (3) arrange, in a manner + consistent with the requirements of this License, to extend the patent + license to downstream recipients. “Knowingly relying” means you have + actual knowledge that, but for the patent license, your conveying the + covered work in a country, or your recipient's use of the covered work + in a country, would infringe one or more identifiable patents in that + country that you have reason to believe are valid.

+ +

If, pursuant to or in connection with a single transaction or + arrangement, you convey, or propagate by procuring conveyance of, a + covered work, and grant a patent license to some of the parties + receiving the covered work authorizing them to use, propagate, modify + or convey a specific copy of the covered work, then the patent license + you grant is automatically extended to all recipients of the covered + work and works based on it.

+ +

A patent license is “discriminatory” if it does not include within + the scope of its coverage, prohibits the exercise of, or is + conditioned on the non-exercise of one or more of the rights that are + specifically granted under this License. You may not convey a covered + work if you are a party to an arrangement with a third party that is + in the business of distributing software, under which you make payment + to the third party based on the extent of your activity of conveying + the work, and under which the third party grants, to any of the + parties who would receive the covered work from you, a discriminatory + patent license (a) in connection with copies of the covered work + conveyed by you (or copies made from those copies), or (b) primarily + for and in connection with specific products or compilations that + contain the covered work, unless you entered into that arrangement, + or that patent license was granted, prior to 28 March 2007.

+ +

Nothing in this License shall be construed as excluding or limiting + any implied license or other defenses to infringement that may + otherwise be available to you under applicable patent law.

+ +

12. No Surrender of Others' Freedom.

+ +

If conditions are imposed on you (whether by court order, agreement or + otherwise) that contradict the conditions of this License, they do not + excuse you from the conditions of this License. If you cannot convey a + covered work so as to satisfy simultaneously your obligations under this + License and any other pertinent obligations, then as a consequence you may + not convey it at all. For example, if you agree to terms that obligate you + to collect a royalty for further conveying from those to whom you convey + the Program, the only way you could satisfy both those terms and this + License would be to refrain entirely from conveying the Program.

+ +

13. Use with the GNU Affero General Public License.

+ +

Notwithstanding any other provision of this License, you have + permission to link or combine any covered work with a work licensed + under version 3 of the GNU Affero General Public License into a single + combined work, and to convey the resulting work. The terms of this + License will continue to apply to the part which is the covered work, + but the special requirements of the GNU Affero General Public License, + section 13, concerning interaction through a network will apply to the + combination as such.

+ +

14. Revised Versions of this License.

+ +

The Free Software Foundation may publish revised and/or new versions of + the GNU General Public License from time to time. Such new versions will + be similar in spirit to the present version, but may differ in detail to + address new problems or concerns.

+ +

Each version is given a distinguishing version number. If the + Program specifies that a certain numbered version of the GNU General + Public License “or any later version” applies to it, you have the + option of following the terms and conditions either of that numbered + version or of any later version published by the Free Software + Foundation. If the Program does not specify a version number of the + GNU General Public License, you may choose any version ever published + by the Free Software Foundation.

+ +

If the Program specifies that a proxy can decide which future + versions of the GNU General Public License can be used, that proxy's + public statement of acceptance of a version permanently authorizes you + to choose that version for the Program.

+ +

Later license versions may give you additional or different + permissions. However, no additional obligations are imposed on any + author or copyright holder as a result of your choosing to follow a + later version.

+ +

15. Disclaimer of Warranty.

+ +

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY + APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT + HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY + OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, + THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM + IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF + ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

+ +

16. Limitation of Liability.

+ +

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING + WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS + THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY + GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE + USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF + DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD + PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), + EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF + SUCH DAMAGES.

+ +

17. Interpretation of Sections 15 and 16.

+ +

If the disclaimer of warranty and limitation of liability provided + above cannot be given local legal effect according to their terms, + reviewing courts shall apply local law that most closely approximates + an absolute waiver of all civil liability in connection with the + Program, unless a warranty or assumption of liability accompanies a + copy of the Program in return for a fee.

+ +

END OF TERMS AND CONDITIONS

+ +

How to Apply These Terms to Your New Programs

+ +

If you develop a new program, and you want it to be of the greatest + possible use to the public, the best way to achieve this is to make it + free software which everyone can redistribute and change under these terms.

+ +

To do so, attach the following notices to the program. It is safest + to attach them to the start of each source file to most effectively + state the exclusion of warranty; and each file should have at least + the “copyright” line and a pointer to where the full notice is found.

+ +
<one line to give the program’s name
+and a brief idea of what it does.>
+Copyright (C) <year>  <name of author>
+
+This program is free software: you can
+redistribute it and/or modify
+it under the terms of the GNU General
+Public License as published by the Free
+Software Foundation, either version 3
+of the License, or(at your option)
+any later version.
+
+This program is distributed in the hope
+that it will be useful, but WITHOUT ANY
+WARRANTY; without even the implied
+warranty of MERCHANTABILITY or FITNESS
+FOR A PARTICULAR PURPOSE.  See the GNU
+General Public License for more details.
+
+You should have received a copy of the
+GNU General Public License along with
+this program.  If not, see
+<http://www.gnu.org/licenses/>.
+ +

Also add information on how to contact you by electronic and paper mail.

+ +

If the program does terminal interaction, make it output a short + notice like this when it starts in an interactive mode:

+ +
<program>  Copyright (C) <year>
+<name of author>
+This program comes with ABSOLUTELY NO
+WARRANTY; for details type `show w'.
+This is free software, and you are
+welcome to redistribute it under
+certain conditions; type `show c'
+for details.
+ +

The hypothetical commands `show w' and `show c' should show the appropriate + parts of the General Public License. Of course, your program's commands + might be different; for a GUI interface, you would use an “about box”.

+ +

You should also get your employer (if you work as a programmer) or school, + if any, to sign a “copyright disclaimer” for the program, if necessary. + For more information on this, and how to apply and follow the GNU GPL, see + <http://www.gnu.org/licenses/>.

+ +

The GNU General Public License does not permit incorporating your program + into proprietary programs. If your program is a subroutine library, you + may consider it more useful to permit linking proprietary applications with + the library. If this is what you want to do, use the GNU Lesser General + Public License instead of this License. But first, please read + <http://www.gnu.org/philosophy/why-not-lgpl.html>.

+ +
+ +

Apache License

+

Version 2.0, January 2004

+

http://www.apache.org/licenses/

+ +

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

+ +

1. Definitions.

+ +

“License” shall mean the terms and conditions for use, reproduction, and + distribution as defined by Sections 1 through 9 of this document.

+ +

“Licensor” shall mean the copyright owner or entity authorized by the + copyright owner that is granting the License.

+ +

“Legal Entity” shall mean the union of the acting entity and all other + entities that control, are controlled by, or are under common control with + that entity. For the purposes of this definition, “control” means (i) the + power, direct or indirect, to cause the direction or management of such + entity, whether by contract or otherwise, or (ii) ownership of fifty + percent (50%) or more of the outstanding shares, or (iii) beneficial + ownership of such entity.

+ +

“You” (or “Your”) shall mean an individual or Legal Entity exercising + permissions granted by this License.

+ +

“Source” form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation source, + and configuration files.

+ +

“Object” form shall mean any form resulting from mechanical transformation + or translation of a Source form, including but not limited to compiled + object code, generated documentation, and conversions to other media types.

+ +

“Work” shall mean the work of authorship, whether in Source or Object form, + made available under the License, as indicated by a copyright notice that + is included in or attached to the work (an example is provided in the + Appendix below).

+ +

“Derivative Works” shall mean any work, whether in Source or Object form, + that is based on (or derived from) the Work and for which the editorial + revisions, annotations, elaborations, or other modifications represent, as + a whole, an original work of authorship. For the purposes of this License, + Derivative Works shall not include works that remain separable from, or + merely link (or bind by name) to the interfaces of, the Work and Derivative + Works thereof.

+ +

“Contribution” shall mean any work of authorship, including the original + version of the Work and any modifications or additions to that Work or + Derivative Works thereof, that is intentionally submitted to Licensor for + inclusion in the Work by the copyright owner or by an individual or Legal + Entity authorized to submit on behalf of the copyright owner. For the + purposes of this definition, “submitted” means any form of electronic, + verbal, or written communication sent to the Licensor or its + representatives, including but not limited to communication on electronic + mailing lists, source code control systems, and issue tracking systems that + are managed by, or on behalf of, the Licensor for the purpose of discussing + and improving the Work, but excluding communication that is conspicuously + marked or otherwise designated in writing by the copyright owner as “Not a + Contribution.”

+ +

“Contributor” shall mean Licensor and any individual or Legal Entity on + behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work.

+ +

2. Grant of Copyright License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby + grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, + irrevocable copyright license to reproduce, prepare Derivative Works of, publicly + display, publicly perform, sublicense, and distribute the Work and such + Derivative Works in Source or Object form.

+ +

3. Grant of Patent License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby grants + to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, use, + offer to sell, sell, import, and otherwise transfer the Work, where such + license applies only to those patent claims licensable by such Contributor + that are necessarily infringed by their Contribution(s) alone or by + combination of their Contribution(s) with the Work to which such + Contribution(s) was submitted. If You institute patent litigation against + any entity (including a cross-claim or counterclaim in a lawsuit) alleging + that the Work or a Contribution incorporated within the Work constitutes + direct or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate as of the + date such litigation is filed.

+ +

4. Redistribution.

+ +

You may reproduce and distribute copies of the Work or Derivative Works thereof + in any medium, with or without modifications, and in Source or Object form, provided + that You meet the following conditions:

+ +
    +
  1. You must give any other recipients of the Work or Derivative Works a + copy of this License; and
  2. + +
  3. You must cause any modified files to carry prominent notices stating + that You changed the files; and
  4. + +
  5. You must retain, in the Source form of any Derivative Works that You + distribute, all copyright, patent, trademark, and attribution notices from + the Source form of the Work, excluding those notices that do not pertain to + any part of the Derivative Works; and
  6. + +
  7. If the Work includes a “NOTICE” text file as part of its distribution, + then any Derivative Works that You distribute must include a readable copy + of the attribution notices contained within such NOTICE file, excluding + those notices that do not pertain to any part of the Derivative Works, in + at least one of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or documentation, + if provided along with the Derivative Works; or, within a display generated + by the Derivative Works, if and wherever such third-party notices normally + appear. The contents of the NOTICE file are for informational purposes only + and do not modify the License. You may add Your own attribution notices + within Derivative Works that You distribute, alongside or as an addendum to + the NOTICE text from the Work, provided that such additional attribution + notices cannot be construed as modifying the License. +
    +
    + You may add Your own copyright statement to Your modifications and may + provide additional or different license terms and conditions for use, + reproduction, or distribution of Your modifications, or for any such + Derivative Works as a whole, provided Your use, reproduction, and + distribution of the Work otherwise complies with the conditions stated in + this License.
  8. +
+ +

5. Submission of Contributions.

+ +

Unless You explicitly state otherwise, any Contribution intentionally submitted for + inclusion in the Work by You to the Licensor shall be under the terms and + conditions of this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify the + terms of any separate license agreement you may have executed with Licensor + regarding such Contributions.

+ +

6. Trademarks.

+ +

This License does not grant permission to use the trade names, trademarks, service marks, + or product names of the Licensor, except as required for reasonable and customary use + in describing the origin of the Work and reproducing the content of the + NOTICE file.

+ +

7. Disclaimer of Warranty.

+ +

Unless required by applicable law or agreed to in writing, Licensor provides the Work + (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT + WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, + without limitation, any warranties or conditions of TITLE, + NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You + are solely responsible for determining the appropriateness of using or + redistributing the Work and assume any risks associated with Your exercise + of permissions under this License.

+ +

8. Limitation of Liability.

+ +

In no event and under no legal theory, whether in tort (including negligence), contract, + or otherwise, unless required by applicable law (such as deliberate and + grossly negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a result + of this License or out of the use or inability to use the Work (including + but not limited to damages for loss of goodwill, work stoppage, computer + failure or malfunction, or any and all other commercial damages or losses), + even if such Contributor has been advised of the possibility of such + damages.

+ +

9. Accepting Warranty or Additional Liability.

+ +

While redistributing the Work or Derivative Works thereof, You may choose + to offer, and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this License. + However, in accepting such obligations, You may act only on Your own behalf + and on Your sole responsibility, not on behalf of any other Contributor, + and only if You agree to indemnify, defend, and hold each Contributor + harmless for any liability incurred by, or claims asserted against, such + Contributor by reason of your accepting any such warranty or additional + liability.

+ +

END OF TERMS AND CONDITIONS

+ +

APPENDIX: How to apply the Apache License to your work

+ +

To apply the Apache License to your work, attach the following boilerplate + notice, with the fields enclosed by brackets “[]” replaced with your own + identifying information. (Don’t include the brackets!) The text should be + enclosed in the appropriate comment syntax for the file format. We also + recommend that a file or class name and description of purpose be included + on the same “printed page” as the copyright notice for easier + identification within third-party archives.

+
Copyright [yyyy] [name of copyright owner]
+
+Licensed under the Apache License,
+Version 2.0 (the “License”);
+you may not use this file except
+in compliance with the License.
+You may obtain a copy of the License at
+
+http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law
+or agreed to in writing, software
+distributed under the License is
+distributed on an “AS IS” BASIS,
+WITHOUT WARRANTIES OR CONDITIONS
+OF ANY KIND, either express or implied.
+See the License for the specific
+language governing permissions and
+limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/es/about_licenses_dark.html b/app/src/main/assets/es/about_licenses_dark.html deleted file mode 100644 index 0731f5f4..00000000 --- a/app/src/main/assets/es/about_licenses_dark.html +++ /dev/null @@ -1,1065 +0,0 @@ - - - - - - - - - - -

Derechos de autor

-

Navegador Privado tiene derechos de autor © 2015-2020 por Soren Stoutner.

- -

Licencia

-

Navegador Privado está liberado bajo la licencia GPLv3+. - El texto completo de la licencia se encuentra en la parte inferior de este documento (se deja en el idioma original). - El código fuente está disponible en git.stoutner.com.

- -

Listas de bloqueo

-

EasyList y EasyPrivacy - tienen licencia dual bajo las licencias GPLv3+ - y Creative Commons Attribution-ShareAlike 3.0+ Unported. Navegador Privado las incorpora usando la opción GPLv3+.

- -

La lista molesta de Fanboy y la lista de bloqueo social de Fanboy - se liberan bajo la licencia Creative Commons Attribution 3.0 Unported, - la cual es compatible con la GPLv3+. Las listas se incluyen sin cambios en Navegador Privado.

- -

Más información sobre las listas de bloqueo puede encontrarse en la página web de EasyList.

- -

Librerías

-

Navegador Privado está construido con las librerías de AndroidX, - las librerías de Kotlin, - y código del repositorio de Google Material Maven, - que se publican bajo la Licencia Apache 2.0.

- -

El sabor o versión libre de Navegador Privado está construido con anuncios de Firebase, - que se libera bajo la Licencia del Android Software Development Kit.

- -

Clases

-

com.stoutner.privacybrowser.views.CheckedLinearLayout es una versión modificada de una clase incluida en el código fuente de - Android Camera. - El archivo original se liberó bajo la Licencia Apache 2.0. - El archivo modificado se libera bajo la licencia GPLv3+.

- -

Iconos

-

- derivan de security y de language, - que son parte del conjunto de iconos Android Material - y son liberados bajo la Licencia Apache 2.0. El texto completo de la licencia se encuentra debajo. - Copyright de modificaciones © 2016 Soren Stoutner. - Las imágenes resultantes se liberan bajo la licencia GPLv3+.

-

deriva de elementos de folder y exit_to_app, que son parte del - conjunto de iconos Android Material y son liberados bajo la Licencia Apache 2.0. - Copyright de modificaciones © 2017 Soren Stoutner. - La imagen resultante se libera bajo la licencia GPLv3+.

-

deriva de elementos de bookmark y create_new_folder, que son parte del - conjunto de iconos Android Material y son liberados bajo la Licencia Apache 2.0. - Copyright de modificaciones © 2017 Soren Stoutner. - La imagen resultante se libera bajo la licencia GPLv3+.

-

deriva de create_new_folder, - que es parte del conjunto de iconos Android Material y es liberado bajo la Licencia Apache 2.0. - Copyright de modificaciones © 2017 Soren Stoutner. - La imagen resultante se libera bajo la licencia GPLv3+.

-

deriva de exit_to_app, que es parte del conjunto de iconos Android Material - y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2017 Soren Stoutner. - La imagen resultante se libera bajo la licencia GPLv3+.

-

deriva de compare, que es parte del conjunto de iconos Android Material - y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2017 Soren Stoutner. - La imagen resultante se libera bajo la licencia GPLv3+.

-

deriva de sort, que es parte del conjunto de iconos Android Material - y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2019 Soren Stoutner. - La imagen resultante se libera bajo la licencia GPLv3+.

-

cookie fue creado por Google. Es liberado bajo la licencia Apache 2.0 - y puede ser descargado desde Material Design Icons. - Está sin cambios, excepto por la información de diseño como el color y el tamaño.

-

Los siguientes iconos proceden de conjunto de iconos Android Material, - el cual es liberado bajo la licencia Apache 2.0. - Están sin cambios, excepto por la información de diseño como el color y el tamaño. Algunos de ellos se han renombrado para que coincida con su uso en el código. - Los iconos y los nombres originales se muestran a continuación.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

-
- -

GNU General Public License

-

Version 3, 29 June 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.

- -

Preamble

- -

The GNU General Public License is a free, copyleft license for - software and other kinds of works.

- -

The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a program--to make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.

- -

When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.

- -

To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.

- -

For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.

- -

Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.

- -

For the developers' and authors' protection, the GPL clearly explains - that there is no warranty for this free software. For both users' and - authors' sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.

- -

Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting users' freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.

- -

Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.

- -

The precise terms and conditions for copying, distribution and - modification follow.

- -

TERMS AND CONDITIONS

- -

0. Definitions.

- -

“This License” refers to version 3 of the GNU General Public License.

- -

“Copyright” also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.

- -

“The Program” refers to any copyrightable work licensed under this - License. Each licensee is addressed as “you”. “Licensees” and - “recipients” may be individuals or organizations.

- -

To “modify” a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a “modified version” of the - earlier work or a work “based on” the earlier work.

- -

A “covered work” means either the unmodified Program or a work based - on the Program.

- -

To “propagate” a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.

- -

To “convey” a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.

- -

An interactive user interface displays “Appropriate Legal Notices” - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.

- -

1. Source Code.

- -

The “source code” for a work means the preferred form of the work - for making modifications to it. “Object code” means any non-source - form of a work.

- -

A “Standard Interface” means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.

- -

The “System Libraries” of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - “Major Component”, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.

- -

The “Corresponding Source” for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the work's - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.

- -

The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.

- -

The Corresponding Source for a work in source code form is that - same work.

- -

2. Basic Permissions.

- -

All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.

- -

You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.

- -

Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.

- -

3. Protecting Users' Legal Rights From Anti-Circumvention Law.

- -

No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.

- -

When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the work's - users, your or third parties' legal rights to forbid circumvention of - technological measures.

- -

4. Conveying Verbatim Copies.

- -

You may convey verbatim copies of the Program's source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.

- -

You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.

- -

5. Conveying Modified Source Versions.

- -

You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:

- -
    -
  • a) The work must carry prominent notices stating that you modified - it, and giving a relevant date.
  • - -
  • b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - “keep intact all notices”.
  • - -
  • c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it.
  • - -
  • d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so.
  • -
- -

A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - “aggregate” if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilation's users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.

- -

6. Conveying Non-Source Forms.

- -

You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:

- -
    -
  • a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange.
  • - -
  • b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge.
  • - -
  • c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b.
  • - -
  • d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements.
  • - -
  • e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d.
  • -
- -

A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.

- -

A “User Product” is either (1) a “consumer product”, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, “normally used” refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.

- -

“Installation Information” for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.

- -

If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).

- -

The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.

- -

Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.

- -

7. Additional Terms.

- -

“Additional permissions” are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.

- -

When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.

- -

Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:

- -
    -
  • a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or
  • - -
  • b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or
  • - -
  • c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or
  • - -
  • d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or
  • - -
  • e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or
  • - -
  • f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors.
  • -
- -

All other non-permissive additional terms are considered “further - restrictions” within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.

- -

If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.

- -

Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.

- -

8. Termination.

- -

You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).

- -

However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.

- -

Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.

- -

Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.

- -

9. Acceptance Not Required for Having Copies.

- -

You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.

- -

10. Automatic Licensing of Downstream Recipients.

- -

Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.

- -

An “entity transaction” is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the party's predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.

- -

You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.

- -

11. Patents.

- -

A “contributor” is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributor's “contributor version”.

- -

A contributor's “essential patent claims” are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, “control” includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.

- -

Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributor's essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.

- -

In the following three paragraphs, a “patent license” is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To “grant” such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.

- -

If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. “Knowingly relying” means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipient's use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.

- -

If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.

- -

A patent license is “discriminatory” if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.

- -

Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.

- -

12. No Surrender of Others' Freedom.

- -

If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.

- -

13. Use with the GNU Affero General Public License.

- -

Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.

- -

14. Revised Versions of this License.

- -

The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.

- -

Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License “or any later version” applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.

- -

If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxy's - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.

- -

Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.

- -

15. Disclaimer of Warranty.

- -

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

- -

16. Limitation of Liability.

- -

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.

- -

17. Interpretation of Sections 15 and 16.

- -

If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.

- -

END OF TERMS AND CONDITIONS

- -

How to Apply These Terms to Your New Programs

- -

If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.

- -

To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the “copyright” line and a pointer to where the full notice is found.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Also add information on how to contact you by electronic and paper mail.

- -

If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your program's commands - might be different; for a GUI interface, you would use an “about box”.

- -

You should also get your employer (if you work as a programmer) or school, - if any, to sign a “copyright disclaimer” for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.

- -

The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/es/about_licenses_light.html b/app/src/main/assets/es/about_licenses_light.html deleted file mode 100644 index ef5cfb4f..00000000 --- a/app/src/main/assets/es/about_licenses_light.html +++ /dev/null @@ -1,1067 +0,0 @@ - - - - - - - - - - -

Derechos de autor

-

Navegador Privado tiene derechos de autor © 2015-2020 por Soren Stoutner.

- -

Licencia

-

Navegador Privado está liberado bajo la licencia GPLv3+. - El texto completo de la licencia se encuentra en la parte inferior de este documento (se deja en el idioma original). - El código fuente está disponible en git.stoutner.com.

- -

Listas de bloqueo

-

EasyList y EasyPrivacy - tienen licencia dual bajo las licencias GPLv3+ - y Creative Commons Attribution-ShareAlike 3.0+ Unported. Navegador Privado las incorpora usando la opción GPLv3+.

- -

La lista molesta de Fanboy y la lista de bloqueo social de Fanboy - se liberan bajo la licencia Creative Commons Attribution 3.0 Unported, - la cual es compatible con la GPLv3+. Las listas se incluyen sin cambios en Navegador Privado.

- -

Más información sobre las listas de bloqueo puede encontrarse en la página web de EasyList.

- -

Librerías

-

Navegador Privado está construido con las librerías de AndroidX, - las librerías de Kotlin, - y código del repositorio de Google Material Maven, - que se publican bajo la Licencia Apache 2.0.

- -

El sabor o versión libre de Navegador Privado está construido con anuncios de Firebase, - que se libera bajo la Licencia del Android Software Development Kit.

- -

Clases

-

com.stoutner.privacybrowser.views.CheckedLinearLayout es una versión modificada de una clase incluida en el código fuente de - Android Camera. - El archivo original se liberó bajo la Licencia Apache 2.0. - El archivo modificado se libera bajo la licencia GPLv3+.

- -

Iconos

-

- derivan de security y de language, - que son parte del conjunto de iconos Android Material - y son liberados bajo la Licencia Apache 2.0. - El texto completo de la licencia se encuentra debajo. Copyright de modificaciones © 2016 Soren Stoutner. - Las imágenes resultantes se liberan bajo la licencia GPLv3+.

-

deriva de elementos de folder y exit_to_app, que son parte del - conjunto de iconos Android Material y son liberados bajo la Licencia Apache 2.0. - Copyright de modificaciones © 2017 Soren Stoutner. - La imagen resultante se libera bajo la licencia GPLv3+.

-

deriva de elementos de bookmark y create_new_folder, que son parte del - conjunto de iconos Android Material y son liberados bajo la Licencia Apache 2.0. - Copyright de modificaciones © 2017 Soren Stoutner. - La imagen resultante se libera bajo la licencia GPLv3+.

-

deriva de create_new_folder, - que es parte del conjunto de iconos Android Material y es liberado bajo la Licencia Apache 2.0. - Copyright de modificaciones © 2017 Soren Stoutner. - La imagen resultante se libera bajo la licencia GPLv3+.

-

deriva de exit_to_app, que es parte del conjunto de iconos Android Material - y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2017 Soren Stoutner. - La imagen resultante se libera bajo la licencia GPLv3+.

-

deriva de compare, que es parte del conjunto de iconos Android Material - y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2017 Soren Stoutner. - La imagen resultante se libera bajo la licencia GPLv3+.

-

deriva de sort, que es parte del conjunto de iconos Android Material - y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2019 Soren Stoutner. - La imagen resultante se libera bajo la licencia GPLv3+.

-

cookie fue creado por Google. - Es liberado bajo la licencia Apache 2.0 - y puede ser descargado desde Material Design Icons. - Está sin cambios, excepto por la información de diseño como el color y el tamaño.

-

Los siguientes iconos proceden de conjunto de iconos Android Material, - el cual es liberado bajo la licencia Apache 2.0. - Están sin cambios, excepto por la información de diseño como el color y el tamaño. Algunos de ellos se han renombrado para que coincida con su uso en el código. - Los iconos y los nombres originales se muestran a continuación.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

- -
- -

GNU General Public License

-

Version 3, 29 June 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.

- -

Preamble

- -

The GNU General Public License is a free, copyleft license for - software and other kinds of works.

- -

The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a program--to make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.

- -

When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.

- -

To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.

- -

For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.

- -

Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.

- -

For the developers' and authors' protection, the GPL clearly explains - that there is no warranty for this free software. For both users' and - authors' sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.

- -

Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting users' freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.

- -

Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.

- -

The precise terms and conditions for copying, distribution and - modification follow.

- -

TERMS AND CONDITIONS

- -

0. Definitions.

- -

“This License” refers to version 3 of the GNU General Public License.

- -

“Copyright” also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.

- -

“The Program” refers to any copyrightable work licensed under this - License. Each licensee is addressed as “you”. “Licensees” and - “recipients” may be individuals or organizations.

- -

To “modify” a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a “modified version” of the - earlier work or a work “based on” the earlier work.

- -

A “covered work” means either the unmodified Program or a work based - on the Program.

- -

To “propagate” a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.

- -

To “convey” a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.

- -

An interactive user interface displays “Appropriate Legal Notices” - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.

- -

1. Source Code.

- -

The “source code” for a work means the preferred form of the work - for making modifications to it. “Object code” means any non-source - form of a work.

- -

A “Standard Interface” means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.

- -

The “System Libraries” of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - “Major Component”, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.

- -

The “Corresponding Source” for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the work's - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.

- -

The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.

- -

The Corresponding Source for a work in source code form is that - same work.

- -

2. Basic Permissions.

- -

All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.

- -

You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.

- -

Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.

- -

3. Protecting Users' Legal Rights From Anti-Circumvention Law.

- -

No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.

- -

When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the work's - users, your or third parties' legal rights to forbid circumvention of - technological measures.

- -

4. Conveying Verbatim Copies.

- -

You may convey verbatim copies of the Program's source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.

- -

You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.

- -

5. Conveying Modified Source Versions.

- -

You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:

- -
    -
  • a) The work must carry prominent notices stating that you modified - it, and giving a relevant date.
  • - -
  • b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - “keep intact all notices”.
  • - -
  • c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it.
  • - -
  • d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so.
  • -
- -

A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - “aggregate” if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilation's users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.

- -

6. Conveying Non-Source Forms.

- -

You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:

- -
    -
  • a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange.
  • - -
  • b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge.
  • - -
  • c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b.
  • - -
  • d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements.
  • - -
  • e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d.
  • -
- -

A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.

- -

A “User Product” is either (1) a “consumer product”, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, “normally used” refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.

- -

“Installation Information” for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.

- -

If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).

- -

The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.

- -

Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.

- -

7. Additional Terms.

- -

“Additional permissions” are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.

- -

When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.

- -

Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:

- -
    -
  • a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or
  • - -
  • b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or
  • - -
  • c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or
  • - -
  • d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or
  • - -
  • e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or
  • - -
  • f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors.
  • -
- -

All other non-permissive additional terms are considered “further - restrictions” within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.

- -

If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.

- -

Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.

- -

8. Termination.

- -

You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).

- -

However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.

- -

Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.

- -

Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.

- -

9. Acceptance Not Required for Having Copies.

- -

You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.

- -

10. Automatic Licensing of Downstream Recipients.

- -

Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.

- -

An “entity transaction” is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the party's predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.

- -

You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.

- -

11. Patents.

- -

A “contributor” is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributor's “contributor version”.

- -

A contributor's “essential patent claims” are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, “control” includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.

- -

Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributor's essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.

- -

In the following three paragraphs, a “patent license” is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To “grant” such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.

- -

If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. “Knowingly relying” means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipient's use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.

- -

If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.

- -

A patent license is “discriminatory” if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.

- -

Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.

- -

12. No Surrender of Others' Freedom.

- -

If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.

- -

13. Use with the GNU Affero General Public License.

- -

Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.

- -

14. Revised Versions of this License.

- -

The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.

- -

Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License “or any later version” applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.

- -

If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxy's - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.

- -

Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.

- -

15. Disclaimer of Warranty.

- -

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

- -

16. Limitation of Liability.

- -

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.

- -

17. Interpretation of Sections 15 and 16.

- -

If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.

- -

END OF TERMS AND CONDITIONS

- -

How to Apply These Terms to Your New Programs

- -

If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.

- -

To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the “copyright” line and a pointer to where the full notice is found.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Also add information on how to contact you by electronic and paper mail.

- -

If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your program's commands - might be different; for a GUI interface, you would use an “about box”.

- -

You should also get your employer (if you work as a programmer) or school, - if any, to sign a “copyright disclaimer” for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.

- -

The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/es/about_links.html b/app/src/main/assets/es/about_links.html new file mode 100644 index 00000000..0dc204d7 --- /dev/null +++ b/app/src/main/assets/es/about_links.html @@ -0,0 +1,49 @@ + + + + + + + + + + + + + +

Páginas web

+ +

+ Noticias

+ +

+ Hoja de ruta

+ +

+ Seguimiento de errores y petición de funciones

+ +

+ Foro

+ +

+ GitWeb

+ + \ No newline at end of file diff --git a/app/src/main/assets/es/about_links_dark.html b/app/src/main/assets/es/about_links_dark.html deleted file mode 100644 index 5a89bcbf..00000000 --- a/app/src/main/assets/es/about_links_dark.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -

Páginas web

- -

- Noticias

- -

- Hoja de ruta

- -

- Seguimiento de errores y petición de funciones

- -

- Foro

- -

- GitWeb

- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_links_light.html b/app/src/main/assets/es/about_links_light.html deleted file mode 100644 index d3cc091e..00000000 --- a/app/src/main/assets/es/about_links_light.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -

Páginas web

- -

- Noticias

- -

- Hoja de ruta

- -

- Seguimiento de errores y petición de funciones

- -

- Foro

- -

- GitWeb

- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_permissions.html b/app/src/main/assets/es/about_permissions.html new file mode 100644 index 00000000..5a4a7e80 --- /dev/null +++ b/app/src/main/assets/es/about_permissions.html @@ -0,0 +1,50 @@ + + + + + + + + + + + + + +

Tener acceso completo a la red

+

android.permission.INTERNET

+

Requerido para que WebView consiga acceso a internet. Sin este permiso, Navegador Privado sería “Sin Navegador: Protegiendo su privacidad estando completamente desconectado de internet”.

+ +

Instalar accesos directos

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

Requerido para añadir accesos directos de páginas web en el escritorio.

+ +

Almacenamiento de lectura

+

android.permission.READ_EXTERNAL_STORAGE

+

Requerido para importar la configuración de las carpetas públicas. + En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio importar la configuración desde las carpetas de la aplicación.

+ +

Almacenamiento de escritura

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Requerido para exportar la configuración y descargar archivos a las carpetas públicas. + En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio exportar la configuración y almacenar las descargas en las carpetas de la aplicación.

+ + \ No newline at end of file diff --git a/app/src/main/assets/es/about_permissions_dark.html b/app/src/main/assets/es/about_permissions_dark.html deleted file mode 100644 index 17e65e21..00000000 --- a/app/src/main/assets/es/about_permissions_dark.html +++ /dev/null @@ -1,47 +0,0 @@ - - - - - - - - - - -

Tener acceso completo a la red

-

android.permission.INTERNET

-

Requerido para que WebView consiga acceso a internet. Sin este permiso, Navegador Privado sería “Sin Navegador: Protegiendo su privacidad estando completamente desconectado de internet”.

- -

Instalar accesos directos

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Requerido para añadir accesos directos de páginas web en el escritorio.

- -

Almacenamiento de lectura

-

android.permission.READ_EXTERNAL_STORAGE

-

Requerido para importar la configuración de las carpetas públicas. - En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio importar la configuración desde las carpetas de la aplicación.

- -

Almacenamiento de escritura

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Requerido para exportar la configuración y descargar archivos a las carpetas públicas. - En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio exportar la configuración y almacenar las descargas en las carpetas de la aplicación.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_permissions_light.html b/app/src/main/assets/es/about_permissions_light.html deleted file mode 100644 index b674b8b5..00000000 --- a/app/src/main/assets/es/about_permissions_light.html +++ /dev/null @@ -1,47 +0,0 @@ - - - - - - - - - - -

Tener acceso completo a la red

-

android.permission.INTERNET

-

Requerido para que WebView consiga acceso a internet. Sin este permiso, Navegador Privado sería “Sin Navegador: Protegiendo su privacidad estando completamente desconectado de internet”.

- -

Instalar accesos directos

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Requerido para añadir accesos directos de páginas web en el escritorio.

- -

Almacenamiento de lectura

-

android.permission.READ_EXTERNAL_STORAGE

-

Requerido para importar la configuración de las carpetas públicas. - En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio importar la configuración desde las carpetas de la aplicación.

- -

Almacenamiento de escritura

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Requerido para exportar la configuración y descargar archivos a las carpetas públicas. - En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio exportar la configuración y almacenar las descargas en las carpetas de la aplicación.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_privacy_policy.html b/app/src/main/assets/es/about_privacy_policy.html new file mode 100644 index 00000000..4a1469a6 --- /dev/null +++ b/app/src/main/assets/es/about_privacy_policy.html @@ -0,0 +1,94 @@ + + + + + + + + + + + + + +

Navegador Privado

+

Navegador Privado no recoge ninguna información del usuario.

+ + +

Google Play

+

Google Play tiene su propia política de privacidad. + Google proporciona información resumida y anónima de instalación a los desarrolladores, incluyendo el número de instalaciones, organizadas por las siguientes categorías.

+
    +
  • Versión de Android (p.ej. Android 7.1)
  • +
  • Dispositivo (p.ej. Samsung Galaxy S6 [zeroflte])
  • +
  • Tabletas (p.ej. Tabletas de 10" o más)
  • +
  • País (p.ej. Estados Unidos)
  • +
  • Lenguaje (p.ej. Inglés [Estados Unidos])
  • +
  • Versión de app (p.ej. 14)
  • +
  • Proveedor (p.ej. T-Mobile - US)
  • +
+ + +

Calificaciones de Google Play

+

Google Play tiene su propia política de privacidad. + Google proporciona a los desarrolladores resúmenes anónimos de la siguiente información relativa a las valoraciones de los usuarios.

+
    +
  • País (p.ej. Estados Unidos)
  • +
  • Lenguaje (p.ej. Inglés)
  • +
  • Versión de app (p.ej. 14)
  • +
  • Versión de Android (p.ej. Android 7.1)
  • +
  • Dispositivo (p.ej. Google Nexux 5X [bullhead])
  • +
  • Tabletas (p.ej. Tabletas de 10" o más)
  • +
+ + +

Comentarios de Google Play

+

Google Play tiene su propia política de privacidad. + Además del nombre del comentador, la calificación y el texto del comentario (las cuales están disponibles públicamente), Google proporciona alguna o toda la siguiente información al desarrollador.

+
    +
  • Código de versión (p.ej. 7)
  • +
  • Nombre de versión (p.ej. 1.6)
  • +
  • Versión de Android (p.ej. Android 5.1)
  • +
  • Dispositivo (p.ej. Galaxy S6 Edge+ [zenitel])
  • +
  • Fabricante (p.ej. Samsung)
  • +
  • Tipo de dispositivo (p.ej. Teléfono)
  • +
  • Fabricante de CPU (p.ej. Samsung)
  • +
  • Modelo de CPU (p.ej. Exynos 7420)
  • +
  • Densidad de pantalla (p.ej. 560 dpi)
  • +
  • Tamaño de pantalla (p.ej. 2560 x 1440)
  • +
  • RAM (p.ej. 4096 MB)
  • +
  • Plataforma nativa (p.ej. armeabi-v7a,armeabi,arm64v8a)
  • +
  • Versión de OpenGL ES (p.ej. 3.1)
  • +
  • Lenguaje del dispositivo (p.ej. Inglés)
  • +
+ + +

Comunicaciones directas

+

Los usuarios pueden elegir enviar comunicaciones directas a Stoutner, como mensajes de correo electrónico y comentarios en stoutner.com.

+ +

Uso de Información

+

Stoutner puede utilizar esta información para ayudar en el desarrollo de Navegador Privado y comunicar el estado del proyecto a los usuarios. + Stoutner nunca vendrá la información ni la transferirá a ninguna tercera parte que la pudiera usar para publicidad o marketing.

+ +
+

Revisión 1.7, 14 de mayo de 2019

+ + \ No newline at end of file diff --git a/app/src/main/assets/es/about_privacy_policy_dark.html b/app/src/main/assets/es/about_privacy_policy_dark.html deleted file mode 100644 index 46369378..00000000 --- a/app/src/main/assets/es/about_privacy_policy_dark.html +++ /dev/null @@ -1,91 +0,0 @@ - - - - - - - - - - -

Navegador Privado

-

Navegador Privado no recoge ninguna información del usuario.

- - -

Google Play

-

Google Play tiene su propia política de privacidad. - Google proporciona información resumida y anónima de instalación a los desarrolladores, incluyendo el número de instalaciones, organizadas por las siguientes categorías.

-
    -
  • Versión de Android (p.ej. Android 7.1)
  • -
  • Dispositivo (p.ej. Samsung Galaxy S6 [zeroflte])
  • -
  • Tabletas (p.ej. Tabletas de 10" o más)
  • -
  • País (p.ej. Estados Unidos)
  • -
  • Lenguaje (p.ej. Inglés [Estados Unidos])
  • -
  • Versión de app (p.ej. 14)
  • -
  • Proveedor (p.ej. T-Mobile - US)
  • -
- - -

Calificaciones de Google Play

-

Google Play tiene su propia política de privacidad. - Google proporciona a los desarrolladores resúmenes anónimos de la siguiente información relativa a las valoraciones de los usuarios.

-
    -
  • País (p.ej. Estados Unidos)
  • -
  • Lenguaje (p.ej. Inglés)
  • -
  • Versión de app (p.ej. 14)
  • -
  • Versión de Android (p.ej. Android 7.1)
  • -
  • Dispositivo (p.ej. Google Nexux 5X [bullhead])
  • -
  • Tabletas (p.ej. Tabletas de 10" o más)
  • -
- - -

Comentarios de Google Play

-

Google Play tiene su propia política de privacidad. - Además del nombre del comentador, la calificación y el texto del comentario (las cuales están disponibles públicamente), Google proporciona alguna o toda la siguiente información al desarrollador.

-
    -
  • Código de versión (p.ej. 7)
  • -
  • Nombre de versión (p.ej. 1.6)
  • -
  • Versión de Android (p.ej. Android 5.1)
  • -
  • Dispositivo (p.ej. Galaxy S6 Edge+ [zenitel])
  • -
  • Fabricante (p.ej. Samsung)
  • -
  • Tipo de dispositivo (p.ej. Teléfono)
  • -
  • Fabricante de CPU (p.ej. Samsung)
  • -
  • Modelo de CPU (p.ej. Exynos 7420)
  • -
  • Densidad de pantalla (p.ej. 560 dpi)
  • -
  • Tamaño de pantalla (p.ej. 2560 x 1440)
  • -
  • RAM (p.ej. 4096 MB)
  • -
  • Plataforma nativa (p.ej. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Versión de OpenGL ES (p.ej. 3.1)
  • -
  • Lenguaje del dispositivo (p.ej. Inglés)
  • -
- - -

Comunicaciones directas

-

Los usuarios pueden elegir enviar comunicaciones directas a Stoutner, como mensajes de correo electrónico y comentarios en stoutner.com.

- -

Uso de Información

-

Stoutner puede utilizar esta información para ayudar en el desarrollo de Navegador Privado y comunicar el estado del proyecto a los usuarios. - Stoutner nunca vendrá la información ni la transferirá a ninguna tercera parte que la pudiera usar para publicidad o marketing.

- -
-

Revisión 1.6, 22 de mayo de 2018

- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_privacy_policy_light.html b/app/src/main/assets/es/about_privacy_policy_light.html deleted file mode 100644 index abe6d65e..00000000 --- a/app/src/main/assets/es/about_privacy_policy_light.html +++ /dev/null @@ -1,91 +0,0 @@ - - - - - - - - - - -

Navegador Privado

-

Navegador Privado no recoge ninguna información del usuario.

- - -

Google Play

-

Google Play tiene su propia política de privacidad. - Google proporciona información resumida y anónima de instalación a los desarrolladores, incluyendo el número de instalaciones, organizadas por las siguientes categorías.

-
    -
  • Versión de Android (p.ej. Android 7.1)
  • -
  • Dispositivo (p.ej. Samsung Galaxy S6 [zeroflte])
  • -
  • Tabletas (p.ej. Tabletas de 10" o más)
  • -
  • País (p.ej. Estados Unidos)
  • -
  • Lenguaje (p.ej. Inglés [Estados Unidos])
  • -
  • Versión de app (p.ej. 14)
  • -
  • Proveedor (p.ej. T-Mobile - US)
  • -
- - -

Calificaciones de Google Play

-

Google Play tiene su propia política de privacidad. - Google proporciona a los desarrolladores resúmenes anónimos de la siguiente información relativa a las valoraciones de los usuarios.

-
    -
  • País (p.ej. Estados Unidos)
  • -
  • Lenguaje (p.ej. Inglés)
  • -
  • Versión de app (p.ej. 14)
  • -
  • Versión de Android (p.ej. Android 7.1)
  • -
  • Dispositivo (p.ej. Google Nexux 5X [bullhead])
  • -
  • Tabletas (p.ej. Tabletas de 10" o más)
  • -
- - -

Comentarios de Google Play

-

Google Play tiene su propia política de privacidad. - Además del nombre del comentador, la calificación y el texto del comentario (las cuales están disponibles públicamente), Google proporciona alguna o toda la siguiente información al desarrollador.

-
    -
  • Código de versión (p.ej. 7)
  • -
  • Nombre de versión (p.ej. 1.6)
  • -
  • Versión de Android (p.ej. Android 5.1)
  • -
  • Dispositivo (p.ej. Galaxy S6 Edge+ [zenitel])
  • -
  • Fabricante (p.ej. Samsung)
  • -
  • Tipo de dispositivo (p.ej. Teléfono)
  • -
  • Fabricante de CPU (p.ej. Samsung)
  • -
  • Modelo de CPU (p.ej. Exynos 7420)
  • -
  • Densidad de pantalla (p.ej. 560 dpi)
  • -
  • Tamaño de pantalla (p.ej. 2560 x 1440)
  • -
  • RAM (p.ej. 4096 MB)
  • -
  • Plataforma nativa (p.ej. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Versión de OpenGL ES (p.ej. 3.1)
  • -
  • Lenguaje del dispositivo (p.ej. Inglés)
  • -
- - -

Comunicaciones directas

-

Los usuarios pueden elegir enviar comunicaciones directas a Stoutner, como mensajes de correo electrónico y comentarios en stoutner.com.

- -

Uso de Información

-

Stoutner puede utilizar esta información para ayudar en el desarrollo de Navegador Privado y comunicar el estado del proyecto a los usuarios. - Stoutner nunca vendrá la información ni la transferirá a ninguna tercera parte que la pudiera usar para publicidad o marketing.

- -
-

Revisión 1.6, 22 de mayo de 2018

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_domain_settings.html b/app/src/main/assets/es/guide_domain_settings.html new file mode 100644 index 00000000..906057df --- /dev/null +++ b/app/src/main/assets/es/guide_domain_settings.html @@ -0,0 +1,44 @@ + + + + + + + + + + + + + +

Navegación web segura

+ +

Por defecto Navegador Privado navega con Javascript, cookies y almacenamiento DOM desactivados. + Sin embargo, algunas páginas web necesitan legítimamente estas características para funcionar correctamente. + La configuración de dominio puede activar automáticamente un conjunto específico de características al visitar un dominio designado.

+ + + +

Al visitar un dominio que tiene la configuración de dominio especificada, el fondo de la casilla de texto de la URL es verde.

+ + + + \ No newline at end of file diff --git a/app/src/main/assets/es/guide_domain_settings_dark.html b/app/src/main/assets/es/guide_domain_settings_dark.html deleted file mode 100644 index dfe37d13..00000000 --- a/app/src/main/assets/es/guide_domain_settings_dark.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -

Navegación web segura

- -

Por defecto Navegador Privado navega con Javascript, cookies y almacenamiento DOM desactivados. - Sin embargo, algunas páginas web necesitan legítimamente estas características para funcionar correctamente. - La configuración de dominio puede activar automáticamente un conjunto específico de características al visitar un dominio designado.

- -

- -

Al visitar un dominio que tiene la configuración de dominio especificada, el fondo de la casilla de texto de la URL es verde.

- -

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_domain_settings_light.html b/app/src/main/assets/es/guide_domain_settings_light.html deleted file mode 100644 index 607d1e75..00000000 --- a/app/src/main/assets/es/guide_domain_settings_light.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -

Navegación web segura

- -

Por defecto Navegador Privado navega con Javascript, cookies y almacenamiento DOM desactivados. - Sin embargo, algunas páginas web necesitan legítimamente estas características para funcionar correctamente. - La configuración de dominio puede activar automáticamente un conjunto específico de características al visitar un dominio designado.

- -

- -

Al visitar un dominio que tiene la configuración de dominio especificada, el fondo de la casilla de texto de la URL es verde.

- -

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_javascript.html b/app/src/main/assets/es/guide_javascript.html new file mode 100644 index 00000000..d3936f48 --- /dev/null +++ b/app/src/main/assets/es/guide_javascript.html @@ -0,0 +1,61 @@ + + + + + + + + + + + + + +

Javascript es poderoso

+ +

En los principios de internet las páginas web eran estáticas, sólo contenían textos e imágenes que eran mostradas en la pantalla y no podían cambiarse o interactuar con el usuario. + Por supuesto, nada muy interesante puede pasar con contenido estático. Se desarrollaron diferentes tecnologías para facilitar páginas web dinámicas. Javascript es una de estas tecnologías.

+ +

Javascript es un lenguaje de programación. Muchos servidores web alojan programas escritos en Javascript, que son enviados a los dispositivos como parte de la página web. + El dispositivo ejecuta este Javascript en su procesador local y sigue los comandos del programa, el cual puede animar imágenes en dicho sitio web, abrir un menú emergente, + y hacer muchas otras cosas útiles.

+ + +

Javascript es peligroso

+ +

Por supuesto, el concepto de ejecutar programas arbitrarios de un sitio web es potencialmente peligroso. Es por ello que hay limitaciones en Javascript para evitar que haga cosas como instalar virus. + Sin embargo, resulta que estas limitaciones son demasiado amplias. Abajo tenemos una captura de pantalla de la web webkay, + que es una web que muestra el tipo de información que Javascript puede producir sobre un dispositivo. Browser Leaks es otro buen recurso.

+ +

+ +

Con fines de privacidad, lo ideal sería navegar por internet con Javascript deshabilitado. + Sin embargo, hay algunas páginas web que requieren legítimamente de Javascript para lograr sus propósitos, + y otras que no funcionan correctamente sin Javascript aunque pudieran programarse para hacerlo así. Navegador Privado aborda esto haciendo sencillo el poder activar y desactivar Javascript. + Tocando el escudo de privacidad alternará entre azul o amarillo + (los cuales indican que Javascript está deshabilitado) y rojo (Javascript habilitado). + Revisar la diferente información que webkay puede recoger con Javascript habilitado y deshabilitado es informativo.

+ +

Navegar por internet con Javascript desactivado, y activarlo únicamente cuando se necesite, contribuye en gran medida en la protección de la privacidad del usuario. + Además, JavaScript se utiliza para cargar gran parte de los anuncios molestos y el arsenal adicional que viene junto con la mayoría de las páginas web modernas. + Con esta opción desactivada, las páginas web se cargarán más rápido, consumirán menos tráfico de red y usarán menos energía de la CPU, lo que se traduce en una mayor duración de la batería.

+ + \ No newline at end of file diff --git a/app/src/main/assets/es/guide_javascript_dark.html b/app/src/main/assets/es/guide_javascript_dark.html deleted file mode 100644 index f8532a6b..00000000 --- a/app/src/main/assets/es/guide_javascript_dark.html +++ /dev/null @@ -1,58 +0,0 @@ - - - - - - - - - - -

Javascript es poderoso

- -

En los principios de internet las páginas web eran estáticas, sólo contenían textos e imágenes que eran mostradas en la pantalla y no podían cambiarse o interactuar con el usuario. - Por supuesto, nada muy interesante puede pasar con contenido estático. Se desarrollaron diferentes tecnologías para facilitar páginas web dinámicas. Javascript es una de estas tecnologías.

- -

Javascript es un lenguaje de programación. Muchos servidores web alojan programas escritos en Javascript, que son enviados a los dispositivos como parte de la página web. - El dispositivo ejecuta este Javascript en su procesador local y sigue los comandos del programa, el cual puede animar imágenes en dicho sitio web, abrir un menú emergente, - y hacer muchas otras cosas útiles.

- - -

Javascript es peligroso

- -

Por supuesto, el concepto de ejecutar programas arbitrarios de un sitio web es potencialmente peligroso. Es por ello que hay limitaciones en Javascript para evitar que haga cosas como instalar virus. - Sin embargo, resulta que estas limitaciones son demasiado amplias. Abajo tenemos una captura de pantalla de la web webkay, - que es una web que muestra el tipo de información que Javascript puede producir sobre un dispositivo. Browser Leaks es otro buen recurso.

- -

- -

Con fines de privacidad, lo ideal sería navegar por internet con Javascript deshabilitado. - Sin embargo, hay algunas páginas web que requieren legítimamente de Javascript para lograr sus propósitos, - y otras que no funcionan correctamente sin Javascript aunque pudieran programarse para hacerlo así. Navegador Privado aborda esto haciendo sencillo el poder activar y desactivar Javascript. - Tocando el escudo de privacidad alternará entre azul o amarillo - (los cuales indican que Javascript está deshabilitado) y rojo (Javascript habilitado). - Revisar la diferente información que webkay puede recoger con Javascript habilitado y deshabilitado es informativo.

- -

Navegar por internet con Javascript desactivado, y activarlo únicamente cuando se necesite, contribuye en gran medida en la protección de la privacidad del usuario. - Además, JavaScript se utiliza para cargar gran parte de los anuncios molestos y el arsenal adicional que viene junto con la mayoría de las páginas web modernas. - Con esta opción desactivada, las páginas web se cargarán más rápido, consumirán menos tráfico de red y usarán menos energía de la CPU, lo que se traduce en una mayor duración de la batería.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_javascript_light.html b/app/src/main/assets/es/guide_javascript_light.html deleted file mode 100644 index c76e62af..00000000 --- a/app/src/main/assets/es/guide_javascript_light.html +++ /dev/null @@ -1,58 +0,0 @@ - - - - - - - - - - -

Javascript es poderoso

- -

En los principios de internet las páginas web eran estáticas, sólo contenían textos e imágenes que eran mostradas en la pantalla y no podían cambiarse o interactuar con el usuario. - Por supuesto, nada muy interesante puede pasar con contenido estático. Se desarrollaron diferentes tecnologías para facilitar páginas web dinámicas. Javascript es una de estas tecnologías.

- -

Javascript es un lenguaje de programación. Muchos servidores web alojan programas escritos en Javascript, que son enviados a los dispositivos como parte de la página web. - El dispositivo ejecuta este Javascript en su procesador local y sigue los comandos del programa, el cual puede animar imágenes en dicho sitio web, abrir un menú emergente, - y hacer muchas otras cosas útiles.

- - -

Javascript es peligroso

- -

Por supuesto, el concepto de ejecutar programas arbitrarios de un sitio web es potencialmente peligroso. Es por ello que hay limitaciones en Javascript para evitar que haga cosas como instalar virus. - Sin embargo, resulta que estas limitaciones son demasiado amplias. Abajo tenemos una captura de pantalla de la web webkay, - que es una web que muestra el tipo de información que Javascript puede producir sobre un dispositivo. Browser Leaks es otro buen recurso.

- -

- -

Con fines de privacidad, lo ideal sería navegar por internet con Javascript deshabilitado. - Sin embargo, hay algunas páginas web que requieren legítimamente de Javascript para lograr sus propósitos, - y otras que no funcionan correctamente sin Javascript aunque pudieran programarse para hacerlo así. Navegador Privado aborda esto haciendo sencillo el poder activar y desactivar Javascript. - Tocando el escudo de privacidad alternará entre azul o amarillo - (los cuales indican que Javascript está deshabilitado) y rojo (Javascript habilitado). - Revisar la diferente información que webkay puede recoger con Javascript habilitado y deshabilitado es informativo.

- -

Navegar por internet con Javascript desactivado, y activarlo únicamente cuando se necesite, contribuye en gran medida en la protección de la privacidad del usuario. - Además, JavaScript se utiliza para cargar gran parte de los anuncios molestos y el arsenal adicional que viene junto con la mayoría de las páginas web modernas. - Con esta opción desactivada, las páginas web se cargarán más rápido, consumirán menos tráfico de red y usarán menos energía de la CPU, lo que se traduce en una mayor duración de la batería.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_local_storage.html b/app/src/main/assets/es/guide_local_storage.html new file mode 100644 index 00000000..7ca21a52 --- /dev/null +++ b/app/src/main/assets/es/guide_local_storage.html @@ -0,0 +1,96 @@ + + + + + + + + + + + + + +

Cookies de primera parte

+ +

Las cookies de primera parte son cookies establecidas por la página web en la barra URL de la parte superior de la página.

+ +

Desde los primeros días de internet, se hizo evidente que sería ventajoso para las páginas web el poder almacenar información en un ordenador para un acceso futuro. + Por ejemplo, una página web que muestre información meteorológica podría solicitar al usuario un código postal y luego almacenarlo en una cookie. + La próxima vez que el usuario visite la página web, la información meteorológica se cargará automáticamente para ese código postal, sin que el usuario tenga que volver a introducirlo.

+ +

Como todo en la web, gente inteligente descubrió todo tipo de maneras de abusar de las cookies para hacer cosas que los usuarios no aprobarían si supieran que estaban ocurriendo. + Por ejemplo, una página web puede establecer una cookie con un número de serie único en un dispositivo. + Luego, cada vez que un usuario visite la página web con ese dispositivo, puede vincularse a un perfil único que el servidor mantiene para ese número de serie, + incluso si el dispositivo se conecta desde diferentes direcciones IP.

+ +

Casi todas las páginas web con inicios de sesión requieren que las cookies de primera parte estén habilitadas para que el usuario pueda iniciar sesión. + Así es como se aseguran de que sigues siendo tu al moverte de una página a otra en el sitio, y es, en mi opinión, uno de los pocos usos legítimos de las cookies.

+ +

Si las cookies de primera parte están habilitadas pero Javascript está deshabilitado, + el icono de privacidad será amarillo como advertencia.

+ + +

Cookies de terceras partes

+ +

Las cookies de terceras partes son establecidas por ciertas partes de una página web que son cargadas desde servidores diferentes a la URL de la parte superior de la página. + Por ejemplo, la mayoría de páginas web que tienen anuncios los cargan desde una compañía de publicidad de terceros, como Ad Sense de Google. + Cada vez que se carga la página web, solicita a la compañía de publicidad que muestre un anuncio. + La compañía de publicidad analiza cualquier información que pueda tener sobre el usuario, analiza la tasa actual que los anunciantes están dispuestos a pagar por sus anuncios, + y selecciona uno para mostrar. La sección de la página web que muestra los anuncios es cargada desde el servidor de la compañía de terceros en vez de hacerlo desde el servidor principal.

+ +

Ya que la mayoría de los anuncios en internet se muestran desde solo unas pequeñas compañías, + no les llevó a éstas mucho tiempo en darse cuenta que podrían establecer una cookie de seguimiento en el dispositivo del usuario y así conocer cualquier lugar al que el usuario va. + Cada vez que un anuncio se carga desde una compañía, lo primero que hace es comprobar si el dispositivo ya tiene un único número de serie en una cookie de seguimiento. + Si es así, busca el perfil para ese número de serie y toma nota del nuevo sitio web. + Es por esto que un usuario puede hacer una búsqueda en una página web por un producto que normalmente no busca, como nueces, + y luego de pronto empieza a ver anuncios de nueces en cada página web que visita.

+ +

Además de compañías de publicidad, las páginas de redes sociales descubrieron que también podían entrar en acción. + Hace unos pocos años, las principales páginas de redes sociales como Facebook y Twitter convencieron a un gran número de páginas web + que sería por su mejor interés colocar pequeños iconos de redes sociales en sus páginas. Éstos no son sólo imágenes. + Contienen código incrustado que enlazan de nuevo a la web de la red social, + y entre otras cosas cargan una cookie de terceras partes en el dispositivo. Estas cookies se colocan aunque el usuario no tenga una cuenta con la plataforma de la red social. + A través del tiempo, compañías como Facebook (la cual también corre una red de anuncios) han construído un gran número de perfiles detallados sobre personas que + ni siquiera han creado una cuenta en su web. + +

No existe ninguna buena razón para habilitar cookies de terceras partes. En dispositivos con Android KitKat o anteriores (versión <= 4.4.4 o API <= 20), WebView no + distingue entre cookies de primera parte + y cookies de teceras partes. Por lo tanto, si se habilitan las cookies de primera parte también se habilitarán las de teceras partes.

+ + +

Almacenamiento DOM

+ +

Document Object Model storage (o Almacenamiento de modelos de objetos de documento), también conocido como almacenamiento web, es como cookies con esteroides. + Mientras que el tamaño máximo de almacenamiento combinado para todas las cookies de una única URL es de 4 kilobytes, el almacenamiento DOM puede contener + megabytes por sitio. + Ya que el almacenamiento DOM usa JavaScript para leer y escribir datos, no puede activarse a menos que JavaScript esté también activado.

+ + +

Datos de formulario

+ +

Los datos de formulario contienen información escrita en formularios web, como nombres de usuario, direcciones, números de teléfono, etc., y los enumera en un cuadro desplegable en futuras visitas. + A diferencia de las otras formas de almacenamiento local, los datos de los formularios no se envían al servidor web sin la interacción específica del usuario. + A partir de Android Oreo (8.0), los datos de formulario de WebView fueron reemplazados por el + servicio Autofill. + Como tal, los controles para los datos de formulario ya no aparecen en los dispositivos Android más nuevos.

+ + \ No newline at end of file diff --git a/app/src/main/assets/es/guide_local_storage_dark.html b/app/src/main/assets/es/guide_local_storage_dark.html deleted file mode 100644 index 8634221a..00000000 --- a/app/src/main/assets/es/guide_local_storage_dark.html +++ /dev/null @@ -1,93 +0,0 @@ - - - - - - - - - - -

Cookies de primera parte

- -

Las cookies de primera parte son cookies establecidas por la página web en la barra URL de la parte superior de la página.

- -

Desde los primeros días de internet, se hizo evidente que sería ventajoso para las páginas web el poder almacenar información en un ordenador para un acceso futuro. - Por ejemplo, una página web que muestre información meteorológica podría solicitar al usuario un código postal y luego almacenarlo en una cookie. - La próxima vez que el usuario visite la página web, la información meteorológica se cargará automáticamente para ese código postal, sin que el usuario tenga que volver a introducirlo.

- -

Como todo en la web, gente inteligente descubrió todo tipo de maneras de abusar de las cookies para hacer cosas que los usuarios no aprobarían si supieran que estaban ocurriendo. - Por ejemplo, una página web puede establecer una cookie con un número de serie único en un dispositivo. - Luego, cada vez que un usuario visite la página web con ese dispositivo, puede vincularse a un perfil único que el servidor mantiene para ese número de serie, - incluso si el dispositivo se conecta desde diferentes direcciones IP.

- -

Casi todas las páginas web con inicios de sesión requieren que las cookies de primera parte estén habilitadas para que el usuario pueda iniciar sesión. - Así es como se aseguran de que sigues siendo tu al moverte de una página a otra en el sitio, y es, en mi opinión, uno de los pocos usos legítimos de las cookies.

- -

Si las cookies de primera parte están habilitadas pero Javascript está deshabilitado, - el icono de privacidad será amarillo como advertencia.

- - -

Cookies de terceras partes

- -

Las cookies de terceras partes son establecidas por ciertas partes de una página web que son cargadas desde servidores diferentes a la URL de la parte superior de la página. - Por ejemplo, la mayoría de páginas web que tienen anuncios los cargan desde una compañía de publicidad de terceros, como Ad Sense de Google. - Cada vez que se carga la página web, solicita a la compañía de publicidad que muestre un anuncio. - La compañía de publicidad analiza cualquier información que pueda tener sobre el usuario, analiza la tasa actual que los anunciantes están dispuestos a pagar por sus anuncios, - y selecciona uno para mostrar. La sección de la página web que muestra los anuncios es cargada desde el servidor de la compañía de terceros en vez de hacerlo desde el servidor principal.

- -

Ya que la mayoría de los anuncios en internet se muestran desde solo unas pequeñas compañías, - no les llevó a éstas mucho tiempo en darse cuenta que podrían establecer una cookie de seguimiento en el dispositivo del usuario y así conocer cualquier lugar al que el usuario va. - Cada vez que un anuncio se carga desde una compañía, lo primero que hace es comprobar si el dispositivo ya tiene un único número de serie en una cookie de seguimiento. - Si es así, busca el perfil para ese número de serie y toma nota del nuevo sitio web. - Es por esto que un usuario puede hacer una búsqueda en una página web por un producto que normalmente no busca, como nueces, - y luego de pronto empieza a ver anuncios de nueces en cada página web que visita.

- -

Además de compañías de publicidad, las páginas de redes sociales descubrieron que también podían entrar en acción. - Hace unos pocos años, las principales páginas de redes sociales como Facebook y Twitter convencieron a un gran número de páginas web - que sería por su mejor interés colocar pequeños iconos de redes sociales en sus páginas. Éstos no son sólo imágenes. - Contienen código incrustado que enlazan de nuevo a la web de la red social, - y entre otras cosas cargan una cookie de terceras partes en el dispositivo. Estas cookies se colocan aunque el usuario no tenga una cuenta con la plataforma de la red social. - A través del tiempo, compañías como Facebook (la cual también corre una red de anuncios) han construído un gran número de perfiles detallados sobre personas que - ni siquiera han creado una cuenta en su web. - -

No existe ninguna buena razón para habilitar cookies de terceras partes. En dispositivos con Android KitKat o anteriores (versión <= 4.4.4 o API <= 20), WebView no - distingue entre cookies de primera parte - y cookies de teceras partes. Por lo tanto, si se habilitan las cookies de primera parte también se habilitarán las de teceras partes.

- - -

Almacenamiento DOM

- -

Document Object Model storage (o Almacenamiento de modelos de objetos de documento), también conocido como almacenamiento web, es como cookies con esteroides. - Mientras que el tamaño máximo de almacenamiento combinado para todas las cookies de una única URL es de 4 kilobytes, el almacenamiento DOM puede contener - megabytes por sitio. - Ya que el almacenamiento DOM usa JavaScript para leer y escribir datos, no puede activarse a menos que JavaScript esté también activado.

- - -

Datos de formulario

- -

Los datos de formulario contienen información escrita en formularios web, como nombres de usuario, direcciones, números de teléfono, etc., y los enumera en un cuadro desplegable en futuras visitas. - A diferencia de las otras formas de almacenamiento local, los datos de los formularios no se envían al servidor web sin la interacción específica del usuario. - A partir de Android Oreo (8.0), los datos de formulario de WebView fueron reemplazados por el - servicio Autofill. - Como tal, los controles para los datos de formulario ya no aparecen en los dispositivos Android más nuevos.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_local_storage_light.html b/app/src/main/assets/es/guide_local_storage_light.html deleted file mode 100644 index 9639c5f7..00000000 --- a/app/src/main/assets/es/guide_local_storage_light.html +++ /dev/null @@ -1,93 +0,0 @@ - - - - - - - - - - -

Cookies de primera parte

- -

Las cookies de primera parte son cookies establecidas por la página web en la barra URL de la parte superior de la página.

- -

Desde los primeros días de internet, se hizo evidente que sería ventajoso para las páginas web el poder almacenar información en un ordenador para un acceso futuro. - Por ejemplo, una página web que muestre información meteorológica podría solicitar al usuario un código postal y luego almacenarlo en una cookie. - La próxima vez que el usuario visite la página web, la información meteorológica se cargará automáticamente para ese código postal, sin que el usuario tenga que volver a introducirlo.

- -

Como todo en la web, gente inteligente descubrió todo tipo de maneras de abusar de las cookies para hacer cosas que los usuarios no aprobarían si supieran que estaban ocurriendo. - Por ejemplo, una página web puede establecer una cookie con un número de serie único en un dispositivo. - Luego, cada vez que un usuario visite la página web con ese dispositivo, puede vincularse a un perfil único que el servidor mantiene para ese número de serie, - incluso si el dispositivo se conecta desde diferentes direcciones IP.

- -

Casi todas las páginas web con inicios de sesión requieren que las cookies de primera parte estén habilitadas para que el usuario pueda iniciar sesión. - Así es como se aseguran de que sigues siendo tu al moverte de una página a otra en el sitio, y es, en mi opinión, uno de los pocos usos legítimos de las cookies.

- -

Si las cookies de primera parte están habilitadas pero Javascript está deshabilitado, - el icono de privacidad será amarillo como advertencia.

- - -

Cookies de terceras partes

- -

Las cookies de terceras partes son establecidas por ciertas partes de una página web que son cargadas desde servidores diferentes a la URL de la parte superior de la página. - Por ejemplo, la mayoría de páginas web que tienen anuncios los cargan desde una compañía de publicidad de terceros, como Ad Sense de Google. - Cada vez que se carga la página web, solicita a la compañía de publicidad que muestre un anuncio. - La compañía de publicidad analiza cualquier información que pueda tener sobre el usuario, analiza la tasa actual que los anunciantes están dispuestos a pagar por sus anuncios, - y selecciona uno para mostrar. La sección de la página web que muestra los anuncios es cargada desde el servidor de la compañía de terceros en vez de hacerlo desde el servidor principal.

- -

Ya que la mayoría de los anuncios en internet se muestran desde solo unas pequeñas compañías, - no les llevó a éstas mucho tiempo en darse cuenta que podrían establecer una cookie de seguimiento en el dispositivo del usuario y así conocer cualquier lugar al que el usuario va. - Cada vez que un anuncio se carga desde una compañía, lo primero que hace es comprobar si el dispositivo ya tiene un único número de serie en una cookie de seguimiento. - Si es así, busca el perfil para ese número de serie y toma nota del nuevo sitio web. - Es por esto que un usuario puede hacer una búsqueda en una página web por un producto que normalmente no busca, como nueces, - y luego de pronto empieza a ver anuncios de nueces en cada página web que visita.

- -

Además de compañías de publicidad, las páginas de redes sociales descubrieron que también podían entrar en acción. - Hace unos pocos años, las principales páginas de redes sociales como Facebook y Twitter convencieron a un gran número de páginas web - que sería por su mejor interés colocar pequeños iconos de redes sociales en sus páginas. Éstos no son sólo imágenes. - Contienen código incrustado que enlazan de nuevo a la web de la red social, - y entre otras cosas cargan una cookie de terceras partes en el dispositivo. Estas cookies se colocan aunque el usuario no tenga una cuenta con la plataforma de la red social. - A través del tiempo, compañías como Facebook (la cual también corre una red de anuncios) han construído un gran número de perfiles detallados sobre personas que - ni siquiera han creado una cuenta en su web. - -

No existe ninguna buena razón para habilitar cookies de terceras partes. En dispositivos con Android KitKat o anteriores (versión <= 4.4.4 o API <= 20), WebView no - distingue entre cookies de primera parte - y cookies de teceras partes. Por lo tanto, si se habilitan las cookies de primera parte también se habilitarán las de teceras partes.

- - -

Almacenamiento DOM

- -

Document Object Model storage (o Almacenamiento de modelos de objetos de documento), también conocido como almacenamiento web, es como cookies con esteroides. - Mientras que el tamaño máximo de almacenamiento combinado para todas las cookies de una única URL es de 4 kilobytes, el almacenamiento DOM puede contener - megabytes por sitio. - Ya que el almacenamiento DOM usa JavaScript para leer y escribir datos, no puede activarse a menos que JavaScript esté también activado.

- - -

Datos de formulario

- -

Los datos de formulario contienen información escrita en formularios web, como nombres de usuario, direcciones, números de teléfono, etc., y los enumera en un cuadro desplegable en futuras visitas. - A diferencia de las otras formas de almacenamiento local, los datos de los formularios no se envían al servidor web sin la interacción específica del usuario. - A partir de Android Oreo (8.0), los datos de formulario de WebView fueron reemplazados por el - servicio Autofill. - Como tal, los controles para los datos de formulario ya no aparecen en los dispositivos Android más nuevos.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_overview.html b/app/src/main/assets/es/guide_overview.html new file mode 100644 index 00000000..44d4f151 --- /dev/null +++ b/app/src/main/assets/es/guide_overview.html @@ -0,0 +1,53 @@ + + + + + + + + + + + + + +

Verdadera privacidad

+ +

Navegador Privado está diseñado para ofrecerte todo el control posible de tu privacidad mientras navegas por internet. + Cuando conectas a un sitio web, parte de la información que es necesaria para facilitar la conexión son transferidas al servidor. + Por ejemplo, el servidor recibirá tu dirección IP y un número de puerto, los cuales son necesarios, así sabe dónde enviar la respuesta. + Esta información es a menudo registrada por el servidor, + permitiendo al desarrollador del sitio web realizar informes mostrando las veces que ha sido cargada una web y cuántas diferentes direcciones IP accedieron a ella.

+ +

Sin embargo, la mayoría de operadores de un sitio web quieren rastrear tu navegación web a través de muchas webs, no sólo en un servidor. + Existen muchas técnicas que usan para conseguirlo. Algunas de ellas solicitan o colocan información extra en tu dispositivo que facilita este rastreo. + Casi todos los navegadores participarán voluntariamente en este rastreo sin informar al usuario de lo que están haciendo. + Navegador Privado está diseñado para ofrecer al usuario toda la información y control sobre estas técnicas de rastreo como sea posible.

+ + +

Limitaciones del WebView de Android

+ +

Navegador Privado usa el WebView que incorpora Android para interpretar los sitios web. + Existen algunas limitaciones en los controles que WebView expone para administrar la configuración de privacidad. + Por ejemplo, no es posible habilitar algunos comandos JavaScript mientras que se deshabilitan otros. + En el futuro, Navegador Privado cambiará a un WebView personalizado llamado WebView Privado.

+ + \ No newline at end of file diff --git a/app/src/main/assets/es/guide_overview_dark.html b/app/src/main/assets/es/guide_overview_dark.html deleted file mode 100644 index 2ae4fcdd..00000000 --- a/app/src/main/assets/es/guide_overview_dark.html +++ /dev/null @@ -1,50 +0,0 @@ - - - - - - - - - - -

Verdadera privacidad

- -

Navegador Privado está diseñado para ofrecerte todo el control posible de tu privacidad mientras navegas por internet. - Cuando conectas a un sitio web, parte de la información que es necesaria para facilitar la conexión son transferidas al servidor. - Por ejemplo, el servidor recibirá tu dirección IP y un número de puerto, los cuales son necesarios, así sabe dónde enviar la respuesta. - Esta información es a menudo registrada por el servidor, - permitiendo al desarrollador del sitio web realizar informes mostrando las veces que ha sido cargada una web y cuántas diferentes direcciones IP accedieron a ella.

- -

Sin embargo, la mayoría de operadores de un sitio web quieren rastrear tu navegación web a través de muchas webs, no sólo en un servidor. - Existen muchas técnicas que usan para conseguirlo. Algunas de ellas solicitan o colocan información extra en tu dispositivo que facilita este rastreo. - Casi todos los navegadores participarán voluntariamente en este rastreo sin informar al usuario de lo que están haciendo. - Navegador Privado está diseñado para ofrecer al usuario toda la información y control sobre estas técnicas de rastreo como sea posible.

- - -

Limitaciones del WebView de Android

- -

Navegador Privado usa el WebView que incorpora Android para interpretar los sitios web. - Existen algunas limitaciones en los controles que WebView expone para administrar la configuración de privacidad. - Por ejemplo, no es posible habilitar algunos comandos JavaScript mientras que se deshabilitan otros. - En el futuro, Navegador Privado cambiará a un WebView personalizado llamado WebView Privado.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_overview_light.html b/app/src/main/assets/es/guide_overview_light.html deleted file mode 100644 index feeba621..00000000 --- a/app/src/main/assets/es/guide_overview_light.html +++ /dev/null @@ -1,50 +0,0 @@ - - - - - - - - - - -

Verdadera privacidad

- -

Navegador Privado está diseñado para ofrecerte todo el control posible de tu privacidad mientras navegas por internet. - Cuando conectas a un sitio web, parte de la información que es necesaria para facilitar la conexión son transferidas al servidor. - Por ejemplo, el servidor recibirá tu dirección IP y un número de puerto, los cuales son necesarios, así sabe dónde enviar la respuesta. - Esta información es a menudo registrada por el servidor, - permitiendo al desarrollador del sitio web realizar informes mostrando las veces que ha sido cargada una web y cuántas diferentes direcciones IP accedieron a ella.

- -

Sin embargo, la mayoría de operadores de un sitio web quieren rastrear tu navegación web a través de muchas webs, no sólo en un servidor. - Existen muchas técnicas que usan para conseguirlo. Algunas de ellas solicitan o colocan información extra en tu dispositivo que facilita este rastreo. - Casi todos los navegadores participarán voluntariamente en este rastreo sin informar al usuario de lo que están haciendo. - Navegador Privado está diseñado para ofrecer al usuario toda la información y control sobre estas técnicas de rastreo como sea posible.

- - -

Limitaciones del WebView de Android

- -

Navegador Privado usa el WebView que incorpora Android para interpretar los sitios web. - Existen algunas limitaciones en los controles que WebView expone para administrar la configuración de privacidad. - Por ejemplo, no es posible habilitar algunos comandos JavaScript mientras que se deshabilitan otros. - En el futuro, Navegador Privado cambiará a un WebView personalizado llamado WebView Privado.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_proxies.html b/app/src/main/assets/es/guide_proxies.html new file mode 100644 index 00000000..55e95fdc --- /dev/null +++ b/app/src/main/assets/es/guide_proxies.html @@ -0,0 +1,89 @@ + + + + + + + + + + + + + +

Proxis y sus límites

+ +

Existen dos categorías generales de malos actores que quieren infringir la privacidad de la web: + gobiernos maliciosos con acceso a ISPs (Proveedores de Servicios de Internet) y grandes corporaciones que ofrecen redes sociales y de publicidad. + Los proxies como TOR (The Onion Router) e I2P (the Invisible Internet Project) son útiles para proteger la privacidad frente a los gobiernos maliciosos (que espían el tráfico en tránsito) + pero no de las mega corporaciones (que incrustan código malicioso en los servidores web).

+ + +

Gobiernos maliciosos

+ +

Los gobiernos maliciosos a menudo espían a sus ciudadanos para castigar la disidencia o la actividad de derechos humanos. + Normalmente suelen operar los ISPs locales o los fuerzan a revelar información mostrando cada dirección IP que visita cada usuario. + Los proxis en capas están diseñados para derrotar esta violación de la privacidad mediante el cifrado del tráfico del dispositivo de un usuario + y su enrutamiento a través de múltiples servidores en Internet antes de enviarlo al destino final. + Esto significa que ningún ISP, servidor o sitio web individual puede conocer tanto la dirección IP del dispositivo del usuario como la dirección IP del servidor web final. + Los gobiernos malintencionados y los ISP que ellos controlan no pueden saber a qué servidores web está accediendo un usuario, + aunque sí pueden saber que el usuario está utilizando un servicio proxy en capas. + En algunas partes del mundo, el uso de proxis podría ser interpretado como una evidencia de comportamiento ilegal (“Si no tuvieras nada que ocultar no estarías cifrando tu tráfico”) + y los usuarios podrían ser castigados porque los gobiernos asumen que están haciendo algo que está prohibido. Por lo tanto, los proxis pueden ser útiles, pero no son una panacea.

+ + +

Grandes corporaciones

+ +

Cuando un usuario se conecta a un servidor web, éste puede ver la dirección IP del usuario. + Aunque esto no es una ciencia perfecta, las direcciones IP se pueden convertir a direcciones físicas con bastante precisión. + Los pequeños servidores web suelen depender de las direcciones IP para identificar la ubicación de los usuarios que visitan su sitio. + Los proxis son una buena solución para enmascarar la ubicación del usuario desde estos servidores. + Pero las más grandes corporaciones que poseen medios sociales y redes de publicidad usan un perfil completo de información + diseñado para rastrear a los usuarios a través de los dispositivos y direcciones IP. + Estos perfiles emplean una variedad de técnicas para identificar a los usuarios, incluyendo Javascript, cookies, IDs de seguimiento, + y huellas del navegador. + Debido a que la gran mayoría de páginas web en internet, o cargan un anuncio de una de las principales redes, o integran iconos de medios sociales con su Javascript asociado, + estas corporaciones han creado perfiles para casi todos los usuarios en línea y pueden rastrear su actividad en internet a través de sitios que no están relacionados.

+ +

Ellos rastrean cada sitio web visitado, todo lo que se compra, cada tarjeta de crédito que es usada para realizar una compra, cada dirección a la que se envían los artículos, + y los metadatos GPS de cada imagen que se sube a internet. + Construyen un perfil de la edad del usuario, género, estado civil, dirección, afiliaciones políticas, afiliaciones religiosas, circunstancias familiares, número de mascotas, + y cualquier otra cosa que caiga en sus manos. + Incluso compran bases de datos de transacciones con tarjeta de crédito en tiendas locales, + para así poder rastrear de los usuarios en sus perfiles los patrones de compra que hacen cuando no están conectados. + Debido a que tienen ya una información de dirección mucho más precisa sobre un usuario que la que revela una dirección IP, + los proxis no proporcionan ninguna protección real de privacidad contra las mega corporaciones.

+ +

La única mejor protección de la privacidad contra las grandes corporaciones es navegar por la web con Javascript deshabilitado, seguido de bloquear redes publicitarias, + inhabilitar cookies y almacenamiento DOM, y usar un navegador del que sea difícil recoger huellas.

+ + +

Uso de Proxis

+ +

A pesar de sus limitaciones, los proxis pueden ser útiles en algunas circunstancias. + Tor e I2P + tienen aplicaciones Android que facilitan el uso de sus redes de proxy. Cuando se activa el proxy en Navegador Privado, + la barra de aplicaciones tendrá un fondo azul claro en lugar del gris claro predeterminado. + Debido a que el tráfico está siendo enrutado a través de varios nodos proxy, usar un proxy en capas es a menudo mucho más lento que conectarse directamente a Internet.

+ + + + \ No newline at end of file diff --git a/app/src/main/assets/es/guide_proxies_dark.html b/app/src/main/assets/es/guide_proxies_dark.html deleted file mode 100644 index ae8c1c4c..00000000 --- a/app/src/main/assets/es/guide_proxies_dark.html +++ /dev/null @@ -1,86 +0,0 @@ - - - - - - - - - - -

Proxis y sus límites

- -

Existen dos categorías generales de malos actores que quieren infringir la privacidad de la web: - gobiernos maliciosos con acceso a ISPs (Proveedores de Servicios de Internet) y grandes corporaciones que ofrecen redes sociales y de publicidad. - Los proxies como TOR (The Onion Router) e I2P (the Invisible Internet Project) son útiles para proteger la privacidad frente a los gobiernos maliciosos (que espían el tráfico en tránsito) - pero no de las mega corporaciones (que incrustan código malicioso en los servidores web).

- - -

Gobiernos maliciosos

- -

Los gobiernos maliciosos a menudo espían a sus ciudadanos para castigar la disidencia o la actividad de derechos humanos. - Normalmente suelen operar los ISPs locales o los fuerzan a revelar información mostrando cada dirección IP que visita cada usuario. - Los proxis en capas están diseñados para derrotar esta violación de la privacidad mediante el cifrado del tráfico del dispositivo de un usuario - y su enrutamiento a través de múltiples servidores en Internet antes de enviarlo al destino final. - Esto significa que ningún ISP, servidor o sitio web individual puede conocer tanto la dirección IP del dispositivo del usuario como la dirección IP del servidor web final. - Los gobiernos malintencionados y los ISP que ellos controlan no pueden saber a qué servidores web está accediendo un usuario, - aunque sí pueden saber que el usuario está utilizando un servicio proxy en capas. - En algunas partes del mundo, el uso de proxis podría ser interpretado como una evidencia de comportamiento ilegal (“Si no tuvieras nada que ocultar no estarías cifrando tu tráfico”) - y los usuarios podrían ser castigados porque los gobiernos asumen que están haciendo algo que está prohibido. Por lo tanto, los proxis pueden ser útiles, pero no son una panacea.

- - -

Grandes corporaciones

- -

Cuando un usuario se conecta a un servidor web, éste puede ver la dirección IP del usuario. - Aunque esto no es una ciencia perfecta, las direcciones IP se pueden convertir a direcciones físicas con bastante precisión. - Los pequeños servidores web suelen depender de las direcciones IP para identificar la ubicación de los usuarios que visitan su sitio. - Los proxis son una buena solución para enmascarar la ubicación del usuario desde estos servidores. - Pero las más grandes corporaciones que poseen medios sociales y redes de publicidad usan un perfil completo de información - diseñado para rastrear a los usuarios a través de los dispositivos y direcciones IP. - Estos perfiles emplean una variedad de técnicas para identificar a los usuarios, incluyendo Javascript, cookies, IDs de seguimiento, - y huellas del navegador. - Debido a que la gran mayoría de páginas web en internet, o cargan un anuncio de una de las principales redes, o integran iconos de medios sociales con su Javascript asociado, - estas corporaciones han creado perfiles para casi todos los usuarios en línea y pueden rastrear su actividad en internet a través de sitios que no están relacionados.

- -

Ellos rastrean cada sitio web visitado, todo lo que se compra, cada tarjeta de crédito que es usada para realizar una compra, cada dirección a la que se envían los artículos, - y los metadatos GPS de cada imagen que se sube a internet. - Construyen un perfil de la edad del usuario, género, estado civil, dirección, afiliaciones políticas, afiliaciones religiosas, circunstancias familiares, número de mascotas, - y cualquier otra cosa que caiga en sus manos. - Incluso compran bases de datos de transacciones con tarjeta de crédito en tiendas locales, - para así poder rastrear de los usuarios en sus perfiles los patrones de compra que hacen cuando no están conectados. - Debido a que tienen ya una información de dirección mucho más precisa sobre un usuario que la que revela una dirección IP, - los proxis no proporcionan ninguna protección real de privacidad contra las mega corporaciones.

- -

La única mejor protección de la privacidad contra las grandes corporaciones es navegar por la web con Javascript deshabilitado, seguido de bloquear redes publicitarias, - inhabilitar cookies y almacenamiento DOM, y usar un navegador del que sea difícil recoger huellas.

- - -

Uso de Proxis

- -

A pesar de sus limitaciones, los proxis pueden ser útiles en algunas circunstancias. - Tor e I2P - tienen aplicaciones Android que facilitan el uso de sus redes de proxy. Cuando se activa el proxy en Navegador Privado, - la barra de aplicaciones tendrá un fondo azul claro en lugar del gris claro predeterminado. - Debido a que el tráfico está siendo enrutado a través de varios nodos proxy, usar un proxy en capas es a menudo mucho más lento que conectarse directamente a Internet.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_proxies_light.html b/app/src/main/assets/es/guide_proxies_light.html deleted file mode 100644 index 8e22ae84..00000000 --- a/app/src/main/assets/es/guide_proxies_light.html +++ /dev/null @@ -1,86 +0,0 @@ - - - - - - - - - - -

Proxis y sus límites

- -

Existen dos categorías generales de malos actores que quieren infringir la privacidad de la web: - gobiernos maliciosos con acceso a ISPs (Proveedores de Servicios de Internet) y grandes corporaciones que ofrecen redes sociales y de publicidad. - Los proxies como TOR (The Onion Router) e I2P (the Invisible Internet Project) son útiles para proteger la privacidad frente a los gobiernos maliciosos (que espían el tráfico en tránsito) - pero no de las mega corporaciones (que incrustan código malicioso en los servidores web).

- - -

Gobiernos maliciosos

- -

Los gobiernos maliciosos a menudo espían a sus ciudadanos para castigar la disidencia o la actividad de derechos humanos. - Normalmente suelen operar los ISPs locales o los fuerzan a revelar información mostrando cada dirección IP que visita cada usuario. - Los proxis en capas están diseñados para derrotar esta violación de la privacidad mediante el cifrado del tráfico del dispositivo de un usuario - y su enrutamiento a través de múltiples servidores en Internet antes de enviarlo al destino final. - Esto significa que ningún ISP, servidor o sitio web individual puede conocer tanto la dirección IP del dispositivo del usuario como la dirección IP del servidor web final. - Los gobiernos malintencionados y los ISP que ellos controlan no pueden saber a qué servidores web está accediendo un usuario, - aunque sí pueden saber que el usuario está utilizando un servicio proxy en capas. - En algunas partes del mundo, el uso de proxis podría ser interpretado como una evidencia de comportamiento ilegal (“Si no tuvieras nada que ocultar no estarías cifrando tu tráfico”) - y los usuarios podrían ser castigados porque los gobiernos asumen que están haciendo algo que está prohibido. Por lo tanto, los proxis pueden ser útiles, pero no son una panacea.

- - -

Grandes corporaciones

- -

Cuando un usuario se conecta a un servidor web, éste puede ver la dirección IP del usuario. - Aunque esto no es una ciencia perfecta, las direcciones IP se pueden convertir a direcciones físicas con bastante precisión. - Los pequeños servidores web suelen depender de las direcciones IP para identificar la ubicación de los usuarios que visitan su sitio. - Los proxis son una buena solución para enmascarar la ubicación del usuario desde estos servidores. - Pero las más grandes corporaciones que poseen medios sociales y redes de publicidad usan un perfil completo de información - diseñado para rastrear a los usuarios a través de los dispositivos y direcciones IP. - Estos perfiles emplean una variedad de técnicas para identificar a los usuarios, incluyendo Javascript, cookies, IDs de seguimiento, - y huellas del navegador. - Debido a que la gran mayoría de páginas web en internet, o cargan un anuncio de una de las principales redes, o integran iconos de medios sociales con su Javascript asociado, - estas corporaciones han creado perfiles para casi todos los usuarios en línea y pueden rastrear su actividad en internet a través de sitios que no están relacionados.

- -

Ellos rastrean cada sitio web visitado, todo lo que se compra, cada tarjeta de crédito que es usada para realizar una compra, cada dirección a la que se envían los artículos, - y los metadatos GPS de cada imagen que se sube a internet. - Construyen un perfil de la edad del usuario, género, estado civil, dirección, afiliaciones políticas, afiliaciones religiosas, circunstancias familiares, número de mascotas, - y cualquier otra cosa que caiga en sus manos. - Incluso compran bases de datos de transacciones con tarjeta de crédito en tiendas locales, - para así poder rastrear de los usuarios en sus perfiles los patrones de compra que hacen cuando no están conectados. - Debido a que tienen ya una información de dirección mucho más precisa sobre un usuario que la que revela una dirección IP, - los proxis no proporcionan ninguna protección real de privacidad contra las mega corporaciones.

- -

La única mejor protección de la privacidad contra las grandes corporaciones es navegar por la web con Javascript deshabilitado, seguido de bloquear redes publicitarias, - inhabilitar cookies y almacenamiento DOM, y usar un navegador del que sea difícil recoger huellas.

- - -

Uso de Proxis

- -

A pesar de sus limitaciones, los proxis pueden ser útiles en algunas circunstancias. - Tor e I2P - tienen aplicaciones Android que facilitan el uso de sus redes de proxy. Cuando se activa el proxy en Navegador Privado, - la barra de aplicaciones tendrá un fondo azul claro en lugar del gris claro predeterminado. - Debido a que el tráfico está siendo enrutado a través de varios nodos proxy, usar un proxy en capas es a menudo mucho más lento que conectarse directamente a Internet.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_requests.html b/app/src/main/assets/es/guide_requests.html new file mode 100644 index 00000000..bbc0e106 --- /dev/null +++ b/app/src/main/assets/es/guide_requests.html @@ -0,0 +1,87 @@ + + + + + + + + + + + + + +

Peticiones de recursos

+ +

Cuando se carga una URL, normalmente realiza una serie de peticiones de recursos para CCS, JavaScript, imágenes y otros archivos. + Los detalles sobre estas solicitudes se pueden ver en la Actividad de peticiones. El cajón de navegación tiene un enlace a la Actividad de peticiones y también muestra cuántas órdenes se bloquearon. + Al tocar una solicitud se muestran los detalles de por qué se ha permitido o bloqueado.

+ + + +

Navegador Privado incluye cuatro listas de bloqueo comunes basadas en la sintaxis de Adblock: + EasyList, EasyPrivacy, Lista molesta de Fanboy y Lista de bloqueo social de Fanboy. + Estas listas de bloqueo son procesadas por Navegador Privado en las siguientes 22 sublistas, que verifican las solicitudes de recursos en el orden listado.

+ +
    +
  1. Lista blanca principal
  2. +
  3. Lista blanca final
  4. +
  5. Lista blanca de dominios
  6. +
  7. Lista blanca inicial de dominios
  8. +
  9. Lista blanca final de dominios
  10. +
  11. Lista blanca de terceros
  12. +
  13. Lista blanca de dominios de terceros
  14. +
  15. Lista blanca inicial de dominios de terceros
  16. +
  17. Lista negra principal
  18. +
  19. Lista negra inicial
  20. +
  21. Lista negra final
  22. +
  23. Lista negra de dominios
  24. +
  25. Lista negra inicial de dominios
  26. +
  27. Lista negra final de dominios
  28. +
  29. Lista negra de expresiones regulares de dominios
  30. +
  31. Lista negra de terceros
  32. +
  33. Lista negra inicial de terceros
  34. +
  35. Lista negra de dominios de terceros
  36. +
  37. Lista negra inicial de dominios de terceros
  38. +
  39. Lista negra de expresiones regulares de terceros
  40. +
  41. Lista negra de expresiones regulares de dominios de terceros
  42. +
  43. Lista negra de expresiones regulares
  44. +
+ +

Las listas iniciales se comparan con el principio de la URL. Las listas finales se comparan con el final de la URL. Las listas de dominios sólo se comparan con ciertos dominios. + Las listas de terceras partes sólo se aplican si el dominio raíz de la solicitud es diferente del dominio raíz de la URL principal. + Las listas de expresiones regulares siguen la sintaxis de las expresiones regulares. + Cada elemento de la sublista tiene una o más entradas. + En el caso de sublistas de dominio, la solicitud de recurso sólo se compara con el artículo si la primera entrada coincide con el dominio de la URL principal.

+ +

Debido a las limitaciones del WebView de Android, y para acelerar el procesamiento de las solicitudes, Navegador Privado implementa una interpretación simplificada de la sintaxis de Adblock. + Esto puede conducir a veces a falsos positivos, en los que los recursos se permiten o bloquean de formas que no estaban previstas en la entrada original. + Una descripción más detallada de cómo se procesan las entradas de la lista de bloqueo está disponible en stoutner.com.

+ +

Navegador Privado tiene tres listas de bloqueo adicionales. + UltraList y UltraPrivacy + bloquean los anuncios y rastreadores que EasyList y EasyPrivacy no bloquea. La tercera bloquea todas las peticiones de terceras partes. + Una solicitud sólo se considera de terceras partes si el dominio base de la solicitud es diferente del dominio base de la URL. + Por ejemplo, si www.website.com carga una imagen de images.website.com, + esto no se bloquea como petición de una tercera parte porque ambos comparten el mismo dominio base de website.com. + El bloqueo de todas las solicitudes de terceras partes aumenta la privacidad, pero esta lista de bloqueo está desactivada por defecto porque rompe un gran número de páginas web.

+ + \ No newline at end of file diff --git a/app/src/main/assets/es/guide_requests_dark.html b/app/src/main/assets/es/guide_requests_dark.html deleted file mode 100644 index fd14918f..00000000 --- a/app/src/main/assets/es/guide_requests_dark.html +++ /dev/null @@ -1,84 +0,0 @@ - - - - - - - - - - -

Peticiones de recursos

- -

Cuando se carga una URL, normalmente realiza una serie de peticiones de recursos para CCS, JavaScript, imágenes y otros archivos. - Los detalles sobre estas solicitudes se pueden ver en la Actividad de peticiones. El cajón de navegación tiene un enlace a la Actividad de peticiones y también muestra cuántas órdenes se bloquearon. - Al tocar una solicitud se muestran los detalles de por qué se ha permitido o bloqueado.

- -

- -

Navegador Privado incluye cuatro listas de bloqueo comunes basadas en la sintaxis de Adblock: - EasyList, EasyPrivacy, Lista molesta de Fanboy y Lista de bloqueo social de Fanboy. - Estas listas de bloqueo son procesadas por Navegador Privado en las siguientes 22 sublistas, que verifican las solicitudes de recursos en el orden listado.

- -
    -
  1. Lista blanca principal
  2. -
  3. Lista blanca final
  4. -
  5. Lista blanca de dominios
  6. -
  7. Lista blanca inicial de dominios
  8. -
  9. Lista blanca final de dominios
  10. -
  11. Lista blanca de terceros
  12. -
  13. Lista blanca de dominios de terceros
  14. -
  15. Lista blanca inicial de dominios de terceros
  16. -
  17. Lista negra principal
  18. -
  19. Lista negra inicial
  20. -
  21. Lista negra final
  22. -
  23. Lista negra de dominios
  24. -
  25. Lista negra inicial de dominios
  26. -
  27. Lista negra final de dominios
  28. -
  29. Lista negra de expresiones regulares de dominios
  30. -
  31. Lista negra de terceros
  32. -
  33. Lista negra inicial de terceros
  34. -
  35. Lista negra de dominios de terceros
  36. -
  37. Lista negra inicial de dominios de terceros
  38. -
  39. Lista negra de expresiones regulares de terceros
  40. -
  41. Lista negra de expresiones regulares de dominios de terceros
  42. -
  43. Lista negra de expresiones regulares
  44. -
- -

Las listas iniciales se comparan con el principio de la URL. Las listas finales se comparan con el final de la URL. Las listas de dominios sólo se comparan con ciertos dominios. - Las listas de terceras partes sólo se aplican si el dominio raíz de la solicitud es diferente del dominio raíz de la URL principal. - Las listas de expresiones regulares siguen la sintaxis de las expresiones regulares. - Cada elemento de la sublista tiene una o más entradas. - En el caso de sublistas de dominio, la solicitud de recurso sólo se compara con el artículo si la primera entrada coincide con el dominio de la URL principal.

- -

Debido a las limitaciones del WebView de Android, y para acelerar el procesamiento de las solicitudes, Navegador Privado implementa una interpretación simplificada de la sintaxis de Adblock. - Esto puede conducir a veces a falsos positivos, en los que los recursos se permiten o bloquean de formas que no estaban previstas en la entrada original. - Una descripción más detallada de cómo se procesan las entradas de la lista de bloqueo está disponible en stoutner.com.

- -

Navegador Privado tiene tres listas de bloqueo adicionales. - UltraList y UltraPrivacy - bloquean los anuncios y rastreadores que EasyList y EasyPrivacy no bloquea. La tercera bloquea todas las peticiones de terceras partes. - Una solicitud sólo se considera de terceras partes si el dominio base de la solicitud es diferente del dominio base de la URL. - Por ejemplo, si www.website.com carga una imagen de images.website.com, - esto no se bloquea como petición de una tercera parte porque ambos comparten el mismo dominio base de website.com. - El bloqueo de todas las solicitudes de terceras partes aumenta la privacidad, pero esta lista de bloqueo está desactivada por defecto porque rompe un gran número de páginas web.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_requests_light.html b/app/src/main/assets/es/guide_requests_light.html deleted file mode 100644 index 3693a53b..00000000 --- a/app/src/main/assets/es/guide_requests_light.html +++ /dev/null @@ -1,84 +0,0 @@ - - - - - - - - - - -

Peticiones de recursos

- -

Cuando se carga una URL, normalmente realiza una serie de peticiones de recursos para CCS, JavaScript, imágenes y otros archivos. - Los detalles sobre estas solicitudes se pueden ver en la Actividad de peticiones. El cajón de navegación tiene un enlace a la Actividad de peticiones y también muestra cuántas órdenes se bloquearon. - Al tocar una solicitud se muestran los detalles de por qué se ha permitido o bloqueado.

- -

- -

Navegador Privado incluye cuatro listas de bloqueo comunes basadas en la sintaxis de Adblock: - EasyList, EasyPrivacy, Lista molesta de Fanboy y Lista de bloqueo social de Fanboy. - Estas listas de bloqueo son procesadas por Navegador Privado en las siguientes 22 sublistas, que verifican las solicitudes de recursos en el orden listado.

- -
    -
  1. Lista blanca principal
  2. -
  3. Lista blanca final
  4. -
  5. Lista blanca de dominios
  6. -
  7. Lista blanca inicial de dominios
  8. -
  9. Lista blanca final de dominios
  10. -
  11. Lista blanca de terceros
  12. -
  13. Lista blanca de dominios de terceros
  14. -
  15. Lista blanca inicial de dominios de terceros
  16. -
  17. Lista negra principal
  18. -
  19. Lista negra inicial
  20. -
  21. Lista negra final
  22. -
  23. Lista negra de dominios
  24. -
  25. Lista negra inicial de dominios
  26. -
  27. Lista negra final de dominios
  28. -
  29. Lista negra de expresiones regulares de dominios
  30. -
  31. Lista negra de terceros
  32. -
  33. Lista negra inicial de terceros
  34. -
  35. Lista negra de dominios de terceros
  36. -
  37. Lista negra inicial de dominios de terceros
  38. -
  39. Lista negra de expresiones regulares de terceros
  40. -
  41. Lista negra de expresiones regulares de dominios de terceros
  42. -
  43. Lista negra de expresiones regulares
  44. -
- -

Las listas iniciales se comparan con el principio de la URL. Las listas finales se comparan con el final de la URL. Las listas de dominios sólo se comparan con ciertos dominios. - Las listas de terceras partes sólo se aplican si el dominio raíz de la solicitud es diferente del dominio raíz de la URL principal. - Las listas de expresiones regulares siguen la sintaxis de las expresiones regulares. - Cada elemento de la sublista tiene una o más entradas. - En el caso de sublistas de dominio, la solicitud de recurso sólo se compara con el artículo si la primera entrada coincide con el dominio de la URL principal.

- -

Debido a las limitaciones del WebView de Android, y para acelerar el procesamiento de las solicitudes, Navegador Privado implementa una interpretación simplificada de la sintaxis de Adblock. - Esto puede conducir a veces a falsos positivos, en los que los recursos se permiten o bloquean de formas que no estaban previstas en la entrada original. - Una descripción más detallada de cómo se procesan las entradas de la lista de bloqueo está disponible en stoutner.com.

- -

Navegador Privado tiene tres listas de bloqueo adicionales. - UltraList y UltraPrivacy - bloquean los anuncios y rastreadores que EasyList y EasyPrivacy no bloquea. La tercera bloquea todas las peticiones de terceras partes. - Una solicitud sólo se considera de terceras partes si el dominio base de la solicitud es diferente del dominio base de la URL. - Por ejemplo, si www.website.com carga una imagen de images.website.com, - esto no se bloquea como petición de una tercera parte porque ambos comparten el mismo dominio base de website.com. - El bloqueo de todas las solicitudes de terceras partes aumenta la privacidad, pero esta lista de bloqueo está desactivada por defecto porque rompe un gran número de páginas web.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_ssl_certificates.html b/app/src/main/assets/es/guide_ssl_certificates.html new file mode 100644 index 00000000..d9685463 --- /dev/null +++ b/app/src/main/assets/es/guide_ssl_certificates.html @@ -0,0 +1,59 @@ + + + + + + + + + + + + + +

Conectar con confianza

+ +

Al visitar una URL cifrada (que empieza con HTTPS), el servidor web usa un certificado SSL para cifrar tanto la información enviada al navegador como asimismo para identificar al servidor. + El propósito de la identificación del servidor es para prevenir que una máquina ubicada entre el navegador y el servidor web pretenda ser el servidor y descifrar la información en tránsito. + Este clase de ataque es conocido como Hombre en Medio (MITM en sus iniciales en inglés). + Los certificados SSL son generados por las autoridades certificadoras: compañías que verifican la identidad de un servidor y producen un certificado a cambio de una tarifa. + Android tiene una lista de autoridades certificadoras de confianza y aceptará cualquiera de sus certificados para cualquier página web. + Se supone que no es posible que una organización adquiera un certificado SSL para un dominio que no controla, + pero en la práctica muchos gobiernos y grandes corporaciones han sido capaces de hacerlo.

+ +

Al fijar un certificado SSL se le indica al navegador que sólo se puede confiar en un certificado SSL específico para un dominio en particular. + Cualquier otro certificado, aunque sea válido, será rechazado.

+ + + +

Los certificados SSL expiran en una fecha especificada, por lo que incluso los certificados SSL fijados necesitarán legítimamente ser actualizados de vez en cuando. + Como regla general, fijar los certificados SSL probablemente no sea necesario en la mayoría de los casos. + Pero para aquellos que sospechan que organizaciones poderosas puedan estar apuntando hacia ellos, la fijación de certificados SSL puede detectar y frustar un ataque MITM. + Navegador Privado también tiene la capacidad de fijar direcciones IP.

+ + + +

Los certificados SSL pueden ser fijados en Configuración de Dominios. + Además de proteger contra ataques MITM, + fijar un certificado autofirmado para un dispositivo como un router inalámbrico o punto de acceso eliminará el mensaje de error que se presenta normalmente cada vez que se carga su página web. + Al tocar la pestaña activa se muestra el certificado SSL de la página web actual.

+ + \ No newline at end of file diff --git a/app/src/main/assets/es/guide_ssl_certificates_dark.html b/app/src/main/assets/es/guide_ssl_certificates_dark.html deleted file mode 100644 index cf7bdbd3..00000000 --- a/app/src/main/assets/es/guide_ssl_certificates_dark.html +++ /dev/null @@ -1,56 +0,0 @@ - - - - - - - - - - -

Conectar con confianza

- -

Al visitar una URL cifrada (que empieza con HTTPS), el servidor web usa un certificado SSL para cifrar tanto la información enviada al navegador como asimismo para identificar al servidor. - El propósito de la identificación del servidor es para prevenir que una máquina ubicada entre el navegador y el servidor web pretenda ser el servidor y descifrar la información en tránsito. - Este clase de ataque es conocido como Hombre en Medio (MITM en sus iniciales en inglés). - Los certificados SSL son generados por las autoridades certificadoras: compañías que verifican la identidad de un servidor y producen un certificado a cambio de una tarifa. - Android tiene una lista de autoridades certificadoras de confianza y aceptará cualquiera de sus certificados para cualquier página web. - Se supone que no es posible que una organización adquiera un certificado SSL para un dominio que no controla, - pero en la práctica muchos gobiernos y grandes corporaciones han sido capaces de hacerlo.

- -

Al fijar un certificado SSL se le indica al navegador que sólo se puede confiar en un certificado SSL específico para un dominio en particular. - Cualquier otro certificado, aunque sea válido, será rechazado.

- -

- -

Los certificados SSL expiran en una fecha especificada, por lo que incluso los certificados SSL fijados necesitarán legítimamente ser actualizados de vez en cuando. - Como regla general, fijar los certificados SSL probablemente no sea necesario en la mayoría de los casos. - Pero para aquellos que sospechan que organizaciones poderosas puedan estar apuntando hacia ellos, la fijación de certificados SSL puede detectar y frustar un ataque MITM. - Navegador Privado también tiene la capacidad de fijar direcciones IP.

- -

- -

Los certificados SSL pueden ser fijados en Configuración de Dominios. - Además de proteger contra ataques MITM, - fijar un certificado autofirmado para un dispositivo como un router inalámbrico o punto de acceso eliminará el mensaje de error que se presenta normalmente cada vez que se carga su página web. - Al tocar la pestaña activa se muestra el certificado SSL de la página web actual.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_ssl_certificates_light.html b/app/src/main/assets/es/guide_ssl_certificates_light.html deleted file mode 100644 index b65280a3..00000000 --- a/app/src/main/assets/es/guide_ssl_certificates_light.html +++ /dev/null @@ -1,56 +0,0 @@ - - - - - - - - - - -

Conectar con confianza

- -

Al visitar una URL cifrada (que empieza con HTTPS), el servidor web usa un certificado SSL para cifrar tanto la información enviada al navegador como asimismo para identificar al servidor. - El propósito de la identificación del servidor es para prevenir que una máquina ubicada entre el navegador y el servidor web pretenda ser el servidor y descifrar la información en tránsito. - Este clase de ataque es conocido como Hombre en Medio (MITM en sus iniciales en inglés). - Los certificados SSL son generados por las autoridades certificadoras: compañías que verifican la identidad de un servidor y producen un certificado a cambio de una tarifa. - Android tiene una lista de autoridades certificadoras de confianza y aceptará cualquiera de sus certificados para cualquier página web. - Se supone que no es posible que una organización adquiera un certificado SSL para un dominio que no controla, - pero en la práctica muchos gobiernos y grandes corporaciones han sido capaces de hacerlo.

- -

Al fijar un certificado SSL se le indica al navegador que sólo se puede confiar en un certificado SSL específico para un dominio en particular. - Cualquier otro certificado, aunque sea válido, será rechazado.

- -

- -

Los certificados SSL expiran en una fecha especificada, por lo que incluso los certificados SSL fijados necesitarán legítimamente ser actualizados de vez en cuando. - Como regla general, fijar los certificados SSL probablemente no sea necesario en la mayoría de los casos. - Pero para aquellos que sospechan que organizaciones poderosas puedan estar apuntando hacia ellos, la fijación de certificados SSL puede detectar y frustar un ataque MITM. - Navegador Privado también tiene la capacidad de fijar direcciones IP.

- -

- -

Los certificados SSL pueden ser fijados en Configuración de Dominios. - Además de proteger contra ataques MITM, - fijar un certificado autofirmado para un dispositivo como un router inalámbrico o punto de acceso eliminará el mensaje de error que se presenta normalmente cada vez que se carga su página web. - Al tocar la pestaña activa se muestra el certificado SSL de la página web actual.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_tracking_ids.html b/app/src/main/assets/es/guide_tracking_ids.html new file mode 100644 index 00000000..23cd6569 --- /dev/null +++ b/app/src/main/assets/es/guide_tracking_ids.html @@ -0,0 +1,46 @@ + + + + + + + + + + + + + +

No Rastrear

+ +

Hace algunos años la W3C (Consorcio Mundial de la Red) creó un mecanismo para que los navegadores informaran a los servidores web que no les gustaría ser rastreados. + Esto se logra incluyendo un encabezado DNT (Do Not Track o No Rastrear) con las solicitudes web.

+ +

El encabezado DNT no provee realmente de mucha privacidad porque la mayoría de servidores web lo ignoran. Por ejemplo, Yahoo, Google, Microsoft y Facebook, + todos ellos ignoran al menos algunos encabezados DNT.

+ + +

Modificación de URL

+ +

Navegador Privado elimina las secciones de ID de seguimiento de las URL, como ?utm_ de Google Analytics y + ?fbclick= de Facebook. La modificación de URL puede desactivarse en la configuración si está causando problemas.

+ + \ No newline at end of file diff --git a/app/src/main/assets/es/guide_tracking_ids_dark.html b/app/src/main/assets/es/guide_tracking_ids_dark.html deleted file mode 100644 index e03279bc..00000000 --- a/app/src/main/assets/es/guide_tracking_ids_dark.html +++ /dev/null @@ -1,43 +0,0 @@ - - - - - - - - - - -

No Rastrear

- -

Hace algunos años la W3C (Consorcio Mundial de la Red) creó un mecanismo para que los navegadores informaran a los servidores web que no les gustaría ser rastreados. - Esto se logra incluyendo un encabezado DNT (Do Not Track o No Rastrear) con las solicitudes web.

- -

El encabezado DNT no provee realmente de mucha privacidad porque la mayoría de servidores web lo ignoran. Por ejemplo, Yahoo, Google, Microsoft y Facebook, - todos ellos ignoran al menos algunos encabezados DNT.

- - -

Modificación de URL

- -

Navegador Privado elimina las secciones de ID de seguimiento de las URL, como ?utm_ de Google Analytics y - ?fbclick= de Facebook. La modificación de URL puede desactivarse en la configuración si está causando problemas.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_tracking_ids_light.html b/app/src/main/assets/es/guide_tracking_ids_light.html deleted file mode 100644 index daa1cd7f..00000000 --- a/app/src/main/assets/es/guide_tracking_ids_light.html +++ /dev/null @@ -1,43 +0,0 @@ - - - - - - - - - - -

No Rastrear

- -

Hace algunos años la W3C (Consorcio Mundial de la Red) creó un mecanismo para que los navegadores informaran a los servidores web que no les gustaría ser rastreados. - Esto se logra incluyendo un encabezado DNT (Do Not Track o No Rastrear) con las solicitudes web.

- -

El encabezado DNT no provee realmente de mucha privacidad porque la mayoría de servidores web lo ignoran. Por ejemplo, Yahoo, Google, Microsoft y Facebook, - todos ellos ignoran al menos algunos encabezados DNT.

- - -

Modificación de URL

- -

Navegador Privado elimina las secciones de ID de seguimiento de las URL, como ?utm_ de Google Analytics y - ?fbclick= de Facebook. La modificación de URL puede desactivarse en la configuración si está causando problemas.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_user_agent.html b/app/src/main/assets/es/guide_user_agent.html new file mode 100644 index 00000000..36295433 --- /dev/null +++ b/app/src/main/assets/es/guide_user_agent.html @@ -0,0 +1,68 @@ + + + + + + + + + + + + + +

Identificación del navegador

+ +

Cuando los navegadores web se conectan a las páginas web, envían un agente de usuario, que identifica al navegador y a las capacidades de rendering que posee. + El servidor web puede usar esta información para decidir qué versión de página web enviar al navegador. + Por ejemplo, muchas páginas web tienen diferentes versiones para escritorio y para navegadores móviles.

+ +

Por defecto, Navegador Privado usa su propio agente de usuario, que es PrivacyBrowser/1.0. Éste envía un mínimo de información al servidor web. + Ya que los servidores web no lo reconocen como un agente de usuario móvil, lo que normalmente muestran es la versión de escritorio del sitio.

+ +

En comparación, el agente de usuario por defecto de WebView divulga una gran cantidad de información sobre el hardware y el software del dispositivo. + En la ventana Configuración, seleccionando WebView por defecto como el Agente de usuario muestra el agente de usuario que se enviará. + La captura de pantalla de abajo muestra un Pixel 2 XL corriendo Android 10 con el sistema de android WebView 84.0.4147.125 instalado. + La mayoría de servidores web reconocerán esto como un navegador móvil y mostrará la versión móvil del sitio si dispone de ella.

+ + + +

Existe tanta información en el agente de usuario que algunas veces será el mismo con sólo unos pocos visitantes a una página web. + Si el agente de usuario es combinado con otra pieza de información identificativa que no es única, esto da lugar a menudo a una huella única. + La Fundación de Frontera Electrónica (EFF) creó una herramienta llamada Panopticlick + para demostrar cuánta información puede ser recogida de estas fuentes. + Si esta prueba se realiza con javascript habilitado, la cantidad de información que es revelada aumenta grandemente. + Browser Leaks (Fugas del navegador) y Am I Unique (¿Soy único?) son también buenas fuentes de información.

+ + + +

Existen varios agentes de usuario preestablecidos que coinciden con los más comunes navegadores y sistemas operativos. + A los efectos de huellas del navegador, todo lo que sea extraño es más fácil de rastrear. + Si Navegador Privado se vuelve común y mucha gente usa PrivacyBrowser/1.0 como su usuario de agente, será entonces una buena elección para su privacidad. + Firefox o Chrome son los usuarios de agente más comunes, pero se actualizan automáticamente y sus números de versión cambian tan rápidamente que es probable que los usuarios de agente incluídos + en Privacy Browser no estén ya en sintonía con la mayoría de agentes de usuario en los registros del servidor.

+ +

Algunas páginas web no funcionan correctamente si no reconocen el agente de usuario. + Usando la configuración de dominios para establecer el agente de usuario a WebView por defecto, + o a otro agente de usuario que sea normalmente reconocido, suele resolver el problema. + El WebView de android no permite que el agente de usuario esté en blanco. Si lo está, WebView simplemente envía el agente de usuario por defecto al servidor.

+ + \ No newline at end of file diff --git a/app/src/main/assets/es/guide_user_agent_dark.html b/app/src/main/assets/es/guide_user_agent_dark.html deleted file mode 100644 index 82730a60..00000000 --- a/app/src/main/assets/es/guide_user_agent_dark.html +++ /dev/null @@ -1,65 +0,0 @@ - - - - - - - - - - -

Identificación del navegador

- -

Cuando los navegadores web se conectan a las páginas web, envían un agente de usuario, que identifica al navegador y a las capacidades de rendering que posee. - El servidor web puede usar esta información para decidir qué versión de página web enviar al navegador. - Por ejemplo, muchas páginas web tienen diferentes versiones para escritorio y para navegadores móviles.

- -

Por defecto, Navegador Privado usa su propio agente de usuario, que es PrivacyBrowser/1.0. Éste envía un mínimo de información al servidor web. - Ya que los servidores web no lo reconocen como un agente de usuario móvil, lo que normalmente muestran es la versión de escritorio del sitio.

- -

En comparación, el agente de usuario por defecto de WebView divulga una gran cantidad de información sobre el hardware y el software del dispositivo. - En la ventana Configuración, seleccionando WebView por defecto como el Agente de usuario muestra el agente de usuario que se enviará. - La captura de pantalla de abajo muestra un Pixel 2 XL corriendo Android 10 con el sistema de android WebView 84.0.4147.125 instalado. - La mayoría de servidores web reconocerán esto como un navegador móvil y mostrará la versión móvil del sitio si dispone de ella.

- - - -

Existe tanta información en el agente de usuario que algunas veces será el mismo con sólo unos pocos visitantes a una página web. - Si el agente de usuario es combinado con otra pieza de información identificativa que no es única, esto da lugar a menudo a una huella única. - La Fundación de Frontera Electrónica (EFF) creó una herramienta llamada Panopticlick - para demostrar cuánta información puede ser recogida de estas fuentes. - Si esta prueba se realiza con javascript habilitado, la cantidad de información que es revelada aumenta grandemente. - Browser Leaks (Fugas del navegador) y Am I Unique (¿Soy único?) son también buenas fuentes de información.

- - - -

Existen varios agentes de usuario preestablecidos que coinciden con los más comunes navegadores y sistemas operativos. - A los efectos de huellas del navegador, todo lo que sea extraño es más fácil de rastrear. - Si Navegador Privado se vuelve común y mucha gente usa PrivacyBrowser/1.0 como su usuario de agente, será entonces una buena elección para su privacidad. - Firefox o Chrome son los usuarios de agente más comunes, pero se actualizan automáticamente y sus números de versión cambian tan rápidamente que es probable que los usuarios de agente incluídos - en Privacy Browser no estén ya en sintonía con la mayoría de agentes de usuario en los registros del servidor.

- -

Algunas páginas web no funcionan correctamente si no reconocen el agente de usuario. - Usando la configuración de dominios para establecer el agente de usuario a WebView por defecto, - o a otro agente de usuario que sea normalmente reconocido, suele resolver el problema. - El WebView de android no permite que el agente de usuario esté en blanco. Si lo está, WebView simplemente envía el agente de usuario por defecto al servidor.

- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_user_agent_light.html b/app/src/main/assets/es/guide_user_agent_light.html deleted file mode 100644 index a0e5b4db..00000000 --- a/app/src/main/assets/es/guide_user_agent_light.html +++ /dev/null @@ -1,65 +0,0 @@ - - - - - - - - - - -

Identificación del navegador

- -

Cuando los navegadores web se conectan a las páginas web, envían un agente de usuario, que identifica al navegador y a las capacidades de rendering que posee. - El servidor web puede usar esta información para decidir qué versión de página web enviar al navegador. - Por ejemplo, muchas páginas web tienen diferentes versiones para escritorio y para navegadores móviles.

- -

Por defecto, Navegador Privado usa su propio agente de usuario, que es PrivacyBrowser/1.0. Éste envía un mínimo de información al servidor web. - Ya que los servidores web no lo reconocen como un agente de usuario móvil, lo que normalmente muestran es la versión de escritorio del sitio.

- -

En comparación, el agente de usuario por defecto de WebView divulga una gran cantidad de información sobre el hardware y el software del dispositivo. - En la ventana Configuración, seleccionando WebView por defecto como el Agente de usuario muestra el agente de usuario que se enviará. - La captura de pantalla de abajo muestra un Pixel 2 XL corriendo Android 10 con el sistema de android WebView 84.0.4147.125 instalado. - La mayoría de servidores web reconocerán esto como un navegador móvil y mostrará la versión móvil del sitio si dispone de ella.

- - - -

Existe tanta información en el agente de usuario que algunas veces será el mismo con sólo unos pocos visitantes a una página web. - Si el agente de usuario es combinado con otra pieza de información identificativa que no es única, esto da lugar a menudo a una huella única. - La Fundación de Frontera Electrónica (EFF) creó una herramienta llamada Panopticlick - para demostrar cuánta información puede ser recogida de estas fuentes. - Si esta prueba se realiza con javascript habilitado, la cantidad de información que es revelada aumenta grandemente. - Browser Leaks (Fugas del navegador) y Am I Unique (¿Soy único?) son también buenas fuentes de información.

- - - -

Existen varios agentes de usuario preestablecidos que coinciden con los más comunes navegadores y sistemas operativos. - A los efectos de huellas del navegador, todo lo que sea extraño es más fácil de rastrear. - Si Navegador Privado se vuelve común y mucha gente usa PrivacyBrowser/1.0 como su usuario de agente, será entonces una buena elección para su privacidad. - Firefox o Chrome son los usuarios de agente más comunes, pero se actualizan automáticamente y sus números de versión cambian tan rápidamente que es probable que los usuarios de agente incluídos - en Privacy Browser no estén ya en sintonía con la mayoría de agentes de usuario en los registros del servidor.

- -

Algunas páginas web no funcionan correctamente si no reconocen el agente de usuario. - Usando la configuración de dominios para establecer el agente de usuario a WebView por defecto, - o a otro agente de usuario que sea normalmente reconocido, suele resolver el problema. - El WebView de android no permite que el agente de usuario esté en blanco. Si lo está, WebView simplemente envía el agente de usuario por defecto al servidor.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/about_changelog.html b/app/src/main/assets/fr/about_changelog.html new file mode 100644 index 00000000..8f3448bf --- /dev/null +++ b/app/src/main/assets/fr/about_changelog.html @@ -0,0 +1,710 @@ + + + + + + + + + + + + + +

3.5.1 (version du code 51)

+

28 Août 2020 - API minimale : 19, API optimale : 29

+
    +
  • Correction d'un bug qui empêchait de nouveaux intents (liens en provenance d'autres applications) de se charger + si Privacy Browser avait été tué par le système d'exploitation en arrière-plan.
  • +
  • Correction d'un bug qui entraînait une initialisation incorrecte de l'application + si le thème de l'application était défini à l'opposé du thème du système d'exploitation.
  • +
+ +

3.5 (version du code 50)

+

18 Août 2020 - API minimale : 19, API optimale : 29

+ + +

3.4.1 (version du code 49)

+

1 Avril 2020 - API minimale : 19, API optimale : 29

+ + +

3.4 (version du code 48)

+

28 Mars 2020 - API minimale : 19, API optimale : 29

+ + +

3.3 (version du code 47)

+

3 Janvier 2020 - API minimale : 19, API optimale : 29

+ + +

3.2 (version du code 46)

+

20 Juillet 2019 - API minimale : 19, API optimale : 28

+ + +

3.1 (version du code 45)

+

27 Mai 2019 - API minimale : 19, API optimale : 28

+ + +

3.0.1 (version du code 44)

+

2 Mai 2019 - API minimale : 19, API optimale : 28

+ + +

3.0 (version du code 43)

+

26 Avril 2019 - API minimale : 19, API optimale : 28

+
    +
  • Ajout de la nvaigation par onglet.
  • +
  • Correction d'un bug qui coupait le bas de la WebView lorsque le défilement de la barre d'applications était désactivé.
  • +
  • Correction d'un bug qui faisait redémarrer le Privacy Browser à chaque fois qu'un clavier Bluetooth était connecté / déconnecté.
  • +
  • Traduction allemande mise à jour fournie par Bernhard G. Keller.
  • +
  • Traduction italienne mise à jour fournie par Francesco Buratti.
  • +
  • Traduction russe mise à jour.
  • +
  • Traduction espagnole mise à jour fournie par Jose A. León.
  • +
  • Traduction partielle en Turc.
  • +
+ +

2.17.1 (version du code 42)

+

5 Mars 2019 - API minimale : 19, API optimale : 28

+ + +

2.17 (version du code 41)

+

27 Février 2019 - API minimale : 19, API optimale : 28

+ + +

2.16 (version du code 40)

+

31 Janvier 2019 - API minimale : 19, API optimale : 28

+ + +

2.15.1 (version du code 39)

+

27 Décembre 2018 - API minimale : 19, API optimale : 28

+ + +

2.15 (version du code 38)

+

24 Décembre 2018 - API minimale : 19, API optimale : 28

+ + +

2.14 (version du code 37)

+

8 Décembre 2018 - API minimale : 19, API optimale : 28

+ + +

2.13 (version du code 36)

+

29 Octobre 2018 - API minimale : 19, API optimale : 28

+ + +

2.12 (version du code 35)

+

31 Juillet 2018 - API minimale : 19, API optimale : 27

+ + +

2.11 (version du code 34)

+

10 Juillet 2018 - API minimale : 19, API optimale : 27

+ + +

2.10 (version du code 33)

+

24 Mai 2018 - API minimale : 19, API optimale : 27

+ + +

2.9 (version du code 32)

+

9 Mai 2018 - API minimale : 19, API optimale : 27

+ + +

2.8.1 (version du code 31)

+

1 Mars 2018 - API minimale : 19, API optimale : 27

+ + +

2.8 (version du code 30)

+

22 Février 2018 - API minimale : 19, API optimale : 27

+ + +

2.7.2 (version du code 29)

+

22 Novembre 2017 - API minimale : 19, API optimale : 26

+ + +

2.7.1 (version du code 28)

+

9 Novembre 2017 - API minimale : 19, API optimale : 26

+ + +

2.7 (version du code 27)

+

7 Novembre 2017 - API minimale : 19, API optimale : 26

+
    +
  • Ajout d'un panneau favoris accessible en glissant l'écran vers la gauche.
  • +
  • Empêcher le mode nuit d'afficher un fond blanc lors du chargement de nouvelles pages.
  • +
  • MAJ des user agents.
  • +
  • MAJ API optimale : vers 26 (Android Oreo, 8.0.0).
  • +
  • Traduction italienne mise à jour fournie par Francesco Buratti.
  • +
  • Traduction espagnole mise à jour fournie par Jose A. León.
  • +
+ +

2.6 (version du code 26)

+

18 Septembre 2017 - API minimale : 19, API optimale : 25

+ + +

2.5 (version du code 25)

+

26 Août 2017 - API minimale : 19, API optimale : 25

+ + +

2.4 (version du code 24)

+

23 Juin 2017 - API minimale : 19, API optimale : 25

+ + +

2.3 (version du code 23)

+

26 Mai 2017 - API minimale : 19, API optimale : 25

+ + +

2.2 (version du code 22)

+

27 Avril 2017 - API minimale : 19, API optimale : 25

+ + +

2.1 (version du code 21)

+

25 Mars 2017 - API minimale : 19, API optimale : 25

+ + +

2.0.1 (version du code 20)

+

21 Mars 2017 - API minimale : 19, API optimale : 25

+ + +

2.0 (version du code 19)

+

16 Mars 2017 - API minimale : 19, API optimale : 25

+ + +

1.15 (version du code 18)

+

11 Février 2017 - API minimale : 19, API optimale : 25

+ + +

1.14.1 (version du code 17)

+

4 Janvier 2017 - API minimale : 19, API optimale : 25

+
    +
  • Correction d'un bug qui faisait planter Privacy Browser sur certains sites web lorsque le blocage publicitaire était activé.
  • +
+ +

1.14 (version du code 16)

+

26 Décembre 2016 - API minimale : 19, API optimale : 25

+ + +

1.13 (version du code 15)

+

28 Novembre 2016 - API minimale : 19, API optimale : 24

+ + +

1.12 (version du code 14)

+

9 Novembre 2016 - API minimale : 19, API optimale : 24

+ + +

1.11 (version du code 13)

+

22 Octobre 2016 - API minimale : 19, API optimale : 24

+ + +

1.10 (version du code 12)

+

15 Septembre 2016 - API minimale : 19, API optimale : 23

+
    +
  • Ajout du support de Tor Orbot proxy.
  • +
  • Ajout du support de Do Not Track.
  • +
  • Ajout une boîte de dialogue qui permet à l'utilisateur de + modifier le nom d'un fichier afin que son téléchargement ne débute.
  • +
  • Ajout de boutons d'actions optionnels les cookies, le stockage du DOM, et les formulaire de données.
  • +
  • MAJ user agents et ajout de Safari sur iOS et OS X.
  • +
  • Ajout StartPage et Qwant à la liste des moteurs de recherche.
  • +
  • Traduction allemande mise à jour fournie par Aaron Gerlach.
  • +
+ +

1.9.1 (version du code 11)

+

27 Août 2016 - API minimale : 19, API optimale : 23

+
    +
  • Changement des liens des images par des liens relatifs afin que Privacy Browser soit construit sous F-Droid.
  • +
+ +

1.9 (version du code 10)

+

26 Août 2016 - API minimale : 19, API optimale : 23

+ + +

1.8 (version du code 9)

+

16 Juillet 2016 - API minimale : 19, API optimale : 23

+ + +

1.7 (version du code 8)

+

16 Juin 2016 - API minimale : 19, API optimale : 23

+ + +

1.6 (version du code 7)

+

11 Mai 2016 - API minimale : 15, API optimale : 23

+ + +

1.5 (version du code 6)

+

5 Mai 2016 - API minimale : 15, API optimale : 23

+
    +
  • Ajout de l'option pour désactiver "glisser pour rafraîchir" afin que certains sites web, comme Google Maps, puissent fonctionner correctement.
  • +
+ +

1.4 (version du code 5)

+

28 Avril 2016 - API minimale : 15, API optimale : 23

+ + +

1.3 (version du code 4)

+

7 Avril 2016 - API minimale : 15, API optimale : 23

+ + +

1.2 (version du code 3)

+

23 Mars 2016 - API minimale : 15, API optimale : 23

+ + +

1.1 (version du code 2)

+

9 Mars 2016 - API minimale : 10, API optimale : 23

+
    +
  • Séparation de la version gratuite et de la version standard pour que Privacy Browser se construise correctement dans F-Droid.
  • +
+ +

1.0 (version du code 1)

+

24 Février 2016 - API minimale : 10, API optimale : 23

+
    +
  • Activer/Désactiver JavaScript, stockage du DOM, et les cookies.
  • +
  • Paramétrage du comportement par défaut pour JavaScript, le stockage du DOM, et les cookies.
  • +
  • Suppression du stockage du DOM et des cookies.
  • +
  • Ajout des raccourcis à la page d'accueil.
  • +
  • Utilisation du gestionnaire de téléchargement.
  • +
  • Navigation suivant et précédent.
  • +
  • Couper, coller, copier des URLs.
  • +
  • Partager des URLs.
  • +
  • Paramétrage page d'accueil.
  • +
  • Navigation dans la barre d'URL.
  • +
  • Maintain WebView scroll location when rotating écran.
  • +
  • Glisser pour actualiser WebView.
  • +
  • Lecture des vidéos en plein écran (nécessite l'activation de JavaScript).
  • +
  • Bouton Nettoyer et Quitter.
  • +
+ + \ No newline at end of file diff --git a/app/src/main/assets/fr/about_changelog_dark.html b/app/src/main/assets/fr/about_changelog_dark.html deleted file mode 100644 index 32c9f3fe..00000000 --- a/app/src/main/assets/fr/about_changelog_dark.html +++ /dev/null @@ -1,707 +0,0 @@ - - - - - - - - - - -

3.5.1 (version du code 51)

-

28 Août 2020 - API minimale : 19, API optimale : 29

-
    -
  • Correction d'un bug qui empêchait de nouveaux intents (liens en provenance d'autres applications) de se charger - si Privacy Browser avait été tué par le système d'exploitation en arrière-plan.
  • -
  • Correction d'un bug qui entraînait une initialisation incorrecte de l'application - si le thème de l'application était défini à l'opposé du thème du système d'exploitation.
  • -
- -

3.5 (version du code 50)

-

18 Août 2020 - API minimale : 19, API optimale : 29

- - -

3.4.1 (version du code 49)

-

1 Avril 2020 - API minimale : 19, API optimale : 29

- - -

3.4 (version du code 48)

-

28 Mars 2020 - API minimale : 19, API optimale : 29

- - -

3.3 (version du code 47)

-

3 Janvier 2020 - API minimale : 19, API optimale : 29

- - -

3.2 (version du code 46)

-

20 Juillet 2019 - API minimale : 19, API optimale : 28

- - -

3.1 (version du code 45)

-

27 Mai 2019 - API minimale : 19, API optimale : 28

- - -

3.0.1 (version du code 44)

-

2 Mai 2019 - API minimale : 19, API optimale : 28

- - -

3.0 (version du code 43)

-

26 Avril 2019 - API minimale : 19, API optimale : 28

-
    -
  • Ajout de la nvaigation par onglet.
  • -
  • Correction d'un bug qui coupait le bas de la WebView lorsque le défilement de la barre d'applications était désactivé.
  • -
  • Correction d'un bug qui faisait redémarrer le Privacy Browser à chaque fois qu'un clavier Bluetooth était connecté / déconnecté.
  • -
  • Traduction allemande mise à jour fournie par Bernhard G. Keller.
  • -
  • Traduction italienne mise à jour fournie par Francesco Buratti.
  • -
  • Traduction russe mise à jour.
  • -
  • Traduction espagnole mise à jour fournie par Jose A. León.
  • -
  • Traduction partielle en Turc.
  • -
- -

2.17.1 (version du code 42)

-

5 Mars 2019 - API minimale : 19, API optimale : 28

- - -

2.17 (version du code 41)

-

27 Février 2019 - API minimale : 19, API optimale : 28

- - -

2.16 (version du code 40)

-

31 Janvier 2019 - API minimale : 19, API optimale : 28

- - -

2.15.1 (version du code 39)

-

27 Décembre 2018 - API minimale : 19, API optimale : 28

- - -

2.15 (version du code 38)

-

24 Décembre 2018 - API minimale : 19, API optimale : 28

- - -

2.14 (version du code 37)

-

8 Décembre 2018 - API minimale : 19, API optimale : 28

- - -

2.13 (version du code 36)

-

29 Octobre 2018 - API minimale : 19, API optimale : 28

- - -

2.12 (version du code 35)

-

31 Juillet 2018 - API minimale : 19, API optimale : 27

- - -

2.11 (version du code 34)

-

10 Juillet 2018 - API minimale : 19, API optimale : 27

- - -

2.10 (version du code 33)

-

24 Mai 2018 - API minimale : 19, API optimale : 27

- - -

2.9 (version du code 32)

-

9 Mai 2018 - API minimale : 19, API optimale : 27

- - -

2.8.1 (version du code 31)

-

1 Mars 2018 - API minimale : 19, API optimale : 27

- - -

2.8 (version du code 30)

-

22 Février 2018 - API minimale : 19, API optimale : 27

- - -

2.7.2 (version du code 29)

-

22 Novembre 2017 - API minimale : 19, API optimale : 26

- - -

2.7.1 (version du code 28)

-

9 Novembre 2017 - API minimale : 19, API optimale : 26

- - -

2.7 (version du code 27)

-

7 Novembre 2017 - API minimale : 19, API optimale : 26

-
    -
  • Ajout d'un panneau favoris accessible en glissant l'écran vers la gauche.
  • -
  • Empêcher le mode nuit d'afficher un fond blanc lors du chargement de nouvelles pages.
  • -
  • MAJ des user agents.
  • -
  • MAJ API optimale : vers 26 (Android Oreo, 8.0.0).
  • -
  • Traduction italienne mise à jour fournie par Francesco Buratti.
  • -
  • Traduction espagnole mise à jour fournie par Jose A. León.
  • -
- -

2.6 (version du code 26)

-

18 Septembre 2017 - API minimale : 19, API optimale : 25

- - -

2.5 (version du code 25)

-

26 Août 2017 - API minimale : 19, API optimale : 25

- - -

2.4 (version du code 24)

-

23 Juin 2017 - API minimale : 19, API optimale : 25

- - -

2.3 (version du code 23)

-

26 Mai 2017 - API minimale : 19, API optimale : 25

- - -

2.2 (version du code 22)

-

27 Avril 2017 - API minimale : 19, API optimale : 25

- - -

2.1 (version du code 21)

-

25 Mars 2017 - API minimale : 19, API optimale : 25

- - -

2.0.1 (version du code 20)

-

21 Mars 2017 - API minimale : 19, API optimale : 25

- - -

2.0 (version du code 19)

-

16 Mars 2017 - API minimale : 19, API optimale : 25

- - -

1.15 (version du code 18)

-

11 Février 2017 - API minimale : 19, API optimale : 25

- - -

1.14.1 (version du code 17)

-

4 Janvier 2017 - API minimale : 19, API optimale : 25

-
    -
  • Correction d'un bug qui faisait planter Privacy Browser sur certains sites web lorsque le blocage publicitaire était activé.
  • -
- -

1.14 (version du code 16)

-

26 Décembre 2016 - API minimale : 19, API optimale : 25

- - -

1.13 (version du code 15)

-

28 Novembre 2016 - API minimale : 19, API optimale : 24

- - -

1.12 (version du code 14)

-

9 Novembre 2016 - API minimale : 19, API optimale : 24

- - -

1.11 (version du code 13)

-

22 Octobre 2016 - API minimale : 19, API optimale : 24

- - -

1.10 (version du code 12)

-

15 Septembre 2016 - API minimale : 19, API optimale : 23

-
    -
  • Ajout du support de Tor Orbot proxy.
  • -
  • Ajout du support de Do Not Track.
  • -
  • Ajout une boîte de dialogue qui permet à l'utilisateur de - modifier le nom d'un fichier afin que son téléchargement ne débute.
  • -
  • Ajout de boutons d'actions optionnels les cookies, le stockage du DOM, et les formulaire de données.
  • -
  • MAJ user agents et ajout de Safari sur iOS et OS X.
  • -
  • Ajout StartPage et Qwant à la liste des moteurs de recherche.
  • -
  • Traduction allemande mise à jour fournie par Aaron Gerlach.
  • -
- -

1.9.1 (version du code 11)

-

27 Août 2016 - API minimale : 19, API optimale : 23

-
    -
  • Changement des liens des images par des liens relatifs afin que Privacy Browser soit construit sous F-Droid.
  • -
- -

1.9 (version du code 10)

-

26 Août 2016 - API minimale : 19, API optimale : 23

- - -

1.8 (version du code 9)

-

16 Juillet 2016 - API minimale : 19, API optimale : 23

- - -

1.7 (version du code 8)

-

16 Juin 2016 - API minimale : 19, API optimale : 23

- - -

1.6 (version du code 7)

-

11 Mai 2016 - API minimale : 15, API optimale : 23

- - -

1.5 (version du code 6)

-

5 Mai 2016 - API minimale : 15, API optimale : 23

-
    -
  • Ajout de l'option pour désactiver "glisser pour rafraîchir" afin que certains sites web, comme Google Maps, puissent fonctionner correctement.
  • -
- -

1.4 (version du code 5)

-

28 Avril 2016 - API minimale : 15, API optimale : 23

- - -

1.3 (version du code 4)

-

7 Avril 2016 - API minimale : 15, API optimale : 23

- - -

1.2 (version du code 3)

-

23 Mars 2016 - API minimale : 15, API optimale : 23

- - -

1.1 (version du code 2)

-

9 Mars 2016 - API minimale : 10, API optimale : 23

-
    -
  • Séparation de la version gratuite et de la version standard pour que Privacy Browser se construise correctement dans F-Droid.
  • -
- -

1.0 (version du code 1)

-

24 Février 2016 - API minimale : 10, API optimale : 23

-
    -
  • Activer/Désactiver JavaScript, stockage du DOM, et les cookies.
  • -
  • Paramétrage du comportement par défaut pour JavaScript, le stockage du DOM, et les cookies.
  • -
  • Suppression du stockage du DOM et des cookies.
  • -
  • Ajout des raccourcis à la page d'accueil.
  • -
  • Utilisation du gestionnaire de téléchargement.
  • -
  • Navigation suivant et précédent.
  • -
  • Couper, coller, copier des URLs.
  • -
  • Partager des URLs.
  • -
  • Paramétrage page d'accueil.
  • -
  • Navigation dans la barre d'URL.
  • -
  • Maintain WebView scroll location when rotating écran.
  • -
  • Glisser pour actualiser WebView.
  • -
  • Lecture des vidéos en plein écran (nécessite l'activation de JavaScript).
  • -
  • Bouton Nettoyer et Quitter.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/fr/about_changelog_light.html b/app/src/main/assets/fr/about_changelog_light.html deleted file mode 100644 index 06831df5..00000000 --- a/app/src/main/assets/fr/about_changelog_light.html +++ /dev/null @@ -1,707 +0,0 @@ - - - - - - - - - - -

3.5.1 (version du code 51)

-

28 Août 2020 - API minimale : 19, API optimale : 29

-
    -
  • Correction d'un bug qui empêchait de nouveaux intents (liens en provenance d'autres applications) de se charger - si Privacy Browser avait été tué par le système d'exploitation en arrière-plan.
  • -
  • Correction d'un bug qui entraînait une initialisation incorrecte de l'application - si le thème de l'application était défini à l'opposé du thème du système d'exploitation.
  • -
- -

3.5 (version du code 50)

-

18 Août 2020 - API minimale : 19, API optimale : 29

- - -

3.4.1 (version du code 49)

-

1 Avril 2020 - API minimale : 19, API optimale : 29

- - -

3.4 (version du code 48)

-

28 Mars 2020 - API minimale : 19, API optimale : 29

- - -

3.3 (version du code 47)

-

3 Janvier 2020 - API minimale : 19, API optimale : 29

- - -

3.2 (version du code 46)

-

20 Juillet 2019 - API minimale : 19, API optimale : 28

- - -

3.1 (version du code 45)

-

27 Mai 2019 - API minimale : 19, API optimale : 28

- - -

3.0.1 (version du code 44)

-

2 Mai 2019 - API minimale : 19, API optimale : 28

- - -

3.0 (version du code 43)

-

26 Avril 2019 - API minimale : 19, API optimale : 28

-
    -
  • Ajout de la nvaigation par onglet.
  • -
  • Correction d'un bug qui coupait le bas de la WebView lorsque le défilement de la barre d'applications était désactivé.
  • -
  • Correction d'un bug qui faisait redémarrer le Privacy Browser à chaque fois qu'un clavier Bluetooth était connecté / déconnecté.
  • -
  • Traduction allemande mise à jour fournie par Bernhard G. Keller.
  • -
  • Traduction italienne mise à jour fournie par Francesco Buratti.
  • -
  • Traduction russe mise à jour.
  • -
  • Traduction espagnole mise à jour fournie par Jose A. León.
  • -
  • Traduction partielle en Turc.
  • -
- -

2.17.1 (version du code 42)

-

5 Mars 2019 - API minimale : 19, API optimale : 28

- - -

2.17 (version du code 41)

-

27 Février 2019 - API minimale : 19, API optimale : 28

- - -

2.16 (version du code 40)

-

31 Janvier 2019 - API minimale : 19, API optimale : 28

- - -

2.15.1 (version du code 39)

-

27 Décembre 2018 - API minimale : 19, API optimale : 28

- - -

2.15 (version du code 38)

-

24 Décembre 2018 - API minimale : 19, API optimale : 28

- - -

2.14 (version du code 37)

-

8 Décembre 2018 - API minimale : 19, API optimale : 28

- - -

2.13 (version du code 36)

-

29 Octobre 2018 - API minimale : 19, API optimale : 28

- - -

2.12 (version du code 35)

-

31 Juillet 2018 - API minimale : 19, API optimale : 27

- - -

2.11 (version du code 34)

-

10 Juillet 2018 - API minimale : 19, API optimale : 27

- - -

2.10 (version du code 33)

-

24 Mai 2018 - API minimale : 19, API optimale : 27

- - -

2.9 (version du code 32)

-

9 Mai 2018 - API minimale : 19, API optimale : 27

- - -

2.8.1 (version du code 31)

-

1 Mars 2018 - API minimale : 19, API optimale : 27

- - -

2.8 (version du code 30)

-

22 Février 2018 - API minimale : 19, API optimale : 27

- - -

2.7.2 (version du code 29)

-

22 Novembre 2017 - API minimale : 19, API optimale : 26

- - -

2.7.1 (version du code 28)

-

9 Novembre 2017 - API minimale : 19, API optimale : 26

- - -

2.7 (version du code 27)

-

7 Novembre 2017 - API minimale : 19, API optimale : 26

-
    -
  • Ajout d'un panneau favoris accessible en glissant l'écran vers la gauche.
  • -
  • Empêcher le mode nuit d'afficher un fond blanc lors du chargement de nouvelles pages.
  • -
  • MAJ des user agents.
  • -
  • MAJ API optimale : vers 26 (Android Oreo, 8.0.0).
  • -
  • Traduction italienne mise à jour fournie par Francesco Buratti.
  • -
  • Traduction espagnole mise à jour fournie par Jose A. León.
  • -
- -

2.6 (version du code 26)

-

18 Septembre 2017 - API minimale : 19, API optimale : 25

- - -

2.5 (version du code 25)

-

26 Août 2017 - API minimale : 19, API optimale : 25

- - -

2.4 (version du code 24)

-

23 Juin 2017 - API minimale : 19, API optimale : 25

- - -

2.3 (version du code 23)

-

26 Mai 2017 - API minimale : 19, API optimale : 25

- - -

2.2 (version du code 22)

-

27 Avril 2017 - API minimale : 19, API optimale : 25

- - -

2.1 (version du code 21)

-

25 Mars 2017 - API minimale : 19, API optimale : 25

- - -

2.0.1 (version du code 20)

-

21 Mars 2017 - API minimale : 19, API optimale : 25

- - -

2.0 (version du code 19)

-

16 Mars 2017 - API minimale : 19, API optimale : 25

- - -

1.15 (version du code 18)

-

11 Février 2017 - API minimale : 19, API optimale : 25

- - -

1.14.1 (version du code 17)

-

4 Janvier 2017 - API minimale : 19, API optimale : 25

-
    -
  • Correction d'un bug qui faisait planter Privacy Browser sur certains sites web lorsque le blocage publicitaire était activé.
  • -
- -

1.14 (version du code 16)

-

26 Décembre 2016 - API minimale : 19, API optimale : 25

- - -

1.13 (version du code 15)

-

28 Novembre 2016 - API minimale : 19, API optimale : 24

- - -

1.12 (version du code 14)

-

9 Novembre 2016 - API minimale : 19, API optimale : 24

- - -

1.11 (version du code 13)

-

22 Octobre 2016 - API minimale : 19, API optimale : 24

- - -

1.10 (version du code 12)

-

15 Septembre 2016 - API minimale : 19, API optimale : 23

-
    -
  • Ajout du support de Tor Orbot proxy.
  • -
  • Ajout du support de Do Not Track.
  • -
  • Ajout une boîte de dialogue qui permet à l'utilisateur de - modifier le nom d'un fichier afin que son téléchargement ne débute.
  • -
  • Ajout de boutons d'actions optionnels les cookies, le stockage du DOM, et les formulaire de données.
  • -
  • MAJ user agents et ajout de Safari sur iOS et OS X.
  • -
  • Ajout StartPage et Qwant à la liste des moteurs de recherche.
  • -
  • Traduction allemande mise à jour fournie par Aaron Gerlach.
  • -
- -

1.9.1 (version du code 11)

-

27 Août 2016 - API minimale : 19, API optimale : 23

-
    -
  • Changement des liens des images par des liens relatifs afin que Privacy Browser soit construit sous F-Droid.
  • -
- -

1.9 (version du code 10)

-

26 Août 2016 - API minimale : 19, API optimale : 23

- - -

1.8 (version du code 9)

-

16 Juillet 2016 - API minimale : 19, API optimale : 23

- - -

1.7 (version du code 8)

-

16 Juin 2016 - API minimale : 19, API optimale : 23

- - -

1.6 (version du code 7)

-

11 Mai 2016 - API minimale : 15, API optimale : 23

- - -

1.5 (version du code 6)

-

5 Mai 2016 - API minimale : 15, API optimale : 23

-
    -
  • Ajout de l'option pour désactiver "glisser pour rafraîchir" afin que certains sites web, comme Google Maps, puissent fonctionner correctement.
  • -
- -

1.4 (version du code 5)

-

28 Avril 2016 - API minimale : 15, API optimale : 23

- - -

1.3 (version du code 4)

-

7 Avril 2016 - API minimale : 15, API optimale : 23

- - -

1.2 (version du code 3)

-

23 Mars 2016 - API minimale : 15, API optimale : 23

- - -

1.1 (version du code 2)

-

9 Mars 2016 - API minimale : 10, API optimale : 23

-
    -
  • Séparation de la version gratuite et de la version standard pour que Privacy Browser se construise correctement dans F-Droid.
  • -
- -

1.0 (version du code 1)

-

24 Février 2016 - API minimale : 10, API optimale : 23

-
    -
  • Activer/Désactiver JavaScript, stockage du DOM, et les cookies.
  • -
  • Paramétrage du comportement par défaut pour JavaScript, le stockage du DOM, et les cookies.
  • -
  • Suppression du stockage du DOM et des cookies.
  • -
  • Ajout des raccourcis à la page d'accueil.
  • -
  • Utilisation du gestionnaire de téléchargement.
  • -
  • Navigation suivant et précédent.
  • -
  • Couper, coller, copier des URLs.
  • -
  • Partager des URLs.
  • -
  • Paramétrage page d'accueil.
  • -
  • Navigation dans la barre d'URL.
  • -
  • Maintain WebView scroll location when rotating écran.
  • -
  • Glisser pour actualiser WebView.
  • -
  • Lecture des vidéos en plein écran (nécessite l'activation de JavaScript).
  • -
  • Bouton Nettoyer et Quitter.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/fr/about_contributors.html b/app/src/main/assets/fr/about_contributors.html new file mode 100644 index 00000000..7c77b517 --- /dev/null +++ b/app/src/main/assets/fr/about_contributors.html @@ -0,0 +1,54 @@ + + + + + + + + + + + + + +

Développeur principal

+

Privacy Browser est principalement développé par Soren Stoutner.

+ +

Codeurs

+ Thomas Jensen
+ Hendrik Knackstedt + +

Traducteurs

+ Kévin LE FLOHIC : Français
+ Thiago Nazareno Conceição Silva de Jesus: Portugais brésilien
+ Bernhard G. Keller : Allemand
+ Francesco Buratti : Italien
+ Jose A. León : Espagnol + +

Anciens traducteurs

+ Stefan Erhardt: Allemand
+ Aaron Gerlach : Allemand + +
+
+

Les contributeurs sont invités à soumettre leurs codes et leurs traductions.

+ + \ No newline at end of file diff --git a/app/src/main/assets/fr/about_contributors_dark.html b/app/src/main/assets/fr/about_contributors_dark.html deleted file mode 100644 index 01ee44a3..00000000 --- a/app/src/main/assets/fr/about_contributors_dark.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - - - - - - -

Développeur principal

-

Privacy Browser est principalement développé par Soren Stoutner.

- -

Codeurs

- Thomas Jensen
- Hendrik Knackstedt - -

Traducteurs

- Kévin LE FLOHIC : Français
- Thiago Nazareno Conceição Silva de Jesus: Portugais brésilien
- Bernhard G. Keller : Allemand
- Francesco Buratti : Italien
- Jose A. León : Espagnol - -

Anciens traducteurs

- Stefan Erhardt: Allemand
- Aaron Gerlach : Allemand - -
-
-

Les contributeurs sont invités à soumettre leurs codes et leurs traductions.

- - diff --git a/app/src/main/assets/fr/about_contributors_light.html b/app/src/main/assets/fr/about_contributors_light.html deleted file mode 100644 index 22503bc2..00000000 --- a/app/src/main/assets/fr/about_contributors_light.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - - - - - - -

Développeur principal

-

Privacy Browser est principalement développé par Soren Stoutner.

- -

Codeurs

- Thomas Jensen
- Hendrik Knackstedt - -

Traducteurs

- Kévin LE FLOHIC : Français
- Thiago Nazareno Conceição Silva de Jesus: Portugais brésilien
- Bernhard G. Keller : Allemand
- Francesco Buratti : Italien
- Jose A. León : Espagnol - -

Anciens traducteurs

- Stefan Erhardt: Allemand
- Aaron Gerlach : Allemand - -
-
-

Les contributeurs sont invités à soumettre leurs codes et leurs traductions.

- - diff --git a/app/src/main/assets/fr/about_licenses.html b/app/src/main/assets/fr/about_licenses.html new file mode 100644 index 00000000..7549c265 --- /dev/null +++ b/app/src/main/assets/fr/about_licenses.html @@ -0,0 +1,1074 @@ + + + + + + + + + + + + + +

Copyright

+

Privacy Browser copyright © 2015-2020 Soren Stoutner.

+ +

Licence

+

rivacy Browser est publié sous la licence GPLv3+. Le texte complet de la licence est ci-dessous. + Le code source est disponible à partir de git.stoutner.com.

+ +

Listes de blocage

+

EasyList et EasyPrivacy + sont licences doubles GPLv3+ + et Creative Commons Attribution-ShareAlike 3.0+ Unported. + Privacy Browser les intègre à l'aide de l'option GPLv3+.

+ +

Fanboy’s Annoyance List et Fanboy’s Social Blocking List + sont publiés sous la licence Creative Commons Attribution 3.0 Unported license, + qui est compatible avec la GPLv3+. Les listes ne sont pas modifiées dans Privacy Browser.

+ +

Pour plus d'informations sur les listes de blocage, consultez le site web EasyList.

+ +

Librairies

+

Privacy Browser est construit avec les librairies AndroidX, + les librairies Kotlin, + et le code du référentiel Google Material Maven, + publiés sous la Licence Apache 2.0.

+ +

La version gratuite de Privacy Browser repose sur les Annonces Firebase, + publié sous la licence du kit de développement logiciel Android.

+ +

Classes

+

com.stoutner.privacybrowser.views.CheckedLinearLayout est une version modifiée d'une classe contenue dans le code source de la + Caméra Android. + Le fichier d'origine a été publié sous la Licence Apache 2.0. + Le fichier modifié est publié sous la licence GPLv3+.

+ +

Icônes

+

+ sont dérivés de security et de language, + qui font partie de l'ensemble d'icônes Matériel Android + et sont publiés sous la Licence Apache 2.0. + Le texte complet de la licence est ci-dessous. Modifications copyright © 2016 Soren Stoutner. + Les images résultantes sont publiées sous la licence GPLv3+.

+

est dérivé des éléments folder et exit_to_app, + qui font partie de l'ensemble d'icônes Matériel Android + et sont publiés sous Licence Apache 2.0. + Modifications copyright © 2017 Soren Stoutner. + L'image résultante est publiée sous la licence GPLv3+.

+

est dérivé des éléments bookmark et create_new_folder, qui font partie de + l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. + Modifications copyright © 2017 Soren Stoutner. + L'image résultante est publiée sous la licence GPLv3+.

+

est dérivée de l'élément create_new_folder, + qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. + Modifications copyright © 2017 Soren Stoutner. + L'image résultante est publiée sous la licence GPLv3+.

+

est dérivée de l'élément exit_to_app, qui fait partie de + l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. + Modifications copyright © 2017 Soren Stoutner. + L'image résultante est publiée sous la licence GPLv3+.

+

est dérivée de l'élément compare, + qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. + Modifications copyright © 2017 Soren Stoutner. + L'image résultante est publiée sous la licence GPLv3+.

+

est dérivée de l'élément sort, + qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. + Modifications copyright © 2019 Soren Stoutner. + L'image résultante est publiée sous la licence GPLv3+.

+

cookie a été créé par Google. + Il est publié sous la Licence Apache 2.0 + et peut être téléchargé à partir des Icônes Material Design. + Il est inchangé sauf pour les informations de mise en page telles que la couleur et la taille.

+

Les icônes suivantes proviennent de l'ensemble d'icônes Matériel Android, + qui est publié sous la Licence Apache 2.0. + Ils sont inchangés sauf pour les informations de mise en page comme la couleur et la taille. Certains d'entre eux ont été renommés pour correspondre à leur utilisation dans le code. + Les icônes et les noms d'origine sont indiqués ci-dessous.

+

add.

+

arrow_back.

+

arrow_forward.

+

bookmarks.

+

bug_report.

+

camera_enhance.

+

chrome_reader_mode.

+

close.

+

delete.

+

delete_forever.

+

devices_other.

+

dns.

+

donut_small.

+

edit.

+

expand_less.

+

expand_more.

+

file_copy.

+

file_download.

+

find_in_page.

+

folder.

+

home.

+

image.

+

import_contacts.

+

import_export.

+

important_devices.

+

info_outline.

+

language.

+

link_off.

+

list.

+

local_activity.

+

location_off.

+

lock.

+

map.

+

more.

+

new releases.

+

open_in_browser.

+

payment.

+

question_answer.

+

refresh.

+

save.

+

search.

+

select_all.

+

settings.

+

settings_overscan.

+

share.

+

smartphone.

+

sort.

+

style.

+

subtitles.

+

tab.

+

text_fields.

+

thumbs_up_down.

+

vertical_align_bottom.

+

vertical_align_top.

+

visibility_off.

+

vpn_key.

+

vpn_lock.

+

web.

+ +
+ +

GNU General Public License

+

Version 3, 29 June 2007

+ +

Copyright © 2007 Free Software Foundation, Inc. + <http://fsf.org/>

+ +

Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed.

+ +

Preamble

+ +

The GNU General Public License is a free, copyleft license for + software and other kinds of works.

+ +

The licenses for most software and other practical works are designed + to take away your freedom to share and change the works. By contrast, + the GNU General Public License is intended to guarantee your freedom to + share and change all versions of a program—to make sure it remains free + software for all its users. We, the Free Software Foundation, use the + GNU General Public License for most of our software; it applies also to + any other work released this way by its authors. You can apply it to + your programs, too.

+ +

When we speak of free software, we are referring to freedom, not + price. Our General Public Licenses are designed to make sure that you + have the freedom to distribute copies of free software (and charge for + them if you wish), that you receive source code or can get it if you + want it, that you can change the software or use pieces of it in new + free programs, and that you know you can do these things.

+ +

To protect your rights, we need to prevent others from denying you + these rights or asking you to surrender the rights. Therefore, you have + certain responsibilities if you distribute copies of the software, or if + you modify it: responsibilities to respect the freedom of others.

+ +

For example, if you distribute copies of such a program, whether + gratis or for a fee, you must pass on to the recipients the same + freedoms that you received. You must make sure that they, too, receive + or can get the source code. And you must show them these terms so they + know their rights.

+ +

Developers that use the GNU GPL protect your rights with two steps: + (1) assert copyright on the software, and (2) offer you this License + giving you legal permission to copy, distribute and/or modify it.

+ +

For the developers’ and authors’ protection, the GPL clearly explains + that there is no warranty for this free software. For both users’ and + authors’ sake, the GPL requires that modified versions be marked as + changed, so that their problems will not be attributed erroneously to + authors of previous versions.

+ +

Some devices are designed to deny users access to install or run + modified versions of the software inside them, although the manufacturer + can do so. This is fundamentally incompatible with the aim of + protecting users’ freedom to change the software. The systematic + pattern of such abuse occurs in the area of products for individuals to + use, which is precisely where it is most unacceptable. Therefore, we + have designed this version of the GPL to prohibit the practice for those + products. If such problems arise substantially in other domains, we + stand ready to extend this provision to those domains in future versions + of the GPL, as needed to protect the freedom of users.

+ +

Finally, every program is threatened constantly by software patents. + States should not allow patents to restrict development and use of + software on general-purpose computers, but in those that do, we wish to + avoid the special danger that patents applied to a free program could + make it effectively proprietary. To prevent this, the GPL assures that + patents cannot be used to render the program non-free.

+ +

The precise terms and conditions for copying, distribution and + modification follow.

+ +

TERMS AND CONDITIONS

+ +

0. Definitions.

+ +

“This License” refers to version 3 of the GNU General Public License.

+ +

“Copyright” also means copyright-like laws that apply to other kinds of + works, such as semiconductor masks.

+ +

“The Program” refers to any copyrightable work licensed under this + License. Each licensee is addressed as “you”. “Licensees” and + “recipients” may be individuals or organizations.

+ +

To “modify” a work means to copy from or adapt all or part of the work + in a fashion requiring copyright permission, other than the making of an + exact copy. The resulting work is called a “modified version” of the + earlier work or a work “based on” the earlier work.

+ +

A “covered work” means either the unmodified Program or a work based + on the Program.

+ +

To “propagate” a work means to do anything with it that, without + permission, would make you directly or secondarily liable for + infringement under applicable copyright law, except executing it on a + computer or modifying a private copy. Propagation includes copying, + distribution (with or without modification), making available to the + public, and in some countries other activities as well.

+ +

To “convey” a work means any kind of propagation that enables other + parties to make or receive copies. Mere interaction with a user through + a computer network, with no transfer of a copy, is not conveying.

+ +

An interactive user interface displays “Appropriate Legal Notices” + to the extent that it includes a convenient and prominently visible + feature that (1) displays an appropriate copyright notice, and (2) + tells the user that there is no warranty for the work (except to the + extent that warranties are provided), that licensees may convey the + work under this License, and how to view a copy of this License. If + the interface presents a list of user commands or options, such as a + menu, a prominent item in the list meets this criterion.

+ +

1. Source Code.

+ +

The “source code” for a work means the preferred form of the work + for making modifications to it. “Object code” means any non-source + form of a work.

+ +

A “Standard Interface” means an interface that either is an official + standard defined by a recognized standards body, or, in the case of + interfaces specified for a particular programming language, one that + is widely used among developers working in that language.

+ +

The “System Libraries” of an executable work include anything, other + than the work as a whole, that (a) is included in the normal form of + packaging a Major Component, but which is not part of that Major + Component, and (b) serves only to enable use of the work with that + Major Component, or to implement a Standard Interface for which an + implementation is available to the public in source code form. A + “Major Component”, in this context, means a major essential component + (kernel, window system, and so on) of the specific operating system + (if any) on which the executable work runs, or a compiler used to + produce the work, or an object code interpreter used to run it.

+ +

The “Corresponding Source” for a work in object code form means all + the source code needed to generate, install, and (for an executable + work) run the object code and to modify the work, including scripts to + control those activities. However, it does not include the work’s + System Libraries, or general-purpose tools or generally available free + programs which are used unmodified in performing those activities but + which are not part of the work. For example, Corresponding Source + includes interface definition files associated with source files for + the work, and the source code for shared libraries and dynamically + linked subprograms that the work is specifically designed to require, + such as by intimate data communication or control flow between those + subprograms and other parts of the work.

+ +

The Corresponding Source need not include anything that users + can regenerate automatically from other parts of the Corresponding + Source.

+ +

The Corresponding Source for a work in source code form is that + same work.

+ +

2. Basic Permissions.

+ +

All rights granted under this License are granted for the term of + copyright on the Program, and are irrevocable provided the stated + conditions are met. This License explicitly affirms your unlimited + permission to run the unmodified Program. The output from running a + covered work is covered by this License only if the output, given its + content, constitutes a covered work. This License acknowledges your + rights of fair use or other equivalent, as provided by copyright law.

+ +

You may make, run and propagate covered works that you do not + convey, without conditions so long as your license otherwise remains + in force. You may convey covered works to others for the sole purpose + of having them make modifications exclusively for you, or provide you + with facilities for running those works, provided that you comply with + the terms of this License in conveying all material for which you do + not control copyright. Those thus making or running the covered works + for you must do so exclusively on your behalf, under your direction + and control, on terms that prohibit them from making any copies of + your copyrighted material outside their relationship with you.

+ +

Conveying under any other circumstances is permitted solely under + the conditions stated below. Sublicensing is not allowed; section 10 + makes it unnecessary.

+ +

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

+ +

No covered work shall be deemed part of an effective technological + measure under any applicable law fulfilling obligations under article + 11 of the WIPO copyright treaty adopted on 20 December 1996, or + similar laws prohibiting or restricting circumvention of such + measures.

+ +

When you convey a covered work, you waive any legal power to forbid + circumvention of technological measures to the extent such circumvention + is effected by exercising rights under this License with respect to + the covered work, and you disclaim any intention to limit operation or + modification of the work as a means of enforcing, against the work’s + users, your or third parties’ legal rights to forbid circumvention of + technological measures.

+ +

4. Conveying Verbatim Copies.

+ +

You may convey verbatim copies of the Program’s source code as you + receive it, in any medium, provided that you conspicuously and + appropriately publish on each copy an appropriate copyright notice; + keep intact all notices stating that this License and any + non-permissive terms added in accord with section 7 apply to the code; + keep intact all notices of the absence of any warranty; and give all + recipients a copy of this License along with the Program.

+ +

You may charge any price or no price for each copy that you convey, + and you may offer support or warranty protection for a fee.

+ +

5. Conveying Modified Source Versions.

+ +

You may convey a work based on the Program, or the modifications to + produce it from the Program, in the form of source code under the + terms of section 4, provided that you also meet all of these conditions:

+ +
    +
  • a) The work must carry prominent notices stating that you modified + it, and giving a relevant date.
  • + +
  • b) The work must carry prominent notices stating that it is + released under this License and any conditions added under section + 7. This requirement modifies the requirement in section 4 to + “keep intact all notices”.
  • + +
  • c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it.
  • + +
  • d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so.
  • +
+ +

A compilation of a covered work with other separate and independent + works, which are not by their nature extensions of the covered work, + and which are not combined with it such as to form a larger program, + in or on a volume of a storage or distribution medium, is called an + “aggregate” if the compilation and its resulting copyright are not + used to limit the access or legal rights of the compilation’s users + beyond what the individual works permit. Inclusion of a covered work + in an aggregate does not cause this License to apply to the other + parts of the aggregate.

+ +

6. Conveying Non-Source Forms.

+ +

You may convey a covered work in object code form under the terms + of sections 4 and 5, provided that you also convey the + machine-readable Corresponding Source under the terms of this License, + in one of these ways:

+ +
    +
  • a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange.
  • + +
  • b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the + Corresponding Source from a network server at no charge.
  • + +
  • c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b.
  • + +
  • d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements.
  • + +
  • e) Convey the object code using peer-to-peer transmission, provided + you inform other peers where the object code and Corresponding + Source of the work are being offered to the general public at no + charge under subsection 6d.
  • +
+ +

A separable portion of the object code, whose source code is excluded + from the Corresponding Source as a System Library, need not be + included in conveying the object code work.

+ +

A “User Product” is either (1) a “consumer product”, which means any + tangible personal property which is normally used for personal, family, + or household purposes, or (2) anything designed or sold for incorporation + into a dwelling. In determining whether a product is a consumer product, + doubtful cases shall be resolved in favor of coverage. For a particular + product received by a particular user, “normally used” refers to a + typical or common use of that class of product, regardless of the status + of the particular user or of the way in which the particular user + actually uses, or expects or is expected to use, the product. A product + is a consumer product regardless of whether the product has substantial + commercial, industrial or non-consumer uses, unless such uses represent + the only significant mode of use of the product.

+ +

“Installation Information” for a User Product means any methods, + procedures, authorization keys, or other information required to install + and execute modified versions of a covered work in that User Product from + a modified version of its Corresponding Source. The information must + suffice to ensure that the continued functioning of the modified object + code is in no case prevented or interfered with solely because + modification has been made.

+ +

If you convey an object code work under this section in, or with, or + specifically for use in, a User Product, and the conveying occurs as + part of a transaction in which the right of possession and use of the + User Product is transferred to the recipient in perpetuity or for a + fixed term (regardless of how the transaction is characterized), the + Corresponding Source conveyed under this section must be accompanied + by the Installation Information. But this requirement does not apply + if neither you nor any third party retains the ability to install + modified object code on the User Product (for example, the work has + been installed in ROM).

+ +

The requirement to provide Installation Information does not include a + requirement to continue to provide support service, warranty, or updates + for a work that has been modified or installed by the recipient, or for + the User Product in which it has been modified or installed. Access to a + network may be denied when the modification itself materially and + adversely affects the operation of the network or violates the rules and + protocols for communication across the network.

+ +

Corresponding Source conveyed, and Installation Information provided, + in accord with this section must be in a format that is publicly + documented (and with an implementation available to the public in + source code form), and must require no special password or key for + unpacking, reading or copying.

+ +

7. Additional Terms.

+ +

“Additional permissions” are terms that supplement the terms of this + License by making exceptions from one or more of its conditions. + Additional permissions that are applicable to the entire Program shall + be treated as though they were included in this License, to the extent + that they are valid under applicable law. If additional permissions + apply only to part of the Program, that part may be used separately + under those permissions, but the entire Program remains governed by + this License without regard to the additional permissions.

+ +

When you convey a copy of a covered work, you may at your option + remove any additional permissions from that copy, or from any part of + it. (Additional permissions may be written to require their own + removal in certain cases when you modify the work.) You may place + additional permissions on material, added by you to a covered work, + for which you have or can give appropriate copyright permission.

+ +

Notwithstanding any other provision of this License, for material you + add to a covered work, you may (if authorized by the copyright holders of + that material) supplement the terms of this License with terms:

+ +
    +
  • a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or
  • + +
  • b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or
  • + +
  • c) Prohibiting misrepresentation of the origin of that material, or + requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or
  • + +
  • d) Limiting the use for publicity purposes of names of licensors or + authors of the material; or
  • + +
  • e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or
  • + +
  • f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions of + it) with contractual assumptions of liability to the recipient, for + any liability that these contractual assumptions directly impose on + those licensors and authors.
  • +
+ +

All other non-permissive additional terms are considered “further + restrictions” within the meaning of section 10. If the Program as you + received it, or any part of it, contains a notice stating that it is + governed by this License along with a term that is a further + restriction, you may remove that term. If a license document contains + a further restriction but permits relicensing or conveying under this + License, you may add to a covered work material governed by the terms + of that license document, provided that the further restriction does + not survive such relicensing or conveying.

+ +

If you add terms to a covered work in accord with this section, you + must place, in the relevant source files, a statement of the + additional terms that apply to those files, or a notice indicating + where to find the applicable terms.

+ +

Additional terms, permissive or non-permissive, may be stated in the + form of a separately written license, or stated as exceptions; + the above requirements apply either way.

+ +

8. Termination.

+ +

You may not propagate or modify a covered work except as expressly + provided under this License. Any attempt otherwise to propagate or + modify it is void, and will automatically terminate your rights under + this License (including any patent licenses granted under the third + paragraph of section 11).

+ +

However, if you cease all violation of this License, then your + license from a particular copyright holder is reinstated (a) + provisionally, unless and until the copyright holder explicitly and + finally terminates your license, and (b) permanently, if the copyright + holder fails to notify you of the violation by some reasonable means + prior to 60 days after the cessation.

+ +

Moreover, your license from a particular copyright holder is + reinstated permanently if the copyright holder notifies you of the + violation by some reasonable means, this is the first time you have + received notice of violation of this License (for any work) from that + copyright holder, and you cure the violation prior to 30 days after + your receipt of the notice.

+ +

Termination of your rights under this section does not terminate the + licenses of parties who have received copies or rights from you under + this License. If your rights have been terminated and not permanently + reinstated, you do not qualify to receive new licenses for the same + material under section 10.

+ +

9. Acceptance Not Required for Having Copies.

+ +

You are not required to accept this License in order to receive or + run a copy of the Program. Ancillary propagation of a covered work + occurring solely as a consequence of using peer-to-peer transmission + to receive a copy likewise does not require acceptance. However, + nothing other than this License grants you permission to propagate or + modify any covered work. These actions infringe copyright if you do + not accept this License. Therefore, by modifying or propagating a + covered work, you indicate your acceptance of this License to do so.

+ +

10. Automatic Licensing of Downstream Recipients.

+ +

Each time you convey a covered work, the recipient automatically + receives a license from the original licensors, to run, modify and + propagate that work, subject to this License. You are not responsible + for enforcing compliance by third parties with this License.

+ +

An “entity transaction” is a transaction transferring control of an + organization, or substantially all assets of one, or subdividing an + organization, or merging organizations. If propagation of a covered + work results from an entity transaction, each party to that + transaction who receives a copy of the work also receives whatever + licenses to the work the party’s predecessor in interest had or could + give under the previous paragraph, plus a right to possession of the + Corresponding Source of the work from the predecessor in interest, if + the predecessor has it or can get it with reasonable efforts.

+ +

You may not impose any further restrictions on the exercise of the + rights granted or affirmed under this License. For example, you may + not impose a license fee, royalty, or other charge for exercise of + rights granted under this License, and you may not initiate litigation + (including a cross-claim or counterclaim in a lawsuit) alleging that + any patent claim is infringed by making, using, selling, offering for + sale, or importing the Program or any portion of it.

+ +

11. Patents.

+ +

A “contributor” is a copyright holder who authorizes use under this + License of the Program or a work on which the Program is based. The + work thus licensed is called the contributor’s “contributor version”.

+ +

A contributor’s “essential patent claims” are all patent claims + owned or controlled by the contributor, whether already acquired or + hereafter acquired, that would be infringed by some manner, permitted + by this License, of making, using, or selling its contributor version, + but do not include claims that would be infringed only as a + consequence of further modification of the contributor version. For + purposes of this definition, “control” includes the right to grant + patent sublicenses in a manner consistent with the requirements of + this License.

+ +

Each contributor grants you a non-exclusive, worldwide, royalty-free + patent license under the contributor’s essential patent claims, to + make, use, sell, offer for sale, import and otherwise run, modify and + propagate the contents of its contributor version.

+ +

In the following three paragraphs, a “patent license” is any express + agreement or commitment, however denominated, not to enforce a patent + (such as an express permission to practice a patent or covenant not to + sue for patent infringement). To “grant” such a patent license to a + party means to make such an agreement or commitment not to enforce a + patent against the party.

+ +

If you convey a covered work, knowingly relying on a patent license, + and the Corresponding Source of the work is not available for anyone + to copy, free of charge and under the terms of this License, through a + publicly available network server or other readily accessible means, + then you must either (1) cause the Corresponding Source to be so + available, or (2) arrange to deprive yourself of the benefit of the + patent license for this particular work, or (3) arrange, in a manner + consistent with the requirements of this License, to extend the patent + license to downstream recipients. “Knowingly relying” means you have + actual knowledge that, but for the patent license, your conveying the + covered work in a country, or your recipient’s use of the covered work + in a country, would infringe one or more identifiable patents in that + country that you have reason to believe are valid.

+ +

If, pursuant to or in connection with a single transaction or + arrangement, you convey, or propagate by procuring conveyance of, a + covered work, and grant a patent license to some of the parties + receiving the covered work authorizing them to use, propagate, modify + or convey a specific copy of the covered work, then the patent license + you grant is automatically extended to all recipients of the covered + work and works based on it.

+ +

A patent license is “discriminatory” if it does not include within + the scope of its coverage, prohibits the exercise of, or is + conditioned on the non-exercise of one or more of the rights that are + specifically granted under this License. You may not convey a covered + work if you are a party to an arrangement with a third party that is + in the business of distributing software, under which you make payment + to the third party based on the extent of your activity of conveying + the work, and under which the third party grants, to any of the + parties who would receive the covered work from you, a discriminatory + patent license (a) in connection with copies of the covered work + conveyed by you (or copies made from those copies), or (b) primarily + for and in connection with specific products or compilations that + contain the covered work, unless you entered into that arrangement, + or that patent license was granted, prior to 28 March 2007.

+ +

Nothing in this License shall be construed as excluding or limiting + any implied license or other defenses to infringement that may + otherwise be available to you under applicable patent law.

+ +

12. No Surrender of Others’ Freedom.

+ +

If conditions are imposed on you (whether by court order, agreement or + otherwise) that contradict the conditions of this License, they do not + excuse you from the conditions of this License. If you cannot convey a + covered work so as to satisfy simultaneously your obligations under this + License and any other pertinent obligations, then as a consequence you may + not convey it at all. For example, if you agree to terms that obligate you + to collect a royalty for further conveying from those to whom you convey + the Program, the only way you could satisfy both those terms and this + License would be to refrain entirely from conveying the Program.

+ +

13. Use with the GNU Affero General Public License.

+ +

Notwithstanding any other provision of this License, you have + permission to link or combine any covered work with a work licensed + under version 3 of the GNU Affero General Public License into a single + combined work, and to convey the resulting work. The terms of this + License will continue to apply to the part which is the covered work, + but the special requirements of the GNU Affero General Public License, + section 13, concerning interaction through a network will apply to the + combination as such.

+ +

14. Revised Versions of this License.

+ +

The Free Software Foundation may publish revised and/or new versions of + the GNU General Public License from time to time. Such new versions will + be similar in spirit to the present version, but may differ in detail to + address new problems or concerns.

+ +

Each version is given a distinguishing version number. If the + Program specifies that a certain numbered version of the GNU General + Public License “or any later version” applies to it, you have the + option of following the terms and conditions either of that numbered + version or of any later version published by the Free Software + Foundation. If the Program does not specify a version number of the + GNU General Public License, you may choose any version ever published + by the Free Software Foundation.

+ +

If the Program specifies that a proxy can decide which future + versions of the GNU General Public License can be used, that proxy’s + public statement of acceptance of a version permanently authorizes you + to choose that version for the Program.

+ +

Later license versions may give you additional or different + permissions. However, no additional obligations are imposed on any + author or copyright holder as a result of your choosing to follow a + later version.

+ +

15. Disclaimer of Warranty.

+ +

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY + APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT + HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY + OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, + THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM + IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF + ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

+ +

16. Limitation of Liability.

+ +

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING + WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS + THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY + GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE + USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF + DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD + PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), + EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF + SUCH DAMAGES.

+ +

17. Interpretation of Sections 15 and 16.

+ +

If the disclaimer of warranty and limitation of liability provided + above cannot be given local legal effect according to their terms, + reviewing courts shall apply local law that most closely approximates + an absolute waiver of all civil liability in connection with the + Program, unless a warranty or assumption of liability accompanies a + copy of the Program in return for a fee.

+ +

END OF TERMS AND CONDITIONS

+ +

How to Apply These Terms to Your New Programs

+ +

If you develop a new program, and you want it to be of the greatest + possible use to the public, the best way to achieve this is to make it + free software which everyone can redistribute and change under these terms.

+ +

To do so, attach the following notices to the program. It is safest + to attach them to the start of each source file to most effectively + state the exclusion of warranty; and each file should have at least + the “copyright” line and a pointer to where the full notice is found.

+ +
<one line to give the program’s name
+and a brief idea of what it does.>
+Copyright (C) <year>  <name of author>
+
+This program is free software: you can
+redistribute it and/or modify
+it under the terms of the GNU General
+Public License as published by the Free
+Software Foundation, either version 3
+of the License, or(at your option)
+any later version.
+
+This program is distributed in the hope
+that it will be useful, but WITHOUT ANY
+WARRANTY; without even the implied
+warranty of MERCHANTABILITY or FITNESS
+FOR A PARTICULAR PURPOSE.  See the GNU
+General Public License for more details.
+
+You should have received a copy of the
+GNU General Public License along with
+this program.  If not, see
+<http://www.gnu.org/licenses/>.
+ +

Also add information on how to contact you by electronic and paper mail.

+ +

If the program does terminal interaction, make it output a short + notice like this when it starts in an interactive mode:

+ +
<program>  Copyright (C) <year>
+<name of author>
+This program comes with ABSOLUTELY NO
+WARRANTY; for details type `show w'.
+This is free software, and you are
+welcome to redistribute it under
+certain conditions; type `show c'
+for details.
+ +

The hypothetical commands `show w' and `show c' should show the appropriate + parts of the General Public License. Of course, your program’s commands + might be different; for a GUI interface, you would use an “about box”.

+ +

You should also get your employer (if you work as a programmer) or school, + if any, to sign a “copyright disclaimer” for the program, if necessary. + For more information on this, and how to apply and follow the GNU GPL, see + <http://www.gnu.org/licenses/>.

+ +

The GNU General Public License does not permit incorporating your program + into proprietary programs. If your program is a subroutine library, you + may consider it more useful to permit linking proprietary applications with + the library. If this is what you want to do, use the GNU Lesser General + Public License instead of this License. But first, please read + <http://www.gnu.org/philosophy/why-not-lgpl.html>.

+ +
+ +

Apache License

+

Version 2.0, January 2004

+

http://www.apache.org/licenses/

+ +

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

+ +

1. Definitions.

+ +

“License” shall mean the terms and conditions for use, reproduction, and + distribution as defined by Sections 1 through 9 of this document.

+ +

“Licensor” shall mean the copyright owner or entity authorized by the + copyright owner that is granting the License.

+ +

“Legal Entity” shall mean the union of the acting entity and all other + entities that control, are controlled by, or are under common control with + that entity. For the purposes of this definition, “control” means (i) the + power, direct or indirect, to cause the direction or management of such + entity, whether by contract or otherwise, or (ii) ownership of fifty + percent (50%) or more of the outstanding shares, or (iii) beneficial + ownership of such entity.

+ +

“You” (or “Your”) shall mean an individual or Legal Entity exercising + permissions granted by this License.

+ +

“Source” form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation source, + and configuration files.

+ +

“Object” form shall mean any form resulting from mechanical transformation + or translation of a Source form, including but not limited to compiled + object code, generated documentation, and conversions to other media types.

+ +

“Work” shall mean the work of authorship, whether in Source or Object form, + made available under the License, as indicated by a copyright notice that + is included in or attached to the work (an example is provided in the + Appendix below).

+ +

“Derivative Works” shall mean any work, whether in Source or Object form, + that is based on (or derived from) the Work and for which the editorial + revisions, annotations, elaborations, or other modifications represent, as + a whole, an original work of authorship. For the purposes of this License, + Derivative Works shall not include works that remain separable from, or + merely link (or bind by name) to the interfaces of, the Work and Derivative + Works thereof.

+ +

“Contribution” shall mean any work of authorship, including the original + version of the Work and any modifications or additions to that Work or + Derivative Works thereof, that is intentionally submitted to Licensor for + inclusion in the Work by the copyright owner or by an individual or Legal + Entity authorized to submit on behalf of the copyright owner. For the + purposes of this definition, “submitted” means any form of electronic, + verbal, or written communication sent to the Licensor or its + representatives, including but not limited to communication on electronic + mailing lists, source code control systems, and issue tracking systems that + are managed by, or on behalf of, the Licensor for the purpose of discussing + and improving the Work, but excluding communication that is conspicuously + marked or otherwise designated in writing by the copyright owner as “Not a + Contribution.”

+ +

“Contributor” shall mean Licensor and any individual or Legal Entity on + behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work.

+ +

2. Grant of Copyright License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby + grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, + irrevocable copyright license to reproduce, prepare Derivative Works of, publicly + display, publicly perform, sublicense, and distribute the Work and such + Derivative Works in Source or Object form.

+ +

3. Grant of Patent License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby grants + to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, use, + offer to sell, sell, import, and otherwise transfer the Work, where such + license applies only to those patent claims licensable by such Contributor + that are necessarily infringed by their Contribution(s) alone or by + combination of their Contribution(s) with the Work to which such + Contribution(s) was submitted. If You institute patent litigation against + any entity (including a cross-claim or counterclaim in a lawsuit) alleging + that the Work or a Contribution incorporated within the Work constitutes + direct or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate as of the + date such litigation is filed.

+ +

4. Redistribution.

+ +

You may reproduce and distribute copies of the Work or Derivative Works thereof + in any medium, with or without modifications, and in Source or Object form, provided + that You meet the following conditions:

+ +
    +
  1. You must give any other recipients of the Work or Derivative Works a + copy of this License; and
  2. + +
  3. You must cause any modified files to carry prominent notices stating + that You changed the files; and
  4. + +
  5. You must retain, in the Source form of any Derivative Works that You + distribute, all copyright, patent, trademark, and attribution notices from + the Source form of the Work, excluding those notices that do not pertain to + any part of the Derivative Works; and
  6. + +
  7. If the Work includes a “NOTICE” text file as part of its distribution, + then any Derivative Works that You distribute must include a readable copy + of the attribution notices contained within such NOTICE file, excluding + those notices that do not pertain to any part of the Derivative Works, in + at least one of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or documentation, + if provided along with the Derivative Works; or, within a display generated + by the Derivative Works, if and wherever such third-party notices normally + appear. The contents of the NOTICE file are for informational purposes only + and do not modify the License. You may add Your own attribution notices + within Derivative Works that You distribute, alongside or as an addendum to + the NOTICE text from the Work, provided that such additional attribution + notices cannot be construed as modifying the License. +
    +
    + You may add Your own copyright statement to Your modifications and may + provide additional or different license terms and conditions for use, + reproduction, or distribution of Your modifications, or for any such + Derivative Works as a whole, provided Your use, reproduction, and + distribution of the Work otherwise complies with the conditions stated in + this License.
  8. +
+ +

5. Submission of Contributions.

+ +

Unless You explicitly state otherwise, any Contribution intentionally submitted for + inclusion in the Work by You to the Licensor shall be under the terms and + conditions of this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify the + terms of any separate license agreement you may have executed with Licensor + regarding such Contributions.

+ +

6. Trademarks.

+ +

This License does not grant permission to use the trade names, trademarks, service marks, + or product names of the Licensor, except as required for reasonable and customary use + in describing the origin of the Work and reproducing the content of the + NOTICE file.

+ +

7. Disclaimer of Warranty.

+ +

Unless required by applicable law or agreed to in writing, Licensor provides the Work + (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT + WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, + without limitation, any warranties or conditions of TITLE, + NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You + are solely responsible for determining the appropriateness of using or + redistributing the Work and assume any risks associated with Your exercise + of permissions under this License.

+ +

8. Limitation of Liability.

+ +

In no event and under no legal theory, whether in tort (including negligence), contract, + or otherwise, unless required by applicable law (such as deliberate and + grossly negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a result + of this License or out of the use or inability to use the Work (including + but not limited to damages for loss of goodwill, work stoppage, computer + failure or malfunction, or any and all other commercial damages or losses), + even if such Contributor has been advised of the possibility of such + damages.

+ +

9. Accepting Warranty or Additional Liability.

+ +

While redistributing the Work or Derivative Works thereof, You may choose + to offer, and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this License. + However, in accepting such obligations, You may act only on Your own behalf + and on Your sole responsibility, not on behalf of any other Contributor, + and only if You agree to indemnify, defend, and hold each Contributor + harmless for any liability incurred by, or claims asserted against, such + Contributor by reason of your accepting any such warranty or additional + liability.

+ +

END OF TERMS AND CONDITIONS

+ +

APPENDIX: How to apply the Apache License to your work

+ +

To apply the Apache License to your work, attach the following boilerplate + notice, with the fields enclosed by brackets “[]” replaced with your own + identifying information. (Don’t include the brackets!) The text should be + enclosed in the appropriate comment syntax for the file format. We also + recommend that a file or class name and description of purpose be included + on the same “printed page” as the copyright notice for easier + identification within third-party archives.

+
Copyright [yyyy] [name of copyright owner]
+
+Licensed under the Apache License,
+Version 2.0 (the “License”);
+you may not use this file except
+in compliance with the License.
+You may obtain a copy of the License at
+
+http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law
+or agreed to in writing, software
+distributed under the License is
+distributed on an “AS IS” BASIS,
+WITHOUT WARRANTIES OR CONDITIONS
+OF ANY KIND, either express or implied.
+See the License for the specific
+language governing permissions and
+limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/fr/about_licenses_dark.html b/app/src/main/assets/fr/about_licenses_dark.html deleted file mode 100644 index 1a5e86f1..00000000 --- a/app/src/main/assets/fr/about_licenses_dark.html +++ /dev/null @@ -1,1071 +0,0 @@ - - - - - - - - - - -

Copyright

-

Privacy Browser copyright © 2015-2020 Soren Stoutner.

- -

Licence

-

rivacy Browser est publié sous la licence GPLv3+. Le texte complet de la licence est ci-dessous. - Le code source est disponible à partir de git.stoutner.com.

- -

Listes de blocage

-

EasyList et EasyPrivacy - sont licences doubles GPLv3+ - et Creative Commons Attribution-ShareAlike 3.0+ Unported. - Privacy Browser les intègre à l'aide de l'option GPLv3+.

- -

Fanboy’s Annoyance List et Fanboy’s Social Blocking List - sont publiés sous la licence Creative Commons Attribution 3.0 Unported license, - qui est compatible avec la GPLv3+. Les listes ne sont pas modifiées dans Privacy Browser.

- -

Pour plus d'informations sur les listes de blocage, consultez le site web EasyList.

- -

Librairies

-

Privacy Browser est construit avec les librairies AndroidX, - les librairies Kotlin, - et le code du référentiel Google Material Maven, - publiés sous la Licence Apache 2.0.

- -

La version gratuite de Privacy Browser repose sur les Annonces Firebase, - publié sous la licence du kit de développement logiciel Android.

- -

Classes

-

com.stoutner.privacybrowser.views.CheckedLinearLayout est une version modifiée d'une classe contenue dans le code source de la - Caméra Android. - Le fichier d'origine a été publié sous la Licence Apache 2.0. - Le fichier modifié est publié sous la licence GPLv3+.

- -

Icônes

-

- sont dérivés de security et de language, - qui font partie de l'ensemble d'icônes Matériel Android - et sont publiés sous la Licence Apache 2.0. - Le texte complet de la licence est ci-dessous. Modifications copyright © 2016 Soren Stoutner. - Les images résultantes sont publiées sous la licence GPLv3+.

-

est dérivé des éléments folder et exit_to_app, - qui font partie de l'ensemble d'icônes Matériel Android - et sont publiés sous Licence Apache 2.0. - Modifications copyright © 2017 Soren Stoutner. - L'image résultante est publiée sous la licence GPLv3+.

-

est dérivé des éléments bookmark et create_new_folder, qui font partie de - l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. - Modifications copyright © 2017 Soren Stoutner. - L'image résultante est publiée sous la licence GPLv3+.

-

est dérivée de l'élément create_new_folder, - qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. - Modifications copyright © 2017 Soren Stoutner. - L'image résultante est publiée sous la licence GPLv3+.

-

est dérivée de l'élément exit_to_app, qui fait partie de - l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. - Modifications copyright © 2017 Soren Stoutner. - L'image résultante est publiée sous la licence GPLv3+.

-

est dérivée de l'élément compare, - qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. - Modifications copyright © 2017 Soren Stoutner. - L'image résultante est publiée sous la licence GPLv3+.

-

est dérivée de l'élément sort, - qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. - Modifications copyright © 2019 Soren Stoutner. - L'image résultante est publiée sous la licence GPLv3+.

-

cookie a été créé par Google. - Il est publié sous la Licence Apache 2.0 - et peut être téléchargé à partir des Icônes Material Design. - Il est inchangé sauf pour les informations de mise en page telles que la couleur et la taille.

-

Les icônes suivantes proviennent de l'ensemble d'icônes Matériel Android, - qui est publié sous la Licence Apache 2.0. - Ils sont inchangés sauf pour les informations de mise en page comme la couleur et la taille. Certains d'entre eux ont été renommés pour correspondre à leur utilisation dans le code. - Les icônes et les noms d'origine sont indiqués ci-dessous.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

- -
- -

GNU General Public License

-

Version 3, 29 June 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.

- -

Preamble

- -

The GNU General Public License is a free, copyleft license for - software and other kinds of works.

- -

The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a program—to make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.

- -

When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.

- -

To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.

- -

For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.

- -

Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.

- -

For the developers’ and authors’ protection, the GPL clearly explains - that there is no warranty for this free software. For both users’ and - authors’ sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.

- -

Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting users’ freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.

- -

Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.

- -

The precise terms and conditions for copying, distribution and - modification follow.

- -

TERMS AND CONDITIONS

- -

0. Definitions.

- -

“This License” refers to version 3 of the GNU General Public License.

- -

“Copyright” also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.

- -

“The Program” refers to any copyrightable work licensed under this - License. Each licensee is addressed as “you”. “Licensees” and - “recipients” may be individuals or organizations.

- -

To “modify” a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a “modified version” of the - earlier work or a work “based on” the earlier work.

- -

A “covered work” means either the unmodified Program or a work based - on the Program.

- -

To “propagate” a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.

- -

To “convey” a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.

- -

An interactive user interface displays “Appropriate Legal Notices” - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.

- -

1. Source Code.

- -

The “source code” for a work means the preferred form of the work - for making modifications to it. “Object code” means any non-source - form of a work.

- -

A “Standard Interface” means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.

- -

The “System Libraries” of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - “Major Component”, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.

- -

The “Corresponding Source” for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the work’s - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.

- -

The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.

- -

The Corresponding Source for a work in source code form is that - same work.

- -

2. Basic Permissions.

- -

All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.

- -

You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.

- -

Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.

- -

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

- -

No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.

- -

When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the work’s - users, your or third parties’ legal rights to forbid circumvention of - technological measures.

- -

4. Conveying Verbatim Copies.

- -

You may convey verbatim copies of the Program’s source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.

- -

You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.

- -

5. Conveying Modified Source Versions.

- -

You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:

- -
    -
  • a) The work must carry prominent notices stating that you modified - it, and giving a relevant date.
  • - -
  • b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - “keep intact all notices”.
  • - -
  • c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it.
  • - -
  • d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so.
  • -
- -

A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - “aggregate” if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilation’s users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.

- -

6. Conveying Non-Source Forms.

- -

You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:

- -
    -
  • a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange.
  • - -
  • b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge.
  • - -
  • c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b.
  • - -
  • d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements.
  • - -
  • e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d.
  • -
- -

A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.

- -

A “User Product” is either (1) a “consumer product”, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, “normally used” refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.

- -

“Installation Information” for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.

- -

If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).

- -

The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.

- -

Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.

- -

7. Additional Terms.

- -

“Additional permissions” are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.

- -

When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.

- -

Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:

- -
    -
  • a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or
  • - -
  • b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or
  • - -
  • c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or
  • - -
  • d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or
  • - -
  • e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or
  • - -
  • f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors.
  • -
- -

All other non-permissive additional terms are considered “further - restrictions” within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.

- -

If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.

- -

Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.

- -

8. Termination.

- -

You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).

- -

However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.

- -

Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.

- -

Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.

- -

9. Acceptance Not Required for Having Copies.

- -

You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.

- -

10. Automatic Licensing of Downstream Recipients.

- -

Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.

- -

An “entity transaction” is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the party’s predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.

- -

You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.

- -

11. Patents.

- -

A “contributor” is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributor’s “contributor version”.

- -

A contributor’s “essential patent claims” are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, “control” includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.

- -

Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributor’s essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.

- -

In the following three paragraphs, a “patent license” is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To “grant” such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.

- -

If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. “Knowingly relying” means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipient’s use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.

- -

If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.

- -

A patent license is “discriminatory” if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.

- -

Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.

- -

12. No Surrender of Others’ Freedom.

- -

If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.

- -

13. Use with the GNU Affero General Public License.

- -

Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.

- -

14. Revised Versions of this License.

- -

The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.

- -

Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License “or any later version” applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.

- -

If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxy’s - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.

- -

Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.

- -

15. Disclaimer of Warranty.

- -

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

- -

16. Limitation of Liability.

- -

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.

- -

17. Interpretation of Sections 15 and 16.

- -

If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.

- -

END OF TERMS AND CONDITIONS

- -

How to Apply These Terms to Your New Programs

- -

If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.

- -

To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the “copyright” line and a pointer to where the full notice is found.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Also add information on how to contact you by electronic and paper mail.

- -

If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your program’s commands - might be different; for a GUI interface, you would use an “about box”.

- -

You should also get your employer (if you work as a programmer) or school, - if any, to sign a “copyright disclaimer” for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.

- -

The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/fr/about_licenses_light.html b/app/src/main/assets/fr/about_licenses_light.html deleted file mode 100644 index 84b7d9d5..00000000 --- a/app/src/main/assets/fr/about_licenses_light.html +++ /dev/null @@ -1,1071 +0,0 @@ - - - - - - - - - - -

Copyright

-

Privacy Browser copyright © 2015-2020 Soren Stoutner.

- -

Licence

-

rivacy Browser est publié sous la licence GPLv3+. Le texte complet de la licence est ci-dessous. - Le code source est disponible à partir de git.stoutner.com.

- -

Listes de blocage

-

EasyList et EasyPrivacy - sont licences doubles GPLv3+ - et Creative Commons Attribution-ShareAlike 3.0+ Unported. - Privacy Browser les intègre à l'aide de l'option GPLv3+.

- -

Fanboy’s Annoyance List et Fanboy’s Social Blocking List - sont publiés sous la licence Creative Commons Attribution 3.0 Unported license, - qui est compatible avec la GPLv3+. Les listes ne sont pas modifiées dans Privacy Browser.

- -

Pour plus d'informations sur les listes de blocage, consultez le site web EasyList.

- -

Librairies

-

Privacy Browser est construit avec les librairies AndroidX, - les librairies Kotlin, - et le code du référentiel Google Material Maven, - publiés sous la Licence Apache 2.0.

- -

La version gratuite de Privacy Browser repose sur les Annonces Firebase, - publié sous la licence du kit de développement logiciel Android.

- -

Classes

-

com.stoutner.privacybrowser.views.CheckedLinearLayout est une version modifiée d'une classe contenue dans le code source de la - Caméra Android. - Le fichier d'origine a été publié sous la Licence Apache 2.0. - Le fichier modifié est publié sous la licence GPLv3+.

- -

Icônes

-

- sont dérivés de security et de language, - qui font partie de l'ensemble d'icônes Matériel Android - et sont publiés sous la Licence Apache 2.0. - Le texte complet de la licence est ci-dessous. Modifications copyright © 2016 Soren Stoutner. - Les images résultantes sont publiées sous la licence GPLv3+.

-

est dérivé des éléments folder et exit_to_app, - qui font partie de l'ensemble d'icônes Matériel Android - et sont publiés sous Licence Apache 2.0. - Modifications copyright © 2017 Soren Stoutner. - L'image résultante est publiée sous la licence GPLv3+.

-

est dérivé des éléments bookmark et create_new_folder, qui font partie de - l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. - Modifications copyright © 2017 Soren Stoutner. - L'image résultante est publiée sous la licence GPLv3+.

-

est dérivée de l'élément create_new_folder, - qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. - Modifications copyright © 2017 Soren Stoutner. - L'image résultante est publiée sous la licence GPLv3+.

-

est dérivée de l'élément exit_to_app, qui fait partie de - l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. - Modifications copyright © 2017 Soren Stoutner. - L'image résultante est publiée sous la licence GPLv3+.

-

est dérivée de l'élément compare, - qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. - Modifications copyright © 2017 Soren Stoutner. - L'image résultante est publiée sous la licence GPLv3+.

-

est dérivée de l'élément sort, - qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0. - Modifications copyright © 2019 Soren Stoutner. - L'image résultante est publiée sous la licence GPLv3+.

-

cookie a été créé par Google. - Il est publié sous la Licence Apache 2.0 - et peut être téléchargé à partir des Icônes Material Design. - Il est inchangé sauf pour les informations de mise en page telles que la couleur et la taille.

-

Les icônes suivantes proviennent de l'ensemble d'icônes Matériel Android, - qui est publié sous la Licence Apache 2.0. - Ils sont inchangés sauf pour les informations de mise en page comme la couleur et la taille. Certains d'entre eux ont été renommés pour correspondre à leur utilisation dans le code. - Les icônes et les noms d'origine sont indiqués ci-dessous.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

- -
- -

GNU General Public License

-

Version 3, 29 June 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.

- -

Preamble

- -

The GNU General Public License is a free, copyleft license for - software and other kinds of works.

- -

The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a program—to make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.

- -

When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.

- -

To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.

- -

For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.

- -

Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.

- -

For the developers’ and authors’ protection, the GPL clearly explains - that there is no warranty for this free software. For both users’ and - authors’ sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.

- -

Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting users’ freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.

- -

Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.

- -

The precise terms and conditions for copying, distribution and - modification follow.

- -

TERMS AND CONDITIONS

- -

0. Definitions.

- -

“This License” refers to version 3 of the GNU General Public License.

- -

“Copyright” also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.

- -

“The Program” refers to any copyrightable work licensed under this - License. Each licensee is addressed as “you”. “Licensees” and - “recipients” may be individuals or organizations.

- -

To “modify” a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a “modified version” of the - earlier work or a work “based on” the earlier work.

- -

A “covered work” means either the unmodified Program or a work based - on the Program.

- -

To “propagate” a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.

- -

To “convey” a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.

- -

An interactive user interface displays “Appropriate Legal Notices” - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.

- -

1. Source Code.

- -

The “source code” for a work means the preferred form of the work - for making modifications to it. “Object code” means any non-source - form of a work.

- -

A “Standard Interface” means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.

- -

The “System Libraries” of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - “Major Component”, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.

- -

The “Corresponding Source” for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the work’s - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.

- -

The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.

- -

The Corresponding Source for a work in source code form is that - same work.

- -

2. Basic Permissions.

- -

All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.

- -

You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.

- -

Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.

- -

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

- -

No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.

- -

When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the work’s - users, your or third parties’ legal rights to forbid circumvention of - technological measures.

- -

4. Conveying Verbatim Copies.

- -

You may convey verbatim copies of the Program’s source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.

- -

You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.

- -

5. Conveying Modified Source Versions.

- -

You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:

- -
    -
  • a) The work must carry prominent notices stating that you modified - it, and giving a relevant date.
  • - -
  • b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - “keep intact all notices”.
  • - -
  • c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it.
  • - -
  • d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so.
  • -
- -

A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - “aggregate” if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilation’s users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.

- -

6. Conveying Non-Source Forms.

- -

You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:

- -
    -
  • a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange.
  • - -
  • b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge.
  • - -
  • c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b.
  • - -
  • d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements.
  • - -
  • e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d.
  • -
- -

A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.

- -

A “User Product” is either (1) a “consumer product”, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, “normally used” refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.

- -

“Installation Information” for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.

- -

If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).

- -

The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.

- -

Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.

- -

7. Additional Terms.

- -

“Additional permissions” are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.

- -

When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.

- -

Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:

- -
    -
  • a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or
  • - -
  • b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or
  • - -
  • c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or
  • - -
  • d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or
  • - -
  • e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or
  • - -
  • f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors.
  • -
- -

All other non-permissive additional terms are considered “further - restrictions” within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.

- -

If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.

- -

Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.

- -

8. Termination.

- -

You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).

- -

However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.

- -

Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.

- -

Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.

- -

9. Acceptance Not Required for Having Copies.

- -

You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.

- -

10. Automatic Licensing of Downstream Recipients.

- -

Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.

- -

An “entity transaction” is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the party’s predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.

- -

You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.

- -

11. Patents.

- -

A “contributor” is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributor’s “contributor version”.

- -

A contributor’s “essential patent claims” are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, “control” includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.

- -

Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributor’s essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.

- -

In the following three paragraphs, a “patent license” is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To “grant” such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.

- -

If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. “Knowingly relying” means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipient’s use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.

- -

If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.

- -

A patent license is “discriminatory” if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.

- -

Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.

- -

12. No Surrender of Others’ Freedom.

- -

If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.

- -

13. Use with the GNU Affero General Public License.

- -

Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.

- -

14. Revised Versions of this License.

- -

The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.

- -

Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License “or any later version” applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.

- -

If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxy’s - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.

- -

Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.

- -

15. Disclaimer of Warranty.

- -

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

- -

16. Limitation of Liability.

- -

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.

- -

17. Interpretation of Sections 15 and 16.

- -

If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.

- -

END OF TERMS AND CONDITIONS

- -

How to Apply These Terms to Your New Programs

- -

If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.

- -

To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the “copyright” line and a pointer to where the full notice is found.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Also add information on how to contact you by electronic and paper mail.

- -

If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your program’s commands - might be different; for a GUI interface, you would use an “about box”.

- -

You should also get your employer (if you work as a programmer) or school, - if any, to sign a “copyright disclaimer” for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.

- -

The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/fr/about_links.html b/app/src/main/assets/fr/about_links.html new file mode 100644 index 00000000..36badec8 --- /dev/null +++ b/app/src/main/assets/fr/about_links.html @@ -0,0 +1,49 @@ + + + + + + + + + + + + + +

Sites Webs

+ +

+ Actualités

+ +

+ Roadmap

+ +

+ Suivi de bogues et demandes de fonctionnalités

+ +

+ Forum

+ +

+ GitWeb

+ + \ No newline at end of file diff --git a/app/src/main/assets/fr/about_links_dark.html b/app/src/main/assets/fr/about_links_dark.html deleted file mode 100644 index 1726ea10..00000000 --- a/app/src/main/assets/fr/about_links_dark.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -

Sites Webs

- -

- Actualités

- -

- Roadmap

- -

- Suivi de bogues et demandes de fonctionnalités

- -

- Forum

- -

- GitWeb

- - diff --git a/app/src/main/assets/fr/about_links_light.html b/app/src/main/assets/fr/about_links_light.html deleted file mode 100644 index 889edd15..00000000 --- a/app/src/main/assets/fr/about_links_light.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -

Sites Webs

- -

- Actualités

- -

- Roadmap

- -

- Suivi de bogues et demandes de fonctionnalités

- -

- Forum

- -

- GitWeb

- - diff --git a/app/src/main/assets/fr/about_permissions.html b/app/src/main/assets/fr/about_permissions.html new file mode 100644 index 00000000..2d69ec2f --- /dev/null +++ b/app/src/main/assets/fr/about_permissions.html @@ -0,0 +1,51 @@ + + + + + + + + + + + + + +

Disposer d'un accès réseau complet

+

android.permission.INTERNET

+

Requis pour que WebView puisse accéder à Internet. Sans cette autorisation, Privacy Browser serait «No Browser: protégez votre vie privée en restant complètement hors d'Internet».

+ +

Installer les raccourcis

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

Requis pour ajouter des raccourcis pour les sites Web au bureau du programme de lancement.

+ +

Lire le stockage

+

android.permission.READ_EXTERNAL_STORAGE

+

Requis pour importer les paramètres des dossiers publics. Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, + Privacy Browser peut importer les paramètres à partir des dossiers de l'application.

+ +

Mémoire d'écriture

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Requis pour exporter les paramètres et télécharger les fichiers dans les dossiers publics. + Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, + Privacy Browser peut exporter les paramètres et stocker les téléchargements dans les dossiers de l'application.

+ + diff --git a/app/src/main/assets/fr/about_permissions_dark.html b/app/src/main/assets/fr/about_permissions_dark.html deleted file mode 100644 index 8a6959c9..00000000 --- a/app/src/main/assets/fr/about_permissions_dark.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - - - - - - - -

Disposer d'un accès réseau complet

-

android.permission.INTERNET

-

Requis pour que WebView puisse accéder à Internet. Sans cette autorisation, Privacy Browser serait «No Browser: protégez votre vie privée en restant complètement hors d'Internet».

- -

Installer les raccourcis

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Requis pour ajouter des raccourcis pour les sites Web au bureau du programme de lancement.

- -

Lire le stockage

-

android.permission.READ_EXTERNAL_STORAGE

-

Requis pour importer les paramètres des dossiers publics. Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, - Privacy Browser peut importer les paramètres à partir des dossiers de l'application.

- -

Mémoire d'écriture

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Requis pour exporter les paramètres et télécharger les fichiers dans les dossiers publics. - Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, - Privacy Browser peut exporter les paramètres et stocker les téléchargements dans les dossiers de l'application.

- - diff --git a/app/src/main/assets/fr/about_permissions_light.html b/app/src/main/assets/fr/about_permissions_light.html deleted file mode 100644 index 8e8959c5..00000000 --- a/app/src/main/assets/fr/about_permissions_light.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - - - - - - - -

Disposer d'un accès réseau complet

-

android.permission.INTERNET

-

Requis pour que WebView puisse accéder à Internet. Sans cette autorisation, Privacy Browser serait «No Browser: protégez votre vie privée en restant complètement hors d'Internet».

- -

Installer les raccourcis

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Requis pour ajouter des raccourcis pour les sites Web au bureau du programme de lancement.

- -

Lire le stockage

-

android.permission.READ_EXTERNAL_STORAGE

-

Requis pour importer les paramètres des dossiers publics. Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, - Privacy Browser peut importer les paramètres à partir des dossiers de l'application.

- -

Mémoire d'écriture

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Requis pour exporter les paramètres et télécharger les fichiers dans les dossiers publics. - Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, - Privacy Browser peut exporter les paramètres et stocker les téléchargements dans les dossiers de l'application.

- - diff --git a/app/src/main/assets/fr/about_privacy_policy.html b/app/src/main/assets/fr/about_privacy_policy.html new file mode 100644 index 00000000..709adc0b --- /dev/null +++ b/app/src/main/assets/fr/about_privacy_policy.html @@ -0,0 +1,95 @@ + + + + + + + + + + + + + +

Privacy Browser

+

Privacy Browser ne collecte aucune information sur l'utilisateur.

+ + +

Google Play

+

Google Play a sa propre règle de confidentialité . + Google fournit aux développeurs des informations d'installation récapitulatives et anonymisées, notamment le nombre d'installations organisées selon les catégories suivantes.

+
    +
  • Version d'Android (ex. Android 7.1)
  • +
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • +
  • Tablettes (ex. Tablettes 10" et plus)
  • +
  • Pays (ex. France)
  • +
  • Langage (ex. Français [Canada])
  • +
  • Version d'Application (ex. 14)
  • +
  • Opérateur (eg. Orange - FR)
  • +
+ + +

Notes Google Play

+

Google Play a sa propre règle de confidentialité . + Google fournit aux développeurs des résumés anonymisés des informations suivantes relatives aux évaluations des utilisateurs.

+
    +
  • Pays (ex. France)
  • +
  • Langage (ex. Français [Canada])
  • +
  • Version d'Application (ex. 14)
  • +
  • Version d'Android (ex. Android 7.1)
  • +
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • +
  • Tablettes (ex. Tablettes 10" et plus)
  • +
+ + +

Avis Google Play

+

Google Play a sa propre règle de confidentialité. + Outre le nom du réviseur, l'évaluation et le texte de la révision (tous disponibles publiquement), Google fournit au développeur tout ou partie des informations suivantes.

+
    +
  • Code de Version (ex. 7)
  • +
  • Nom de Version (ex. 1.6)
  • +
  • Version d'Android (ex. Android 7.1)
  • +
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • +
  • Constructeur (ex. Samsung)
  • +
  • Type de terminal (ex. Phone)
  • +
  • La marque du processeur (ex. Samsung)
  • +
  • Le modèle de processeur (ex. Exynos 7420)
  • +
  • Densité d'affichage (ex. 560 dpi)
  • +
  • Taille d'écran (ex. 2560 x 1440)
  • +
  • RAM (ex. 4096 MB)
  • +
  • Plateforme native (ex. armeabi-v7a,armeabi,arm64v8a)
  • +
  • Version OpenGL ES (ex. 3.1)
  • +
  • Langage du terminal (ex. English)
  • +
+ + +

Communications directes

+

Les utilisateurs peuvent choisir d'envoyer des communications directes à Stoutner, telles que des courriels et des commentaires sur stoutner.com.

+ + +

Utilisation de l'information

+

Stoutner peut utiliser ces informations pour contribuer au développement de Privacy Browser et communiquer le statut du projet aux utilisateurs. + Stoutner ne vendra jamais ces informations ni ne les transférera à des tiers qui les utiliseraient à des fins publicitaires ou marketing.

+ +
+

Revision 1.7, 14 Mai 2019

+ + \ No newline at end of file diff --git a/app/src/main/assets/fr/about_privacy_policy_dark.html b/app/src/main/assets/fr/about_privacy_policy_dark.html deleted file mode 100644 index 11365b6c..00000000 --- a/app/src/main/assets/fr/about_privacy_policy_dark.html +++ /dev/null @@ -1,92 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser ne collecte aucune information sur l'utilisateur.

- - -

Google Play

-

Google Play a sa propre règle de confidentialité . - Google fournit aux développeurs des informations d'installation récapitulatives et anonymisées, notamment le nombre d'installations organisées selon les catégories suivantes.

-
    -
  • Version d'Android (ex. Android 7.1)
  • -
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablettes (ex. Tablettes 10" et plus)
  • -
  • Pays (ex. France)
  • -
  • Langage (ex. Français [Canada])
  • -
  • Version d'Application (ex. 14)
  • -
  • Opérateur (eg. Orange - FR)
  • -
- - -

Notes Google Play

-

Google Play a sa propre règle de confidentialité . - Google fournit aux développeurs des résumés anonymisés des informations suivantes relatives aux évaluations des utilisateurs.

-
    -
  • Pays (ex. France)
  • -
  • Langage (ex. Français [Canada])
  • -
  • Version d'Application (ex. 14)
  • -
  • Version d'Android (ex. Android 7.1)
  • -
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablettes (ex. Tablettes 10" et plus)
  • -
- - -

Avis Google Play

-

Google Play a sa propre règle de confidentialité. - Outre le nom du réviseur, l'évaluation et le texte de la révision (tous disponibles publiquement), Google fournit au développeur tout ou partie des informations suivantes.

-
    -
  • Code de Version (ex. 7)
  • -
  • Nom de Version (ex. 1.6)
  • -
  • Version d'Android (ex. Android 7.1)
  • -
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • -
  • Constructeur (ex. Samsung)
  • -
  • Type de terminal (ex. Phone)
  • -
  • La marque du processeur (ex. Samsung)
  • -
  • Le modèle de processeur (ex. Exynos 7420)
  • -
  • Densité d'affichage (ex. 560 dpi)
  • -
  • Taille d'écran (ex. 2560 x 1440)
  • -
  • RAM (ex. 4096 MB)
  • -
  • Plateforme native (ex. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Version OpenGL ES (ex. 3.1)
  • -
  • Langage du terminal (ex. English)
  • -
- - -

Communications directes

-

Les utilisateurs peuvent choisir d'envoyer des communications directes à Stoutner, telles que des courriels et des commentaires sur stoutner.com.

- - -

Utilisation de l'information

-

Stoutner peut utiliser ces informations pour contribuer au développement de Privacy Browser et communiquer le statut du projet aux utilisateurs. - Stoutner ne vendra jamais ces informations ni ne les transférera à des tiers qui les utiliseraient à des fins publicitaires ou marketing.

- -
-

Revision 1.6, 22 Mai 2018

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/about_privacy_policy_light.html b/app/src/main/assets/fr/about_privacy_policy_light.html deleted file mode 100644 index 817af742..00000000 --- a/app/src/main/assets/fr/about_privacy_policy_light.html +++ /dev/null @@ -1,92 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser ne collecte aucune information sur l'utilisateur.

- - -

Google Play

-

Google Play a sa propre règle de confidentialité . - Google fournit aux développeurs des informations d'installation récapitulatives et anonymisées, notamment le nombre d'installations organisées selon les catégories suivantes.

-
    -
  • Version d'Android (ex. Android 7.1)
  • -
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablettes (ex. Tablettes 10" et plus)
  • -
  • Pays (ex. France)
  • -
  • Langage (ex. Français [Canada])
  • -
  • Version d'Application (ex. 14)
  • -
  • Opérateur (eg. Orange - FR)
  • -
- - -

Notes Google Play

-

Google Play a sa propre règle de confidentialité . - Google fournit aux développeurs des résumés anonymisés des informations suivantes relatives aux évaluations des utilisateurs.

-
    -
  • Pays (ex. France)
  • -
  • Langage (ex. Français [Canada])
  • -
  • Version d'Application (ex. 14)
  • -
  • Version d'Android (ex. Android 7.1)
  • -
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablettes (ex. Tablettes 10" et plus)
  • -
- - -

Avis Google Play

-

Google Play a sa propre règle de confidentialité. - Outre le nom du réviseur, l'évaluation et le texte de la révision (tous disponibles publiquement), Google fournit au développeur tout ou partie des informations suivantes.

-
    -
  • Code de Version (ex. 7)
  • -
  • Nom de Version (ex. 1.6)
  • -
  • Version d'Android (ex. Android 7.1)
  • -
  • Terminal (ex. Samsung Galaxy S6 [zeroflte])
  • -
  • Constructeur (ex. Samsung)
  • -
  • Type de terminal (ex. Phone)
  • -
  • La marque du processeur (ex. Samsung)
  • -
  • Le modèle de processeur (ex. Exynos 7420)
  • -
  • Densité d'affichage (ex. 560 dpi)
  • -
  • Taille d'écran (ex. 2560 x 1440)
  • -
  • RAM (ex. 4096 MB)
  • -
  • Plateforme native (ex. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Version OpenGL ES (ex. 3.1)
  • -
  • Langage du terminal (ex. English)
  • -
- - -

Communications directes

-

Les utilisateurs peuvent choisir d'envoyer des communications directes à Stoutner, telles que des courriels et des commentaires sur stoutner.com.

- - -

Utilisation de l'information

-

Stoutner peut utiliser ces informations pour contribuer au développement de Privacy Browser et communiquer le statut du projet aux utilisateurs. - Stoutner ne vendra jamais ces informations ni ne les transférera à des tiers qui les utiliseraient à des fins publicitaires ou marketing.

- -
-

Revision 1.6, 22 Mai 2018

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_domain_settings.html b/app/src/main/assets/fr/guide_domain_settings.html new file mode 100644 index 00000000..8aab1b51 --- /dev/null +++ b/app/src/main/assets/fr/guide_domain_settings.html @@ -0,0 +1,44 @@ + + + + + + + + + + + + + +

Navigation Web sécurisée

+ +

Par défaut, Privacy Browser permet de naviguer avec JavaScript, les cookies et le stockage DOM désactivé. + Cependant, certains sites Web ont légitimement besoin que ces fonctionnalités soient activées pour fonctionner correctement. + Les paramètres de domaine peuvent activer automatiquement un ensemble de fonctionnalités spécifié lors de la visite d'un domaine désigné.

+ + + +

Lors de la visite d'un domaine pour lequel des paramètres de domaine sont spécifiés, l'arrière-plan de la zone de texte de l'URL est vert.

+ + + + diff --git a/app/src/main/assets/fr/guide_domain_settings_dark.html b/app/src/main/assets/fr/guide_domain_settings_dark.html deleted file mode 100644 index 349187ee..00000000 --- a/app/src/main/assets/fr/guide_domain_settings_dark.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -

Navigation Web sécurisée

- -

Par défaut, Privacy Browser permet de naviguer avec JavaScript, les cookies et le stockage DOM désactivé. - Cependant, certains sites Web ont légitimement besoin que ces fonctionnalités soient activées pour fonctionner correctement. - Les paramètres de domaine peuvent activer automatiquement un ensemble de fonctionnalités spécifié lors de la visite d'un domaine désigné.

- -

- -

Lors de la visite d'un domaine pour lequel des paramètres de domaine sont spécifiés, l'arrière-plan de la zone de texte de l'URL est vert.

- -

- - diff --git a/app/src/main/assets/fr/guide_domain_settings_light.html b/app/src/main/assets/fr/guide_domain_settings_light.html deleted file mode 100644 index d0541dc0..00000000 --- a/app/src/main/assets/fr/guide_domain_settings_light.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -

Navigation Web sécurisée

- -

Par défaut, Privacy Browser permet de naviguer avec JavaScript, les cookies et le stockage DOM désactivé. - Cependant, certains sites Web ont légitimement besoin que ces fonctionnalités soient activées pour fonctionner correctement. - Les paramètres de domaine peuvent activer automatiquement un ensemble de fonctionnalités spécifié lors de la visite d'un domaine désigné.

- -

- -

Lors de la visite d'un domaine pour lequel des paramètres de domaine sont spécifiés, l'arrière-plan de la zone de texte de l'URL est vert.

- -

- - diff --git a/app/src/main/assets/fr/guide_javascript.html b/app/src/main/assets/fr/guide_javascript.html new file mode 100644 index 00000000..593f7ca5 --- /dev/null +++ b/app/src/main/assets/fr/guide_javascript.html @@ -0,0 +1,65 @@ + + + + + + + + + + + + + +

JavaScript Est Puissant

+ +

Au début de l'internet, les pages Web étaient statiques, + c'est-à-dire qu'elles contenaient du texte et des images qui étaient affichées à l'écran mais qui ne changeaient pas et n'interagissaient pas avec l'utilisateur. + Bien entendu, seul un contenu intéressant peut arriver avec du contenu statique. Plusieurs technologies différentes ont été développées pour faciliter les pages Web dynamiques. + JavaScript est l'une de ces technologies.

+ +

JavaScript est un langage de programmation. De nombreux serveurs Web hébergent des programmes écrits en JavaScript, qui sont envoyés aux périphériques dans le cadre de la page Web. + L'appareil exécute le code JavaScript sur son processeur local et suit les commandes du programme, qui peut animer des images sur le site Web, afficher un menu et bien d'autres choses utiles.

+ +

JavaScript Est Dangereux

+ +

Bien entendu, le concept d'exécution de programmes arbitraires à partir d'un site Web est potentiellement dangereux. + Par conséquent, JavaScript est limité pour l'empêcher d'effectuer des opérations telles que l'installation de virus. Cependant, il s'avère que ces limitations sont trop larges. + Vous trouverez ci-dessous une capture d'écran de Webkay, un site Web présentant le type d'informations que JavaScript peut générer à propos d'un appareil. + Les fuites du navigateur sont une autre bonne ressource.

+ +

+ +

Pour des raisons de confidentialité, l'idéal serait de naviguer sur Internet avec JavaScript désactivé. + Cependant, certains sites Web nécessitent légitimement l'utilisation de JavaScript pour atteindre leurs objectifs. + Et d'autres qui ne fonctionnent pas correctement sans JavaScript même s'ils peuvent être programmés pour le faire. + Privacy Browser résout ce problème en facilitant l'activation et la désactivation de JavaScript. + Tapez sur le bouclier de confidentialité pour le basculer entre le bleu + ou le jaune + (les deux indiquent que JavaScript est désactivé) et red (activé par JavaScript). + Voir les différentes informations que Webkay peut collecter avec JavaScript activé et désactivé est informatif.

+ +

Naviguer sur Internet avec JavaScript désactivé, et ne l'activer que si nécessaire, contribue grandement à la protection de la vie privée. + En outre, JavaScript est utilisé pour charger une grande partie des publicités gênantes et des informations supplémentaires fournies par la plupart des sites Web modernes. + Lorsque cette fonctionnalité est désactivée, les sites Web se chargent plus rapidement, utilisent moins de trafic réseau et consomment moins de puissance du processeur, + ce qui allonge la durée de vie de la batterie.

+ + \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_javascript_dark.html b/app/src/main/assets/fr/guide_javascript_dark.html deleted file mode 100644 index 2b5b0399..00000000 --- a/app/src/main/assets/fr/guide_javascript_dark.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - - - - - - - -

JavaScript Est Puissant

- -

Au début de l'internet, les pages Web étaient statiques, - c'est-à-dire qu'elles contenaient du texte et des images qui étaient affichées à l'écran mais qui ne changeaient pas et n'interagissaient pas avec l'utilisateur. - Bien entendu, seul un contenu intéressant peut arriver avec du contenu statique. Plusieurs technologies différentes ont été développées pour faciliter les pages Web dynamiques. - JavaScript est l'une de ces technologies.

- -

JavaScript est un langage de programmation. De nombreux serveurs Web hébergent des programmes écrits en JavaScript, qui sont envoyés aux périphériques dans le cadre de la page Web. - L'appareil exécute le code JavaScript sur son processeur local et suit les commandes du programme, qui peut animer des images sur le site Web, afficher un menu et bien d'autres choses utiles.

- -

JavaScript Est Dangereux

- -

Bien entendu, le concept d'exécution de programmes arbitraires à partir d'un site Web est potentiellement dangereux. - Par conséquent, JavaScript est limité pour l'empêcher d'effectuer des opérations telles que l'installation de virus. Cependant, il s'avère que ces limitations sont trop larges. - Vous trouverez ci-dessous une capture d'écran de Webkay, un site Web présentant le type d'informations que JavaScript peut générer à propos d'un appareil. - Les fuites du navigateur sont une autre bonne ressource.

- -

- -

Pour des raisons de confidentialité, l'idéal serait de naviguer sur Internet avec JavaScript désactivé. - Cependant, certains sites Web nécessitent légitimement l'utilisation de JavaScript pour atteindre leurs objectifs. - Et d'autres qui ne fonctionnent pas correctement sans JavaScript même s'ils peuvent être programmés pour le faire. - Privacy Browser résout ce problème en facilitant l'activation et la désactivation de JavaScript. - Tapez sur le bouclier de confidentialité pour le basculer entre le bleu - ou le jaune - (les deux indiquent que JavaScript est désactivé) et red (activé par JavaScript). - Voir les différentes informations que Webkay peut collecter avec JavaScript activé et désactivé est informatif.

- -

Naviguer sur Internet avec JavaScript désactivé, et ne l'activer que si nécessaire, contribue grandement à la protection de la vie privée. - En outre, JavaScript est utilisé pour charger une grande partie des publicités gênantes et des informations supplémentaires fournies par la plupart des sites Web modernes. - Lorsque cette fonctionnalité est désactivée, les sites Web se chargent plus rapidement, utilisent moins de trafic réseau et consomment moins de puissance du processeur, - ce qui allonge la durée de vie de la batterie.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_javascript_light.html b/app/src/main/assets/fr/guide_javascript_light.html deleted file mode 100644 index 9dae76f7..00000000 --- a/app/src/main/assets/fr/guide_javascript_light.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - - - - - - - -

JavaScript Est Puissant

- -

Au début de l'internet, les pages Web étaient statiques, - c'est-à-dire qu'elles contenaient du texte et des images qui étaient affichées à l'écran mais qui ne changeaient pas et n'interagissaient pas avec l'utilisateur. - Bien entendu, seul un contenu intéressant peut arriver avec du contenu statique. Plusieurs technologies différentes ont été développées pour faciliter les pages Web dynamiques. - JavaScript est l'une de ces technologies.

- -

JavaScript est un langage de programmation. De nombreux serveurs Web hébergent des programmes écrits en JavaScript, qui sont envoyés aux périphériques dans le cadre de la page Web. - L'appareil exécute le code JavaScript sur son processeur local et suit les commandes du programme, qui peut animer des images sur le site Web, afficher un menu et bien d'autres choses utiles.

- -

JavaScript Est Dangereux

- -

Bien entendu, le concept d'exécution de programmes arbitraires à partir d'un site Web est potentiellement dangereux. - Par conséquent, JavaScript est limité pour l'empêcher d'effectuer des opérations telles que l'installation de virus. Cependant, il s'avère que ces limitations sont trop larges. - Vous trouverez ci-dessous une capture d'écran de Webkay, un site Web présentant le type d'informations que JavaScript peut générer à propos d'un appareil. - Les fuites du navigateur sont une autre bonne ressource.

- -

- -

Pour des raisons de confidentialité, l'idéal serait de naviguer sur Internet avec JavaScript désactivé. - Cependant, certains sites Web nécessitent légitimement l'utilisation de JavaScript pour atteindre leurs objectifs. - Et d'autres qui ne fonctionnent pas correctement sans JavaScript même s'ils peuvent être programmés pour le faire. - Privacy Browser résout ce problème en facilitant l'activation et la désactivation de JavaScript. - Tapez sur le bouclier de confidentialité pour le basculer entre le bleu - ou le jaune - (les deux indiquent que JavaScript est désactivé) et red (activé par JavaScript). - Voir les différentes informations que Webkay peut collecter avec JavaScript activé et désactivé est informatif.

- -

Naviguer sur Internet avec JavaScript désactivé, et ne l'activer que si nécessaire, contribue grandement à la protection de la vie privée. - En outre, JavaScript est utilisé pour charger une grande partie des publicités gênantes et des informations supplémentaires fournies par la plupart des sites Web modernes. - Lorsque cette fonctionnalité est désactivée, les sites Web se chargent plus rapidement, utilisent moins de trafic réseau et consomment moins de puissance du processeur, - ce qui allonge la durée de vie de la batterie.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_local_storage.html b/app/src/main/assets/fr/guide_local_storage.html new file mode 100644 index 00000000..0314bb12 --- /dev/null +++ b/app/src/main/assets/fr/guide_local_storage.html @@ -0,0 +1,99 @@ + + + + + + + + + + + + + +

Cookies internes

+ +

Les cookies propriétaires sont définis par le site Web dans la barre d'adresse en haut de la page.

+ +

Dès les débuts d'Internet, il est devenu évident qu'il serait avantageux pour les sites Web de pouvoir stocker des informations sur un ordinateur pour un accès ultérieur. + Par exemple, un site Web affichant des informations météorologiques peut demander à l'utilisateur un code postal, puis le stocker dans un cookie. + Lors de la prochaine visite de l'utilisateur sur le site Web, les informations météo se chargeraient automatiquement pour ce code postal, sans que l'utilisateur ait à le saisir à nouveau.

+ +

Comme pour tout le reste du Web, + des personnes intelligentes ont découvert toutes sortes de moyens d'abuser des cookies pour faire des choses que les utilisateurs n'approuveraient pas s'ils savaient qu'ils se produisaient. + Par exemple, un site Web peut définir un cookie avec un numéro de série unique sur un appareil. + Ensuite, chaque fois qu'un utilisateur visite le site Web sur cet appareil, il peut être lié à un profil unique que le serveur conserve pour ce numéro de série. + même si le périphérique se connecte à partir d'adresses IP différentes.

+ +

Presque tous les sites Web avec des connexions exigent que les cookies propriétaires soient activés pour qu'un utilisateur puisse se connecter. + C'est ainsi qu'ils s'assurent que c'est toujours votre cas lorsque vous vous déplacez de page en page sur le site. C'est, à mon avis, l'une des rares utilisations légitimes des cookies.

+ +

Si les cookies propriétaires sont activés mais que JavaScript est désactivé, + l'icône de confidentialité sera jaune en guise d'avertissement.

+ + +

Cookies de tiers

+ +

Les cookies tiers sont définis par des parties d'un site Web chargées à partir de serveurs différents de l'URL en haut de la page. + Par exemple, la plupart des sites Web contenant des publicités les chargent depuis un courtier publicitaire tiers, comme Ad Sense de Google. + Chaque fois que le site Web se charge, il demande au courtier en publicité d'afficher une annonce. + Le courtier en publicité analyse toutes les informations dont il dispose sur l'utilisateur, + examine le tarif actuel que les annonceurs sont disposés à payer pour leurs annonces et sélectionne celle à afficher. + La section du site Web qui affiche les annonces est chargée à partir du serveur du courtier tiers au lieu du serveur principal.

+ +

La plupart des publicités sur Internet étant traitées par quelques courtiers uniquement, + ils ont vite compris qu'ils pouvaient définir un cookie de suivi sur le terminal de l'utilisateur et connaître chaque lieu où cet utilisateur se rend. + Chaque fois qu'une annonce est chargée à partir d'un courtier, elle vérifie d'abord si le périphérique a déjà un numéro de série unique dans un cookie de suivi. + Si tel est le cas, il recherche le profil pour ce numéro de série et note le nouveau site. + C'est pourquoi un utilisateur peut rechercher sur un site Web un produit qu'il ne recherche généralement pas, comme les noix, + et puis soudain commencer à voir des publicités pour les noix sur chaque site Web qu'ils visitent.

+ +

Outre les courtiers en publicité, les sites de médias sociaux ont découvert qu'ils pouvaient jouer un rôle actif. + Il y a quelques années, les principaux sites de médias sociaux tels que Facebook et Twitter ont convaincu un grand nombre de sites Web. + qu'il serait dans leur intérêt de placer de petites icônes de médias sociaux sur leurs pages. + Ce ne sont pas que des images. Ils contiennent le code incorporé qui renvoie au site de média social et, entre autres, + charge un cookie tiers sur l'appareil. Ces cookies sont placés même si l'utilisateur n'a pas de compte avec la plate-forme de médias sociaux. + Au fil du temps, des entreprises comme Facebook (qui gère également une régie publicitaire) ont constitué un assez grand nombre de profils détaillés sur les personnes qui ont + n'a même jamais créé de compte sur son site .

+ +

Il n'existe aucune raison valable d'autoriser les cookies tiers. Sur les appareils avec Android KitKat ou une version antérieure (version <= 4.4.4 ou API <= 20), WebView ne + différencie pas + entre les cookies propriétaires et tiers . Ainsi, l'activation des cookies propriétaires permettra également l'utilisation de cookies tiers.

+ + +

Stockage du DOM

+ +

Le stockage de modèle d'objet de document, également appelé stockage Web, ressemble à des cookies sur des stéroïdes. + Considérant que la taille de stockage combinée maximale pour tous les cookies d'une seule URL est de 4 kilo-octets, + Le stockage DOM peut contenir des mégaoctets par site. + Le stockage DOM utilisant JavaScript pour lire et écrire des données, il ne peut être activé que si JavaScript est également activé.

+ + +

Données de formulaire

+ +

Les données de formulaire contiennent des informations saisies dans des formulaires Web, telles que des noms d'utilisateur, des adresses, des numéros de téléphone, + etc., et les répertorient dans une liste déroulante lors de visites ultérieures. + Contrairement aux autres formes de stockage local, les données de formulaire ne sont pas envoyées au serveur Web sans interaction spécifique de l'utilisateur. + Depuis Android Oreo (8.0), les données de formulaire de WebView ont été remplacées par le + service de saisie automatique.. + En tant que tels, les contrôles des données de formulaire n'apparaissent plus sur les nouveaux appareils Android.

+ + \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_local_storage_dark.html b/app/src/main/assets/fr/guide_local_storage_dark.html deleted file mode 100644 index eb776b97..00000000 --- a/app/src/main/assets/fr/guide_local_storage_dark.html +++ /dev/null @@ -1,96 +0,0 @@ - - - - - - - - - - -

Cookies internes

- -

Les cookies propriétaires sont définis par le site Web dans la barre d'adresse en haut de la page.

- -

Dès les débuts d'Internet, il est devenu évident qu'il serait avantageux pour les sites Web de pouvoir stocker des informations sur un ordinateur pour un accès ultérieur. - Par exemple, un site Web affichant des informations météorologiques peut demander à l'utilisateur un code postal, puis le stocker dans un cookie. - Lors de la prochaine visite de l'utilisateur sur le site Web, les informations météo se chargeraient automatiquement pour ce code postal, sans que l'utilisateur ait à le saisir à nouveau.

- -

Comme pour tout le reste du Web, - des personnes intelligentes ont découvert toutes sortes de moyens d'abuser des cookies pour faire des choses que les utilisateurs n'approuveraient pas s'ils savaient qu'ils se produisaient. - Par exemple, un site Web peut définir un cookie avec un numéro de série unique sur un appareil. - Ensuite, chaque fois qu'un utilisateur visite le site Web sur cet appareil, il peut être lié à un profil unique que le serveur conserve pour ce numéro de série. - même si le périphérique se connecte à partir d'adresses IP différentes.

- -

Presque tous les sites Web avec des connexions exigent que les cookies propriétaires soient activés pour qu'un utilisateur puisse se connecter. - C'est ainsi qu'ils s'assurent que c'est toujours votre cas lorsque vous vous déplacez de page en page sur le site. C'est, à mon avis, l'une des rares utilisations légitimes des cookies.

- -

Si les cookies propriétaires sont activés mais que JavaScript est désactivé, - l'icône de confidentialité sera jaune en guise d'avertissement.

- - -

Cookies de tiers

- -

Les cookies tiers sont définis par des parties d'un site Web chargées à partir de serveurs différents de l'URL en haut de la page. - Par exemple, la plupart des sites Web contenant des publicités les chargent depuis un courtier publicitaire tiers, comme Ad Sense de Google. - Chaque fois que le site Web se charge, il demande au courtier en publicité d'afficher une annonce. - Le courtier en publicité analyse toutes les informations dont il dispose sur l'utilisateur, - examine le tarif actuel que les annonceurs sont disposés à payer pour leurs annonces et sélectionne celle à afficher. - La section du site Web qui affiche les annonces est chargée à partir du serveur du courtier tiers au lieu du serveur principal.

- -

La plupart des publicités sur Internet étant traitées par quelques courtiers uniquement, - ils ont vite compris qu'ils pouvaient définir un cookie de suivi sur le terminal de l'utilisateur et connaître chaque lieu où cet utilisateur se rend. - Chaque fois qu'une annonce est chargée à partir d'un courtier, elle vérifie d'abord si le périphérique a déjà un numéro de série unique dans un cookie de suivi. - Si tel est le cas, il recherche le profil pour ce numéro de série et note le nouveau site. - C'est pourquoi un utilisateur peut rechercher sur un site Web un produit qu'il ne recherche généralement pas, comme les noix, - et puis soudain commencer à voir des publicités pour les noix sur chaque site Web qu'ils visitent.

- -

Outre les courtiers en publicité, les sites de médias sociaux ont découvert qu'ils pouvaient jouer un rôle actif. - Il y a quelques années, les principaux sites de médias sociaux tels que Facebook et Twitter ont convaincu un grand nombre de sites Web. - qu'il serait dans leur intérêt de placer de petites icônes de médias sociaux sur leurs pages. - Ce ne sont pas que des images. Ils contiennent le code incorporé qui renvoie au site de média social et, entre autres, - charge un cookie tiers sur l'appareil. Ces cookies sont placés même si l'utilisateur n'a pas de compte avec la plate-forme de médias sociaux. - Au fil du temps, des entreprises comme Facebook (qui gère également une régie publicitaire) ont constitué un assez grand nombre de profils détaillés sur les personnes qui ont - n'a même jamais créé de compte sur son site .

- -

Il n'existe aucune raison valable d'autoriser les cookies tiers. Sur les appareils avec Android KitKat ou une version antérieure (version <= 4.4.4 ou API <= 20), WebView ne - différencie pas - entre les cookies propriétaires et tiers . Ainsi, l'activation des cookies propriétaires permettra également l'utilisation de cookies tiers.

- - -

Stockage du DOM

- -

Le stockage de modèle d'objet de document, également appelé stockage Web, ressemble à des cookies sur des stéroïdes. - Considérant que la taille de stockage combinée maximale pour tous les cookies d'une seule URL est de 4 kilo-octets, - Le stockage DOM peut contenir des mégaoctets par site. - Le stockage DOM utilisant JavaScript pour lire et écrire des données, il ne peut être activé que si JavaScript est également activé.

- - -

Données de formulaire

- -

Les données de formulaire contiennent des informations saisies dans des formulaires Web, telles que des noms d'utilisateur, des adresses, des numéros de téléphone, - etc., et les répertorient dans une liste déroulante lors de visites ultérieures. - Contrairement aux autres formes de stockage local, les données de formulaire ne sont pas envoyées au serveur Web sans interaction spécifique de l'utilisateur. - Depuis Android Oreo (8.0), les données de formulaire de WebView ont été remplacées par le - service de saisie automatique.. - En tant que tels, les contrôles des données de formulaire n'apparaissent plus sur les nouveaux appareils Android.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_local_storage_light.html b/app/src/main/assets/fr/guide_local_storage_light.html deleted file mode 100644 index 08f98b62..00000000 --- a/app/src/main/assets/fr/guide_local_storage_light.html +++ /dev/null @@ -1,96 +0,0 @@ - - - - - - - - - - -

Cookies internes

- -

Les cookies propriétaires sont définis par le site Web dans la barre d'adresse en haut de la page.

- -

Dès les débuts d'Internet, il est devenu évident qu'il serait avantageux pour les sites Web de pouvoir stocker des informations sur un ordinateur pour un accès ultérieur. - Par exemple, un site Web affichant des informations météorologiques peut demander à l'utilisateur un code postal, puis le stocker dans un cookie. - Lors de la prochaine visite de l'utilisateur sur le site Web, les informations météo se chargeraient automatiquement pour ce code postal, sans que l'utilisateur ait à le saisir à nouveau.

- -

Comme pour tout le reste du Web, - des personnes intelligentes ont découvert toutes sortes de moyens d'abuser des cookies pour faire des choses que les utilisateurs n'approuveraient pas s'ils savaient qu'ils se produisaient. - Par exemple, un site Web peut définir un cookie avec un numéro de série unique sur un appareil. - Ensuite, chaque fois qu'un utilisateur visite le site Web sur cet appareil, il peut être lié à un profil unique que le serveur conserve pour ce numéro de série. - même si le périphérique se connecte à partir d'adresses IP différentes.

- -

Presque tous les sites Web avec des connexions exigent que les cookies propriétaires soient activés pour qu'un utilisateur puisse se connecter. - C'est ainsi qu'ils s'assurent que c'est toujours votre cas lorsque vous vous déplacez de page en page sur le site. C'est, à mon avis, l'une des rares utilisations légitimes des cookies.

- -

Si les cookies propriétaires sont activés mais que JavaScript est désactivé, - l'icône de confidentialité sera jaune en guise d'avertissement.

- - -

Cookies de tiers

- -

Les cookies tiers sont définis par des parties d'un site Web chargées à partir de serveurs différents de l'URL en haut de la page. - Par exemple, la plupart des sites Web contenant des publicités les chargent depuis un courtier publicitaire tiers, comme Ad Sense de Google. - Chaque fois que le site Web se charge, il demande au courtier en publicité d'afficher une annonce. - Le courtier en publicité analyse toutes les informations dont il dispose sur l'utilisateur, - examine le tarif actuel que les annonceurs sont disposés à payer pour leurs annonces et sélectionne celle à afficher. - La section du site Web qui affiche les annonces est chargée à partir du serveur du courtier tiers au lieu du serveur principal.

- -

La plupart des publicités sur Internet étant traitées par quelques courtiers uniquement, - ils ont vite compris qu'ils pouvaient définir un cookie de suivi sur le terminal de l'utilisateur et connaître chaque lieu où cet utilisateur se rend. - Chaque fois qu'une annonce est chargée à partir d'un courtier, elle vérifie d'abord si le périphérique a déjà un numéro de série unique dans un cookie de suivi. - Si tel est le cas, il recherche le profil pour ce numéro de série et note le nouveau site. - C'est pourquoi un utilisateur peut rechercher sur un site Web un produit qu'il ne recherche généralement pas, comme les noix, - et puis soudain commencer à voir des publicités pour les noix sur chaque site Web qu'ils visitent.

- -

Outre les courtiers en publicité, les sites de médias sociaux ont découvert qu'ils pouvaient jouer un rôle actif. - Il y a quelques années, les principaux sites de médias sociaux tels que Facebook et Twitter ont convaincu un grand nombre de sites Web. - qu'il serait dans leur intérêt de placer de petites icônes de médias sociaux sur leurs pages. - Ce ne sont pas que des images. Ils contiennent le code incorporé qui renvoie au site de média social et, entre autres, - charge un cookie tiers sur l'appareil. Ces cookies sont placés même si l'utilisateur n'a pas de compte avec la plate-forme de médias sociaux. - Au fil du temps, des entreprises comme Facebook (qui gère également une régie publicitaire) ont constitué un assez grand nombre de profils détaillés sur les personnes qui ont - n'a même jamais créé de compte sur son site .

- -

Il n'existe aucune raison valable d'autoriser les cookies tiers. Sur les appareils avec Android KitKat ou une version antérieure (version <= 4.4.4 ou API <= 20), WebView ne - différencie pas - entre les cookies propriétaires et tiers . Ainsi, l'activation des cookies propriétaires permettra également l'utilisation de cookies tiers.

- - -

Stockage du DOM

- -

Le stockage de modèle d'objet de document, également appelé stockage Web, ressemble à des cookies sur des stéroïdes. - Considérant que la taille de stockage combinée maximale pour tous les cookies d'une seule URL est de 4 kilo-octets, - Le stockage DOM peut contenir des mégaoctets par site. - Le stockage DOM utilisant JavaScript pour lire et écrire des données, il ne peut être activé que si JavaScript est également activé.

- - -

Données de formulaire

- -

Les données de formulaire contiennent des informations saisies dans des formulaires Web, telles que des noms d'utilisateur, des adresses, des numéros de téléphone, - etc., et les répertorient dans une liste déroulante lors de visites ultérieures. - Contrairement aux autres formes de stockage local, les données de formulaire ne sont pas envoyées au serveur Web sans interaction spécifique de l'utilisateur. - Depuis Android Oreo (8.0), les données de formulaire de WebView ont été remplacées par le - service de saisie automatique.. - En tant que tels, les contrôles des données de formulaire n'apparaissent plus sur les nouveaux appareils Android.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_overview.html b/app/src/main/assets/fr/guide_overview.html new file mode 100644 index 00000000..2ecf77fe --- /dev/null +++ b/app/src/main/assets/fr/guide_overview.html @@ -0,0 +1,52 @@ + + + + + + + + + + + + + +

Réelle confidentialité

+ +

Privacy Browser est conçu pour vous permettre de contrôler autant que possible votre vie privée tout en naviguant sur Internet. + Lorsqu'un navigateur se connecte à un site Web, certaines informations nécessaires pour faciliter la connexion sont transférées au serveur. + Par exemple, le serveur recevra votre adresse IP et un numéro de port, qui sont nécessaires pour savoir où envoyer la réponse. + Ces informations sont souvent consignées par le serveur, + ce qui permet au développeur de sites Web de générer des rapports indiquant la fréquence de chargement d'une page Web et le nombre d'adresses IP auxquelles elle a accédé.

+ +

Cependant, la plupart des exploitants de sites Web souhaitent obtenir davantage d'informations sur leurs visiteurs, notamment en suivant leur navigation sur plusieurs sites Web. + Il existe de nombreuses techniques différentes, notamment demander ou placer des informations supplémentaires sur le périphérique d'un utilisateur, qui facilitent ce suivi. + Presque tous les navigateurs participeront volontairement à ce suivi sans en informer l'utilisateur. + Privacy Browser est conçu pour fournir à l'utilisateur autant d'informations et de contrôle que possible sur ces techniques de suivi.

+ + +

Limites d'Android WebView

+ +

Privacy Browser utilise WebView intégré à Android pour afficher les sites Web. Il existe certaines limitations dans les contrôles que WebView applique pour gérer les paramètres de confidentialité. + Par exemple, il n'est pas possible d'activer certaines commandes JavaScript tout en en désactivant d'autres. + À l'avenir, Privacy Browser basculera vers une vue Web personnalisée appelée Privacy WebView.

+ + \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_overview_dark.html b/app/src/main/assets/fr/guide_overview_dark.html deleted file mode 100644 index 3404ed4f..00000000 --- a/app/src/main/assets/fr/guide_overview_dark.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - - - - - - - -

Réelle confidentialité

- -

Privacy Browser est conçu pour vous permettre de contrôler autant que possible votre vie privée tout en naviguant sur Internet. - Lorsqu'un navigateur se connecte à un site Web, certaines informations nécessaires pour faciliter la connexion sont transférées au serveur. - Par exemple, le serveur recevra votre adresse IP et un numéro de port, qui sont nécessaires pour savoir où envoyer la réponse. - Ces informations sont souvent consignées par le serveur, - ce qui permet au développeur de sites Web de générer des rapports indiquant la fréquence de chargement d'une page Web et le nombre d'adresses IP auxquelles elle a accédé.

- -

Cependant, la plupart des exploitants de sites Web souhaitent obtenir davantage d'informations sur leurs visiteurs, notamment en suivant leur navigation sur plusieurs sites Web. - Il existe de nombreuses techniques différentes, notamment demander ou placer des informations supplémentaires sur le périphérique d'un utilisateur, qui facilitent ce suivi. - Presque tous les navigateurs participeront volontairement à ce suivi sans en informer l'utilisateur. - Privacy Browser est conçu pour fournir à l'utilisateur autant d'informations et de contrôle que possible sur ces techniques de suivi.

- - -

Limites d'Android WebView

- -

Privacy Browser utilise WebView intégré à Android pour afficher les sites Web. Il existe certaines limitations dans les contrôles que WebView applique pour gérer les paramètres de confidentialité. - Par exemple, il n'est pas possible d'activer certaines commandes JavaScript tout en en désactivant d'autres. - À l'avenir, Privacy Browser basculera vers une vue Web personnalisée appelée Privacy WebView.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_overview_light.html b/app/src/main/assets/fr/guide_overview_light.html deleted file mode 100644 index 3fb94b13..00000000 --- a/app/src/main/assets/fr/guide_overview_light.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - - - - - - - -

Réelle confidentialité

- -

Privacy Browser est conçu pour vous permettre de contrôler autant que possible votre vie privée tout en naviguant sur Internet. - Lorsqu'un navigateur se connecte à un site Web, certaines informations nécessaires pour faciliter la connexion sont transférées au serveur. - Par exemple, le serveur recevra votre adresse IP et un numéro de port, qui sont nécessaires pour savoir où envoyer la réponse. - Ces informations sont souvent consignées par le serveur, - ce qui permet au développeur de sites Web de générer des rapports indiquant la fréquence de chargement d'une page Web et le nombre d'adresses IP auxquelles elle a accédé.

- -

Cependant, la plupart des exploitants de sites Web souhaitent obtenir davantage d'informations sur leurs visiteurs, notamment en suivant leur navigation sur plusieurs sites Web. - Il existe de nombreuses techniques différentes, notamment demander ou placer des informations supplémentaires sur le périphérique d'un utilisateur, qui facilitent ce suivi. - Presque tous les navigateurs participeront volontairement à ce suivi sans en informer l'utilisateur. - Privacy Browser est conçu pour fournir à l'utilisateur autant d'informations et de contrôle que possible sur ces techniques de suivi.

- - -

Limites d'Android WebView

- -

Privacy Browser utilise WebView intégré à Android pour afficher les sites Web. Il existe certaines limitations dans les contrôles que WebView applique pour gérer les paramètres de confidentialité. - Par exemple, il n'est pas possible d'activer certaines commandes JavaScript tout en en désactivant d'autres. - À l'avenir, Privacy Browser basculera vers une vue Web personnalisée appelée Privacy WebView.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_proxies.html b/app/src/main/assets/fr/guide_proxies.html new file mode 100644 index 00000000..2d7d0dd4 --- /dev/null +++ b/app/src/main/assets/fr/guide_proxies.html @@ -0,0 +1,91 @@ + + + + + + + + + + + + + +

Proxies et leurs limites

+ +

Il existe deux catégories générales de mauvais acteurs qui veulent porter atteinte à la vie privée du Web: + des gouvernements malveillants ayant accès à des fournisseurs de services Internet (FAI) et des méga entreprises exploitant des réseaux sociaux et publicitaires. + Des proxys comme TOR (The Onion Router) et I2P (The Invisible Internet Project) sont utiles pour protéger la confidentialité des gouvernements malveillants (qui espionnent le trafic en transit) + mais pas de méga sociétés (qui intègrent du code malveillant sur les serveurs Web).

+ + +

Gouvernements Malicieux

+ +

Les gouvernements malveillants espionnent souvent leurs citoyens pour punir la dissidence ou les activités liées aux droits de l'homme. + Ils exploitent généralement les FAI locaux ou peuvent les obliger à divulguer des informations indiquant chaque adresse IP visitée par chaque utilisateur. + Les proxys en couches sont conçus pour vaincre cette atteinte à la vie privée en chiffrant le trafic à partir de l'appareil d'un utilisateur et en le routant via plusieurs serveurs sur Internet + avant de l'envoyer à la destination finale. + Cela signifie qu’aucun FAI, serveur ou site Web individuel ne peut connaître à la fois l’adresse IP de l’appareil de l’utilisateur + et l’adresse IP du serveur Web final. + Les gouvernements malveillants et les FAI qu'ils contrôlent ne peuvent pas savoir à quels serveurs Web un utilisateur accède, + bien qu'ils puissent dire que l'utilisateur utilise un service proxy en couches. + Dans certaines parties du monde, l'utilisation de proxies pourrait être interprétée comme une preuve de comportement illégal («Si vous n'aviez rien à cacher, vous ne crypteriez pas votre trafic») + et les utilisateurs pourraient être punis parce que les gouvernements supposent qu'ils font quelque chose qui est interdit. + Ainsi, les proxies peuvent être utiles, mais elles ne sont pas une panacée.

+ + +

Méga entreprises

+ +

Lorsqu'un utilisateur se connecte à un serveur Web, celui-ci peut voir l'adresse IP de l'utilisateur. + Bien que ce ne soit pas une science parfaite, les adresses IP peuvent être transformées en adresses physiques avec une juste précision. + Les petits serveurs Web s'appuient généralement sur des adresses IP pour identifier l'emplacement des utilisateurs visitant leur site. + Les proxys sont une bonne solution pour masquer l'emplacement de l'utilisateur à partir de ces serveurs. + Mais les grandes méga-entreprises propriétaires de réseaux de médias sociaux et de publicité utilisent tout un profil d'informations + conçu pour suivre les utilisateurs sur des appareils et des adresses IP. + Ces profils utilisent diverses techniques pour identifier les utilisateurs, notamment JavaScript, les cookies, les identifiants de suivi et les + empreintes digitales du navigateur. + Parce que la grande majorité des sites Web sur Internet téléchargent une annonce publicitaire sur l'un des principaux réseaux ou intègrent + des icônes de réseaux sociaux avec leur code JavaScript associé, + ces sociétés ont créé des profils pour presque tous les utilisateurs en ligne et peuvent suivre leur activité Internet sur des sites indépendants.

+ +

Ils suivent chaque site visité, tout ce qui est acheté, chaque carte de crédit utilisée pour effectuer un achat, chaque adresse à laquelle les articles sont expédiés, + et les métadonnées GPS de chaque image téléchargée sur Internet. + Ils établissent un profil de l'âge, du sexe, de l'état matrimonial, de l'adresse, des affiliations politiques, des appartenances religieuses, de la situation de famille, + du nombre d'animaux de compagnie, et tout ce qu'ils peuvent mettre la main dessus. + Ils achètent même des bases de données de transactions par carte de crédit dans les magasins locaux, afin de pouvoir suivre les habitudes d'achat hors ligne des utilisateurs dans leurs profils. + Parce qu'ils disposent déjà d'informations d'adresses beaucoup plus précises sur un utilisateur qu'une adresse IP ne peut le révéler, + les proxies n'offrent aucune véritable protection de la vie privée contre les grosses corporations.

+ +

La meilleure protection contre la confidentialité des grandes entreprises consiste à naviguer sur le Web avec JavaScript désactivé, le suivi du blocage des réseaux publicitaires, + la désactivation des cookies et du stockage du DOM et en utilisant un navigateur difficile à identifier.

+ + +

Utiliser des Proxies

+ +

Malgré leurs limites, les proxies peuvent être utiles dans certaines circonstances. + Tor et I2P + ont des applications Android qui facilitent l'utilisation de leurs réseaux proxy. + Lorsque le proxy est activé dans Privacy Browser, la barre d'application aura un fond bleu clair au lieu du gris clair par défaut. + Étant donné que le trafic est acheminé via plusieurs nœuds proxy, l'utilisation d'un proxy en couches est souvent beaucoup plus lente que la connexion directe à Internet.

+ + + + \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_proxies_dark.html b/app/src/main/assets/fr/guide_proxies_dark.html deleted file mode 100644 index d6ebf574..00000000 --- a/app/src/main/assets/fr/guide_proxies_dark.html +++ /dev/null @@ -1,88 +0,0 @@ - - - - - - - - - - -

Proxies et leurs limites

- -

Il existe deux catégories générales de mauvais acteurs qui veulent porter atteinte à la vie privée du Web: - des gouvernements malveillants ayant accès à des fournisseurs de services Internet (FAI) et des méga entreprises exploitant des réseaux sociaux et publicitaires. - Des proxys comme TOR (The Onion Router) et I2P (The Invisible Internet Project) sont utiles pour protéger la confidentialité des gouvernements malveillants (qui espionnent le trafic en transit) - mais pas de méga sociétés (qui intègrent du code malveillant sur les serveurs Web).

- - -

Gouvernements Malicieux

- -

Les gouvernements malveillants espionnent souvent leurs citoyens pour punir la dissidence ou les activités liées aux droits de l'homme. - Ils exploitent généralement les FAI locaux ou peuvent les obliger à divulguer des informations indiquant chaque adresse IP visitée par chaque utilisateur. - Les proxys en couches sont conçus pour vaincre cette atteinte à la vie privée en chiffrant le trafic à partir de l'appareil d'un utilisateur et en le routant via plusieurs serveurs sur Internet - avant de l'envoyer à la destination finale. - Cela signifie qu’aucun FAI, serveur ou site Web individuel ne peut connaître à la fois l’adresse IP de l’appareil de l’utilisateur - et l’adresse IP du serveur Web final. - Les gouvernements malveillants et les FAI qu'ils contrôlent ne peuvent pas savoir à quels serveurs Web un utilisateur accède, - bien qu'ils puissent dire que l'utilisateur utilise un service proxy en couches. - Dans certaines parties du monde, l'utilisation de proxies pourrait être interprétée comme une preuve de comportement illégal («Si vous n'aviez rien à cacher, vous ne crypteriez pas votre trafic») - et les utilisateurs pourraient être punis parce que les gouvernements supposent qu'ils font quelque chose qui est interdit. - Ainsi, les proxies peuvent être utiles, mais elles ne sont pas une panacée.

- - -

Méga entreprises

- -

Lorsqu'un utilisateur se connecte à un serveur Web, celui-ci peut voir l'adresse IP de l'utilisateur. - Bien que ce ne soit pas une science parfaite, les adresses IP peuvent être transformées en adresses physiques avec une juste précision. - Les petits serveurs Web s'appuient généralement sur des adresses IP pour identifier l'emplacement des utilisateurs visitant leur site. - Les proxys sont une bonne solution pour masquer l'emplacement de l'utilisateur à partir de ces serveurs. - Mais les grandes méga-entreprises propriétaires de réseaux de médias sociaux et de publicité utilisent tout un profil d'informations - conçu pour suivre les utilisateurs sur des appareils et des adresses IP. - Ces profils utilisent diverses techniques pour identifier les utilisateurs, notamment JavaScript, les cookies, les identifiants de suivi et les - empreintes digitales du navigateur. - Parce que la grande majorité des sites Web sur Internet téléchargent une annonce publicitaire sur l'un des principaux réseaux ou intègrent - des icônes de réseaux sociaux avec leur code JavaScript associé, - ces sociétés ont créé des profils pour presque tous les utilisateurs en ligne et peuvent suivre leur activité Internet sur des sites indépendants.

- -

Ils suivent chaque site visité, tout ce qui est acheté, chaque carte de crédit utilisée pour effectuer un achat, chaque adresse à laquelle les articles sont expédiés, - et les métadonnées GPS de chaque image téléchargée sur Internet. - Ils établissent un profil de l'âge, du sexe, de l'état matrimonial, de l'adresse, des affiliations politiques, des appartenances religieuses, de la situation de famille, - du nombre d'animaux de compagnie, et tout ce qu'ils peuvent mettre la main dessus. - Ils achètent même des bases de données de transactions par carte de crédit dans les magasins locaux, afin de pouvoir suivre les habitudes d'achat hors ligne des utilisateurs dans leurs profils. - Parce qu'ils disposent déjà d'informations d'adresses beaucoup plus précises sur un utilisateur qu'une adresse IP ne peut le révéler, - les proxies n'offrent aucune véritable protection de la vie privée contre les grosses corporations.

- -

La meilleure protection contre la confidentialité des grandes entreprises consiste à naviguer sur le Web avec JavaScript désactivé, le suivi du blocage des réseaux publicitaires, - la désactivation des cookies et du stockage du DOM et en utilisant un navigateur difficile à identifier.

- - -

Utiliser des Proxies

- -

Malgré leurs limites, les proxies peuvent être utiles dans certaines circonstances. - Tor et I2P - ont des applications Android qui facilitent l'utilisation de leurs réseaux proxy. - Lorsque le proxy est activé dans Privacy Browser, la barre d'application aura un fond bleu clair au lieu du gris clair par défaut. - Étant donné que le trafic est acheminé via plusieurs nœuds proxy, l'utilisation d'un proxy en couches est souvent beaucoup plus lente que la connexion directe à Internet.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_proxies_light.html b/app/src/main/assets/fr/guide_proxies_light.html deleted file mode 100644 index 011d91c9..00000000 --- a/app/src/main/assets/fr/guide_proxies_light.html +++ /dev/null @@ -1,88 +0,0 @@ - - - - - - - - - - -

Proxies et leurs limites

- -

Il existe deux catégories générales de mauvais acteurs qui veulent porter atteinte à la vie privée du Web: - des gouvernements malveillants ayant accès à des fournisseurs de services Internet (FAI) et des méga entreprises exploitant des réseaux sociaux et publicitaires. - Des proxys comme TOR (The Onion Router) et I2P (The Invisible Internet Project) sont utiles pour protéger la confidentialité des gouvernements malveillants (qui espionnent le trafic en transit) - mais pas de méga sociétés (qui intègrent du code malveillant sur les serveurs Web).

- - -

Gouvernements Malicieux

- -

Les gouvernements malveillants espionnent souvent leurs citoyens pour punir la dissidence ou les activités liées aux droits de l'homme. - Ils exploitent généralement les FAI locaux ou peuvent les obliger à divulguer des informations indiquant chaque adresse IP visitée par chaque utilisateur. - Les proxys en couches sont conçus pour vaincre cette atteinte à la vie privée en chiffrant le trafic à partir de l'appareil d'un utilisateur et en le routant via plusieurs serveurs sur Internet - avant de l'envoyer à la destination finale. - Cela signifie qu’aucun FAI, serveur ou site Web individuel ne peut connaître à la fois l’adresse IP de l’appareil de l’utilisateur - et l’adresse IP du serveur Web final. - Les gouvernements malveillants et les FAI qu'ils contrôlent ne peuvent pas savoir à quels serveurs Web un utilisateur accède, - bien qu'ils puissent dire que l'utilisateur utilise un service proxy en couches. - Dans certaines parties du monde, l'utilisation de proxies pourrait être interprétée comme une preuve de comportement illégal («Si vous n'aviez rien à cacher, vous ne crypteriez pas votre trafic») - et les utilisateurs pourraient être punis parce que les gouvernements supposent qu'ils font quelque chose qui est interdit. - Ainsi, les proxies peuvent être utiles, mais elles ne sont pas une panacée.

- - -

Méga entreprises

- -

Lorsqu'un utilisateur se connecte à un serveur Web, celui-ci peut voir l'adresse IP de l'utilisateur. - Bien que ce ne soit pas une science parfaite, les adresses IP peuvent être transformées en adresses physiques avec une juste précision. - Les petits serveurs Web s'appuient généralement sur des adresses IP pour identifier l'emplacement des utilisateurs visitant leur site. - Les proxys sont une bonne solution pour masquer l'emplacement de l'utilisateur à partir de ces serveurs. - Mais les grandes méga-entreprises propriétaires de réseaux de médias sociaux et de publicité utilisent tout un profil d'informations - conçu pour suivre les utilisateurs sur des appareils et des adresses IP. - Ces profils utilisent diverses techniques pour identifier les utilisateurs, notamment JavaScript, les cookies, les identifiants de suivi et les - empreintes digitales du navigateur. - Parce que la grande majorité des sites Web sur Internet téléchargent une annonce publicitaire sur l'un des principaux réseaux ou intègrent - des icônes de réseaux sociaux avec leur code JavaScript associé, - ces sociétés ont créé des profils pour presque tous les utilisateurs en ligne et peuvent suivre leur activité Internet sur des sites indépendants.

- -

Ils suivent chaque site visité, tout ce qui est acheté, chaque carte de crédit utilisée pour effectuer un achat, chaque adresse à laquelle les articles sont expédiés, - et les métadonnées GPS de chaque image téléchargée sur Internet. - Ils établissent un profil de l'âge, du sexe, de l'état matrimonial, de l'adresse, des affiliations politiques, des appartenances religieuses, de la situation de famille, - du nombre d'animaux de compagnie, et tout ce qu'ils peuvent mettre la main dessus. - Ils achètent même des bases de données de transactions par carte de crédit dans les magasins locaux, afin de pouvoir suivre les habitudes d'achat hors ligne des utilisateurs dans leurs profils. - Parce qu'ils disposent déjà d'informations d'adresses beaucoup plus précises sur un utilisateur qu'une adresse IP ne peut le révéler, - les proxies n'offrent aucune véritable protection de la vie privée contre les grosses corporations.

- -

La meilleure protection contre la confidentialité des grandes entreprises consiste à naviguer sur le Web avec JavaScript désactivé, le suivi du blocage des réseaux publicitaires, - la désactivation des cookies et du stockage du DOM et en utilisant un navigateur difficile à identifier.

- - -

Utiliser des Proxies

- -

Malgré leurs limites, les proxies peuvent être utiles dans certaines circonstances. - Tor et I2P - ont des applications Android qui facilitent l'utilisation de leurs réseaux proxy. - Lorsque le proxy est activé dans Privacy Browser, la barre d'application aura un fond bleu clair au lieu du gris clair par défaut. - Étant donné que le trafic est acheminé via plusieurs nœuds proxy, l'utilisation d'un proxy en couches est souvent beaucoup plus lente que la connexion directe à Internet.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_requests.html b/app/src/main/assets/fr/guide_requests.html new file mode 100644 index 00000000..885d9e4f --- /dev/null +++ b/app/src/main/assets/fr/guide_requests.html @@ -0,0 +1,88 @@ + + + + + + + + + + + + + +

Demandes de ressources

+ +

Lorsqu'une URL est chargée, elle effectue généralement un certain nombre de requêtes de ressources pour le CSS, JavaScript, des images et d'autres fichiers. + Les détails sur ces requêtes peuvent être consultés dans la vue Requêtes. + Le panneau de navigation contient un lien vers la vue Requêtes et indique également le nombre de requêtes bloquées. + Un appui sur une requête affiche les détails de la raison pour laquelle elle a été autorisée ou bloquée.

+ + + +

Privacy Browser inclus quatre listes noires communes basées sur la syntaxe d'Adblock: + EasyList, EasyPrivacy, Fanboy’s Annoyance List, et Fanboy’s Social Blocking List. + Ces listes noires sont executées par Privacy Browser dans les 22 sous-listes suivantes, qui vérifient les demandes de ressources dans l'ordre indiqué.

+ +
    +
  1. Main Whitelist
  2. +
  3. Final Whitelist
  4. +
  5. Domain Whitelist
  6. +
  7. Domain Initial Whitelist
  8. +
  9. Domain Final Whitelist
  10. +
  11. Third-Party Whitelist
  12. +
  13. Third-Party Domain Whitelist
  14. +
  15. Third-Party Domain Initial Whitelist
  16. +
  17. Main Blacklist
  18. +
  19. Initial Blacklist
  20. +
  21. Final Blacklist
  22. +
  23. Domain Blacklist
  24. +
  25. Domain Initial Blacklist
  26. +
  27. Domain Final Blacklist
  28. +
  29. Domain Regular Expression Blacklist
  30. +
  31. Third-Party Blacklist
  32. +
  33. Third-Party Initial Blacklist
  34. +
  35. Third-Party Domain Blacklist
  36. +
  37. Third-Party Domain Initial Blacklist
  38. +
  39. Third-Party Regular Expression Blacklist
  40. +
  41. Third-Party Domain Regular Expression Blacklist
  42. +
  43. Regular Expression Blacklist
  44. +
+ +

Les listes initiales sont comparées au début de l'URL. Les listes finales sont comparées à la fin de l'URL. Les listes de domaines ne vérifient que certains domaines. + Les listes tierces ne s'appliquent que si le domaine racine de la demande est différent du domaine racine de l'URL principale. + Les listes d'expressions régulières respectent la syntaxe d'expression régulière. + Chaque élément de sous-liste comporte une ou plusieurs entrées. + Dans le cas de sous-listes de domaines, la demande de ressource n'est vérifiée par rapport à l'élément que si la première entrée correspond au domaine de l'URL principale.

+ +

En raison des limitations de d'Android WebView et de l'accélération du traitement des demandes, Privacy Browser implémente une interprétation simplifiée de la syntaxe d'Adblock. + Cela peut parfois conduire à des faux positifs, dans lesquels les ressources sont autorisées ou bloquées d'une manière qui n'était pas prévue par l'entrée originale. + Une description plus détaillée du traitement des entrées de liste de blocage est disponible à l'adresse stoutner.com.

+ +

Privacy Browser a trois listes de blocage supplémentaires. + UltraList et UltraPrivacy + bloquent les annonces et les trackers que EasyList et EasyPrivacy ne font pas. Le troisième bloque toutes les demandes de tiers. + Une demande n'est considérée comme tierce que si le domaine de base de la demande est différent du domaine de base de l'URL. + Par exemple, si www.website.com charge une image à partir de images.website.com, + cette demande n'est pas bloquée en tant que demande tierce car elle partage le même domaine de base que website.com. + Le blocage de toutes les demandes de tiers augmente la confidentialité, mais cette liste de blocage est désactivée par défaut car elle perturbe un grand nombre de sites Web.

+ + \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_requests_dark.html b/app/src/main/assets/fr/guide_requests_dark.html deleted file mode 100644 index 67fa67b3..00000000 --- a/app/src/main/assets/fr/guide_requests_dark.html +++ /dev/null @@ -1,84 +0,0 @@ - - - - - - - - - - -

Demandes de ressources

- -

Lorsqu'une URL est chargée, elle effectue généralement un certain nombre de requêtes de ressources pour le CSS, JavaScript, des images et d'autres fichiers. - Les détails sur ces requêtes peuvent être consultés dans la vue Requêtes. - Le panneau de navigation contient un lien vers la vue Requêtes et indique également le nombre de requêtes bloquées. - Un appui sur une requête affiche les détails de la raison pour laquelle elle a été autorisée ou bloquée.

-

- -

Privacy Browser inclus quatre listes noires communes basées sur la syntaxe d'Adblock: - EasyList, EasyPrivacy, Fanboy’s Annoyance List, et Fanboy’s Social Blocking List. - Ces listes noires sont executées par Privacy Browser dans les 22 sous-listes suivantes, qui vérifient les demandes de ressources dans l'ordre indiqué.

- -
    -
  1. Main Whitelist
  2. -
  3. Final Whitelist
  4. -
  5. Domain Whitelist
  6. -
  7. Domain Initial Whitelist
  8. -
  9. Domain Final Whitelist
  10. -
  11. Third-Party Whitelist
  12. -
  13. Third-Party Domain Whitelist
  14. -
  15. Third-Party Domain Initial Whitelist
  16. -
  17. Main Blacklist
  18. -
  19. Initial Blacklist
  20. -
  21. Final Blacklist
  22. -
  23. Domain Blacklist
  24. -
  25. Domain Initial Blacklist
  26. -
  27. Domain Final Blacklist
  28. -
  29. Domain Regular Expression Blacklist
  30. -
  31. Third-Party Blacklist
  32. -
  33. Third-Party Initial Blacklist
  34. -
  35. Third-Party Domain Blacklist
  36. -
  37. Third-Party Domain Initial Blacklist
  38. -
  39. Third-Party Regular Expression Blacklist
  40. -
  41. Third-Party Domain Regular Expression Blacklist
  42. -
  43. Regular Expression Blacklist
  44. -
- -

Les listes initiales sont comparées au début de l'URL. Les listes finales sont comparées à la fin de l'URL. Les listes de domaines ne vérifient que certains domaines. - Les listes tierces ne s'appliquent que si le domaine racine de la demande est différent du domaine racine de l'URL principale. - Les listes d'expressions régulières respectent la syntaxe d'expression régulière. - Chaque élément de sous-liste comporte une ou plusieurs entrées. - Dans le cas de sous-listes de domaines, la demande de ressource n'est vérifiée par rapport à l'élément que si la première entrée correspond au domaine de l'URL principale.

- -

En raison des limitations de d'Android WebView et de l'accélération du traitement des demandes, Privacy Browser implémente une interprétation simplifiée de la syntaxe d'Adblock. - Cela peut parfois conduire à des faux positifs, dans lesquels les ressources sont autorisées ou bloquées d'une manière qui n'était pas prévue par l'entrée originale. - Une description plus détaillée du traitement des entrées de liste de blocage est disponible à l'adresse stoutner.com.

- -

Privacy Browser a trois listes de blocage supplémentaires. - UltraList et UltraPrivacy - bloquent les annonces et les trackers que EasyList et EasyPrivacy ne font pas. Le troisième bloque toutes les demandes de tiers. - Une demande n'est considérée comme tierce que si le domaine de base de la demande est différent du domaine de base de l'URL. - Par exemple, si www.website.com charge une image à partir de images.website.com, - cette demande n'est pas bloquée en tant que demande tierce car elle partage le même domaine de base que website.com. - Le blocage de toutes les demandes de tiers augmente la confidentialité, mais cette liste de blocage est désactivée par défaut car elle perturbe un grand nombre de sites Web.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_requests_light.html b/app/src/main/assets/fr/guide_requests_light.html deleted file mode 100644 index 9b4ab0a9..00000000 --- a/app/src/main/assets/fr/guide_requests_light.html +++ /dev/null @@ -1,84 +0,0 @@ - - - - - - - - - - -

Demandes de ressources

- -

Lorsqu'une URL est chargée, elle effectue généralement un certain nombre de requêtes de ressources pour le CSS, JavaScript, des images et d'autres fichiers. - Les détails sur ces requêtes peuvent être consultés dans la vue Requêtes. - Le panneau de navigation contient un lien vers la vue Requêtes et indique également le nombre de requêtes bloquées. - Un appui sur une requête affiche les détails de la raison pour laquelle elle a été autorisée ou bloquée.

-

- -

Privacy Browser inclus quatre listes noires communes basées sur la syntaxe d'Adblock: - EasyList, EasyPrivacy, Fanboy’s Annoyance List, et Fanboy’s Social Blocking List. - Ces listes noires sont executées par Privacy Browser dans les 22 sous-listes suivantes, qui vérifient les demandes de ressources dans l'ordre indiqué.

- -
    -
  1. Main Whitelist
  2. -
  3. Final Whitelist
  4. -
  5. Domain Whitelist
  6. -
  7. Domain Initial Whitelist
  8. -
  9. Domain Final Whitelist
  10. -
  11. Third-Party Whitelist
  12. -
  13. Third-Party Domain Whitelist
  14. -
  15. Third-Party Domain Initial Whitelist
  16. -
  17. Main Blacklist
  18. -
  19. Initial Blacklist
  20. -
  21. Final Blacklist
  22. -
  23. Domain Blacklist
  24. -
  25. Domain Initial Blacklist
  26. -
  27. Domain Final Blacklist
  28. -
  29. Domain Regular Expression Blacklist
  30. -
  31. Third-Party Blacklist
  32. -
  33. Third-Party Initial Blacklist
  34. -
  35. Third-Party Domain Blacklist
  36. -
  37. Third-Party Domain Initial Blacklist
  38. -
  39. Third-Party Regular Expression Blacklist
  40. -
  41. Third-Party Domain Regular Expression Blacklist
  42. -
  43. Regular Expression Blacklist
  44. -
- -

Les listes initiales sont comparées au début de l'URL. Les listes finales sont comparées à la fin de l'URL. Les listes de domaines ne vérifient que certains domaines. - Les listes tierces ne s'appliquent que si le domaine racine de la demande est différent du domaine racine de l'URL principale. - Les listes d'expressions régulières respectent la syntaxe d'expression régulière. - Chaque élément de sous-liste comporte une ou plusieurs entrées. - Dans le cas de sous-listes de domaines, la demande de ressource n'est vérifiée par rapport à l'élément que si la première entrée correspond au domaine de l'URL principale.

- -

En raison des limitations de d'Android WebView et de l'accélération du traitement des demandes, Privacy Browser implémente une interprétation simplifiée de la syntaxe d'Adblock. - Cela peut parfois conduire à des faux positifs, dans lesquels les ressources sont autorisées ou bloquées d'une manière qui n'était pas prévue par l'entrée originale. - Une description plus détaillée du traitement des entrées de liste de blocage est disponible à l'adresse stoutner.com.

- -

Privacy Browser a trois listes de blocage supplémentaires. - UltraList et UltraPrivacy - bloquent les annonces et les trackers que EasyList et EasyPrivacy ne font pas. Le troisième bloque toutes les demandes de tiers. - Une demande n'est considérée comme tierce que si le domaine de base de la demande est différent du domaine de base de l'URL. - Par exemple, si www.website.com charge une image à partir de images.website.com, - cette demande n'est pas bloquée en tant que demande tierce car elle partage le même domaine de base que website.com. - Le blocage de toutes les demandes de tiers augmente la confidentialité, mais cette liste de blocage est désactivée par défaut car elle perturbe un grand nombre de sites Web.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_ssl_certificates.html b/app/src/main/assets/fr/guide_ssl_certificates.html new file mode 100644 index 00000000..edbfe03c --- /dev/null +++ b/app/src/main/assets/fr/guide_ssl_certificates.html @@ -0,0 +1,58 @@ + + + + + + + + + + + + + +

Connectez-vous avec confiance

+ +

Lors de la visite d'une URL chiffrée (commençant par HTTPS), le serveur Web utilise un certificat SSL pour chiffrer les informations envoyées au navigateur et identifier le serveur. + L'identification du serveur a pour but d'empêcher une machine située entre le navigateur et le serveur Web de se faire passer pour le serveur et de décrypter les informations en transit. + Ce type d'attaque est connu sous le nom d'attaque MITM (Man In The Middle). + Les certificats SSL sont générés par les autorités de certification: sociétés qui vérifient l'identité d'un serveur et produisent un certificat contre rémunération. + Android dispose d'une liste d'autorités de certification de confiance et accepte n'importe lequel de ses certificats, quel que soit son site Web. + Il n'est pas censé être possible pour une entreprise d'acquérir un certificat SSL pour un domaine qu'elle ne contrôle pas. + mais dans la pratique, de nombreux gouvernements et grandes entreprises ont pu le faire.

+ +

Épingler un certificat SSL indique au navigateur qu'un seul certificat SSL spécifique doit être approuvé pour un domaine particulier. Tout autre certificat, même s'il est valide, sera rejeté.

+ + + +

Les certificats SSL expirent à une date spécifiée. Par conséquent, même les certificats SSL épinglés devront légitimement être mis à jour de temps à autre. + En règle générale, l'épinglage de certificats SSL n'est probablement pas nécessaire dans la majorité des cas. + Mais pour ceux qui soupçonnent que des organisations puissantes pourraient les cibler, l'identification de certificats SSL peut détecter et contrecarrer une attaque MITM. + Privacy Browser peut également épingler des adresses IP.

+ + + +

Les certificats SSL peuvent être épinglés dans les paramètres du domaine. + Outre la protection contre les attaques MITM, + épingler un certificat auto-signé pour un périphérique tel qu'un routeur sans fil ou un point d'accès supprimera le message d'erreur normalement affiché à chaque chargement de son site Web. + Tapez sur l'onglet actif pour afficher le certificat SSL du site Web courant.

+ + \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_ssl_certificates_dark.html b/app/src/main/assets/fr/guide_ssl_certificates_dark.html deleted file mode 100644 index bf80a712..00000000 --- a/app/src/main/assets/fr/guide_ssl_certificates_dark.html +++ /dev/null @@ -1,55 +0,0 @@ - - - - - - - - - - -

Connectez-vous avec confiance

- -

Lors de la visite d'une URL chiffrée (commençant par HTTPS), le serveur Web utilise un certificat SSL pour chiffrer les informations envoyées au navigateur et identifier le serveur. - L'identification du serveur a pour but d'empêcher une machine située entre le navigateur et le serveur Web de se faire passer pour le serveur et de décrypter les informations en transit. - Ce type d'attaque est connu sous le nom d'attaque MITM (Man In The Middle). - Les certificats SSL sont générés par les autorités de certification: sociétés qui vérifient l'identité d'un serveur et produisent un certificat contre rémunération. - Android dispose d'une liste d'autorités de certification de confiance et accepte n'importe lequel de ses certificats, quel que soit son site Web. - Il n'est pas censé être possible pour une entreprise d'acquérir un certificat SSL pour un domaine qu'elle ne contrôle pas. - mais dans la pratique, de nombreux gouvernements et grandes entreprises ont pu le faire.

- -

Épingler un certificat SSL indique au navigateur qu'un seul certificat SSL spécifique doit être approuvé pour un domaine particulier. Tout autre certificat, même s'il est valide, sera rejeté.

- -

- -

Les certificats SSL expirent à une date spécifiée. Par conséquent, même les certificats SSL épinglés devront légitimement être mis à jour de temps à autre. - En règle générale, l'épinglage de certificats SSL n'est probablement pas nécessaire dans la majorité des cas. - Mais pour ceux qui soupçonnent que des organisations puissantes pourraient les cibler, l'identification de certificats SSL peut détecter et contrecarrer une attaque MITM. - Privacy Browser peut également épingler des adresses IP.

- -

- -

Les certificats SSL peuvent être épinglés dans les paramètres du domaine. - Outre la protection contre les attaques MITM, - épingler un certificat auto-signé pour un périphérique tel qu'un routeur sans fil ou un point d'accès supprimera le message d'erreur normalement affiché à chaque chargement de son site Web. - Tapez sur l'onglet actif pour afficher le certificat SSL du site Web courant.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_ssl_certificates_light.html b/app/src/main/assets/fr/guide_ssl_certificates_light.html deleted file mode 100644 index f9592123..00000000 --- a/app/src/main/assets/fr/guide_ssl_certificates_light.html +++ /dev/null @@ -1,55 +0,0 @@ - - - - - - - - - - -

Connectez-vous avec confiance

- -

Lors de la visite d'une URL chiffrée (commençant par HTTPS), le serveur Web utilise un certificat SSL pour chiffrer les informations envoyées au navigateur et identifier le serveur. - L'identification du serveur a pour but d'empêcher une machine située entre le navigateur et le serveur Web de se faire passer pour le serveur et de décrypter les informations en transit. - Ce type d'attaque est connu sous le nom d'attaque MITM (Man In The Middle). - Les certificats SSL sont générés par les autorités de certification: sociétés qui vérifient l'identité d'un serveur et produisent un certificat contre rémunération. - Android dispose d'une liste d'autorités de certification de confiance et accepte n'importe lequel de ses certificats, quel que soit son site Web. - Il n'est pas censé être possible pour une entreprise d'acquérir un certificat SSL pour un domaine qu'elle ne contrôle pas. - mais dans la pratique, de nombreux gouvernements et grandes entreprises ont pu le faire.

- -

Épingler un certificat SSL indique au navigateur qu'un seul certificat SSL spécifique doit être approuvé pour un domaine particulier. Tout autre certificat, même s'il est valide, sera rejeté.

- -

- -

Les certificats SSL expirent à une date spécifiée. Par conséquent, même les certificats SSL épinglés devront légitimement être mis à jour de temps à autre. - En règle générale, l'épinglage de certificats SSL n'est probablement pas nécessaire dans la majorité des cas. - Mais pour ceux qui soupçonnent que des organisations puissantes pourraient les cibler, l'identification de certificats SSL peut détecter et contrecarrer une attaque MITM. - Privacy Browser peut également épingler des adresses IP.

- -

- -

Les certificats SSL peuvent être épinglés dans les paramètres du domaine. - Outre la protection contre les attaques MITM, - épingler un certificat auto-signé pour un périphérique tel qu'un routeur sans fil ou un point d'accès supprimera le message d'erreur normalement affiché à chaque chargement de son site Web. - Tapez sur l'onglet actif pour afficher le certificat SSL du site Web courant.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_tracking_ids.html b/app/src/main/assets/fr/guide_tracking_ids.html new file mode 100644 index 00000000..78ff4f4a --- /dev/null +++ b/app/src/main/assets/fr/guide_tracking_ids.html @@ -0,0 +1,46 @@ + + + + + + + + + + + + + +

Ne pas me suivre

+ +

Il y a quelques années, le W3C (Consortium World Wide Web) a créé un mécanisme permettant aux navigateurs d'informer les serveurs Web qu'ils ne voudraient pas être suivis. + Ceci est réalisé en incluant un en-tête DNT (Ne pas suivre) avec les requêtes Web.

+ +

L'en-tête DNT ne fournit pas vraiment de confidentialité car la plupart des serveurs Web l'ignorent. + Par exemple, Yahoo, Google, Microsoft et Facebook ignorent tous au moins certains en-têtes DNT.

+ + +

Modification d'URLs

+ +

Privacy Browser supprime les sections d'ID de suivi des URLs, telles que ?utm_ dans Google Analytics et + ?fbclick= à partir de Facebook. La modification de l'URL peut être désactivée dans les paramètres si cela cause des problèmes.

+ + \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_tracking_ids_dark.html b/app/src/main/assets/fr/guide_tracking_ids_dark.html deleted file mode 100644 index a3a1654d..00000000 --- a/app/src/main/assets/fr/guide_tracking_ids_dark.html +++ /dev/null @@ -1,43 +0,0 @@ - - - - - - - - - - -

Ne pas me suivre

- -

Il y a quelques années, le W3C (Consortium World Wide Web) a créé un mécanisme permettant aux navigateurs d'informer les serveurs Web qu'ils ne voudraient pas être suivis. - Ceci est réalisé en incluant un en-tête DNT (Ne pas suivre) avec les requêtes Web.

- -

L'en-tête DNT ne fournit pas vraiment de confidentialité car la plupart des serveurs Web l'ignorent. - Par exemple, Yahoo, Google, Microsoft et Facebook ignorent tous au moins certains en-têtes DNT.

- - -

Modification d'URLs

- -

Privacy Browser supprime les sections d'ID de suivi des URLs, telles que ?utm_ dans Google Analytics et - ?fbclick= à partir de Facebook. La modification de l'URL peut être désactivée dans les paramètres si cela cause des problèmes.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_tracking_ids_light.html b/app/src/main/assets/fr/guide_tracking_ids_light.html deleted file mode 100644 index 45aba978..00000000 --- a/app/src/main/assets/fr/guide_tracking_ids_light.html +++ /dev/null @@ -1,43 +0,0 @@ - - - - - - - - - - -

Ne pas me suivre

- -

Il y a quelques années, le W3C (Consortium World Wide Web) a créé un mécanisme permettant aux navigateurs d'informer les serveurs Web qu'ils ne voudraient pas être suivis. - Ceci est réalisé en incluant un en-tête DNT (Ne pas suivre) avec les requêtes Web.

- -

L'en-tête DNT ne fournit pas vraiment de confidentialité car la plupart des serveurs Web l'ignorent. - Par exemple, Yahoo, Google, Microsoft et Facebook ignorent tous au moins certains en-têtes DNT.

- - -

Modification d'URLs

- -

Privacy Browser supprime les sections d'ID de suivi des URLs, telles que ?utm_ dans Google Analytics et - ?fbclick= à partir de Facebook. La modification de l'URL peut être désactivée dans les paramètres si cela cause des problèmes.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_user_agent.html b/app/src/main/assets/fr/guide_user_agent.html new file mode 100644 index 00000000..73e2e1d8 --- /dev/null +++ b/app/src/main/assets/fr/guide_user_agent.html @@ -0,0 +1,68 @@ + + + + + + + + + + + + + +

Identification du navigateur

+ +

Lorsque les navigateurs Web se connectent à des sites Web, ils envoient un agent utilisateur, qui identifie le navigateur et les fonctionnalités de rendu dont il dispose. + Le serveur Web peut utiliser ces informations pour choisir la version du site Web à envoyer au navigateur. + Par exemple, de nombreux sites Web ont des versions différentes pour les navigateurs de bureau et mobiles.

+ +

Par défaut, Privacy Browser utilise son propre agent utilisateur, à savoir PrivacyBrowser/1.0. Cela envoie un minimum d'informations au serveur Web. + Étant donné que les serveurs Web ne reconnaissent pas qu'il s'agit d'un agent d'utilisateur mobile, ils affichent généralement la version de bureau du site.

+ +

En comparaison, l'agent utilisateur par défaut de WebView divulgue une grande quantité d'informations sur le matériel et les logiciels du périphérique. + Sur l'écran Paramètres, sélectionner WebView Par défaut car l'Agent utilisateur affiche l'agent utilisateur qui sera envoyé. + La capture d'écran ci-dessous montre un Pixel 2 XL sous Android 10 avec Android System WebView 84.0.4147.125 installé. + La plupart des serveurs Web le reconnaîtront comme un navigateur mobile et afficheront la version mobile du site, le cas échéant.

+ + + +

L'agent utilisateur contient suffisamment d'informations pour que, parfois, seuls quelques visiteurs d'un site Web soient identiques. + Si l'agent utilisateur est combiné à une autre information d'identification non unique, il en résulte souvent une empreinte digitale unique. + Electronic Frontier Foundation a créé un outil appelé Panopticlick + afin de démontrer la quantité d'informations pouvant être collectées à partir de ces sources. + Si ce test est exécuté avec JavaScript activé, la quantité d'informations divulguées augmente considérablement. + Les Fuites du navigateur et les Suis-je unique sont également de bonnes sources d'informations sur ce sujet.

+ + + +

Il existe plusieurs agents d'utilisateur prédéfinis qui correspondent aux navigateurs et systèmes d'exploitation courants. + Pour les empreintes digitales du navigateur, tout ce qui est rare est plus facile à suivre. + Si Privacy Browser devient commun et que de nombreuses personnes utilisent PrivacyBrowser/1.0 en tant qu'agent utilisateur, ce sera un bon choix pour la confidentialité. + Firefox ou Chrome sont les agents utilisateurs les plus courants, mais ils se mettent à jour automatiquement et leurs numéros de version changent si rapidement + qu'il est probable que les agents utilisateurs inclus dans Privacy Browser soient souvent en décalage avec la majorité des agents utilisateurs dans les journaux du serveur.

+ +

Certains sites Web ne fonctionnent pas correctement s'ils ne reconnaissent pas l'agent utilisateur. + L'utilisation des paramètrages de domaine pour définir l'agent utilisateur sur WebView par défaut , + ou sur un autre agent utilisateur communément reconnu, résout généralement le problème. + WebView d'Android ne permet pas à l'agent utilisateur d'être vide. Si tel est le cas, WebView envoie simplement l'agent utilisateur par défaut au serveur.

+ + \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_user_agent_dark.html b/app/src/main/assets/fr/guide_user_agent_dark.html deleted file mode 100644 index 7b570651..00000000 --- a/app/src/main/assets/fr/guide_user_agent_dark.html +++ /dev/null @@ -1,65 +0,0 @@ - - - - - - - - - - -

Identification du navigateur

- -

Lorsque les navigateurs Web se connectent à des sites Web, ils envoient un agent utilisateur, qui identifie le navigateur et les fonctionnalités de rendu dont il dispose. - Le serveur Web peut utiliser ces informations pour choisir la version du site Web à envoyer au navigateur. - Par exemple, de nombreux sites Web ont des versions différentes pour les navigateurs de bureau et mobiles.

- -

Par défaut, Privacy Browser utilise son propre agent utilisateur, à savoir PrivacyBrowser/1.0. Cela envoie un minimum d'informations au serveur Web. - Étant donné que les serveurs Web ne reconnaissent pas qu'il s'agit d'un agent d'utilisateur mobile, ils affichent généralement la version de bureau du site.

- -

En comparaison, l'agent utilisateur par défaut de WebView divulgue une grande quantité d'informations sur le matériel et les logiciels du périphérique. - Sur l'écran Paramètres, sélectionner WebView Par défaut car l'Agent utilisateur affiche l'agent utilisateur qui sera envoyé. - La capture d'écran ci-dessous montre un Pixel 2 XL sous Android 10 avec Android System WebView 84.0.4147.125 installé. - La plupart des serveurs Web le reconnaîtront comme un navigateur mobile et afficheront la version mobile du site, le cas échéant.

- - - -

L'agent utilisateur contient suffisamment d'informations pour que, parfois, seuls quelques visiteurs d'un site Web soient identiques. - Si l'agent utilisateur est combiné à une autre information d'identification non unique, il en résulte souvent une empreinte digitale unique. - Electronic Frontier Foundation a créé un outil appelé Panopticlick - afin de démontrer la quantité d'informations pouvant être collectées à partir de ces sources. - Si ce test est exécuté avec JavaScript activé, la quantité d'informations divulguées augmente considérablement. - Les Fuites du navigateur et les Suis-je unique sont également de bonnes sources d'informations sur ce sujet.

- - - -

Il existe plusieurs agents d'utilisateur prédéfinis qui correspondent aux navigateurs et systèmes d'exploitation courants. - Pour les empreintes digitales du navigateur, tout ce qui est rare est plus facile à suivre. - Si Privacy Browser devient commun et que de nombreuses personnes utilisent PrivacyBrowser/1.0 en tant qu'agent utilisateur, ce sera un bon choix pour la confidentialité. - Firefox ou Chrome sont les agents utilisateurs les plus courants, mais ils se mettent à jour automatiquement et leurs numéros de version changent si rapidement - qu'il est probable que les agents utilisateurs inclus dans Privacy Browser soient souvent en décalage avec la majorité des agents utilisateurs dans les journaux du serveur.

- -

Certains sites Web ne fonctionnent pas correctement s'ils ne reconnaissent pas l'agent utilisateur. - L'utilisation des paramètrages de domaine pour définir l'agent utilisateur sur WebView par défaut , - ou sur un autre agent utilisateur communément reconnu, résout généralement le problème. - WebView d'Android ne permet pas à l'agent utilisateur d'être vide. Si tel est le cas, WebView envoie simplement l'agent utilisateur par défaut au serveur.

- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_user_agent_light.html b/app/src/main/assets/fr/guide_user_agent_light.html deleted file mode 100644 index 2529c193..00000000 --- a/app/src/main/assets/fr/guide_user_agent_light.html +++ /dev/null @@ -1,65 +0,0 @@ - - - - - - - - - - -

Identification du navigateur

- -

Lorsque les navigateurs Web se connectent à des sites Web, ils envoient un agent utilisateur, qui identifie le navigateur et les fonctionnalités de rendu dont il dispose. - Le serveur Web peut utiliser ces informations pour choisir la version du site Web à envoyer au navigateur. - Par exemple, de nombreux sites Web ont des versions différentes pour les navigateurs de bureau et mobiles.

- -

Par défaut, Privacy Browser utilise son propre agent utilisateur, à savoir PrivacyBrowser/1.0. Cela envoie un minimum d'informations au serveur Web. - Étant donné que les serveurs Web ne reconnaissent pas qu'il s'agit d'un agent d'utilisateur mobile, ils affichent généralement la version de bureau du site.

- -

En comparaison, l'agent utilisateur par défaut de WebView divulgue une grande quantité d'informations sur le matériel et les logiciels du périphérique. - Sur l'écran Paramètres, sélectionner WebView Par défaut car l'Agent utilisateur affiche l'agent utilisateur qui sera envoyé. - La capture d'écran ci-dessous montre un Pixel 2 XL sous Android 10 avec Android System WebView 84.0.4147.125 installé. - La plupart des serveurs Web le reconnaîtront comme un navigateur mobile et afficheront la version mobile du site, le cas échéant.

- - - -

L'agent utilisateur contient suffisamment d'informations pour que, parfois, seuls quelques visiteurs d'un site Web soient identiques. - Si l'agent utilisateur est combiné à une autre information d'identification non unique, il en résulte souvent une empreinte digitale unique. - Electronic Frontier Foundation a créé un outil appelé Panopticlick - afin de démontrer la quantité d'informations pouvant être collectées à partir de ces sources. - Si ce test est exécuté avec JavaScript activé, la quantité d'informations divulguées augmente considérablement. - Les Fuites du navigateur et les Suis-je unique sont également de bonnes sources d'informations sur ce sujet.

- - - -

Il existe plusieurs agents d'utilisateur prédéfinis qui correspondent aux navigateurs et systèmes d'exploitation courants. - Pour les empreintes digitales du navigateur, tout ce qui est rare est plus facile à suivre. - Si Privacy Browser devient commun et que de nombreuses personnes utilisent PrivacyBrowser/1.0 en tant qu'agent utilisateur, ce sera un bon choix pour la confidentialité. - Firefox ou Chrome sont les agents utilisateurs les plus courants, mais ils se mettent à jour automatiquement et leurs numéros de version changent si rapidement - qu'il est probable que les agents utilisateurs inclus dans Privacy Browser soient souvent en décalage avec la majorité des agents utilisateurs dans les journaux du serveur.

- -

Certains sites Web ne fonctionnent pas correctement s'ils ne reconnaissent pas l'agent utilisateur. - L'utilisation des paramètrages de domaine pour définir l'agent utilisateur sur WebView par défaut , - ou sur un autre agent utilisateur communément reconnu, résout généralement le problème. - WebView d'Android ne permet pas à l'agent utilisateur d'être vide. Si tel est le cas, WebView envoie simplement l'agent utilisateur par défaut au serveur.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/about_changelog.html b/app/src/main/assets/it/about_changelog.html new file mode 100644 index 00000000..7b8c72c4 --- /dev/null +++ b/app/src/main/assets/it/about_changelog.html @@ -0,0 +1,698 @@ + + + + + + + + + + + + + +

3.5.1 (versione codice 51)

+

28 Agosto 2020 - minima API 19, target API 29

+
    +
  • Correzione di un baco che impediva il caricamento + di link da altre applicazioni se Privacy Browser era stato chiuso dal sistema operativo in background.
  • +
  • Correzione di un baco che impediva alla app di inizializzarsi correttamente + quando il tema della app era impostato all'opposto di quello del sistema operativo.
  • +
+ +

3.5 (versione codice 50)

+

18 Agosto 2020 - minima API 19, target API 29

+ + +

3.4.1 (versione codice 49)

+

1 Aprile 2020 - minima API 19, target API 29

+ + +

3.4 (versione codice 48)

+

28 Marzo 2020 - minima API 19, target API 29

+ + +

3.3 (versione codice 47)

+

3 Gennaio 2020 - minima API 19, target API 29

+ + +

3.2 (versione codice 46)

+

20 Luglio 2019 - minima API 19, target API 28

+ + +

3.1 (versione codice 45)

+

27 Maggio 2019 - minima API 19, target API 28

+ + +

3.0.1 (versione codice 44)

+

2 Maggio 2019 - minima API 19, target API 28

+ + +

3.0 (versione codice 43)

+

26 Aprile 2019 - minima API 19, target API 28

+
    +
  • Aggiunta della navigazione a schede.
  • +
  • Correzione di un baco che tagliava la parte bassa di WebView quando era disabilitato lo scrolling della barra dell'applicazione.
  • +
  • Correzione di un baco che provocava il riavvio di Privacy Browser ogni volata che veniva connessa o disconnessa una tastiera Bluetooth.
  • +
  • Aggiornamento della traduzione Italiana fornita da Francesco Buratti.
  • +
  • Aggiornamento della traduzione in Russo.
  • +
  • Aggiornamento della traduzione Spagnola fornita da Jose A. León.
  • +
  • Aggiornamento della traduzione Tedesco fornita da Bernhard G. Keller.
  • +
  • Traduzione parziale in Turco.
  • +
+ +

2.17.1 (versione codice 42)

+

5 Marzo 2019 - minima API 19, target API 28

+
    +
  • Correzione di un baco causato da segnalibri con icona troppo grande.
  • +
  • Introduzione della possibilità di spostare Privacy Browser su memoria SD.
  • +
+ +

2.17 (versione codice 41)

+

27 Febbraio 2019 - minima API 19, target API 28

+ + +

2.16 (versione codice 40)

+

31 Gennaio 2019 - minima API 19, target API 28

+ + +

2.15.1 (versione codice 39)

+

27 Dicembre 2018 - minima API 19, target API 28

+ + +

2.15 (versione codice 38)

+

24 Dicembre 2018 - minima API 19, target API 28

+ + +

2.14 (versione codice 37)

+

8 Dicembre 2018 - minima API 19, target API 28

+ + +

2.13 (versione codice 36)

+

29 Ottobre 2018 - minima API 19, target API 28

+ + +

2.12 (versione codice 35)

+

31 Luglio 2018 - minima API 19, target API 27

+ + +

2.11 (versione codice 34)

+

10 Luglio 2018 - minima API 19, target API 27

+ + +

2.10 (versione codice 33)

+

24 Maggio 2018 - minima API 19, target API 27

+ + +

2.9 (versione codice 32)

+

9 Maggio 2018 - minima API 19, target API 27

+ + +

2.8.1 (versione codice 31)

+

1 Marzo 2018 - minima API 19, target API 27

+ + +

2.8 (versione codice 30)

+

22 Febbraio 2018 - minima API 19, target API 27

+ + +

2.7.2 (versione codice 29)

+

22 Novembre 2017 - minima API 19, target API 26

+ + +

2.7.1 (versione codice 28)

+

9 Novembre 2017 - minima API 19, target API 26

+
    +
  • Eliminato un crash che si verificava nel caso di editing dei segnalibri dal nuovo cassetto dei segnalibri.
  • +
+ +

2.7 (versione codice 27)

+

7 Novembre 2017 - minima API 19, target API 26

+
    +
  • Aggiunta di un cassetto dei segnalibri accessibile scorrendo da destra.
  • +
  • Corretto un difetto della Modalità Notte per cui appariva uno sfondo bianco durante il caricamento di pagine nuove.
  • +
  • Aggiornamento degli user agents.
  • +
  • Adeguamento della API target a 26 (Android Oreo, 8.0.0).
  • +
  • Aggiornamento della traduzione Italiana fornita da Francesco Buratti.
  • +
  • Aggiornamento della traduzione Spagnola fornita da Jose A. León.
  • +
+ +

2.6 (versione codice 26)

+

18 Settembre 2017 - minima API 19, target API 25

+ + +

2.5 (versione codice 25)

+

26 Agosto 2017 - minima API 19, target API 25

+ + +

2.4 (versione codice 24)

+

23 Giugno 2017 - minima API 19, target API 25

+ + +

2.3 (versione codice 23)

+

26 Maggio 2017 - minima API 19, target API 25

+ + +

2.2 (versione codice 22)

+

27 Aprile 2017 - minima API 19, target API 25

+ + +

2.1 (versione codice 21)

+

25 Marzo 2017 - minima API 19, target API 25

+ + +

2.0.1 (versione codice 20)

+

21 Marzo 2017 - minima API 19, target API 25

+ + +

2.0 (versione codice 19)

+

16 Marzo 2017 - minima API 19, target API 25

+ + +

1.15 (versione codice 18)

+

11 Febbraio 2017 - minima API 19, target API 25

+ + +

1.14.1 (versione codice 17)

+

4 Gennaio 2017 - minima API 19, target API 25

+ + +

1.14 (versione codice 16)

+

26 Dicembre 2016 - minima API 19, target API 25

+ + +

1.13 (versione codice 15)

+

28 Novembre 2016 - minima API 19, target API 24

+ + +

1.12 (versione codice 14)

+

9 Novembre 2016 - minima API 19, target API 24

+ + +

1.11 (versione codice 13)

+

22 Ottobre 2016 - minima API 19, target API 24

+ + +

1.10 (versione codice 12)

+

15 Settembre 2016 - minima API 19, target API 23

+ + +

1.9.1 (versione codice 11)

+

27 Agosto 2016 - minima API 19, target API 23

+
    +
  • Changed asset image links to relative paths so Privacy Browser will build on F-Droid.
  • +
+ +

1.9 (versione codice 10)

+

26 Agosto 2016 - minima API 19, target API 23

+ + +

1.8 (versione codice 9)

+

16 Luglio 2016 - minima API 19, target API 23

+ + +

1.7 (versione codice 8)

+

16 Giugno 2016 - minima API 19, target API 23

+ + +

1.6 (versione codice 7)

+

11 Maggio 2016 - minima API 15, target API 23

+ + +

1.5 (versione codice 6)

+

5 Maggio 2016 - minima API 15, target API 23

+
    +
  • Add the option to disable swipe to refresh so that certain websites, like Google Maps, will function correctly.
  • +
+ +

1.4 (versione codice 5)

+

28 Aprile 2016 - minima API 15, target API 23

+ + +

1.3 (versione codice 4)

+

7 Aprile 2016 - minima API 15, target API 23

+ + +

1.2 (versione codice 3)

+

23 Marzo 2016 - minima API 15, target API 23

+ + +

1.1 (versione codice 2)

+

9 Marzo 2016 - minima API 10, target API 23

+
    +
  • Separate the standard and the free flavors so that Privacy Browser builds correctly on F-Droid.
  • +
+ +

1.0 (versione codice 1)

+

24 Febbraio 2016 - minima API 10, target API 23

+
    +
  • Toggle JavaScript, DOM storage, and cookies.
  • +
  • Set default enabled status for JavaScript, DOM storage, and cookies.
  • +
  • Clear DOM storage and cookies.
  • +
  • Add shortcuts to the home screen.
  • +
  • Utilize download manager.
  • +
  • Navigate forward and back.
  • +
  • Cut, copy, paste URLs.
  • +
  • Share URLs.
  • +
  • Set homepage.
  • +
  • Scroll URL bar.
  • +
  • Maintain WebView scroll location when rotating screen.
  • +
  • Swipe to refresh WebView.
  • +
  • Play full screen videos (requires JavaScript to be enabled).
  • +
  • Clear and Exit menu item.
  • +
+ + \ No newline at end of file diff --git a/app/src/main/assets/it/about_changelog_dark.html b/app/src/main/assets/it/about_changelog_dark.html deleted file mode 100644 index 67d2d56d..00000000 --- a/app/src/main/assets/it/about_changelog_dark.html +++ /dev/null @@ -1,695 +0,0 @@ - - - - - - - - - - -

3.5.1 (versione codice 51)

-

28 Agosto 2020 - minima API 19, target API 29

-
    -
  • Correzione di un baco che impediva il caricamento - di link da altre applicazioni se Privacy Browser era stato chiuso dal sistema operativo in background.
  • -
  • Correzione di un baco che impediva alla app di inizializzarsi correttamente - quando il tema della app era impostato all'opposto di quello del sistema operativo.
  • -
- -

3.5 (versione codice 50)

-

18 Agosto 2020 - minima API 19, target API 29

- - -

3.4.1 (versione codice 49)

-

1 Aprile 2020 - minima API 19, target API 29

- - -

3.4 (versione codice 48)

-

28 Marzo 2020 - minima API 19, target API 29

- - -

3.3 (versione codice 47)

-

3 Gennaio 2020 - minima API 19, target API 29

- - -

3.2 (versione codice 46)

-

20 Luglio 2019 - minima API 19, target API 28

- - -

3.1 (versione codice 45)

-

27 Maggio 2019 - minima API 19, target API 28

- - -

3.0.1 (versione codice 44)

-

2 Maggio 2019 - minima API 19, target API 28

- - -

3.0 (versione codice 43)

-

26 Aprile 2019 - minima API 19, target API 28

-
    -
  • Aggiunta della navigazione a schede.
  • -
  • Correzione di un baco che tagliava la parte bassa di WebView quando era disabilitato lo scrolling della barra dell'applicazione.
  • -
  • Correzione di un baco che provocava il riavvio di Privacy Browser ogni volata che veniva connessa o disconnessa una tastiera Bluetooth.
  • -
  • Aggiornamento della traduzione Italiana fornita da Francesco Buratti.
  • -
  • Aggiornamento della traduzione in Russo.
  • -
  • Aggiornamento della traduzione Spagnola fornita da Jose A. León.
  • -
  • Aggiornamento della traduzione Tedesco fornita da Bernhard G. Keller.
  • -
  • Traduzione parziale in Turco.
  • -
- -

2.17.1 (versione codice 42)

-

5 Marzo 2019 - minima API 19, target API 28

-
    -
  • Correzione di un baco causato da segnalibri con icona troppo grande.
  • -
  • Introduzione della possibilità di spostare Privacy Browser su memoria SD.
  • -
- -

2.17 (versione codice 41)

-

27 Febbraio 2019 - minima API 19, target API 28

- - -

2.16 (versione codice 40)

-

31 Gennaio 2019 - minima API 19, target API 28

- - -

2.15.1 (versione codice 39)

-

27 Dicembre 2018 - minima API 19, target API 28

- - -

2.15 (versione codice 38)

-

24 Dicembre 2018 - minima API 19, target API 28

- - -

2.14 (versione codice 37)

-

8 Dicembre 2018 - minima API 19, target API 28

- - -

2.13 (versione codice 36)

-

29 Ottobre 2018 - minima API 19, target API 28

- - -

2.12 (versione codice 35)

-

31 Luglio 2018 - minima API 19, target API 27

- - -

2.11 (versione codice 34)

-

10 Luglio 2018 - minima API 19, target API 27

- - -

2.10 (versione codice 33)

-

24 Maggio 2018 - minima API 19, target API 27

- - -

2.9 (versione codice 32)

-

9 Maggio 2018 - minima API 19, target API 27

- - -

2.8.1 (versione codice 31)

-

1 Marzo 2018 - minima API 19, target API 27

- - -

2.8 (versione codice 30)

-

22 Febbraio 2018 - minima API 19, target API 27

- - -

2.7.2 (versione codice 29)

-

22 Novembre 2017 - minima API 19, target API 26

- - -

2.7.1 (versione codice 28)

-

9 Novembre 2017 - minima API 19, target API 26

-
    -
  • Eliminato un crash che si verificava nel caso di editing dei segnalibri dal nuovo cassetto dei segnalibri.
  • -
- -

2.7 (versione codice 27)

-

7 Novembre 2017 - minima API 19, target API 26

-
    -
  • Aggiunta di un cassetto dei segnalibri accessibile scorrendo da destra.
  • -
  • Corretto un difetto della Modalità Notte per cui appariva uno sfondo bianco durante il caricamento di pagine nuove.
  • -
  • Aggiornamento degli user agents.
  • -
  • Adeguamento della API target a 26 (Android Oreo, 8.0.0).
  • -
  • Aggiornamento della traduzione Italiana fornita da Francesco Buratti.
  • -
  • Aggiornamento della traduzione Spagnola fornita da Jose A. León.
  • -
- -

2.6 (versione codice 26)

-

18 Settembre 2017 - minima API 19, target API 25

- - -

2.5 (versione codice 25)

-

26 Agosto 2017 - minima API 19, target API 25

- - -

2.4 (versione codice 24)

-

23 Giugno 2017 - minima API 19, target API 25

- - -

2.3 (versione codice 23)

-

26 Maggio 2017 - minima API 19, target API 25

- - -

2.2 (versione codice 22)

-

27 Aprile 2017 - minima API 19, target API 25

- - -

2.1 (versione codice 21)

-

25 Marzo 2017 - minima API 19, target API 25

- - -

2.0.1 (versione codice 20)

-

21 Marzo 2017 - minima API 19, target API 25

- - -

2.0 (versione codice 19)

-

16 Marzo 2017 - minima API 19, target API 25

- - -

1.15 (versione codice 18)

-

11 Febbraio 2017 - minima API 19, target API 25

- - -

1.14.1 (versione codice 17)

-

4 Gennaio 2017 - minima API 19, target API 25

- - -

1.14 (versione codice 16)

-

26 Dicembre 2016 - minima API 19, target API 25

- - -

1.13 (versione codice 15)

-

28 Novembre 2016 - minima API 19, target API 24

- - -

1.12 (versione codice 14)

-

9 Novembre 2016 - minima API 19, target API 24

- - -

1.11 (versione codice 13)

-

22 Ottobre 2016 - minima API 19, target API 24

- - -

1.10 (versione codice 12)

-

15 Settembre 2016 - minima API 19, target API 23

- - -

1.9.1 (versione codice 11)

-

27 Agosto 2016 - minima API 19, target API 23

-
    -
  • Changed asset image links to relative paths so Privacy Browser will build on F-Droid.
  • -
- -

1.9 (versione codice 10)

-

26 Agosto 2016 - minima API 19, target API 23

- - -

1.8 (versione codice 9)

-

16 Luglio 2016 - minima API 19, target API 23

- - -

1.7 (versione codice 8)

-

16 Giugno 2016 - minima API 19, target API 23

- - -

1.6 (versione codice 7)

-

11 Maggio 2016 - minima API 15, target API 23

- - -

1.5 (versione codice 6)

-

5 Maggio 2016 - minima API 15, target API 23

-
    -
  • Add the option to disable swipe to refresh so that certain websites, like Google Maps, will function correctly.
  • -
- -

1.4 (versione codice 5)

-

28 Aprile 2016 - minima API 15, target API 23

- - -

1.3 (versione codice 4)

-

7 Aprile 2016 - minima API 15, target API 23

- - -

1.2 (versione codice 3)

-

23 Marzo 2016 - minima API 15, target API 23

- - -

1.1 (versione codice 2)

-

9 Marzo 2016 - minima API 10, target API 23

-
    -
  • Separate the standard and the free flavors so that Privacy Browser builds correctly on F-Droid.
  • -
- -

1.0 (versione codice 1)

-

24 Febbraio 2016 - minima API 10, target API 23

-
    -
  • Toggle JavaScript, DOM storage, and cookies.
  • -
  • Set default enabled status for JavaScript, DOM storage, and cookies.
  • -
  • Clear DOM storage and cookies.
  • -
  • Add shortcuts to the home screen.
  • -
  • Utilize download manager.
  • -
  • Navigate forward and back.
  • -
  • Cut, copy, paste URLs.
  • -
  • Share URLs.
  • -
  • Set homepage.
  • -
  • Scroll URL bar.
  • -
  • Maintain WebView scroll location when rotating screen.
  • -
  • Swipe to refresh WebView.
  • -
  • Play full screen videos (requires JavaScript to be enabled).
  • -
  • Clear and Exit menu item.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/it/about_changelog_light.html b/app/src/main/assets/it/about_changelog_light.html deleted file mode 100644 index fbac6d69..00000000 --- a/app/src/main/assets/it/about_changelog_light.html +++ /dev/null @@ -1,695 +0,0 @@ - - - - - - - - - - -

3.5.1 (versione codice 51)

-

28 Agosto 2020 - minima API 19, target API 29

-
    -
  • Correzione di un baco che impediva il caricamento - di link da altre applicazioni se Privacy Browser era stato chiuso dal sistema operativo in background.
  • -
  • Correzione di un baco che impediva alla app di inizializzarsi correttamente - quando il tema della app era impostato all'opposto di quello del sistema operativo.
  • -
- -

3.5 (versione codice 50)

-

18 Agosto 2020 - minima API 19, target API 29

- - -

3.4.1 (versione codice 49)

-

1 Aprile 2020 - minima API 19, target API 29

- - -

3.4 (versione codice 48)

-

28 Marzo 2020 - minima API 19, target API 29

- - -

3.3 (versione codice 47)

-

3 Gennaio 2020 - minima API 19, target API 29

- - -

3.2 (versione codice 46)

-

20 Luglio 2019 - minima API 19, target API 28

- - -

3.1 (versione codice 45)

-

27 Maggio 2019 - minima API 19, target API 28

- - -

3.0.1 (versione codice 44)

-

2 Maggio 2019 - minima API 19, target API 28

- - -

3.0 (versione codice 43)

-

26 Aprile 2019 - minima API 19, target API 28

-
    -
  • Aggiunta della navigazione a schede.
  • -
  • Correzione di un baco che tagliava la parte bassa di WebView quando era disabilitato lo scrolling della barra dell'applicazione.
  • -
  • Correzione di un baco che provocava il riavvio di Privacy Browser ogni volata che veniva connessa o disconnessa una tastiera Bluetooth.
  • -
  • Aggiornamento della traduzione Italiana fornita da Francesco Buratti.
  • -
  • Aggiornamento della traduzione in Russo.
  • -
  • Aggiornamento della traduzione Spagnola fornita da Jose A. León.
  • -
  • Aggiornamento della traduzione Tedesco fornita da Bernhard G. Keller.
  • -
  • Traduzione parziale in Turco.
  • -
- -

2.17.1 (versione codice 42)

-

5 Marzo 2019 - minima API 19, target API 28

-
    -
  • Correzione di un baco causato da segnalibri con icona troppo grande.
  • -
  • Introduzione della possibilità di spostare Privacy Browser su memoria SD.
  • -
- -

2.17 (versione codice 41)

-

27 Febbraio 2019 - minima API 19, target API 28

- - -

2.16 (versione codice 40)

-

31 Gennaio 2019 - minima API 19, target API 28

- - -

2.15.1 (versione codice 39)

-

27 Dicembre 2018 - minima API 19, target API 28

- - -

2.15 (versione codice 38)

-

24 Dicembre 2018 - minima API 19, target API 28

- - -

2.14 (versione codice 37)

-

8 Dicembre 2018 - minima API 19, target API 28

- - -

2.13 (versione codice 36)

-

29 Ottobre 2018 - minima API 19, target API 28

- - -

2.12 (versione codice 35)

-

31 Luglio 2018 - minima API 19, target API 27

- - -

2.11 (versione codice 34)

-

10 Luglio 2018 - minima API 19, target API 27

- - -

2.10 (versione codice 33)

-

24 Maggio 2018 - minima API 19, target API 27

- - -

2.9 (versione codice 32)

-

9 Maggio 2018 - minima API 19, target API 27

- - -

2.8.1 (versione codice 31)

-

1 Marzo 2018 - minima API 19, target API 27

- - -

2.8 (versione codice 30)

-

22 Febbraio 2018 - minima API 19, target API 27

- - -

2.7.2 (versione codice 29)

-

22 Novembre 2017 - minima API 19, target API 26

- - -

2.7.1 (versione codice 28)

-

9 Novembre 2017 - minima API 19, target API 26

-
    -
  • Eliminato un crash che si verificava nel caso di editing dei segnalibri dal nuovo cassetto dei segnalibri.
  • -
- -

2.7 (versione codice 27)

-

7 Novembre 2017 - minima API 19, target API 26

-
    -
  • Aggiunta di un cassetto dei segnalibri accessibile scorrendo da destra.
  • -
  • Corretto un difetto della Modalità Notte per cui appariva uno sfondo bianco durante il caricamento di pagine nuove.
  • -
  • Aggiornamento degli user agents.
  • -
  • Adeguamento della API target a 26 (Android Oreo, 8.0.0).
  • -
  • Aggiornamento della traduzione Italiana fornita da Francesco Buratti.
  • -
  • Aggiornamento della traduzione Spagnola fornita da Jose A. León.
  • -
- -

2.6 (versione codice 26)

-

18 Settembre 2017 - minima API 19, target API 25

- - -

2.5 (versione codice 25)

-

26 Agosto 2017 - minima API 19, target API 25

- - -

2.4 (versione codice 24)

-

23 Giugno 2017 - minima API 19, target API 25

- - -

2.3 (versione codice 23)

-

26 Maggio 2017 - minima API 19, target API 25

- - -

2.2 (versione codice 22)

-

27 Aprile 2017 - minima API 19, target API 25

- - -

2.1 (versione codice 21)

-

25 Marzo 2017 - minima API 19, target API 25

- - -

2.0.1 (versione codice 20)

-

21 Marzo 2017 - minima API 19, target API 25

- - -

2.0 (versione codice 19)

-

16 Marzo 2017 - minima API 19, target API 25

- - -

1.15 (versione codice 18)

-

11 Febbraio 2017 - minima API 19, target API 25

- - -

1.14.1 (versione codice 17)

-

4 Gennaio 2017 - minima API 19, target API 25

- - -

1.14 (versione codice 16)

-

26 Dicembre 2016 - minima API 19, target API 25

- - -

1.13 (versione codice 15)

-

28 Novembre 2016 - minima API 19, target API 24

- - -

1.12 (versione codice 14)

-

9 Novembre 2016 - minima API 19, target API 24

- - -

1.11 (versione codice 13)

-

22 Ottobre 2016 - minima API 19, target API 24

- - -

1.10 (versione codice 12)

-

15 Settembre 2016 - minima API 19, target API 23

- - -

1.9.1 (versione codice 11)

-

27 Agosto 2016 - minima API 19, target API 23

-
    -
  • Changed asset image links to relative paths so Privacy Browser will build on F-Droid.
  • -
- -

1.9 (versione codice 10)

-

26 Agosto 2016 - minima API 19, target API 23

- - -

1.8 (versione codice 9)

-

16 Luglio 2016 - minima API 19, target API 23

- - -

1.7 (versione codice 8)

-

16 Giugno 2016 - minima API 19, target API 23

- - -

1.6 (versione codice 7)

-

11 Maggio 2016 - minima API 15, target API 23

- - -

1.5 (versione codice 6)

-

5 Maggio 2016 - minima API 15, target API 23

-
    -
  • Add the option to disable swipe to refresh so that certain websites, like Google Maps, will function correctly.
  • -
- -

1.4 (versione codice 5)

-

28 Aprile 2016 - minima API 15, target API 23

- - -

1.3 (versione codice 4)

-

7 Aprile 2016 - minima API 15, target API 23

- - -

1.2 (versione codice 3)

-

23 Marzo 2016 - minima API 15, target API 23

- - -

1.1 (versione codice 2)

-

9 Marzo 2016 - minima API 10, target API 23

-
    -
  • Separate the standard and the free flavors so that Privacy Browser builds correctly on F-Droid.
  • -
- -

1.0 (versione codice 1)

-

24 Febbraio 2016 - minima API 10, target API 23

-
    -
  • Toggle JavaScript, DOM storage, and cookies.
  • -
  • Set default enabled status for JavaScript, DOM storage, and cookies.
  • -
  • Clear DOM storage and cookies.
  • -
  • Add shortcuts to the home screen.
  • -
  • Utilize download manager.
  • -
  • Navigate forward and back.
  • -
  • Cut, copy, paste URLs.
  • -
  • Share URLs.
  • -
  • Set homepage.
  • -
  • Scroll URL bar.
  • -
  • Maintain WebView scroll location when rotating screen.
  • -
  • Swipe to refresh WebView.
  • -
  • Play full screen videos (requires JavaScript to be enabled).
  • -
  • Clear and Exit menu item.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/it/about_contributors.html b/app/src/main/assets/it/about_contributors.html new file mode 100644 index 00000000..0f4cb5d9 --- /dev/null +++ b/app/src/main/assets/it/about_contributors.html @@ -0,0 +1,54 @@ + + + + + + + + + + + + + +

Sviluppatori

+

Privacy Browser è sviluppato da Soren Stoutner.

+ +

Programmatori

+ Thomas Jensen
+ Hendrik Knackstedt + +

Traduttori

+ Francesco Buratti: Italiano
+ Thiago Nazareno Conceição Silva de Jesus: Portoghese Brasiliano
+ Kévin LE FLOHIC: Francese
+ Bernhard G. Keller: Tedesco
+ Jose A. León: Spagnolo + +

Traduttori precedenti

+ Stefan Erhardt: Tedesco
+ Aaron Gerlach: Tedesco + +
+
+

Si accettano contributi per lo sviluppo di codice e traduzioni.

+ + \ No newline at end of file diff --git a/app/src/main/assets/it/about_contributors_dark.html b/app/src/main/assets/it/about_contributors_dark.html deleted file mode 100644 index b6c2fa4f..00000000 --- a/app/src/main/assets/it/about_contributors_dark.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - - - - - - -

Sviluppatori

-

Privacy Browser è sviluppato da Soren Stoutner.

- -

Programmatori

- Thomas Jensen
- Hendrik Knackstedt - -

Traduttori

- Francesco Buratti: Italiano
- Thiago Nazareno Conceição Silva de Jesus: Portoghese Brasiliano
- Kévin LE FLOHIC: Francese
- Bernhard G. Keller: Tedesco
- Jose A. León: Spagnolo - -

Traduttori precedenti

- Stefan Erhardt: Tedesco
- Aaron Gerlach: Tedesco - -
-
-

Si accettano contributi per lo sviluppo di codice e traduzioni.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/about_contributors_light.html b/app/src/main/assets/it/about_contributors_light.html deleted file mode 100644 index 989faa6e..00000000 --- a/app/src/main/assets/it/about_contributors_light.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - - - - - - -

Sviluppatori

-

Privacy Browser è sviluppato da Soren Stoutner.

- -

Programmatori

- Thomas Jensen
- Hendrik Knackstedt - -

Traduttori

- Francesco Buratti: Italiano
- Thiago Nazareno Conceição Silva de Jesus: Portoghese Brasiliano
- Kévin LE FLOHIC: Francese
- Bernhard G. Keller: Tedesco
- Jose A. León: Spagnolo - -

Traduttori precedenti

- Stefan Erhardt: Tedesco
- Aaron Gerlach: Tedesco - -
-
-

Si accettano contributi per lo sviluppo di codice e traduzioni.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/about_licenses.html b/app/src/main/assets/it/about_licenses.html new file mode 100644 index 00000000..1511164f --- /dev/null +++ b/app/src/main/assets/it/about_licenses.html @@ -0,0 +1,1166 @@ + + + + + + + + + + + + + +

Copyright

+

Privacy Browser copyright © 2015-2020: Soren Stoutner.

+ +

Licenza

+

Privacy Browser è rilasciato con Licenza GPLv3+ . + Il testo completo è riportato per intero nella parte finale di questo documento. Si precisa che questa è una traduzione non ufficiale della + GNU General Public License, non è stata pubblicata dalla Free Software Foundation, e non stabilisce i termini legali di distribuzione del software + che usa la GNU GPL. Soltanto la versione originale in inglese della GNU GPL fa ciò. + Lo scopo di questa traduzione è unicamente quello di aiutare gli utenti di lingua italiana a comprendere la GNU GPL, e pertanto in caso di eventuali discrepanze tra + traduzione e versione originale in inglese, prevarrà e sarà unicamente la versione originale ad avere valore legale. + E' inoltre ammessa la modifica e la pubblicazione di questa traduzione, ma solamente in accordo ai termini qui riportati. + Il codice sorgente è disponibile su git.stoutner.com.

+ +

Blocklist

+

EasyList e EasyPrivacy + sono sotto doppia licenza con le licenze GPLv3+ + e Creative Commons Attribution-ShareAlike 3.0+ Unported. Privacy Browser le incorpora utilizzando l'opzione GPLv3+.

+ +

La Fanboy’s Annoyance List e la Fanboy’s Social Blocking List + sono rilasciate sotto la licenza Creative Commons Attribution 3.0 Unported, + che è compatibile con la licenza GPLv3+. Le liste sono incluse senza modifiche in Privacy Browser.

+ +

E' possibile reperire maggiori informazioni sulle block list sul sito web EasyList.

+ +

Librerie

+

Privacy Browser è compilato utilizzando le Librerie AndroidX, + le Librerie Kotlin, + e il codice disponibile nella Google Material Maven repository, + entrambi rilasciati con Licenza Apache 2.0.

+ +

La versione gratuita di Privacy Browser è compilata con Firebase Ads, + che è rilasciato sotto la Licenza Android Software Development Kit.

+ +

Classi

+

com.stoutner.privacybrowser.views.CheckedLinearLayout è la versione modificata di una classe contenuta nel codice sorgente della + Fotocamera Android. + Il file originale è stato rilasciato sotto la Licenza Apache 2.0. + Il file modificato è rilasciato sotto la Licenza GPLv3+.

+ +

Icone

+

+ sono state derivate da security e language, che fanno parte + dell'Android Material icon set e sono state rilasciate sotto Licenza Apache 2.0. + Il testo completo della Licenza è riportato di seguito. Copyright delle modifiche © 2016 Soren Stoutner. + Le immagini risultanti sono rilasciate sotto Licenza GPLv3+.

+

è stata derivata da elementi di folder e di exit_to_app, che fanno parte + dell'Android Material icon set e sono state rilasciate sotto Licenza Apache 2.0. + Copyright delle modifiche © 2017 Soren Stoutner. + L'immagine risultante è rilasciata sotto Licenza GPLv3+.

+

è stata derivata da elementi di bookmark e di create_new_folder, che fanno parte + dell'Android Material icon set e sono state rilasciate sotto Licenza Apache 2.0. + Copyright delle modifiche © 2017 Soren Stoutner. + L'immagine risultante è rilasciata sotto Licenza GPLv3+.

+

è stata derivata da create_new_folder, + che fa parte dell'Android Material icon set ed è stata rilasciata sotto Licenza Apache 2.0. + Copyright delle modifiche © 2017 Soren Stoutner. + L'immagine risultante è rilasciata sotto Licenza GPLv3+.

+

è stata derivata da exit_to_app, + che fa parte dell'Android Material icon set ed è stata rilasciata sotto Licenza Apache 2.0. + Copyright delle modifiche © 2017 Soren Stoutner. + L'immagine risultante è rilasciata sotto Licenza GPLv3+.

+

è stata derivata da compare, + che fa parte dell'Android Material icon set ed è stata rilasciata sotto Licenza Apache 2.0. + Copyright delle modifiche © 2017 Soren Stoutner. + L'immagine risultante è rilasciata sotto Licenza GPLv3+.

+

è stata derivata da sort, + che fa parte dell'Android Material icon set ed è stata rilasciata sotto Licenza Apache 2.0. + Copyright delle modifiche © 2019 Soren Stoutner. + L'immagine risultante è rilasciata sotto Licenza GPLv3+.

+

cookie è stata creata da Google. + E' stata rilasciata con Licenza Apache 2.0 + e può essere scaricata dirattamente dal Material Design Icons.Non è stata modificata ad eccezione del colore e della dimensione.

+

Le seguenti icone derivano dall'Android Material icon set, + che è rilasciato sotto Licenza Apache 2.0. + Non sono state modificatae ad eccezione del colore e della dimensione. Alcune sono state rinominate per coerenza con il tipo di utilizzo all'interno del codice. + Le icone con i loro nomi originali sono riportate di seguito.

+

add.

+

arrow_back.

+

arrow_forward.

+

bookmarks.

+

bug_report.

+

camera_enhance.

+

chrome_reader_mode.

+

close.

+

delete.

+

delete_forever.

+

devices_other.

+

dns.

+

donut_small.

+

edit.

+

expand_less.

+

expand_more.

+

file_copy.

+

file_download.

+

find_in_page.

+

folder.

+

home.

+

image.

+

import_contacts.

+

import_export.

+

important_devices.

+

info_outline.

+

language.

+

link_off.

+

list.

+

local_activity.

+

location_off.

+

lock.

+

map.

+

more.

+

new releases.

+

open_in_browser.

+

payment.

+

question_answer.

+

refresh.

+

save.

+

search.

+

select_all.

+

settings.

+

settings_overscan.

+

share.

+

smartphone.

+

sort.

+

style.

+

subtitles.

+

tab.

+

text_fields.

+

thumbs_up_down.

+

vertical_align_bottom.

+

vertical_align_top.

+

visibility_off.

+

vpn_key.

+

vpn_lock.

+

web.

+ +
+ +

GNU General Public License

+

Versione 3, 29 Giugno 2007

+ +

Copyright © 2007 Free Software Foundation, Inc. + <http://fsf.org/>

+ +

A chiunque è permesso copiare e ridistribuire copie esatte di questo documento di licenza, + ma non è in alcun modo consentito apportarvi modifiche. +

+ +

Premessa

+ +

La GNU General Public License è una licenza libera, basata su copyleft per software e altri tipi di opere.

+ +

Le licenze della maggior parte del software e di altre opere materiali + sono pensate per togliere la libertà di condividere e modificare tali opere. + Al contrario, la GNU General Public License ha l'obiettivo di garantire + la libertà di condividere e modificare tutte le versioni di un programma + e di fare in modo che esso rimanga software libero per tutti gli utenti. + Noi, Free Software Foundation, usiamo la GNU General Public License + per la maggior parte del nostro software; essa viene applicata anche a qualunque + altro software rilasciato dall'autore sotto questa licenza. + Chiunque può utilizzare questa licenza per i propri programmi.

+ +

Quando parliamo di software libero (free software), ci riferiamo al concetto di libertà, + non al prezzo. Le nostre General Public License sono concepite per garantire + che chiunque abbia la libertà di distribuire copie di software libero + (anche dietro pagamento di un prezzo, se lo desidera), che chiunque riceva o possa ricevere + il codice sorgente se lo vuole, che chiunque possa apportare modifiche al software + o utilizzarne solo alcune porzioni in altri software liberi, e che chiunque sappia + che ha il diritto di fare tutte queste cose.

+ +

Per proteggere i vostri diritti, abbiamo la necessità di impedire che altri + vi neghino questi diritti o vi obblighino a rinunciarvi. + Pertanto, chiunque distribuisce o modifica software rilasciato con questa licenza + si assume dei precisi doveri: il dovere di rispettare la libertà degli altri.

+ +

Per esempio, chi distribuisce copie di un programma rilasciato sotto questa licenza, + sia a titolo gratuito che mediante pagamento di un prezzo,è obbligato a riconoscere + a chi riceve il software esattamente gli stessi diritti che ha ricevuto. + Deve garantire che chi riceva il software abbia o possa avere accesso al codice sorgente. + E deve far conoscere ai destinatari del software queste condizioni, + così che essi conoscano quali sono i loro diritti.

+ +

Gli sviluppatori che utilizzano la GNU GPL proteggono i vostri diritti in due modi: + (1) Rivendicando il copyright sul software, e + (2) offrendovi questa licenza che vi garantisce il diritto legale di copiarlo e/o di modificarlo.

+ +

Al fine di proteggere gli sviluppatori e gli autori, la GPL spiega chiaramente + che non esiste nessuna garanzia per questo software libero. Nell'interesse + sia degli utenti che degli autori, la GPL impone che le versioni modificate del software + vengano esplicitamente marcate come “modificate”, in modo tale che eventuali problemi + non vengano erroneamente attribuiti agli autori delle versioni precedenti.

+ +

Alcuni dispositivi sono progettati per negare agli utenti l'installazione + o l'esecuzione di versioni modificate del software installato sugli stessi, + anche se il costruttore si riserva la possibilità di farlo. + Ciò è fondamentalmente incompatibile con l'obiettivo di garantire la libertà + degli utenti di modificare il software. Una ripetizione sistematica di tali abusi + avviene nel campo dei dispositivi per usi individuali, e ciò rende questi abusi + ancora più inaccettabili. Pertanto, abbiamo realizzato questa versione della GPL + al fine di proibire una tale pratica per questo tipo di prodotti. Se problemi simili + dovessero sorgere in altri ambiti, saremo pronti ad estendere queste misure + a questi nuovi ambiti in versioni future della GPL, nella maniera che si renderà necessaria + per difendere la libertà degli utenti.

+ +

In conclusione, tutti i programmi sono costantemente minacciati dai brevetti sul software. + Gli Stati non dovrebbero permettere ai brevetti di limitare lo sviluppo + e l'utilizzo di software per computer, ma nei Paesi in cui ciò avviene noi vogliamo evitare + il pericolo che i brevetti applicati ad un programma libero possano renderlo, a tutti gli effetti, + proprietario. Per impedire ciò, la GPL assicura che non è possibile utilizzare + i brevetti sul software per rendere un programma non libero.

+ +

I termini e le condizioni esatte per la copia, la distribuzione e la modifica del software + sono riportate di seguito.

+ +

TERMINI E CONDIZIONI

+ +

0. Definizioni.

+ +

“Questa Licenza” fa riferimento alla versione 3 della GNU General Public License.

+ +

“Copyright” indica anche leggi simili al copyright che riguardano altri tipi di opere, + come le maschere per la produzione di semiconduttori.

+ +

“Il Programma” indica qualunque opera che sia soggetta a copyright e che sia rilasciata + sotto questa Licenza. I detentori della licenza sono indicati come “tu”. “Licenziatari” e + “destinatari” possono essere individui o organizzazioni.

+ +

“Modificare” un'opera significa copiare o adattare tutta o parte dell'opera + in una maniera che richieda un permesso di copyright, e non indica la semplice azione + di fare una esatta copia dell'opera. L'opera risultante viene chiamata “versione modificata” + dell'opera precedente, oppure viene detta opera “basata sulla” opera precedente.

+ +

Un'“opera coperta da questa licenza” indica il Programma originale non modificato + oppure un'opera basata sul Programma.

+ +

“Propagare” un'opera significa fare una qualunque cosa con essa che, + in mancanza di un esplicito permesso, ti renda direttamente o indirettamente perseguibile + per violazione secondo le vigenti normative sul copyright, + ad eccezione della semplice esecuzione del Programma su un computer + o della modifica di una copia privata. La Propagazione include la copia, + la distribuzione (con o senza modifiche), la messa a disposizione al pubblico e, + in alcuni stati, altre attività simili e connesse.

+ +

“Distribuire” un'opera indica qualunque forma di propagazione + che permetta a terze parti di effettuare o ricevere delle copie. + La mera interazione con un utente attraverso una rete di computer, + senza che ci sia alcun trasferimento di una copia, non è considerata “Distribuzione”.

+ +

Una interfaccia utente interattiva fornisce delle “Adeguate Informazioni Legali” + soltanto nel caso in cui includa una apposita funzionalità, resa adeguatamente visibile, che + (1) visualizzi un'adeguata informazione di copyright, e + (2) informi l'utente che non c'è alcuna garanzia sull'opera (eccetto nel caso in cui + delle garanzie sono espressamente fornite), dica che il licenziatario può distribuire + l'opera utilizzando questa Licenza, indichi come è possibile prendere visione di una copia + di questa Licenza. + Se l'interfaccia presenta una lista di comandi o di opzioni, come ad esempio un menù, + una delle opzioni fornite nella lista deve rispettare questa condizione.

+ +

1. Codice Sorgente.

+ +

Il “codice sorgente” di un'opera indica la forma più indicata + dell'opera per poter effettuare modifiche su di essa. Il “codice oggetto” + indica qualunque forma dell'opera che non sia codice sorgente.

+ +

Una “Interfaccia Standard” è una interfaccia che risponde ad uno + standard ufficiale definito da un ente di standardizzazione riconosciuto + o, nel caso di interfacce specifiche per un particolare linguaggio di + programmazione, una interfaccia che è largamente utilizzata dagli + sviluppatori per sviluppare in tale linguaggio.

+ +

Le “Librerie di Sistema” di un eseguibile includono qualunque cosa, + eccetto l'opera nel suo insieme, che (a) sia inclusa nella normale forma + di pacchettizzazione di un “Componente Principale”, ma che non è + parte di quel Componente Principale, e (b) che serva solo a consentire + l'uso dell'opera con quel Componente Principale, o per implementare una + Interfaccia Standard per la quale esista una implementazione disponibile + al pubblico in forma sorgente. Un “Componente Principale”, in questo + contesto, è un componente essenziale (kernel, gestore di finestre + eccetera) dello specifico sistema operativo (ammesso che ce ne sia uno) + sul quale l'eseguibile esegue, o un compilatore utilizzato per produrre + il programma, o un interprete di codice oggetto utilizzato per eseguire + il programma.

+ +

Il “Sorgente Corrispondente” per un'opera in forma di codice oggetto + è il codice sorgente necessario per generare, installare e (per un + programma eseguibile) eseguire il codice oggetto e per modificare + l'opera, inclusi gli script per controllare le suddette attività di + generazione, installazione ed esecuzione. Non sono incluse le Librerie + di Sistema usate dal programma, o gli strumenti di utilità generica o i + programmi liberamente accessibili che sono utilizzati, senza modifiche, + per portare a termine le suddette attività ma che non fanno parte + dell'opera. Per esempio, il sorgente corrispondente include i file con + le definizioni delle interfacce associati ai file sorgente dell'opera, e + il codice sorgente delle librerie condivise e sottoprogrammi collegati + dinamicamente specificatamente necessari per il programma, ad esempio a + causa di stretta comunicazione dati o di controllo di flusso tra questi + sottoprogrammi e altre parti del programma.

+ +

Il Sorgente Corrispondente non include nulla che l'utente possa + rigenerare automaticamente da altre parti del Sorgente Corrispondente + stesso.

+ +

Il Sorgente Corrispondente di un'opera in forma di codice sorgente è + l'opera stessa.

+ +

2. Principali Diritti.

+ +

Tutti i diritti garantiti da questa Licenza sono garantiti per la durata + del copyright sul Programma, e sono irrevocabili ammesso che le + condizioni qui riportate siano rispettate. Questa Licenza afferma esplicitamente il + tuo permesso illimitato di eseguire il Programma non modificato. Il + risultato dell'esecuzione di un programma coperto da questa Licenza è + a sua volta coperto da questa Licenza solo se il risultato stesso, a + causa del suo contenuto, è un'opera coperta da questa Licenza. Questa + Licenza riconosce il tuo diritto all'uso legittimo o altri diritti + equivalenti, come stabilito dalla legislazione sul copyright.

+ +

Puoi creare, eseguire e propagare programmi che tu non distribuisci + coperti da questa Licenza, senza alcuna condizione fino a quando la tua + Licenza rimane valida. Puoi distribuire opere coperte da questa Licenza + ad altri al solo scopo di ottenere che essi facciano delle modifiche al + programma esclusivamente per te, o che ti forniscano dei servizi per + l'esecuzione di queste opere, ammesso che tu rispetti i termini di + questa Licenza nel distribuire tutto il materiale per il quale non + detieni il copyright. Coloro i quali creano o eseguono per conto tuo un + programma coperto da questa Licenza lo fanno esclusivamente in tua vece, + sotto la tua direzione e il tuo controllo, in maniera tale che sia + proibito a costoro effettuare copie di materiale di cui detieni il + copyright al di fuori della relazione che intrattengono nei tuoi + confronti.

+ +

Distribuire opere coperte da licenza in qualunque altra circostanza è + consentito soltanto alle condizioni espresse in seguito. Non è + consentito sottolicenziare le opere: la sezione 10 lo rende non + necessario.

+ +

3. Protezione dei diritti legali degli utenti dalle leggi + anti-elusione.

+ +

Nessun programma protetto da questa Licenza può essere considerato + parte di una misura tecnologica di restrizione che sottostia ad alcuna + delle leggi che soddisfano l'articolo 11 del “WIPO copyright treaty” + adottato il 20 Dicembre 1996, o a simili leggi che proibiscono o + limitano l'elusione di tali misure tecnologiche di restrizione.

+ +

Quando distribuisci un programma coperto da questa Licenza, rifiuti + tutti i poteri legali atti a proibire l'elusione di misure tecnologiche + di restrizione ammesso che tale elusione sia effettuata nell'esercizio + dei diritti garantiti da questa Licenza riguardo al programma coperto da + questa Licenza, e rinunci all'intenzione di limitare l'operatività o + la modifica del programma per far valere, contro i diritti degli utenti + del programma, diritti legali tuoi o di terze parti che impediscano + l'elusione di misure tecnologiche di restrizione.

+ +

4. Distribuzione di Copie Esatte.

+ +

Ti è permesso distribuire copie esatte del codice sorgente del + Programma come lo hai ricevuto, con qualunque mezzo, ammesso che tu + aggiunga in maniera appropriata su ciascuna copia una appropriata nota + di copyright; che tu lasci intatti tutti gli avvisi che affermano che + questa Licenza e tutte le clausole non-permissive aggiunte in accordo + con la sezione 7 sono valide per il codice che distribuisci; che tu + lasci intatti tutti gli avvisi circa l'assenza di garanzia; che tu + fornisca a tutti i destinatari una copia di questa Licenza assieme al + Programma.

+ +

Puoi richiedere il pagamento di un prezzo o di nessun prezzo per + ciascuna copia che distribuisci, e puoi offrire supporto o garanzia + a pagamento.

+ +

5. Distribuzione di Versioni modificate del sorgente.

+ +

Puoi distribuire un'opera basata sul Programma, o le modifiche per + produrla a partire dal Programma, nella forma di codice sorgente secondo + i termini della sezione 4, ammesso che tu rispetti anche tutte le + seguenti condizioni:

+ +
    +
  • a) L'opera deve recare con sè delle informazioni adeguate che + affermino che tu l'hai modificata, indicando la data di modifica.
  • + +
  • b) L'opera deve recare informazioni adeguate che affermino che essa è + rilasciata sotto questa Licenza e sotto le condizioni aggiuntive + secondo quanto indicato dalla Sezione 7. Questa condizione modifica la + condizione espressa alla sezione 4 di “lasciare intatti tutti gli + avvisi”.
  • + +
  • c) Devi rilasciare l'intera opera, nel suo complesso, sotto questa + Licenza a chiunque venga in possesso di una copia di essa. Questa + Licenza sarà pertanto applicata, assieme ad eventuali clausole + aggiunte in osservanza della Sezione 7, all'opera nel suo complesso, a + tutte le sue parti, indipendentemente da come esse siano + pacchettizzate. Questa Licenza nega il permesso di licenziare l'opera + in qualunque altro modo, ma non rende nullo un tale permesso ammesso + che tu lo abbia ricevuto separatamente.
  • + +
  • d) Se l'opera ha delle interfacce utente interattive, ciascuna deve + mostrare delle Adeguate Informazioni Legali; altrimenti, se il + Programma ha delle interfacce interattive che non visualizzano delle + Adeguate Informazioni Legali, il tuo programma non è obbligato a + visualizzarle.
  • +
+ +

La giustapposizione di un'opera coperta da questa Licenza assieme ad + altre opere separate e indipendenti, che non sono per loro natura + estensioni del Programma, e che non sono combinate con esso a formare un + altro programma più grande, dentro o in uno stesso supporto di + memorizzazione a lungo termine o di distribuzione, è semplicemente + detto “aggregato” se la raccolta e il suo copyright non sono + utilizzati per limitare l'accesso o i diritti legali degli utenti della + raccolta stessa oltre ciò che ciascun singolo programma + consente. L'inclusione di un programma coperto da questa Licenza in un + aggregato non comporta l'applicazione di questa Licenza alle altre parti + dell'aggregato.

+ +

6. Distribuzione in formato non-sorgente.

+ +

Puoi distribuire un programma coperto da questa Licenza in formato di + codice oggetto secondo i termini delle sezioni 4 e 5, ammesso che tu + fornisca anche il Sorgente Corrispondente in formato comprensibile + da un computer sotto i termini di questa stessa Licenza, in uno dei + seguenti modi:

+ +
    +
  • a) Distribuendo il codice oggetto in, o contenuto in, un prodotto + fisico (inclusi i mezzi fisici di distribuzione), accompagnato dal + Sorgente Corrispondente su un supporto fisico duraturo comunemente + utilizzato per lo scambio di software.
  • + +
  • b) Distribuendo il codice oggetto in, o contenuto in, un prodotto fisico + (inclusi i mezzi fisici di distribuzione), accompagnato da un'offerta + scritta, valida per almeno tre anni e valida per tutto il tempo + durante il quale tu offri ricambi o supporto per quel modello di + prodotto, di fornire a chiunque possieda il codice oggetto (1) una + copia del Sorgente Corrispondente di tutto il software contenuto nel + prodotto che è coperto da questa Licenza, su un supporto fisico + duraturo comunemente utilizzato per lo scambio di software, ad un + prezzo non superiore al costo ragionevole per effettuare fisicamente + tale distribuzione del sorgente, oppure (2) accesso alla copia del + Sorgente Corrispondente attraverso un server di rete senza alcun costo + aggiuntivo.
  • + +
  • c) Distribuendo copie singole del codice oggetto assieme ad una copia + dell'offerta scritta di fornire il Sorgente Corrispondente. Questa + possibilità è permessa soltanto occasionalmente e per fini non + commerciali, e solo se tu hai ricevuto il codice oggetto assieme ad + una tale offerta, in accordo alla sezione 6b.
  • + +
  • d) Distribuendo il codice oggetto mediante accesso da un luogo designato + (gratis o dietro pagamento di un prezzo), e offrendo un accesso + equivalente al Sorgente Corrispondente alla stessa maniera a partire + dallo stesso luogo senza costi aggiuntivi. Non devi obbligare i + destinatari a copiare il Sorgente Corrispondente assieme al codice + oggetto. Se il luogo dal quale copiare il codice oggetto è un server + di rete, il Sorgente Corrispondente può trovarsi su un server + differente (gestito da te o da terze parti) che fornisca + funzionalità equivalenti per la copia, a patto che tu fornisca delle + indicazioni chiare accanto al codice oggetto che indichino dove + trovare il Sorgente Corrispondente. Indipendentemente da quale server + ospiti il Sorgente Corrispondente, tu rimani obbligato ad assicurare + che esso rimanga disponibile per tutto il tempo necessario a + soddisfare queste condizioni.
  • + +
  • e) Distribuendo il codice oggetto mediante trasmissione peer-to-peer, a + patto che tu informi gli altri peer circa il luogo in cui il codice + oggetto e il Sorgente Corrispondente sono gratuitamente offerti al + pubblico secondo i termini della sezione 6d.
  • +
+ +

Una porzione separabile del codice oggetto, il cui sorgente è + escluso dal Sorgente Corrispondente e trattato come Libreria di + Sistema, non deve essere obbligatoriamente inclusa nella distribuzione + del codice oggetto del programma.

+ +

Un “Prodotto Utente” è un (1) “prodotto consumer”, cioè + qualunque proprietà personale tangibile che è normalmente utilizzata + per scopi personali, familiari o domestici, oppure (2) qualunque cosa + progettata o venduta per essere utilizzata in ambiente domestico. Nella + classificazione di un prodotto come “prodotto consumer”, i casi dubbi + andranno risolti in favore dell'ambito di applicazione. Per un dato + prodotto ricevuto da un dato utente, “normalmente utilizzato” si + riferisce ad un uso tipico o comune di quella classe di prodotti, + indipendentemente dallo stato dell'utente specifico o dal modo in cui + l'utente specifico utilizza, o si aspetta o ci si aspetta che utilizzi, + il prodotto. Un prodotto è un “prodotto consumer” indipendentemente + dal fatto che abbia usi commerciali, industriali o diversi da quelli + “consumer”, a meno che questi usi non rappresentino il solo modo utile + di utilizzare il prodotto in questione.

+ +

Le “Informazioni di Installazione” per un Prodotto Utente sono i + metodi, le procedure, le chiavi di autorizzazioni o altre informazioni + necessarie per installare ed eseguire versioni modificate di un + programma coperto da questa Licenza all'interno di un Prodotto Utente, a + partire da versioni modificate dei suoi Sorgenti Corrispondenti. Tali + informazioni devono essere sufficienti ad assicurare che il + funzionamento del codice oggetto modificato non sia in nessun caso + proibito o ostacolato per il solo fatto che sono state apportate delle + modifiche.

+ +

Se distribuisci un codice oggetto secondo le condizioni di questa + sezione in, o assieme, o specificatamente per l'uso in o con un Prodotto + Utente, e la distribuzione avviene come parte di una transazione nella + quale il diritto di possesso e di uso del Prodotto Utente viene + trasferito al destinatario per sempre o per un periodo prefissato + (indipendentemente da come la transazione sia caratterizzata), il + Sorgente Corrispondente distribuito secondo le condizioni di questa + sezione deve essere accompagnato dalle Informazioni di + Installazione. Questa condizione non è richiesta se nè tu nè una + terza parte ha la possibilità di installare versioni modificate del + codice oggetto sul Prodotto Utente (ad esempio, se il programma è + installato su una ROM).

+ +

La condizione che richiede di fornire delle Informazioni di Installazione + non implica che venga fornito supporto, garanzia o aggiornamenti per un + programma che è stato modificato o installato dal destinatario, o per + il Prodotto Utente in cui esso è stato modificato o installato. + L'accesso ad una rete può essere negato se le modifiche apportate + impattano materialmente sull'operatività della rete o se violano le + regole e i protocolli di comunicazione attraverso la rete.

+ +

Il Sorgente Corrispondente distribuito, e le Informazioni di + Installazione fornite, in accordo con questa sezione, devono essere in + un formato che sia pubblicamente documentato (e con una implementazione + pubblicamente disponibile in formato di codice sorgente), e non devono + richiedere speciali password o chiavi per essere spacchettate, lette o + copiate.

+ +

7. Condizioni Aggiuntive.

+ +

Le “Condizioni Aggiuntive” sono condizioni che completano le + condizioni di questa Licenza permettendo delle eccezioni a una o più + delle condizioni sopra elencate. Le condizioni aggiuntive che sono + applicabili all'intero Programma devono essere considerate come se + fossero incluse in questa Licenza, a patto che esse siano valide secondo + le normative vigenti. Se alcune condizioni aggiuntive fanno riferimento + soltanto ad alcune parti del Programma, quelle parti possono essere + utilizzate separatamente sotto le stesse condizioni, ma l'intero + Programma rimane sottoposto a questa Licenza senza riferimento ad alcuna + condizione aggiuntiva.

+ +

Quando distribuisci una copia di un programma coperto da questa Licenza, + puoi, a tua discrezione, eliminare qualunque condizione aggiuntiva dalla + copia, o da parte di essa. (Le Condizioni Aggiuntive possono essere + scritte in maniera tale da richiedere la loro rimozione in certi casi di + modifica del Programma). Puoi aggiungere Condizioni Aggiuntive su + materiale, aggiunto da te ad un'opera coperta da questa Licenza, per il + quale hai o puoi garantire un'adeguata licenza di copyright.

+ +

Indipendentemente da qualunque altra condizione di questa Licenza, e per + il materiale che aggiungi ad un'opera coperta da questa Licenza, puoi + (se autorizzato dai legittimi detentori del copyright per il suddetto + materiale) aggiungere alle condizioni di questa Licenza delle condizioni + che:

+ +
    +
  • a) Negano la garanzia o limitano la responsabilità del Programma in + maniera differente da quanto riportato nelle sezioni 15 e 16 di questa + Licenza; oppure
  • + +
  • b) Richiedono il mantenimento di specifiche e circostanziate informative + legali o di note di attribuzione ad autori nel materiale o assieme + alle Adeguate Informazioni Legali mostrate dal Programma che lo + contiene; oppure
  • + +
  • c) Proibiscono di fornire informazioni errate o ingannevoli sull'origine + e la provenienza del materiale in oggetto, o richiedono che versioni + modificate di tale materiale siano appositamente marcate in maniera + differente rispetto alla versione originale; oppure
  • + +
  • d) Limitano l'utilizzo per scopi pubblicitari del nome dei detentori del + copyright o degli autori del materiale; oppure
  • + +
  • e) Rifiutano di garantire diritti secondo le leggi sulla proprietà + intellettuale circa l'uso di nomi, marchi di fabbrica o similari; + oppure
  • + +
  • f) Richiedono l'indennizzo dei detentori del copyright o degli autori del + materiale in oggetto da parte di chi distribuisce il materiale (o + versioni modificate dello stesso) con impegni contrattuali circa la + responsabilità nei confronti del destinatario, per qualunque + responsabilità che questi impegni contrattuali dovessero imporre + direttamente ai suddetti detentori del copyright e autori.
  • +
+ +

Tutte le altre condizioni addizionali non-permissive sono considerate + “ulteriori restrizioni”, secondo il significato specificato alla + sezione 10. Se il Programma o parti di esso contengono, all'atto della + ricezione dello stesso, informative che specificano che esso è + soggetto a questa Licenza assieme ad una condizione che è una + “ulteriore restrizione”, puoi rimuovere quest'ultima condizione. Se un + documento di licenza contiene ulteriori restrizioni ma permette di + rilicenziare o distribuire il Programma con questa Licenza, puoi + aggiungere al Programma del materiale coperto dalle condizioni di quel + documento di licenza, a patto che le ulteriori restrizioni non compaiano + nelle versioni rilicenziate o ridistribuite.

+ +

Se aggiungi ad un Programma coperto da questa Licenza delle condizioni + aggiuntive in accordo con questa sezione, devi aggiungere anche, nei + file sorgenti corrispondenti, un avviso che riassuma le condizioni + aggiuntive applicate a quei file, ovvero un avviso che specifichi dove + è possibile trovare copia delle condizioni aggiunte.

+ +

Tutte le Condizioni aggiuntive, permissive o non-permissive, devono + essere espresse nella forma di una licenza scritta e separata, o + espresse esplicitamente come eccezioni; in entrambi i casi valgono le + condizioni succitate.

+ +

8. Cessazione di Licenza.

+ +

Non puoi propagare o modificare un programma coperto da questa Licenza + in maniera diversa da quanto espressamente consentito da questa + Licenza. Qualunque tentativo di propagare o modificare altrimenti il + Programma è nullo, e provoca l'immediata cessazione dei diritti + garantiti da questa Licenza (compresi tutte le eventuali licenze di + brevetto garantite ai sensi del terzo paragrafo della sezione 11).

+ +

In ogni caso, se cessano tutte le violazioni di questa Licenza, allora + la tua licenza da parte di un dato detentore del copyright viene + ripristinata (a) in via cautelativa, a meno che e fino a quando il + detentore del copyright non cessa esplicitamente e definitivamente la + tua licenza, e (b) in via permanente se il detentore del copyright non + ti notifica in alcun modo la violazione entro 60 giorni dalla cessazione + della licenza.

+ +

Inoltre, la tua licenza da parte di un dato detentore del copyright + viene ripristinata in maniera permanente se il detentore del copyright ti + notifica la violazione in maniera adeguata, se questa è la prima volta + che ricevi una notifica di violazione di questa Licenza (per qualunque + Programma) dallo stesso detentore di copyright, e se rimedi alla + violazione entro 30 giorni dalla data di ricezione della notifica di + violazione.

+ +

La cessazione dei tuoi diritti come specificato in questa sezione non + provoca la cessazione delle licenze di terze parti che abbiano ricevuto + copie o diritti da te secondo questa Licenza. Se i tuoi diritti cessano + e non sono ristabiliti in via permanente, non hai diritto di ricevere + nuove licenze per lo stesso materiale, secondo quanto stabilito nella + sezione 10.

+ +

9. L'ottenimento di copie non richiede l'accettazione della Licenza.

+ +

Non sei obbligato ad accettare i termini di questa Licenza al solo fine + di ottenere o eseguire una copia del Programma. Similmente, propagazioni + collaterali di un Programma coperto da questa Licenza che occorrono come + semplice conseguenza dell'utilizzo di trasmissioni peer-to-peer per la + ricezione di una copia non richiedono l'accettazione della Licenza. In + ogni caso, solo e soltanto questa Licenza ti garantiscono il permesso di + propagare e modificare qualunque programma coperto da questa + Licenza. Queste azioni violano le leggi sul copyright nel caso in cui tu + non accetti questa Licenza. Pertanto, modificando o propagando un + programma coperto da questa Licenza, indichi implicitamente la tua + accettazione della Licenza.

+ +

10. Licenza Automatica per i successivi destinatari.

+ +

Ogni qual volta distribuisci un programma coperto da questa Licenza, il + destinatario riceve automaticamente una licenza, dal detentore + originario del copyright, di eseguire, modificare e propagare il + programma, nel rispetto di questa Licenza. Non sei ritenuto responsabile + del rispetto di questa Licenza da parte di terze parti.

+ +

Una “transazione d' entità” è una transazione che trasferisce il + controllo di una organizzazione, o sostanzialmente di tutti i suoi beni, + che suddivide una organizzazione o che fonde più organizzazioni. Se la + propagazione di un programma coperto da questa Licenza è conseguente + ad una transazione di entità, ciascuna parte che ha ruolo nella + transazione e che riceve una copia del programma riceve allo stesso tempo + qualsiasi licenza sul programma che i predecessori della parte + possedevano o potevano rilasciare nel rispetto del paragrafo precedente, + e in più il diritto di possesso del Sorgente Corrispondente del + programma dal predecessore in interesse, se il predecessore lo possiede + o se può ottenerlo senza troppe difficoltà.

+ +

Non puoi imporre nessuna ulteriore restrizione sull'esercizio dei + diritti garantiti o affermati da questa Licenza. Per esempio, non puoi + imporre un prezzo di licenza, una royalty, o altri costi per + l'esercizio dei diritti garantiti da questa Licenza, a non puoi dar + corso ad una controversia (ivi incluse le controversie incrociate o la + difesa in cause legali) affermando che siano stati violati dei + brevetti a causa della produzione, dell'uso, della vendita, della + messa in vendita o dell'importazione del Programma o di sue parti.

+ +

11. Brevetti.

+ +

Un “contribuente” è un detentore di copyright che autorizza l'uso + secondo questa Licenza di un Programma o di un'opera basata sul + Programma. L'opera così licenziata viene chiamata “versione del + contribuente”.

+ +

I “diritti essenziali di brevetto” da parte di un contribuente sono + tutti i diritti di brevetto che appartengono o che sono controllati dal + contribuente, che siano già acquisiti o che saranno acquisiti in + futuro, che possano essere violati in qualche maniera, consentita da + questa Licenza, generando, modificando o vendendo la versione del + contribuente, ma non includono i diritti che possano essere violati + soltanto come conseguenza di ulteriori modifiche alla versione del + contribuente. In relazione a questa definizione, il termine + “controllo” include il diritto di garantire sottolicenze di brevetto + in maniera consistente con le condizioni di questa Licenza.

+ +

Ciascun contribuente ti garantisce la licenza di brevetto sui diritti + essenziali di brevetto del contribuente stesso non-esclusiva, valida in + tutto il mondo, esente da royalty, di creare, usare, vendere, offrire in + vendita, importare e altrimenti eseguire, modificare e propagare i + contenuti della versione del contribuente.

+ +

Nei tre paragrafi successivi, con “licenza di brevetto” si intende + qualunque accordo o contratto, comunque denominato, di non + rivendicazione di un brevetto (come ad esempio un permesso esplicito di + utilizzare un brevetto o un accordo di rinuncia alla persecuzione per + violazione di brevetto). “Garantire” una tale licenza di brevetto ad + una parte significa portare a termine un tale accordo o contratto di non + rivendicazione di brevetto contro la parte.

+ +

Se distribuisci un programma coperto da questa Licenza, confidando + consapevolmente su una licenza di brevetto, e il Sorgente Corrispondente + per il programma non è reso disponibile per la copia, senza alcun + onere aggiuntivo e comunque nel rispetto delle condizioni di questa + Licenza, attraverso un server di rete pubblicamente accessibile o + tramite altri mezzi facilmente accessibili, allora devi (1) fare in modo + che il Sorgente Corrispondente sia reso disponibile come sopra, oppure + (2) fare in modo di rinunciare ai benefici della licenza di brevetto per + quel particolare programma, oppure (3) adoperarti, in maniera + consistente con le condizioni di questa Licenza, per estendere la + licenza di brevetto a tutti i destinatari successivi. “Confidare + consapevolmente” significa che tu sei attualmente cosciente che, + eccettuata la licenza di brevetto, la distribuzione da parte tua di un + programma protetto da questa Licenza in un paese, o l'utilizzo in un + paese del programma coperto da questa Licenza da parte di un + destinatario, può violare uno o più brevetti in quel paese che tu + hai ragione di ritenere validi.

+ +

Se, come conseguenza o in connessione con una singola transazione o + con un dato accordo, distribuisci, o fai in modo di distribuire, un + programma coperto da questa Licenza, e garantisci una licenza di + brevetto per alcune delle parti che ricevono il Programma + autorizzandole ad utilizzare, propagare, modificare o distribuire una + specifica copia del Programma, allora la licenza di brevetto che + fornisci è automaticamente estesa a tutti i destinatari del + Programma coperto da questa Licenza e delle opere basate sul + Programma.

+ +

Una licenza di brevetto è “discriminatoria” se non include + nell'ambito della sua copertura, proibisce l'esercizio, o è vincolata + al non-esercizio di uno o più dei diritti che sono specificatamente + garantiti da questa Licenza. Non puoi distribuire un Programma coperto + da questa Licenza se sei parte di un accordo con una terza parte la cui + attività comprende la distribuzione di software, secondo il quale tu + sei costretto ad un pagamento alla parte terza in funzione della tua + attività di distribuzione del Programma, e in conseguenza del quale la + parte terza garantisce, a qualunque delle parti che riceveranno il + Programma da te, una licenza di brevetto discriminatoria (a) assieme a + copie del Programma coperto da questa Licenza distribuite da te (o ad + altre copie fatte da codeste copie), oppure (b) principalmente per e in + connessione con specifici prodotti o raccolte di prodotti che contengono + il Programma, a meno che l'accordo non sia stato stipulato, o le licenze + di brevetto non siano state rilasciate, prima del 28 Marzo 2007.

+ +

Nessuna parte di questa Licenza può essere interpretata come atta ad + escludere o limitare gli effetti di qualunque altra licenza o altri + meccanismi di difesa dalla violazione che possano altrimenti essere resi + disponibili dalla normativa vigente in materia di brevetti.

+ +

12. Nessuna resa di libertà altrui.

+ +

Se ti vengono imposte delle condizioni (da un ordine giudiziario, da + un accordo o da qualunque altra eventualità) che contraddicono le + condizioni di questa Licenza, non sei in nessun modo esonerato dal + rispetto delle condizioni di questa Licenza. Se non puoi distribuire + un Programma coperto da questa Licenza per sottostare simultaneamente + agli obblighi derivanti da questa Licenza e ad altri obblighi + pertinenti, allora non puoi distribuire il Programma per nessun + motivo. Per esempio, se accetti delle condizioni che ti obbligano a + richiedere il pagamento di una royalty per le distribuzioni + successivamente effettuate da coloro ai quali hai distribuito il + Programma, l'unico modo per soddisfare sia queste condizioni che + questa Licenza è evitare del tutto la distribuzione del Programma.

+ +

13. Utilizzo con la GNU Affero General Public License.

+ +

Indipendentemente da qualunque altra condizione espressa da questa + Licenza, hai il permesso di collegare o combinare qualunque Programma + coperto da questa Licenza con un'opera rilasciata sotto la versione 3 + della licenza GNU Affero General Public License, ottenendo un singolo + Programma derivato, e di distribuire il Programma risultante. Le + condizioni di questa Licenza continuano a valere per le parti + riguardanti il Programma che sono coperte da questa Licenza, mentre le + condizioni speciali della GNU Affero General Public License, sezione 13, + riguardanti l'interazione mediante rete, saranno applicate al Programma + così risultante.

+ +

14. Versioni rivedute di questa Licenza.

+ +

La Free Software Foundation può pubblicare delle versioni rivedute + e/o delle nuove versioni della GNU General Public License di tanto in + tanto. Tali versioni saranno simili, nello spirito, alla presente + versione, ma potranno differire nei dettagli al fine di affrontare + nuovi problemi e nuove situazioni.

+ +

A ciascuna versione viene assegnato un numero identificativo di + versione. Se il Programma specifica che si applica a sè stesso una + certa versione della GNU General Public License, “o qualunque altra + versione successiva”, hai la possibilità di sottostare alle + condizioni di quella specifica versione o di qualunque altra versione + successiva pubblicata dalla Free Software Foundation. Se il Programma + non specifica un numero di versione della GNU General Public License, + puoi scegliere qualunque versione della GNU General Public License + pubblicata dalla Free Software Foundation.

+ +

Se il Programma specifica che un sostituto o un procuratore può + decidere quali versioni future della GNU General Public License posso + essere utilizzate, allora tale scelta di accettazione di una data + versione ti autorizza, in maniera permanente, ad utilizzare quella + versione della Licenza per il Programma.

+ +

Versioni successive della Licenza possono garantire diritti aggiuntivi o + leggermente differenti. Ad ogni modo, nessun obbligo aggiuntivo viene + imposto agli autori o ai detentori di copyright come conseguenza della + tua scelta di adottare una versione successiva della Licenza.

+ +

15. Rinuncia alla Garanzia.

+ +

NON C'E' NESSUNA GARANZIA PER IL PROGRAMMA, PER QUANTO CONSENTITO DALLE + VIGENTI NORMATIVE. ECCETTO QUANDO ALTRIMENTI STABILITO PER ISCRITTO, I + DETENTORI DEL COPYRIGHT E/O LE ALTRE PARTI FORNISCONO IL PROGRAMMA + “COSI' COME È” SENZA GARANZIA DI ALCUN TIPO, NE' ESPRESSA NE' + IMPLICITA, INCLUSE, MA NON LIMITATE A, LE GARANZIE DI COMMERCIABILITA' O + DI UTILIZZABILITA' PER UN PARTICOLARE SCOPO. L'INTERO RISCHIO + CONCERNENTE LA QUALITA' E LE PRESTAZIONI DEL PROGRAMMA E' DEL + LICENZIATARIO. SE IL PROGRAMMA DOVESSE RISULTARE DIFETTOSO, IL + LICENZIATARIO SI ASSUME I COSTI DI MANUTENZIONE, RIPARAZIONE O + CORREZIONE.

+ +

16. Limitazione di Responsabilità.

+ +

IN NESSUN CASO, A MENO CHE NON SIA RICHIESTO DALLA NORMATIVA VIGENTE + O CONCORDATO PER ISCRITTO, I DETENTORI DEL COPYRIGHT, O QUALUNQUE + ALTRA PARTE CHE MODIICA E/O DISTRIBUISCE IL PROGRAMMA SECONDO LE + CONDIZIONI PRECEDENTI, POSSONO ESSERE RITENUTI RESPONSABILI NEI + CONFRONTI DEL LICENZIATARIO PER DANNI, INCLUSO QUALUNQUE + DANNEGGIAMENTO GENERICO, SPECIALE, INCIDENTALE O CONSEQUENZIALE + DOVUTO ALL'USO O ALL'IMPOSSIBILITA' D'USO DEL PROGRAMMA (INCLUSI, MA + NON LIMITATI A, LE PERDITE DI DATI, LA CORRUZIONE DI DATI, LE + PERDITE SOSTENUTE DAL LICENZIATARIO O DA TERZE PARTI O + L'IMPOSSIBILITA' DEL PROGRAMMA A FUNZIONARE ASSIEME AD ALTRI + PROGRAMMI), ANCHE NEL CASO IN CUI IL DETENTORE O LE ALTRE PARTI + SIANO STATI AVVISATI CIRCA LA POSSIBILITA' DI TALI DANNEGGIAMENTI.

+ +

17. Interpretazione delle Sezioni 15 e 16.

+ +

Se la dichiarazione di garanzia e la limitazione di responsabilità + fornite precedentemente non hanno effetto legale in un paese a causa + delle loro condizioni, le corti di giustizia devono applicare la norma + locale che più si avvicini al rifiuto assoluto di qualsivoglia + responsabilità civile relativa al Programma, a meno che una garanzia o + una assunzione di responsabilità scritta non accompagni una copia del + programma ottenuta dietro pagamento.

+ +

FINE DEI TERMINI E DELLE CONDIZIONI

+ +

Come applicare questre condizioni di Licenza ai vostri programmi

+ +

Se sviluppi un nuovo programma, e vuoi che esso sia della massima utilità, + il modo migliore è quello di renderlo software libero, in modo che chiunque + possa ridistribuirlo e modificarlo secondo i termini di questa Licenza.

+ +

Per fare ciò, allega le seguenti note informative al programma. + Il modo migliore è quello di inserirle all’inizio di ciascun file sorgente, + al fine di rimarcare adeguatamente la mancanza di garanzia; ciascun file dovrebbe inoltre contenere + la dichiarazione di copyright e un riferimento al posto in cui è possibile ottenere + la versione completa delle note informative.

+ +
<one line to give the program’s name
+and a brief idea of what it does.>
+Copyright (C) <year>  <name of author>
+
+This program is free software: you can
+redistribute it and/or modify
+it under the terms of the GNU General
+Public License as published by the Free
+Software Foundation, either version 3
+of the License, or(at your option)
+any later version.
+
+This program is distributed in the hope
+that it will be useful, but WITHOUT ANY
+WARRANTY; without even the implied
+warranty of MERCHANTABILITY or FITNESS
+FOR A PARTICULAR PURPOSE.  See the GNU
+General Public License for more details.
+
+You should have received a copy of the
+GNU General Public License along with
+this program.  If not, see
+<http://www.gnu.org/licenses/>.
+ +

Inoltre, aggiungi le informazioni necessarie a contattarti via posta ordinaria o via posta elettronica.

+ +

Se il programma interagisce mediante terminale, fai in modo che visualizzi, + quando viene avviato in modalità interattiva, un breve messaggio come quello che segue:

+ +
<program>  Copyright (C) <year>
+<name of author>
+This program comes with ABSOLUTELY NO
+WARRANTY; for details type `show w'.
+This is free software, and you are
+welcome to redistribute it under
+certain conditions; type `show c'
+for details.
+ +

Gli ipotetici comandi `show w' e `show c' devono visualizzare le parti corrispondenti + della GNU General Public License. Naturalmente i comandi del tuo programma potrebbero essere differenti; + per una interfaccia di tipo GUI, dovresti usare un bottone “About” o “Info”.

+ +

Devi inoltre fare in modo che il tuo datore di lavoro (se lavori come programmatore presso terzi) o la tua scuola, + eventualmente, firmino una “rinuncia al copyright” sul programma, se necessario. + Per maggiori informazioni su questo punto, e su come applicare e rispettare la GNU GPL, consultare la pagina + <http://www.gnu.org/licenses/>.

+ +

La GNU General Public License non consente di incorporare il programma all’interno di software proprietario. + Se il tuo programma è una libreria di funzioni, potresti ritenere più opportuno consentire il collegamento + tra software proprietario e la tua libreria. Se è questo ciò che vuoi, allora utilizza la GNU Lesser General Public License + anziché questa Licenza, ma prima leggi + <http://www.gnu.org/philosophy/why-not-lgpl.html>.

+ +
+ +

Apache License

+

Version 2.0, January 2004

+

http://www.apache.org/licenses/

+ +

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

+ +

1. Definitions.

+ +

“License” shall mean the terms and conditions for use, reproduction, and + distribution as defined by Sections 1 through 9 of this document.

+ +

“Licensor” shall mean the copyright owner or entity authorized by the + copyright owner that is granting the License.

+ +

“Legal Entity” shall mean the union of the acting entity and all other + entities that control, are controlled by, or are under common control with + that entity. For the purposes of this definition, “control” means (i) the + power, direct or indirect, to cause the direction or management of such + entity, whether by contract or otherwise, or (ii) ownership of fifty + percent (50%) or more of the outstanding shares, or (iii) beneficial + ownership of such entity.

+ +

“You” (or “Your”) shall mean an individual or Legal Entity exercising + permissions granted by this License.

+ +

“Source” form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation source, + and configuration files.

+ +

“Object” form shall mean any form resulting from mechanical transformation + or translation of a Source form, including but not limited to compiled + object code, generated documentation, and conversions to other media types.

+ +

“Work” shall mean the work of authorship, whether in Source or Object form, + made available under the License, as indicated by a copyright notice that + is included in or attached to the work (an example is provided in the + Appendix below).

+ +

“Derivative Works” shall mean any work, whether in Source or Object form, + that is based on (or derived from) the Work and for which the editorial + revisions, annotations, elaborations, or other modifications represent, as + a whole, an original work of authorship. For the purposes of this License, + Derivative Works shall not include works that remain separable from, or + merely link (or bind by name) to the interfaces of, the Work and Derivative + Works thereof.

+ +

“Contribution” shall mean any work of authorship, including the original + version of the Work and any modifications or additions to that Work or + Derivative Works thereof, that is intentionally submitted to Licensor for + inclusion in the Work by the copyright owner or by an individual or Legal + Entity authorized to submit on behalf of the copyright owner. For the + purposes of this definition, “submitted” means any form of electronic, + verbal, or written communication sent to the Licensor or its + representatives, including but not limited to communication on electronic + mailing lists, source code control systems, and issue tracking systems that + are managed by, or on behalf of, the Licensor for the purpose of discussing + and improving the Work, but excluding communication that is conspicuously + marked or otherwise designated in writing by the copyright owner as “Not a + Contribution.”

+ +

“Contributor” shall mean Licensor and any individual or Legal Entity on + behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work.

+ +

2. Grant of Copyright License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby + grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, + irrevocable copyright license to reproduce, prepare Derivative Works of, publicly + display, publicly perform, sublicense, and distribute the Work and such + Derivative Works in Source or Object form.

+ +

3. Grant of Patent License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby grants + to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, use, + offer to sell, sell, import, and otherwise transfer the Work, where such + license applies only to those patent claims licensable by such Contributor + that are necessarily infringed by their Contribution(s) alone or by + combination of their Contribution(s) with the Work to which such + Contribution(s) was submitted. If You institute patent litigation against + any entity (including a cross-claim or counterclaim in a lawsuit) alleging + that the Work or a Contribution incorporated within the Work constitutes + direct or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate as of the + date such litigation is filed.

+ +

4. Redistribution.

+ +

You may reproduce and distribute copies of the Work or Derivative Works thereof + in any medium, with or without modifications, and in Source or Object form, provided + that You meet the following conditions:

+ +
    +
  1. You must give any other recipients of the Work or Derivative Works a + copy of this License; and
  2. + +
  3. You must cause any modified files to carry prominent notices stating + that You changed the files; and
  4. + +
  5. You must retain, in the Source form of any Derivative Works that You + distribute, all copyright, patent, trademark, and attribution notices from + the Source form of the Work, excluding those notices that do not pertain to + any part of the Derivative Works; and
  6. + +
  7. If the Work includes a “NOTICE” text file as part of its distribution, + then any Derivative Works that You distribute must include a readable copy + of the attribution notices contained within such NOTICE file, excluding + those notices that do not pertain to any part of the Derivative Works, in + at least one of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or documentation, + if provided along with the Derivative Works; or, within a display generated + by the Derivative Works, if and wherever such third-party notices normally + appear. The contents of the NOTICE file are for informational purposes only + and do not modify the License. You may add Your own attribution notices + within Derivative Works that You distribute, alongside or as an addendum to + the NOTICE text from the Work, provided that such additional attribution + notices cannot be construed as modifying the License. +
    +
    + You may add Your own copyright statement to Your modifications and may + provide additional or different license terms and conditions for use, + reproduction, or distribution of Your modifications, or for any such + Derivative Works as a whole, provided Your use, reproduction, and + distribution of the Work otherwise complies with the conditions stated in + this License.
  8. +
+ +

5. Submission of Contributions.

+ +

Unless You explicitly state otherwise, any Contribution intentionally submitted for + inclusion in the Work by You to the Licensor shall be under the terms and + conditions of this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify the + terms of any separate license agreement you may have executed with Licensor + regarding such Contributions.

+ +

6. Trademarks.

+ +

This License does not grant permission to use the trade names, trademarks, service marks, + or product names of the Licensor, except as required for reasonable and customary use + in describing the origin of the Work and reproducing the content of the + NOTICE file.

+ +

7. Disclaimer of Warranty.

+ +

Unless required by applicable law or agreed to in writing, Licensor provides the Work + (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT + WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, + without limitation, any warranties or conditions of TITLE, + NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You + are solely responsible for determining the appropriateness of using or + redistributing the Work and assume any risks associated with Your exercise + of permissions under this License.

+ +

8. Limitation of Liability.

+ +

In no event and under no legal theory, whether in tort (including negligence), contract, + or otherwise, unless required by applicable law (such as deliberate and + grossly negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a result + of this License or out of the use or inability to use the Work (including + but not limited to damages for loss of goodwill, work stoppage, computer + failure or malfunction, or any and all other commercial damages or losses), + even if such Contributor has been advised of the possibility of such + damages.

+ +

9. Accepting Warranty or Additional Liability.

+ +

While redistributing the Work or Derivative Works thereof, You may choose + to offer, and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this License. + However, in accepting such obligations, You may act only on Your own behalf + and on Your sole responsibility, not on behalf of any other Contributor, + and only if You agree to indemnify, defend, and hold each Contributor + harmless for any liability incurred by, or claims asserted against, such + Contributor by reason of your accepting any such warranty or additional + liability.

+ +

END OF TERMS AND CONDITIONS

+ +

APPENDIX: How to apply the Apache License to your work

+ +

To apply the Apache License to your work, attach the following boilerplate + notice, with the fields enclosed by brackets “[]” replaced with your own + identifying information. (Don’t include the brackets!) The text should be + enclosed in the appropriate comment syntax for the file format. We also + recommend that a file or class name and description of purpose be included + on the same “printed page” as the copyright notice for easier + identification within third-party archives.

+
Copyright [yyyy] [name of copyright owner]
+
+Licensed under the Apache License,
+Version 2.0 (the “License”);
+you may not use this file except
+in compliance with the License.
+You may obtain a copy of the License at
+
+http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law
+or agreed to in writing, software
+distributed under the License is
+distributed on an “AS IS” BASIS,
+WITHOUT WARRANTIES OR CONDITIONS
+OF ANY KIND, either express or implied.
+See the License for the specific
+language governing permissions and
+limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/it/about_licenses_dark.html b/app/src/main/assets/it/about_licenses_dark.html deleted file mode 100644 index 8df59a4d..00000000 --- a/app/src/main/assets/it/about_licenses_dark.html +++ /dev/null @@ -1,1162 +0,0 @@ - - - - - - - - - - -

Copyright

-

Privacy Browser copyright © 2015-2020: Soren Stoutner.

- -

Licenza

-

Privacy Browser è rilasciato con Licenza GPLv3+ . - Il testo completo è riportato per intero nella parte finale di questo documento. Si precisa che questa è una traduzione non ufficiale della - GNU General Public License, non è stata pubblicata dalla Free Software Foundation, e non stabilisce i termini legali di distribuzione del software - che usa la GNU GPL. Soltanto la versione originale in inglese della GNU GPL fa ciò. - Lo scopo di questa traduzione è unicamente quello di aiutare gli utenti di lingua italiana a comprendere la GNU GPL, e pertanto in caso di eventuali discrepanze tra - traduzione e versione originale in inglese, prevarrà e sarà unicamente la versione originale ad avere valore legale. - E' inoltre ammessa la modifica e la pubblicazione di questa traduzione, ma solamente in accordo ai termini qui riportati. - Il codice sorgente è disponibile su git.stoutner.com.

- -

Blocklist

-

EasyList e EasyPrivacy - sono sotto doppia licenza con le licenze GPLv3+ - e Creative Commons Attribution-ShareAlike 3.0+ Unported. Privacy Browser le incorpora utilizzando l'opzione GPLv3+.

- -

La Fanboy’s Annoyance List e la Fanboy’s Social Blocking List - sono rilasciate sotto la licenza Creative Commons Attribution 3.0 Unported, - che è compatibile con la licenza GPLv3+. Le liste sono incluse senza modifiche in Privacy Browser.

- -

E' possibile reperire maggiori informazioni sulle block list sul sito web EasyList.

- -

Librerie

-

Privacy Browser è compilato utilizzando le Librerie AndroidX, - le Librerie Kotlin, - e il codice disponibile nella Google Material Maven repository, - entrambi rilasciati con Licenza Apache 2.0.

- -

La versione gratuita di Privacy Browser è compilata con Firebase Ads, - che è rilasciato sotto la Licenza Android Software Development Kit.

- -

Classi

-

com.stoutner.privacybrowser.views.CheckedLinearLayout è la versione modificata di una classe contenuta nel codice sorgente della - Fotocamera Android. - Il file originale è stato rilasciato sotto la Licenza Apache 2.0. - Il file modificato è rilasciato sotto la Licenza GPLv3+.

- -

Icone

-

- sono state derivate da security e language, che fanno parte - dell'Android Material icon set e sono state rilasciate sotto Licenza Apache 2.0. - Il testo completo della Licenza è riportato di seguito. Copyright delle modifiche © 2016 Soren Stoutner. - Le immagini risultanti sono rilasciate sotto Licenza GPLv3+.

-

è stata derivata da elementi di folder e di exit_to_app, che fanno parte - dell'Android Material icon set e sono state rilasciate sotto Licenza Apache 2.0. - Copyright delle modifiche © 2017 Soren Stoutner. - L'immagine risultante è rilasciata sotto Licenza GPLv3+.

-

è stata derivata da elementi di bookmark e di create_new_folder, che fanno parte - dell'Android Material icon set e sono state rilasciate sotto Licenza Apache 2.0. - Copyright delle modifiche © 2017 Soren Stoutner. - L'immagine risultante è rilasciata sotto Licenza GPLv3+.

-

è stata derivata da create_new_folder, - che fa parte dell'Android Material icon set ed è stata rilasciata sotto Licenza Apache 2.0. - Copyright delle modifiche © 2017 Soren Stoutner. - L'immagine risultante è rilasciata sotto Licenza GPLv3+.

-

è stata derivata da exit_to_app, - che fa parte dell'Android Material icon set ed è stata rilasciata sotto Licenza Apache 2.0. - Copyright delle modifiche © 2017 Soren Stoutner. - L'immagine risultante è rilasciata sotto Licenza GPLv3+.

-

è stata derivata da compare, - che fa parte dell'Android Material icon set ed è stata rilasciata sotto Licenza Apache 2.0. - Copyright delle modifiche © 2017 Soren Stoutner. -

è stata derivata da sort, - che fa parte dell'Android Material icon set ed è stata rilasciata sotto Licenza Apache 2.0. - Copyright delle modifiche © 2019 Soren Stoutner. - L'immagine risultante è rilasciata sotto Licenza GPLv3+.

-

cookie è stata creata da Google. - E' stata rilasciata con Licenza Apache 2.0 - e può essere scaricata dirattamente dal Material Design Icons. Non è stata modificata ad eccezione del colore e della dimensione.

-

Le seguenti icone derivano dall'Android Material icon set, - che è rilasciato sotto Licenza Apache 2.0. - Non sono state modificatae ad eccezione del colore e della dimensione. Alcune sono state rinominate per coerenza con il tipo di utilizzo all'interno del codice. - Le icone con i loro nomi originali sono riportate di seguito.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

- -
- -

GNU General Public License

-

Versione 3, 29 Giugno 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

A chiunque è permesso copiare e ridistribuire copie esatte di questo documento di licenza, - ma non è in alcun modo consentito apportarvi modifiche. -

- -

Premessa

- -

La GNU General Public License è una licenza libera, basata su copyleft per software e altri tipi di opere.

- -

Le licenze della maggior parte del software e di altre opere materiali - sono pensate per togliere la libertà di condividere e modificare tali opere. - Al contrario, la GNU General Public License ha l'obiettivo di garantire - la libertà di condividere e modificare tutte le versioni di un programma - e di fare in modo che esso rimanga software libero per tutti gli utenti. - Noi, Free Software Foundation, usiamo la GNU General Public License - per la maggior parte del nostro software; essa viene applicata anche a qualunque - altro software rilasciato dall'autore sotto questa licenza. - Chiunque può utilizzare questa licenza per i propri programmi.

- -

Quando parliamo di software libero (free software), ci riferiamo al concetto di libertà, - non al prezzo. Le nostre General Public License sono concepite per garantire - che chiunque abbia la libertà di distribuire copie di software libero - (anche dietro pagamento di un prezzo, se lo desidera), che chiunque riceva o possa ricevere - il codice sorgente se lo vuole, che chiunque possa apportare modifiche al software - o utilizzarne solo alcune porzioni in altri software liberi, e che chiunque sappia - che ha il diritto di fare tutte queste cose.

- -

Per proteggere i vostri diritti, abbiamo la necessità di impedire che altri - vi neghino questi diritti o vi obblighino a rinunciarvi. - Pertanto, chiunque distribuisce o modifica software rilasciato con questa licenza - si assume dei precisi doveri: il dovere di rispettare la libertà degli altri.

- -

Per esempio, chi distribuisce copie di un programma rilasciato sotto questa licenza, - sia a titolo gratuito che mediante pagamento di un prezzo,è obbligato a riconoscere - a chi riceve il software esattamente gli stessi diritti che ha ricevuto. - Deve garantire che chi riceva il software abbia o possa avere accesso al codice sorgente. - E deve far conoscere ai destinatari del software queste condizioni, - così che essi conoscano quali sono i loro diritti.

- -

Gli sviluppatori che utilizzano la GNU GPL proteggono i vostri diritti in due modi: - (1) Rivendicando il copyright sul software, e - (2) offrendovi questa licenza che vi garantisce il diritto legale di copiarlo e/o di modificarlo.

- -

Al fine di proteggere gli sviluppatori e gli autori, la GPL spiega chiaramente - che non esiste nessuna garanzia per questo software libero. Nell'interesse - sia degli utenti che degli autori, la GPL impone che le versioni modificate del software - vengano esplicitamente marcate come “modificate”, in modo tale che eventuali problemi - non vengano erroneamente attribuiti agli autori delle versioni precedenti.

- -

Alcuni dispositivi sono progettati per negare agli utenti l'installazione - o l'esecuzione di versioni modificate del software installato sugli stessi, - anche se il costruttore si riserva la possibilità di farlo. - Ciò è fondamentalmente incompatibile con l'obiettivo di garantire la libertà - degli utenti di modificare il software. Una ripetizione sistematica di tali abusi - avviene nel campo dei dispositivi per usi individuali, e ciò rende questi abusi - ancora più inaccettabili. Pertanto, abbiamo realizzato questa versione della GPL - al fine di proibire una tale pratica per questo tipo di prodotti. Se problemi simili - dovessero sorgere in altri ambiti, saremo pronti ad estendere queste misure - a questi nuovi ambiti in versioni future della GPL, nella maniera che si renderà necessaria - per difendere la libertà degli utenti.

- -

In conclusione, tutti i programmi sono costantemente minacciati dai brevetti sul software. - Gli Stati non dovrebbero permettere ai brevetti di limitare lo sviluppo - e l'utilizzo di software per computer, ma nei Paesi in cui ciò avviene noi vogliamo evitare - il pericolo che i brevetti applicati ad un programma libero possano renderlo, a tutti gli effetti, - proprietario. Per impedire ciò, la GPL assicura che non è possibile utilizzare - i brevetti sul software per rendere un programma non libero.

- -

I termini e le condizioni esatte per la copia, la distribuzione e la modifica del software - sono riportate di seguito.

- -

TERMINI E CONDIZIONI

- -

0. Definizioni.

- -

“Questa Licenza” fa riferimento alla versione 3 della GNU General Public License.

- -

“Copyright” indica anche leggi simili al copyright che riguardano altri tipi di opere, - come le maschere per la produzione di semiconduttori.

- -

“Il Programma” indica qualunque opera che sia soggetta a copyright e che sia rilasciata - sotto questa Licenza. I detentori della licenza sono indicati come “tu”. “Licenziatari” e - “destinatari” possono essere individui o organizzazioni.

- -

“Modificare” un'opera significa copiare o adattare tutta o parte dell'opera - in una maniera che richieda un permesso di copyright, e non indica la semplice azione - di fare una esatta copia dell'opera. L'opera risultante viene chiamata “versione modificata” - dell'opera precedente, oppure viene detta opera “basata sulla” opera precedente.

- -

Un'“opera coperta da questa licenza” indica il Programma originale non modificato - oppure un'opera basata sul Programma.

- -

“Propagare” un'opera significa fare una qualunque cosa con essa che, - in mancanza di un esplicito permesso, ti renda direttamente o indirettamente perseguibile - per violazione secondo le vigenti normative sul copyright, - ad eccezione della semplice esecuzione del Programma su un computer - o della modifica di una copia privata. La Propagazione include la copia, - la distribuzione (con o senza modifiche), la messa a disposizione al pubblico e, - in alcuni stati, altre attività simili e connesse.

- -

“Distribuire” un'opera indica qualunque forma di propagazione - che permetta a terze parti di effettuare o ricevere delle copie. - La mera interazione con un utente attraverso una rete di computer, - senza che ci sia alcun trasferimento di una copia, non è considerata “Distribuzione”.

- -

Una interfaccia utente interattiva fornisce delle “Adeguate Informazioni Legali” - soltanto nel caso in cui includa una apposita funzionalità, resa adeguatamente visibile, che - (1) visualizzi un'adeguata informazione di copyright, e - (2) informi l'utente che non c'è alcuna garanzia sull'opera (eccetto nel caso in cui - delle garanzie sono espressamente fornite), dica che il licenziatario può distribuire - l'opera utilizzando questa Licenza, indichi come è possibile prendere visione di una copia - di questa Licenza. - Se l'interfaccia presenta una lista di comandi o di opzioni, come ad esempio un menù, - una delle opzioni fornite nella lista deve rispettare questa condizione.

- -

1. Codice Sorgente.

- -

Il “codice sorgente” di un'opera indica la forma più indicata - dell'opera per poter effettuare modifiche su di essa. Il “codice oggetto” - indica qualunque forma dell'opera che non sia codice sorgente.

- -

Una “Interfaccia Standard” è una interfaccia che risponde ad uno - standard ufficiale definito da un ente di standardizzazione riconosciuto - o, nel caso di interfacce specifiche per un particolare linguaggio di - programmazione, una interfaccia che è largamente utilizzata dagli - sviluppatori per sviluppare in tale linguaggio.

- -

Le “Librerie di Sistema” di un eseguibile includono qualunque cosa, - eccetto l'opera nel suo insieme, che (a) sia inclusa nella normale forma - di pacchettizzazione di un “Componente Principale”, ma che non è - parte di quel Componente Principale, e (b) che serva solo a consentire - l'uso dell'opera con quel Componente Principale, o per implementare una - Interfaccia Standard per la quale esista una implementazione disponibile - al pubblico in forma sorgente. Un “Componente Principale”, in questo - contesto, è un componente essenziale (kernel, gestore di finestre - eccetera) dello specifico sistema operativo (ammesso che ce ne sia uno) - sul quale l'eseguibile esegue, o un compilatore utilizzato per produrre - il programma, o un interprete di codice oggetto utilizzato per eseguire - il programma.

- -

Il “Sorgente Corrispondente” per un'opera in forma di codice oggetto - è il codice sorgente necessario per generare, installare e (per un - programma eseguibile) eseguire il codice oggetto e per modificare - l'opera, inclusi gli script per controllare le suddette attività di - generazione, installazione ed esecuzione. Non sono incluse le Librerie - di Sistema usate dal programma, o gli strumenti di utilità generica o i - programmi liberamente accessibili che sono utilizzati, senza modifiche, - per portare a termine le suddette attività ma che non fanno parte - dell'opera. Per esempio, il sorgente corrispondente include i file con - le definizioni delle interfacce associati ai file sorgente dell'opera, e - il codice sorgente delle librerie condivise e sottoprogrammi collegati - dinamicamente specificatamente necessari per il programma, ad esempio a - causa di stretta comunicazione dati o di controllo di flusso tra questi - sottoprogrammi e altre parti del programma.

- -

Il Sorgente Corrispondente non include nulla che l'utente possa - rigenerare automaticamente da altre parti del Sorgente Corrispondente - stesso.

- -

Il Sorgente Corrispondente di un'opera in forma di codice sorgente è - l'opera stessa.

- -

2. Principali Diritti.

- -

Tutti i diritti garantiti da questa Licenza sono garantiti per la durata - del copyright sul Programma, e sono irrevocabili ammesso che le - condizioni qui riportate siano rispettate. Questa Licenza afferma esplicitamente il - tuo permesso illimitato di eseguire il Programma non modificato. Il - risultato dell'esecuzione di un programma coperto da questa Licenza è - a sua volta coperto da questa Licenza solo se il risultato stesso, a - causa del suo contenuto, è un'opera coperta da questa Licenza. Questa - Licenza riconosce il tuo diritto all'uso legittimo o altri diritti - equivalenti, come stabilito dalla legislazione sul copyright.

- -

Puoi creare, eseguire e propagare programmi che tu non distribuisci - coperti da questa Licenza, senza alcuna condizione fino a quando la tua - Licenza rimane valida. Puoi distribuire opere coperte da questa Licenza - ad altri al solo scopo di ottenere che essi facciano delle modifiche al - programma esclusivamente per te, o che ti forniscano dei servizi per - l'esecuzione di queste opere, ammesso che tu rispetti i termini di - questa Licenza nel distribuire tutto il materiale per il quale non - detieni il copyright. Coloro i quali creano o eseguono per conto tuo un - programma coperto da questa Licenza lo fanno esclusivamente in tua vece, - sotto la tua direzione e il tuo controllo, in maniera tale che sia - proibito a costoro effettuare copie di materiale di cui detieni il - copyright al di fuori della relazione che intrattengono nei tuoi - confronti.

- -

Distribuire opere coperte da licenza in qualunque altra circostanza è - consentito soltanto alle condizioni espresse in seguito. Non è - consentito sottolicenziare le opere: la sezione 10 lo rende non - necessario.

- -

3. Protezione dei diritti legali degli utenti dalle leggi - anti-elusione.

- -

Nessun programma protetto da questa Licenza può essere considerato - parte di una misura tecnologica di restrizione che sottostia ad alcuna - delle leggi che soddisfano l'articolo 11 del “WIPO copyright treaty” - adottato il 20 Dicembre 1996, o a simili leggi che proibiscono o - limitano l'elusione di tali misure tecnologiche di restrizione.

- -

Quando distribuisci un programma coperto da questa Licenza, rifiuti - tutti i poteri legali atti a proibire l'elusione di misure tecnologiche - di restrizione ammesso che tale elusione sia effettuata nell'esercizio - dei diritti garantiti da questa Licenza riguardo al programma coperto da - questa Licenza, e rinunci all'intenzione di limitare l'operatività o - la modifica del programma per far valere, contro i diritti degli utenti - del programma, diritti legali tuoi o di terze parti che impediscano - l'elusione di misure tecnologiche di restrizione.

- -

4. Distribuzione di Copie Esatte.

- -

Ti è permesso distribuire copie esatte del codice sorgente del - Programma come lo hai ricevuto, con qualunque mezzo, ammesso che tu - aggiunga in maniera appropriata su ciascuna copia una appropriata nota - di copyright; che tu lasci intatti tutti gli avvisi che affermano che - questa Licenza e tutte le clausole non-permissive aggiunte in accordo - con la sezione 7 sono valide per il codice che distribuisci; che tu - lasci intatti tutti gli avvisi circa l'assenza di garanzia; che tu - fornisca a tutti i destinatari una copia di questa Licenza assieme al - Programma.

- -

Puoi richiedere il pagamento di un prezzo o di nessun prezzo per - ciascuna copia che distribuisci, e puoi offrire supporto o garanzia - a pagamento.

- -

5. Distribuzione di Versioni modificate del sorgente.

- -

Puoi distribuire un'opera basata sul Programma, o le modifiche per - produrla a partire dal Programma, nella forma di codice sorgente secondo - i termini della sezione 4, ammesso che tu rispetti anche tutte le - seguenti condizioni:

- -
    -
  • a) L'opera deve recare con sè delle informazioni adeguate che - affermino che tu l'hai modificata, indicando la data di modifica.
  • - -
  • b) L'opera deve recare informazioni adeguate che affermino che essa è - rilasciata sotto questa Licenza e sotto le condizioni aggiuntive - secondo quanto indicato dalla Sezione 7. Questa condizione modifica la - condizione espressa alla sezione 4 di “lasciare intatti tutti gli - avvisi”.
  • - -
  • c) Devi rilasciare l'intera opera, nel suo complesso, sotto questa - Licenza a chiunque venga in possesso di una copia di essa. Questa - Licenza sarà pertanto applicata, assieme ad eventuali clausole - aggiunte in osservanza della Sezione 7, all'opera nel suo complesso, a - tutte le sue parti, indipendentemente da come esse siano - pacchettizzate. Questa Licenza nega il permesso di licenziare l'opera - in qualunque altro modo, ma non rende nullo un tale permesso ammesso - che tu lo abbia ricevuto separatamente.
  • - -
  • d) Se l'opera ha delle interfacce utente interattive, ciascuna deve - mostrare delle Adeguate Informazioni Legali; altrimenti, se il - Programma ha delle interfacce interattive che non visualizzano delle - Adeguate Informazioni Legali, il tuo programma non è obbligato a - visualizzarle.
  • -
- -

La giustapposizione di un'opera coperta da questa Licenza assieme ad - altre opere separate e indipendenti, che non sono per loro natura - estensioni del Programma, e che non sono combinate con esso a formare un - altro programma più grande, dentro o in uno stesso supporto di - memorizzazione a lungo termine o di distribuzione, è semplicemente - detto “aggregato” se la raccolta e il suo copyright non sono - utilizzati per limitare l'accesso o i diritti legali degli utenti della - raccolta stessa oltre ciò che ciascun singolo programma - consente. L'inclusione di un programma coperto da questa Licenza in un - aggregato non comporta l'applicazione di questa Licenza alle altre parti - dell'aggregato.

- -

6. Distribuzione in formato non-sorgente.

- -

Puoi distribuire un programma coperto da questa Licenza in formato di - codice oggetto secondo i termini delle sezioni 4 e 5, ammesso che tu - fornisca anche il Sorgente Corrispondente in formato comprensibile - da un computer sotto i termini di questa stessa Licenza, in uno dei - seguenti modi:

- -
    -
  • a) Distribuendo il codice oggetto in, o contenuto in, un prodotto - fisico (inclusi i mezzi fisici di distribuzione), accompagnato dal - Sorgente Corrispondente su un supporto fisico duraturo comunemente - utilizzato per lo scambio di software.
  • - -
  • b) Distribuendo il codice oggetto in, o contenuto in, un prodotto fisico - (inclusi i mezzi fisici di distribuzione), accompagnato da un'offerta - scritta, valida per almeno tre anni e valida per tutto il tempo - durante il quale tu offri ricambi o supporto per quel modello di - prodotto, di fornire a chiunque possieda il codice oggetto (1) una - copia del Sorgente Corrispondente di tutto il software contenuto nel - prodotto che è coperto da questa Licenza, su un supporto fisico - duraturo comunemente utilizzato per lo scambio di software, ad un - prezzo non superiore al costo ragionevole per effettuare fisicamente - tale distribuzione del sorgente, oppure (2) accesso alla copia del - Sorgente Corrispondente attraverso un server di rete senza alcun costo - aggiuntivo.
  • - -
  • c) Distribuendo copie singole del codice oggetto assieme ad una copia - dell'offerta scritta di fornire il Sorgente Corrispondente. Questa - possibilità è permessa soltanto occasionalmente e per fini non - commerciali, e solo se tu hai ricevuto il codice oggetto assieme ad - una tale offerta, in accordo alla sezione 6b.
  • - -
  • d) Distribuendo il codice oggetto mediante accesso da un luogo designato - (gratis o dietro pagamento di un prezzo), e offrendo un accesso - equivalente al Sorgente Corrispondente alla stessa maniera a partire - dallo stesso luogo senza costi aggiuntivi. Non devi obbligare i - destinatari a copiare il Sorgente Corrispondente assieme al codice - oggetto. Se il luogo dal quale copiare il codice oggetto è un server - di rete, il Sorgente Corrispondente può trovarsi su un server - differente (gestito da te o da terze parti) che fornisca - funzionalità equivalenti per la copia, a patto che tu fornisca delle - indicazioni chiare accanto al codice oggetto che indichino dove - trovare il Sorgente Corrispondente. Indipendentemente da quale server - ospiti il Sorgente Corrispondente, tu rimani obbligato ad assicurare - che esso rimanga disponibile per tutto il tempo necessario a - soddisfare queste condizioni.
  • - -
  • e) Distribuendo il codice oggetto mediante trasmissione peer-to-peer, a - patto che tu informi gli altri peer circa il luogo in cui il codice - oggetto e il Sorgente Corrispondente sono gratuitamente offerti al - pubblico secondo i termini della sezione 6d.
  • -
- -

Una porzione separabile del codice oggetto, il cui sorgente è - escluso dal Sorgente Corrispondente e trattato come Libreria di - Sistema, non deve essere obbligatoriamente inclusa nella distribuzione - del codice oggetto del programma.

- -

Un “Prodotto Utente” è un (1) “prodotto consumer”, cioè - qualunque proprietà personale tangibile che è normalmente utilizzata - per scopi personali, familiari o domestici, oppure (2) qualunque cosa - progettata o venduta per essere utilizzata in ambiente domestico. Nella - classificazione di un prodotto come “prodotto consumer”, i casi dubbi - andranno risolti in favore dell'ambito di applicazione. Per un dato - prodotto ricevuto da un dato utente, “normalmente utilizzato” si - riferisce ad un uso tipico o comune di quella classe di prodotti, - indipendentemente dallo stato dell'utente specifico o dal modo in cui - l'utente specifico utilizza, o si aspetta o ci si aspetta che utilizzi, - il prodotto. Un prodotto è un “prodotto consumer” indipendentemente - dal fatto che abbia usi commerciali, industriali o diversi da quelli - “consumer”, a meno che questi usi non rappresentino il solo modo utile - di utilizzare il prodotto in questione.

- -

Le “Informazioni di Installazione” per un Prodotto Utente sono i - metodi, le procedure, le chiavi di autorizzazioni o altre informazioni - necessarie per installare ed eseguire versioni modificate di un - programma coperto da questa Licenza all'interno di un Prodotto Utente, a - partire da versioni modificate dei suoi Sorgenti Corrispondenti. Tali - informazioni devono essere sufficienti ad assicurare che il - funzionamento del codice oggetto modificato non sia in nessun caso - proibito o ostacolato per il solo fatto che sono state apportate delle - modifiche.

- -

Se distribuisci un codice oggetto secondo le condizioni di questa - sezione in, o assieme, o specificatamente per l'uso in o con un Prodotto - Utente, e la distribuzione avviene come parte di una transazione nella - quale il diritto di possesso e di uso del Prodotto Utente viene - trasferito al destinatario per sempre o per un periodo prefissato - (indipendentemente da come la transazione sia caratterizzata), il - Sorgente Corrispondente distribuito secondo le condizioni di questa - sezione deve essere accompagnato dalle Informazioni di - Installazione. Questa condizione non è richiesta se nè tu nè una - terza parte ha la possibilità di installare versioni modificate del - codice oggetto sul Prodotto Utente (ad esempio, se il programma è - installato su una ROM).

- -

La condizione che richiede di fornire delle Informazioni di Installazione - non implica che venga fornito supporto, garanzia o aggiornamenti per un - programma che è stato modificato o installato dal destinatario, o per - il Prodotto Utente in cui esso è stato modificato o installato. - L'accesso ad una rete può essere negato se le modifiche apportate - impattano materialmente sull'operatività della rete o se violano le - regole e i protocolli di comunicazione attraverso la rete.

- -

Il Sorgente Corrispondente distribuito, e le Informazioni di - Installazione fornite, in accordo con questa sezione, devono essere in - un formato che sia pubblicamente documentato (e con una implementazione - pubblicamente disponibile in formato di codice sorgente), e non devono - richiedere speciali password o chiavi per essere spacchettate, lette o - copiate.

- -

7. Condizioni Aggiuntive.

- -

Le “Condizioni Aggiuntive” sono condizioni che completano le - condizioni di questa Licenza permettendo delle eccezioni a una o più - delle condizioni sopra elencate. Le condizioni aggiuntive che sono - applicabili all'intero Programma devono essere considerate come se - fossero incluse in questa Licenza, a patto che esse siano valide secondo - le normative vigenti. Se alcune condizioni aggiuntive fanno riferimento - soltanto ad alcune parti del Programma, quelle parti possono essere - utilizzate separatamente sotto le stesse condizioni, ma l'intero - Programma rimane sottoposto a questa Licenza senza riferimento ad alcuna - condizione aggiuntiva.

- -

Quando distribuisci una copia di un programma coperto da questa Licenza, - puoi, a tua discrezione, eliminare qualunque condizione aggiuntiva dalla - copia, o da parte di essa. (Le Condizioni Aggiuntive possono essere - scritte in maniera tale da richiedere la loro rimozione in certi casi di - modifica del Programma). Puoi aggiungere Condizioni Aggiuntive su - materiale, aggiunto da te ad un'opera coperta da questa Licenza, per il - quale hai o puoi garantire un'adeguata licenza di copyright.

- -

Indipendentemente da qualunque altra condizione di questa Licenza, e per - il materiale che aggiungi ad un'opera coperta da questa Licenza, puoi - (se autorizzato dai legittimi detentori del copyright per il suddetto - materiale) aggiungere alle condizioni di questa Licenza delle condizioni - che:

- -
    -
  • a) Negano la garanzia o limitano la responsabilità del Programma in - maniera differente da quanto riportato nelle sezioni 15 e 16 di questa - Licenza; oppure
  • - -
  • b) Richiedono il mantenimento di specifiche e circostanziate informative - legali o di note di attribuzione ad autori nel materiale o assieme - alle Adeguate Informazioni Legali mostrate dal Programma che lo - contiene; oppure
  • - -
  • c) Proibiscono di fornire informazioni errate o ingannevoli sull'origine - e la provenienza del materiale in oggetto, o richiedono che versioni - modificate di tale materiale siano appositamente marcate in maniera - differente rispetto alla versione originale; oppure
  • - -
  • d) Limitano l'utilizzo per scopi pubblicitari del nome dei detentori del - copyright o degli autori del materiale; oppure
  • - -
  • e) Rifiutano di garantire diritti secondo le leggi sulla proprietà - intellettuale circa l'uso di nomi, marchi di fabbrica o similari; - oppure
  • - -
  • f) Richiedono l'indennizzo dei detentori del copyright o degli autori del - materiale in oggetto da parte di chi distribuisce il materiale (o - versioni modificate dello stesso) con impegni contrattuali circa la - responsabilità nei confronti del destinatario, per qualunque - responsabilità che questi impegni contrattuali dovessero imporre - direttamente ai suddetti detentori del copyright e autori.
  • -
- -

Tutte le altre condizioni addizionali non-permissive sono considerate - “ulteriori restrizioni”, secondo il significato specificato alla - sezione 10. Se il Programma o parti di esso contengono, all'atto della - ricezione dello stesso, informative che specificano che esso è - soggetto a questa Licenza assieme ad una condizione che è una - “ulteriore restrizione”, puoi rimuovere quest'ultima condizione. Se un - documento di licenza contiene ulteriori restrizioni ma permette di - rilicenziare o distribuire il Programma con questa Licenza, puoi - aggiungere al Programma del materiale coperto dalle condizioni di quel - documento di licenza, a patto che le ulteriori restrizioni non compaiano - nelle versioni rilicenziate o ridistribuite.

- -

Se aggiungi ad un Programma coperto da questa Licenza delle condizioni - aggiuntive in accordo con questa sezione, devi aggiungere anche, nei - file sorgenti corrispondenti, un avviso che riassuma le condizioni - aggiuntive applicate a quei file, ovvero un avviso che specifichi dove - è possibile trovare copia delle condizioni aggiunte.

- -

Tutte le Condizioni aggiuntive, permissive o non-permissive, devono - essere espresse nella forma di una licenza scritta e separata, o - espresse esplicitamente come eccezioni; in entrambi i casi valgono le - condizioni succitate.

- -

8. Cessazione di Licenza.

- -

Non puoi propagare o modificare un programma coperto da questa Licenza - in maniera diversa da quanto espressamente consentito da questa - Licenza. Qualunque tentativo di propagare o modificare altrimenti il - Programma è nullo, e provoca l'immediata cessazione dei diritti - garantiti da questa Licenza (compresi tutte le eventuali licenze di - brevetto garantite ai sensi del terzo paragrafo della sezione 11).

- -

In ogni caso, se cessano tutte le violazioni di questa Licenza, allora - la tua licenza da parte di un dato detentore del copyright viene - ripristinata (a) in via cautelativa, a meno che e fino a quando il - detentore del copyright non cessa esplicitamente e definitivamente la - tua licenza, e (b) in via permanente se il detentore del copyright non - ti notifica in alcun modo la violazione entro 60 giorni dalla cessazione - della licenza.

- -

Inoltre, la tua licenza da parte di un dato detentore del copyright - viene ripristinata in maniera permanente se il detentore del copyright ti - notifica la violazione in maniera adeguata, se questa è la prima volta - che ricevi una notifica di violazione di questa Licenza (per qualunque - Programma) dallo stesso detentore di copyright, e se rimedi alla - violazione entro 30 giorni dalla data di ricezione della notifica di - violazione.

- -

La cessazione dei tuoi diritti come specificato in questa sezione non - provoca la cessazione delle licenze di terze parti che abbiano ricevuto - copie o diritti da te secondo questa Licenza. Se i tuoi diritti cessano - e non sono ristabiliti in via permanente, non hai diritto di ricevere - nuove licenze per lo stesso materiale, secondo quanto stabilito nella - sezione 10.

- -

9. L'ottenimento di copie non richiede l'accettazione della Licenza.

- -

Non sei obbligato ad accettare i termini di questa Licenza al solo fine - di ottenere o eseguire una copia del Programma. Similmente, propagazioni - collaterali di un Programma coperto da questa Licenza che occorrono come - semplice conseguenza dell'utilizzo di trasmissioni peer-to-peer per la - ricezione di una copia non richiedono l'accettazione della Licenza. In - ogni caso, solo e soltanto questa Licenza ti garantiscono il permesso di - propagare e modificare qualunque programma coperto da questa - Licenza. Queste azioni violano le leggi sul copyright nel caso in cui tu - non accetti questa Licenza. Pertanto, modificando o propagando un - programma coperto da questa Licenza, indichi implicitamente la tua - accettazione della Licenza.

- -

10. Licenza Automatica per i successivi destinatari.

- -

Ogni qual volta distribuisci un programma coperto da questa Licenza, il - destinatario riceve automaticamente una licenza, dal detentore - originario del copyright, di eseguire, modificare e propagare il - programma, nel rispetto di questa Licenza. Non sei ritenuto responsabile - del rispetto di questa Licenza da parte di terze parti.

- -

Una “transazione d' entità” è una transazione che trasferisce il - controllo di una organizzazione, o sostanzialmente di tutti i suoi beni, - che suddivide una organizzazione o che fonde più organizzazioni. Se la - propagazione di un programma coperto da questa Licenza è conseguente - ad una transazione di entità, ciascuna parte che ha ruolo nella - transazione e che riceve una copia del programma riceve allo stesso tempo - qualsiasi licenza sul programma che i predecessori della parte - possedevano o potevano rilasciare nel rispetto del paragrafo precedente, - e in più il diritto di possesso del Sorgente Corrispondente del - programma dal predecessore in interesse, se il predecessore lo possiede - o se può ottenerlo senza troppe difficoltà.

- -

Non puoi imporre nessuna ulteriore restrizione sull'esercizio dei - diritti garantiti o affermati da questa Licenza. Per esempio, non puoi - imporre un prezzo di licenza, una royalty, o altri costi per - l'esercizio dei diritti garantiti da questa Licenza, a non puoi dar - corso ad una controversia (ivi incluse le controversie incrociate o la - difesa in cause legali) affermando che siano stati violati dei - brevetti a causa della produzione, dell'uso, della vendita, della - messa in vendita o dell'importazione del Programma o di sue parti.

- -

11. Brevetti.

- -

Un “contribuente” è un detentore di copyright che autorizza l'uso - secondo questa Licenza di un Programma o di un'opera basata sul - Programma. L'opera così licenziata viene chiamata “versione del - contribuente”.

- -

I “diritti essenziali di brevetto” da parte di un contribuente sono - tutti i diritti di brevetto che appartengono o che sono controllati dal - contribuente, che siano già acquisiti o che saranno acquisiti in - futuro, che possano essere violati in qualche maniera, consentita da - questa Licenza, generando, modificando o vendendo la versione del - contribuente, ma non includono i diritti che possano essere violati - soltanto come conseguenza di ulteriori modifiche alla versione del - contribuente. In relazione a questa definizione, il termine - “controllo” include il diritto di garantire sottolicenze di brevetto - in maniera consistente con le condizioni di questa Licenza.

- -

Ciascun contribuente ti garantisce la licenza di brevetto sui diritti - essenziali di brevetto del contribuente stesso non-esclusiva, valida in - tutto il mondo, esente da royalty, di creare, usare, vendere, offrire in - vendita, importare e altrimenti eseguire, modificare e propagare i - contenuti della versione del contribuente.

- -

Nei tre paragrafi successivi, con “licenza di brevetto” si intende - qualunque accordo o contratto, comunque denominato, di non - rivendicazione di un brevetto (come ad esempio un permesso esplicito di - utilizzare un brevetto o un accordo di rinuncia alla persecuzione per - violazione di brevetto). “Garantire” una tale licenza di brevetto ad - una parte significa portare a termine un tale accordo o contratto di non - rivendicazione di brevetto contro la parte.

- -

Se distribuisci un programma coperto da questa Licenza, confidando - consapevolmente su una licenza di brevetto, e il Sorgente Corrispondente - per il programma non è reso disponibile per la copia, senza alcun - onere aggiuntivo e comunque nel rispetto delle condizioni di questa - Licenza, attraverso un server di rete pubblicamente accessibile o - tramite altri mezzi facilmente accessibili, allora devi (1) fare in modo - che il Sorgente Corrispondente sia reso disponibile come sopra, oppure - (2) fare in modo di rinunciare ai benefici della licenza di brevetto per - quel particolare programma, oppure (3) adoperarti, in maniera - consistente con le condizioni di questa Licenza, per estendere la - licenza di brevetto a tutti i destinatari successivi. “Confidare - consapevolmente” significa che tu sei attualmente cosciente che, - eccettuata la licenza di brevetto, la distribuzione da parte tua di un - programma protetto da questa Licenza in un paese, o l'utilizzo in un - paese del programma coperto da questa Licenza da parte di un - destinatario, può violare uno o più brevetti in quel paese che tu - hai ragione di ritenere validi.

- -

Se, come conseguenza o in connessione con una singola transazione o - con un dato accordo, distribuisci, o fai in modo di distribuire, un - programma coperto da questa Licenza, e garantisci una licenza di - brevetto per alcune delle parti che ricevono il Programma - autorizzandole ad utilizzare, propagare, modificare o distribuire una - specifica copia del Programma, allora la licenza di brevetto che - fornisci è automaticamente estesa a tutti i destinatari del - Programma coperto da questa Licenza e delle opere basate sul - Programma.

- -

Una licenza di brevetto è “discriminatoria” se non include - nell'ambito della sua copertura, proibisce l'esercizio, o è vincolata - al non-esercizio di uno o più dei diritti che sono specificatamente - garantiti da questa Licenza. Non puoi distribuire un Programma coperto - da questa Licenza se sei parte di un accordo con una terza parte la cui - attività comprende la distribuzione di software, secondo il quale tu - sei costretto ad un pagamento alla parte terza in funzione della tua - attività di distribuzione del Programma, e in conseguenza del quale la - parte terza garantisce, a qualunque delle parti che riceveranno il - Programma da te, una licenza di brevetto discriminatoria (a) assieme a - copie del Programma coperto da questa Licenza distribuite da te (o ad - altre copie fatte da codeste copie), oppure (b) principalmente per e in - connessione con specifici prodotti o raccolte di prodotti che contengono - il Programma, a meno che l'accordo non sia stato stipulato, o le licenze - di brevetto non siano state rilasciate, prima del 28 Marzo 2007.

- -

Nessuna parte di questa Licenza può essere interpretata come atta ad - escludere o limitare gli effetti di qualunque altra licenza o altri - meccanismi di difesa dalla violazione che possano altrimenti essere resi - disponibili dalla normativa vigente in materia di brevetti.

- -

12. Nessuna resa di libertà altrui.

- -

Se ti vengono imposte delle condizioni (da un ordine giudiziario, da - un accordo o da qualunque altra eventualità) che contraddicono le - condizioni di questa Licenza, non sei in nessun modo esonerato dal - rispetto delle condizioni di questa Licenza. Se non puoi distribuire - un Programma coperto da questa Licenza per sottostare simultaneamente - agli obblighi derivanti da questa Licenza e ad altri obblighi - pertinenti, allora non puoi distribuire il Programma per nessun - motivo. Per esempio, se accetti delle condizioni che ti obbligano a - richiedere il pagamento di una royalty per le distribuzioni - successivamente effettuate da coloro ai quali hai distribuito il - Programma, l'unico modo per soddisfare sia queste condizioni che - questa Licenza è evitare del tutto la distribuzione del Programma.

- -

13. Utilizzo con la GNU Affero General Public License.

- -

Indipendentemente da qualunque altra condizione espressa da questa - Licenza, hai il permesso di collegare o combinare qualunque Programma - coperto da questa Licenza con un'opera rilasciata sotto la versione 3 - della licenza GNU Affero General Public License, ottenendo un singolo - Programma derivato, e di distribuire il Programma risultante. Le - condizioni di questa Licenza continuano a valere per le parti - riguardanti il Programma che sono coperte da questa Licenza, mentre le - condizioni speciali della GNU Affero General Public License, sezione 13, - riguardanti l'interazione mediante rete, saranno applicate al Programma - così risultante.

- -

14. Versioni rivedute di questa Licenza.

- -

La Free Software Foundation può pubblicare delle versioni rivedute - e/o delle nuove versioni della GNU General Public License di tanto in - tanto. Tali versioni saranno simili, nello spirito, alla presente - versione, ma potranno differire nei dettagli al fine di affrontare - nuovi problemi e nuove situazioni.

- -

A ciascuna versione viene assegnato un numero identificativo di - versione. Se il Programma specifica che si applica a sè stesso una - certa versione della GNU General Public License, “o qualunque altra - versione successiva”, hai la possibilità di sottostare alle - condizioni di quella specifica versione o di qualunque altra versione - successiva pubblicata dalla Free Software Foundation. Se il Programma - non specifica un numero di versione della GNU General Public License, - puoi scegliere qualunque versione della GNU General Public License - pubblicata dalla Free Software Foundation.

- -

Se il Programma specifica che un sostituto o un procuratore può - decidere quali versioni future della GNU General Public License posso - essere utilizzate, allora tale scelta di accettazione di una data - versione ti autorizza, in maniera permanente, ad utilizzare quella - versione della Licenza per il Programma.

- -

Versioni successive della Licenza possono garantire diritti aggiuntivi o - leggermente differenti. Ad ogni modo, nessun obbligo aggiuntivo viene - imposto agli autori o ai detentori di copyright come conseguenza della - tua scelta di adottare una versione successiva della Licenza.

- -

15. Rinuncia alla Garanzia.

- -

NON C'E' NESSUNA GARANZIA PER IL PROGRAMMA, PER QUANTO CONSENTITO DALLE - VIGENTI NORMATIVE. ECCETTO QUANDO ALTRIMENTI STABILITO PER ISCRITTO, I - DETENTORI DEL COPYRIGHT E/O LE ALTRE PARTI FORNISCONO IL PROGRAMMA - “COSI' COME È” SENZA GARANZIA DI ALCUN TIPO, NE' ESPRESSA NE' - IMPLICITA, INCLUSE, MA NON LIMITATE A, LE GARANZIE DI COMMERCIABILITA' O - DI UTILIZZABILITA' PER UN PARTICOLARE SCOPO. L'INTERO RISCHIO - CONCERNENTE LA QUALITA' E LE PRESTAZIONI DEL PROGRAMMA E' DEL - LICENZIATARIO. SE IL PROGRAMMA DOVESSE RISULTARE DIFETTOSO, IL - LICENZIATARIO SI ASSUME I COSTI DI MANUTENZIONE, RIPARAZIONE O - CORREZIONE.

- -

16. Limitazione di Responsabilità.

- -

IN NESSUN CASO, A MENO CHE NON SIA RICHIESTO DALLA NORMATIVA VIGENTE - O CONCORDATO PER ISCRITTO, I DETENTORI DEL COPYRIGHT, O QUALUNQUE - ALTRA PARTE CHE MODIICA E/O DISTRIBUISCE IL PROGRAMMA SECONDO LE - CONDIZIONI PRECEDENTI, POSSONO ESSERE RITENUTI RESPONSABILI NEI - CONFRONTI DEL LICENZIATARIO PER DANNI, INCLUSO QUALUNQUE - DANNEGGIAMENTO GENERICO, SPECIALE, INCIDENTALE O CONSEQUENZIALE - DOVUTO ALL'USO O ALL'IMPOSSIBILITA' D'USO DEL PROGRAMMA (INCLUSI, MA - NON LIMITATI A, LE PERDITE DI DATI, LA CORRUZIONE DI DATI, LE - PERDITE SOSTENUTE DAL LICENZIATARIO O DA TERZE PARTI O - L'IMPOSSIBILITA' DEL PROGRAMMA A FUNZIONARE ASSIEME AD ALTRI - PROGRAMMI), ANCHE NEL CASO IN CUI IL DETENTORE O LE ALTRE PARTI - SIANO STATI AVVISATI CIRCA LA POSSIBILITA' DI TALI DANNEGGIAMENTI.

- -

17. Interpretazione delle Sezioni 15 e 16.

- -

Se la dichiarazione di garanzia e la limitazione di responsabilità - fornite precedentemente non hanno effetto legale in un paese a causa - delle loro condizioni, le corti di giustizia devono applicare la norma - locale che più si avvicini al rifiuto assoluto di qualsivoglia - responsabilità civile relativa al Programma, a meno che una garanzia o - una assunzione di responsabilità scritta non accompagni una copia del - programma ottenuta dietro pagamento.

- -

FINE DEI TERMINI E DELLE CONDIZIONI

- -

Come applicare questre condizioni di Licenza ai vostri programmi

- -

Se sviluppi un nuovo programma, e vuoi che esso sia della massima utilità, - il modo migliore è quello di renderlo software libero, in modo che chiunque - possa ridistribuirlo e modificarlo secondo i termini di questa Licenza.

- -

Per fare ciò, allega le seguenti note informative al programma. - Il modo migliore è quello di inserirle all’inizio di ciascun file sorgente, - al fine di rimarcare adeguatamente la mancanza di garanzia; ciascun file dovrebbe inoltre contenere - la dichiarazione di copyright e un riferimento al posto in cui è possibile ottenere - la versione completa delle note informative.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Inoltre, aggiungi le informazioni necessarie a contattarti via posta ordinaria o via posta elettronica.

- -

Se il programma interagisce mediante terminale, fai in modo che visualizzi, - quando viene avviato in modalità interattiva, un breve messaggio come quello che segue:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

Gli ipotetici comandi `show w' e `show c' devono visualizzare le parti corrispondenti - della GNU General Public License. Naturalmente i comandi del tuo programma potrebbero essere differenti; - per una interfaccia di tipo GUI, dovresti usare un bottone “About” o “Info”.

- -

Devi inoltre fare in modo che il tuo datore di lavoro (se lavori come programmatore presso terzi) o la tua scuola, - eventualmente, firmino una “rinuncia al copyright” sul programma, se necessario. - Per maggiori informazioni su questo punto, e su come applicare e rispettare la GNU GPL, consultare la pagina - <http://www.gnu.org/licenses/>.

- -

La GNU General Public License non consente di incorporare il programma all’interno di software proprietario. - Se il tuo programma è una libreria di funzioni, potresti ritenere più opportuno consentire il collegamento - tra software proprietario e la tua libreria. Se è questo ciò che vuoi, allora utilizza la GNU Lesser General Public License - anziché questa Licenza, ma prima leggi - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/it/about_licenses_light.html b/app/src/main/assets/it/about_licenses_light.html deleted file mode 100644 index 96fac142..00000000 --- a/app/src/main/assets/it/about_licenses_light.html +++ /dev/null @@ -1,1163 +0,0 @@ - - - - - - - - - - -

Copyright

-

Privacy Browser copyright © 2015-2020: Soren Stoutner.

- -

Licenza

-

Privacy Browser è rilasciato con Licenza GPLv3+ . - Il testo completo è riportato per intero nella parte finale di questo documento. Si precisa che questa è una traduzione non ufficiale della - GNU General Public License, non è stata pubblicata dalla Free Software Foundation, e non stabilisce i termini legali di distribuzione del software - che usa la GNU GPL. Soltanto la versione originale in inglese della GNU GPL fa ciò. - Lo scopo di questa traduzione è unicamente quello di aiutare gli utenti di lingua italiana a comprendere la GNU GPL, e pertanto in caso di eventuali discrepanze tra - traduzione e versione originale in inglese, prevarrà e sarà unicamente la versione originale ad avere valore legale. - E' inoltre ammessa la modifica e la pubblicazione di questa traduzione, ma solamente in accordo ai termini qui riportati. - Il codice sorgente è disponibile su git.stoutner.com.

- -

Blocklist

-

EasyList e EasyPrivacy - sono sotto doppia licenza con le licenze GPLv3+ - e Creative Commons Attribution-ShareAlike 3.0+ Unported. Privacy Browser le incorpora utilizzando l'opzione GPLv3+.

- -

La Fanboy’s Annoyance List e la Fanboy’s Social Blocking List - sono rilasciate sotto la licenza Creative Commons Attribution 3.0 Unported, - che è compatibile con la licenza GPLv3+. Le liste sono incluse senza modifiche in Privacy Browser.

- -

E' possibile reperire maggiori informazioni sulle block list sul sito web EasyList.

- -

Librerie

-

Privacy Browser è compilato utilizzando le Librerie AndroidX, - le Librerie Kotlin, - e il codice disponibile nella Google Material Maven repository, - entrambi rilasciati con Licenza Apache 2.0.

- -

La versione gratuita di Privacy Browser è compilata con Firebase Ads, - che è rilasciato sotto la Licenza Android Software Development Kit.

- -

Classi

-

com.stoutner.privacybrowser.views.CheckedLinearLayout è la versione modificata di una classe contenuta nel codice sorgente della - Fotocamera Android. - Il file originale è stato rilasciato sotto la Licenza Apache 2.0. - Il file modificato è rilasciato sotto la Licenza GPLv3+.

- -

Icone

-

- sono state derivate da security e language, che fanno parte - dell'Android Material icon set e sono state rilasciate sotto Licenza Apache 2.0. - Il testo completo della Licenza è riportato di seguito. Copyright delle modifiche © 2016 Soren Stoutner. - Le immagini risultanti sono rilasciate sotto Licenza GPLv3+.

-

è stata derivata da elementi di folder e di exit_to_app, che fanno parte - dell'Android Material icon set e sono state rilasciate sotto Licenza Apache 2.0. - Copyright delle modifiche © 2017 Soren Stoutner. - L'immagine risultante è rilasciata sotto Licenza GPLv3+.

-

è stata derivata da elementi di bookmark e di create_new_folder, che fanno parte - dell'Android Material icon set e sono state rilasciate sotto Licenza Apache 2.0. - Copyright delle modifiche © 2017 Soren Stoutner. - L'immagine risultante è rilasciata sotto Licenza GPLv3+.

-

è stata derivata da create_new_folder, - che fa parte dell'Android Material icon set ed è stata rilasciata sotto Licenza Apache 2.0. - Copyright delle modifiche © 2017 Soren Stoutner. - L'immagine risultante è rilasciata sotto Licenza GPLv3+.

-

è stata derivata da exit_to_app, - che fa parte dell'Android Material icon set ed è stata rilasciata sotto Licenza Apache 2.0. - Copyright delle modifiche © 2017 Soren Stoutner. - L'immagine risultante è rilasciata sotto Licenza GPLv3+.

-

è stata derivata da compare, - che fa parte dell'Android Material icon set ed è stata rilasciata sotto Licenza Apache 2.0. - Copyright delle modifiche © 2017 Soren Stoutner. - L'immagine risultante è rilasciata sotto Licenza GPLv3+.

-

è stata derivata da sort, - che fa parte dell'Android Material icon set ed è stata rilasciata sotto Licenza Apache 2.0. - Copyright delle modifiche © 2019 Soren Stoutner. - L'immagine risultante è rilasciata sotto Licenza GPLv3+.

-

cookie è stata creata da Google. - E' stata rilasciata con Licenza Apache 2.0 - e può essere scaricata dirattamente dal Material Design Icons.Non è stata modificata ad eccezione del colore e della dimensione.

-

Le seguenti icone derivano dall'Android Material icon set, - che è rilasciato sotto Licenza Apache 2.0. - Non sono state modificatae ad eccezione del colore e della dimensione. Alcune sono state rinominate per coerenza con il tipo di utilizzo all'interno del codice. - Le icone con i loro nomi originali sono riportate di seguito.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

- -
- -

GNU General Public License

-

Versione 3, 29 Giugno 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

A chiunque è permesso copiare e ridistribuire copie esatte di questo documento di licenza, - ma non è in alcun modo consentito apportarvi modifiche. -

- -

Premessa

- -

La GNU General Public License è una licenza libera, basata su copyleft per software e altri tipi di opere.

- -

Le licenze della maggior parte del software e di altre opere materiali - sono pensate per togliere la libertà di condividere e modificare tali opere. - Al contrario, la GNU General Public License ha l'obiettivo di garantire - la libertà di condividere e modificare tutte le versioni di un programma - e di fare in modo che esso rimanga software libero per tutti gli utenti. - Noi, Free Software Foundation, usiamo la GNU General Public License - per la maggior parte del nostro software; essa viene applicata anche a qualunque - altro software rilasciato dall'autore sotto questa licenza. - Chiunque può utilizzare questa licenza per i propri programmi.

- -

Quando parliamo di software libero (free software), ci riferiamo al concetto di libertà, - non al prezzo. Le nostre General Public License sono concepite per garantire - che chiunque abbia la libertà di distribuire copie di software libero - (anche dietro pagamento di un prezzo, se lo desidera), che chiunque riceva o possa ricevere - il codice sorgente se lo vuole, che chiunque possa apportare modifiche al software - o utilizzarne solo alcune porzioni in altri software liberi, e che chiunque sappia - che ha il diritto di fare tutte queste cose.

- -

Per proteggere i vostri diritti, abbiamo la necessità di impedire che altri - vi neghino questi diritti o vi obblighino a rinunciarvi. - Pertanto, chiunque distribuisce o modifica software rilasciato con questa licenza - si assume dei precisi doveri: il dovere di rispettare la libertà degli altri.

- -

Per esempio, chi distribuisce copie di un programma rilasciato sotto questa licenza, - sia a titolo gratuito che mediante pagamento di un prezzo,è obbligato a riconoscere - a chi riceve il software esattamente gli stessi diritti che ha ricevuto. - Deve garantire che chi riceva il software abbia o possa avere accesso al codice sorgente. - E deve far conoscere ai destinatari del software queste condizioni, - così che essi conoscano quali sono i loro diritti.

- -

Gli sviluppatori che utilizzano la GNU GPL proteggono i vostri diritti in due modi: - (1) Rivendicando il copyright sul software, e - (2) offrendovi questa licenza che vi garantisce il diritto legale di copiarlo e/o di modificarlo.

- -

Al fine di proteggere gli sviluppatori e gli autori, la GPL spiega chiaramente - che non esiste nessuna garanzia per questo software libero. Nell'interesse - sia degli utenti che degli autori, la GPL impone che le versioni modificate del software - vengano esplicitamente marcate come “modificate”, in modo tale che eventuali problemi - non vengano erroneamente attribuiti agli autori delle versioni precedenti.

- -

Alcuni dispositivi sono progettati per negare agli utenti l'installazione - o l'esecuzione di versioni modificate del software installato sugli stessi, - anche se il costruttore si riserva la possibilità di farlo. - Ciò è fondamentalmente incompatibile con l'obiettivo di garantire la libertà - degli utenti di modificare il software. Una ripetizione sistematica di tali abusi - avviene nel campo dei dispositivi per usi individuali, e ciò rende questi abusi - ancora più inaccettabili. Pertanto, abbiamo realizzato questa versione della GPL - al fine di proibire una tale pratica per questo tipo di prodotti. Se problemi simili - dovessero sorgere in altri ambiti, saremo pronti ad estendere queste misure - a questi nuovi ambiti in versioni future della GPL, nella maniera che si renderà necessaria - per difendere la libertà degli utenti.

- -

In conclusione, tutti i programmi sono costantemente minacciati dai brevetti sul software. - Gli Stati non dovrebbero permettere ai brevetti di limitare lo sviluppo - e l'utilizzo di software per computer, ma nei Paesi in cui ciò avviene noi vogliamo evitare - il pericolo che i brevetti applicati ad un programma libero possano renderlo, a tutti gli effetti, - proprietario. Per impedire ciò, la GPL assicura che non è possibile utilizzare - i brevetti sul software per rendere un programma non libero.

- -

I termini e le condizioni esatte per la copia, la distribuzione e la modifica del software - sono riportate di seguito.

- -

TERMINI E CONDIZIONI

- -

0. Definizioni.

- -

“Questa Licenza” fa riferimento alla versione 3 della GNU General Public License.

- -

“Copyright” indica anche leggi simili al copyright che riguardano altri tipi di opere, - come le maschere per la produzione di semiconduttori.

- -

“Il Programma” indica qualunque opera che sia soggetta a copyright e che sia rilasciata - sotto questa Licenza. I detentori della licenza sono indicati come “tu”. “Licenziatari” e - “destinatari” possono essere individui o organizzazioni.

- -

“Modificare” un'opera significa copiare o adattare tutta o parte dell'opera - in una maniera che richieda un permesso di copyright, e non indica la semplice azione - di fare una esatta copia dell'opera. L'opera risultante viene chiamata “versione modificata” - dell'opera precedente, oppure viene detta opera “basata sulla” opera precedente.

- -

Un'“opera coperta da questa licenza” indica il Programma originale non modificato - oppure un'opera basata sul Programma.

- -

“Propagare” un'opera significa fare una qualunque cosa con essa che, - in mancanza di un esplicito permesso, ti renda direttamente o indirettamente perseguibile - per violazione secondo le vigenti normative sul copyright, - ad eccezione della semplice esecuzione del Programma su un computer - o della modifica di una copia privata. La Propagazione include la copia, - la distribuzione (con o senza modifiche), la messa a disposizione al pubblico e, - in alcuni stati, altre attività simili e connesse.

- -

“Distribuire” un'opera indica qualunque forma di propagazione - che permetta a terze parti di effettuare o ricevere delle copie. - La mera interazione con un utente attraverso una rete di computer, - senza che ci sia alcun trasferimento di una copia, non è considerata “Distribuzione”.

- -

Una interfaccia utente interattiva fornisce delle “Adeguate Informazioni Legali” - soltanto nel caso in cui includa una apposita funzionalità, resa adeguatamente visibile, che - (1) visualizzi un'adeguata informazione di copyright, e - (2) informi l'utente che non c'è alcuna garanzia sull'opera (eccetto nel caso in cui - delle garanzie sono espressamente fornite), dica che il licenziatario può distribuire - l'opera utilizzando questa Licenza, indichi come è possibile prendere visione di una copia - di questa Licenza. - Se l'interfaccia presenta una lista di comandi o di opzioni, come ad esempio un menù, - una delle opzioni fornite nella lista deve rispettare questa condizione.

- -

1. Codice Sorgente.

- -

Il “codice sorgente” di un'opera indica la forma più indicata - dell'opera per poter effettuare modifiche su di essa. Il “codice oggetto” - indica qualunque forma dell'opera che non sia codice sorgente.

- -

Una “Interfaccia Standard” è una interfaccia che risponde ad uno - standard ufficiale definito da un ente di standardizzazione riconosciuto - o, nel caso di interfacce specifiche per un particolare linguaggio di - programmazione, una interfaccia che è largamente utilizzata dagli - sviluppatori per sviluppare in tale linguaggio.

- -

Le “Librerie di Sistema” di un eseguibile includono qualunque cosa, - eccetto l'opera nel suo insieme, che (a) sia inclusa nella normale forma - di pacchettizzazione di un “Componente Principale”, ma che non è - parte di quel Componente Principale, e (b) che serva solo a consentire - l'uso dell'opera con quel Componente Principale, o per implementare una - Interfaccia Standard per la quale esista una implementazione disponibile - al pubblico in forma sorgente. Un “Componente Principale”, in questo - contesto, è un componente essenziale (kernel, gestore di finestre - eccetera) dello specifico sistema operativo (ammesso che ce ne sia uno) - sul quale l'eseguibile esegue, o un compilatore utilizzato per produrre - il programma, o un interprete di codice oggetto utilizzato per eseguire - il programma.

- -

Il “Sorgente Corrispondente” per un'opera in forma di codice oggetto - è il codice sorgente necessario per generare, installare e (per un - programma eseguibile) eseguire il codice oggetto e per modificare - l'opera, inclusi gli script per controllare le suddette attività di - generazione, installazione ed esecuzione. Non sono incluse le Librerie - di Sistema usate dal programma, o gli strumenti di utilità generica o i - programmi liberamente accessibili che sono utilizzati, senza modifiche, - per portare a termine le suddette attività ma che non fanno parte - dell'opera. Per esempio, il sorgente corrispondente include i file con - le definizioni delle interfacce associati ai file sorgente dell'opera, e - il codice sorgente delle librerie condivise e sottoprogrammi collegati - dinamicamente specificatamente necessari per il programma, ad esempio a - causa di stretta comunicazione dati o di controllo di flusso tra questi - sottoprogrammi e altre parti del programma.

- -

Il Sorgente Corrispondente non include nulla che l'utente possa - rigenerare automaticamente da altre parti del Sorgente Corrispondente - stesso.

- -

Il Sorgente Corrispondente di un'opera in forma di codice sorgente è - l'opera stessa.

- -

2. Principali Diritti.

- -

Tutti i diritti garantiti da questa Licenza sono garantiti per la durata - del copyright sul Programma, e sono irrevocabili ammesso che le - condizioni qui riportate siano rispettate. Questa Licenza afferma esplicitamente il - tuo permesso illimitato di eseguire il Programma non modificato. Il - risultato dell'esecuzione di un programma coperto da questa Licenza è - a sua volta coperto da questa Licenza solo se il risultato stesso, a - causa del suo contenuto, è un'opera coperta da questa Licenza. Questa - Licenza riconosce il tuo diritto all'uso legittimo o altri diritti - equivalenti, come stabilito dalla legislazione sul copyright.

- -

Puoi creare, eseguire e propagare programmi che tu non distribuisci - coperti da questa Licenza, senza alcuna condizione fino a quando la tua - Licenza rimane valida. Puoi distribuire opere coperte da questa Licenza - ad altri al solo scopo di ottenere che essi facciano delle modifiche al - programma esclusivamente per te, o che ti forniscano dei servizi per - l'esecuzione di queste opere, ammesso che tu rispetti i termini di - questa Licenza nel distribuire tutto il materiale per il quale non - detieni il copyright. Coloro i quali creano o eseguono per conto tuo un - programma coperto da questa Licenza lo fanno esclusivamente in tua vece, - sotto la tua direzione e il tuo controllo, in maniera tale che sia - proibito a costoro effettuare copie di materiale di cui detieni il - copyright al di fuori della relazione che intrattengono nei tuoi - confronti.

- -

Distribuire opere coperte da licenza in qualunque altra circostanza è - consentito soltanto alle condizioni espresse in seguito. Non è - consentito sottolicenziare le opere: la sezione 10 lo rende non - necessario.

- -

3. Protezione dei diritti legali degli utenti dalle leggi - anti-elusione.

- -

Nessun programma protetto da questa Licenza può essere considerato - parte di una misura tecnologica di restrizione che sottostia ad alcuna - delle leggi che soddisfano l'articolo 11 del “WIPO copyright treaty” - adottato il 20 Dicembre 1996, o a simili leggi che proibiscono o - limitano l'elusione di tali misure tecnologiche di restrizione.

- -

Quando distribuisci un programma coperto da questa Licenza, rifiuti - tutti i poteri legali atti a proibire l'elusione di misure tecnologiche - di restrizione ammesso che tale elusione sia effettuata nell'esercizio - dei diritti garantiti da questa Licenza riguardo al programma coperto da - questa Licenza, e rinunci all'intenzione di limitare l'operatività o - la modifica del programma per far valere, contro i diritti degli utenti - del programma, diritti legali tuoi o di terze parti che impediscano - l'elusione di misure tecnologiche di restrizione.

- -

4. Distribuzione di Copie Esatte.

- -

Ti è permesso distribuire copie esatte del codice sorgente del - Programma come lo hai ricevuto, con qualunque mezzo, ammesso che tu - aggiunga in maniera appropriata su ciascuna copia una appropriata nota - di copyright; che tu lasci intatti tutti gli avvisi che affermano che - questa Licenza e tutte le clausole non-permissive aggiunte in accordo - con la sezione 7 sono valide per il codice che distribuisci; che tu - lasci intatti tutti gli avvisi circa l'assenza di garanzia; che tu - fornisca a tutti i destinatari una copia di questa Licenza assieme al - Programma.

- -

Puoi richiedere il pagamento di un prezzo o di nessun prezzo per - ciascuna copia che distribuisci, e puoi offrire supporto o garanzia - a pagamento.

- -

5. Distribuzione di Versioni modificate del sorgente.

- -

Puoi distribuire un'opera basata sul Programma, o le modifiche per - produrla a partire dal Programma, nella forma di codice sorgente secondo - i termini della sezione 4, ammesso che tu rispetti anche tutte le - seguenti condizioni:

- -
    -
  • a) L'opera deve recare con sè delle informazioni adeguate che - affermino che tu l'hai modificata, indicando la data di modifica.
  • - -
  • b) L'opera deve recare informazioni adeguate che affermino che essa è - rilasciata sotto questa Licenza e sotto le condizioni aggiuntive - secondo quanto indicato dalla Sezione 7. Questa condizione modifica la - condizione espressa alla sezione 4 di “lasciare intatti tutti gli - avvisi”.
  • - -
  • c) Devi rilasciare l'intera opera, nel suo complesso, sotto questa - Licenza a chiunque venga in possesso di una copia di essa. Questa - Licenza sarà pertanto applicata, assieme ad eventuali clausole - aggiunte in osservanza della Sezione 7, all'opera nel suo complesso, a - tutte le sue parti, indipendentemente da come esse siano - pacchettizzate. Questa Licenza nega il permesso di licenziare l'opera - in qualunque altro modo, ma non rende nullo un tale permesso ammesso - che tu lo abbia ricevuto separatamente.
  • - -
  • d) Se l'opera ha delle interfacce utente interattive, ciascuna deve - mostrare delle Adeguate Informazioni Legali; altrimenti, se il - Programma ha delle interfacce interattive che non visualizzano delle - Adeguate Informazioni Legali, il tuo programma non è obbligato a - visualizzarle.
  • -
- -

La giustapposizione di un'opera coperta da questa Licenza assieme ad - altre opere separate e indipendenti, che non sono per loro natura - estensioni del Programma, e che non sono combinate con esso a formare un - altro programma più grande, dentro o in uno stesso supporto di - memorizzazione a lungo termine o di distribuzione, è semplicemente - detto “aggregato” se la raccolta e il suo copyright non sono - utilizzati per limitare l'accesso o i diritti legali degli utenti della - raccolta stessa oltre ciò che ciascun singolo programma - consente. L'inclusione di un programma coperto da questa Licenza in un - aggregato non comporta l'applicazione di questa Licenza alle altre parti - dell'aggregato.

- -

6. Distribuzione in formato non-sorgente.

- -

Puoi distribuire un programma coperto da questa Licenza in formato di - codice oggetto secondo i termini delle sezioni 4 e 5, ammesso che tu - fornisca anche il Sorgente Corrispondente in formato comprensibile - da un computer sotto i termini di questa stessa Licenza, in uno dei - seguenti modi:

- -
    -
  • a) Distribuendo il codice oggetto in, o contenuto in, un prodotto - fisico (inclusi i mezzi fisici di distribuzione), accompagnato dal - Sorgente Corrispondente su un supporto fisico duraturo comunemente - utilizzato per lo scambio di software.
  • - -
  • b) Distribuendo il codice oggetto in, o contenuto in, un prodotto fisico - (inclusi i mezzi fisici di distribuzione), accompagnato da un'offerta - scritta, valida per almeno tre anni e valida per tutto il tempo - durante il quale tu offri ricambi o supporto per quel modello di - prodotto, di fornire a chiunque possieda il codice oggetto (1) una - copia del Sorgente Corrispondente di tutto il software contenuto nel - prodotto che è coperto da questa Licenza, su un supporto fisico - duraturo comunemente utilizzato per lo scambio di software, ad un - prezzo non superiore al costo ragionevole per effettuare fisicamente - tale distribuzione del sorgente, oppure (2) accesso alla copia del - Sorgente Corrispondente attraverso un server di rete senza alcun costo - aggiuntivo.
  • - -
  • c) Distribuendo copie singole del codice oggetto assieme ad una copia - dell'offerta scritta di fornire il Sorgente Corrispondente. Questa - possibilità è permessa soltanto occasionalmente e per fini non - commerciali, e solo se tu hai ricevuto il codice oggetto assieme ad - una tale offerta, in accordo alla sezione 6b.
  • - -
  • d) Distribuendo il codice oggetto mediante accesso da un luogo designato - (gratis o dietro pagamento di un prezzo), e offrendo un accesso - equivalente al Sorgente Corrispondente alla stessa maniera a partire - dallo stesso luogo senza costi aggiuntivi. Non devi obbligare i - destinatari a copiare il Sorgente Corrispondente assieme al codice - oggetto. Se il luogo dal quale copiare il codice oggetto è un server - di rete, il Sorgente Corrispondente può trovarsi su un server - differente (gestito da te o da terze parti) che fornisca - funzionalità equivalenti per la copia, a patto che tu fornisca delle - indicazioni chiare accanto al codice oggetto che indichino dove - trovare il Sorgente Corrispondente. Indipendentemente da quale server - ospiti il Sorgente Corrispondente, tu rimani obbligato ad assicurare - che esso rimanga disponibile per tutto il tempo necessario a - soddisfare queste condizioni.
  • - -
  • e) Distribuendo il codice oggetto mediante trasmissione peer-to-peer, a - patto che tu informi gli altri peer circa il luogo in cui il codice - oggetto e il Sorgente Corrispondente sono gratuitamente offerti al - pubblico secondo i termini della sezione 6d.
  • -
- -

Una porzione separabile del codice oggetto, il cui sorgente è - escluso dal Sorgente Corrispondente e trattato come Libreria di - Sistema, non deve essere obbligatoriamente inclusa nella distribuzione - del codice oggetto del programma.

- -

Un “Prodotto Utente” è un (1) “prodotto consumer”, cioè - qualunque proprietà personale tangibile che è normalmente utilizzata - per scopi personali, familiari o domestici, oppure (2) qualunque cosa - progettata o venduta per essere utilizzata in ambiente domestico. Nella - classificazione di un prodotto come “prodotto consumer”, i casi dubbi - andranno risolti in favore dell'ambito di applicazione. Per un dato - prodotto ricevuto da un dato utente, “normalmente utilizzato” si - riferisce ad un uso tipico o comune di quella classe di prodotti, - indipendentemente dallo stato dell'utente specifico o dal modo in cui - l'utente specifico utilizza, o si aspetta o ci si aspetta che utilizzi, - il prodotto. Un prodotto è un “prodotto consumer” indipendentemente - dal fatto che abbia usi commerciali, industriali o diversi da quelli - “consumer”, a meno che questi usi non rappresentino il solo modo utile - di utilizzare il prodotto in questione.

- -

Le “Informazioni di Installazione” per un Prodotto Utente sono i - metodi, le procedure, le chiavi di autorizzazioni o altre informazioni - necessarie per installare ed eseguire versioni modificate di un - programma coperto da questa Licenza all'interno di un Prodotto Utente, a - partire da versioni modificate dei suoi Sorgenti Corrispondenti. Tali - informazioni devono essere sufficienti ad assicurare che il - funzionamento del codice oggetto modificato non sia in nessun caso - proibito o ostacolato per il solo fatto che sono state apportate delle - modifiche.

- -

Se distribuisci un codice oggetto secondo le condizioni di questa - sezione in, o assieme, o specificatamente per l'uso in o con un Prodotto - Utente, e la distribuzione avviene come parte di una transazione nella - quale il diritto di possesso e di uso del Prodotto Utente viene - trasferito al destinatario per sempre o per un periodo prefissato - (indipendentemente da come la transazione sia caratterizzata), il - Sorgente Corrispondente distribuito secondo le condizioni di questa - sezione deve essere accompagnato dalle Informazioni di - Installazione. Questa condizione non è richiesta se nè tu nè una - terza parte ha la possibilità di installare versioni modificate del - codice oggetto sul Prodotto Utente (ad esempio, se il programma è - installato su una ROM).

- -

La condizione che richiede di fornire delle Informazioni di Installazione - non implica che venga fornito supporto, garanzia o aggiornamenti per un - programma che è stato modificato o installato dal destinatario, o per - il Prodotto Utente in cui esso è stato modificato o installato. - L'accesso ad una rete può essere negato se le modifiche apportate - impattano materialmente sull'operatività della rete o se violano le - regole e i protocolli di comunicazione attraverso la rete.

- -

Il Sorgente Corrispondente distribuito, e le Informazioni di - Installazione fornite, in accordo con questa sezione, devono essere in - un formato che sia pubblicamente documentato (e con una implementazione - pubblicamente disponibile in formato di codice sorgente), e non devono - richiedere speciali password o chiavi per essere spacchettate, lette o - copiate.

- -

7. Condizioni Aggiuntive.

- -

Le “Condizioni Aggiuntive” sono condizioni che completano le - condizioni di questa Licenza permettendo delle eccezioni a una o più - delle condizioni sopra elencate. Le condizioni aggiuntive che sono - applicabili all'intero Programma devono essere considerate come se - fossero incluse in questa Licenza, a patto che esse siano valide secondo - le normative vigenti. Se alcune condizioni aggiuntive fanno riferimento - soltanto ad alcune parti del Programma, quelle parti possono essere - utilizzate separatamente sotto le stesse condizioni, ma l'intero - Programma rimane sottoposto a questa Licenza senza riferimento ad alcuna - condizione aggiuntiva.

- -

Quando distribuisci una copia di un programma coperto da questa Licenza, - puoi, a tua discrezione, eliminare qualunque condizione aggiuntiva dalla - copia, o da parte di essa. (Le Condizioni Aggiuntive possono essere - scritte in maniera tale da richiedere la loro rimozione in certi casi di - modifica del Programma). Puoi aggiungere Condizioni Aggiuntive su - materiale, aggiunto da te ad un'opera coperta da questa Licenza, per il - quale hai o puoi garantire un'adeguata licenza di copyright.

- -

Indipendentemente da qualunque altra condizione di questa Licenza, e per - il materiale che aggiungi ad un'opera coperta da questa Licenza, puoi - (se autorizzato dai legittimi detentori del copyright per il suddetto - materiale) aggiungere alle condizioni di questa Licenza delle condizioni - che:

- -
    -
  • a) Negano la garanzia o limitano la responsabilità del Programma in - maniera differente da quanto riportato nelle sezioni 15 e 16 di questa - Licenza; oppure
  • - -
  • b) Richiedono il mantenimento di specifiche e circostanziate informative - legali o di note di attribuzione ad autori nel materiale o assieme - alle Adeguate Informazioni Legali mostrate dal Programma che lo - contiene; oppure
  • - -
  • c) Proibiscono di fornire informazioni errate o ingannevoli sull'origine - e la provenienza del materiale in oggetto, o richiedono che versioni - modificate di tale materiale siano appositamente marcate in maniera - differente rispetto alla versione originale; oppure
  • - -
  • d) Limitano l'utilizzo per scopi pubblicitari del nome dei detentori del - copyright o degli autori del materiale; oppure
  • - -
  • e) Rifiutano di garantire diritti secondo le leggi sulla proprietà - intellettuale circa l'uso di nomi, marchi di fabbrica o similari; - oppure
  • - -
  • f) Richiedono l'indennizzo dei detentori del copyright o degli autori del - materiale in oggetto da parte di chi distribuisce il materiale (o - versioni modificate dello stesso) con impegni contrattuali circa la - responsabilità nei confronti del destinatario, per qualunque - responsabilità che questi impegni contrattuali dovessero imporre - direttamente ai suddetti detentori del copyright e autori.
  • -
- -

Tutte le altre condizioni addizionali non-permissive sono considerate - “ulteriori restrizioni”, secondo il significato specificato alla - sezione 10. Se il Programma o parti di esso contengono, all'atto della - ricezione dello stesso, informative che specificano che esso è - soggetto a questa Licenza assieme ad una condizione che è una - “ulteriore restrizione”, puoi rimuovere quest'ultima condizione. Se un - documento di licenza contiene ulteriori restrizioni ma permette di - rilicenziare o distribuire il Programma con questa Licenza, puoi - aggiungere al Programma del materiale coperto dalle condizioni di quel - documento di licenza, a patto che le ulteriori restrizioni non compaiano - nelle versioni rilicenziate o ridistribuite.

- -

Se aggiungi ad un Programma coperto da questa Licenza delle condizioni - aggiuntive in accordo con questa sezione, devi aggiungere anche, nei - file sorgenti corrispondenti, un avviso che riassuma le condizioni - aggiuntive applicate a quei file, ovvero un avviso che specifichi dove - è possibile trovare copia delle condizioni aggiunte.

- -

Tutte le Condizioni aggiuntive, permissive o non-permissive, devono - essere espresse nella forma di una licenza scritta e separata, o - espresse esplicitamente come eccezioni; in entrambi i casi valgono le - condizioni succitate.

- -

8. Cessazione di Licenza.

- -

Non puoi propagare o modificare un programma coperto da questa Licenza - in maniera diversa da quanto espressamente consentito da questa - Licenza. Qualunque tentativo di propagare o modificare altrimenti il - Programma è nullo, e provoca l'immediata cessazione dei diritti - garantiti da questa Licenza (compresi tutte le eventuali licenze di - brevetto garantite ai sensi del terzo paragrafo della sezione 11).

- -

In ogni caso, se cessano tutte le violazioni di questa Licenza, allora - la tua licenza da parte di un dato detentore del copyright viene - ripristinata (a) in via cautelativa, a meno che e fino a quando il - detentore del copyright non cessa esplicitamente e definitivamente la - tua licenza, e (b) in via permanente se il detentore del copyright non - ti notifica in alcun modo la violazione entro 60 giorni dalla cessazione - della licenza.

- -

Inoltre, la tua licenza da parte di un dato detentore del copyright - viene ripristinata in maniera permanente se il detentore del copyright ti - notifica la violazione in maniera adeguata, se questa è la prima volta - che ricevi una notifica di violazione di questa Licenza (per qualunque - Programma) dallo stesso detentore di copyright, e se rimedi alla - violazione entro 30 giorni dalla data di ricezione della notifica di - violazione.

- -

La cessazione dei tuoi diritti come specificato in questa sezione non - provoca la cessazione delle licenze di terze parti che abbiano ricevuto - copie o diritti da te secondo questa Licenza. Se i tuoi diritti cessano - e non sono ristabiliti in via permanente, non hai diritto di ricevere - nuove licenze per lo stesso materiale, secondo quanto stabilito nella - sezione 10.

- -

9. L'ottenimento di copie non richiede l'accettazione della Licenza.

- -

Non sei obbligato ad accettare i termini di questa Licenza al solo fine - di ottenere o eseguire una copia del Programma. Similmente, propagazioni - collaterali di un Programma coperto da questa Licenza che occorrono come - semplice conseguenza dell'utilizzo di trasmissioni peer-to-peer per la - ricezione di una copia non richiedono l'accettazione della Licenza. In - ogni caso, solo e soltanto questa Licenza ti garantiscono il permesso di - propagare e modificare qualunque programma coperto da questa - Licenza. Queste azioni violano le leggi sul copyright nel caso in cui tu - non accetti questa Licenza. Pertanto, modificando o propagando un - programma coperto da questa Licenza, indichi implicitamente la tua - accettazione della Licenza.

- -

10. Licenza Automatica per i successivi destinatari.

- -

Ogni qual volta distribuisci un programma coperto da questa Licenza, il - destinatario riceve automaticamente una licenza, dal detentore - originario del copyright, di eseguire, modificare e propagare il - programma, nel rispetto di questa Licenza. Non sei ritenuto responsabile - del rispetto di questa Licenza da parte di terze parti.

- -

Una “transazione d' entità” è una transazione che trasferisce il - controllo di una organizzazione, o sostanzialmente di tutti i suoi beni, - che suddivide una organizzazione o che fonde più organizzazioni. Se la - propagazione di un programma coperto da questa Licenza è conseguente - ad una transazione di entità, ciascuna parte che ha ruolo nella - transazione e che riceve una copia del programma riceve allo stesso tempo - qualsiasi licenza sul programma che i predecessori della parte - possedevano o potevano rilasciare nel rispetto del paragrafo precedente, - e in più il diritto di possesso del Sorgente Corrispondente del - programma dal predecessore in interesse, se il predecessore lo possiede - o se può ottenerlo senza troppe difficoltà.

- -

Non puoi imporre nessuna ulteriore restrizione sull'esercizio dei - diritti garantiti o affermati da questa Licenza. Per esempio, non puoi - imporre un prezzo di licenza, una royalty, o altri costi per - l'esercizio dei diritti garantiti da questa Licenza, a non puoi dar - corso ad una controversia (ivi incluse le controversie incrociate o la - difesa in cause legali) affermando che siano stati violati dei - brevetti a causa della produzione, dell'uso, della vendita, della - messa in vendita o dell'importazione del Programma o di sue parti.

- -

11. Brevetti.

- -

Un “contribuente” è un detentore di copyright che autorizza l'uso - secondo questa Licenza di un Programma o di un'opera basata sul - Programma. L'opera così licenziata viene chiamata “versione del - contribuente”.

- -

I “diritti essenziali di brevetto” da parte di un contribuente sono - tutti i diritti di brevetto che appartengono o che sono controllati dal - contribuente, che siano già acquisiti o che saranno acquisiti in - futuro, che possano essere violati in qualche maniera, consentita da - questa Licenza, generando, modificando o vendendo la versione del - contribuente, ma non includono i diritti che possano essere violati - soltanto come conseguenza di ulteriori modifiche alla versione del - contribuente. In relazione a questa definizione, il termine - “controllo” include il diritto di garantire sottolicenze di brevetto - in maniera consistente con le condizioni di questa Licenza.

- -

Ciascun contribuente ti garantisce la licenza di brevetto sui diritti - essenziali di brevetto del contribuente stesso non-esclusiva, valida in - tutto il mondo, esente da royalty, di creare, usare, vendere, offrire in - vendita, importare e altrimenti eseguire, modificare e propagare i - contenuti della versione del contribuente.

- -

Nei tre paragrafi successivi, con “licenza di brevetto” si intende - qualunque accordo o contratto, comunque denominato, di non - rivendicazione di un brevetto (come ad esempio un permesso esplicito di - utilizzare un brevetto o un accordo di rinuncia alla persecuzione per - violazione di brevetto). “Garantire” una tale licenza di brevetto ad - una parte significa portare a termine un tale accordo o contratto di non - rivendicazione di brevetto contro la parte.

- -

Se distribuisci un programma coperto da questa Licenza, confidando - consapevolmente su una licenza di brevetto, e il Sorgente Corrispondente - per il programma non è reso disponibile per la copia, senza alcun - onere aggiuntivo e comunque nel rispetto delle condizioni di questa - Licenza, attraverso un server di rete pubblicamente accessibile o - tramite altri mezzi facilmente accessibili, allora devi (1) fare in modo - che il Sorgente Corrispondente sia reso disponibile come sopra, oppure - (2) fare in modo di rinunciare ai benefici della licenza di brevetto per - quel particolare programma, oppure (3) adoperarti, in maniera - consistente con le condizioni di questa Licenza, per estendere la - licenza di brevetto a tutti i destinatari successivi. “Confidare - consapevolmente” significa che tu sei attualmente cosciente che, - eccettuata la licenza di brevetto, la distribuzione da parte tua di un - programma protetto da questa Licenza in un paese, o l'utilizzo in un - paese del programma coperto da questa Licenza da parte di un - destinatario, può violare uno o più brevetti in quel paese che tu - hai ragione di ritenere validi.

- -

Se, come conseguenza o in connessione con una singola transazione o - con un dato accordo, distribuisci, o fai in modo di distribuire, un - programma coperto da questa Licenza, e garantisci una licenza di - brevetto per alcune delle parti che ricevono il Programma - autorizzandole ad utilizzare, propagare, modificare o distribuire una - specifica copia del Programma, allora la licenza di brevetto che - fornisci è automaticamente estesa a tutti i destinatari del - Programma coperto da questa Licenza e delle opere basate sul - Programma.

- -

Una licenza di brevetto è “discriminatoria” se non include - nell'ambito della sua copertura, proibisce l'esercizio, o è vincolata - al non-esercizio di uno o più dei diritti che sono specificatamente - garantiti da questa Licenza. Non puoi distribuire un Programma coperto - da questa Licenza se sei parte di un accordo con una terza parte la cui - attività comprende la distribuzione di software, secondo il quale tu - sei costretto ad un pagamento alla parte terza in funzione della tua - attività di distribuzione del Programma, e in conseguenza del quale la - parte terza garantisce, a qualunque delle parti che riceveranno il - Programma da te, una licenza di brevetto discriminatoria (a) assieme a - copie del Programma coperto da questa Licenza distribuite da te (o ad - altre copie fatte da codeste copie), oppure (b) principalmente per e in - connessione con specifici prodotti o raccolte di prodotti che contengono - il Programma, a meno che l'accordo non sia stato stipulato, o le licenze - di brevetto non siano state rilasciate, prima del 28 Marzo 2007.

- -

Nessuna parte di questa Licenza può essere interpretata come atta ad - escludere o limitare gli effetti di qualunque altra licenza o altri - meccanismi di difesa dalla violazione che possano altrimenti essere resi - disponibili dalla normativa vigente in materia di brevetti.

- -

12. Nessuna resa di libertà altrui.

- -

Se ti vengono imposte delle condizioni (da un ordine giudiziario, da - un accordo o da qualunque altra eventualità) che contraddicono le - condizioni di questa Licenza, non sei in nessun modo esonerato dal - rispetto delle condizioni di questa Licenza. Se non puoi distribuire - un Programma coperto da questa Licenza per sottostare simultaneamente - agli obblighi derivanti da questa Licenza e ad altri obblighi - pertinenti, allora non puoi distribuire il Programma per nessun - motivo. Per esempio, se accetti delle condizioni che ti obbligano a - richiedere il pagamento di una royalty per le distribuzioni - successivamente effettuate da coloro ai quali hai distribuito il - Programma, l'unico modo per soddisfare sia queste condizioni che - questa Licenza è evitare del tutto la distribuzione del Programma.

- -

13. Utilizzo con la GNU Affero General Public License.

- -

Indipendentemente da qualunque altra condizione espressa da questa - Licenza, hai il permesso di collegare o combinare qualunque Programma - coperto da questa Licenza con un'opera rilasciata sotto la versione 3 - della licenza GNU Affero General Public License, ottenendo un singolo - Programma derivato, e di distribuire il Programma risultante. Le - condizioni di questa Licenza continuano a valere per le parti - riguardanti il Programma che sono coperte da questa Licenza, mentre le - condizioni speciali della GNU Affero General Public License, sezione 13, - riguardanti l'interazione mediante rete, saranno applicate al Programma - così risultante.

- -

14. Versioni rivedute di questa Licenza.

- -

La Free Software Foundation può pubblicare delle versioni rivedute - e/o delle nuove versioni della GNU General Public License di tanto in - tanto. Tali versioni saranno simili, nello spirito, alla presente - versione, ma potranno differire nei dettagli al fine di affrontare - nuovi problemi e nuove situazioni.

- -

A ciascuna versione viene assegnato un numero identificativo di - versione. Se il Programma specifica che si applica a sè stesso una - certa versione della GNU General Public License, “o qualunque altra - versione successiva”, hai la possibilità di sottostare alle - condizioni di quella specifica versione o di qualunque altra versione - successiva pubblicata dalla Free Software Foundation. Se il Programma - non specifica un numero di versione della GNU General Public License, - puoi scegliere qualunque versione della GNU General Public License - pubblicata dalla Free Software Foundation.

- -

Se il Programma specifica che un sostituto o un procuratore può - decidere quali versioni future della GNU General Public License posso - essere utilizzate, allora tale scelta di accettazione di una data - versione ti autorizza, in maniera permanente, ad utilizzare quella - versione della Licenza per il Programma.

- -

Versioni successive della Licenza possono garantire diritti aggiuntivi o - leggermente differenti. Ad ogni modo, nessun obbligo aggiuntivo viene - imposto agli autori o ai detentori di copyright come conseguenza della - tua scelta di adottare una versione successiva della Licenza.

- -

15. Rinuncia alla Garanzia.

- -

NON C'E' NESSUNA GARANZIA PER IL PROGRAMMA, PER QUANTO CONSENTITO DALLE - VIGENTI NORMATIVE. ECCETTO QUANDO ALTRIMENTI STABILITO PER ISCRITTO, I - DETENTORI DEL COPYRIGHT E/O LE ALTRE PARTI FORNISCONO IL PROGRAMMA - “COSI' COME È” SENZA GARANZIA DI ALCUN TIPO, NE' ESPRESSA NE' - IMPLICITA, INCLUSE, MA NON LIMITATE A, LE GARANZIE DI COMMERCIABILITA' O - DI UTILIZZABILITA' PER UN PARTICOLARE SCOPO. L'INTERO RISCHIO - CONCERNENTE LA QUALITA' E LE PRESTAZIONI DEL PROGRAMMA E' DEL - LICENZIATARIO. SE IL PROGRAMMA DOVESSE RISULTARE DIFETTOSO, IL - LICENZIATARIO SI ASSUME I COSTI DI MANUTENZIONE, RIPARAZIONE O - CORREZIONE.

- -

16. Limitazione di Responsabilità.

- -

IN NESSUN CASO, A MENO CHE NON SIA RICHIESTO DALLA NORMATIVA VIGENTE - O CONCORDATO PER ISCRITTO, I DETENTORI DEL COPYRIGHT, O QUALUNQUE - ALTRA PARTE CHE MODIICA E/O DISTRIBUISCE IL PROGRAMMA SECONDO LE - CONDIZIONI PRECEDENTI, POSSONO ESSERE RITENUTI RESPONSABILI NEI - CONFRONTI DEL LICENZIATARIO PER DANNI, INCLUSO QUALUNQUE - DANNEGGIAMENTO GENERICO, SPECIALE, INCIDENTALE O CONSEQUENZIALE - DOVUTO ALL'USO O ALL'IMPOSSIBILITA' D'USO DEL PROGRAMMA (INCLUSI, MA - NON LIMITATI A, LE PERDITE DI DATI, LA CORRUZIONE DI DATI, LE - PERDITE SOSTENUTE DAL LICENZIATARIO O DA TERZE PARTI O - L'IMPOSSIBILITA' DEL PROGRAMMA A FUNZIONARE ASSIEME AD ALTRI - PROGRAMMI), ANCHE NEL CASO IN CUI IL DETENTORE O LE ALTRE PARTI - SIANO STATI AVVISATI CIRCA LA POSSIBILITA' DI TALI DANNEGGIAMENTI.

- -

17. Interpretazione delle Sezioni 15 e 16.

- -

Se la dichiarazione di garanzia e la limitazione di responsabilità - fornite precedentemente non hanno effetto legale in un paese a causa - delle loro condizioni, le corti di giustizia devono applicare la norma - locale che più si avvicini al rifiuto assoluto di qualsivoglia - responsabilità civile relativa al Programma, a meno che una garanzia o - una assunzione di responsabilità scritta non accompagni una copia del - programma ottenuta dietro pagamento.

- -

FINE DEI TERMINI E DELLE CONDIZIONI

- -

Come applicare questre condizioni di Licenza ai vostri programmi

- -

Se sviluppi un nuovo programma, e vuoi che esso sia della massima utilità, - il modo migliore è quello di renderlo software libero, in modo che chiunque - possa ridistribuirlo e modificarlo secondo i termini di questa Licenza.

- -

Per fare ciò, allega le seguenti note informative al programma. - Il modo migliore è quello di inserirle all’inizio di ciascun file sorgente, - al fine di rimarcare adeguatamente la mancanza di garanzia; ciascun file dovrebbe inoltre contenere - la dichiarazione di copyright e un riferimento al posto in cui è possibile ottenere - la versione completa delle note informative.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Inoltre, aggiungi le informazioni necessarie a contattarti via posta ordinaria o via posta elettronica.

- -

Se il programma interagisce mediante terminale, fai in modo che visualizzi, - quando viene avviato in modalità interattiva, un breve messaggio come quello che segue:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

Gli ipotetici comandi `show w' e `show c' devono visualizzare le parti corrispondenti - della GNU General Public License. Naturalmente i comandi del tuo programma potrebbero essere differenti; - per una interfaccia di tipo GUI, dovresti usare un bottone “About” o “Info”.

- -

Devi inoltre fare in modo che il tuo datore di lavoro (se lavori come programmatore presso terzi) o la tua scuola, - eventualmente, firmino una “rinuncia al copyright” sul programma, se necessario. - Per maggiori informazioni su questo punto, e su come applicare e rispettare la GNU GPL, consultare la pagina - <http://www.gnu.org/licenses/>.

- -

La GNU General Public License non consente di incorporare il programma all’interno di software proprietario. - Se il tuo programma è una libreria di funzioni, potresti ritenere più opportuno consentire il collegamento - tra software proprietario e la tua libreria. Se è questo ciò che vuoi, allora utilizza la GNU Lesser General Public License - anziché questa Licenza, ma prima leggi - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/it/about_links.html b/app/src/main/assets/it/about_links.html new file mode 100644 index 00000000..eafb239d --- /dev/null +++ b/app/src/main/assets/it/about_links.html @@ -0,0 +1,48 @@ + + + + + + + + + + + + + +

Collegamenti

+ +

+ Novità

+ +

Roadmap

+ +

+ Segnalazioni di Bug e richieste di nuove funzionalità

+ +

+ Forum

+ +

+ GitWeb

+ + \ No newline at end of file diff --git a/app/src/main/assets/it/about_links_dark.html b/app/src/main/assets/it/about_links_dark.html deleted file mode 100644 index e9e451dd..00000000 --- a/app/src/main/assets/it/about_links_dark.html +++ /dev/null @@ -1,45 +0,0 @@ - - - - - - - - - - -

Collegamenti

- -

- Novità

- -

Roadmap

- -

- Segnalazioni di Bug e richieste di nuove funzionalità

- -

- Forum

- -

- GitWeb

- - \ No newline at end of file diff --git a/app/src/main/assets/it/about_links_light.html b/app/src/main/assets/it/about_links_light.html deleted file mode 100644 index 8756e15a..00000000 --- a/app/src/main/assets/it/about_links_light.html +++ /dev/null @@ -1,45 +0,0 @@ - - - - - - - - - - -

Collegamenti

- -

- Novità

- -

Roadmap

- -

- Segnalazioni di Bug e richieste di nuove funzionalità

- -

- Forum

- -

- GitWeb

- - \ No newline at end of file diff --git a/app/src/main/assets/it/about_permissions.html b/app/src/main/assets/it/about_permissions.html new file mode 100644 index 00000000..8e5289ba --- /dev/null +++ b/app/src/main/assets/it/about_permissions.html @@ -0,0 +1,51 @@ + + + + + + + + + + + + + +

Accesso completo alla rete

+

android.permission.INTERNET

+

E' richiesto per permettere l'accesso Internet a WebView. Senza questo permesso, Privacy Browser sarebbe “Nessun Browser: Protegge la tua Privacy restando completamente isolato da Internet”.

+ + +

Creazione di collegamenti

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

E' richiesto per poter creare collegamenti a siti web sulla schermata principale del dispositivo.

+ +

Lettura dalla memoria

+

android.permission.READ_EXTERNAL_STORAGE

+

Richiesta per l'importazione delle impostazioni dalle cartelle pubbliche. + A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può importare le impostazioni solo dalle cartelle dell'applicazione.

+ +

Scrittura della memoria

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Richiesta per l'esportazione delle applicazioni e per il download di file nelle cartelle pubbliche. + A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può esportare le impostazioni e salvare i download solo nelle cartelle dell'applicazione.

+ + \ No newline at end of file diff --git a/app/src/main/assets/it/about_permissions_dark.html b/app/src/main/assets/it/about_permissions_dark.html deleted file mode 100644 index df31743f..00000000 --- a/app/src/main/assets/it/about_permissions_dark.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - - - - - - - -

Accesso completo alla rete

-

android.permission.INTERNET

-

E' richiesto per permettere l'accesso Internet a WebView. Senza questo permesso, Privacy Browser sarebbe “Nessun Browser: Protegge la tua Privacy restando completamente isolato da Internet”.

- - -

Creazione di collegamenti

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

E' richiesto per poter creare collegamenti a siti web sulla schermata principale del dispositivo.

- -

Lettura dalla memoria

-

android.permission.READ_EXTERNAL_STORAGE

-

Richiesta per l'importazione delle impostazioni dalle cartelle pubbliche. - A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può importare le impostazioni solo dalle cartelle dell'applicazione.

- -

Scrittura della memoria

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Richiesta per l'esportazione delle applicazioni e per il download di file nelle cartelle pubbliche. - A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può esportare le impostazioni e salvare i download solo nelle cartelle dell'applicazione.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/about_permissions_light.html b/app/src/main/assets/it/about_permissions_light.html deleted file mode 100644 index 2e35c0a4..00000000 --- a/app/src/main/assets/it/about_permissions_light.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - - - - - - - -

Accesso completo alla rete

-

android.permission.INTERNET

-

E' richiesto per permettere l'accesso Internet a WebView. Senza questo permesso, Privacy Browser sarebbe “Nessun Browser: Protegge la tua Privacy restando completamente isolato da Internet”.

- - -

Creazione di collegamenti

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

E' richiesto per poter creare collegamenti a siti web sulla schermata principale del dispositivo.

- -

Lettura dalla memoria

-

android.permission.READ_EXTERNAL_STORAGE

-

Richiesta per l'importazione delle impostazioni dalle cartelle pubbliche. - A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può importare le impostazioni solo dalle cartelle dell'applicazione.

- -

Scrittura della memoria

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Richiesta per l'esportazione delle applicazioni e per il download di file nelle cartelle pubbliche. - A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può esportare le impostazioni e salvare i download solo nelle cartelle dell'applicazione.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/about_privacy_policy.html b/app/src/main/assets/it/about_privacy_policy.html new file mode 100644 index 00000000..e99d797b --- /dev/null +++ b/app/src/main/assets/it/about_privacy_policy.html @@ -0,0 +1,95 @@ + + + + + + + + + + + + + +

Privacy Browser

+

Privacy Browser non raccoglie alcuna informazione dagli utenti.

+ + +

Google Play

+

Google Play ha una propria privacy policy. + Google fornisce agli sviluppatori informazioni anonime sulle installazioni, incluso il numero di installazioni, secondo le seguenti categorie.

+
    +
  • Versione Android (es. Android 7.1)
  • +
  • Dispositivo (es. Samsung Galaxy S6 [zeroflte])
  • +
  • Tablet (es. Tablet 10" o superiore)
  • +
  • Nazione (es. United States)
  • +
  • Lingua (es. English [United States])
  • +
  • Versione App (es. 14)
  • +
  • Vettore (es. T-Mobile - US)
  • +
+ + +

Ratings di Google Play

+

Google Play ha una propria privacy policy. + Google fornisce agli sviluppatori sintesi anonime delle seguenti informazioni collegate ai ratings degli utenti.

+
    +
  • Nazione (es. United States)
  • +
  • Lingua (es. English)
  • +
  • Versione App (es. 14)
  • +
  • Versione Android (es. Android 7.1)
  • +
  • Dispositivo (es. Google Nexus 5X [bullhead])
  • +
  • Tablet (es. Tablets 10" o superiore)
  • +
+ + +

Recensioni di Google Play

+

Google Play ha una propria privacy policy. + Oltre al nome del recensore, al rating, e al testo della recensione (i quali sono tutti pubblicamente disponibili), Google fornisce alcune o tutte le seguenti informazioni allo sviluppatore.

+
    +
  • Codice Versione (es. 7)
  • +
  • Nome Versione (es. 1.6)
  • +
  • Versione Android (es. Android 5.1)
  • +
  • Dispositivo (es. Galaxy S6 Edge+ [zenlte])
  • +
  • Costruttore (es. Samsung)
  • +
  • Tipo di dispositivo (es. SmartPhone)
  • +
  • Produttore CPU (es. Samsung)
  • +
  • Modello CPU (es. Exynos 7420)
  • +
  • Risoluzione schermo (es. 560 dpi)
  • +
  • Dimensione Schermo (es. 2560 x 1440)
  • +
  • RAM (es. 4096 MB)
  • +
  • Piattaforma nativa (es. armeabi-v7a,armeabi,arm64v8a)
  • +
  • Versione OpenGL ES (es. 3.1)
  • +
  • Lingua del dispositivo (es. English)
  • +
+ + +

Comunicazioni Dirette

+

E' possibile inviare comunicazioni dirette a Stoutner, ad esempio email o commenti su stoutner.com.

+ + +

Utilizzo delle informazioni

+

Stoutner si riserva l'utilizzo di queste informazioni come supporto per lo sviluppo di Privacy Browser e per comunicazioni sullo stato del progetto verso gli utenti. + Stoutner non rivenderà o comunque non trasferirà mai nessuna informazione a terze parti che potrebbero utilizzarle a scopi pubblicitari o di marketing.

+ +
+

Revisione 1.7, 14 Maggio 2019

+ + \ No newline at end of file diff --git a/app/src/main/assets/it/about_privacy_policy_dark.html b/app/src/main/assets/it/about_privacy_policy_dark.html deleted file mode 100644 index f2324c22..00000000 --- a/app/src/main/assets/it/about_privacy_policy_dark.html +++ /dev/null @@ -1,92 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser non raccoglie alcuna informazione dagli utenti.

- - -

Google Play

-

Google Play ha una propria privacy policy. - Google fornisce agli sviluppatori informazioni anonime sulle installazioni, incluso il numero di installazioni, secondo le seguenti categorie.

-
    -
  • Versione Android (es. Android 7.1)
  • -
  • Dispositivo (es. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablet (es. Tablet 10" o superiore)
  • -
  • Nazione (es. United States)
  • -
  • Lingua (es. English [United States])
  • -
  • Versione App (es. 14)
  • -
  • Vettore (es. T-Mobile - US)
  • -
- - -

Ratings di Google Play

-

Google Play ha una propria privacy policy. - Google fornisce agli sviluppatori sintesi anonime delle seguenti informazioni collegate ai ratings degli utenti.

-
    -
  • Nazione (es. United States)
  • -
  • Lingua (es. English)
  • -
  • Versione App (es. 14)
  • -
  • Versione Android (es. Android 7.1)
  • -
  • Dispositivo (es. Google Nexus 5X [bullhead])
  • -
  • Tablet (es. Tablets 10" o superiore)
  • -
- - -

Recensioni di Google Play

-

Google Play ha una propria privacy policy. - Oltre al nome del recensore, al rating, e al testo della recensione (i quali sono tutti pubblicamente disponibili), Google fornisce alcune o tutte le seguenti informazioni allo sviluppatore.

-
    -
  • Codice Versione (es. 7)
  • -
  • Nome Versione (es. 1.6)
  • -
  • Versione Android (es. Android 5.1)
  • -
  • Dispositivo (es. Galaxy S6 Edge+ [zenlte])
  • -
  • Costruttore (es. Samsung)
  • -
  • Tipo di dispositivo (es. SmartPhone)
  • -
  • Produttore CPU (es. Samsung)
  • -
  • Modello CPU (es. Exynos 7420)
  • -
  • Risoluzione schermo (es. 560 dpi)
  • -
  • Dimensione Schermo (es. 2560 x 1440)
  • -
  • RAM (es. 4096 MB)
  • -
  • Piattaforma nativa (es. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Versione OpenGL ES (es. 3.1)
  • -
  • Lingua del dispositivo (es. English)
  • -
- - -

Comunicazioni Dirette

-

E' possibile inviare comunicazioni dirette a Stoutner, ad esempio email o commenti su stoutner.com.

- - -

Utilizzo delle informazioni

-

Stoutner si riserva l'utilizzo di queste informazioni come supporto per lo sviluppo di Privacy Browser e per comunicazioni sullo stato del progetto verso gli utenti. - Stoutner non rivenderà o comunque non trasferirà mai nessuna informazione a terze parti che potrebbero utilizzarle a scopi pubblicitari o di marketing.

- -
-

Revisione 1.6, 22 Maggio 2018

- - \ No newline at end of file diff --git a/app/src/main/assets/it/about_privacy_policy_light.html b/app/src/main/assets/it/about_privacy_policy_light.html deleted file mode 100644 index d8b383f6..00000000 --- a/app/src/main/assets/it/about_privacy_policy_light.html +++ /dev/null @@ -1,92 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser non raccoglie alcuna informazione dagli utenti.

- - -

Google Play

-

Google Play ha una propria privacy policy. - Google fornisce agli sviluppatori informazioni anonime sulle installazioni, incluso il numero di installazioni, secondo le seguenti categorie.

-
    -
  • Versione Android (es. Android 7.1)
  • -
  • Dispositivo (es. Samsung Galaxy S6 [zeroflte])
  • -
  • Tablet (es. Tablet 10" o superiore)
  • -
  • Nazione (es. United States)
  • -
  • Lingua (es. English [United States])
  • -
  • Versione App (es. 14)
  • -
  • Vettore (es. T-Mobile - US)
  • -
- - -

Ratings di Google Play

-

Google Play ha una propria privacy policy. - Google fornisce agli sviluppatori sintesi anonime delle seguenti informazioni collegate ai ratings degli utenti.

-
    -
  • Nazione (es. United States)
  • -
  • Lingua (es. English)
  • -
  • Versione App (es. 14)
  • -
  • Versione Android (es. Android 7.1)
  • -
  • Dispositivo (es. Google Nexus 5X [bullhead])
  • -
  • Tablet (es. Tablets 10" o superiore)
  • -
- - -

Recensioni di Google Play

-

Google Play ha una propria privacy policy. - Oltre al nome del recensore, al rating, e al testo della recensione (i quali sono tutti pubblicamente disponibili), Google fornisce alcune o tutte le seguenti informazioni allo sviluppatore.

-
    -
  • Codice Versione (es. 7)
  • -
  • Nome Versione (es. 1.6)
  • -
  • Versione Android (es. Android 5.1)
  • -
  • Dispositivo (es. Galaxy S6 Edge+ [zenlte])
  • -
  • Costruttore (es. Samsung)
  • -
  • Tipo di dispositivo (es. SmartPhone)
  • -
  • Produttore CPU (es. Samsung)
  • -
  • Modello CPU (es. Exynos 7420)
  • -
  • Risoluzione schermo (es. 560 dpi)
  • -
  • Dimensione Schermo (es. 2560 x 1440)
  • -
  • RAM (es. 4096 MB)
  • -
  • Piattaforma nativa (es. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Versione OpenGL ES (es. 3.1)
  • -
  • Lingua del dispositivo (es. English)
  • -
- - -

Comunicazioni Dirette

-

E' possibile inviare comunicazioni dirette a Stoutner, ad esempio email o commenti su stoutner.com.

- - -

Utilizzo delle informazioni

-

Stoutner si riserva l'utilizzo di queste informazioni come supporto per lo sviluppo di Privacy Browser e per comunicazioni sullo stato del progetto verso gli utenti. - Stoutner non rivenderà o comunque non trasferirà mai nessuna informazione a terze parti che potrebbero utilizzarle a scopi pubblicitari o di marketing.

- -
-

Revisione 1.6, 22 Maggio 2018

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_domain_settings.html b/app/src/main/assets/it/guide_domain_settings.html new file mode 100644 index 00000000..0455b8df --- /dev/null +++ b/app/src/main/assets/it/guide_domain_settings.html @@ -0,0 +1,44 @@ + + + + + + + + + + + + + +

Navigazione sicura

+ +

Privacy Browser dovrebbe essere utilizzato di default per navigare con JavaScript, cookies, e DOM storage disabiltati. + In ogni caso alcuni siti web necessitano legittimamente di queste funzionalità per essere visualizzati correttamente. + Le impostazioni dei Domini permettono di abilitare automaticamente specifici set di funzionalità per i domini che sono stati definiti.

+ + + +

Quando si accede a un dominio per cui sono state specificate impostazioni personalizzate la casella di testo dell'indirizzo URL si colora di verde.

+ + + + \ No newline at end of file diff --git a/app/src/main/assets/it/guide_domain_settings_dark.html b/app/src/main/assets/it/guide_domain_settings_dark.html deleted file mode 100644 index 090101af..00000000 --- a/app/src/main/assets/it/guide_domain_settings_dark.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -

Navigazione sicura

- -

Privacy Browser dovrebbe essere utilizzato di default per navigare con JavaScript, cookies, e DOM storage disabiltati. - In ogni caso alcuni siti web necessitano legittimamente di queste funzionalità per essere visualizzati correttamente. - Le impostazioni dei Domini permettono di abilitare automaticamente specifici set di funzionalità per i domini che sono stati definiti.

- -

- -

Quando si accede a un dominio per cui sono state specificate impostazioni personalizzate la casella di testo dell'indirizzo URL si colora di verde.

- -

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_domain_settings_light.html b/app/src/main/assets/it/guide_domain_settings_light.html deleted file mode 100644 index 4beeb552..00000000 --- a/app/src/main/assets/it/guide_domain_settings_light.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -

Navigazione sicura

- -

Privacy Browser dovrebbe essere utilizzato di default per navigare con JavaScript, cookies, e DOM storage disabiltati. - In ogni caso alcuni siti web necessitano legittimamente di queste funzionalità per essere visualizzati correttamente. - Le impostazioni dei Domini permettono di abilitare automaticamente specifici set di funzionalità per i domini che sono stati definiti.

- -

- -

Quando si accede a un dominio per cui sono state specificate impostazioni personalizzate la casella di testo dell'indirizzo URL si colora di verde.

- -

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_javascript.html b/app/src/main/assets/it/guide_javascript.html new file mode 100644 index 00000000..11b25085 --- /dev/null +++ b/app/src/main/assets/it/guide_javascript.html @@ -0,0 +1,64 @@ + + + + + + + + + + + + + +

JavaScript è potentissimo

+ +

Tornando ai primordi di internet, le pagine web erano statiche, + ovvero contenevano testi e immagini che venivano visualizzati sullo schermo ma non potevano cambiare o interagire in nessun modo con l'utente. + Ovviamente non può succedere nulla di particolarmente interessante con solo contenuti statici. Furono quindi sviluppate diverse tecnologie per facilitare la creazione di pagine web dinamiche. + JavaScript è una di queste.

+ +

JavaScript è un linguaggio di programmazione. Molti siti web ospitano software scritto in JavaScript che viene inviato ai dispositivi come parte integrante della pagina web. + Il dispositivo esegue localmente JavaScript e segue i comandi del programma come ad esempio l'animazione di immagini del sito web, l'apertura di popup, e molte altre cose utili.

+ +

JavaScript è pericoloso

+ +

Naturalmente il concetto stesso di eseguire arbitrariamente software proveniente da un sito web è potenzialmente molto pericoloso. + Per questo motivo in JavaScript esistono limitazioni per prevenire comportamenti indesiderati come ad esempio l'installazione di virus. + Ad ogni modo risulta che queste limitazioni sono abbastanza permissive. + Di seguito si può vedere una screenshot tratta da webkay, un sito web che mostra quali siano le informazioni che JavaScript può carpire da un dispositivo. + Browser Leaks è un'altra autorevole fonte di informazioni al riguardo.

+ + + +

Per ragioni di privacy l'ideale sarebbe navigare in internet con JavaScript disabilitato. + Esistono però alcuni siti web che richiedono in modo legittimo JavaScript per funzionare correttamente e altri che non funzionano senza, anche se potrebbero essere progettati per farlo. + Privacy Browser affronta questo problema facilitando l'abilitazione e la disabilitazione di JavaScript. Toccando lo scudo della privacy esso cambierà colore da blu + o giallo (entrambi indicano che JavaScript è disabilitato) a rosso + (JavaScript abilitato). + Se si osservano le varie informazioni che webkay può raccogliere con JavaScript abilitato o disabilitato si possono scoprire cose molto interessanti.

+ +

Navigare su internet con JavaScript disabilitato, abilitandolo solo quando necessario, è quindi un passo molto importante per la protezione della propria privacy. + Inoltre JavaScript è utilizzato anche per caricare la maggior parte degli annunci pubblicitari e altra robaccia aggiuntiva presente nei moderni siti web. + Se Javascript viene disabilitato, i siti web saranno caricati più velocemente, riducendo così il traffico sulla rete, e l'utilizzo della CPU sarà ridotto, + risultando così in una maggiore durata della batteria.

+ + \ No newline at end of file diff --git a/app/src/main/assets/it/guide_javascript_dark.html b/app/src/main/assets/it/guide_javascript_dark.html deleted file mode 100644 index 6ba9e370..00000000 --- a/app/src/main/assets/it/guide_javascript_dark.html +++ /dev/null @@ -1,61 +0,0 @@ - - - - - - - - - - -

JavaScript è potentissimo

- -

Tornando ai primordi di internet, le pagine web erano statiche, - ovvero contenevano testi e immagini che venivano visualizzati sullo schermo ma non potevano cambiare o interagire in nessun modo con l'utente. - Ovviamente non può succedere nulla di particolarmente interessante con solo contenuti statici. Furono quindi sviluppate diverse tecnologie per facilitare la creazione di pagine web dinamiche. - JavaScript è una di queste.

- -

JavaScript è un linguaggio di programmazione. Molti siti web ospitano software scritto in JavaScript che viene inviato ai dispositivi come parte integrante della pagina web. - Il dispositivo esegue localmente JavaScript e segue i comandi del programma come ad esempio l'animazione di immagini del sito web, l'apertura di popup, e molte altre cose utili.

- -

JavaScript è pericoloso

- -

Naturalmente il concetto stesso di eseguire arbitrariamente software proveniente da un sito web è potenzialmente molto pericoloso. - Per questo motivo in JavaScript esistono limitazioni per prevenire comportamenti indesiderati come ad esempio l'installazione di virus. - Ad ogni modo risulta che queste limitazioni sono abbastanza permissive. - Di seguito si può vedere una screenshot tratta da webkay, un sito web che mostra quali siano le informazioni che JavaScript può carpire da un dispositivo. - Browser Leaks è un'altra autorevole fonte di informazioni al riguardo.

- -

- -

Per ragioni di privacy l'ideale sarebbe navigare in internet con JavaScript disabilitato. - Esistono però alcuni siti web che richiedono in modo legittimo JavaScript per funzionare correttamente e altri che non funzionano senza, anche se potrebbero essere progettati per farlo. - Privacy Browser affronta questo problema facilitando l'abilitazione e la disabilitazione di JavaScript. Toccando lo scudo della privacy esso cambierà colore da blu - o giallo (entrambi indicano che JavaScript è disabilitato) a rosso - (JavaScript abilitato). - Se si osservano le varie informazioni che webkay può raccogliere con JavaScript abilitato o disabilitato si possono scoprire cose molto interessanti.

- -

Navigare su internet con JavaScript disabilitato, abilitandolo solo quando necessario, è quindi un passo molto importante per la protezione della propria privacy. - Inoltre JavaScript è utilizzato anche per caricare la maggior parte degli annunci pubblicitari e altra robaccia aggiuntiva presente nei moderni siti web. - Se Javascript viene disabilitato, i siti web saranno caricati più velocemente, riducendo così il traffico sulla rete, e l'utilizzo della CPU sarà ridotto, - risultando così in una maggiore durata della batteria.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_javascript_light.html b/app/src/main/assets/it/guide_javascript_light.html deleted file mode 100644 index 074ec028..00000000 --- a/app/src/main/assets/it/guide_javascript_light.html +++ /dev/null @@ -1,61 +0,0 @@ - - - - - - - - - - -

JavaScript è potentissimo

- -

Tornando ai primordi di internet, le pagine web erano statiche, - ovvero contenevano testi e immagini che venivano visualizzati sullo schermo ma non potevano cambiare o interagire in nessun modo con l'utente. - Ovviamente non può succedere nulla di particolarmente interessante con solo contenuti statici. Furono quindi sviluppate diverse tecnologie per facilitare la creazione di pagine web dinamiche. - JavaScript è una di queste.

- -

JavaScript è un linguaggio di programmazione. Molti siti web ospitano software scritto in JavaScript che viene inviato ai dispositivi come parte integrante della pagina web. - Il dispositivo esegue localmente JavaScript e segue i comandi del programma come ad esempio l'animazione di immagini del sito web, l'apertura di popup, e molte altre cose utili.

- -

JavaScript è pericoloso

- -

Naturalmente il concetto stesso di eseguire arbitrariamente software proveniente da un sito web è potenzialmente molto pericoloso. - Per questo motivo in JavaScript esistono limitazioni per prevenire comportamenti indesiderati come ad esempio l'installazione di virus. - Ad ogni modo risulta che queste limitazioni sono abbastanza permissive. - Di seguito si può vedere una screenshot tratta da webkay, un sito web che mostra quali siano le informazioni che JavaScript può carpire da un dispositivo. - Browser Leaks è un'altra autorevole fonte di informazioni al riguardo.

- -

- -

Per ragioni di privacy l'ideale sarebbe navigare in internet con JavaScript disabilitato. - Esistono però alcuni siti web che richiedono in modo legittimo JavaScript per funzionare correttamente e altri che non funzionano senza, anche se potrebbero essere progettati per farlo. - Privacy Browser affronta questo problema facilitando l'abilitazione e la disabilitazione di JavaScript. Toccando lo scudo della privacy esso cambierà colore da blu - o giallo (entrambi indicano che JavaScript è disabilitato) a rosso - (JavaScript abilitato). - Se si osservano le varie informazioni che webkay può raccogliere con JavaScript abilitato o disabilitato si possono scoprire cose molto interessanti.

- -

Navigare su internet con JavaScript disabilitato, abilitandolo solo quando necessario, è quindi un passo molto importante per la protezione della propria privacy. - Inoltre JavaScript è utilizzato anche per caricare la maggior parte degli annunci pubblicitari e altra robaccia aggiuntiva presente nei moderni siti web. - Se Javascript viene disabilitato, i siti web saranno caricati più velocemente, riducendo così il traffico sulla rete, e l'utilizzo della CPU sarà ridotto, - risultando così in una maggiore durata della batteria.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_local_storage.html b/app/src/main/assets/it/guide_local_storage.html new file mode 100644 index 00000000..70c34366 --- /dev/null +++ b/app/src/main/assets/it/guide_local_storage.html @@ -0,0 +1,98 @@ + + + + + + + + + + + + + +

Cookies proprietari

+ +

I cookies proprietari sono definiti dal sito web nella barra della URL all'inizio della pagina.

+ +

Fin dagli albori di internet divenne ovvio che sarebbe stato molto utile per i siti web essere in grado di salvare informazioni sui computer per eventuali accessi successivi. + Ad esempio, un sito web che fornisca informazioni meteo potrebbe chiedere all'utente la sua posizione geografica e salvarla in un cookie. + Nel caso di un accesso successivo al sito web da parte dell'utente, le informazioni meteo sarebbero quindi caricate in automatico per quella posizione geografica, + senza che si renda necessario per l'utente indicarla nuovamente.

+ +

Come per quasi ogni cosa sul web, persone intelligenti hanno ideato moltissimi modi per abusare dei cookies e usarli per finalità che gli utenti non approverebbero, + se solo sapessero cosa sta succedendo. Ad esempio, un sito web può salvare su un dispositivo un cookie con un numero seriale univoco. + In questo modo, ogni volta che l'utente visiterà il sito da quel dispositivo, sarà collegato ad un profilo unico mantenuto sul server per quel particolare numero seriale, + anche se il dispositivo si connette con indirizzo IP diverso.

+ +

Quasi tutti i che richiedono login hanno bisogno che i cookies proprietari siano abilitati per permettere ad un utente di accedere. + Questo è il modo in cui essi sono sicuri che l'utente sia sempre lui nella navigazione da una pagina all'altra del sito, ed è, a nostro parere, uno dei pochi utilizzi legittimi dei cookies.

+ +

Se sono stati abilitati i cookies proprietari ma è stato disabilitato JavaScript, + l'icona della privacy sarà gialla con lo scopo di avvertire l'utente.

+ + +

Cookies di terze parti

+ +

I cookies di terze parti sono impostati da alcune porzioni dei siti web che sono caricate da server differenti rispetto alla URL all'inizio della pagina. + Ad esempio, molti siti web con annunci pubblicitari caricano gli annunci da ad-broker distinti, come ad esempio Google Ad Sense. + Ogni volta che il sito viene caricato richiede all'ad-broker di mostrare un annuncio pubblicitario. + A questo punto l'ad-broker analizza tutte le informazioni possedute relative all'utente, compara le tariffe che saranno pagate dalle agenzie per i diversi annunci, + e quindi seleziona quello da mostrare. La sezione di un sito web dedicata alla visualizzazione degli annunci pubblicitari viene caricata dal server del broker invece che da quello principale.

+ +

Dal momento che la maggior parte della pubblicità su internet è gestita da pochi broker, + non c'è voluto molto tempo perchè si rendessero conto di poter posizionare un cookie tracciante sui dispositivi per conoscere i luoghi in cui si trovano gli utenti. + Ogni volta che si carica un annuncio la primissima cosa che il broker fa è quella di verificare se il dispositivo ha già il suo numero seriale univoco in un cookie. + A questo punto cerca il profilo relativo a quel numero seriale e memorizza il nuovo sito. + Questo è il motivo per cui un utente può effettuare una ricerca su un sito per un prodotto che solitamente non cerca, ad esempio le noci, + e da quel momento improvvisamente inizia a vedere annunci di noci su ogni sito web visitato.

+ +

Oltre agli ad-broker, anche i social media hanno scoperto come entrare in azione. + Alcuni anni fa i principali siti social come Facebook e Twitter hanno convinto un gran numero di siti web che + sarebbe stato loro molto utile inserire alcune piccole icone dei social media sulle loro pagine. Queste però non sono semplici immagini. + Esse contengono del codice incorporato che collega al sito del social media ma non solo, oltre ad altre cose, + carica un cookie di terze parti sul dispositivo. Questi cookie sono caricati anche se l'utente non possiede nemmeno un account su quel particolare social media. + Nel corso del tempo le aziende come Facebook (che gestisce anche una rete di annunci) hanno costruito un numero enorme di profili dettagliati di persone che + non hanno nemmeno mai creato un account sul loro sito.

+ +

Non esiste nessuna buona ragione di abilitare i cookie di terze parti. Su dispositivi con Android KitKat o precedente (versione <= 4.4.4 o API <= 20), WebView non + fa distinzione + tra cookie proprietari e cookie di terze parti.. Per questo motivo l'abilitazione dei primi permette anche la creazione dei secondi.

+ + +

DOM Storage

+ +

Il Document Object Model storage, conosciuto anche come web storage, è come l'utilizzo di cookie potenziati. + Mentre per tutti i cookie di una singola URL il massimo spazio di memoria occupata è di circa 4 kilobyte, + il DOM storage può occupare alcuni megabyte per sito. + Siccome il DOM storage utilizza JavaScript per leggere e scrivere dati, non può essere abilitato se non viene abilitato anche JavaScript.

+ + +

Dati dei moduli

+ +

I dati dei moduli contengono le informazioni che vengono digitate nei web form, come user name, indirizzi, numeri di telefono, ecc. + per poterli elencare in menù a tendina in caso di visite successive. + A differenza delle altre modalità di memorizzazione locale delle informazioni, i dati dei moduli non vengono inviati ai web server senza una interazione con l'utente. + A partire da Android Oreo (8.0), i dati dei moduli di WebView’s sono stati sostituiti dal + Servizio di Riempimento Automatico. + Per questo motivo i controlli per i dati dei moduli non sono più disponibili nei dispositivi Android più recenti.

+ + \ No newline at end of file diff --git a/app/src/main/assets/it/guide_local_storage_dark.html b/app/src/main/assets/it/guide_local_storage_dark.html deleted file mode 100644 index 85dc0835..00000000 --- a/app/src/main/assets/it/guide_local_storage_dark.html +++ /dev/null @@ -1,95 +0,0 @@ - - - - - - - - - - -

Cookies proprietari

- -

I cookies proprietari sono definiti dal sito web nella barra della URL all'inizio della pagina.

- -

Fin dagli albori di internet divenne ovvio che sarebbe stato molto utile per i siti web essere in grado di salvare informazioni sui computer per eventuali accessi successivi. - Ad esempio, un sito web che fornisca informazioni meteo potrebbe chiedere all'utente la sua posizione geografica e salvarla in un cookie. - Nel caso di un accesso successivo al sito web da parte dell'utente, le informazioni meteo sarebbero quindi caricate in automatico per quella posizione geografica, - senza che si renda necessario per l'utente indicarla nuovamente.

- -

Come per quasi ogni cosa sul web, persone intelligenti hanno ideato moltissimi modi per abusare dei cookies e usarli per finalità che gli utenti non approverebbero, - se solo sapessero cosa sta succedendo. Ad esempio, un sito web può salvare su un dispositivo un cookie con un numero seriale univoco. - In questo modo, ogni volta che l'utente visiterà il sito da quel dispositivo, sarà collegato ad un profilo unico mantenuto sul server per quel particolare numero seriale, - anche se il dispositivo si connette con indirizzo IP diverso.

- -

Quasi tutti i che richiedono login hanno bisogno che i cookies proprietari siano abilitati per permettere ad un utente di accedere. - Questo è il modo in cui essi sono sicuri che l'utente sia sempre lui nella navigazione da una pagina all'altra del sito, ed è, a nostro parere, uno dei pochi utilizzi legittimi dei cookies.

- -

Se sono stati abilitati i cookies proprietari ma è stato disabilitato JavaScript, - l'icona della privacy sarà gialla con lo scopo di avvertire l'utente.

- - -

Cookies di terze parti

- -

I cookies di terze parti sono impostati da alcune porzioni dei siti web che sono caricate da server differenti rispetto alla URL all'inizio della pagina. - Ad esempio, molti siti web con annunci pubblicitari caricano gli annunci da ad-broker distinti, come ad esempio Google Ad Sense. - Ogni volta che il sito viene caricato richiede all'ad-broker di mostrare un annuncio pubblicitario. - A questo punto l'ad-broker analizza tutte le informazioni possedute relative all'utente, compara le tariffe che saranno pagate dalle agenzie per i diversi annunci, - e quindi seleziona quello da mostrare. La sezione di un sito web dedicata alla visualizzazione degli annunci pubblicitari viene caricata dal server del broker invece che da quello principale.

- -

Dal momento che la maggior parte della pubblicità su internet è gestita da pochi broker, - non c'è voluto molto tempo perchè si rendessero conto di poter posizionare un cookie tracciante sui dispositivi per conoscere i luoghi in cui si trovano gli utenti. - Ogni volta che si carica un annuncio la primissima cosa che il broker fa è quella di verificare se il dispositivo ha già il suo numero seriale univoco in un cookie. - A questo punto cerca il profilo relativo a quel numero seriale e memorizza il nuovo sito. - Questo è il motivo per cui un utente può effettuare una ricerca su un sito per un prodotto che solitamente non cerca, ad esempio le noci, - e da quel momento improvvisamente inizia a vedere annunci di noci su ogni sito web visitato.

- -

Oltre agli ad-broker, anche i social media hanno scoperto come entrare in azione. - Alcuni anni fa i principali siti social come Facebook e Twitter hanno convinto un gran numero di siti web che - sarebbe stato loro molto utile inserire alcune piccole icone dei social media sulle loro pagine. Queste però non sono semplici immagini. - Esse contengono del codice incorporato che collega al sito del social media ma non solo, oltre ad altre cose, - carica un cookie di terze parti sul dispositivo. Questi cookie sono caricati anche se l'utente non possiede nemmeno un account su quel particolare social media. - Nel corso del tempo le aziende come Facebook (che gestisce anche una rete di annunci) hanno costruito un numero enorme di profili dettagliati di persone che - non hanno nemmeno mai creato un account sul loro sito.

- -

Non esiste nessuna buona ragione di abilitare i cookie di terze parti. Su dispositivi con Android KitKat o precedente (versione <= 4.4.4 o API <= 20), WebView non - fa distinzione - tra cookie proprietari e cookie di terze parti.. Per questo motivo l'abilitazione dei primi permette anche la creazione dei secondi.

- - -

DOM Storage

- -

Il Document Object Model storage, conosciuto anche come web storage, è come l'utilizzo di cookie potenziati. - Mentre per tutti i cookie di una singola URL il massimo spazio di memoria occupata è di circa 4 kilobyte, - il DOM storage può occupare alcuni megabyte per sito. - Siccome il DOM storage utilizza JavaScript per leggere e scrivere dati, non può essere abilitato se non viene abilitato anche JavaScript.

- - -

Dati dei moduli

- -

I dati dei moduli contengono le informazioni che vengono digitate nei web form, come user name, indirizzi, numeri di telefono, ecc. - per poterli elencare in menù a tendina in caso di visite successive. - A differenza delle altre modalità di memorizzazione locale delle informazioni, i dati dei moduli non vengono inviati ai web server senza una interazione con l'utente. - A partire da Android Oreo (8.0), i dati dei moduli di WebView’s sono stati sostituiti dal - Servizio di Riempimento Automatico. - Per questo motivo i controlli per i dati dei moduli non sono più disponibili nei dispositivi Android più recenti.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_local_storage_light.html b/app/src/main/assets/it/guide_local_storage_light.html deleted file mode 100644 index a8d91078..00000000 --- a/app/src/main/assets/it/guide_local_storage_light.html +++ /dev/null @@ -1,95 +0,0 @@ - - - - - - - - - - -

Cookies proprietari

- -

I cookies proprietari sono definiti dal sito web nella barra della URL all'inizio della pagina.

- -

Fin dagli albori di internet divenne ovvio che sarebbe stato molto utile per i siti web essere in grado di salvare informazioni sui computer per eventuali accessi successivi. - Ad esempio, un sito web che fornisca informazioni meteo potrebbe chiedere all'utente la sua posizione geografica e salvarla in un cookie. - Nel caso di un accesso successivo al sito web da parte dell'utente, le informazioni meteo sarebbero quindi caricate in automatico per quella posizione geografica, - senza che si renda necessario per l'utente indicarla nuovamente.

- -

Come per quasi ogni cosa sul web, persone intelligenti hanno ideato moltissimi modi per abusare dei cookies e usarli per finalità che gli utenti non approverebbero, - se solo sapessero cosa sta succedendo. Ad esempio, un sito web può salvare su un dispositivo un cookie con un numero seriale univoco. - In questo modo, ogni volta che l'utente visiterà il sito da quel dispositivo, sarà collegato ad un profilo unico mantenuto sul server per quel particolare numero seriale, - anche se il dispositivo si connette con indirizzo IP diverso.

- -

Quasi tutti i che richiedono login hanno bisogno che i cookies proprietari siano abilitati per permettere ad un utente di accedere. - Questo è il modo in cui essi sono sicuri che l'utente sia sempre lui nella navigazione da una pagina all'altra del sito, ed è, a nostro parere, uno dei pochi utilizzi legittimi dei cookies.

- -

Se sono stati abilitati i cookies proprietari ma è stato disabilitato JavaScript, - l'icona della privacy sarà gialla con lo scopo di avvertire l'utente.

- - -

Cookies di terze parti

- -

I cookies di terze parti sono impostati da alcune porzioni dei siti web che sono caricate da server differenti rispetto alla URL all'inizio della pagina. - Ad esempio, molti siti web con annunci pubblicitari caricano gli annunci da ad-broker distinti, come ad esempio Google Ad Sense. - Ogni volta che il sito viene caricato richiede all'ad-broker di mostrare un annuncio pubblicitario. - A questo punto l'ad-broker analizza tutte le informazioni possedute relative all'utente, compara le tariffe che saranno pagate dalle agenzie per i diversi annunci, - e quindi seleziona quello da mostrare. La sezione di un sito web dedicata alla visualizzazione degli annunci pubblicitari viene caricata dal server del broker invece che da quello principale.

- -

Dal momento che la maggior parte della pubblicità su internet è gestita da pochi broker, - non c'è voluto molto tempo perchè si rendessero conto di poter posizionare un cookie tracciante sui dispositivi per conoscere i luoghi in cui si trovano gli utenti. - Ogni volta che si carica un annuncio la primissima cosa che il broker fa è quella di verificare se il dispositivo ha già il suo numero seriale univoco in un cookie. - A questo punto cerca il profilo relativo a quel numero seriale e memorizza il nuovo sito. - Questo è il motivo per cui un utente può effettuare una ricerca su un sito per un prodotto che solitamente non cerca, ad esempio le noci, - e da quel momento improvvisamente inizia a vedere annunci di noci su ogni sito web visitato.

- -

Oltre agli ad-broker, anche i social media hanno scoperto come entrare in azione. - Alcuni anni fa i principali siti social come Facebook e Twitter hanno convinto un gran numero di siti web che - sarebbe stato loro molto utile inserire alcune piccole icone dei social media sulle loro pagine. Queste però non sono semplici immagini. - Esse contengono del codice incorporato che collega al sito del social media ma non solo, oltre ad altre cose, - carica un cookie di terze parti sul dispositivo. Questi cookie sono caricati anche se l'utente non possiede nemmeno un account su quel particolare social media. - Nel corso del tempo le aziende come Facebook (che gestisce anche una rete di annunci) hanno costruito un numero enorme di profili dettagliati di persone che - non hanno nemmeno mai creato un account sul loro sito.

- -

Non esiste nessuna buona ragione di abilitare i cookie di terze parti. Su dispositivi con Android KitKat o precedente (versione <= 4.4.4 o API <= 20), WebView non - fa distinzione - tra cookie proprietari e cookie di terze parti.. Per questo motivo l'abilitazione dei primi permette anche la creazione dei secondi.

- - -

DOM Storage

- -

Il Document Object Model storage, conosciuto anche come web storage, è come l'utilizzo di cookie potenziati. - Mentre per tutti i cookie di una singola URL il massimo spazio di memoria occupata è di circa 4 kilobyte, - il DOM storage può occupare alcuni megabyte per sito. - Siccome il DOM storage utilizza JavaScript per leggere e scrivere dati, non può essere abilitato se non viene abilitato anche JavaScript.

- - -

Dati dei moduli

- -

I dati dei moduli contengono le informazioni che vengono digitate nei web form, come user name, indirizzi, numeri di telefono, ecc. - per poterli elencare in menù a tendina in caso di visite successive. - A differenza delle altre modalità di memorizzazione locale delle informazioni, i dati dei moduli non vengono inviati ai web server senza una interazione con l'utente. - A partire da Android Oreo (8.0), i dati dei moduli di WebView’s sono stati sostituiti dal - Servizio di Riempimento Automatico. - Per questo motivo i controlli per i dati dei moduli non sono più disponibili nei dispositivi Android più recenti.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_overview.html b/app/src/main/assets/it/guide_overview.html new file mode 100644 index 00000000..3770e54c --- /dev/null +++ b/app/src/main/assets/it/guide_overview.html @@ -0,0 +1,51 @@ + + + + + + + + + + + + + +

Vera Privacy

+ +

Privacy Browser è sviluppato con lo scopo di permettere all'utente il massimo controllo possibile della sua privacy anche durante la navigazione su internet. + Quando un browser si connette a un sito web, vengono trasferiti al server alcune informazioni necessarie per facilitare la connessione. + Ad esempio, il server riceverà l'indirizzo IP e il numero di porta dell'utente, perchè gli sono necessari per sapere dove inviare la risposta. + Queste informazioni spesso vengono memorizzate dal server, + per permettere allo sviluppatore del sito web di avere report che indichino quanto spesso una pagina viene visualizzata e quanto accedono indirizzi IP diversi.

+ +

In ogni caso molti gestori di siti web vogliono molte più informazioni sui visitatori dei siti, compreso il tracciamento della navigazione anche su siti web multipli. + Esistono molte tecniche differenti che permettono il tracciamento, ad esempio la richiesta o il caricamento di informazioni addizionali sul dispositivo dell'utente. + Praticamente tutti i browser partecipano involontariamente al tracciamento all'insaputa dell'utente. + Privacy Browser è sviluppato in modo da garantire all'utente quante più informazioni e controllo possibile su queste modalitàà di tracciamento.

+ + +

Limitazioni di WebView di Android

+ +

Privacy Browser utilizza il WebView nativo di Android per la visualizzazione dei siti web. + Esistono alcune limitazioni nei controlli disponibili di WebView per la gestione delle impostazioni della privacy. + Ad esempio non è possibile abilitare alcuni comandi JavaScript disabilitandone altri. + In futuro Privacy Browser sarà dotato di una WebView personalizzata denominata Privacy WebView.

+ + \ No newline at end of file diff --git a/app/src/main/assets/it/guide_overview_dark.html b/app/src/main/assets/it/guide_overview_dark.html deleted file mode 100644 index 63021003..00000000 --- a/app/src/main/assets/it/guide_overview_dark.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - - - - - - - -

Vera Privacy

- -

Privacy Browser è sviluppato con lo scopo di permettere all'utente il massimo controllo possibile della sua privacy anche durante la navigazione su internet. - Quando un browser si connette a un sito web, vengono trasferiti al server alcune informazioni necessarie per facilitare la connessione. - Ad esempio, il server riceverà l'indirizzo IP e il numero di porta dell'utente, perchè gli sono necessari per sapere dove inviare la risposta. - Queste informazioni spesso vengono memorizzate dal server, - per permettere allo sviluppatore del sito web di avere report che indichino quanto spesso una pagina viene visualizzata e quanto accedono indirizzi IP diversi.

- -

In ogni caso molti gestori di siti web vogliono molte più informazioni sui visitatori dei siti, compreso il tracciamento della navigazione anche su siti web multipli. - Esistono molte tecniche differenti che permettono il tracciamento, ad esempio la richiesta o il caricamento di informazioni addizionali sul dispositivo dell'utente. - Praticamente tutti i browser partecipano involontariamente al tracciamento all'insaputa dell'utente. - Privacy Browser è sviluppato in modo da garantire all'utente quante più informazioni e controllo possibile su queste modalitàà di tracciamento.

- - -

Limitazioni di WebView di Android

- -

Privacy Browser utilizza il WebView nativo di Android per la visualizzazione dei siti web. - Esistono alcune limitazioni nei controlli disponibili di WebView per la gestione delle impostazioni della privacy. - Ad esempio non è possibile abilitare alcuni comandi JavaScript disabilitandone altri. - In futuro Privacy Browser sarà dotato di una WebView personalizzata denominata Privacy WebView.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_overview_light.html b/app/src/main/assets/it/guide_overview_light.html deleted file mode 100644 index a0a906ed..00000000 --- a/app/src/main/assets/it/guide_overview_light.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - - - - - - - -

Vera Privacy

- -

Privacy Browser è sviluppato con lo scopo di permettere all'utente il massimo controllo possibile della sua privacy anche durante la navigazione su internet. - Quando un browser si connette a un sito web, vengono trasferiti al server alcune informazioni necessarie per facilitare la connessione. - Ad esempio, il server riceverà l'indirizzo IP e il numero di porta dell'utente, perchè gli sono necessari per sapere dove inviare la risposta. - Queste informazioni spesso vengono memorizzate dal server, - per permettere allo sviluppatore del sito web di avere report che indichino quanto spesso una pagina viene visualizzata e quanto accedono indirizzi IP diversi.

- -

In ogni caso molti gestori di siti web vogliono molte più informazioni sui visitatori dei siti, compreso il tracciamento della navigazione anche su siti web multipli. - Esistono molte tecniche differenti che permettono il tracciamento, ad esempio la richiesta o il caricamento di informazioni addizionali sul dispositivo dell'utente. - Praticamente tutti i browser partecipano involontariamente al tracciamento all'insaputa dell'utente. - Privacy Browser è sviluppato in modo da garantire all'utente quante più informazioni e controllo possibile su queste modalitàà di tracciamento.

- - -

Limitazioni di WebView di Android

- -

Privacy Browser utilizza il WebView nativo di Android per la visualizzazione dei siti web. - Esistono alcune limitazioni nei controlli disponibili di WebView per la gestione delle impostazioni della privacy. - Ad esempio non è possibile abilitare alcuni comandi JavaScript disabilitandone altri. - In futuro Privacy Browser sarà dotato di una WebView personalizzata denominata Privacy WebView.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_proxies.html b/app/src/main/assets/it/guide_proxies.html new file mode 100644 index 00000000..bb5e0160 --- /dev/null +++ b/app/src/main/assets/it/guide_proxies.html @@ -0,0 +1,85 @@ + + + + + + + + + + + + + +

I Proxy e i loro limiti

+ +

Esistono due categorie generali di cattivi soggetti che vogliono violare la privacy del web: + governi maliziosi con accesso agli ISP (Internet Service Providers) e mega corporations che gestiscono social network e agenzie pubblicitarie. + Proxy come TOR (The Onion Router) e I2P (Invisible Internet Project) sono utili per la protezione della privacy da governi maliziosi (che spiano il traffico in transito) + ma non dalle mega corporations (che inseriscono codice malizioso sui web server).

+ + +

Governi Maliziosi

+ +

I governi malizionsi spesso spiano i loro cittadini per punire il dissenso o le attività di difesa dei diritti umani. + Solitamente, o gestiscono loro stessi gli ISP locali oppure li obbligano a rivelare informazioni mostrando tutti gli indirizzi IP visitati da ciascun utente. + I proxy a strati sono progettati per sconfiggere questa violazione di privacy crittografando il traffico dal dispositivo dell'utente e instradandolo attraverso server multipli su internet + prima di inviarlo alla destinazione finale. + Questo significa che nessun ISP individuale, server, o sito web, + può conoscere sia l'indirizzo IP del dispositivo dell'utente che l'indirizzo IP del web server finale. + I governi maliziosi e gli ISP che controllano, non possono conoscere i web server ai quali l'utente sta accedendo, sebbene sappiano che l'utente sta utilizzando un servizio di proxy a strati. + In alcune parti del mondo l'utilizzo di proxy può essere consideraro come evidenza di un comportamento illegale (“Se non hai nulla da nascondere non crittograferesti il tuo traffico”) + e gli utenti potrebbero essere perseguiti perchè il loro governo potrebbe assumere che stiano facendo qualcosa di proibito. + Per questo motivo i proxy possono essere utili ma non sono la soluzione di tutti i mali.

+ + +

Mega corporations

+ +

Quando un utente si connette a un web server, il server può vedere l'indirizzo IP dell'utente. + Nonostante non sia una scienza esatta, è possibile convertire l'IP in indirizzi fisici con discreta accuratezza. + I piccoli web servers solitamente si basano sull'indirizzo IP per identificare la posizione degli utenti che accedono al loro sito. + I Proxy sono una buona soluzione per mascherare la posizione dell'utente a questi server. + Le mega corporations proprietarie di social media e agenzie pubblicitarie utilizzano però un intero profilo di informazioni con lo scopo di tracciare gli utenti sui dispositivi e sgli indirizzi IP. + Questi profili utilizzano molte tecniche diverse per l'identificazione degli utenti, tra cui JavaScript, cookie, ID traccianti, + e impronta digitale dei browser. + Siccome la maggior parte dei siti web carica gli annunci da una delle principali agenzie o inserisce le icone dei social media e i relativi javascript, + costruiscono profili per quasi tutti gli utenti e possono tracciare la loro attività su internet anche se relativa a altri siti.

+ +

Viene tracciato ogni sito visitato, ogni acquisto effettuato, ogni carta di credito utilizzata, ogni indirizzo di spedizione, i metadati GPS di ogni immagine che viene caricata su internet. + Viene costruito il profilo per età, sesso, stato civile, indirizzo, appartenenza politica, religione, situazione familiare, animali domestici, e tutto ciò su cui possono mettere le mani. + Le corporations acquistano anche i database delle transazioni con carta di credito effettuate nei negozi, per poter tracciare anche le abitudini di acquisto off-line degli utenti nei loro profili. + Poichè hanno già informazioni molto più accurate sull'utente rispetto a quelle fornite dall'indirizzo IP, i proxy non forniscono alcuna vera protezione della privacy contro le mega corporations.

+ +

La miglior protezione per la privacy contro le mega corporations è quella di navigare con JavaScript disabilitato, seguita dal bloccare gli annunci pubblicitari, + disabilitare i cookie e il DOM storage, e utilizzare un browser di cui è difficile avere l'impronta digitale.

+ + +

L'utilizzo di Proxy

+ +

Nonostante i loro limiti, i proxy possono essere utili in alcune circostanze. + Tor e I2P + hanno app per Android che facilitano l'utilizzo delle loro reti proxy. + Quando si abilita il proxy in Privacy Browser la barra dell'app bar avrà una colorazione dello sfondo azzurra, rispetto a quella grigia di default. + Dal momento che il traffico è instradato attraverso diversi nodi proxy, l'utilizzo di un proxy a strati è spesso molto più lento di una connessione diretta a internet.

+ + + + \ No newline at end of file diff --git a/app/src/main/assets/it/guide_proxies_dark.html b/app/src/main/assets/it/guide_proxies_dark.html deleted file mode 100644 index 6a475bc5..00000000 --- a/app/src/main/assets/it/guide_proxies_dark.html +++ /dev/null @@ -1,82 +0,0 @@ - - - - - - - - - - -

I Proxy e i loro limiti

- -

Esistono due categorie generali di cattivi soggetti che vogliono violare la privacy del web: - governi maliziosi con accesso agli ISP (Internet Service Providers) e mega corporations che gestiscono social network e agenzie pubblicitarie. - Proxy come TOR (The Onion Router) e I2P (Invisible Internet Project) sono utili per la protezione della privacy da governi maliziosi (che spiano il traffico in transito) - ma non dalle mega corporations (che inseriscono codice malizioso sui web server).

- - -

Governi Maliziosi

- -

I governi malizionsi spesso spiano i loro cittadini per punire il dissenso o le attività di difesa dei diritti umani. - Solitamente, o gestiscono loro stessi gli ISP locali oppure li obbligano a rivelare informazioni mostrando tutti gli indirizzi IP visitati da ciascun utente. - I proxy a strati sono progettati per sconfiggere questa violazione di privacy crittografando il traffico dal dispositivo dell'utente e instradandolo attraverso server multipli su internet - prima di inviarlo alla destinazione finale. - Questo significa che nessun ISP individuale, server, o sito web, - può conoscere sia l'indirizzo IP del dispositivo dell'utente che l'indirizzo IP del web server finale. - I governi maliziosi e gli ISP che controllano, non possono conoscere i web server ai quali l'utente sta accedendo, sebbene sappiano che l'utente sta utilizzando un servizio di proxy a strati. - In alcune parti del mondo l'utilizzo di proxy può essere consideraro come evidenza di un comportamento illegale (“Se non hai nulla da nascondere non crittograferesti il tuo traffico”) - e gli utenti potrebbero essere perseguiti perchè il loro governo potrebbe assumere che stiano facendo qualcosa di proibito. - Per questo motivo i proxy possono essere utili ma non sono la soluzione di tutti i mali.

- - -

Mega corporations

- -

Quando un utente si connette a un web server, il server può vedere l'indirizzo IP dell'utente. - Nonostante non sia una scienza esatta, è possibile convertire l'IP in indirizzi fisici con discreta accuratezza. - I piccoli web servers solitamente si basano sull'indirizzo IP per identificare la posizione degli utenti che accedono al loro sito. - I Proxy sono una buona soluzione per mascherare la posizione dell'utente a questi server. - Le mega corporations proprietarie di social media e agenzie pubblicitarie utilizzano però un intero profilo di informazioni con lo scopo di tracciare gli utenti sui dispositivi e sgli indirizzi IP. - Questi profili utilizzano molte tecniche diverse per l'identificazione degli utenti, tra cui JavaScript, cookie, ID traccianti, - e impronta digitale dei browser. - Siccome la maggior parte dei siti web carica gli annunci da una delle principali agenzie o inserisce le icone dei social media e i relativi javascript, - costruiscono profili per quasi tutti gli utenti e possono tracciare la loro attività su internet anche se relativa a altri siti.

- -

Viene tracciato ogni sito visitato, ogni acquisto effettuato, ogni carta di credito utilizzata, ogni indirizzo di spedizione, i metadati GPS di ogni immagine che viene caricata su internet. - Viene costruito il profilo per età, sesso, stato civile, indirizzo, appartenenza politica, religione, situazione familiare, animali domestici, e tutto ciò su cui possono mettere le mani. - Le corporations acquistano anche i database delle transazioni con carta di credito effettuate nei negozi, per poter tracciare anche le abitudini di acquisto off-line degli utenti nei loro profili. - Poichè hanno già informazioni molto più accurate sull'utente rispetto a quelle fornite dall'indirizzo IP, i proxy non forniscono alcuna vera protezione della privacy contro le mega corporations.

- -

La miglior protezione per la privacy contro le mega corporations è quella di navigare con JavaScript disabilitato, seguita dal bloccare gli annunci pubblicitari, - disabilitare i cookie e il DOM storage, e utilizzare un browser di cui è difficile avere l'impronta digitale.

- - -

L'utilizzo di Proxy

- -

Nonostante i loro limiti, i proxy possono essere utili in alcune circostanze. - Tor e I2P - hanno app per Android che facilitano l'utilizzo delle loro reti proxy. - Quando si abilita il proxy in Privacy Browser la barra dell'app bar avrà una colorazione dello sfondo azzurra, rispetto a quella grigia di default. - Dal momento che il traffico è instradato attraverso diversi nodi proxy, l'utilizzo di un proxy a strati è spesso molto più lento di una connessione diretta a internet.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_proxies_light.html b/app/src/main/assets/it/guide_proxies_light.html deleted file mode 100644 index dbf3cfa6..00000000 --- a/app/src/main/assets/it/guide_proxies_light.html +++ /dev/null @@ -1,82 +0,0 @@ - - - - - - - - - - -

I Proxy e i loro limiti

- -

Esistono due categorie generali di cattivi soggetti che vogliono violare la privacy del web: - governi maliziosi con accesso agli ISP (Internet Service Providers) e mega corporations che gestiscono social network e agenzie pubblicitarie. - Proxy come TOR (The Onion Router) e I2P (Invisible Internet Project) sono utili per la protezione della privacy da governi maliziosi (che spiano il traffico in transito) - ma non dalle mega corporations (che inseriscono codice malizioso sui web server).

- - -

Governi Maliziosi

- -

I governi malizionsi spesso spiano i loro cittadini per punire il dissenso o le attività di difesa dei diritti umani. - Solitamente, o gestiscono loro stessi gli ISP locali oppure li obbligano a rivelare informazioni mostrando tutti gli indirizzi IP visitati da ciascun utente. - I proxy a strati sono progettati per sconfiggere questa violazione di privacy crittografando il traffico dal dispositivo dell'utente e instradandolo attraverso server multipli su internet - prima di inviarlo alla destinazione finale. - Questo significa che nessun ISP individuale, server, o sito web, - può conoscere sia l'indirizzo IP del dispositivo dell'utente che l'indirizzo IP del web server finale. - I governi maliziosi e gli ISP che controllano, non possono conoscere i web server ai quali l'utente sta accedendo, sebbene sappiano che l'utente sta utilizzando un servizio di proxy a strati. - In alcune parti del mondo l'utilizzo di proxy può essere consideraro come evidenza di un comportamento illegale (“Se non hai nulla da nascondere non crittograferesti il tuo traffico”) - e gli utenti potrebbero essere perseguiti perchè il loro governo potrebbe assumere che stiano facendo qualcosa di proibito. - Per questo motivo i proxy possono essere utili ma non sono la soluzione di tutti i mali.

- - -

Mega corporations

- -

Quando un utente si connette a un web server, il server può vedere l'indirizzo IP dell'utente. - Nonostante non sia una scienza esatta, è possibile convertire l'IP in indirizzi fisici con discreta accuratezza. - I piccoli web servers solitamente si basano sull'indirizzo IP per identificare la posizione degli utenti che accedono al loro sito. - I Proxy sono una buona soluzione per mascherare la posizione dell'utente a questi server. - Le mega corporations proprietarie di social media e agenzie pubblicitarie utilizzano però un intero profilo di informazioni con lo scopo di tracciare gli utenti sui dispositivi e sgli indirizzi IP. - Questi profili utilizzano molte tecniche diverse per l'identificazione degli utenti, tra cui JavaScript, cookie, ID traccianti, - e impronta digitale dei browser. - Siccome la maggior parte dei siti web carica gli annunci da una delle principali agenzie o inserisce le icone dei social media e i relativi javascript, - costruiscono profili per quasi tutti gli utenti e possono tracciare la loro attività su internet anche se relativa a altri siti.

- -

Viene tracciato ogni sito visitato, ogni acquisto effettuato, ogni carta di credito utilizzata, ogni indirizzo di spedizione, i metadati GPS di ogni immagine che viene caricata su internet. - Viene costruito il profilo per età, sesso, stato civile, indirizzo, appartenenza politica, religione, situazione familiare, animali domestici, e tutto ciò su cui possono mettere le mani. - Le corporations acquistano anche i database delle transazioni con carta di credito effettuate nei negozi, per poter tracciare anche le abitudini di acquisto off-line degli utenti nei loro profili. - Poichè hanno già informazioni molto più accurate sull'utente rispetto a quelle fornite dall'indirizzo IP, i proxy non forniscono alcuna vera protezione della privacy contro le mega corporations.

- -

La miglior protezione per la privacy contro le mega corporations è quella di navigare con JavaScript disabilitato, seguita dal bloccare gli annunci pubblicitari, - disabilitare i cookie e il DOM storage, e utilizzare un browser di cui è difficile avere l'impronta digitale.

- - -

L'utilizzo di Proxy

- -

Nonostante i loro limiti, i proxy possono essere utili in alcune circostanze. - Tor e I2P - hanno app per Android che facilitano l'utilizzo delle loro reti proxy. - Quando si abilita il proxy in Privacy Browser la barra dell'app bar avrà una colorazione dello sfondo azzurra, rispetto a quella grigia di default. - Dal momento che il traffico è instradato attraverso diversi nodi proxy, l'utilizzo di un proxy a strati è spesso molto più lento di una connessione diretta a internet.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_requests.html b/app/src/main/assets/it/guide_requests.html new file mode 100644 index 00000000..a4cc9978 --- /dev/null +++ b/app/src/main/assets/it/guide_requests.html @@ -0,0 +1,88 @@ + + + + + + + + + + + + + +

Richieste di Risorse

+ +

Quando viene caricata un URL, generalmente effettua un certo numero di richieste di risorse per CCS, JavaScript, immagini, e altri files. + I dettagli relativi a queste richieste possono essere visualizzati nella scheda delle Richieste. + Il menù a cassetto ha un collegamento alla scheda delle richieste e mostra quante sono state bloccate. + Se si tocca una delle richieste in elenco vengono mostrati i dettagli sui motivi per cui è stata permessa o bloccata.

+ + + +

Privacy Browser include quattro liste di blocco comuni basate sulla Sintassi di Adblock: + EasyList, EasyPrivacy, Fanboy’s Annoyance List, e Fanboy’s Social Blocking List. + Queste blocklist sono processate da Privacy Browser nelle seguenti 22 liste secondarie, che verificano le richieste di risorse nell'ordine elencato.

+ +
    +
  1. Whitelist principale
  2. +
  3. Whitelist finale
  4. +
  5. Whitelist per i domini
  6. +
  7. Whitelist iniziale
  8. +
  9. Whitelist finale
  10. +
  11. Whitelist di terze parti
  12. +
  13. Whitelist di terze parti per i domini
  14. +
  15. Whitelist di terze parti iniziale per i domini
  16. +
  17. Blacklist principale
  18. +
  19. Blacklist iniziale
  20. +
  21. Blacklist finale
  22. +
  23. Blacklist per i domini
  24. +
  25. Blacklist iniziale
  26. +
  27. Blacklist finale
  28. +
  29. Blacklist per le espressioni regolari
  30. +
  31. Blacklist di terze parti
  32. +
  33. Blacklist di terze parti iniziale
  34. +
  35. Blacklist di terze parti per i domini
  36. +
  37. Blacklist di terze parti iniziale per i domini
  38. +
  39. Blacklist di terze parti per le espressioni regolari
  40. +
  41. Blacklist di terze parti per le espressioni regolari per i domini
  42. +
  43. Blacklist per le espressioni regolari
  44. +
+ +

Le liste iniziali servono per la verifica della parte iniziale delle URL. Le liste iniziali servono per la verifica della parte finale delle URL. + Le liste dei domini servono per la verifica di certi domini. Le liste di terze parti si applicano solo se il dominio di root della richiesta è diverso dal dominio di root della URL principale. + Le liste per le espressioni regolari seguono la sintassi delle espressioni regolari. + Ogni oggetto delle liste secondarie ha uno o più elementi. + Nel caso delle liste secondarie dei domini, la richiesta di risorse è verificata solo se il primo elemento combacia con il dominio della URL principale.

+ +

A causa delle limitazioni della WebView di Android, e per velocizzare il processo delle richiesta, Privacy Browser implementa una versione semplificata della sintassi di Adblock. + Questo approccio potrebbe a volte portare ad avere falsi positivi, nel caso in cui le risorse siano bloccate o permesse in modi che non erano previsti dall'elemento originale. + Una descrizione più dettagliata su come sono processati gli elementi delle liste di blocco è disponibile su stoutner.com.

+ +

Privacy Browser ha tre liste di blocco aggiuntive. + UltraList e UltraPrivacy + bloccano gli annunci e i sistemi di tracciamento che EasyList e EasyPrivacy non bloccano. La terza blocca tutte le richieste di terze parti. + Una richiesta è considerata di terze parti solo se il dominio di base della richiesta è diverso dal dominio di base della URL. + Ad esempio se www.website.com carica un'immagine da images.website.com, + questa non è bloccata come richiesta di terze parti, perchè il dominio di base è lo stesso: website.com. + Il blocco di tutte le richieste di terze parti aumenta la privacy, ma questa lista di blocco è disabilitata di default perchè impedisce la corretta visualizzazione di un gran numero di siti web.

+ + \ No newline at end of file diff --git a/app/src/main/assets/it/guide_requests_dark.html b/app/src/main/assets/it/guide_requests_dark.html deleted file mode 100644 index 84b6338b..00000000 --- a/app/src/main/assets/it/guide_requests_dark.html +++ /dev/null @@ -1,85 +0,0 @@ - - - - - - - - - - -

Richieste di Risorse

- -

Quando viene caricata un URL, generalmente effettua un certo numero di richieste di risorse per CCS, JavaScript, immagini, e altri files. - I dettagli relativi a queste richieste possono essere visualizzati nella scheda delle Richieste. - Il menù a cassetto ha un collegamento alla scheda delle richieste e mostra quante sono state bloccate. - Se si tocca una delle richieste in elenco vengono mostrati i dettagli sui motivi per cui è stata permessa o bloccata.

- -

- -

Privacy Browser include quattro liste di blocco comuni basate sulla Sintassi di Adblock: - EasyList, EasyPrivacy, Fanboy’s Annoyance List, e Fanboy’s Social Blocking List. - Queste blocklist sono processate da Privacy Browser nelle seguenti 22 liste secondarie, che verificano le richieste di risorse nell'ordine elencato.

- -
    -
  1. Whitelist principale
  2. -
  3. Whitelist finale
  4. -
  5. Whitelist per i domini
  6. -
  7. Whitelist iniziale
  8. -
  9. Whitelist finale
  10. -
  11. Whitelist di terze parti
  12. -
  13. Whitelist di terze parti per i domini
  14. -
  15. Whitelist di terze parti iniziale per i domini
  16. -
  17. Blacklist principale
  18. -
  19. Blacklist iniziale
  20. -
  21. Blacklist finale
  22. -
  23. Blacklist per i domini
  24. -
  25. Blacklist iniziale
  26. -
  27. Blacklist finale
  28. -
  29. Blacklist per le espressioni regolari
  30. -
  31. Blacklist di terze parti
  32. -
  33. Blacklist di terze parti iniziale
  34. -
  35. Blacklist di terze parti per i domini
  36. -
  37. Blacklist di terze parti iniziale per i domini
  38. -
  39. Blacklist di terze parti per le espressioni regolari
  40. -
  41. Blacklist di terze parti per le espressioni regolari per i domini
  42. -
  43. Blacklist per le espressioni regolari
  44. -
- -

Le liste iniziali servono per la verifica della parte iniziale delle URL. Le liste iniziali servono per la verifica della parte finale delle URL. - Le liste dei domini servono per la verifica di certi domini. Le liste di terze parti si applicano solo se il dominio di root della richiesta è diverso dal dominio di root della URL principale. - Le liste per le espressioni regolari seguono la sintassi delle espressioni regolari. - Ogni oggetto delle liste secondarie ha uno o più elementi. - Nel caso delle liste secondarie dei domini, la richiesta di risorse è verificata solo se il primo elemento combacia con il dominio della URL principale.

- -

A causa delle limitazioni della WebView di Android, e per velocizzare il processo delle richiesta, Privacy Browser implementa una versione semplificata della sintassi di Adblock. - Questo approccio potrebbe a volte portare ad avere falsi positivi, nel caso in cui le risorse siano bloccate o permesse in modi che non erano previsti dall'elemento originale. - Una descrizione più dettagliata su come sono processati gli elementi delle liste di blocco è disponibile su stoutner.com.

- -

Privacy Browser ha tre liste di blocco aggiuntive. - UltraList e UltraPrivacy - bloccano gli annunci e i sistemi di tracciamento che EasyList e EasyPrivacy non bloccano. La terza blocca tutte le richieste di terze parti. - Una richiesta è considerata di terze parti solo se il dominio di base della richiesta è diverso dal dominio di base della URL. - Ad esempio se www.website.com carica un'immagine da images.website.com, - questa non è bloccata come richiesta di terze parti, perchè il dominio di base è lo stesso: website.com. - Il blocco di tutte le richieste di terze parti aumenta la privacy, ma questa lista di blocco è disabilitata di default perchè impedisce la corretta visualizzazione di un gran numero di siti web.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_requests_light.html b/app/src/main/assets/it/guide_requests_light.html deleted file mode 100644 index b0f63c40..00000000 --- a/app/src/main/assets/it/guide_requests_light.html +++ /dev/null @@ -1,85 +0,0 @@ - - - - - - - - - - -

Richieste di Risorse

- -

Quando viene caricata un URL, generalmente effettua un certo numero di richieste di risorse per CCS, JavaScript, immagini, e altri files. - I dettagli relativi a queste richieste possono essere visualizzati nella scheda delle Richieste. - Il menù a cassetto ha un collegamento alla scheda delle richieste e mostra quante sono state bloccate. - Se si tocca una delle richieste in elenco vengono mostrati i dettagli sui motivi per cui è stata permessa o bloccata.

- -

- -

Privacy Browser include quattro liste di blocco comuni basate sulla Sintassi di Adblock: - EasyList, EasyPrivacy, Fanboy’s Annoyance List, e Fanboy’s Social Blocking List. - Queste blocklist sono processate da Privacy Browser nelle seguenti 22 liste secondarie, che verificano le richieste di risorse nell'ordine elencato.

- -
    -
  1. Whitelist principale
  2. -
  3. Whitelist finale
  4. -
  5. Whitelist per i domini
  6. -
  7. Whitelist iniziale
  8. -
  9. Whitelist finale
  10. -
  11. Whitelist di terze parti
  12. -
  13. Whitelist di terze parti per i domini
  14. -
  15. Whitelist di terze parti iniziale per i domini
  16. -
  17. Blacklist principale
  18. -
  19. Blacklist iniziale
  20. -
  21. Blacklist finale
  22. -
  23. Blacklist per i domini
  24. -
  25. Blacklist iniziale
  26. -
  27. Blacklist finale
  28. -
  29. Blacklist per le espressioni regolari
  30. -
  31. Blacklist di terze parti
  32. -
  33. Blacklist di terze parti iniziale
  34. -
  35. Blacklist di terze parti per i domini
  36. -
  37. Blacklist di terze parti iniziale per i domini
  38. -
  39. Blacklist di terze parti per le espressioni regolari
  40. -
  41. Blacklist di terze parti per le espressioni regolari per i domini
  42. -
  43. Blacklist per le espressioni regolari
  44. -
- -

Le liste iniziali servono per la verifica della parte iniziale delle URL. Le liste iniziali servono per la verifica della parte finale delle URL. - Le liste dei domini servono per la verifica di certi domini. Le liste di terze parti si applicano solo se il dominio di root della richiesta è diverso dal dominio di root della URL principale. - Le liste per le espressioni regolari seguono la sintassi delle espressioni regolari. - Ogni oggetto delle liste secondarie ha uno o più elementi. - Nel caso delle liste secondarie dei domini, la richiesta di risorse è verificata solo se il primo elemento combacia con il dominio della URL principale.

- -

A causa delle limitazioni della WebView di Android, e per velocizzare il processo delle richiesta, Privacy Browser implementa una versione semplificata della sintassi di Adblock. - Questo approccio potrebbe a volte portare ad avere falsi positivi, nel caso in cui le risorse siano bloccate o permesse in modi che non erano previsti dall'elemento originale. - Una descrizione più dettagliata su come sono processati gli elementi delle liste di blocco è disponibile su stoutner.com.

- -

Privacy Browser ha tre liste di blocco aggiuntive. - UltraList e UltraPrivacy - bloccano gli annunci e i sistemi di tracciamento che EasyList e EasyPrivacy non bloccano. La terza blocca tutte le richieste di terze parti. - Una richiesta è considerata di terze parti solo se il dominio di base della richiesta è diverso dal dominio di base della URL. - Ad esempio se www.website.com carica un'immagine da images.website.com, - questa non è bloccata come richiesta di terze parti, perchè il dominio di base è lo stesso: website.com. - Il blocco di tutte le richieste di terze parti aumenta la privacy, ma questa lista di blocco è disabilitata di default perchè impedisce la corretta visualizzazione di un gran numero di siti web.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_ssl_certificates.html b/app/src/main/assets/it/guide_ssl_certificates.html new file mode 100644 index 00000000..f3879a78 --- /dev/null +++ b/app/src/main/assets/it/guide_ssl_certificates.html @@ -0,0 +1,60 @@ + + + + + + + + + + + + + +

Connettiti in sicurezza

+ +

Quando si accede ad una URL criptata (quelle che iniziano con HTTPS), + il server web utilizza un certificato SSL con lo scopo di criptare le informazioni inviate al browser e di identificare il server stesso. + Lo scopo di questa identificazione è quello di impedire che una macchina situata tra il browser e il server web tenti di decriptare le informazioni in transito. + Questo tipo di attacco è conosciuto come attacco “Man In The Middle (MITM)”. + I certificati SSL sono generati dalle autorità di certificazione: sono aziende che verificano l'identità dei server e producono il certificato (a pagamento). + Android ha una lista di autorità di certificazione fidate, e pertanto accetterà qualsiasi loro certificato fornito dai siti web. + Non dovrebbe essere possibile che una organizzazione qualsiasi possa acquisire un certificato SSL per un dominio che non sia sotto il proprio controllo, + ma in pratica alcuni governi e grosse multinazionali sono in grado di farlo.

+ +

Lo scopo di appuntare un certificato SSL è quello di dire al browser che solo un determinato certificato SSL è fidato per un particolare dominio. + Qualsiasi altro certificato, per quanto valido, sarà rifiutato.

+ + + +

I certificati SSL scadono in corrispondenza di una data specifica, così anche i certificati che sono stati appuntati dovranno essere aggiornati regolarmente. + Come regola generale, nella maggioranza dei casi, appuntare un certificato SSL non dovrebbe essere necessario. + Per coloro che sospettano però di essere sorvegliati da qualche organizzazione, appuntare il certificato SSL può permettere di scoprire e sventare un attacco "MITM". + Privacy Browser permette anche di appuntare gli indirizzi IP.

+ + + +

I certificati SSL possono essere appuntati nelle impostazioni dei domini. + Oltre a proteggere dagli attacchi “MITM”, + appuntare un certificato auto-firmato per un dispositivo come un router wireless o un access point eliminerà il messaggio di errore che si presenta ogni volta che viene caricato un sito web. + Il tocco della scheda attiva mostra il certificato SSL attuale del sito.

+ + \ No newline at end of file diff --git a/app/src/main/assets/it/guide_ssl_certificates_dark.html b/app/src/main/assets/it/guide_ssl_certificates_dark.html deleted file mode 100644 index c668f1ce..00000000 --- a/app/src/main/assets/it/guide_ssl_certificates_dark.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - - - - - - - -

Connettiti in sicurezza

- -

Quando si accede ad una URL criptata (quelle che iniziano con HTTPS), - il server web utilizza un certificato SSL con lo scopo di criptare le informazioni inviate al browser e di identificare il server stesso. - Lo scopo di questa identificazione è quello di impedire che una macchina situata tra il browser e il server web tenti di decriptare le informazioni in transito. - Questo tipo di attacco è conosciuto come attacco “Man In The Middle (MITM)”. - I certificati SSL sono generati dalle autorità di certificazione: sono aziende che verificano l'identità dei server e producono il certificato (a pagamento). - Android ha una lista di autorità di certificazione fidate, e pertanto accetterà qualsiasi loro certificato fornito dai siti web. - Non dovrebbe essere possibile che una organizzazione qualsiasi possa acquisire un certificato SSL per un dominio che non sia sotto il proprio controllo, - ma in pratica alcuni governi e grosse multinazionali sono in grado di farlo.

- -

Lo scopo di appuntare un certificato SSL è quello di dire al browser che solo un determinato certificato SSL è fidato per un particolare dominio. - Qualsiasi altro certificato, per quanto valido, sarà rifiutato.

- -

- -

I certificati SSL scadono in corrispondenza di una data specifica, così anche i certificati che sono stati appuntati dovranno essere aggiornati regolarmente. - Come regola generale, nella maggioranza dei casi, appuntare un certificato SSL non dovrebbe essere necessario. - Per coloro che sospettano però di essere sorvegliati da qualche organizzazione, appuntare il certificato SSL può permettere di scoprire e sventare un attacco "MITM". - Privacy Browser permette anche di appuntare gli indirizzi IP.

- -

- -

I certificati SSL possono essere appuntati nelle impostazioni dei domini. - Oltre a proteggere dagli attacchi “MITM”, - appuntare un certificato auto-firmato per un dispositivo come un router wireless o un access point eliminerà il messaggio di errore che si presenta ogni volta che viene caricato un sito web. - Il tocco della scheda attiva mostra il certificato SSL attuale del sito.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_ssl_certificates_light.html b/app/src/main/assets/it/guide_ssl_certificates_light.html deleted file mode 100644 index ce2cbaf4..00000000 --- a/app/src/main/assets/it/guide_ssl_certificates_light.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - - - - - - - -

Connettiti in sicurezza

- -

Quando si accede ad una URL criptata (quelle che iniziano con HTTPS), - il server web utilizza un certificato SSL con lo scopo di criptare le informazioni inviate al browser e di identificare il server stesso. - Lo scopo di questa identificazione è quello di impedire che una macchina situata tra il browser e il server web tenti di decriptare le informazioni in transito. - Questo tipo di attacco è conosciuto come attacco “Man In The Middle (MITM)”. - I certificati SSL sono generati dalle autorità di certificazione: sono aziende che verificano l'identità dei server e producono il certificato (a pagamento). - Android ha una lista di autorità di certificazione fidate, e pertanto accetterà qualsiasi loro certificato fornito dai siti web. - Non dovrebbe essere possibile che una organizzazione qualsiasi possa acquisire un certificato SSL per un dominio che non sia sotto il proprio controllo, - ma in pratica alcuni governi e grosse multinazionali sono in grado di farlo.

- -

Lo scopo di appuntare un certificato SSL è quello di dire al browser che solo un determinato certificato SSL è fidato per un particolare dominio. - Qualsiasi altro certificato, per quanto valido, sarà rifiutato.

- -

- -

I certificati SSL scadono in corrispondenza di una data specifica, così anche i certificati che sono stati appuntati dovranno essere aggiornati regolarmente. - Come regola generale, nella maggioranza dei casi, appuntare un certificato SSL non dovrebbe essere necessario. - Per coloro che sospettano però di essere sorvegliati da qualche organizzazione, appuntare il certificato SSL può permettere di scoprire e sventare un attacco "MITM". - Privacy Browser permette anche di appuntare gli indirizzi IP.

- -

- -

I certificati SSL possono essere appuntati nelle impostazioni dei domini. - Oltre a proteggere dagli attacchi “MITM”, - appuntare un certificato auto-firmato per un dispositivo come un router wireless o un access point eliminerà il messaggio di errore che si presenta ogni volta che viene caricato un sito web. - Il tocco della scheda attiva mostra il certificato SSL attuale del sito.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_tracking_ids.html b/app/src/main/assets/it/guide_tracking_ids.html new file mode 100644 index 00000000..5adbaf97 --- /dev/null +++ b/app/src/main/assets/it/guide_tracking_ids.html @@ -0,0 +1,46 @@ + + + + + + + + + + + + + +

Do Not Track

+ +

Alcuni anni fa il W3C (World Wide Web Consortium) ha creato per i browser un meccanismo per informare i web server che preferiscono non essere tracciati. + Questo è ottenuto attraverso l'inclusione nella richiesta al server di un header denominato: DNT (Do Not Track).

+ +

L'header DNT in realtà non garantisce nessuna privacy dal momento che la maggior parte dei web server lo ignora, come ad esempio Yahoo, Google, Microsoft e Facebook, + che ignorano tutti almeno alcuni degli header DNT.

+ + +

Modifica delle URL

+ +

Privacy Browser rimuove le sezioni traccianti delle URL, come ad esempio ?utm_ di Google Analytics e + ?fbclick= di Facebook. La modifica delle URL può essere disattivata nelle opzioni nel caso in cui crei problemi.

+ + \ No newline at end of file diff --git a/app/src/main/assets/it/guide_tracking_ids_dark.html b/app/src/main/assets/it/guide_tracking_ids_dark.html deleted file mode 100644 index 96319584..00000000 --- a/app/src/main/assets/it/guide_tracking_ids_dark.html +++ /dev/null @@ -1,43 +0,0 @@ - - - - - - - - - - -

Do Not Track

- -

Alcuni anni fa il W3C (World Wide Web Consortium) ha creato per i browser un meccanismo per informare i web server che preferiscono non essere tracciati. - Questo è ottenuto attraverso l'inclusione nella richiesta al server di un header denominato: DNT (Do Not Track).

- -

L'header DNT in realtà non garantisce nessuna privacy dal momento che la maggior parte dei web server lo ignora, come ad esempio Yahoo, Google, Microsoft e Facebook, - che ignorano tutti almeno alcuni degli header DNT.

- - -

Modifica delle URL

- -

Privacy Browser rimuove le sezioni traccianti delle URL, come ad esempio ?utm_ di Google Analytics e - ?fbclick= di Facebook. La modifica delle URL può essere disattivata nelle opzioni nel caso in cui crei problemi.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_tracking_ids_light.html b/app/src/main/assets/it/guide_tracking_ids_light.html deleted file mode 100644 index 9a3b6cab..00000000 --- a/app/src/main/assets/it/guide_tracking_ids_light.html +++ /dev/null @@ -1,43 +0,0 @@ - - - - - - - - - - -

Do Not Track

- -

Alcuni anni fa il W3C (World Wide Web Consortium) ha creato per i browser un meccanismo per informare i web server che preferiscono non essere tracciati. - Questo è ottenuto attraverso l'inclusione nella richiesta al server di un header denominato: DNT (Do Not Track).

- -

L'header DNT in realtà non garantisce nessuna privacy dal momento che la maggior parte dei web server lo ignora, come ad esempio Yahoo, Google, Microsoft e Facebook, - che ignorano tutti almeno alcuni degli header DNT.

- - -

Modifica delle URL

- -

Privacy Browser rimuove le sezioni traccianti delle URL, come ad esempio ?utm_ di Google Analytics e - ?fbclick= di Facebook. La modifica delle URL può essere disattivata nelle opzioni nel caso in cui crei problemi.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_user_agent.html b/app/src/main/assets/it/guide_user_agent.html new file mode 100644 index 00000000..223125d5 --- /dev/null +++ b/app/src/main/assets/it/guide_user_agent.html @@ -0,0 +1,66 @@ + + + + + + + + + + + + + +

Identificazione del Browser

+ +

Nel momento in cui un browser si connette ai siti web, invia uno user agent che identifica il browser e le sue caratteristiche di rendering. + Il web server può utilizzare tali informazioni per decidere quale versione del sito inviare al browser. + Molti siti web infatti sono disponibili in versioni diverse a seconda che vi si acceda con browser da PC (desktop) o da dispositivo mobile.

+ +

Per default Privacy Browser utilizza un proprio user agent (o identificazione), ovvero PrivacyBrowser/1.0. Questo invia un set minimo di informazioni al web server. + Dal momento che i web server non lo riconoscono come uno user agent di un dispositivo mobile, generalmente inviano la versione desktop del sito.

+ +

In confronto, lo user agent di default di WebView invia una grande quantità di informazioni sull'hardware e sul software del dispositivo. + Sulla schermata Settings, selezionando WebView Default come User agent viene mostrato lo user agent che sarà inviato al web server. + Lo screenshot sottostante mostra un Pixel 2 XL con Android 10 con installato Android System WebView 84.0.4147.125. + La maggior parte dei web server lo riconoscerà come browser mobile e invierà la versione mobile del sito, se disponibile.

+ + + +

Nello user agent sono presenti informazioni sufficienti a far sì che solo di tanto in tanto a un sito web risulteranno visitatori identici. + Se allo user agent viene aggiunto qualche altro pezzetto di informazione anche non univoca, spesso il risultato sarà quello di avere una impronta digitale unica. + La Electronic Frontier Foundation ha creato un tool dal nome Panopticlick per dimostrare quante informazioni possono essere raccolte. + Se si esegue questo test con JavaScript abilitato la quantità di informazioni è poi ancora maggiore. + Browser Leaks e Am I Unique possono fornire ulteriori interessanti informazioni al riguardo.

+ + + +

Sono disponibili diversi user agent predefiniti che identificano i browser e i sistemi operativi più comuni. + Dal punto di vista dell'impronta digitale del browser, più è rara, più è facile da tracciare. + Nel caso in cui Privacy Browser diventi di uso comune, e molti utenti utilizzino PrivacyBrowser/1.0 come user agent, sarà una buona scelta dal punto di vista della privacy. + Firefox o Chrome sono gli user agents più comuni, ma vengono aggiornati spesso e il loro numero di versione cambia così di frequente che lo user agent incluso in Privacy Browser molto facilmente + sarà rimasto indietro rispetto alla maggior parte degli user agent tracciati nei log dei server.

+ +

Alcuni siti web non funzionano correttamente se non riconoscono lo User Agent. + L'utilizzo delle impostazioni dei domini per impostare come User Agent WebView Default, oppure un altro che sia riconosciuto comunemente generalmente risolve il problema. + WebView di Android non permette che lo user agent non sia specificato. In tal caso infatti, WebView invia al server lo user agent di default.

+ + \ No newline at end of file diff --git a/app/src/main/assets/it/guide_user_agent_dark.html b/app/src/main/assets/it/guide_user_agent_dark.html deleted file mode 100644 index fe8f3d62..00000000 --- a/app/src/main/assets/it/guide_user_agent_dark.html +++ /dev/null @@ -1,63 +0,0 @@ - - - - - - - - - - -

Identificazione del Browser

- -

Nel momento in cui un browser si connette ai siti web, invia uno user agent che identifica il browser e le sue caratteristiche di rendering. - Il web server può utilizzare tali informazioni per decidere quale versione del sito inviare al browser. - Molti siti web infatti sono disponibili in versioni diverse a seconda che vi si acceda con browser da PC (desktop) o da dispositivo mobile.

- -

Per default Privacy Browser utilizza un proprio user agent (o identificazione), ovvero PrivacyBrowser/1.0. Questo invia un set minimo di informazioni al web server. - Dal momento che i web server non lo riconoscono come uno user agent di un dispositivo mobile, generalmente inviano la versione desktop del sito.

- -

In confronto, lo user agent di default di WebView invia una grande quantità di informazioni sull'hardware e sul software del dispositivo. - Sulla schermata Settings, selezionando WebView Default come User agent viene mostrato lo user agent che sarà inviato al web server. - Lo screenshot sottostante mostra un Pixel 2 XL con Android 10 con installato Android System WebView 84.0.4147.125. - La maggior parte dei web server lo riconoscerà come browser mobile e invierà la versione mobile del sito, se disponibile.

- - - -

Nello user agent sono presenti informazioni sufficienti a far sì che solo di tanto in tanto a un sito web risulteranno visitatori identici. - Se allo user agent viene aggiunto qualche altro pezzetto di informazione anche non univoca, spesso il risultato sarà quello di avere una impronta digitale unica. - La Electronic Frontier Foundation ha creato un tool dal nome Panopticlick per dimostrare quante informazioni possono essere raccolte. - Se si esegue questo test con JavaScript abilitato la quantità di informazioni è poi ancora maggiore. - Browser Leaks e Am I Unique possono fornire ulteriori interessanti informazioni al riguardo.

- - - -

Sono disponibili diversi user agent predefiniti che identificano i browser e i sistemi operativi più comuni. - Dal punto di vista dell'impronta digitale del browser, più è rara, più è facile da tracciare. - Nel caso in cui Privacy Browser diventi di uso comune, e molti utenti utilizzino PrivacyBrowser/1.0 come user agent, sarà una buona scelta dal punto di vista della privacy. - Firefox o Chrome sono gli user agents più comuni, ma vengono aggiornati spesso e il loro numero di versione cambia così di frequente che lo user agent incluso in Privacy Browser molto facilmente - sarà rimasto indietro rispetto alla maggior parte degli user agent tracciati nei log dei server.

- -

Alcuni siti web non funzionano correttamente se non riconoscono lo User Agent. - L'utilizzo delle impostazioni dei domini per impostare come User Agent WebView Default, oppure un altro che sia riconosciuto comunemente generalmente risolve il problema. - WebView di Android non permette che lo user agent non sia specificato. In tal caso infatti, WebView invia al server lo user agent di default.

- - \ No newline at end of file diff --git a/app/src/main/assets/it/guide_user_agent_light.html b/app/src/main/assets/it/guide_user_agent_light.html deleted file mode 100644 index 27497380..00000000 --- a/app/src/main/assets/it/guide_user_agent_light.html +++ /dev/null @@ -1,63 +0,0 @@ - - - - - - - - - - -

Identificazione del Browser

- -

Nel momento in cui un browser si connette ai siti web, invia uno user agent che identifica il browser e le sue caratteristiche di rendering. - Il web server può utilizzare tali informazioni per decidere quale versione del sito inviare al browser. - Molti siti web infatti sono disponibili in versioni diverse a seconda che vi si acceda con browser da PC (desktop) o da dispositivo mobile.

- -

Per default Privacy Browser utilizza un proprio user agent (o identificazione), ovvero PrivacyBrowser/1.0. Questo invia un set minimo di informazioni al web server. - Dal momento che i web server non lo riconoscono come uno user agent di un dispositivo mobile, generalmente inviano la versione desktop del sito.

- -

In confronto, lo user agent di default di WebView invia una grande quantità di informazioni sull'hardware e sul software del dispositivo. - Sulla schermata Settings, selezionando WebView Default come User agent viene mostrato lo user agent che sarà inviato al web server. - Lo screenshot sottostante mostra un Pixel 2 XL con Android 10 con installato Android System WebView 84.0.4147.125. - La maggior parte dei web server lo riconoscerà come browser mobile e invierà la versione mobile del sito, se disponibile.

- - - -

Nello user agent sono presenti informazioni sufficienti a far sì che solo di tanto in tanto a un sito web risulteranno visitatori identici. - Se allo user agent viene aggiunto qualche altro pezzetto di informazione anche non univoca, spesso il risultato sarà quello di avere una impronta digitale unica. - La Electronic Frontier Foundation ha creato un tool dal nome Panopticlick per dimostrare quante informazioni possono essere raccolte. - Se si esegue questo test con JavaScript abilitato la quantità di informazioni è poi ancora maggiore. - Browser Leaks e Am I Unique possono fornire ulteriori interessanti informazioni al riguardo.

- - - -

Sono disponibili diversi user agent predefiniti che identificano i browser e i sistemi operativi più comuni. - Dal punto di vista dell'impronta digitale del browser, più è rara, più è facile da tracciare. - Nel caso in cui Privacy Browser diventi di uso comune, e molti utenti utilizzino PrivacyBrowser/1.0 come user agent, sarà una buona scelta dal punto di vista della privacy. - Firefox o Chrome sono gli user agents più comuni, ma vengono aggiornati spesso e il loro numero di versione cambia così di frequente che lo user agent incluso in Privacy Browser molto facilmente - sarà rimasto indietro rispetto alla maggior parte degli user agent tracciati nei log dei server.

- -

Alcuni siti web non funzionano correttamente se non riconoscono lo User Agent. - L'utilizzo delle impostazioni dei domini per impostare come User Agent WebView Default, oppure un altro che sia riconosciuto comunemente generalmente risolve il problema. - WebView di Android non permette che lo user agent non sia specificato. In tal caso infatti, WebView invia al server lo user agent di default.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/about_changelog.html b/app/src/main/assets/ru/about_changelog.html new file mode 100644 index 00000000..c4918905 --- /dev/null +++ b/app/src/main/assets/ru/about_changelog.html @@ -0,0 +1,687 @@ + + + + + + + + + + + + + +

3.5.1 (код версии 51)

+

28 августа 2020 года - минимальный API 19, целевой API 29

+
    +
  • Исправлена ошибка, из-за которой новые запросы (ссылки из других приложений) не загружалис, + если Privacy Browser был остановлен операционной системой в фоновом режиме.
  • +
  • Исправлена ошибка, из-за которой приложение инициализировалось неправильно, + если тема приложения была установлена в противоположность теме ОС.
  • +
+ +

3.5 (код версии 50)

+

18 августа 2020 года - минимальный API 19, целевой API 29

+ + +

3.4.1 (код версии 49)

+

1 апреля 2020 года - минимальный API 19, целевой API 29

+ + +

3.4 (код версии 48)

+

28 марта 2020 года - минимальный API 19, целевой API 29

+ + +

3.3 (код версии 47)

+

3 января 2020 года - минимальный API 19, целевой API 29

+ + +

3.2 (код версии 46)

+

20 июля 2019 года - минимальный API 19, целевой API 28

+ + +

3.1 (код версии 45)

+

27 мая 2019 года - минимальный API 19, целевой API 28

+ + +

3.0.1 (код версии 44)

+

2 мая 2019 года - минимальный API 19, целевой API 28

+ + +

3.0 (код версии 43)

+

26 апреля 2019 года - минимальный API 19, целевой API 28

+
    +
  • Теперь сайты можно открывать в нескольких вкладках.
  • +
  • Исправлена ошибка, приводившая к обрезанию нижней части WebView при отключенной прокрутке панели приложения.
  • +
  • Исправлена ​​ошибка, приводившая к перезапуску Privacy Browser при подключении/отключении Bluetooth-клавиатуры.
  • +
  • Обновлен перевод на русский язык.
  • +
  • Обновлен перевод на немецкий язык, выполненный Бернхардом Г. Келлером (Bernhard G. Keller).
  • +
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • +
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • +
  • Добавлен частичный перевод на турецкий язык.
  • +
+ +

2.17.1 (код версии 42)

+

5 марта 2019 года - минимальный API 19, целевой API 28

+ + +

2.17 (код версии 41)

+

27 февраля 2019 года - минимальный API 19, целевой API 28

+ + +

2.16 (код версии 40)

+

31 января 2019 года - минимальный API 19, целевой API 28

+ + +

2.15.1 (код версии 39)

+

27 декабря 2018 года - минимальный API 19, целевой API 28

+ + +

2.15 (код версии 38)

+

24 декабря 2018 года - минимальный API 19, целевой API 28

+ + +

2.14 (код версии 37)

+

8 декабря 2018 года - минимальный API 19, целевой API 28

+ + +

2.13 (код версии 36)

+

29 октября 2018 года - минимальный API 19, целевой API 28

+ + +

2.12 (код версии 35)

+

31 июля 2018 года - минимальный API 19, целевой API 27

+
    +
  • Домашняя страница и поисковая система по умолчанию изменены на Searx.me.
  • +
  • В списки блокировок добавлен UltraPrivacy.
  • +
  • Добавлена опция блокировки всех сторонних ресурсов.
  • +
  • В опции меню добавлено управление списками блокировок.
  • +
  • В руководство добавлен раздел описывающий активность запросов.
  • +
  • Исправлена ошибка вызывающая сообщение “Ожидание Orbot”.
  • +
  • Исправлено две ошибки при обработке списка блокировок.
  • +
  • Исправлено две проблемы связанные с полноэкранным отображением.
  • +
  • Обновлен перевод на русский язык.
  • +
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • +
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • +
+ +

2.11 (код версии 34)

+

10 июля 2018 года - минимальный API 19, целевой API 27

+ + +

2.10 (код версии 33)

+

24 мая 2018 года - минимальный API 19, целевой API 27

+ + +

2.9 (код версии 32)

+

9 мая 2018 года - минимальный API 19, целевой API 27

+ + +

2.8.1 (код версии 31)

+

1 марта 2018 года - минимальный API 19, целевой API 27

+ + +

2.8 (код версии 30)

+

22 февраля 2018 года - минимальный API 19, целевой API 27

+ + +

2.7.2 (код версии 29)

+

22 November 2017 года - минимальный API 19, целевой API 26

+
    +
  • Add an options menu item to create/edit domain settings for the current domain.
  • +
  • Open telephone number hyperlinks in the dialer.
  • +
  • Fix a build error that prevented the release of 2.7 and 2.7.1 on F-Droid.
  • +
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • +
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • +
+ +

2.7.1 (код версии 28)

+

9 November 2017 года - минимальный API 19, целевой API 26

+ + +

2.7 (код версии 27)

+

7 November 2017 года - минимальный API 19, целевой API 26

+
    +
  • Add a bookmarks drawer that is accessed by sliding from the right.
  • +
  • Prevent Night Mode from flashing a white background when loading new pages.
  • +
  • Update the user agents.
  • +
  • Bump target API to 26 (Android Oreo, 8.0.0).
  • +
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • +
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • +
+ +

2.6 (код версии 26)

+

18 September 2017 года - минимальный API 19, целевой API 25

+
    +
  • Add night mode rendering.
  • +
  • Update the dark theme rendering of the About and Guide sections.
  • +
  • Add support for HTTP authentication.
  • +
  • Color code the Common Name in the view SSL certificate dialog.
  • +
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • +
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • +
+ +

2.5 (код версии 25)

+

26 августа 2017 года - минимальный API 19, целевой API 25

+ + +

2.4 (код версии 24)

+

23 June 2017 года - минимальный API 19, целевой API 25

+ + +

2.3 (код версии 23)

+

26 мая 2017 года - минимальный API 19, целевой API 25

+
    +
  • Don’t include URL redirects in the WebView history.
  • +
  • Add the option to disable loading of images to conserve bandwidth.
  • +
  • Fix the layout of some web pages by using a wide viewport.
  • +
  • Allow loading of host only URLs.
  • +
  • Add icons to the settings screen.
  • +
  • Add the title to the URL when sharing through the options menu.
  • +
  • Disable the third-party cookies setting on KitKat because it only works on Lollipop or newer.
  • +
  • Move Refresh to the bottom of the options menu.
  • +
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • +
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • +
+ +

2.2 (код версии 22)

+

27 апреля 2017 года - минимальный API 19, целевой API 25

+ + +

2.1 (код версии 21)

+

25 марта 2017 года - минимальный API 19, целевой API 25

+ + +

2.0.1 (код версии 20)

+

21 марта 2017 года - минимальный API 19, целевой API 25

+ + +

2.0 (код версии 19)

+

16 марта 2017 года - минимальный API 19, целевой API 25

+
    +
  • Implement custom domain settings.
  • +
  • When proxying through Tor, wait until Orbot is ready before attempting to load a page.
  • +
  • Use .onion search engines when proxying through Tor.
  • +
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • +
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • +
+ +

1.15 (код версии 18)

+

11 февраля 2017 года - минимальный API 19, целевой API 25

+ + +

1.14.1 (код версии 17)

+

4 января 2017 года - минимальный API 19, целевой API 25

+ + +

1.14 (код версии 16)

+

26 декабря 2016 года - минимальный API 19, целевой API 25

+ + +

1.13 (код версии 15)

+

28 November 2016 года - минимальный API 19, целевой API 24

+ + +

1.12 (код версии 14)

+

9 November 2016 года - минимальный API 19, целевой API 24

+ + +

1.11 (код версии 13)

+

22 октября 2016 года - минимальный API 19, целевой API 24

+ + +

1.10 (код версии 12)

+

15 September 2016 года - минимальный API 19, целевой API 23

+ + +

1.9.1 (код версии 11)

+

27 августа 2016 года - минимальный API 19, целевой API 23

+
    +
  • Changed asset image links to relative paths so Privacy Browser will build on F-Droid.
  • +
+ +

1.9 (код версии 10)

+

26 августа 2016 года - минимальный API 19, целевой API 23

+ + +

1.8 (код версии 9)

+

16 июля 2016 года - минимальный API 19, целевой API 23

+ + +

1.7 (код версии 8)

+

16 June 2016 года - минимальный API 19, целевой API 23

+ + +

1.6 (код версии 7)

+

11 мая 2016 года - минимальный API 15, целевой API 23

+ + +

1.5 (код версии 6)

+

5 мая 2016 года - минимальный API 15, целевой API 23

+
    +
  • Add the option to disable swipe to refresh so that certain websites, like Google Maps, will function correctly.
  • +
+ +

1.4 (код версии 5)

+

28 апреля 2016 года - минимальный API 15, целевой API 23

+ + +

1.3 (код версии 4)

+

7 апреля 2016 года - минимальный API 15, целевой API 23

+ + +

1.2 (код версии 3)

+

23 марта 2016 года - минимальный API 15, целевой API 23

+ + +

1.1 (код версии 2)

+

9 марта 2016 года - минимальный API 10, целевой API 23

+
    +
  • Separate the standard and the free flavors so that Privacy Browser builds correctly on F-Droid.
  • +
+ +

1.0 (код версии 1)

+

24 февраля 2016 года - минимальный API 10, целевой API 23

+
    +
  • Toggle JavaScript, DOM storage, and cookies.
  • +
  • Set default enabled status for JavaScript, DOM storage, and cookies.
  • +
  • Clear DOM storage and cookies.
  • +
  • Add shortcuts to the home screen.
  • +
  • Utilize download manager.
  • +
  • Navigate forward and back.
  • +
  • Cut, copy, paste URLs.
  • +
  • Share URLs.
  • +
  • Set homepage.
  • +
  • Scroll URL bar.
  • +
  • Maintain WebView scroll location when rotating screen.
  • +
  • Swipe to refresh WebView.
  • +
  • Play full screen videos (requires JavaScript to be enabled).
  • +
  • Clear and Exit menu item.
  • +
+ + \ No newline at end of file diff --git a/app/src/main/assets/ru/about_changelog_dark.html b/app/src/main/assets/ru/about_changelog_dark.html deleted file mode 100644 index 903566d2..00000000 --- a/app/src/main/assets/ru/about_changelog_dark.html +++ /dev/null @@ -1,684 +0,0 @@ - - - - - - - - - - -

3.5.1 (код версии 51)

-

28 августа 2020 года - минимальный API 19, целевой API 29

-
    -
  • Исправлена ошибка, из-за которой новые запросы (ссылки из других приложений) не загружалис, - если Privacy Browser был остановлен операционной системой в фоновом режиме.
  • -
  • Исправлена ошибка, из-за которой приложение инициализировалось неправильно, - если тема приложения была установлена в противоположность теме ОС.
  • -
- -

3.5 (код версии 50)

-

18 августа 2020 года - минимальный API 19, целевой API 29

- - -

3.4.1 (код версии 49)

-

1 апреля 2020 года - минимальный API 19, целевой API 29

- - -

3.4 (код версии 48)

-

28 марта 2020 года - минимальный API 19, целевой API 29

- - -

3.3 (код версии 47)

-

3 января 2020 года - минимальный API 19, целевой API 29

- - -

3.2 (код версии 46)

-

20 июля 2019 года - минимальный API 19, целевой API 28

- - -

3.1 (код версии 45)

-

27 мая 2019 года - минимальный API 19, целевой API 28

- - -

3.0.1 (код версии 44)

-

2 мая 2019 года - минимальный API 19, целевой API 28

- - -

3.0 (код версии 43)

-

26 апреля 2019 года - минимальный API 19, целевой API 28

-
    -
  • Теперь сайты можно открывать в нескольких вкладках.
  • -
  • Исправлена ошибка, приводившая к обрезанию нижней части WebView при отключенной прокрутке панели приложения.
  • -
  • Исправлена ​​ошибка, приводившая к перезапуску Privacy Browser при подключении/отключении Bluetooth-клавиатуры.
  • -
  • Обновлен перевод на русский язык.
  • -
  • Обновлен перевод на немецкий язык, выполненный Бернхардом Г. Келлером (Bernhard G. Keller).
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
  • Добавлен частичный перевод на турецкий язык.
  • -
- -

2.17.1 (код версии 42)

-

5 марта 2019 года - минимальный API 19, целевой API 28

- - -

2.17 (код версии 41)

-

27 февраля 2019 года - минимальный API 19, целевой API 28

- - -

2.16 (код версии 40)

-

31 января 2019 года - минимальный API 19, целевой API 28

- - -

2.15.1 (код версии 39)

-

27 декабря 2018 года - минимальный API 19, целевой API 28

- - -

2.15 (код версии 38)

-

24 декабря 2018 года - минимальный API 19, целевой API 28

- - -

2.14 (код версии 37)

-

8 декабря 2018 года - минимальный API 19, целевой API 28

- - -

2.13 (код версии 36)

-

29 октября 2018 года - минимальный API 19, целевой API 28

- - -

2.12 (код версии 35)

-

31 июля 2018 года - минимальный API 19, целевой API 27

-
    -
  • Домашняя страница и поисковая система по умолчанию изменены на Searx.me.
  • -
  • В списки блокировок добавлен UltraPrivacy.
  • -
  • Добавлена опция блокировки всех сторонних ресурсов.
  • -
  • В опции меню добавлено управление списками блокировок.
  • -
  • В руководство добавлен раздел описывающий активность запросов.
  • -
  • Исправлена ошибка вызывающая сообщение “Ожидание Orbot”.
  • -
  • Исправлено две ошибки при обработке списка блокировок.
  • -
  • Исправлено две проблемы связанные с полноэкранным отображением.
  • -
  • Обновлен перевод на русский язык.
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
- -

2.11 (код версии 34)

-

10 июля 2018 года - минимальный API 19, целевой API 27

- - -

2.10 (код версии 33)

-

24 мая 2018 года - минимальный API 19, целевой API 27

- - -

2.9 (код версии 32)

-

9 мая 2018 года - минимальный API 19, целевой API 27

- - -

2.8.1 (код версии 31)

-

1 марта 2018 года - минимальный API 19, целевой API 27

- - -

2.8 (код версии 30)

-

22 февраля 2018 года - минимальный API 19, целевой API 27

- - -

2.7.2 (код версии 29)

-

22 November 2017 года - минимальный API 19, целевой API 26

-
    -
  • Add an options menu item to create/edit domain settings for the current domain.
  • -
  • Open telephone number hyperlinks in the dialer.
  • -
  • Fix a build error that prevented the release of 2.7 and 2.7.1 on F-Droid.
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
- -

2.7.1 (код версии 28)

-

9 November 2017 года - минимальный API 19, целевой API 26

- - -

2.7 (код версии 27)

-

7 November 2017 года - минимальный API 19, целевой API 26

-
    -
  • Add a bookmarks drawer that is accessed by sliding from the right.
  • -
  • Prevent Night Mode from flashing a white background when loading new pages.
  • -
  • Update the user agents.
  • -
  • Bump target API to 26 (Android Oreo, 8.0.0).
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
- -

2.6 (код версии 26)

-

18 September 2017 года - минимальный API 19, целевой API 25

-
    -
  • Add night mode rendering.
  • -
  • Update the dark theme rendering of the About and Guide sections.
  • -
  • Add support for HTTP authentication.
  • -
  • Color code the Common Name in the view SSL certificate dialog.
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
- -

2.5 (код версии 25)

-

26 августа 2017 года - минимальный API 19, целевой API 25

- - -

2.4 (код версии 24)

-

23 June 2017 года - минимальный API 19, целевой API 25

- - -

2.3 (код версии 23)

-

26 мая 2017 года - минимальный API 19, целевой API 25

-
    -
  • Don’t include URL redirects in the WebView history.
  • -
  • Add the option to disable loading of images to conserve bandwidth.
  • -
  • Fix the layout of some web pages by using a wide viewport.
  • -
  • Allow loading of host only URLs.
  • -
  • Add icons to the settings screen.
  • -
  • Add the title to the URL when sharing through the options menu.
  • -
  • Disable the third-party cookies setting on KitKat because it only works on Lollipop or newer.
  • -
  • Move Refresh to the bottom of the options menu.
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
- -

2.2 (код версии 22)

-

27 апреля 2017 года - минимальный API 19, целевой API 25

- - -

2.1 (код версии 21)

-

25 марта 2017 года - минимальный API 19, целевой API 25

- - -

2.0.1 (код версии 20)

-

21 марта 2017 года - минимальный API 19, целевой API 25

- - -

2.0 (код версии 19)

-

16 марта 2017 года - минимальный API 19, целевой API 25

-
    -
  • Implement custom domain settings.
  • -
  • When proxying through Tor, wait until Orbot is ready before attempting to load a page.
  • -
  • Use .onion search engines when proxying through Tor.
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
- -

1.15 (код версии 18)

-

11 февраля 2017 года - минимальный API 19, целевой API 25

- - -

1.14.1 (код версии 17)

-

4 января 2017 года - минимальный API 19, целевой API 25

- - -

1.14 (код версии 16)

-

26 декабря 2016 года - минимальный API 19, целевой API 25

- - -

1.13 (код версии 15)

-

28 November 2016 года - минимальный API 19, целевой API 24

- - -

1.12 (код версии 14)

-

9 November 2016 года - минимальный API 19, целевой API 24

- - -

1.11 (код версии 13)

-

22 октября 2016 года - минимальный API 19, целевой API 24

- - -

1.10 (код версии 12)

-

15 September 2016 года - минимальный API 19, целевой API 23

- - -

1.9.1 (код версии 11)

-

27 августа 2016 года - минимальный API 19, целевой API 23

-
    -
  • Changed asset image links to relative paths so Privacy Browser will build on F-Droid.
  • -
- -

1.9 (код версии 10)

-

26 августа 2016 года - минимальный API 19, целевой API 23

- - -

1.8 (код версии 9)

-

16 июля 2016 года - минимальный API 19, целевой API 23

- - -

1.7 (код версии 8)

-

16 June 2016 года - минимальный API 19, целевой API 23

- - -

1.6 (код версии 7)

-

11 мая 2016 года - минимальный API 15, целевой API 23

- - -

1.5 (код версии 6)

-

5 мая 2016 года - минимальный API 15, целевой API 23

-
    -
  • Add the option to disable swipe to refresh so that certain websites, like Google Maps, will function correctly.
  • -
- -

1.4 (код версии 5)

-

28 апреля 2016 года - минимальный API 15, целевой API 23

- - -

1.3 (код версии 4)

-

7 апреля 2016 года - минимальный API 15, целевой API 23

- - -

1.2 (код версии 3)

-

23 марта 2016 года - минимальный API 15, целевой API 23

- - -

1.1 (код версии 2)

-

9 марта 2016 года - минимальный API 10, целевой API 23

-
    -
  • Separate the standard and the free flavors so that Privacy Browser builds correctly on F-Droid.
  • -
- -

1.0 (код версии 1)

-

24 февраля 2016 года - минимальный API 10, целевой API 23

-
    -
  • Toggle JavaScript, DOM storage, and cookies.
  • -
  • Set default enabled status for JavaScript, DOM storage, and cookies.
  • -
  • Clear DOM storage and cookies.
  • -
  • Add shortcuts to the home screen.
  • -
  • Utilize download manager.
  • -
  • Navigate forward and back.
  • -
  • Cut, copy, paste URLs.
  • -
  • Share URLs.
  • -
  • Set homepage.
  • -
  • Scroll URL bar.
  • -
  • Maintain WebView scroll location when rotating screen.
  • -
  • Swipe to refresh WebView.
  • -
  • Play full screen videos (requires JavaScript to be enabled).
  • -
  • Clear and Exit menu item.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/ru/about_changelog_light.html b/app/src/main/assets/ru/about_changelog_light.html deleted file mode 100644 index d3736fbd..00000000 --- a/app/src/main/assets/ru/about_changelog_light.html +++ /dev/null @@ -1,684 +0,0 @@ - - - - - - - - - - -

3.5.1 (код версии 51)

-

28 августа 2020 года - минимальный API 19, целевой API 29

-
    -
  • Исправлена ошибка, из-за которой новые запросы (ссылки из других приложений) не загружалис, - если Privacy Browser был остановлен операционной системой в фоновом режиме.
  • -
  • Исправлена ошибка, из-за которой приложение инициализировалось неправильно, - если тема приложения была установлена в противоположность теме ОС.
  • -
- -

3.5 (код версии 50)

-

18 августа 2020 года - минимальный API 19, целевой API 29

- - -

3.4.1 (код версии 49)

-

1 апреля 2020 года - минимальный API 19, целевой API 29

- - -

3.4 (код версии 48)

-

28 марта 2020 года - минимальный API 19, целевой API 29

- - -

3.3 (код версии 47)

-

3 января 2020 года - минимальный API 19, целевой API 29

- - -

3.2 (код версии 46)

-

20 июля 2019 года - минимальный API 19, целевой API 28

- - -

3.1 (код версии 45)

-

27 мая 2019 года - минимальный API 19, целевой API 28

- - -

3.0.1 (код версии 44)

-

2 мая 2019 года - минимальный API 19, целевой API 28

- - -

3.0 (код версии 43)

-

26 апреля 2019 года - минимальный API 19, целевой API 28

-
    -
  • Теперь сайты можно открывать в нескольких вкладках.
  • -
  • Исправлена ошибка, приводившая к обрезанию нижней части WebView при отключенной прокрутке панели приложения.
  • -
  • Исправлена ​​ошибка, приводившая к перезапуску Privacy Browser при подключении/отключении Bluetooth-клавиатуры.
  • -
  • Обновлен перевод на русский язык.
  • -
  • Обновлен перевод на немецкий язык, выполненный Бернхардом Г. Келлером (Bernhard G. Keller).
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
  • Добавлен частичный перевод на турецкий язык.
  • -
- -

2.17.1 (код версии 42)

-

5 марта 2019 года - минимальный API 19, целевой API 28

- - -

2.17 (код версии 41)

-

27 февраля 2019 года - минимальный API 19, целевой API 28

- - -

2.16 (код версии 40)

-

31 января 2019 года - минимальный API 19, целевой API 28

- - -

2.15.1 (код версии 39)

-

27 декабря 2018 года - минимальный API 19, целевой API 28

- - -

2.15 (код версии 38)

-

24 декабря 2018 года - минимальный API 19, целевой API 28

- - -

2.14 (код версии 37)

-

8 декабря 2018 года - минимальный API 19, целевой API 28

- - -

2.13 (код версии 36)

-

29 октября 2018 года - минимальный API 19, целевой API 28

- - -

2.12 (код версии 35)

-

31 июля 2018 года - минимальный API 19, целевой API 27

-
    -
  • Домашняя страница и поисковая система по умолчанию изменены на Searx.me.
  • -
  • В списки блокировок добавлен UltraPrivacy.
  • -
  • Добавлена опция блокировки всех сторонних ресурсов.
  • -
  • В опции меню добавлено управление списками блокировок.
  • -
  • В руководство добавлен раздел описывающий активность запросов.
  • -
  • Исправлена ошибка вызывающая сообщение “Ожидание Orbot”.
  • -
  • Исправлено две ошибки при обработке списка блокировок.
  • -
  • Исправлено две проблемы связанные с полноэкранным отображением.
  • -
  • Обновлен перевод на русский язык.
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
- -

2.11 (код версии 34)

-

10 июля 2018 года - минимальный API 19, целевой API 27

- - -

2.10 (код версии 33)

-

24 мая 2018 года - минимальный API 19, целевой API 27

- - -

2.9 (код версии 32)

-

9 мая 2018 года - минимальный API 19, целевой API 27

- - -

2.8.1 (код версии 31)

-

1 марта 2018 года - минимальный API 19, целевой API 27

- - -

2.8 (код версии 30)

-

22 февраля 2018 года - минимальный API 19, целевой API 27

- - -

2.7.2 (код версии 29)

-

22 November 2017 года - минимальный API 19, целевой API 26

-
    -
  • Add an options menu item to create/edit domain settings for the current domain.
  • -
  • Open telephone number hyperlinks in the dialer.
  • -
  • Fix a build error that prevented the release of 2.7 and 2.7.1 on F-Droid.
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
- -

2.7.1 (код версии 28)

-

9 November 2017 года - минимальный API 19, целевой API 26

- - -

2.7 (код версии 27)

-

7 November 2017 года - минимальный API 19, целевой API 26

-
    -
  • Add a bookmarks drawer that is accessed by sliding from the right.
  • -
  • Prevent Night Mode from flashing a white background when loading new pages.
  • -
  • Update the user agents.
  • -
  • Bump target API to 26 (Android Oreo, 8.0.0).
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
- -

2.6 (код версии 26)

-

18 September 2017 года - минимальный API 19, целевой API 25

-
    -
  • Add night mode rendering.
  • -
  • Update the dark theme rendering of the About and Guide sections.
  • -
  • Add support for HTTP authentication.
  • -
  • Color code the Common Name in the view SSL certificate dialog.
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
- -

2.5 (код версии 25)

-

26 августа 2017 года - минимальный API 19, целевой API 25

- - -

2.4 (код версии 24)

-

23 June 2017 года - минимальный API 19, целевой API 25

- - -

2.3 (код версии 23)

-

26 мая 2017 года - минимальный API 19, целевой API 25

-
    -
  • Don’t include URL redirects in the WebView history.
  • -
  • Add the option to disable loading of images to conserve bandwidth.
  • -
  • Fix the layout of some web pages by using a wide viewport.
  • -
  • Allow loading of host only URLs.
  • -
  • Add icons to the settings screen.
  • -
  • Add the title to the URL when sharing through the options menu.
  • -
  • Disable the third-party cookies setting on KitKat because it only works on Lollipop or newer.
  • -
  • Move Refresh to the bottom of the options menu.
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
- -

2.2 (код версии 22)

-

27 апреля 2017 года - минимальный API 19, целевой API 25

- - -

2.1 (код версии 21)

-

25 марта 2017 года - минимальный API 19, целевой API 25

- - -

2.0.1 (код версии 20)

-

21 марта 2017 года - минимальный API 19, целевой API 25

- - -

2.0 (код версии 19)

-

16 марта 2017 года - минимальный API 19, целевой API 25

-
    -
  • Implement custom domain settings.
  • -
  • When proxying through Tor, wait until Orbot is ready before attempting to load a page.
  • -
  • Use .onion search engines when proxying through Tor.
  • -
  • Обновлен перевод на итальянский язык, выполненный Франческо Буратти (Francesco Buratti).
  • -
  • Обновлен перевод на испанский язык, выполненный Хосе А. Леон (Jose A. León).
  • -
- -

1.15 (код версии 18)

-

11 февраля 2017 года - минимальный API 19, целевой API 25

- - -

1.14.1 (код версии 17)

-

4 января 2017 года - минимальный API 19, целевой API 25

- - -

1.14 (код версии 16)

-

26 декабря 2016 года - минимальный API 19, целевой API 25

- - -

1.13 (код версии 15)

-

28 November 2016 года - минимальный API 19, целевой API 24

- - -

1.12 (код версии 14)

-

9 November 2016 года - минимальный API 19, целевой API 24

- - -

1.11 (код версии 13)

-

22 октября 2016 года - минимальный API 19, целевой API 24

- - -

1.10 (код версии 12)

-

15 September 2016 года - минимальный API 19, целевой API 23

- - -

1.9.1 (код версии 11)

-

27 августа 2016 года - минимальный API 19, целевой API 23

-
    -
  • Changed asset image links to relative paths so Privacy Browser will build on F-Droid.
  • -
- -

1.9 (код версии 10)

-

26 августа 2016 года - минимальный API 19, целевой API 23

- - -

1.8 (код версии 9)

-

16 июля 2016 года - минимальный API 19, целевой API 23

- - -

1.7 (код версии 8)

-

16 June 2016 года - минимальный API 19, целевой API 23

- - -

1.6 (код версии 7)

-

11 мая 2016 года - минимальный API 15, целевой API 23

- - -

1.5 (код версии 6)

-

5 мая 2016 года - минимальный API 15, целевой API 23

-
    -
  • Add the option to disable swipe to refresh so that certain websites, like Google Maps, will function correctly.
  • -
- -

1.4 (код версии 5)

-

28 апреля 2016 года - минимальный API 15, целевой API 23

- - -

1.3 (код версии 4)

-

7 апреля 2016 года - минимальный API 15, целевой API 23

- - -

1.2 (код версии 3)

-

23 марта 2016 года - минимальный API 15, целевой API 23

- - -

1.1 (код версии 2)

-

9 марта 2016 года - минимальный API 10, целевой API 23

-
    -
  • Separate the standard and the free flavors so that Privacy Browser builds correctly on F-Droid.
  • -
- -

1.0 (код версии 1)

-

24 февраля 2016 года - минимальный API 10, целевой API 23

-
    -
  • Toggle JavaScript, DOM storage, and cookies.
  • -
  • Set default enabled status for JavaScript, DOM storage, and cookies.
  • -
  • Clear DOM storage and cookies.
  • -
  • Add shortcuts to the home screen.
  • -
  • Utilize download manager.
  • -
  • Navigate forward and back.
  • -
  • Cut, copy, paste URLs.
  • -
  • Share URLs.
  • -
  • Set homepage.
  • -
  • Scroll URL bar.
  • -
  • Maintain WebView scroll location when rotating screen.
  • -
  • Swipe to refresh WebView.
  • -
  • Play full screen videos (requires JavaScript to be enabled).
  • -
  • Clear and Exit menu item.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/ru/about_contributors.html b/app/src/main/assets/ru/about_contributors.html new file mode 100644 index 00000000..809df9f1 --- /dev/null +++ b/app/src/main/assets/ru/about_contributors.html @@ -0,0 +1,52 @@ + + + + + + + + + + + + + +

Главный разработчик

+

Privacy Browser в основном разработан Soren Stoutner.

+ +

Кодеры

+ Thomas Jensen
+ Hendrik Knackstedt + +

Переводчики

+ Кевин ЛЕ ФЛОХИК (Kévin LE FLOHIC): Французский
+ Тьяго Назарено Консейсао Силва де Хесус (Thiago Nazareno Conceição Silva de Jesus): бразильский португальский
+ Bernhard G. Keller: немецкий
+ Francesco Buratti: итальянский
+ Jose A. León: испанский + +

Предыдущие переводчики

+ Stefan Erhardt: немецкий
+ Aaron Gerlach: немецкий + +
+
+

Приглашаем помочь как кодом, так и переводом.

+ + \ No newline at end of file diff --git a/app/src/main/assets/ru/about_contributors_dark.html b/app/src/main/assets/ru/about_contributors_dark.html deleted file mode 100644 index d5ab899e..00000000 --- a/app/src/main/assets/ru/about_contributors_dark.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - - - - - - - -

Главный разработчик

-

Privacy Browser в основном разработан Soren Stoutner.

- -

Кодеры

- Thomas Jensen
- Hendrik Knackstedt - -

Переводчики

- Кевин ЛЕ ФЛОХИК (Kévin LE FLOHIC): Французский
- Тьяго Назарено Консейсао Силва де Хесус (Thiago Nazareno Conceição Silva de Jesus): бразильский португальский
- Bernhard G. Keller: немецкий
- Francesco Buratti: итальянский
- Jose A. León: испанский - -

Предыдущие переводчики

- Stefan Erhardt: немецкий
- Aaron Gerlach: немецкий - -
-
-

Приглашаем помочь как кодом, так и переводом.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/about_contributors_light.html b/app/src/main/assets/ru/about_contributors_light.html deleted file mode 100644 index 1ab202b5..00000000 --- a/app/src/main/assets/ru/about_contributors_light.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - - - - - - - -

Главный разработчик

-

Privacy Browser в основном разработан Soren Stoutner.

- -

Кодеры

- Thomas Jensen
- Hendrik Knackstedt - -

Переводчики

- Кевин ЛЕ ФЛОХИК (Kévin LE FLOHIC): Французский
- Тьяго Назарено Консейсао Силва де Хесус (Thiago Nazareno Conceição Silva de Jesus): бразильский португальский
- Bernhard G. Keller: немецкий
- Francesco Buratti: итальянский
- Jose A. León: испанский - -

Предыдущие переводчики

- Stefan Erhardt: немецкий
- Aaron Gerlach: немецкий - -
-
-

Приглашаем помочь как кодом, так и переводом.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/about_licenses.html b/app/src/main/assets/ru/about_licenses.html new file mode 100644 index 00000000..5043d2ed --- /dev/null +++ b/app/src/main/assets/ru/about_licenses.html @@ -0,0 +1,1067 @@ + + + + + + + + + + + + + +

Авторские права

+

Авторские права Privacy Browser © 2015-2020 Soren Stoutner.

+ +

Лицензия

+

Privacy Browser выпущен под лицензией GPLv3+. Полный текст лицензии приведен ниже. + Исходный код доступен на git.stoutner.com.

+ +

Списки блокировки

+

EasyList и EasyPrivacy + лицензированы под лицензиями GPLv3+ + и Creative Commons Attribution-ShareAlike 3.0+ Unported. + Privacy Browser использует их с помощью опции GPLv3+.

+ +

Fanboy’s Annoyance List и Fanboy’s Social Blocking List + выпущены под лицензией Creative Commons Attribution 3.0 Unported, + которая совместима с GPLv3+. Списки включены без изменений в Privacy Browser.

+ +

Более подробную информацию о списках блокировки можно найти на веб-сайте EasyList.

+ +

Библиотеки

+

Privacy Browser создан на базе библиотек AndroidX, + Kotlin + и кодовой базы из репозитория Google Material Maven, + которые выпущены под лицензией Apache 2.0.

+ +

Бесплатный вариант Privacy Browser создан с помощью Firebase Ads, + выпущенной по лицензии Android Software Development Kit License.

+ +

Классы

+

com.stoutner.privacybrowser.views.CheckedLinearLayout является модифицированной версией класса, содержащегося в исходном коде + Android Camera. + Оригинальный файл был выпущен под лицензией Apache 2.0. + Модифицированный файл выпущен под лицензией GPLv3+.

+ +

Иконки

+

+ являются производными от security и language, которые являются частью + Android Material icon set и выпущены под Apache License 2.0. Полный текст лицензии приведен ниже. + Модификации авторских прав © 2016 Soren Stoutner. + Полученные изображения выпущены под лицензией GPLv3+.

+

являются производными от folder и exit_to_app, которые являются частью + Android Material icon set и выпущены под Apache License 2.0. + Модификации авторских прав © 2017 Soren Stoutner. + Полученные изображения выпущены под лицензией GPLv3+.

+

являются производными от bookmark и create_new_folder, которые являются частью + Android Material icon set и выпущены под Apache License 2.0. + Модификации авторских прав © 2017 Soren Stoutner. + Полученные изображения выпущены под лицензией GPLv3+.

+

являются производными от create_new_folder, которые являются частью + Android Material icon set и выпущены под Apache License 2.0. + Модификации авторских прав © 2017 Soren Stoutner. + Полученные изображения выпущены под лицензией GPLv3+.

+

являются производными от exit_to_app, + которые являются частью Android Material icon set и выпущены под Apache License 2.0. + Модификации авторских прав © 2017 Soren Stoutner. + Полученные изображения выпущены под лицензией GPLv3+.

+

являются производными от compare, + которые являются частью Android Material icon set и выпущены под Apache License 2.0. + Модификации авторских прав © 2017 Soren Stoutner. + Полученные изображения выпущены под лицензией GPLv3+.

+

являются производными от sort, + которые являются частью Android Material icon set и выпущены под Apache License 2.0. + Модификации авторских прав © 2019 Soren Stoutner. + Полученные изображения выпущены под лицензией GPLv3+.

+

cookie были созданы Google. Они выпущены под Apache License 2.0 + и могут быть загружены из Material Design Icons. Он неизменен, за исключением такой информации, как цвет и размер.

+

Следующие значки взяты изAndroid Material icon set, + которые выпущены под Apache License 2.0. + Они неизменны, за исключением такой информации, как цвет и размер. Некоторые из них были переименованы в соответствии с их использованием в коде. Оригинальные значки и имена показаны ниже.

+

add.

+

arrow_back.

+

arrow_forward.

+

bookmarks.

+

bug_report.

+

camera_enhance.

+

chrome_reader_mode.

+

close.

+

delete.

+

delete_forever.

+

devices_other.

+

dns.

+

donut_small.

+

edit.

+

expand_less.

+

expand_more.

+

file_copy.

+

file_download.

+

find_in_page.

+

folder.

+

home.

+

image.

+

import_contacts.

+

import_export.

+

important_devices.

+

info_outline.

+

language.

+

link_off.

+

list.

+

local_activity.

+

location_off.

+

lock.

+

map.

+

more.

+

new releases.

+

open_in_browser.

+

payment.

+

question_answer.

+

refresh.

+

save.

+

search.

+

select_all.

+

settings.

+

settings_overscan.

+

share.

+

smartphone.

+

sort.

+

style.

+

subtitles.

+

tab.

+

text_fields.

+

thumbs_up_down.

+

vertical_align_bottom.

+

vertical_align_top.

+

visibility_off.

+

vpn_key.

+

vpn_lock.

+

web.

+ +
+ +

GNU General Public License

+

Version 3, 29 June 2007

+ +

Copyright © 2007 Free Software Foundation, Inc. + <http://fsf.org/>

+ +

Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed.

+ +

Preamble

+ +

The GNU General Public License is a free, copyleft license for + software and other kinds of works.

+ +

The licenses for most software and other practical works are designed + to take away your freedom to share and change the works. By contrast, + the GNU General Public License is intended to guarantee your freedom to + share and change all versions of a program—to make sure it remains free + software for all its users. We, the Free Software Foundation, use the + GNU General Public License for most of our software; it applies also to + any other work released this way by its authors. You can apply it to + your programs, too.

+ +

When we speak of free software, we are referring to freedom, not + price. Our General Public Licenses are designed to make sure that you + have the freedom to distribute copies of free software (and charge for + them if you wish), that you receive source code or can get it if you + want it, that you can change the software or use pieces of it in new + free programs, and that you know you can do these things.

+ +

To protect your rights, we need to prevent others from denying you + these rights or asking you to surrender the rights. Therefore, you have + certain responsibilities if you distribute copies of the software, or if + you modify it: responsibilities to respect the freedom of others.

+ +

For example, if you distribute copies of such a program, whether + gratis or for a fee, you must pass on to the recipients the same + freedoms that you received. You must make sure that they, too, receive + or can get the source code. And you must show them these terms so they + know their rights.

+ +

Developers that use the GNU GPL protect your rights with two steps: + (1) assert copyright on the software, and (2) offer you this License + giving you legal permission to copy, distribute and/or modify it.

+ +

For the developers’ and authors’ protection, the GPL clearly explains + that there is no warranty for this free software. For both users’ and + authors’ sake, the GPL requires that modified versions be marked as + changed, so that their problems will not be attributed erroneously to + authors of previous versions.

+ +

Some devices are designed to deny users access to install or run + modified versions of the software inside them, although the manufacturer + can do so. This is fundamentally incompatible with the aim of + protecting users’ freedom to change the software. The systematic + pattern of such abuse occurs in the area of products for individuals to + use, which is precisely where it is most unacceptable. Therefore, we + have designed this version of the GPL to prohibit the practice for those + products. If such problems arise substantially in other domains, we + stand ready to extend this provision to those domains in future versions + of the GPL, as needed to protect the freedom of users.

+ +

Finally, every program is threatened constantly by software patents. + States should not allow patents to restrict development and use of + software on general-purpose computers, but in those that do, we wish to + avoid the special danger that patents applied to a free program could + make it effectively proprietary. To prevent this, the GPL assures that + patents cannot be used to render the program non-free.

+ +

The precise terms and conditions for copying, distribution and + modification follow.

+ +

TERMS AND CONDITIONS

+ +

0. Definitions.

+ +

“This License” refers to version 3 of the GNU General Public License.

+ +

“Copyright” also means copyright-like laws that apply to other kinds of + works, such as semiconductor masks.

+ +

“The Program” refers to any copyrightable work licensed under this + License. Each licensee is addressed as “you”. “Licensees” and + “recipients” may be individuals or organizations.

+ +

To “modify” a work means to copy from or adapt all or part of the work + in a fashion requiring copyright permission, other than the making of an + exact copy. The resulting work is called a “modified version” of the + earlier work or a work “based on” the earlier work.

+ +

A “covered work” means either the unmodified Program or a work based + on the Program.

+ +

To “propagate” a work means to do anything with it that, without + permission, would make you directly or secondarily liable for + infringement under applicable copyright law, except executing it on a + computer or modifying a private copy. Propagation includes copying, + distribution (with or without modification), making available to the + public, and in some countries other activities as well.

+ +

To “convey” a work means any kind of propagation that enables other + parties to make or receive copies. Mere interaction with a user through + a computer network, with no transfer of a copy, is not conveying.

+ +

An interactive user interface displays “Appropriate Legal Notices” + to the extent that it includes a convenient and prominently visible + feature that (1) displays an appropriate copyright notice, and (2) + tells the user that there is no warranty for the work (except to the + extent that warranties are provided), that licensees may convey the + work under this License, and how to view a copy of this License. If + the interface presents a list of user commands or options, such as a + menu, a prominent item in the list meets this criterion.

+ +

1. Source Code.

+ +

The “source code” for a work means the preferred form of the work + for making modifications to it. “Object code” means any non-source + form of a work.

+ +

A “Standard Interface” means an interface that either is an official + standard defined by a recognized standards body, or, in the case of + interfaces specified for a particular programming language, one that + is widely used among developers working in that language.

+ +

The “System Libraries” of an executable work include anything, other + than the work as a whole, that (a) is included in the normal form of + packaging a Major Component, but which is not part of that Major + Component, and (b) serves only to enable use of the work with that + Major Component, or to implement a Standard Interface for which an + implementation is available to the public in source code form. A + “Major Component”, in this context, means a major essential component + (kernel, window system, and so on) of the specific operating system + (if any) on which the executable work runs, or a compiler used to + produce the work, or an object code interpreter used to run it.

+ +

The “Corresponding Source” for a work in object code form means all + the source code needed to generate, install, and (for an executable + work) run the object code and to modify the work, including scripts to + control those activities. However, it does not include the work’s + System Libraries, or general-purpose tools or generally available free + programs which are used unmodified in performing those activities but + which are not part of the work. For example, Corresponding Source + includes interface definition files associated with source files for + the work, and the source code for shared libraries and dynamically + linked subprograms that the work is specifically designed to require, + such as by intimate data communication or control flow between those + subprograms and other parts of the work.

+ +

The Corresponding Source need not include anything that users + can regenerate automatically from other parts of the Corresponding + Source.

+ +

The Corresponding Source for a work in source code form is that + same work.

+ +

2. Basic Permissions.

+ +

All rights granted under this License are granted for the term of + copyright on the Program, and are irrevocable provided the stated + conditions are met. This License explicitly affirms your unlimited + permission to run the unmodified Program. The output from running a + covered work is covered by this License only if the output, given its + content, constitutes a covered work. This License acknowledges your + rights of fair use or other equivalent, as provided by copyright law.

+ +

You may make, run and propagate covered works that you do not + convey, without conditions so long as your license otherwise remains + in force. You may convey covered works to others for the sole purpose + of having them make modifications exclusively for you, or provide you + with facilities for running those works, provided that you comply with + the terms of this License in conveying all material for which you do + not control copyright. Those thus making or running the covered works + for you must do so exclusively on your behalf, under your direction + and control, on terms that prohibit them from making any copies of + your copyrighted material outside their relationship with you.

+ +

Conveying under any other circumstances is permitted solely under + the conditions stated below. Sublicensing is not allowed; section 10 + makes it unnecessary.

+ +

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

+ +

No covered work shall be deemed part of an effective technological + measure under any applicable law fulfilling obligations under article + 11 of the WIPO copyright treaty adopted on 20 December 1996, or + similar laws prohibiting or restricting circumvention of such + measures.

+ +

When you convey a covered work, you waive any legal power to forbid + circumvention of technological measures to the extent such circumvention + is effected by exercising rights under this License with respect to + the covered work, and you disclaim any intention to limit operation or + modification of the work as a means of enforcing, against the work’s + users, your or third parties’ legal rights to forbid circumvention of + technological measures.

+ +

4. Conveying Verbatim Copies.

+ +

You may convey verbatim copies of the Program’s source code as you + receive it, in any medium, provided that you conspicuously and + appropriately publish on each copy an appropriate copyright notice; + keep intact all notices stating that this License and any + non-permissive terms added in accord with section 7 apply to the code; + keep intact all notices of the absence of any warranty; and give all + recipients a copy of this License along with the Program.

+ +

You may charge any price or no price for each copy that you convey, + and you may offer support or warranty protection for a fee.

+ +

5. Conveying Modified Source Versions.

+ +

You may convey a work based on the Program, or the modifications to + produce it from the Program, in the form of source code under the + terms of section 4, provided that you also meet all of these conditions:

+ +
    +
  • a) The work must carry prominent notices stating that you modified + it, and giving a relevant date.
  • + +
  • b) The work must carry prominent notices stating that it is + released under this License and any conditions added under section + 7. This requirement modifies the requirement in section 4 to + “keep intact all notices”.
  • + +
  • c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it.
  • + +
  • d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so.
  • +
+ +

A compilation of a covered work with other separate and independent + works, which are not by their nature extensions of the covered work, + and which are not combined with it such as to form a larger program, + in or on a volume of a storage or distribution medium, is called an + “aggregate” if the compilation and its resulting copyright are not + used to limit the access or legal rights of the compilation’s users + beyond what the individual works permit. Inclusion of a covered work + in an aggregate does not cause this License to apply to the other + parts of the aggregate.

+ +

6. Conveying Non-Source Forms.

+ +

You may convey a covered work in object code form under the terms + of sections 4 and 5, provided that you also convey the + machine-readable Corresponding Source under the terms of this License, + in one of these ways:

+ +
    +
  • a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange.
  • + +
  • b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the + Corresponding Source from a network server at no charge.
  • + +
  • c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b.
  • + +
  • d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements.
  • + +
  • e) Convey the object code using peer-to-peer transmission, provided + you inform other peers where the object code and Corresponding + Source of the work are being offered to the general public at no + charge under subsection 6d.
  • +
+ +

A separable portion of the object code, whose source code is excluded + from the Corresponding Source as a System Library, need not be + included in conveying the object code work.

+ +

A “User Product” is either (1) a “consumer product”, which means any + tangible personal property which is normally used for personal, family, + or household purposes, or (2) anything designed or sold for incorporation + into a dwelling. In determining whether a product is a consumer product, + doubtful cases shall be resolved in favor of coverage. For a particular + product received by a particular user, “normally used” refers to a + typical or common use of that class of product, regardless of the status + of the particular user or of the way in which the particular user + actually uses, or expects or is expected to use, the product. A product + is a consumer product regardless of whether the product has substantial + commercial, industrial or non-consumer uses, unless such uses represent + the only significant mode of use of the product.

+ +

“Installation Information” for a User Product means any methods, + procedures, authorization keys, or other information required to install + and execute modified versions of a covered work in that User Product from + a modified version of its Corresponding Source. The information must + suffice to ensure that the continued functioning of the modified object + code is in no case prevented or interfered with solely because + modification has been made.

+ +

If you convey an object code work under this section in, or with, or + specifically for use in, a User Product, and the conveying occurs as + part of a transaction in which the right of possession and use of the + User Product is transferred to the recipient in perpetuity or for a + fixed term (regardless of how the transaction is characterized), the + Corresponding Source conveyed under this section must be accompanied + by the Installation Information. But this requirement does not apply + if neither you nor any third party retains the ability to install + modified object code on the User Product (for example, the work has + been installed in ROM).

+ +

The requirement to provide Installation Information does not include a + requirement to continue to provide support service, warranty, or updates + for a work that has been modified or installed by the recipient, or for + the User Product in which it has been modified or installed. Access to a + network may be denied when the modification itself materially and + adversely affects the operation of the network or violates the rules and + protocols for communication across the network.

+ +

Corresponding Source conveyed, and Installation Information provided, + in accord with this section must be in a format that is publicly + documented (and with an implementation available to the public in + source code form), and must require no special password or key for + unpacking, reading or copying.

+ +

7. Additional Terms.

+ +

“Additional permissions” are terms that supplement the terms of this + License by making exceptions from one or more of its conditions. + Additional permissions that are applicable to the entire Program shall + be treated as though they were included in this License, to the extent + that they are valid under applicable law. If additional permissions + apply only to part of the Program, that part may be used separately + under those permissions, but the entire Program remains governed by + this License without regard to the additional permissions.

+ +

When you convey a copy of a covered work, you may at your option + remove any additional permissions from that copy, or from any part of + it. (Additional permissions may be written to require their own + removal in certain cases when you modify the work.) You may place + additional permissions on material, added by you to a covered work, + for which you have or can give appropriate copyright permission.

+ +

Notwithstanding any other provision of this License, for material you + add to a covered work, you may (if authorized by the copyright holders of + that material) supplement the terms of this License with terms:

+ +
    +
  • a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or
  • + +
  • b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or
  • + +
  • c) Prohibiting misrepresentation of the origin of that material, or + requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or
  • + +
  • d) Limiting the use for publicity purposes of names of licensors or + authors of the material; or
  • + +
  • e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or
  • + +
  • f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions of + it) with contractual assumptions of liability to the recipient, for + any liability that these contractual assumptions directly impose on + those licensors and authors.
  • +
+ +

All other non-permissive additional terms are considered “further + restrictions” within the meaning of section 10. If the Program as you + received it, or any part of it, contains a notice stating that it is + governed by this License along with a term that is a further + restriction, you may remove that term. If a license document contains + a further restriction but permits relicensing or conveying under this + License, you may add to a covered work material governed by the terms + of that license document, provided that the further restriction does + not survive such relicensing or conveying.

+ +

If you add terms to a covered work in accord with this section, you + must place, in the relevant source files, a statement of the + additional terms that apply to those files, or a notice indicating + where to find the applicable terms.

+ +

Additional terms, permissive or non-permissive, may be stated in the + form of a separately written license, or stated as exceptions; + the above requirements apply either way.

+ +

8. Termination.

+ +

You may not propagate or modify a covered work except as expressly + provided under this License. Any attempt otherwise to propagate or + modify it is void, and will automatically terminate your rights under + this License (including any patent licenses granted under the third + paragraph of section 11).

+ +

However, if you cease all violation of this License, then your + license from a particular copyright holder is reinstated (a) + provisionally, unless and until the copyright holder explicitly and + finally terminates your license, and (b) permanently, if the copyright + holder fails to notify you of the violation by some reasonable means + prior to 60 days after the cessation.

+ +

Moreover, your license from a particular copyright holder is + reinstated permanently if the copyright holder notifies you of the + violation by some reasonable means, this is the first time you have + received notice of violation of this License (for any work) from that + copyright holder, and you cure the violation prior to 30 days after + your receipt of the notice.

+ +

Termination of your rights under this section does not terminate the + licenses of parties who have received copies or rights from you under + this License. If your rights have been terminated and not permanently + reinstated, you do not qualify to receive new licenses for the same + material under section 10.

+ +

9. Acceptance Not Required for Having Copies.

+ +

You are not required to accept this License in order to receive or + run a copy of the Program. Ancillary propagation of a covered work + occurring solely as a consequence of using peer-to-peer transmission + to receive a copy likewise does not require acceptance. However, + nothing other than this License grants you permission to propagate or + modify any covered work. These actions infringe copyright if you do + not accept this License. Therefore, by modifying or propagating a + covered work, you indicate your acceptance of this License to do so.

+ +

10. Automatic Licensing of Downstream Recipients.

+ +

Each time you convey a covered work, the recipient automatically + receives a license from the original licensors, to run, modify and + propagate that work, subject to this License. You are not responsible + for enforcing compliance by third parties with this License.

+ +

An “entity transaction” is a transaction transferring control of an + organization, or substantially all assets of one, or subdividing an + organization, or merging organizations. If propagation of a covered + work results from an entity transaction, each party to that + transaction who receives a copy of the work also receives whatever + licenses to the work the party’s predecessor in interest had or could + give under the previous paragraph, plus a right to possession of the + Corresponding Source of the work from the predecessor in interest, if + the predecessor has it or can get it with reasonable efforts.

+ +

You may not impose any further restrictions on the exercise of the + rights granted or affirmed under this License. For example, you may + not impose a license fee, royalty, or other charge for exercise of + rights granted under this License, and you may not initiate litigation + (including a cross-claim or counterclaim in a lawsuit) alleging that + any patent claim is infringed by making, using, selling, offering for + sale, or importing the Program or any portion of it.

+ +

11. Patents.

+ +

A “contributor” is a copyright holder who authorizes use under this + License of the Program or a work on which the Program is based. The + work thus licensed is called the contributor’s “contributor version”.

+ +

A contributor’s “essential patent claims” are all patent claims + owned or controlled by the contributor, whether already acquired or + hereafter acquired, that would be infringed by some manner, permitted + by this License, of making, using, or selling its contributor version, + but do not include claims that would be infringed only as a + consequence of further modification of the contributor version. For + purposes of this definition, “control” includes the right to grant + patent sublicenses in a manner consistent with the requirements of + this License.

+ +

Each contributor grants you a non-exclusive, worldwide, royalty-free + patent license under the contributor’s essential patent claims, to + make, use, sell, offer for sale, import and otherwise run, modify and + propagate the contents of its contributor version.

+ +

In the following three paragraphs, a “patent license” is any express + agreement or commitment, however denominated, not to enforce a patent + (such as an express permission to practice a patent or covenant not to + sue for patent infringement). To “grant” such a patent license to a + party means to make such an agreement or commitment not to enforce a + patent against the party.

+ +

If you convey a covered work, knowingly relying on a patent license, + and the Corresponding Source of the work is not available for anyone + to copy, free of charge and under the terms of this License, through a + publicly available network server or other readily accessible means, + then you must either (1) cause the Corresponding Source to be so + available, or (2) arrange to deprive yourself of the benefit of the + patent license for this particular work, or (3) arrange, in a manner + consistent with the requirements of this License, to extend the patent + license to downstream recipients. “Knowingly relying” means you have + actual knowledge that, but for the patent license, your conveying the + covered work in a country, or your recipient’s use of the covered work + in a country, would infringe one or more identifiable patents in that + country that you have reason to believe are valid.

+ +

If, pursuant to or in connection with a single transaction or + arrangement, you convey, or propagate by procuring conveyance of, a + covered work, and grant a patent license to some of the parties + receiving the covered work authorizing them to use, propagate, modify + or convey a specific copy of the covered work, then the patent license + you grant is automatically extended to all recipients of the covered + work and works based on it.

+ +

A patent license is “discriminatory” if it does not include within + the scope of its coverage, prohibits the exercise of, or is + conditioned on the non-exercise of one or more of the rights that are + specifically granted under this License. You may not convey a covered + work if you are a party to an arrangement with a third party that is + in the business of distributing software, under which you make payment + to the third party based on the extent of your activity of conveying + the work, and under which the third party grants, to any of the + parties who would receive the covered work from you, a discriminatory + patent license (a) in connection with copies of the covered work + conveyed by you (or copies made from those copies), or (b) primarily + for and in connection with specific products or compilations that + contain the covered work, unless you entered into that arrangement, + or that patent license was granted, prior to 28 March 2007.

+ +

Nothing in this License shall be construed as excluding or limiting + any implied license or other defenses to infringement that may + otherwise be available to you under applicable patent law.

+ +

12. No Surrender of Others’ Freedom.

+ +

If conditions are imposed on you (whether by court order, agreement or + otherwise) that contradict the conditions of this License, they do not + excuse you from the conditions of this License. If you cannot convey a + covered work so as to satisfy simultaneously your obligations under this + License and any other pertinent obligations, then as a consequence you may + not convey it at all. For example, if you agree to terms that obligate you + to collect a royalty for further conveying from those to whom you convey + the Program, the only way you could satisfy both those terms and this + License would be to refrain entirely from conveying the Program.

+ +

13. Use with the GNU Affero General Public License.

+ +

Notwithstanding any other provision of this License, you have + permission to link or combine any covered work with a work licensed + under version 3 of the GNU Affero General Public License into a single + combined work, and to convey the resulting work. The terms of this + License will continue to apply to the part which is the covered work, + but the special requirements of the GNU Affero General Public License, + section 13, concerning interaction through a network will apply to the + combination as such.

+ +

14. Revised Versions of this License.

+ +

The Free Software Foundation may publish revised and/or new versions of + the GNU General Public License from time to time. Such new versions will + be similar in spirit to the present version, but may differ in detail to + address new problems or concerns.

+ +

Each version is given a distinguishing version number. If the + Program specifies that a certain numbered version of the GNU General + Public License “or any later version” applies to it, you have the + option of following the terms and conditions either of that numbered + version or of any later version published by the Free Software + Foundation. If the Program does not specify a version number of the + GNU General Public License, you may choose any version ever published + by the Free Software Foundation.

+ +

If the Program specifies that a proxy can decide which future + versions of the GNU General Public License can be used, that proxy’s + public statement of acceptance of a version permanently authorizes you + to choose that version for the Program.

+ +

Later license versions may give you additional or different + permissions. However, no additional obligations are imposed on any + author or copyright holder as a result of your choosing to follow a + later version.

+ +

15. Disclaimer of Warranty.

+ +

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY + APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT + HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY + OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, + THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM + IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF + ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

+ +

16. Limitation of Liability.

+ +

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING + WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS + THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY + GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE + USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF + DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD + PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), + EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF + SUCH DAMAGES.

+ +

17. Interpretation of Sections 15 and 16.

+ +

If the disclaimer of warranty and limitation of liability provided + above cannot be given local legal effect according to their terms, + reviewing courts shall apply local law that most closely approximates + an absolute waiver of all civil liability in connection with the + Program, unless a warranty or assumption of liability accompanies a + copy of the Program in return for a fee.

+ +

END OF TERMS AND CONDITIONS

+ +

How to Apply These Terms to Your New Programs

+ +

If you develop a new program, and you want it to be of the greatest + possible use to the public, the best way to achieve this is to make it + free software which everyone can redistribute and change under these terms.

+ +

To do so, attach the following notices to the program. It is safest + to attach them to the start of each source file to most effectively + state the exclusion of warranty; and each file should have at least + the “copyright” line and a pointer to where the full notice is found.

+ +
<one line to give the program’s name
+and a brief idea of what it does.>
+Copyright (C) <year>  <name of author>
+
+This program is free software: you can
+redistribute it and/or modify
+it under the terms of the GNU General
+Public License as published by the Free
+Software Foundation, either version 3
+of the License, or(at your option)
+any later version.
+
+This program is distributed in the hope
+that it will be useful, but WITHOUT ANY
+WARRANTY; without even the implied
+warranty of MERCHANTABILITY or FITNESS
+FOR A PARTICULAR PURPOSE.  See the GNU
+General Public License for more details.
+
+You should have received a copy of the
+GNU General Public License along with
+this program.  If not, see
+<http://www.gnu.org/licenses/>.
+ +

Also add information on how to contact you by electronic and paper mail.

+ +

If the program does terminal interaction, make it output a short + notice like this when it starts in an interactive mode:

+ +
<program>  Copyright (C) <year>
+<name of author>
+This program comes with ABSOLUTELY NO
+WARRANTY; for details type `show w'.
+This is free software, and you are
+welcome to redistribute it under
+certain conditions; type `show c'
+for details.
+ +

The hypothetical commands `show w' and `show c' should show the appropriate + parts of the General Public License. Of course, your program’s commands + might be different; for a GUI interface, you would use an “about box”.

+ +

You should also get your employer (if you work as a programmer) or school, + if any, to sign a “copyright disclaimer” for the program, if necessary. + For more information on this, and how to apply and follow the GNU GPL, see + <http://www.gnu.org/licenses/>.

+ +

The GNU General Public License does not permit incorporating your program + into proprietary programs. If your program is a subroutine library, you + may consider it more useful to permit linking proprietary applications with + the library. If this is what you want to do, use the GNU Lesser General + Public License instead of this License. But first, please read + <http://www.gnu.org/philosophy/why-not-lgpl.html>.

+ +
+ +

Apache License

+

Version 2.0, January 2004

+

http://www.apache.org/licenses/

+ +

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

+ +

1. Definitions.

+ +

“License” shall mean the terms and conditions for use, reproduction, and + distribution as defined by Sections 1 through 9 of this document.

+ +

“Licensor” shall mean the copyright owner or entity authorized by the + copyright owner that is granting the License.

+ +

“Legal Entity” shall mean the union of the acting entity and all other + entities that control, are controlled by, or are under common control with + that entity. For the purposes of this definition, “control” means (i) the + power, direct or indirect, to cause the direction or management of such + entity, whether by contract or otherwise, or (ii) ownership of fifty + percent (50%) or more of the outstanding shares, or (iii) beneficial + ownership of such entity.

+ +

“You” (or “Your”) shall mean an individual or Legal Entity exercising + permissions granted by this License.

+ +

“Source” form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation source, + and configuration files.

+ +

“Object” form shall mean any form resulting from mechanical transformation + or translation of a Source form, including but not limited to compiled + object code, generated documentation, and conversions to other media types.

+ +

“Work” shall mean the work of authorship, whether in Source or Object form, + made available under the License, as indicated by a copyright notice that + is included in or attached to the work (an example is provided in the + Appendix below).

+ +

“Derivative Works” shall mean any work, whether in Source or Object form, + that is based on (or derived from) the Work and for which the editorial + revisions, annotations, elaborations, or other modifications represent, as + a whole, an original work of authorship. For the purposes of this License, + Derivative Works shall not include works that remain separable from, or + merely link (or bind by name) to the interfaces of, the Work and Derivative + Works thereof.

+ +

“Contribution” shall mean any work of authorship, including the original + version of the Work and any modifications or additions to that Work or + Derivative Works thereof, that is intentionally submitted to Licensor for + inclusion in the Work by the copyright owner or by an individual or Legal + Entity authorized to submit on behalf of the copyright owner. For the + purposes of this definition, “submitted” means any form of electronic, + verbal, or written communication sent to the Licensor or its + representatives, including but not limited to communication on electronic + mailing lists, source code control systems, and issue tracking systems that + are managed by, or on behalf of, the Licensor for the purpose of discussing + and improving the Work, but excluding communication that is conspicuously + marked or otherwise designated in writing by the copyright owner as “Not a + Contribution.”

+ +

“Contributor” shall mean Licensor and any individual or Legal Entity on + behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work.

+ +

2. Grant of Copyright License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby + grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, + irrevocable copyright license to reproduce, prepare Derivative Works of, publicly + display, publicly perform, sublicense, and distribute the Work and such + Derivative Works in Source or Object form.

+ +

3. Grant of Patent License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby grants + to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, use, + offer to sell, sell, import, and otherwise transfer the Work, where such + license applies only to those patent claims licensable by such Contributor + that are necessarily infringed by their Contribution(s) alone or by + combination of their Contribution(s) with the Work to which such + Contribution(s) was submitted. If You institute patent litigation against + any entity (including a cross-claim or counterclaim in a lawsuit) alleging + that the Work or a Contribution incorporated within the Work constitutes + direct or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate as of the + date such litigation is filed.

+ +

4. Redistribution.

+ +

You may reproduce and distribute copies of the Work or Derivative Works thereof + in any medium, with or without modifications, and in Source or Object form, provided + that You meet the following conditions:

+ +
    +
  1. You must give any other recipients of the Work or Derivative Works a + copy of this License; and
  2. + +
  3. You must cause any modified files to carry prominent notices stating + that You changed the files; and
  4. + +
  5. You must retain, in the Source form of any Derivative Works that You + distribute, all copyright, patent, trademark, and attribution notices from + the Source form of the Work, excluding those notices that do not pertain to + any part of the Derivative Works; and
  6. + +
  7. If the Work includes a “NOTICE” text file as part of its distribution, + then any Derivative Works that You distribute must include a readable copy + of the attribution notices contained within such NOTICE file, excluding + those notices that do not pertain to any part of the Derivative Works, in + at least one of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or documentation, + if provided along with the Derivative Works; or, within a display generated + by the Derivative Works, if and wherever such third-party notices normally + appear. The contents of the NOTICE file are for informational purposes only + and do not modify the License. You may add Your own attribution notices + within Derivative Works that You distribute, alongside or as an addendum to + the NOTICE text from the Work, provided that such additional attribution + notices cannot be construed as modifying the License. +
    +
    + You may add Your own copyright statement to Your modifications and may + provide additional or different license terms and conditions for use, + reproduction, or distribution of Your modifications, or for any such + Derivative Works as a whole, provided Your use, reproduction, and + distribution of the Work otherwise complies with the conditions stated in + this License.
  8. +
+ +

5. Submission of Contributions.

+ +

Unless You explicitly state otherwise, any Contribution intentionally submitted for + inclusion in the Work by You to the Licensor shall be under the terms and + conditions of this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify the + terms of any separate license agreement you may have executed with Licensor + regarding such Contributions.

+ +

6. Trademarks.

+ +

This License does not grant permission to use the trade names, trademarks, service marks, + or product names of the Licensor, except as required for reasonable and customary use + in describing the origin of the Work and reproducing the content of the + NOTICE file.

+ +

7. Disclaimer of Warranty.

+ +

Unless required by applicable law or agreed to in writing, Licensor provides the Work + (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT + WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, + without limitation, any warranties or conditions of TITLE, + NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You + are solely responsible for determining the appropriateness of using or + redistributing the Work and assume any risks associated with Your exercise + of permissions under this License.

+ +

8. Limitation of Liability.

+ +

In no event and under no legal theory, whether in tort (including negligence), contract, + or otherwise, unless required by applicable law (such as deliberate and + grossly negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a result + of this License or out of the use or inability to use the Work (including + but not limited to damages for loss of goodwill, work stoppage, computer + failure or malfunction, or any and all other commercial damages or losses), + even if such Contributor has been advised of the possibility of such + damages.

+ +

9. Accepting Warranty or Additional Liability.

+ +

While redistributing the Work or Derivative Works thereof, You may choose + to offer, and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this License. + However, in accepting such obligations, You may act only on Your own behalf + and on Your sole responsibility, not on behalf of any other Contributor, + and only if You agree to indemnify, defend, and hold each Contributor + harmless for any liability incurred by, or claims asserted against, such + Contributor by reason of your accepting any such warranty or additional + liability.

+ +

END OF TERMS AND CONDITIONS

+ +

APPENDIX: How to apply the Apache License to your work

+ +

To apply the Apache License to your work, attach the following boilerplate + notice, with the fields enclosed by brackets “[]” replaced with your own + identifying information. (Don’t include the brackets!) The text should be + enclosed in the appropriate comment syntax for the file format. We also + recommend that a file or class name and description of purpose be included + on the same “printed page” as the copyright notice for easier + identification within third-party archives.

+
Copyright [yyyy] [name of copyright owner]
+
+Licensed under the Apache License,
+Version 2.0 (the “License”);
+you may not use this file except
+in compliance with the License.
+You may obtain a copy of the License at
+
+http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law
+or agreed to in writing, software
+distributed under the License is
+distributed on an “AS IS” BASIS,
+WITHOUT WARRANTIES OR CONDITIONS
+OF ANY KIND, either express or implied.
+See the License for the specific
+language governing permissions and
+limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/ru/about_licenses_dark.html b/app/src/main/assets/ru/about_licenses_dark.html deleted file mode 100644 index 31185614..00000000 --- a/app/src/main/assets/ru/about_licenses_dark.html +++ /dev/null @@ -1,1064 +0,0 @@ - - - - - - - - - - -

Авторские права

-

Авторские права Privacy Browser © 2015-2020 Soren Stoutner.

- -

Лицензия

-

Privacy Browser выпущен под лицензией GPLv3+. Полный текст лицензии приведен ниже. - Исходный код доступен на git.stoutner.com.

- -

Списки блокировки

-

EasyList и EasyPrivacy - лицензированы под лицензиями GPLv3+ - и Creative Commons Attribution-ShareAlike 3.0+ Unported. - Privacy Browser использует их с помощью опции GPLv3+.

- -

Fanboy’s Annoyance List и Fanboy’s Social Blocking List - выпущены под лицензией Creative Commons Attribution 3.0 Unported, - которая совместима с GPLv3+. Списки включены без изменений в Privacy Browser.

- -

Более подробную информацию о списках блокировки можно найти на веб-сайте EasyList.

- -

Библиотеки

-

Privacy Browser создан на базе библиотек AndroidX, - Kotlin - и кодовой базы из репозитория Google Material Maven, - которые выпущены под лицензией Apache 2.0.

- -

Бесплатный вариант Privacy Browser создан с помощью Firebase Ads, - выпущенной по лицензии Android Software Development Kit License.

- -

Классы

-

com.stoutner.privacybrowser.views.CheckedLinearLayout является модифицированной версией класса, содержащегося в исходном коде - Android Camera. - Оригинальный файл был выпущен под лицензией Apache 2.0. - Модифицированный файл выпущен под лицензией GPLv3+.

- -

Иконки

-

- являются производными от security и language, которые являются частью - Android Material icon set и выпущены под Apache License 2.0. Полный текст лицензии приведен ниже. - Модификации авторских прав © 2016 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

являются производными от folder и exit_to_app, которые являются частью - Android Material icon set и выпущены под Apache License 2.0. - Модификации авторских прав © 2017 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

являются производными от bookmark и create_new_folder, которые являются частью - Android Material icon set и выпущены под Apache License 2.0. - Модификации авторских прав © 2017 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

являются производными от create_new_folder, которые являются частью - Android Material icon set и выпущены под Apache License 2.0. - Модификации авторских прав © 2017 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

являются производными от exit_to_app, - которые являются частью Android Material icon set и выпущены под Apache License 2.0. - Модификации авторских прав © 2017 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

являются производными от compare, которые являются частью Android Material icon set - и выпущены под Apache License 2.0. - Модификации авторских прав © 2017 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

являются производными от sort, - которые являются частью Android Material icon set и выпущены под Apache License 2.0. - Модификации авторских прав © 2019 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

cookie были созданы Google. Они выпущены под Apache License 2.0 - и могут быть загружены из Material Design Icons. Он неизменен, за исключением такой информации, как цвет и размер.

-

Следующие значки взяты изAndroid Material icon set, - которые выпущены под Apache License 2.0. - Они неизменны, за исключением такой информации, как цвет и размер. Некоторые из них были переименованы в соответствии с их использованием в коде. Оригинальные значки и имена показаны ниже.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

- -
- -

GNU General Public License

-

Version 3, 29 June 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.

- -

Preamble

- -

The GNU General Public License is a free, copyleft license for - software and other kinds of works.

- -

The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a program—to make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.

- -

When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.

- -

To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.

- -

For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.

- -

Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.

- -

For the developers’ and authors’ protection, the GPL clearly explains - that there is no warranty for this free software. For both users’ and - authors’ sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.

- -

Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting users’ freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.

- -

Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.

- -

The precise terms and conditions for copying, distribution and - modification follow.

- -

TERMS AND CONDITIONS

- -

0. Definitions.

- -

“This License” refers to version 3 of the GNU General Public License.

- -

“Copyright” also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.

- -

“The Program” refers to any copyrightable work licensed under this - License. Each licensee is addressed as “you”. “Licensees” and - “recipients” may be individuals or organizations.

- -

To “modify” a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a “modified version” of the - earlier work or a work “based on” the earlier work.

- -

A “covered work” means either the unmodified Program or a work based - on the Program.

- -

To “propagate” a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.

- -

To “convey” a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.

- -

An interactive user interface displays “Appropriate Legal Notices” - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.

- -

1. Source Code.

- -

The “source code” for a work means the preferred form of the work - for making modifications to it. “Object code” means any non-source - form of a work.

- -

A “Standard Interface” means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.

- -

The “System Libraries” of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - “Major Component”, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.

- -

The “Corresponding Source” for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the work’s - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.

- -

The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.

- -

The Corresponding Source for a work in source code form is that - same work.

- -

2. Basic Permissions.

- -

All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.

- -

You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.

- -

Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.

- -

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

- -

No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.

- -

When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the work’s - users, your or third parties’ legal rights to forbid circumvention of - technological measures.

- -

4. Conveying Verbatim Copies.

- -

You may convey verbatim copies of the Program’s source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.

- -

You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.

- -

5. Conveying Modified Source Versions.

- -

You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:

- -
    -
  • a) The work must carry prominent notices stating that you modified - it, and giving a relevant date.
  • - -
  • b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - “keep intact all notices”.
  • - -
  • c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it.
  • - -
  • d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so.
  • -
- -

A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - “aggregate” if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilation’s users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.

- -

6. Conveying Non-Source Forms.

- -

You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:

- -
    -
  • a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange.
  • - -
  • b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge.
  • - -
  • c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b.
  • - -
  • d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements.
  • - -
  • e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d.
  • -
- -

A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.

- -

A “User Product” is either (1) a “consumer product”, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, “normally used” refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.

- -

“Installation Information” for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.

- -

If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).

- -

The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.

- -

Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.

- -

7. Additional Terms.

- -

“Additional permissions” are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.

- -

When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.

- -

Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:

- -
    -
  • a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or
  • - -
  • b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or
  • - -
  • c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or
  • - -
  • d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or
  • - -
  • e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or
  • - -
  • f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors.
  • -
- -

All other non-permissive additional terms are considered “further - restrictions” within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.

- -

If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.

- -

Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.

- -

8. Termination.

- -

You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).

- -

However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.

- -

Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.

- -

Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.

- -

9. Acceptance Not Required for Having Copies.

- -

You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.

- -

10. Automatic Licensing of Downstream Recipients.

- -

Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.

- -

An “entity transaction” is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the party’s predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.

- -

You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.

- -

11. Patents.

- -

A “contributor” is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributor’s “contributor version”.

- -

A contributor’s “essential patent claims” are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, “control” includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.

- -

Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributor’s essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.

- -

In the following three paragraphs, a “patent license” is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To “grant” such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.

- -

If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. “Knowingly relying” means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipient’s use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.

- -

If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.

- -

A patent license is “discriminatory” if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.

- -

Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.

- -

12. No Surrender of Others’ Freedom.

- -

If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.

- -

13. Use with the GNU Affero General Public License.

- -

Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.

- -

14. Revised Versions of this License.

- -

The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.

- -

Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License “or any later version” applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.

- -

If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxy’s - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.

- -

Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.

- -

15. Disclaimer of Warranty.

- -

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

- -

16. Limitation of Liability.

- -

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.

- -

17. Interpretation of Sections 15 and 16.

- -

If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.

- -

END OF TERMS AND CONDITIONS

- -

How to Apply These Terms to Your New Programs

- -

If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.

- -

To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the “copyright” line and a pointer to where the full notice is found.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Also add information on how to contact you by electronic and paper mail.

- -

If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your program’s commands - might be different; for a GUI interface, you would use an “about box”.

- -

You should also get your employer (if you work as a programmer) or school, - if any, to sign a “copyright disclaimer” for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.

- -

The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/ru/about_licenses_light.html b/app/src/main/assets/ru/about_licenses_light.html deleted file mode 100644 index 9d6fce31..00000000 --- a/app/src/main/assets/ru/about_licenses_light.html +++ /dev/null @@ -1,1064 +0,0 @@ - - - - - - - - - - -

Авторские права

-

Авторские права Privacy Browser © 2015-2020 Soren Stoutner.

- -

Лицензия

-

Privacy Browser выпущен под лицензией GPLv3+. Полный текст лицензии приведен ниже. - Исходный код доступен на git.stoutner.com.

- -

Списки блокировки

-

EasyList и EasyPrivacy - лицензированы под лицензиями GPLv3+ - и Creative Commons Attribution-ShareAlike 3.0+ Unported. - Privacy Browser использует их с помощью опции GPLv3+.

- -

Fanboy’s Annoyance List и Fanboy’s Social Blocking List - выпущены под лицензией Creative Commons Attribution 3.0 Unported, - которая совместима с GPLv3+. Списки включены без изменений в Privacy Browser.

- -

Более подробную информацию о списках блокировки можно найти на веб-сайте EasyList.

- -

Библиотеки

-

Privacy Browser создан на базе библиотек AndroidX, - Kotlin - и кодовой базы из репозитория Google Material Maven, - которые выпущены под лицензией Apache 2.0.

- -

Бесплатный вариант Privacy Browser создан с помощью Firebase Ads, - выпущенной по лицензии Android Software Development Kit License.

- -

Классы

-

com.stoutner.privacybrowser.views.CheckedLinearLayout является модифицированной версией класса, содержащегося в исходном коде - Android Camera. - Оригинальный файл был выпущен под лицензией Apache 2.0. - Модифицированный файл выпущен под лицензией GPLv3+.

- -

Иконки

-

- являются производными от security и language, которые являются частью - Android Material icon set и выпущены под Apache License 2.0. Полный текст лицензии приведен ниже. - Модификации авторских прав © 2016 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

являются производными от folder и exit_to_app, которые являются частью - Android Material icon set и выпущены под Apache License 2.0. - Модификации авторских прав © 2017 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

являются производными от bookmark и create_new_folder, которые являются частью - Android Material icon set и выпущены под Apache License 2.0. - Модификации авторских прав © 2017 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

являются производными от create_new_folder, которые являются частью - Android Material icon set и выпущены под Apache License 2.0. - Модификации авторских прав © 2017 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

являются производными от exit_to_app, - которые являются частью Android Material icon set и выпущены под Apache License 2.0. - Модификации авторских прав © 2017 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

являются производными от compare, - которые являются частью Android Material icon set и выпущены под Apache License 2.0. - Модификации авторских прав © 2017 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

являются производными от sort, - которые являются частью Android Material icon set и выпущены под Apache License 2.0. - Модификации авторских прав © 2019 Soren Stoutner. - Полученные изображения выпущены под лицензией GPLv3+.

-

cookie были созданы Google. Они выпущены под Apache License 2.0 - и могут быть загружены из Material Design Icons. Он неизменен, за исключением такой информации, как цвет и размер.

-

Следующие значки взяты изAndroid Material icon set, - которые выпущены под Apache License 2.0. - Они неизменны, за исключением такой информации, как цвет и размер. Некоторые из них были переименованы в соответствии с их использованием в коде. Оригинальные значки и имена показаны ниже.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

- -
- -

GNU General Public License

-

Version 3, 29 June 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.

- -

Preamble

- -

The GNU General Public License is a free, copyleft license for - software and other kinds of works.

- -

The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a program—to make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.

- -

When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.

- -

To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.

- -

For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.

- -

Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.

- -

For the developers’ and authors’ protection, the GPL clearly explains - that there is no warranty for this free software. For both users’ and - authors’ sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.

- -

Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting users’ freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.

- -

Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.

- -

The precise terms and conditions for copying, distribution and - modification follow.

- -

TERMS AND CONDITIONS

- -

0. Definitions.

- -

“This License” refers to version 3 of the GNU General Public License.

- -

“Copyright” also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.

- -

“The Program” refers to any copyrightable work licensed under this - License. Each licensee is addressed as “you”. “Licensees” and - “recipients” may be individuals or organizations.

- -

To “modify” a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a “modified version” of the - earlier work or a work “based on” the earlier work.

- -

A “covered work” means either the unmodified Program or a work based - on the Program.

- -

To “propagate” a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.

- -

To “convey” a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.

- -

An interactive user interface displays “Appropriate Legal Notices” - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.

- -

1. Source Code.

- -

The “source code” for a work means the preferred form of the work - for making modifications to it. “Object code” means any non-source - form of a work.

- -

A “Standard Interface” means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.

- -

The “System Libraries” of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - “Major Component”, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.

- -

The “Corresponding Source” for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the work’s - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.

- -

The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.

- -

The Corresponding Source for a work in source code form is that - same work.

- -

2. Basic Permissions.

- -

All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.

- -

You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.

- -

Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.

- -

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

- -

No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.

- -

When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the work’s - users, your or third parties’ legal rights to forbid circumvention of - technological measures.

- -

4. Conveying Verbatim Copies.

- -

You may convey verbatim copies of the Program’s source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.

- -

You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.

- -

5. Conveying Modified Source Versions.

- -

You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:

- -
    -
  • a) The work must carry prominent notices stating that you modified - it, and giving a relevant date.
  • - -
  • b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - “keep intact all notices”.
  • - -
  • c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it.
  • - -
  • d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so.
  • -
- -

A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - “aggregate” if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilation’s users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.

- -

6. Conveying Non-Source Forms.

- -

You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:

- -
    -
  • a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange.
  • - -
  • b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge.
  • - -
  • c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b.
  • - -
  • d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements.
  • - -
  • e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d.
  • -
- -

A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.

- -

A “User Product” is either (1) a “consumer product”, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, “normally used” refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.

- -

“Installation Information” for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.

- -

If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).

- -

The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.

- -

Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.

- -

7. Additional Terms.

- -

“Additional permissions” are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.

- -

When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.

- -

Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:

- -
    -
  • a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or
  • - -
  • b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or
  • - -
  • c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or
  • - -
  • d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or
  • - -
  • e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or
  • - -
  • f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors.
  • -
- -

All other non-permissive additional terms are considered “further - restrictions” within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.

- -

If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.

- -

Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.

- -

8. Termination.

- -

You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).

- -

However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.

- -

Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.

- -

Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.

- -

9. Acceptance Not Required for Having Copies.

- -

You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.

- -

10. Automatic Licensing of Downstream Recipients.

- -

Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.

- -

An “entity transaction” is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the party’s predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.

- -

You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.

- -

11. Patents.

- -

A “contributor” is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributor’s “contributor version”.

- -

A contributor’s “essential patent claims” are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, “control” includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.

- -

Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributor’s essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.

- -

In the following three paragraphs, a “patent license” is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To “grant” such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.

- -

If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. “Knowingly relying” means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipient’s use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.

- -

If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.

- -

A patent license is “discriminatory” if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.

- -

Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.

- -

12. No Surrender of Others’ Freedom.

- -

If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.

- -

13. Use with the GNU Affero General Public License.

- -

Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.

- -

14. Revised Versions of this License.

- -

The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.

- -

Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License “or any later version” applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.

- -

If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxy’s - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.

- -

Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.

- -

15. Disclaimer of Warranty.

- -

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

- -

16. Limitation of Liability.

- -

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.

- -

17. Interpretation of Sections 15 and 16.

- -

If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.

- -

END OF TERMS AND CONDITIONS

- -

How to Apply These Terms to Your New Programs

- -

If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.

- -

To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the “copyright” line and a pointer to where the full notice is found.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Also add information on how to contact you by electronic and paper mail.

- -

If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your program’s commands - might be different; for a GUI interface, you would use an “about box”.

- -

You should also get your employer (if you work as a programmer) or school, - if any, to sign a “copyright disclaimer” for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.

- -

The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/ru/about_links.html b/app/src/main/assets/ru/about_links.html new file mode 100644 index 00000000..c43550c8 --- /dev/null +++ b/app/src/main/assets/ru/about_links.html @@ -0,0 +1,47 @@ + + + + + + + + + + + + + +

Websites

+ +

+ Новости

+ +

+ Дорожная карта

+ +

+ Система отслеживания ошибок и пожеланий

+ +

+ Форум

+ +

+ GitWeb

+ + \ No newline at end of file diff --git a/app/src/main/assets/ru/about_links_dark.html b/app/src/main/assets/ru/about_links_dark.html deleted file mode 100644 index 151ec018..00000000 --- a/app/src/main/assets/ru/about_links_dark.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - - - - - - - -

Websites

- -

- Новости

- -

- Дорожная карта

- -

- Система отслеживания ошибок и пожеланий

- -

- Форум

- -

- GitWeb

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/about_links_light.html b/app/src/main/assets/ru/about_links_light.html deleted file mode 100644 index eeb9e5c6..00000000 --- a/app/src/main/assets/ru/about_links_light.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - - - - - - - -

Websites

- -

- Новости

- -

- Дорожная карта

- -

- Система отслеживания ошибок и пожеланий

- -

- Форум

- -

- GitWeb

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/about_permissions.html b/app/src/main/assets/ru/about_permissions.html new file mode 100644 index 00000000..deffdbce --- /dev/null +++ b/app/src/main/assets/ru/about_permissions.html @@ -0,0 +1,48 @@ + + + + + + + + + + + + + +

Полный доступ к сети

+

android.permission.INTERNET

+

Требуется для доступа WebView к интернету. Без этого разрешения Privacy Browser будет отображать “Нет браузера: угрозы вашей конфиденциальности нет из-за отсутствия доступа к интернету”.

+ +

Установка ярлыков

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

Требуется для добавления ярлыков веб-сайтов на главный экран.

+ +

Чтение хранилища

+

android.permission.READ_EXTERNAL_STORAGE

+

Требуется для импорта настроек из общих папок. + В Android Marshmallow (API 23) и более поздних версиях, если это разрешение получено не будет, Privacy Browser может импортировать настройки из папок приложения.

+ +

Запись хранилища

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Требуется для экспорта настроек и загрузки файлов в общие папки. + В Android Marshmallow (API 23) и более поздних версиях, если это разрешение получено не будет, Privacy Browser может экспортировать настройки и хранить загрузки в папках приложения.

+ + \ No newline at end of file diff --git a/app/src/main/assets/ru/about_permissions_dark.html b/app/src/main/assets/ru/about_permissions_dark.html deleted file mode 100644 index 27071afb..00000000 --- a/app/src/main/assets/ru/about_permissions_dark.html +++ /dev/null @@ -1,45 +0,0 @@ - - - - - - - - - - -

Полный доступ к сети

-

android.permission.INTERNET

-

Требуется для доступа WebView к интернету. Без этого разрешения Privacy Browser будет отображать “Нет браузера: угрозы вашей конфиденциальности нет из-за отсутствия доступа к интернету”.

- -

Установка ярлыков

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Требуется для добавления ярлыков веб-сайтов на главный экран.

- -

Чтение хранилища

-

android.permission.READ_EXTERNAL_STORAGE

-

Требуется для импорта настроек из общих папок. - В Android Marshmallow (API 23) и более поздних версиях, если это разрешение получено не будет, Privacy Browser может импортировать настройки из папок приложения.

- -

Запись хранилища

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Требуется для экспорта настроек и загрузки файлов в общие папки. - В Android Marshmallow (API 23) и более поздних версиях, если это разрешение получено не будет, Privacy Browser может экспортировать настройки и хранить загрузки в папках приложения.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/about_permissions_light.html b/app/src/main/assets/ru/about_permissions_light.html deleted file mode 100644 index 3d45cdcf..00000000 --- a/app/src/main/assets/ru/about_permissions_light.html +++ /dev/null @@ -1,45 +0,0 @@ - - - - - - - - - - -

Полный доступ к сети

-

android.permission.INTERNET

-

Требуется для доступа WebView к интернету. Без этого разрешения Privacy Browser будет отображать “Нет браузера: угрозы вашей конфиденциальности нет из-за отсутствия доступа к интернету”.

- -

Установка ярлыков

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Требуется для добавления ярлыков веб-сайтов на главный экран.

- -

Чтение хранилища

-

android.permission.READ_EXTERNAL_STORAGE

-

Требуется для импорта настроек из общих папок. - В Android Marshmallow (API 23) и более поздних версиях, если это разрешение получено не будет, Privacy Browser может импортировать настройки из папок приложения.

- -

Запись хранилища

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Требуется для экспорта настроек и загрузки файлов в общие папки. - В Android Marshmallow (API 23) и более поздних версиях, если это разрешение получено не будет, Privacy Browser может экспортировать настройки и хранить загрузки в папках приложения.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/about_privacy_policy.html b/app/src/main/assets/ru/about_privacy_policy.html new file mode 100644 index 00000000..4f5e698d --- /dev/null +++ b/app/src/main/assets/ru/about_privacy_policy.html @@ -0,0 +1,93 @@ + + + + + + + + + + + + + +

Privacy Browser

+

Privacy Browser не собирает никакой пользовательской информации.

+ + +

Google Play

+

Google Play имеет собственную политику конфиденциальности. + Google предоставляет разработчикам сводную анонимизированную информацию об установке, включающую их количество, организованную по следующим категориям.

+
    +
  • Версия Android (напр. Android 7.1)
  • +
  • Устройство (напр. Samsung Galaxy S6 [zeroflte])
  • +
  • Планшеты (напр. Tablets 10" и выше)
  • +
  • Страна (напр. Russian Federation)
  • +
  • Язык (напр. Russian)
  • +
  • Версия приложения (напр. 14)
  • +
  • Оператор (напр. Beeline - RU)
  • +
+ + +

Рейтинги Google Play

+

Google Play имеет собственную политику конфиденциальности. + Google предоставляет разработчикам анонимизированные сводки следующей информации, связанной с пользовательскими рейтингами.

+
    +
  • Страна (напр. Russian Federation)
  • +
  • Язык (напр. Russian)
  • +
  • Версия приложения (напр. 14)
  • +
  • Версия Android (напр. Android 7.1)
  • +
  • Устройство (напр. Google Nexus 5X [bullhead])
  • +
  • Планшеты (напр. Tablets 10" и выше)
  • +
+ + +

Отзывы Google Play

+

Google Play имеет собственную политику конфиденциальности. + Помимо имени автора отзыва, оценки и текста отзыва (все они доступны публично), Google предоставляет разработчику некоторую или всю следующую информацию.

+
    +
  • Код версии (напр. 7)
  • +
  • Имя версии (напр. 1.6)
  • +
  • Версия Android (напр. Android 5.1)
  • +
  • Устройство (напр. Galaxy S6 Edge+ [zenlte])
  • +
  • Производитель (напр. Samsung)
  • +
  • Тип устройства (напр. Phone)
  • +
  • Производитель CPU (напр. Samsung)
  • +
  • Модель CPU (напр. Exynos 7420)
  • +
  • Разрешение экрана (напр. 560 dpi)
  • +
  • Размер экрана (напр. 2560 x 1440)
  • +
  • ОЗУ (напр. 4096 MB)
  • +
  • Собственная платформа (напр. armeabi-v7a,armeabi,arm64v8a)
  • +
  • Версия OpenGL ES (напр. 3.1)
  • +
  • Язык устройства (напр. Russian)
  • +
+ + +

Прямая связь

+

Пользователи могут напрямую связаться со Stoutner при помощи электронной почты и комментариев на stoutner.com.

+ + +

Использование информации

+

Stoutner может использовать эту информацию, как помощь в разработке Privacy Browser и сообщать о статусе проекта пользователям. + Stoutner никогда не будет продавать эту информацию или передавать ее третьей стороне, которая использовала бы ее для рекламы или маркетинга.

+ +
+

Ревизия 1.7, 14 мая 2019 года

+ + \ No newline at end of file diff --git a/app/src/main/assets/ru/about_privacy_policy_dark.html b/app/src/main/assets/ru/about_privacy_policy_dark.html deleted file mode 100644 index efa39e70..00000000 --- a/app/src/main/assets/ru/about_privacy_policy_dark.html +++ /dev/null @@ -1,90 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser не собирает никакой пользовательской информации.

- - -

Google Play

-

Google Play имеет собственную политику конфиденциальности. - Google предоставляет разработчикам сводную анонимизированную информацию об установке, включающую их количество, организованную по следующим категориям.

-
    -
  • Версия Android (напр. Android 7.1)
  • -
  • Устройство (напр. Samsung Galaxy S6 [zeroflte])
  • -
  • Планшеты (напр. Tablets 10" и выше)
  • -
  • Страна (напр. Russian Federation)
  • -
  • Язык (напр. Russian)
  • -
  • Версия приложения (напр. 14)
  • -
  • Оператор (напр. Beeline - RU)
  • -
- - -

Рейтинги Google Play

-

Google Play имеет собственную политику конфиденциальности. - Google предоставляет разработчикам анонимизированные сводки следующей информации, связанной с пользовательскими рейтингами.

-
    -
  • Страна (напр. Russian Federation)
  • -
  • Язык (напр. Russian)
  • -
  • Версия приложения (напр. 14)
  • -
  • Версия Android (напр. Android 7.1)
  • -
  • Устройство (напр. Google Nexus 5X [bullhead])
  • -
  • Планшеты (напр. Tablets 10" и выше)
  • -
- - -

Отзывы Google Play

-

Google Play имеет собственную политику конфиденциальности. - Помимо имени автора отзыва, оценки и текста отзыва (все они доступны публично), Google предоставляет разработчику некоторую или всю следующую информацию.

-
    -
  • Код версии (напр. 7)
  • -
  • Имя версии (напр. 1.6)
  • -
  • Версия Android (напр. Android 5.1)
  • -
  • Устройство (напр. Galaxy S6 Edge+ [zenlte])
  • -
  • Производитель (напр. Samsung)
  • -
  • Тип устройства (напр. Phone)
  • -
  • Производитель CPU (напр. Samsung)
  • -
  • Модель CPU (напр. Exynos 7420)
  • -
  • Разрешение экрана (напр. 560 dpi)
  • -
  • Размер экрана (напр. 2560 x 1440)
  • -
  • ОЗУ (напр. 4096 MB)
  • -
  • Собственная платформа (напр. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Версия OpenGL ES (напр. 3.1)
  • -
  • Язык устройства (напр. Russian)
  • -
- - -

Прямая связь

-

Пользователи могут напрямую связаться со Stoutner при помощи электронной почты и комментариев на stoutner.com.

- - -

Использование информации

-

Stoutner может использовать эту информацию, как помощь в разработке Privacy Browser и сообщать о статусе проекта пользователям. - Stoutner никогда не будет продавать эту информацию или передавать ее третьей стороне, которая использовала бы ее для рекламы или маркетинга.

- -
-

Ревизия 1.6, 22 мая 2018 года

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/about_privacy_policy_light.html b/app/src/main/assets/ru/about_privacy_policy_light.html deleted file mode 100644 index 3ccd02e2..00000000 --- a/app/src/main/assets/ru/about_privacy_policy_light.html +++ /dev/null @@ -1,90 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser не собирает никакой пользовательской информации.

- - -

Google Play

-

Google Play имеет собственную политику конфиденциальности. - Google предоставляет разработчикам сводную анонимизированную информацию об установке, включающую их количество, организованную по следующим категориям.

-
    -
  • Версия Android (напр. Android 7.1)
  • -
  • Устройство (напр. Samsung Galaxy S6 [zeroflte])
  • -
  • Планшеты (напр. Tablets 10" и выше)
  • -
  • Страна (напр. Russian Federation)
  • -
  • Язык (напр. Russian)
  • -
  • Версия приложения (напр. 14)
  • -
  • Оператор (напр. Beeline - RU)
  • -
- - -

Рейтинги Google Play

-

Google Play имеет собственную политику конфиденциальности. - Google предоставляет разработчикам анонимизированные сводки следующей информации, связанной с пользовательскими рейтингами.

-
    -
  • Страна (напр. Russian Federation)
  • -
  • Язык (напр. Russian)
  • -
  • Версия приложения (напр. 14)
  • -
  • Версия Android (напр. Android 7.1)
  • -
  • Устройство (напр. Google Nexus 5X [bullhead])
  • -
  • Планшеты (напр. Tablets 10" и выше)
  • -
- - -

Отзывы Google Play

-

Google Play имеет собственную политику конфиденциальности. - Помимо имени автора отзыва, оценки и текста отзыва (все они доступны публично), Google предоставляет разработчику некоторую или всю следующую информацию.

-
    -
  • Код версии (напр. 7)
  • -
  • Имя версии (напр. 1.6)
  • -
  • Версия Android (напр. Android 5.1)
  • -
  • Устройство (напр. Galaxy S6 Edge+ [zenlte])
  • -
  • Производитель (напр. Samsung)
  • -
  • Тип устройства (напр. Phone)
  • -
  • Производитель CPU (напр. Samsung)
  • -
  • Модель CPU (напр. Exynos 7420)
  • -
  • Разрешение экрана (напр. 560 dpi)
  • -
  • Размер экрана (напр. 2560 x 1440)
  • -
  • ОЗУ (напр. 4096 MB)
  • -
  • Собственная платформа (напр. armeabi-v7a,armeabi,arm64v8a)
  • -
  • Версия OpenGL ES (напр. 3.1)
  • -
  • Язык устройства (напр. Russian)
  • -
- - -

Прямая связь

-

Пользователи могут напрямую связаться со Stoutner при помощи электронной почты и комментариев на stoutner.com.

- - -

Использование информации

-

Stoutner может использовать эту информацию, как помощь в разработке Privacy Browser и сообщать о статусе проекта пользователям. - Stoutner никогда не будет продавать эту информацию или передавать ее третьей стороне, которая использовала бы ее для рекламы или маркетинга.

- -
-

Ревизия 1.6, 22 мая 2018 года

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_domain_settings.html b/app/src/main/assets/ru/guide_domain_settings.html new file mode 100644 index 00000000..f1fc5b94 --- /dev/null +++ b/app/src/main/assets/ru/guide_domain_settings.html @@ -0,0 +1,41 @@ + + + + + + + + + + + + + +

Безопасный просмотр веб-страниц

+ +

По умолчанию в Privacy Browser отключены JavaScript, файлы cookie и DOM-хранилище. Однако, для правильной работы, некоторым веб-сайтам эти опции необходимы. + Настройки домена могут автоматически включать нужный набор опций при посещении определенного домена.

+ + + +

При посещении домена, для которого определены настройки, фон поля URL становится зеленым.

+ + + + \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_domain_settings_dark.html b/app/src/main/assets/ru/guide_domain_settings_dark.html deleted file mode 100644 index 4ef287d9..00000000 --- a/app/src/main/assets/ru/guide_domain_settings_dark.html +++ /dev/null @@ -1,38 +0,0 @@ - - - - - - - - - - -

Безопасный просмотр веб-страниц

- -

По умолчанию в Privacy Browser отключены JavaScript, файлы cookie и DOM-хранилище. Однако, для правильной работы, некоторым веб-сайтам эти опции необходимы. - Настройки домена могут автоматически включать нужный набор опций при посещении определенного домена.

- -

- -

При посещении домена, для которого определены настройки, фон поля URL становится зеленым.

- -

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_domain_settings_light.html b/app/src/main/assets/ru/guide_domain_settings_light.html deleted file mode 100644 index fc4f9162..00000000 --- a/app/src/main/assets/ru/guide_domain_settings_light.html +++ /dev/null @@ -1,38 +0,0 @@ - - - - - - - - - - -

Безопасный просмотр веб-страниц

- -

По умолчанию в Privacy Browser отключены JavaScript, файлы cookie и DOM-хранилище. Однако, для правильной работы, некоторым веб-сайтам эти опции необходимы. - Настройки домена могут автоматически включать нужный набор опций при посещении определенного домена.

- -

- -

При посещении домена, для которого определены настройки, фон поля URL становится зеленым.

- -

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_javascript.html b/app/src/main/assets/ru/guide_javascript.html new file mode 100644 index 00000000..e942f31c --- /dev/null +++ b/app/src/main/assets/ru/guide_javascript.html @@ -0,0 +1,61 @@ + + + + + + + + + + + + + +

JavaScript это сила

+ +

В самом начале эпохи интернета веб-страницы были статическими, они содержали только текст и изображения, не изменялись и не взаимодействовали с пользователем. + Статические веб-страницы имеют множество ограничений, поэтому велась разработка более функциональных решений. + Для упрощения создания динамических веб-страниц было разработано несколько различных технологий. JavaScript является одной из таких технологий.

+ +

JavaScript - это язык программирования. Программы, написанные на JavaScript, размещаются на веб-серверах и отправляются на устройства как часть веб-страницы. + Устройство выполняет JavaScript на своем локальном процессоре и следует командам программы, которые могут анимировать изображения на веб-сайте, + вызывать всплывающие меню и делать много других полезных вещей.

+ + +

JavaScript это опасность

+ +

Конечно, концепция запуска произвольных программ с веб-сайта потенциально опасна. Поэтому, в JavaScript встроены ограничения, позволяющие ему не делать такие вещи, как установка вирусов. + Однако оказывается, что эти ограничения слишком широки. + Ниже представлен скриншот с сайта webkay, демонстрирующий какую информацию может извлекать JavaScript из устройства. + Утечки браузера - еще один хороший ресурс.

+ + + +

Из соображений конфиденциальности идеальным был бы просмотр интернета с отключенным JavaScript. + Однако, существуют веб-сайты, которые на законных основаниях требуют JavaScript для выполнения своих задач, а некоторые вообще не могут корректно работать без JavaScript, несмотря на то, + что могут быть запрограммированы и без столь жестких условий. Privacy Browser решает эту задачу, упрощая включение и выключение JavaScript. + Нажатие на щит переключит его между синим или желтым + цветом (оба указывают на то, что JavaScript отключен) и красным (JavaScript включен). + Можете просмотреть информацию на сайте webkay, которую можно собрать с включенным и отключенным JavaScript. + +

Просмотр сайтов с отключенным JavaScript и включение его только в случае необходимости, значительно повышает конфиденциальность пользователей. + Кроме того, JavaScript используется для загрузки большей части раздражающей рекламы, а также хлама, который отправляется на устройства с большинства современных веб-сайтов. + После его отключения веб-сайты будут загружаться быстрее, потреблять меньше сетевого трафика и меньше нагружать процессор, что приведет к увеличению времени автономной работы.

+ + \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_javascript_dark.html b/app/src/main/assets/ru/guide_javascript_dark.html deleted file mode 100644 index 164339bb..00000000 --- a/app/src/main/assets/ru/guide_javascript_dark.html +++ /dev/null @@ -1,58 +0,0 @@ - - - - - - - - - - -

JavaScript это сила

- -

В самом начале эпохи интернета веб-страницы были статическими, они содержали только текст и изображения, не изменялись и не взаимодействовали с пользователем. - Статические веб-страницы имеют множество ограничений, поэтому велась разработка более функциональных решений. - Для упрощения создания динамических веб-страниц было разработано несколько различных технологий. JavaScript является одной из таких технологий.

- -

JavaScript - это язык программирования. Программы, написанные на JavaScript, размещаются на веб-серверах и отправляются на устройства как часть веб-страницы. - Устройство выполняет JavaScript на своем локальном процессоре и следует командам программы, которые могут анимировать изображения на веб-сайте, - вызывать всплывающие меню и делать много других полезных вещей.

- - -

JavaScript это опасность

- -

Конечно, концепция запуска произвольных программ с веб-сайта потенциально опасна. Поэтому, в JavaScript встроены ограничения, позволяющие ему не делать такие вещи, как установка вирусов. - Однако оказывается, что эти ограничения слишком широки. - Ниже представлен скриншот с сайта webkay, демонстрирующий какую информацию может извлекать JavaScript из устройства. - Утечки браузера - еще один хороший ресурс.

- -

- -

Из соображений конфиденциальности идеальным был бы просмотр интернета с отключенным JavaScript. - Однако, существуют веб-сайты, которые на законных основаниях требуют JavaScript для выполнения своих задач, а некоторые вообще не могут корректно работать без JavaScript, несмотря на то, - что могут быть запрограммированы и без столь жестких условий. Privacy Browser решает эту задачу, упрощая включение и выключение JavaScript. - Нажатие на щит переключит его между синим или желтым - цветом (оба указывают на то, что JavaScript отключен) и красным (JavaScript включен). - Можете просмотреть информацию на сайте webkay, которую можно собрать с включенным и отключенным JavaScript. - -

Просмотр сайтов с отключенным JavaScript и включение его только в случае необходимости, значительно повышает конфиденциальность пользователей. - Кроме того, JavaScript используется для загрузки большей части раздражающей рекламы, а также хлама, который отправляется на устройства с большинства современных веб-сайтов. - После его отключения веб-сайты будут загружаться быстрее, потреблять меньше сетевого трафика и меньше нагружать процессор, что приведет к увеличению времени автономной работы.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_javascript_light.html b/app/src/main/assets/ru/guide_javascript_light.html deleted file mode 100644 index 24eeb12a..00000000 --- a/app/src/main/assets/ru/guide_javascript_light.html +++ /dev/null @@ -1,58 +0,0 @@ - - - - - - - - - - -

JavaScript это сила

- -

В самом начале эпохи интернета веб-страницы были статическими, они содержали только текст и изображения, не изменялись и не взаимодействовали с пользователем. - Статические веб-страницы имеют множество ограничений, поэтому велась разработка более функциональных решений. - Для упрощения создания динамических веб-страниц было разработано несколько различных технологий. JavaScript является одной из таких технологий.

- -

JavaScript - это язык программирования. Программы, написанные на JavaScript, размещаются на веб-серверах и отправляются на устройства как часть веб-страницы. - Устройство выполняет JavaScript на своем локальном процессоре и следует командам программы, которые могут анимировать изображения на веб-сайте, - вызывать всплывающие меню и делать много других полезных вещей.

- - -

JavaScript это опасность

- -

Конечно, концепция запуска произвольных программ с веб-сайта потенциально опасна. Поэтому, в JavaScript встроены ограничения, позволяющие ему не делать такие вещи, как установка вирусов. - Однако оказывается, что эти ограничения слишком широки. - Ниже представлен скриншот с сайта webkay, демонстрирующий какую информацию может извлекать JavaScript из устройства. - Утечки браузера - еще один хороший ресурс.

- -

- -

Из соображений конфиденциальности идеальным был бы просмотр интернета с отключенным JavaScript. - Однако, существуют веб-сайты, которые на законных основаниях требуют JavaScript для выполнения своих задач, а некоторые вообще не могут корректно работать без JavaScript, несмотря на то, - что могут быть запрограммированы и без столь жестких условий. Privacy Browser решает эту задачу, упрощая включение и выключение JavaScript. - Нажатие на щит переключит его между синим или желтым - цветом (оба указывают на то, что JavaScript отключен) и красным (JavaScript включен). - Можете просмотреть информацию на сайте webkay, которую можно собрать с включенным и отключенным JavaScript. - -

Просмотр сайтов с отключенным JavaScript и включение его только в случае необходимости, значительно повышает конфиденциальность пользователей. - Кроме того, JavaScript используется для загрузки большей части раздражающей рекламы, а также хлама, который отправляется на устройства с большинства современных веб-сайтов. - После его отключения веб-сайты будут загружаться быстрее, потреблять меньше сетевого трафика и меньше нагружать процессор, что приведет к увеличению времени автономной работы.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_local_storage.html b/app/src/main/assets/ru/guide_local_storage.html new file mode 100644 index 00000000..94fc93ca --- /dev/null +++ b/app/src/main/assets/ru/guide_local_storage.html @@ -0,0 +1,94 @@ + + + + + + + + + + + + + +

Первичные файлы cookie

+ +

Первичные файлы cookie устанавливаются тем веб-сайтом, который указан в строке URL.

+ +

С первых дней интернета стало очевидным, что веб-сайтам было бы выгодно иметь возможность хранить информацию на компьютере для последующего доступа к ней. + Например, веб-сайт, предоставляющий информацию о погоде, может запросить у пользователя название города, а затем сохранить его в файле cookie. + При следующем посещении веб-сайта информация о погоде будет автоматически загружена для этого города, без необходимости вводить его снова.

+ +

Как и со всем остальным в интернете, умные люди выяснили все способы злоупотребления cookie, чтобы делать то, что пользователи не одобрят, если узнают что именно происходит. + Например, веб-сайт может установить файл cookie на устройстве с уникальным номером. + Затем каждый раз, когда пользователь посещает веб-сайт с этого устройства, он может быть связан с уникальным профилем, который сервер хранит для этого номера, + даже если устройство подключается с разных IP-адресов.

+ +

Почти все веб-сайты с формами авторизации требуют, чтобы для входа в систему у пользователя были включены первичные файлы cookie. + Именно так они убеждаются, что это все еще вы, когда вы переходите со страницы на страницу на сайте, и, на мой взгляд, это один из немногих законных способов использования файлов cookie.

+ +

Если первичные файлы cookie включены, но JavaScript отключен, значок конфиденциальности будет желтым как предупреждение.

+ + +

Сторонние файлы cookie

+ +

Сторонние файлы cookie устанавливаются частями веб-сайта, которые загружаются с серверов, отличных от указанного в строке URL. + Например, большинство веб-сайтов, на которых есть реклама, загружают их со стороннего рекламного брокера, например, + Google AdSense. Каждый раз, когда сайт загружается, он запрашивает у рекламного брокера рекламу. + Рекламный брокер анализирует любую информацию, которую они могут иметь о пользователе, просматривает текущую ставку, + которую рекламодатели готовы заплатить за свою рекламу, и выбирает ту, которая будет отображаться. + Раздел веб-сайта, на котором отображается реклама, загружается с сервера рекламного брокера, а не с основного сервера.

+ +

Поскольку большая часть рекламы в интернете обрабатывается лишь несколькими брокерами, им не потребовалось много времени, чтобы понять, + что они могут установить отслеживающий cookie на устройстве пользователя и узнать все посещаемые пользователем сайты. + Каждый раз, когда реклама загружается от брокера, первое, что он делает это проверяет имеет ли устройство уникальный номер отслеживающего cookie. + Если это так, он ищет профиль для этого номера и делает заметку о новом сайте. + Чтобы это проверить, пользователь может выполнить поиск на одном сайте для продукта, который он обычно не ищет, например грецких орехов, + а затем вдруг начать наблюдать рекламу для грецких орехов на каждом посещаемом сайте.

+ +

В дополнение к рекламным брокерам сайты социальных сетей обнаружили, что тоже могли бы принять участие в этом. + Несколько лет назад основные социальные сети, такие как Facebook и Twitter, убедили владельцев большого количества веб-сайтов в том, + что им было бы интересно разместить небольшие значки социальных сетей на своих страницах. Это не просто изображения. + Они содержат встроенный код, который ссылается на сайт в социальных сетях и, среди прочего, + загружает сторонний файл cookie на устройство. + Эти файлы cookie размещаются, даже если у пользователя нет учетной записи на платформе социальных сетей. + Со временем такие компании, как Facebook (который также запустил рекламную сеть), создали довольно большое количество подробных профилей о людях, + у которых даже не было аккаунта на сайте социальной сети.

+ +

Нет ни одной веской причины когда-либо разрешать сторонние файлы cookie. На устройствах с Android KitKat или старше (версия <= 4.4.4 или API <= 20), WebView не + различает первичные и сторонние файлы cookie. + Таким образом, включение первичных файлов cookie также разрешит и сторонние.

+ + +

DOM-хранилище

+ +

Хранилище объектной модели документа (Document Object Model), также известное как веб-хранилище, похоже на cookie (печенье) на стероидах. + Если максимальный общий размер хранилища для всех файлов cookie с одного URL-адреса составляет 4 килобайта, + то DOM-хранилище вмещает в себя мегабайты на сайт. + Поскольку DOM-хранилище использует JavaScript для чтения и записи данных, включение его ни на что не влияет пока отключен JavaScript.

+ + +

Данные формы

+ +

Данные формы содержат информацию, введенную в веб-формы, например имена пользователей, адреса, номера телефонов и т.д., и доступную в раскрывающемся списке при будущих посещениях. + В отличие от других форм локального хранилища данные формы не отправляются на веб-сервер без специального взаимодействия с пользователем. + Начиная с Android Oreo (8.0), данные формы WebView были заменены на службу автозаполнения. + Таким образом, элементы управления данными формы больше не отображаются на новых устройствах Android.

+ + \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_local_storage_dark.html b/app/src/main/assets/ru/guide_local_storage_dark.html deleted file mode 100644 index bd073f74..00000000 --- a/app/src/main/assets/ru/guide_local_storage_dark.html +++ /dev/null @@ -1,91 +0,0 @@ - - - - - - - - - - -

Первичные файлы cookie

- -

Первичные файлы cookie устанавливаются тем веб-сайтом, который указан в строке URL.

- -

С первых дней интернета стало очевидным, что веб-сайтам было бы выгодно иметь возможность хранить информацию на компьютере для последующего доступа к ней. - Например, веб-сайт, предоставляющий информацию о погоде, может запросить у пользователя название города, а затем сохранить его в файле cookie. - При следующем посещении веб-сайта информация о погоде будет автоматически загружена для этого города, без необходимости вводить его снова.

- -

Как и со всем остальным в интернете, умные люди выяснили все способы злоупотребления cookie, чтобы делать то, что пользователи не одобрят, если узнают что именно происходит. - Например, веб-сайт может установить файл cookie на устройстве с уникальным номером. - Затем каждый раз, когда пользователь посещает веб-сайт с этого устройства, он может быть связан с уникальным профилем, который сервер хранит для этого номера, - даже если устройство подключается с разных IP-адресов.

- -

Почти все веб-сайты с формами авторизации требуют, чтобы для входа в систему у пользователя были включены первичные файлы cookie. - Именно так они убеждаются, что это все еще вы, когда вы переходите со страницы на страницу на сайте, и, на мой взгляд, это один из немногих законных способов использования файлов cookie.

- -

Если первичные файлы cookie включены, но JavaScript отключен, значок конфиденциальности будет желтым как предупреждение.

- - -

Сторонние файлы cookie

- -

Сторонние файлы cookie устанавливаются частями веб-сайта, которые загружаются с серверов, отличных от указанного в строке URL. - Например, большинство веб-сайтов, на которых есть реклама, загружают их со стороннего рекламного брокера, например, - Google AdSense. Каждый раз, когда сайт загружается, он запрашивает у рекламного брокера рекламу. - Рекламный брокер анализирует любую информацию, которую они могут иметь о пользователе, просматривает текущую ставку, - которую рекламодатели готовы заплатить за свою рекламу, и выбирает ту, которая будет отображаться. - Раздел веб-сайта, на котором отображается реклама, загружается с сервера рекламного брокера, а не с основного сервера.

- -

Поскольку большая часть рекламы в интернете обрабатывается лишь несколькими брокерами, им не потребовалось много времени, чтобы понять, - что они могут установить отслеживающий cookie на устройстве пользователя и узнать все посещаемые пользователем сайты. - Каждый раз, когда реклама загружается от брокера, первое, что он делает это проверяет имеет ли устройство уникальный номер отслеживающего cookie. - Если это так, он ищет профиль для этого номера и делает заметку о новом сайте. - Чтобы это проверить, пользователь может выполнить поиск на одном сайте для продукта, который он обычно не ищет, например грецких орехов, - а затем вдруг начать наблюдать рекламу для грецких орехов на каждом посещаемом сайте.

- -

В дополнение к рекламным брокерам сайты социальных сетей обнаружили, что тоже могли бы принять участие в этом. - Несколько лет назад основные социальные сети, такие как Facebook и Twitter, убедили владельцев большого количества веб-сайтов в том, - что им было бы интересно разместить небольшие значки социальных сетей на своих страницах. Это не просто изображения. - Они содержат встроенный код, который ссылается на сайт в социальных сетях и, среди прочего, - загружает сторонний файл cookie на устройство. - Эти файлы cookie размещаются, даже если у пользователя нет учетной записи на платформе социальных сетей. - Со временем такие компании, как Facebook (который также запустил рекламную сеть), создали довольно большое количество подробных профилей о людях, - у которых даже не было аккаунта на сайте социальной сети.

- -

Нет ни одной веской причины когда-либо разрешать сторонние файлы cookie. На устройствах с Android KitKat или старше (версия <= 4.4.4 или API <= 20), WebView не - различает первичные и сторонние файлы cookie. - Таким образом, включение первичных файлов cookie также разрешит и сторонние.

- - -

DOM-хранилище

- -

Хранилище объектной модели документа (Document Object Model), также известное как веб-хранилище, похоже на cookie (печенье) на стероидах. - Если максимальный общий размер хранилища для всех файлов cookie с одного URL-адреса составляет 4 килобайта, - то DOM-хранилище вмещает в себя мегабайты на сайт. - Поскольку DOM-хранилище использует JavaScript для чтения и записи данных, включение его ни на что не влияет пока отключен JavaScript.

- - -

Данные формы

- -

Данные формы содержат информацию, введенную в веб-формы, например имена пользователей, адреса, номера телефонов и т.д., и доступную в раскрывающемся списке при будущих посещениях. - В отличие от других форм локального хранилища данные формы не отправляются на веб-сервер без специального взаимодействия с пользователем. - Начиная с Android Oreo (8.0), данные формы WebView были заменены на службу автозаполнения. - Таким образом, элементы управления данными формы больше не отображаются на новых устройствах Android.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_local_storage_light.html b/app/src/main/assets/ru/guide_local_storage_light.html deleted file mode 100644 index 14579020..00000000 --- a/app/src/main/assets/ru/guide_local_storage_light.html +++ /dev/null @@ -1,91 +0,0 @@ - - - - - - - - - - -

Первичные файлы cookie

- -

Первичные файлы cookie устанавливаются тем веб-сайтом, который указан в строке URL.

- -

С первых дней интернета стало очевидным, что веб-сайтам было бы выгодно иметь возможность хранить информацию на компьютере для последующего доступа к ней. - Например, веб-сайт, предоставляющий информацию о погоде, может запросить у пользователя название города, а затем сохранить его в файле cookie. - При следующем посещении веб-сайта информация о погоде будет автоматически загружена для этого города, без необходимости вводить его снова.

- -

Как и со всем остальным в интернете, умные люди выяснили все способы злоупотребления cookie, чтобы делать то, что пользователи не одобрят, если узнают что именно происходит. - Например, веб-сайт может установить файл cookie на устройстве с уникальным номером. - Затем каждый раз, когда пользователь посещает веб-сайт с этого устройства, он может быть связан с уникальным профилем, который сервер хранит для этого номера, - даже если устройство подключается с разных IP-адресов.

- -

Почти все веб-сайты с формами авторизации требуют, чтобы для входа в систему у пользователя были включены первичные файлы cookie. - Именно так они убеждаются, что это все еще вы, когда вы переходите со страницы на страницу на сайте, и, на мой взгляд, это один из немногих законных способов использования файлов cookie.

- -

Если первичные файлы cookie включены, но JavaScript отключен, значок конфиденциальности будет желтым как предупреждение.

- - -

Сторонние файлы cookie

- -

Сторонние файлы cookie устанавливаются частями веб-сайта, которые загружаются с серверов, отличных от указанного в строке URL. - Например, большинство веб-сайтов, на которых есть реклама, загружают их со стороннего рекламного брокера, например, - Google AdSense. Каждый раз, когда сайт загружается, он запрашивает у рекламного брокера рекламу. - Рекламный брокер анализирует любую информацию, которую они могут иметь о пользователе, просматривает текущую ставку, - которую рекламодатели готовы заплатить за свою рекламу, и выбирает ту, которая будет отображаться. - Раздел веб-сайта, на котором отображается реклама, загружается с сервера рекламного брокера, а не с основного сервера.

- -

Поскольку большая часть рекламы в интернете обрабатывается лишь несколькими брокерами, им не потребовалось много времени, чтобы понять, - что они могут установить отслеживающий cookie на устройстве пользователя и узнать все посещаемые пользователем сайты. - Каждый раз, когда реклама загружается от брокера, первое, что он делает это проверяет имеет ли устройство уникальный номер отслеживающего cookie. - Если это так, он ищет профиль для этого номера и делает заметку о новом сайте. - Чтобы это проверить, пользователь может выполнить поиск на одном сайте для продукта, который он обычно не ищет, например грецких орехов, - а затем вдруг начать наблюдать рекламу для грецких орехов на каждом посещаемом сайте.

- -

В дополнение к рекламным брокерам сайты социальных сетей обнаружили, что тоже могли бы принять участие в этом. - Несколько лет назад основные социальные сети, такие как Facebook и Twitter, убедили владельцев большого количества веб-сайтов в том, - что им было бы интересно разместить небольшие значки социальных сетей на своих страницах. Это не просто изображения. - Они содержат встроенный код, который ссылается на сайт в социальных сетях и, среди прочего, - загружает сторонний файл cookie на устройство. - Эти файлы cookie размещаются, даже если у пользователя нет учетной записи на платформе социальных сетей. - Со временем такие компании, как Facebook (который также запустил рекламную сеть), создали довольно большое количество подробных профилей о людях, - у которых даже не было аккаунта на сайте социальной сети.

- -

Нет ни одной веской причины когда-либо разрешать сторонние файлы cookie. На устройствах с Android KitKat или старше (версия <= 4.4.4 или API <= 20), WebView не - различает первичные и сторонние файлы cookie. - Таким образом, включение первичных файлов cookie также разрешит и сторонние.

- - -

DOM-хранилище

- -

Хранилище объектной модели документа (Document Object Model), также известное как веб-хранилище, похоже на cookie (печенье) на стероидах. - Если максимальный общий размер хранилища для всех файлов cookie с одного URL-адреса составляет 4 килобайта, - то DOM-хранилище вмещает в себя мегабайты на сайт. - Поскольку DOM-хранилище использует JavaScript для чтения и записи данных, включение его ни на что не влияет пока отключен JavaScript.

- - -

Данные формы

- -

Данные формы содержат информацию, введенную в веб-формы, например имена пользователей, адреса, номера телефонов и т.д., и доступную в раскрывающемся списке при будущих посещениях. - В отличие от других форм локального хранилища данные формы не отправляются на веб-сервер без специального взаимодействия с пользователем. - Начиная с Android Oreo (8.0), данные формы WebView были заменены на службу автозаполнения. - Таким образом, элементы управления данными формы больше не отображаются на новых устройствах Android.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_overview.html b/app/src/main/assets/ru/guide_overview.html new file mode 100644 index 00000000..6d9afdf5 --- /dev/null +++ b/app/src/main/assets/ru/guide_overview.html @@ -0,0 +1,49 @@ + + + + + + + + + + + + + +

Настоящая конфиденциальность

+ +

Privacy Browser разработан, чтобы позволить вам максимально контролировать вашу конфиденциальность, сохраняя при этом доступ в интернет. + Когда браузер подключается к веб-сайту, определенные фрагменты информации, необходимые для облегчения соединения, передаются на сервер. + Например, сервер получит ваш IP-адрес и номер порта, которые необходимы ему, чтобы узнать, куда отправить ответ. + Эта информация часто регистрируется сервером, позволяя разработчику веб-сайта создавать отчеты, показывающие, как часто загружалась веб-страница и сколько разных IP-адресов к ней обращалось.

+ +

Большинство владельцев сайтов хотят получить как можно больше информации о своих посетителях, включая отслеживание их через через сторонние сайты. + Используется множество различных методов, включая запросы или размещение дополнительной информации на устройстве пользователя, которые упрощают отслеживание. + Почти все браузеры будут добровольно участвовать в этом отслеживании, не сообщая пользователю, что они это делают. + Privacy Browser разработан для предоставления пользователю как можно больше информации и контроля над этими методами отслеживания.

+ + +

Ограничения Android WebView

+ +

Privacy Browser использует встроенный Android WebView для визуализации веб-сайтов. Существуют некоторые ограничения, которые предоставляет WebView для управления настройками конфиденциальности. + Например, невозможно отключить некоторые команды JavaScript при отключении других. + В будущем Privacy Browser переключится на форк WebView, называемый Privacy WebView.

+ + \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_overview_dark.html b/app/src/main/assets/ru/guide_overview_dark.html deleted file mode 100644 index f5278c37..00000000 --- a/app/src/main/assets/ru/guide_overview_dark.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -

Настоящая конфиденциальность

- -

Privacy Browser разработан, чтобы позволить вам максимально контролировать вашу конфиденциальность, сохраняя при этом доступ в интернет. - Когда браузер подключается к веб-сайту, определенные фрагменты информации, необходимые для облегчения соединения, передаются на сервер. - Например, сервер получит ваш IP-адрес и номер порта, которые необходимы ему, чтобы узнать, куда отправить ответ. - Эта информация часто регистрируется сервером, позволяя разработчику веб-сайта создавать отчеты, показывающие, как часто загружалась веб-страница и сколько разных IP-адресов к ней обращалось.

- -

Большинство владельцев сайтов хотят получить как можно больше информации о своих посетителях, включая отслеживание их через через сторонние сайты. - Используется множество различных методов, включая запросы или размещение дополнительной информации на устройстве пользователя, которые упрощают отслеживание. - Почти все браузеры будут добровольно участвовать в этом отслеживании, не сообщая пользователю, что они это делают. - Privacy Browser разработан для предоставления пользователю как можно больше информации и контроля над этими методами отслеживания.

- - -

Ограничения Android WebView

- -

Privacy Browser использует встроенный Android WebView для визуализации веб-сайтов. Существуют некоторые ограничения, которые предоставляет WebView для управления настройками конфиденциальности. - Например, невозможно отключить некоторые команды JavaScript при отключении других. - В будущем Privacy Browser переключится на форк WebView, называемый Privacy WebView.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_overview_light.html b/app/src/main/assets/ru/guide_overview_light.html deleted file mode 100644 index 272f3083..00000000 --- a/app/src/main/assets/ru/guide_overview_light.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -

Настоящая конфиденциальность

- -

Privacy Browser разработан, чтобы позволить вам максимально контролировать вашу конфиденциальность, сохраняя при этом доступ в интернет. - Когда браузер подключается к веб-сайту, определенные фрагменты информации, необходимые для облегчения соединения, передаются на сервер. - Например, сервер получит ваш IP-адрес и номер порта, которые необходимы ему, чтобы узнать, куда отправить ответ. - Эта информация часто регистрируется сервером, позволяя разработчику веб-сайта создавать отчеты, показывающие, как часто загружалась веб-страница и сколько разных IP-адресов к ней обращалось.

- -

Большинство владельцев сайтов хотят получить как можно больше информации о своих посетителях, включая отслеживание их через через сторонние сайты. - Используется множество различных методов, включая запросы или размещение дополнительной информации на устройстве пользователя, которые упрощают отслеживание. - Почти все браузеры будут добровольно участвовать в этом отслеживании, не сообщая пользователю, что они это делают. - Privacy Browser разработан для предоставления пользователю как можно больше информации и контроля над этими методами отслеживания.

- - -

Ограничения Android WebView

- -

Privacy Browser использует встроенный Android WebView для визуализации веб-сайтов. Существуют некоторые ограничения, которые предоставляет WebView для управления настройками конфиденциальности. - Например, невозможно отключить некоторые команды JavaScript при отключении других. - В будущем Privacy Browser переключится на форк WebView, называемый Privacy WebView.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_proxies.html b/app/src/main/assets/ru/guide_proxies.html new file mode 100644 index 00000000..c4bcc4ef --- /dev/null +++ b/app/src/main/assets/ru/guide_proxies.html @@ -0,0 +1,84 @@ + + + + + + + + + + + + + +

Прокси и их ограничения

+ +

Существуют две основные отрицательные категории субъектов, которые нарушают конфиденциальность в интернете: злонамеренные правительства, имеющие доступ к интернет-провайдерам и крупные корпорации, + которые управляют социальными и рекламными сетями. + Такие прокси, как TOR (The Onion Router) и I2P (the Invisible Internet Project) полезны для защиты конфиденциальности от вредоносных правительств (шпионящих за транзитным трафиком), + но не от мегакорпораций (встраивающих вредоносный код на веб-серверы).

+ + +

Злонамеренные правительства

+ +

Злонамеренные правительства часто следят за своими гражданами, чтобы наказать за инакомыслие или правозащитную деятельность. + Как правило, они либо работают с локальными интернет-провайдерами, либо могут заставить их раскрыть информацию, содержащую статистику посещений сайтов нужного пользователя. + Многоуровневые прокси-серверы предназначены для пресечения нарушения конфиденциальности путем шифрования трафика от устройства пользователя и маршрутизации его через несколько серверов в интернете, + прежде чем отправить его в точку назначения. + Это означает, что ни один провайдер, сервер или веб-сайт не может знать ни IP-адрес устройства пользователя, ни IP-адрес конечного веб-сервера. + Злонамеренные правительства и интернет-провайдеры, которых они контролируют, не могут узнать к каким веб-серверам обращается пользователь, + но они могут определить использование пользователем многоуровневой системы прокси-серверов. + В некоторых странах использование прокси может быть истолковано как подтверждение незаконного поведения ("Если бы вам нечего было скрывать, вы бы не шифровали свой трафик"), + и пользователи могут быть наказаны, поскольку правительства предполагают, что они совершают нечто запрещенное. Таким образом, прокси-серверы могут быть полезны, но они не являются панацеей.

+ + +

Крупные корпорации

+ +

Когда пользователь подключается к веб-серверу, сервер может видеть IP-адрес пользователя. + Несмотря на то, что пока это работает не идеально, IP-адреса могут быть превращены в физические адреса с достаточным количеством точности. + Небольшие веб-серверы обычно используют IP-адреса для определения местоположения пользователей, посещающих их сайт. + Прокси-серверы являются хорошим решением для маскировки местоположения пользователя от этих серверов. + Но крупные корпорации, которые владеют социальными и рекламными сетями, используют весь профиль информации, который предназначен для отслеживания пользователей через устройства и IP-адреса. + В этих профилях используются различные методы идентификации пользователей, включая JavaScript, файлы cookie, + идентификаторы отслеживания и отпечаток браузера. + Поскольку подавляющее большинство веб-сайтов в интернете загружают рекламу от одной из основных сетей или встраивают значки социальных сетей с ассоциированным с ними JavaScript, + эти корпорации имеют встроенные профили почти для каждого пользователя в интернете и могут отслеживать интернет-активность на несвязанных сайтах.

+ +

Они отслеживают каждый посещаемый сайт, все, что приобретается, каждую кредитную карту, используемую для совершения покупки, каждый адрес, куда отправляются товары, + метаданные GPS каждого изображения, загружаемого в интернет. + Они создают профиль из возраста пользователя, пола, семейного положения, адреса, политических пристрастий, религиозной принадлежности, семейных обстоятельств, + количества домашних животных и всего остального, что им удается получить. + Они даже скупают базы данных транзакций по кредитным картам в местных магазинах, поэтому они могут отслеживать автономные модели покупок пользователей в своих профилях. + Поскольку у них уже есть гораздо более точная адресная информация о пользователе, чем раскрытый IP-адрес, прокси-серверы не обеспечивают реальной защиты конфиденциальности от мегакорпораций.

+ +

Единственной и самой лучшей защитой конфиденциальности от крупных корпораций является просмотр веб-сайта с отключенным JavaScript, за которым следует блокирование рекламных сетей, + отключение файлов cookie и хранилища DOM, а также использование браузера, отпечаток которого трудно определить.

+ + +

Использование прокси

+ +

Несмотря на свои ограничения, прокси-серверы могут быть полезны в некоторых ситуациях. + Tor и I2P + имеют приложения для Android, которые облегчают использование их прокси-сетей. + При включенном в Privacy Browser проксировании, панель приложения будет иметь светло-синий фон вместо светло-серого по умолчанию. + Поскольку трафик маршрутизируется через несколько прокси-узлов, использование многоуровневого прокси зачастую требует гораздо больше времени, чем прямое подключение к интернету.

+ + + + \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_proxies_dark.html b/app/src/main/assets/ru/guide_proxies_dark.html deleted file mode 100644 index f362adbc..00000000 --- a/app/src/main/assets/ru/guide_proxies_dark.html +++ /dev/null @@ -1,81 +0,0 @@ - - - - - - - - - - -

Прокси и их ограничения

- -

Существуют две основные отрицательные категории субъектов, которые нарушают конфиденциальность в интернете: злонамеренные правительства, имеющие доступ к интернет-провайдерам и крупные корпорации, - которые управляют социальными и рекламными сетями. - Такие прокси, как TOR (The Onion Router) и I2P (the Invisible Internet Project) полезны для защиты конфиденциальности от вредоносных правительств (шпионящих за транзитным трафиком), - но не от мегакорпораций (встраивающих вредоносный код на веб-серверы).

- - -

Злонамеренные правительства

- -

Злонамеренные правительства часто следят за своими гражданами, чтобы наказать за инакомыслие или правозащитную деятельность. - Как правило, они либо работают с локальными интернет-провайдерами, либо могут заставить их раскрыть информацию, содержащую статистику посещений сайтов нужного пользователя. - Многоуровневые прокси-серверы предназначены для пресечения нарушения конфиденциальности путем шифрования трафика от устройства пользователя и маршрутизации его через несколько серверов в интернете, - прежде чем отправить его в точку назначения. - Это означает, что ни один провайдер, сервер или веб-сайт не может знать ни IP-адрес устройства пользователя, ни IP-адрес конечного веб-сервера. - Злонамеренные правительства и интернет-провайдеры, которых они контролируют, не могут узнать к каким веб-серверам обращается пользователь, - но они могут определить использование пользователем многоуровневой системы прокси-серверов. - В некоторых странах использование прокси может быть истолковано как подтверждение незаконного поведения ("Если бы вам нечего было скрывать, вы бы не шифровали свой трафик"), - и пользователи могут быть наказаны, поскольку правительства предполагают, что они совершают нечто запрещенное. Таким образом, прокси-серверы могут быть полезны, но они не являются панацеей.

- - -

Крупные корпорации

- -

Когда пользователь подключается к веб-серверу, сервер может видеть IP-адрес пользователя. - Несмотря на то, что пока это работает не идеально, IP-адреса могут быть превращены в физические адреса с достаточным количеством точности. - Небольшие веб-серверы обычно используют IP-адреса для определения местоположения пользователей, посещающих их сайт. - Прокси-серверы являются хорошим решением для маскировки местоположения пользователя от этих серверов. - Но крупные корпорации, которые владеют социальными и рекламными сетями, используют весь профиль информации, который предназначен для отслеживания пользователей через устройства и IP-адреса. - В этих профилях используются различные методы идентификации пользователей, включая JavaScript, файлы cookie, - идентификаторы отслеживания и отпечаток браузера. - Поскольку подавляющее большинство веб-сайтов в интернете загружают рекламу от одной из основных сетей или встраивают значки социальных сетей с ассоциированным с ними JavaScript, - эти корпорации имеют встроенные профили почти для каждого пользователя в интернете и могут отслеживать интернет-активность на несвязанных сайтах.

- -

Они отслеживают каждый посещаемый сайт, все, что приобретается, каждую кредитную карту, используемую для совершения покупки, каждый адрес, куда отправляются товары, - метаданные GPS каждого изображения, загружаемого в интернет. - Они создают профиль из возраста пользователя, пола, семейного положения, адреса, политических пристрастий, религиозной принадлежности, семейных обстоятельств, - количества домашних животных и всего остального, что им удается получить. - Они даже скупают базы данных транзакций по кредитным картам в местных магазинах, поэтому они могут отслеживать автономные модели покупок пользователей в своих профилях. - Поскольку у них уже есть гораздо более точная адресная информация о пользователе, чем раскрытый IP-адрес, прокси-серверы не обеспечивают реальной защиты конфиденциальности от мегакорпораций.

- -

Единственной и самой лучшей защитой конфиденциальности от крупных корпораций является просмотр веб-сайта с отключенным JavaScript, за которым следует блокирование рекламных сетей, - отключение файлов cookie и хранилища DOM, а также использование браузера, отпечаток которого трудно определить.

- - -

Использование прокси

- -

Несмотря на свои ограничения, прокси-серверы могут быть полезны в некоторых ситуациях. - Tor и I2P - имеют приложения для Android, которые облегчают использование их прокси-сетей. - При включенном в Privacy Browser проксировании, панель приложения будет иметь светло-синий фон вместо светло-серого по умолчанию. - Поскольку трафик маршрутизируется через несколько прокси-узлов, использование многоуровневого прокси зачастую требует гораздо больше времени, чем прямое подключение к интернету.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_proxies_light.html b/app/src/main/assets/ru/guide_proxies_light.html deleted file mode 100644 index 9210ea4b..00000000 --- a/app/src/main/assets/ru/guide_proxies_light.html +++ /dev/null @@ -1,81 +0,0 @@ - - - - - - - - - - -

Прокси и их ограничения

- -

Существуют две основные отрицательные категории субъектов, которые нарушают конфиденциальность в интернете: злонамеренные правительства, имеющие доступ к интернет-провайдерам и крупные корпорации, - которые управляют социальными и рекламными сетями. - Такие прокси, как TOR (The Onion Router) и I2P (the Invisible Internet Project) полезны для защиты конфиденциальности от вредоносных правительств (шпионящих за транзитным трафиком), - но не от мегакорпораций (встраивающих вредоносный код на веб-серверы).

- - -

Злонамеренные правительства

- -

Злонамеренные правительства часто следят за своими гражданами, чтобы наказать за инакомыслие или правозащитную деятельность. - Как правило, они либо работают с локальными интернет-провайдерами, либо могут заставить их раскрыть информацию, содержащую статистику посещений сайтов нужного пользователя. - Многоуровневые прокси-серверы предназначены для пресечения нарушения конфиденциальности путем шифрования трафика от устройства пользователя и маршрутизации его через несколько серверов в интернете, - прежде чем отправить его в точку назначения. - Это означает, что ни один провайдер, сервер или веб-сайт не может знать ни IP-адрес устройства пользователя, ни IP-адрес конечного веб-сервера. - Злонамеренные правительства и интернет-провайдеры, которых они контролируют, не могут узнать к каким веб-серверам обращается пользователь, - но они могут определить использование пользователем многоуровневой системы прокси-серверов. - В некоторых странах использование прокси может быть истолковано как подтверждение незаконного поведения ("Если бы вам нечего было скрывать, вы бы не шифровали свой трафик"), - и пользователи могут быть наказаны, поскольку правительства предполагают, что они совершают нечто запрещенное. Таким образом, прокси-серверы могут быть полезны, но они не являются панацеей.

- - -

Крупные корпорации

- -

Когда пользователь подключается к веб-серверу, сервер может видеть IP-адрес пользователя. - Несмотря на то, что пока это работает не идеально, IP-адреса могут быть превращены в физические адреса с достаточным количеством точности. - Небольшие веб-серверы обычно используют IP-адреса для определения местоположения пользователей, посещающих их сайт. - Прокси-серверы являются хорошим решением для маскировки местоположения пользователя от этих серверов. - Но крупные корпорации, которые владеют социальными и рекламными сетями, используют весь профиль информации, который предназначен для отслеживания пользователей через устройства и IP-адреса. - В этих профилях используются различные методы идентификации пользователей, включая JavaScript, файлы cookie, - идентификаторы отслеживания и отпечаток браузера. - Поскольку подавляющее большинство веб-сайтов в интернете загружают рекламу от одной из основных сетей или встраивают значки социальных сетей с ассоциированным с ними JavaScript, - эти корпорации имеют встроенные профили почти для каждого пользователя в интернете и могут отслеживать интернет-активность на несвязанных сайтах.

- -

Они отслеживают каждый посещаемый сайт, все, что приобретается, каждую кредитную карту, используемую для совершения покупки, каждый адрес, куда отправляются товары, - метаданные GPS каждого изображения, загружаемого в интернет. - Они создают профиль из возраста пользователя, пола, семейного положения, адреса, политических пристрастий, религиозной принадлежности, семейных обстоятельств, - количества домашних животных и всего остального, что им удается получить. - Они даже скупают базы данных транзакций по кредитным картам в местных магазинах, поэтому они могут отслеживать автономные модели покупок пользователей в своих профилях. - Поскольку у них уже есть гораздо более точная адресная информация о пользователе, чем раскрытый IP-адрес, прокси-серверы не обеспечивают реальной защиты конфиденциальности от мегакорпораций.

- -

Единственной и самой лучшей защитой конфиденциальности от крупных корпораций является просмотр веб-сайта с отключенным JavaScript, за которым следует блокирование рекламных сетей, - отключение файлов cookie и хранилища DOM, а также использование браузера, отпечаток которого трудно определить.

- - -

Использование прокси

- -

Несмотря на свои ограничения, прокси-серверы могут быть полезны в некоторых ситуациях. - Tor и I2P - имеют приложения для Android, которые облегчают использование их прокси-сетей. - При включенном в Privacy Browser проксировании, панель приложения будет иметь светло-синий фон вместо светло-серого по умолчанию. - Поскольку трафик маршрутизируется через несколько прокси-узлов, использование многоуровневого прокси зачастую требует гораздо больше времени, чем прямое подключение к интернету.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_requests.html b/app/src/main/assets/ru/guide_requests.html new file mode 100644 index 00000000..8f69e1cf --- /dev/null +++ b/app/src/main/assets/ru/guide_requests.html @@ -0,0 +1,84 @@ + + + + + + + + + + + + + +

Запросы ресурсов

+ +

При загрузке URL-адреса обычно происходит ряд запросов ресурсов для CCS, JavaScript, изображений и других файлов. Сведения об этих запросах можно просмотреть в активности запросов. + В навигационном меню имеется ссылка на активность запросов, а также показано, сколько запросов было заблокировано. + При нажатии на запрос отображаются сведения о том, почему он был разрешен или заблокирован.

+ + + +

Privacy Browser включает в себя четыре распространенных списка блокировки, основанных на синтаксисе Adblock: + EasyList, EasyPrivacy, Fanboy’s Annoyance List, и Fanboy’s Social Blocking List. + Эти списки блокировки обрабатываются Privacy Browser в следующих 22 подсписках, которые проверяют запросы ресурсов в указанном порядке.

+ +
    +
  1. Основной белый список
  2. +
  3. Конец белого списка
  4. +
  5. Белый список доменов
  6. +
  7. Начало белого списка доменов
  8. +
  9. Конец белого списка доменов
  10. +
  11. Сторонний белый список
  12. +
  13. Сторонний белый список доменов
  14. +
  15. Начало стороннего белого списка доменов
  16. +
  17. Основной черный список
  18. +
  19. Начало черного списка
  20. +
  21. Конец черного списка
  22. +
  23. Черный список доменов
  24. +
  25. Начало черного списка доменов
  26. +
  27. Конец черного списка доменов
  28. +
  29. Регулярные выражения черного списка доменов
  30. +
  31. Сторонний черный список
  32. +
  33. Начало стороннего черного списка доменов
  34. +
  35. Сторонний черный список доменов
  36. +
  37. Начало стороннего черного списка доменов
  38. +
  39. Регулярные выражения стороннего черного списка
  40. +
  41. Регулярные выражения стороннего черного списка доменов
  42. +
  43. Регулярные выражения черного списка
  44. +
+ +

Исходные списки проверяются на начало URL-адреса. Окончательные списки проверяются на конец URL-адреса. Списки доменов проверяют только определенные домены. + Сторонние списки применяются только в том случае, если корневой домен запроса отличается от корневого домена основного URL-адреса. + Списки регулярных выражений следуют за синтаксисом регулярных выражений. + Каждый элемент подсписка имеет одну или несколько записей. + В случае подсписков домена, запрос ресурса проверяется только в отношении элемента, если первая запись соответствует домену основного URL-адреса.

+ +

Из-за ограничений в Android WebView, а также для ускорения обработки запросов, в Privacy Browser реализована упрощенная интерпретация синтаксиса Adblock. + Иногда это может привести к ложным срабатываниям, когда ресурсы разрешаются или блокируются способами, которые не были предназначены для исходной записи. + Более подробное описание способа обработки записей списка блокировки доступно на stoutner.com.

+ +

В Privacy Browser встроено три дополнительных списка блокировки. + UltraList и UltraPrivacy + блокируют рекламу и трекеры, которых нет в EasyList и EasyPrivacy. Третий блокирует все сторонние запросы. + Например, если www.website.com загружает изображение с сайта images.website.com, + запрос не будет считаться сторонним и не будет заблокирован, так как они оба используют один и тот же базовый домен website.com. + Блокировка всех сторонних запросов увеличивает конфиденциальность, но этот список блокировки по умолчанию отключен, поскольку он ломает большое количество веб-сайтов.

+ + \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_requests_dark.html b/app/src/main/assets/ru/guide_requests_dark.html deleted file mode 100644 index 19db1567..00000000 --- a/app/src/main/assets/ru/guide_requests_dark.html +++ /dev/null @@ -1,81 +0,0 @@ - - - - - - - - - - -

Запросы ресурсов

- -

При загрузке URL-адреса обычно происходит ряд запросов ресурсов для CCS, JavaScript, изображений и других файлов. Сведения об этих запросах можно просмотреть в активности запросов. - В навигационном меню имеется ссылка на активность запросов, а также показано, сколько запросов было заблокировано. - При нажатии на запрос отображаются сведения о том, почему он был разрешен или заблокирован.

- -

- -

Privacy Browser включает в себя четыре распространенных списка блокировки, основанных на синтаксисе Adblock: - EasyList, EasyPrivacy, Fanboy’s Annoyance List, и Fanboy’s Social Blocking List. - Эти списки блокировки обрабатываются Privacy Browser в следующих 22 подсписках, которые проверяют запросы ресурсов в указанном порядке.

- -
    -
  1. Основной белый список
  2. -
  3. Конец белого списка
  4. -
  5. Белый список доменов
  6. -
  7. Начало белого списка доменов
  8. -
  9. Конец белого списка доменов
  10. -
  11. Сторонний белый список
  12. -
  13. Сторонний белый список доменов
  14. -
  15. Начало стороннего белого списка доменов
  16. -
  17. Основной черный список
  18. -
  19. Начало черного списка
  20. -
  21. Конец черного списка
  22. -
  23. Черный список доменов
  24. -
  25. Начало черного списка доменов
  26. -
  27. Конец черного списка доменов
  28. -
  29. Регулярные выражения черного списка доменов
  30. -
  31. Сторонний черный список
  32. -
  33. Начало стороннего черного списка доменов
  34. -
  35. Сторонний черный список доменов
  36. -
  37. Начало стороннего черного списка доменов
  38. -
  39. Регулярные выражения стороннего черного списка
  40. -
  41. Регулярные выражения стороннего черного списка доменов
  42. -
  43. Регулярные выражения черного списка
  44. -
- -

Исходные списки проверяются на начало URL-адреса. Окончательные списки проверяются на конец URL-адреса. Списки доменов проверяют только определенные домены. - Сторонние списки применяются только в том случае, если корневой домен запроса отличается от корневого домена основного URL-адреса. - Списки регулярных выражений следуют за синтаксисом регулярных выражений. - Каждый элемент подсписка имеет одну или несколько записей. - В случае подсписков домена, запрос ресурса проверяется только в отношении элемента, если первая запись соответствует домену основного URL-адреса.

- -

Из-за ограничений в Android WebView, а также для ускорения обработки запросов, в Privacy Browser реализована упрощенная интерпретация синтаксиса Adblock. - Иногда это может привести к ложным срабатываниям, когда ресурсы разрешаются или блокируются способами, которые не были предназначены для исходной записи. - Более подробное описание способа обработки записей списка блокировки доступно на stoutner.com.

- -

В Privacy Browser встроено три дополнительных списка блокировки. - UltraList и UltraPrivacy - блокируют рекламу и трекеры, которых нет в EasyList и EasyPrivacy. Третий блокирует все сторонние запросы. - Например, если www.website.com загружает изображение с сайта images.website.com, - запрос не будет считаться сторонним и не будет заблокирован, так как они оба используют один и тот же базовый домен website.com. - Блокировка всех сторонних запросов увеличивает конфиденциальность, но этот список блокировки по умолчанию отключен, поскольку он ломает большое количество веб-сайтов.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_requests_light.html b/app/src/main/assets/ru/guide_requests_light.html deleted file mode 100644 index b6577a1b..00000000 --- a/app/src/main/assets/ru/guide_requests_light.html +++ /dev/null @@ -1,81 +0,0 @@ - - - - - - - - - - -

Запросы ресурсов

- -

При загрузке URL-адреса обычно происходит ряд запросов ресурсов для CCS, JavaScript, изображений и других файлов. Сведения об этих запросах можно просмотреть в активности запросов. - В навигационном меню имеется ссылка на активность запросов, а также показано, сколько запросов было заблокировано. - При нажатии на запрос отображаются сведения о том, почему он был разрешен или заблокирован.

- -

- -

Privacy Browser включает в себя четыре распространенных списка блокировки, основанных на синтаксисе Adblock: - EasyList, EasyPrivacy, Fanboy’s Annoyance List, и Fanboy’s Social Blocking List. - Эти списки блокировки обрабатываются Privacy Browser в следующих 22 подсписках, которые проверяют запросы ресурсов в указанном порядке.

- -
    -
  1. Основной белый список
  2. -
  3. Конец белого списка
  4. -
  5. Белый список доменов
  6. -
  7. Начало белого списка доменов
  8. -
  9. Конец белого списка доменов
  10. -
  11. Сторонний белый список
  12. -
  13. Сторонний белый список доменов
  14. -
  15. Начало стороннего белого списка доменов
  16. -
  17. Основной черный список
  18. -
  19. Начало черного списка
  20. -
  21. Конец черного списка
  22. -
  23. Черный список доменов
  24. -
  25. Начало черного списка доменов
  26. -
  27. Конец черного списка доменов
  28. -
  29. Регулярные выражения черного списка доменов
  30. -
  31. Сторонний черный список
  32. -
  33. Начало стороннего черного списка доменов
  34. -
  35. Сторонний черный список доменов
  36. -
  37. Начало стороннего черного списка доменов
  38. -
  39. Регулярные выражения стороннего черного списка
  40. -
  41. Регулярные выражения стороннего черного списка доменов
  42. -
  43. Регулярные выражения черного списка
  44. -
- -

Исходные списки проверяются на начало URL-адреса. Окончательные списки проверяются на конец URL-адреса. Списки доменов проверяют только определенные домены. - Сторонние списки применяются только в том случае, если корневой домен запроса отличается от корневого домена основного URL-адреса. - Списки регулярных выражений следуют за синтаксисом регулярных выражений. - Каждый элемент подсписка имеет одну или несколько записей. - В случае подсписков домена, запрос ресурса проверяется только в отношении элемента, если первая запись соответствует домену основного URL-адреса.

- -

Из-за ограничений в Android WebView, а также для ускорения обработки запросов, в Privacy Browser реализована упрощенная интерпретация синтаксиса Adblock. - Иногда это может привести к ложным срабатываниям, когда ресурсы разрешаются или блокируются способами, которые не были предназначены для исходной записи. - Более подробное описание способа обработки записей списка блокировки доступно на stoutner.com.

- -

В Privacy Browser встроено три дополнительных списка блокировки. - UltraList и UltraPrivacy - блокируют рекламу и трекеры, которых нет в EasyList и EasyPrivacy. Третий блокирует все сторонние запросы. - Например, если www.website.com загружает изображение с сайта images.website.com, - запрос не будет считаться сторонним и не будет заблокирован, так как они оба используют один и тот же базовый домен website.com. - Блокировка всех сторонних запросов увеличивает конфиденциальность, но этот список блокировки по умолчанию отключен, поскольку он ломает большое количество веб-сайтов.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_ssl_certificates.html b/app/src/main/assets/ru/guide_ssl_certificates.html new file mode 100644 index 00000000..5d7262df --- /dev/null +++ b/app/src/main/assets/ru/guide_ssl_certificates.html @@ -0,0 +1,55 @@ + + + + + + + + + + + + +

Подключение с уверенностью

+ +

При посещении зашифрованного URL (тот, который начинается с HTTPS) веб-сервер использует сертификат SSL для шифрования информации, отправленной в браузер, и для идентификации сервера. + Цель идентификации сервера состоит в том, чтобы запретить машине, расположенной между браузером и веб-сервером, притворяться сервером и дешифровать информацию во время ее транзита. + Этот тип атаки известен как атака "Человек посередине" (MITM). + Сертификаты SSL генерируются органами сертификации: компаниями, которые проверяют идентификационные данные сервера и выдают сертификат за определенную плату. + В Android есть список доверенных центров сертификации и будет принимать любые их сертификаты для любого веб-сайта. + Организации не должны получать сертификат SSL для доменов, которые они не контролируют, но на практике многие правительства и крупные корпорации смогли это сделать.

+ +

Закрепление сертификата SSL указывает браузеру, что для определенного домена должен быть доверен только один определенный сертификат SSL. + Любой другой сертификат, даже если он действителен, будет отклонен.

+ + + +

Срок действия сертификатов SSL истекает в указанную дату, поэтому даже закрепленные сертификаты SSL будут периодически обновляться. + Как правило, закрепление сертификатов SSL в большинстве случаев не требуется. + Но для того, кто подозревает, что за ним ведется наблюдение, закрепление сертификата SSL поможет обнаружить и помешать атаке MITM. + Privacy Browser также имеет возможность закрепления IP-адресов.

+ + + +

Сертификаты SSL могут быть закреплены в настройках домена. + Помимо защиты от атак MITM, закрепление самоподписанного сертификата для устройства, такого как беспроводной маршрутизатор или точка доступа, удалит сообщение об ошибке, + которое обычно отображается каждый раз, когда загружается его сайт. + При нажатии на активную вкладку отображается текущий сертификат SSL веб-сайта.

+ + \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_ssl_certificates_dark.html b/app/src/main/assets/ru/guide_ssl_certificates_dark.html deleted file mode 100644 index dd2212e2..00000000 --- a/app/src/main/assets/ru/guide_ssl_certificates_dark.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - - - - - - - -

Подключение с уверенностью

- -

При посещении зашифрованного URL (тот, который начинается с HTTPS) веб-сервер использует сертификат SSL для шифрования информации, отправленной в браузер, и для идентификации сервера. - Цель идентификации сервера состоит в том, чтобы запретить машине, расположенной между браузером и веб-сервером, притворяться сервером и дешифровать информацию во время ее транзита. - Этот тип атаки известен как атака "Человек посередине" (MITM). - Сертификаты SSL генерируются органами сертификации: компаниями, которые проверяют идентификационные данные сервера и выдают сертификат за определенную плату. - В Android есть список доверенных центров сертификации и будет принимать любые их сертификаты для любого веб-сайта. - Организации не должны получать сертификат SSL для доменов, которые они не контролируют, но на практике многие правительства и крупные корпорации смогли это сделать.

- -

Закрепление сертификата SSL указывает браузеру, что для определенного домена должен быть доверен только один определенный сертификат SSL. - Любой другой сертификат, даже если он действителен, будет отклонен.

- -

- -

Срок действия сертификатов SSL истекает в указанную дату, поэтому даже закрепленные сертификаты SSL будут периодически обновляться. - Как правило, закрепление сертификатов SSL в большинстве случаев не требуется. - Но для того, кто подозревает, что за ним ведется наблюдение, закрепление сертификата SSL поможет обнаружить и помешать атаке MITM. - Privacy Browser также имеет возможность закрепления IP-адресов.

- -

- -

Сертификаты SSL могут быть закреплены в настройках домена. - Помимо защиты от атак MITM, закрепление самоподписанного сертификата для устройства, такого как беспроводной маршрутизатор или точка доступа, удалит сообщение об ошибке, - которое обычно отображается каждый раз, когда загружается его сайт. - При нажатии на активную вкладку отображается текущий сертификат SSL веб-сайта.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_ssl_certificates_light.html b/app/src/main/assets/ru/guide_ssl_certificates_light.html deleted file mode 100644 index b3fc3d4c..00000000 --- a/app/src/main/assets/ru/guide_ssl_certificates_light.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - - - - - - - -

Подключение с уверенностью

- -

При посещении зашифрованного URL (тот, который начинается с HTTPS) веб-сервер использует сертификат SSL для шифрования информации, отправленной в браузер, и для идентификации сервера. - Цель идентификации сервера состоит в том, чтобы запретить машине, расположенной между браузером и веб-сервером, притворяться сервером и дешифровать информацию во время ее транзита. - Этот тип атаки известен как атака "Человек посередине" (MITM). - Сертификаты SSL генерируются органами сертификации: компаниями, которые проверяют идентификационные данные сервера и выдают сертификат за определенную плату. - В Android есть список доверенных центров сертификации и будет принимать любые их сертификаты для любого веб-сайта. - Организации не должны получать сертификат SSL для доменов, которые они не контролируют, но на практике многие правительства и крупные корпорации смогли это сделать.

- -

Закрепление сертификата SSL указывает браузеру, что для определенного домена должен быть доверен только один определенный сертификат SSL. - Любой другой сертификат, даже если он действителен, будет отклонен.

- -

- -

Срок действия сертификатов SSL истекает в указанную дату, поэтому даже закрепленные сертификаты SSL будут периодически обновляться. - Как правило, закрепление сертификатов SSL в большинстве случаев не требуется. - Но для того, кто подозревает, что за ним ведется наблюдение, закрепление сертификата SSL поможет обнаружить и помешать атаке MITM. - Privacy Browser также имеет возможность закрепления IP-адресов.

- -

- -

Сертификаты SSL могут быть закреплены в настройках домена. - Помимо защиты от атак MITM, закрепление самоподписанного сертификата для устройства, такого как беспроводной маршрутизатор или точка доступа, удалит сообщение об ошибке, - которое обычно отображается каждый раз, когда загружается его сайт. - При нажатии на активную вкладку отображается текущий сертификат SSL веб-сайта.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_tracking_ids.html b/app/src/main/assets/ru/guide_tracking_ids.html new file mode 100644 index 00000000..9151924b --- /dev/null +++ b/app/src/main/assets/ru/guide_tracking_ids.html @@ -0,0 +1,44 @@ + + + + + + + + + + + + + +

Не отслеживать

+ +

Несколько лет назад W3C (консорциум World Wide Web) создал механизм для браузеров для информирования веб-серверов о том, что они не хотели бы отслеживаться. + Это достигается путем включения заголовка DNT (Не отслеживать) в веб-запросы.

+ +

Заголовок DNT на самом деле не обеспечивает большую конфиденциальность, поскольку большинство веб-серверов его игнорируют. + Например, Yahoo, Google, Microsoft и Facebook игнорируют, по крайней мере, некоторые заголовки DNT.

+ + +

Модификация URL

+ +

Privacy Browser удаляет идентификаторы отслеживания из URL-адресов, такие как ?utm_ из Google Analytics и + ?fbclick= из Facebook. Модификация URL может быть отключена в настройках, если она вызывает проблемы.

+ + \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_tracking_ids_dark.html b/app/src/main/assets/ru/guide_tracking_ids_dark.html deleted file mode 100644 index 4d8abd96..00000000 --- a/app/src/main/assets/ru/guide_tracking_ids_dark.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -

Не отслеживать

- -

Несколько лет назад W3C (консорциум World Wide Web) создал механизм для браузеров для информирования веб-серверов о том, что они не хотели бы отслеживаться. - Это достигается путем включения заголовка DNT (Не отслеживать) в веб-запросы.

- -

Заголовок DNT на самом деле не обеспечивает большую конфиденциальность, поскольку большинство веб-серверов его игнорируют. - Например, Yahoo, Google, Microsoft и Facebook игнорируют, по крайней мере, некоторые заголовки DNT.

- - -

Модификация URL

- -

Privacy Browser удаляет идентификаторы отслеживания из URL-адресов, такие как ?utm_ из Google Analytics и - ?fbclick= из Facebook. Модификация URL может быть отключена в настройках, если она вызывает проблемы.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_tracking_ids_light.html b/app/src/main/assets/ru/guide_tracking_ids_light.html deleted file mode 100644 index ad4d8b33..00000000 --- a/app/src/main/assets/ru/guide_tracking_ids_light.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -

Не отслеживать

- -

Несколько лет назад W3C (консорциум World Wide Web) создал механизм для браузеров для информирования веб-серверов о том, что они не хотели бы отслеживаться. - Это достигается путем включения заголовка DNT (Не отслеживать) в веб-запросы.

- -

Заголовок DNT на самом деле не обеспечивает большую конфиденциальность, поскольку большинство веб-серверов его игнорируют. - Например, Yahoo, Google, Microsoft и Facebook игнорируют, по крайней мере, некоторые заголовки DNT.

- - -

Модификация URL

- -

Privacy Browser удаляет идентификаторы отслеживания из URL-адресов, такие как ?utm_ из Google Analytics и - ?fbclick= из Facebook. Модификация URL может быть отключена в настройках, если она вызывает проблемы.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_user_agent.html b/app/src/main/assets/ru/guide_user_agent.html new file mode 100644 index 00000000..adad5d89 --- /dev/null +++ b/app/src/main/assets/ru/guide_user_agent.html @@ -0,0 +1,65 @@ + + + + + + + + + + + + + +

Идентификация браузера

+ +

При подключении браузера к веб-сайтам происходит отправка пользовательского агента, который идентифицирует браузер и возможности визуализации, которыми он обладает. + Веб-сервер может использовать эту информацию, чтобы решить, какую версию сайта отправить в браузер. + Например, многие сайты имеют разные версии для компьютерных и мобильных браузеров.

+ +

По умолчанию Privacy Browser использует собственный пользовательский агент PrivacyBrowser/1.0. На веб-сервер отправляется минимум информации. + Поскольку веб-серверы не распознают его пользовательским агентом мобильного телефона, они обычно отображают версию сайта для компьютера.

+ +

Для сравнения, пользовательский агент WebView по умолчанию раскрывает большой объем информации об аппаратном и программном обеспечении устройства. + В меню Настройки выберите WebView по умолчанию, поскольку User agent отображает пользовательский агент, который будет отправлен. + На скриншоте ниже показан Pixel 2 XL под управлением Android 10 с установленным Android WebView 84.0.4147.125. + Большинство веб-серверов признают это как мобильный браузер и будут отображать мобильную версию сайта, если таковая имеется.

+ + + +

В пользовательском агенте достаточно информации о том, что иногда только несколько посетителей веб-сайта будут выглядеть одинаковыми. + Если пользовательский агент сочетается с другой частью неуникальной идентифицирующей информации, часто это приводит к уникальному отпечатку браузера. + Фонд Electronic Frontier Foundation создал инструмент под названием Panopticlick, чтобы продемонстрировать, + сколько информации можно извлечь из этих источников. + Если этот тест выполняется с включенным JavaScript, объем информации, которая раскрывается, значительно увеличивается. + Browser Leaks и Am I Unique также являются хорошими источниками информации по этой теме.

+ + + +

Существует несколько предустановленных пользовательских агентов, которые соответствуют обычным браузерам и операционным системам. + Для использования отпечатков браузера существует правило - все, что редко встречается, легче отслеживать. + По мере распространения Privacy Browser использование PrivacyBrowser/1.0 в качестве пользовательского агента станет хорошим выбором для обеспечения конфиденциальности. + Firefox или Chrome являются наиболее распространенными пользовательскими агентами, но они автоматически обновляются и их номера версий меняются настолько быстро, что, + скорее всего, пользовательские агенты, включенные в Privacy Browser, часто будут не соответствовать большинству пользовательских агентов в журналах сервера.

+ +

Некоторые сайты работают неправильно, если они не распознают пользовательский агент. + Использование параметров домена для установки агента пользователя WebView по умолчанию, или другого пользовательского агента, который корректно распознается, обычно решает проблему. + Android WebView не позволяет пользовательскому агенту быть пустым. В этом случае WebView отправляет на сервер пользовательский агент по умолчанию.

+ + \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_user_agent_dark.html b/app/src/main/assets/ru/guide_user_agent_dark.html deleted file mode 100644 index 659af8f2..00000000 --- a/app/src/main/assets/ru/guide_user_agent_dark.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - - - - - - - -

Идентификация браузера

- -

При подключении браузера к веб-сайтам происходит отправка пользовательского агента, который идентифицирует браузер и возможности визуализации, которыми он обладает. - Веб-сервер может использовать эту информацию, чтобы решить, какую версию сайта отправить в браузер. - Например, многие сайты имеют разные версии для компьютерных и мобильных браузеров.

- -

По умолчанию Privacy Browser использует собственный пользовательский агент PrivacyBrowser/1.0. На веб-сервер отправляется минимум информации. - Поскольку веб-серверы не распознают его пользовательским агентом мобильного телефона, они обычно отображают версию сайта для компьютера.

- -

Для сравнения, пользовательский агент WebView по умолчанию раскрывает большой объем информации об аппаратном и программном обеспечении устройства. - В меню Настройки выберите WebView по умолчанию, поскольку User agent отображает пользовательский агент, который будет отправлен. - На скриншоте ниже показан Pixel 2 XL под управлением Android 10 с установленным Android WebView 84.0.4147.125. - Большинство веб-серверов признают это как мобильный браузер и будут отображать мобильную версию сайта, если таковая имеется.

- - - -

В пользовательском агенте достаточно информации о том, что иногда только несколько посетителей веб-сайта будут выглядеть одинаковыми. - Если пользовательский агент сочетается с другой частью неуникальной идентифицирующей информации, часто это приводит к уникальному отпечатку браузера. - Фонд Electronic Frontier Foundation создал инструмент под названием Panopticlick, чтобы продемонстрировать, - сколько информации можно извлечь из этих источников. - Если этот тест выполняется с включенным JavaScript, объем информации, которая раскрывается, значительно увеличивается. - Browser Leaks и Am I Unique также являются хорошими источниками информации по этой теме.

- - - -

Существует несколько предустановленных пользовательских агентов, которые соответствуют обычным браузерам и операционным системам. - Для использования отпечатков браузера существует правило - все, что редко встречается, легче отслеживать. - По мере распространения Privacy Browser использование PrivacyBrowser/1.0 в качестве пользовательского агента станет хорошим выбором для обеспечения конфиденциальности. - Firefox или Chrome являются наиболее распространенными пользовательскими агентами, но они автоматически обновляются и их номера версий меняются настолько быстро, что, - скорее всего, пользовательские агенты, включенные в Privacy Browser, часто будут не соответствовать большинству пользовательских агентов в журналах сервера.

- -

Некоторые сайты работают неправильно, если они не распознают пользовательский агент. - Использование параметров домена для установки агента пользователя WebView по умолчанию, или другого пользовательского агента, который корректно распознается, обычно решает проблему. - Android WebView не позволяет пользовательскому агенту быть пустым. В этом случае WebView отправляет на сервер пользовательский агент по умолчанию.

- - \ No newline at end of file diff --git a/app/src/main/assets/ru/guide_user_agent_light.html b/app/src/main/assets/ru/guide_user_agent_light.html deleted file mode 100644 index b43fd007..00000000 --- a/app/src/main/assets/ru/guide_user_agent_light.html +++ /dev/null @@ -1,62 +0,0 @@ - - - - - - - - - - -

Идентификация браузера

- -

При подключении браузера к веб-сайтам происходит отправка пользовательского агента, который идентифицирует браузер и возможности визуализации, которыми он обладает. - Веб-сервер может использовать эту информацию, чтобы решить, какую версию сайта отправить в браузер. - Например, многие сайты имеют разные версии для компьютерных и мобильных браузеров.

- -

По умолчанию Privacy Browser использует собственный пользовательский агент PrivacyBrowser/1.0. На веб-сервер отправляется минимум информации. - Поскольку веб-серверы не распознают его пользовательским агентом мобильного телефона, они обычно отображают версию сайта для компьютера.

- -

Для сравнения, пользовательский агент WebView по умолчанию раскрывает большой объем информации об аппаратном и программном обеспечении устройства. - В меню Настройки выберите WebView по умолчанию, поскольку User agent отображает пользовательский агент, который будет отправлен. - На скриншоте ниже показан Pixel 2 XL под управлением Android 10 с установленным Android WebView 84.0.4147.125. - Большинство веб-серверов признают это как мобильный браузер и будут отображать мобильную версию сайта, если таковая имеется.

- - - -

В пользовательском агенте достаточно информации о том, что иногда только несколько посетителей веб-сайта будут выглядеть одинаковыми. - Если пользовательский агент сочетается с другой частью неуникальной идентифицирующей информации, часто это приводит к уникальному отпечатку браузера. - Фонд Electronic Frontier Foundation создал инструмент под названием Panopticlick, чтобы продемонстрировать, - сколько информации можно извлечь из этих источников. - Если этот тест выполняется с включенным JavaScript, объем информации, которая раскрывается, значительно увеличивается. - Browser Leaks и Am I Unique также являются хорошими источниками информации по этой теме.

- - - -

Существует несколько предустановленных пользовательских агентов, которые соответствуют обычным браузерам и операционным системам. - Для использования отпечатков браузера существует правило - все, что редко встречается, легче отслеживать. - По мере распространения Privacy Browser использование PrivacyBrowser/1.0 в качестве пользовательского агента станет хорошим выбором для обеспечения конфиденциальности. - Firefox или Chrome являются наиболее распространенными пользовательскими агентами, но они автоматически обновляются и их номера версий меняются настолько быстро, что, - скорее всего, пользовательские агенты, включенные в Privacy Browser, часто будут не соответствовать большинству пользовательских агентов в журналах сервера.

- -

Некоторые сайты работают неправильно, если они не распознают пользовательский агент. - Использование параметров домена для установки агента пользователя WebView по умолчанию, или другого пользовательского агента, который корректно распознается, обычно решает проблему. - Android WebView не позволяет пользовательскому агенту быть пустым. В этом случае WebView отправляет на сервер пользовательский агент по умолчанию.

- - \ No newline at end of file diff --git a/app/src/main/assets/shared_images/add.svg b/app/src/main/assets/shared_images/add.svg new file mode 100644 index 00000000..d20a2d51 --- /dev/null +++ b/app/src/main/assets/shared_images/add.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/add_dark.png b/app/src/main/assets/shared_images/add_dark.png deleted file mode 100644 index c53b6387..00000000 Binary files a/app/src/main/assets/shared_images/add_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/add_light.png b/app/src/main/assets/shared_images/add_light.png deleted file mode 100644 index 5c486bb4..00000000 Binary files a/app/src/main/assets/shared_images/add_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/arrow_back.svg b/app/src/main/assets/shared_images/arrow_back.svg new file mode 100644 index 00000000..30477dcd --- /dev/null +++ b/app/src/main/assets/shared_images/arrow_back.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/arrow_back_dark.png b/app/src/main/assets/shared_images/arrow_back_dark.png deleted file mode 100644 index ff07fd79..00000000 Binary files a/app/src/main/assets/shared_images/arrow_back_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/arrow_back_light.png b/app/src/main/assets/shared_images/arrow_back_light.png deleted file mode 100644 index 512e56fa..00000000 Binary files a/app/src/main/assets/shared_images/arrow_back_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/arrow_forward.svg b/app/src/main/assets/shared_images/arrow_forward.svg new file mode 100644 index 00000000..43e979b7 --- /dev/null +++ b/app/src/main/assets/shared_images/arrow_forward.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/arrow_forward_dark.png b/app/src/main/assets/shared_images/arrow_forward_dark.png deleted file mode 100644 index 5d5083fd..00000000 Binary files a/app/src/main/assets/shared_images/arrow_forward_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/arrow_forward_light.png b/app/src/main/assets/shared_images/arrow_forward_light.png deleted file mode 100644 index afbd57b4..00000000 Binary files a/app/src/main/assets/shared_images/arrow_forward_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/bookmarks.svg b/app/src/main/assets/shared_images/bookmarks.svg new file mode 100644 index 00000000..1359344d --- /dev/null +++ b/app/src/main/assets/shared_images/bookmarks.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/bookmarks_dark.png b/app/src/main/assets/shared_images/bookmarks_dark.png deleted file mode 100644 index be0ce5e1..00000000 Binary files a/app/src/main/assets/shared_images/bookmarks_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/bookmarks_light.png b/app/src/main/assets/shared_images/bookmarks_light.png deleted file mode 100644 index b7ea2be2..00000000 Binary files a/app/src/main/assets/shared_images/bookmarks_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/bug_report.svg b/app/src/main/assets/shared_images/bug_report.svg new file mode 100644 index 00000000..ea4b8fd1 --- /dev/null +++ b/app/src/main/assets/shared_images/bug_report.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/bug_report_blue_dark.png b/app/src/main/assets/shared_images/bug_report_blue_dark.png deleted file mode 100644 index d2c16b47..00000000 Binary files a/app/src/main/assets/shared_images/bug_report_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/bug_report_blue_light.png b/app/src/main/assets/shared_images/bug_report_blue_light.png deleted file mode 100644 index 76d4c000..00000000 Binary files a/app/src/main/assets/shared_images/bug_report_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/bug_report_dark.png b/app/src/main/assets/shared_images/bug_report_dark.png deleted file mode 100644 index d33e939b..00000000 Binary files a/app/src/main/assets/shared_images/bug_report_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/bug_report_light.png b/app/src/main/assets/shared_images/bug_report_light.png deleted file mode 100644 index bdf56767..00000000 Binary files a/app/src/main/assets/shared_images/bug_report_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/camera_enhance.svg b/app/src/main/assets/shared_images/camera_enhance.svg new file mode 100644 index 00000000..28d40b24 --- /dev/null +++ b/app/src/main/assets/shared_images/camera_enhance.svg @@ -0,0 +1,31 @@ + + + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/camera_enhance_dark.png b/app/src/main/assets/shared_images/camera_enhance_dark.png deleted file mode 100644 index 81c14c3b..00000000 Binary files a/app/src/main/assets/shared_images/camera_enhance_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/camera_enhance_light.png b/app/src/main/assets/shared_images/camera_enhance_light.png deleted file mode 100644 index f4afd242..00000000 Binary files a/app/src/main/assets/shared_images/camera_enhance_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/chrome_reader_mode.svg b/app/src/main/assets/shared_images/chrome_reader_mode.svg new file mode 100644 index 00000000..28b7fa65 --- /dev/null +++ b/app/src/main/assets/shared_images/chrome_reader_mode.svg @@ -0,0 +1,28 @@ + + + + + + diff --git a/app/src/main/assets/shared_images/chrome_reader_mode_blue_dark.png b/app/src/main/assets/shared_images/chrome_reader_mode_blue_dark.png deleted file mode 100644 index 92fca842..00000000 Binary files a/app/src/main/assets/shared_images/chrome_reader_mode_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/chrome_reader_mode_blue_guide_dark.png b/app/src/main/assets/shared_images/chrome_reader_mode_blue_guide_dark.png deleted file mode 100644 index 9e0c4f80..00000000 Binary files a/app/src/main/assets/shared_images/chrome_reader_mode_blue_guide_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/chrome_reader_mode_blue_light.png b/app/src/main/assets/shared_images/chrome_reader_mode_blue_light.png deleted file mode 100644 index 6bbac590..00000000 Binary files a/app/src/main/assets/shared_images/chrome_reader_mode_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/chrome_reader_mode_dark.png b/app/src/main/assets/shared_images/chrome_reader_mode_dark.png deleted file mode 100644 index 3d0f493c..00000000 Binary files a/app/src/main/assets/shared_images/chrome_reader_mode_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/chrome_reader_mode_light.png b/app/src/main/assets/shared_images/chrome_reader_mode_light.png deleted file mode 100644 index 648b97ec..00000000 Binary files a/app/src/main/assets/shared_images/chrome_reader_mode_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/clear_and_exit.svg b/app/src/main/assets/shared_images/clear_and_exit.svg new file mode 100644 index 00000000..488d7614 --- /dev/null +++ b/app/src/main/assets/shared_images/clear_and_exit.svg @@ -0,0 +1,33 @@ + + + + + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/clear_and_exit_dark.png b/app/src/main/assets/shared_images/clear_and_exit_dark.png deleted file mode 100644 index e682af77..00000000 Binary files a/app/src/main/assets/shared_images/clear_and_exit_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/clear_and_exit_light.png b/app/src/main/assets/shared_images/clear_and_exit_light.png deleted file mode 100644 index b9fdd999..00000000 Binary files a/app/src/main/assets/shared_images/clear_and_exit_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/close.svg b/app/src/main/assets/shared_images/close.svg new file mode 100644 index 00000000..29ecb3fe --- /dev/null +++ b/app/src/main/assets/shared_images/close.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/close_dark.png b/app/src/main/assets/shared_images/close_dark.png deleted file mode 100644 index 993e4410..00000000 Binary files a/app/src/main/assets/shared_images/close_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/close_light.png b/app/src/main/assets/shared_images/close_light.png deleted file mode 100644 index 0f1086a5..00000000 Binary files a/app/src/main/assets/shared_images/close_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/cookie.svg b/app/src/main/assets/shared_images/cookie.svg new file mode 100644 index 00000000..9990ed55 --- /dev/null +++ b/app/src/main/assets/shared_images/cookie.svg @@ -0,0 +1,29 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/cookie_blue_dark.png b/app/src/main/assets/shared_images/cookie_blue_dark.png deleted file mode 100644 index e89c2fd1..00000000 Binary files a/app/src/main/assets/shared_images/cookie_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/cookie_blue_light.png b/app/src/main/assets/shared_images/cookie_blue_light.png deleted file mode 100644 index a4d5d409..00000000 Binary files a/app/src/main/assets/shared_images/cookie_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/cookie_dark.png b/app/src/main/assets/shared_images/cookie_dark.png deleted file mode 100644 index 6c37be28..00000000 Binary files a/app/src/main/assets/shared_images/cookie_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/cookie_light.png b/app/src/main/assets/shared_images/cookie_light.png deleted file mode 100644 index 3967829b..00000000 Binary files a/app/src/main/assets/shared_images/cookie_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/create_bookmark.svg b/app/src/main/assets/shared_images/create_bookmark.svg new file mode 100644 index 00000000..968a164e --- /dev/null +++ b/app/src/main/assets/shared_images/create_bookmark.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/create_bookmark_dark.png b/app/src/main/assets/shared_images/create_bookmark_dark.png deleted file mode 100644 index a85c5fcd..00000000 Binary files a/app/src/main/assets/shared_images/create_bookmark_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/create_bookmark_light.png b/app/src/main/assets/shared_images/create_bookmark_light.png deleted file mode 100644 index fb04d242..00000000 Binary files a/app/src/main/assets/shared_images/create_bookmark_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/create_folder.svg b/app/src/main/assets/shared_images/create_folder.svg new file mode 100644 index 00000000..57830397 --- /dev/null +++ b/app/src/main/assets/shared_images/create_folder.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/create_folder_dark.png b/app/src/main/assets/shared_images/create_folder_dark.png deleted file mode 100644 index 5b0b258e..00000000 Binary files a/app/src/main/assets/shared_images/create_folder_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/create_folder_light.png b/app/src/main/assets/shared_images/create_folder_light.png deleted file mode 100644 index 98f4418a..00000000 Binary files a/app/src/main/assets/shared_images/create_folder_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/delete.svg b/app/src/main/assets/shared_images/delete.svg new file mode 100644 index 00000000..64dea91d --- /dev/null +++ b/app/src/main/assets/shared_images/delete.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/delete_dark.png b/app/src/main/assets/shared_images/delete_dark.png deleted file mode 100644 index d98cc724..00000000 Binary files a/app/src/main/assets/shared_images/delete_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/delete_forever.svg b/app/src/main/assets/shared_images/delete_forever.svg new file mode 100644 index 00000000..3410c881 --- /dev/null +++ b/app/src/main/assets/shared_images/delete_forever.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/delete_forever_dark.png b/app/src/main/assets/shared_images/delete_forever_dark.png deleted file mode 100644 index f93d72fe..00000000 Binary files a/app/src/main/assets/shared_images/delete_forever_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/delete_forever_light.png b/app/src/main/assets/shared_images/delete_forever_light.png deleted file mode 100644 index a4e87cc9..00000000 Binary files a/app/src/main/assets/shared_images/delete_forever_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/delete_light.png b/app/src/main/assets/shared_images/delete_light.png deleted file mode 100644 index 46c58c3d..00000000 Binary files a/app/src/main/assets/shared_images/delete_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/devices_other.svg b/app/src/main/assets/shared_images/devices_other.svg new file mode 100644 index 00000000..24ca83e2 --- /dev/null +++ b/app/src/main/assets/shared_images/devices_other.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/devices_other_blue_dark.png b/app/src/main/assets/shared_images/devices_other_blue_dark.png deleted file mode 100644 index 9330aad1..00000000 Binary files a/app/src/main/assets/shared_images/devices_other_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/devices_other_blue_light.png b/app/src/main/assets/shared_images/devices_other_blue_light.png deleted file mode 100644 index d6e7989b..00000000 Binary files a/app/src/main/assets/shared_images/devices_other_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/devices_other_dark.png b/app/src/main/assets/shared_images/devices_other_dark.png deleted file mode 100644 index 42a1e526..00000000 Binary files a/app/src/main/assets/shared_images/devices_other_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/devices_other_light.png b/app/src/main/assets/shared_images/devices_other_light.png deleted file mode 100644 index dcf7e12e..00000000 Binary files a/app/src/main/assets/shared_images/devices_other_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/dns.svg b/app/src/main/assets/shared_images/dns.svg new file mode 100644 index 00000000..66bf67d1 --- /dev/null +++ b/app/src/main/assets/shared_images/dns.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/dns_blue_dark.png b/app/src/main/assets/shared_images/dns_blue_dark.png deleted file mode 100644 index 57d8c7da..00000000 Binary files a/app/src/main/assets/shared_images/dns_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/dns_blue_light.png b/app/src/main/assets/shared_images/dns_blue_light.png deleted file mode 100644 index 0acaf829..00000000 Binary files a/app/src/main/assets/shared_images/dns_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/dns_dark.png b/app/src/main/assets/shared_images/dns_dark.png deleted file mode 100644 index 74721454..00000000 Binary files a/app/src/main/assets/shared_images/dns_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/dns_light.png b/app/src/main/assets/shared_images/dns_light.png deleted file mode 100644 index 0eefb00d..00000000 Binary files a/app/src/main/assets/shared_images/dns_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/donut_small.svg b/app/src/main/assets/shared_images/donut_small.svg new file mode 100644 index 00000000..6deff3a7 --- /dev/null +++ b/app/src/main/assets/shared_images/donut_small.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/donut_small_dark.png b/app/src/main/assets/shared_images/donut_small_dark.png deleted file mode 100644 index 50c79655..00000000 Binary files a/app/src/main/assets/shared_images/donut_small_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/donut_small_light.png b/app/src/main/assets/shared_images/donut_small_light.png deleted file mode 100644 index 1ec1ca88..00000000 Binary files a/app/src/main/assets/shared_images/donut_small_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/edit.svg b/app/src/main/assets/shared_images/edit.svg new file mode 100644 index 00000000..d43268b8 --- /dev/null +++ b/app/src/main/assets/shared_images/edit.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/edit_dark.png b/app/src/main/assets/shared_images/edit_dark.png deleted file mode 100644 index 0b608d46..00000000 Binary files a/app/src/main/assets/shared_images/edit_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/edit_light.png b/app/src/main/assets/shared_images/edit_light.png deleted file mode 100644 index f4612f08..00000000 Binary files a/app/src/main/assets/shared_images/edit_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/expand_less.svg b/app/src/main/assets/shared_images/expand_less.svg new file mode 100644 index 00000000..290d1082 --- /dev/null +++ b/app/src/main/assets/shared_images/expand_less.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/expand_less_dark.png b/app/src/main/assets/shared_images/expand_less_dark.png deleted file mode 100644 index 273197cf..00000000 Binary files a/app/src/main/assets/shared_images/expand_less_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/expand_less_light.png b/app/src/main/assets/shared_images/expand_less_light.png deleted file mode 100644 index 1140aa2d..00000000 Binary files a/app/src/main/assets/shared_images/expand_less_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/expand_more.svg b/app/src/main/assets/shared_images/expand_more.svg new file mode 100644 index 00000000..cea09658 --- /dev/null +++ b/app/src/main/assets/shared_images/expand_more.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/expand_more_dark.png b/app/src/main/assets/shared_images/expand_more_dark.png deleted file mode 100644 index fb63c9c6..00000000 Binary files a/app/src/main/assets/shared_images/expand_more_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/expand_more_light.png b/app/src/main/assets/shared_images/expand_more_light.png deleted file mode 100644 index 897b3061..00000000 Binary files a/app/src/main/assets/shared_images/expand_more_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/file_copy.svg b/app/src/main/assets/shared_images/file_copy.svg new file mode 100644 index 00000000..f37a83d2 --- /dev/null +++ b/app/src/main/assets/shared_images/file_copy.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/file_copy_dark.png b/app/src/main/assets/shared_images/file_copy_dark.png deleted file mode 100644 index b0aa33e2..00000000 Binary files a/app/src/main/assets/shared_images/file_copy_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/file_copy_light.png b/app/src/main/assets/shared_images/file_copy_light.png deleted file mode 100644 index 2b8a6849..00000000 Binary files a/app/src/main/assets/shared_images/file_copy_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/file_download.svg b/app/src/main/assets/shared_images/file_download.svg new file mode 100644 index 00000000..4700153e --- /dev/null +++ b/app/src/main/assets/shared_images/file_download.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/file_download_dark.png b/app/src/main/assets/shared_images/file_download_dark.png deleted file mode 100644 index cea23b57..00000000 Binary files a/app/src/main/assets/shared_images/file_download_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/file_download_light.png b/app/src/main/assets/shared_images/file_download_light.png deleted file mode 100644 index c250e34d..00000000 Binary files a/app/src/main/assets/shared_images/file_download_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/find_in_page.svg b/app/src/main/assets/shared_images/find_in_page.svg new file mode 100644 index 00000000..f97cdcef --- /dev/null +++ b/app/src/main/assets/shared_images/find_in_page.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/find_in_page_dark.png b/app/src/main/assets/shared_images/find_in_page_dark.png deleted file mode 100644 index 2aae6673..00000000 Binary files a/app/src/main/assets/shared_images/find_in_page_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/find_in_page_light.png b/app/src/main/assets/shared_images/find_in_page_light.png deleted file mode 100644 index 4246a16d..00000000 Binary files a/app/src/main/assets/shared_images/find_in_page_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/folder.svg b/app/src/main/assets/shared_images/folder.svg new file mode 100644 index 00000000..6df9c4f0 --- /dev/null +++ b/app/src/main/assets/shared_images/folder.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/folder_dark.png b/app/src/main/assets/shared_images/folder_dark.png deleted file mode 100644 index f5df8e51..00000000 Binary files a/app/src/main/assets/shared_images/folder_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/folder_light.png b/app/src/main/assets/shared_images/folder_light.png deleted file mode 100644 index e1b3183d..00000000 Binary files a/app/src/main/assets/shared_images/folder_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/home.svg b/app/src/main/assets/shared_images/home.svg new file mode 100644 index 00000000..153f4388 --- /dev/null +++ b/app/src/main/assets/shared_images/home.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/home_dark.png b/app/src/main/assets/shared_images/home_dark.png deleted file mode 100644 index 3b1f28c2..00000000 Binary files a/app/src/main/assets/shared_images/home_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/home_light.png b/app/src/main/assets/shared_images/home_light.png deleted file mode 100644 index 564f597f..00000000 Binary files a/app/src/main/assets/shared_images/home_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/image.svg b/app/src/main/assets/shared_images/image.svg new file mode 100644 index 00000000..237e7e61 --- /dev/null +++ b/app/src/main/assets/shared_images/image.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/image_dark.png b/app/src/main/assets/shared_images/image_dark.png deleted file mode 100644 index 01fb717e..00000000 Binary files a/app/src/main/assets/shared_images/image_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/image_light.png b/app/src/main/assets/shared_images/image_light.png deleted file mode 100644 index 3e4dc0c9..00000000 Binary files a/app/src/main/assets/shared_images/image_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/import_contacts.svg b/app/src/main/assets/shared_images/import_contacts.svg new file mode 100644 index 00000000..493735ed --- /dev/null +++ b/app/src/main/assets/shared_images/import_contacts.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/import_contacts_dark.png b/app/src/main/assets/shared_images/import_contacts_dark.png deleted file mode 100644 index fed4238e..00000000 Binary files a/app/src/main/assets/shared_images/import_contacts_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/import_contacts_light.png b/app/src/main/assets/shared_images/import_contacts_light.png deleted file mode 100644 index 2e380c7f..00000000 Binary files a/app/src/main/assets/shared_images/import_contacts_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/import_export.svg b/app/src/main/assets/shared_images/import_export.svg new file mode 100644 index 00000000..b04d4813 --- /dev/null +++ b/app/src/main/assets/shared_images/import_export.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/import_export_dark.png b/app/src/main/assets/shared_images/import_export_dark.png deleted file mode 100644 index aae1e03e..00000000 Binary files a/app/src/main/assets/shared_images/import_export_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/import_export_light.png b/app/src/main/assets/shared_images/import_export_light.png deleted file mode 100644 index 2b70cd72..00000000 Binary files a/app/src/main/assets/shared_images/import_export_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/important_devices.svg b/app/src/main/assets/shared_images/important_devices.svg new file mode 100644 index 00000000..ba5e4c2f --- /dev/null +++ b/app/src/main/assets/shared_images/important_devices.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/important_devices_dark.png b/app/src/main/assets/shared_images/important_devices_dark.png deleted file mode 100644 index 0c4667d6..00000000 Binary files a/app/src/main/assets/shared_images/important_devices_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/important_devices_light.png b/app/src/main/assets/shared_images/important_devices_light.png deleted file mode 100644 index f85e4fc2..00000000 Binary files a/app/src/main/assets/shared_images/important_devices_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/info_outline.svg b/app/src/main/assets/shared_images/info_outline.svg new file mode 100644 index 00000000..7b97418c --- /dev/null +++ b/app/src/main/assets/shared_images/info_outline.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/info_outline_dark.png b/app/src/main/assets/shared_images/info_outline_dark.png deleted file mode 100644 index a376d234..00000000 Binary files a/app/src/main/assets/shared_images/info_outline_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/info_outline_light.png b/app/src/main/assets/shared_images/info_outline_light.png deleted file mode 100644 index d540f1cf..00000000 Binary files a/app/src/main/assets/shared_images/info_outline_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/javascript_enabled.png b/app/src/main/assets/shared_images/javascript_enabled.png deleted file mode 100644 index 0a91522c..00000000 Binary files a/app/src/main/assets/shared_images/javascript_enabled.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/javascript_enabled.svg b/app/src/main/assets/shared_images/javascript_enabled.svg new file mode 100644 index 00000000..daaad383 --- /dev/null +++ b/app/src/main/assets/shared_images/javascript_enabled.svg @@ -0,0 +1,45 @@ + + + + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/language.svg b/app/src/main/assets/shared_images/language.svg new file mode 100644 index 00000000..a1976d52 --- /dev/null +++ b/app/src/main/assets/shared_images/language.svg @@ -0,0 +1,28 @@ + + + + + + diff --git a/app/src/main/assets/shared_images/language_blue_dark.png b/app/src/main/assets/shared_images/language_blue_dark.png deleted file mode 100644 index ad142094..00000000 Binary files a/app/src/main/assets/shared_images/language_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/language_blue_light.png b/app/src/main/assets/shared_images/language_blue_light.png deleted file mode 100644 index 3b23868c..00000000 Binary files a/app/src/main/assets/shared_images/language_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/language_dark.png b/app/src/main/assets/shared_images/language_dark.png deleted file mode 100644 index 5c185af2..00000000 Binary files a/app/src/main/assets/shared_images/language_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/language_light.png b/app/src/main/assets/shared_images/language_light.png deleted file mode 100644 index 5aee3a92..00000000 Binary files a/app/src/main/assets/shared_images/language_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/link_off.svg b/app/src/main/assets/shared_images/link_off.svg new file mode 100644 index 00000000..df8fc7d4 --- /dev/null +++ b/app/src/main/assets/shared_images/link_off.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/link_off_blue_dark.png b/app/src/main/assets/shared_images/link_off_blue_dark.png deleted file mode 100644 index 0433d2a6..00000000 Binary files a/app/src/main/assets/shared_images/link_off_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/link_off_blue_light.png b/app/src/main/assets/shared_images/link_off_blue_light.png deleted file mode 100644 index 9d0cbf2e..00000000 Binary files a/app/src/main/assets/shared_images/link_off_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/link_off_dark.png b/app/src/main/assets/shared_images/link_off_dark.png deleted file mode 100644 index 2d80b53e..00000000 Binary files a/app/src/main/assets/shared_images/link_off_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/link_off_light.png b/app/src/main/assets/shared_images/link_off_light.png deleted file mode 100644 index d85bfc6b..00000000 Binary files a/app/src/main/assets/shared_images/link_off_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/list.svg b/app/src/main/assets/shared_images/list.svg new file mode 100644 index 00000000..56697d7c --- /dev/null +++ b/app/src/main/assets/shared_images/list.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/list_dark.png b/app/src/main/assets/shared_images/list_dark.png deleted file mode 100644 index 495dd2b2..00000000 Binary files a/app/src/main/assets/shared_images/list_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/list_light.png b/app/src/main/assets/shared_images/list_light.png deleted file mode 100644 index 786df41d..00000000 Binary files a/app/src/main/assets/shared_images/list_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/local_activity.svg b/app/src/main/assets/shared_images/local_activity.svg new file mode 100644 index 00000000..1f1184a3 --- /dev/null +++ b/app/src/main/assets/shared_images/local_activity.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/local_activity_blue_dark.png b/app/src/main/assets/shared_images/local_activity_blue_dark.png deleted file mode 100644 index 2ac47bed..00000000 Binary files a/app/src/main/assets/shared_images/local_activity_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/local_activity_blue_light.png b/app/src/main/assets/shared_images/local_activity_blue_light.png deleted file mode 100644 index 8f27af93..00000000 Binary files a/app/src/main/assets/shared_images/local_activity_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/local_activity_dark.png b/app/src/main/assets/shared_images/local_activity_dark.png deleted file mode 100644 index 92312644..00000000 Binary files a/app/src/main/assets/shared_images/local_activity_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/local_activity_light.png b/app/src/main/assets/shared_images/local_activity_light.png deleted file mode 100644 index 4e0a1539..00000000 Binary files a/app/src/main/assets/shared_images/local_activity_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/location_off.svg b/app/src/main/assets/shared_images/location_off.svg new file mode 100644 index 00000000..eb2b05ab --- /dev/null +++ b/app/src/main/assets/shared_images/location_off.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/location_off_blue_dark.png b/app/src/main/assets/shared_images/location_off_blue_dark.png deleted file mode 100644 index 79140dff..00000000 Binary files a/app/src/main/assets/shared_images/location_off_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/location_off_blue_light.png b/app/src/main/assets/shared_images/location_off_blue_light.png deleted file mode 100644 index b1bb20d5..00000000 Binary files a/app/src/main/assets/shared_images/location_off_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/location_off_dark.png b/app/src/main/assets/shared_images/location_off_dark.png deleted file mode 100644 index 38bd36db..00000000 Binary files a/app/src/main/assets/shared_images/location_off_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/location_off_light.png b/app/src/main/assets/shared_images/location_off_light.png deleted file mode 100644 index 181aba4a..00000000 Binary files a/app/src/main/assets/shared_images/location_off_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/lock.svg b/app/src/main/assets/shared_images/lock.svg new file mode 100644 index 00000000..96c05888 --- /dev/null +++ b/app/src/main/assets/shared_images/lock.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/lock_dark.png b/app/src/main/assets/shared_images/lock_dark.png deleted file mode 100644 index 87a76590..00000000 Binary files a/app/src/main/assets/shared_images/lock_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/lock_light.png b/app/src/main/assets/shared_images/lock_light.png deleted file mode 100644 index dba1a27b..00000000 Binary files a/app/src/main/assets/shared_images/lock_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/map.svg b/app/src/main/assets/shared_images/map.svg new file mode 100644 index 00000000..573dad72 --- /dev/null +++ b/app/src/main/assets/shared_images/map.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/map_blue_dark.png b/app/src/main/assets/shared_images/map_blue_dark.png deleted file mode 100644 index dafbcc4b..00000000 Binary files a/app/src/main/assets/shared_images/map_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/map_blue_light.png b/app/src/main/assets/shared_images/map_blue_light.png deleted file mode 100644 index 869ee2d3..00000000 Binary files a/app/src/main/assets/shared_images/map_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/map_dark.png b/app/src/main/assets/shared_images/map_dark.png deleted file mode 100644 index 5ac1d07d..00000000 Binary files a/app/src/main/assets/shared_images/map_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/map_light.png b/app/src/main/assets/shared_images/map_light.png deleted file mode 100644 index 0f251607..00000000 Binary files a/app/src/main/assets/shared_images/map_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/more.svg b/app/src/main/assets/shared_images/more.svg new file mode 100644 index 00000000..d85915e1 --- /dev/null +++ b/app/src/main/assets/shared_images/more.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/more_blue_dark.png b/app/src/main/assets/shared_images/more_blue_dark.png deleted file mode 100644 index 481478d6..00000000 Binary files a/app/src/main/assets/shared_images/more_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/more_blue_light.png b/app/src/main/assets/shared_images/more_blue_light.png deleted file mode 100644 index bd606f9a..00000000 Binary files a/app/src/main/assets/shared_images/more_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/more_dark.png b/app/src/main/assets/shared_images/more_dark.png deleted file mode 100644 index c1c54dac..00000000 Binary files a/app/src/main/assets/shared_images/more_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/more_light.png b/app/src/main/assets/shared_images/more_light.png deleted file mode 100644 index c5c2632d..00000000 Binary files a/app/src/main/assets/shared_images/more_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/move_to_folder.svg b/app/src/main/assets/shared_images/move_to_folder.svg new file mode 100644 index 00000000..23e07ac2 --- /dev/null +++ b/app/src/main/assets/shared_images/move_to_folder.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/move_to_folder_dark.png b/app/src/main/assets/shared_images/move_to_folder_dark.png deleted file mode 100644 index 343fc0b2..00000000 Binary files a/app/src/main/assets/shared_images/move_to_folder_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/move_to_folder_light.png b/app/src/main/assets/shared_images/move_to_folder_light.png deleted file mode 100644 index ab353f9d..00000000 Binary files a/app/src/main/assets/shared_images/move_to_folder_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/new_releases.svg b/app/src/main/assets/shared_images/new_releases.svg new file mode 100644 index 00000000..81485f68 --- /dev/null +++ b/app/src/main/assets/shared_images/new_releases.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/new_releases_dark.png b/app/src/main/assets/shared_images/new_releases_dark.png deleted file mode 100644 index b918a631..00000000 Binary files a/app/src/main/assets/shared_images/new_releases_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/new_releases_light.png b/app/src/main/assets/shared_images/new_releases_light.png deleted file mode 100644 index 56570d6a..00000000 Binary files a/app/src/main/assets/shared_images/new_releases_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/night_mode.svg b/app/src/main/assets/shared_images/night_mode.svg new file mode 100644 index 00000000..ead987ee --- /dev/null +++ b/app/src/main/assets/shared_images/night_mode.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/night_mode_dark.png b/app/src/main/assets/shared_images/night_mode_dark.png deleted file mode 100644 index 493e7863..00000000 Binary files a/app/src/main/assets/shared_images/night_mode_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/night_mode_light.png b/app/src/main/assets/shared_images/night_mode_light.png deleted file mode 100644 index 5e6cf454..00000000 Binary files a/app/src/main/assets/shared_images/night_mode_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/open_in_browser.svg b/app/src/main/assets/shared_images/open_in_browser.svg new file mode 100644 index 00000000..00931590 --- /dev/null +++ b/app/src/main/assets/shared_images/open_in_browser.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/open_in_browser_blue_dark.png b/app/src/main/assets/shared_images/open_in_browser_blue_dark.png deleted file mode 100644 index 46ea5ef1..00000000 Binary files a/app/src/main/assets/shared_images/open_in_browser_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/open_in_browser_blue_light.png b/app/src/main/assets/shared_images/open_in_browser_blue_light.png deleted file mode 100644 index aaf3edf9..00000000 Binary files a/app/src/main/assets/shared_images/open_in_browser_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/open_in_browser_dark.png b/app/src/main/assets/shared_images/open_in_browser_dark.png deleted file mode 100644 index a52d292c..00000000 Binary files a/app/src/main/assets/shared_images/open_in_browser_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/open_in_browser_light.png b/app/src/main/assets/shared_images/open_in_browser_light.png deleted file mode 100644 index 1aa3a499..00000000 Binary files a/app/src/main/assets/shared_images/open_in_browser_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/payment.svg b/app/src/main/assets/shared_images/payment.svg new file mode 100644 index 00000000..8fdbdf96 --- /dev/null +++ b/app/src/main/assets/shared_images/payment.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/payment_dark.png b/app/src/main/assets/shared_images/payment_dark.png deleted file mode 100644 index 65944b30..00000000 Binary files a/app/src/main/assets/shared_images/payment_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/payment_light.png b/app/src/main/assets/shared_images/payment_light.png deleted file mode 100644 index 16354838..00000000 Binary files a/app/src/main/assets/shared_images/payment_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/privacy_browser.png b/app/src/main/assets/shared_images/privacy_browser.png deleted file mode 100644 index 6dfc6989..00000000 Binary files a/app/src/main/assets/shared_images/privacy_browser.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/privacy_browser.svg b/app/src/main/assets/shared_images/privacy_browser.svg new file mode 100644 index 00000000..f9880024 --- /dev/null +++ b/app/src/main/assets/shared_images/privacy_browser.svg @@ -0,0 +1,45 @@ + + + + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/privacy_browser_free.png b/app/src/main/assets/shared_images/privacy_browser_free.png deleted file mode 100644 index ed2ab62b..00000000 Binary files a/app/src/main/assets/shared_images/privacy_browser_free.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/privacy_browser_free.svg b/app/src/main/assets/shared_images/privacy_browser_free.svg new file mode 100644 index 00000000..053c668d --- /dev/null +++ b/app/src/main/assets/shared_images/privacy_browser_free.svg @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/question_answer.svg b/app/src/main/assets/shared_images/question_answer.svg new file mode 100644 index 00000000..43f5f0ef --- /dev/null +++ b/app/src/main/assets/shared_images/question_answer.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/question_answer_blue_dark.png b/app/src/main/assets/shared_images/question_answer_blue_dark.png deleted file mode 100644 index 65752a38..00000000 Binary files a/app/src/main/assets/shared_images/question_answer_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/question_answer_blue_light.png b/app/src/main/assets/shared_images/question_answer_blue_light.png deleted file mode 100644 index 4fa34b94..00000000 Binary files a/app/src/main/assets/shared_images/question_answer_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/question_answer_dark.png b/app/src/main/assets/shared_images/question_answer_dark.png deleted file mode 100644 index ec214b68..00000000 Binary files a/app/src/main/assets/shared_images/question_answer_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/question_answer_light.png b/app/src/main/assets/shared_images/question_answer_light.png deleted file mode 100644 index cff293a0..00000000 Binary files a/app/src/main/assets/shared_images/question_answer_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/refresh.svg b/app/src/main/assets/shared_images/refresh.svg new file mode 100644 index 00000000..2a81afee --- /dev/null +++ b/app/src/main/assets/shared_images/refresh.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/refresh_dark.png b/app/src/main/assets/shared_images/refresh_dark.png deleted file mode 100644 index 725b3107..00000000 Binary files a/app/src/main/assets/shared_images/refresh_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/refresh_light.png b/app/src/main/assets/shared_images/refresh_light.png deleted file mode 100644 index a37fd60e..00000000 Binary files a/app/src/main/assets/shared_images/refresh_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/save.svg b/app/src/main/assets/shared_images/save.svg new file mode 100644 index 00000000..f2a50334 --- /dev/null +++ b/app/src/main/assets/shared_images/save.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/save_dark.png b/app/src/main/assets/shared_images/save_dark.png deleted file mode 100644 index 4b39ab0b..00000000 Binary files a/app/src/main/assets/shared_images/save_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/save_light.png b/app/src/main/assets/shared_images/save_light.png deleted file mode 100644 index a415690a..00000000 Binary files a/app/src/main/assets/shared_images/save_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/search.svg b/app/src/main/assets/shared_images/search.svg new file mode 100644 index 00000000..068e47c9 --- /dev/null +++ b/app/src/main/assets/shared_images/search.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/search_dark.png b/app/src/main/assets/shared_images/search_dark.png deleted file mode 100644 index 871bc0c1..00000000 Binary files a/app/src/main/assets/shared_images/search_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/search_light.png b/app/src/main/assets/shared_images/search_light.png deleted file mode 100644 index e49d7545..00000000 Binary files a/app/src/main/assets/shared_images/search_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/select_all.svg b/app/src/main/assets/shared_images/select_all.svg new file mode 100644 index 00000000..b9036d93 --- /dev/null +++ b/app/src/main/assets/shared_images/select_all.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/select_all_dark.png b/app/src/main/assets/shared_images/select_all_dark.png deleted file mode 100644 index 2e58c4d0..00000000 Binary files a/app/src/main/assets/shared_images/select_all_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/select_all_light.png b/app/src/main/assets/shared_images/select_all_light.png deleted file mode 100644 index 92aab4e2..00000000 Binary files a/app/src/main/assets/shared_images/select_all_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/settings.svg b/app/src/main/assets/shared_images/settings.svg new file mode 100644 index 00000000..e0cb2bc4 --- /dev/null +++ b/app/src/main/assets/shared_images/settings.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/settings_dark.png b/app/src/main/assets/shared_images/settings_dark.png deleted file mode 100644 index 29adb395..00000000 Binary files a/app/src/main/assets/shared_images/settings_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/settings_light.png b/app/src/main/assets/shared_images/settings_light.png deleted file mode 100644 index ed308aa8..00000000 Binary files a/app/src/main/assets/shared_images/settings_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/settings_overscan.svg b/app/src/main/assets/shared_images/settings_overscan.svg new file mode 100644 index 00000000..b267de23 --- /dev/null +++ b/app/src/main/assets/shared_images/settings_overscan.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/settings_overscan_dark.png b/app/src/main/assets/shared_images/settings_overscan_dark.png deleted file mode 100644 index 099edfeb..00000000 Binary files a/app/src/main/assets/shared_images/settings_overscan_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/settings_overscan_light.png b/app/src/main/assets/shared_images/settings_overscan_light.png deleted file mode 100644 index 8df0441c..00000000 Binary files a/app/src/main/assets/shared_images/settings_overscan_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/share.svg b/app/src/main/assets/shared_images/share.svg new file mode 100644 index 00000000..9eb9a7ef --- /dev/null +++ b/app/src/main/assets/shared_images/share.svg @@ -0,0 +1,29 @@ + + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/share_day.png b/app/src/main/assets/shared_images/share_day.png deleted file mode 100644 index d534ef76..00000000 Binary files a/app/src/main/assets/shared_images/share_day.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/share_night.png b/app/src/main/assets/shared_images/share_night.png deleted file mode 100644 index 23c0ecb7..00000000 Binary files a/app/src/main/assets/shared_images/share_night.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/smartphone.svg b/app/src/main/assets/shared_images/smartphone.svg new file mode 100644 index 00000000..ca561d12 --- /dev/null +++ b/app/src/main/assets/shared_images/smartphone.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/smartphone_dark.png b/app/src/main/assets/shared_images/smartphone_dark.png deleted file mode 100644 index 13a662a3..00000000 Binary files a/app/src/main/assets/shared_images/smartphone_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/smartphone_light.png b/app/src/main/assets/shared_images/smartphone_light.png deleted file mode 100644 index 9704accd..00000000 Binary files a/app/src/main/assets/shared_images/smartphone_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/sort.svg b/app/src/main/assets/shared_images/sort.svg new file mode 100644 index 00000000..068843f2 --- /dev/null +++ b/app/src/main/assets/shared_images/sort.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/sort_dark.png b/app/src/main/assets/shared_images/sort_dark.png deleted file mode 100644 index 123d2799..00000000 Binary files a/app/src/main/assets/shared_images/sort_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/sort_light.png b/app/src/main/assets/shared_images/sort_light.png deleted file mode 100644 index 03066a01..00000000 Binary files a/app/src/main/assets/shared_images/sort_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/sort_selected.svg b/app/src/main/assets/shared_images/sort_selected.svg new file mode 100644 index 00000000..2c5201cb --- /dev/null +++ b/app/src/main/assets/shared_images/sort_selected.svg @@ -0,0 +1,60 @@ + + + + + + + + + + + + + + + + diff --git a/app/src/main/assets/shared_images/sort_selected_dark.png b/app/src/main/assets/shared_images/sort_selected_dark.png deleted file mode 100644 index 668dbf1e..00000000 Binary files a/app/src/main/assets/shared_images/sort_selected_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/sort_selected_light.png b/app/src/main/assets/shared_images/sort_selected_light.png deleted file mode 100644 index b1063201..00000000 Binary files a/app/src/main/assets/shared_images/sort_selected_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/style.svg b/app/src/main/assets/shared_images/style.svg new file mode 100644 index 00000000..9c9e9036 --- /dev/null +++ b/app/src/main/assets/shared_images/style.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/style_dark.png b/app/src/main/assets/shared_images/style_dark.png deleted file mode 100644 index e00426b8..00000000 Binary files a/app/src/main/assets/shared_images/style_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/style_light.png b/app/src/main/assets/shared_images/style_light.png deleted file mode 100644 index 56b43c02..00000000 Binary files a/app/src/main/assets/shared_images/style_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/subtitles.svg b/app/src/main/assets/shared_images/subtitles.svg new file mode 100644 index 00000000..0f15f2c8 --- /dev/null +++ b/app/src/main/assets/shared_images/subtitles.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/subtitles_blue_dark.png b/app/src/main/assets/shared_images/subtitles_blue_dark.png deleted file mode 100644 index 6721719c..00000000 Binary files a/app/src/main/assets/shared_images/subtitles_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/subtitles_blue_light.png b/app/src/main/assets/shared_images/subtitles_blue_light.png deleted file mode 100644 index 11c87bd3..00000000 Binary files a/app/src/main/assets/shared_images/subtitles_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/subtitles_dark.png b/app/src/main/assets/shared_images/subtitles_dark.png deleted file mode 100644 index c6742b7e..00000000 Binary files a/app/src/main/assets/shared_images/subtitles_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/subtitles_light.png b/app/src/main/assets/shared_images/subtitles_light.png deleted file mode 100644 index dc320b03..00000000 Binary files a/app/src/main/assets/shared_images/subtitles_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/tab.svg b/app/src/main/assets/shared_images/tab.svg new file mode 100644 index 00000000..22019460 --- /dev/null +++ b/app/src/main/assets/shared_images/tab.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/tab_dark.png b/app/src/main/assets/shared_images/tab_dark.png deleted file mode 100644 index 1509a09c..00000000 Binary files a/app/src/main/assets/shared_images/tab_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/tab_light.png b/app/src/main/assets/shared_images/tab_light.png deleted file mode 100644 index 39c05d46..00000000 Binary files a/app/src/main/assets/shared_images/tab_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/text_fields.svg b/app/src/main/assets/shared_images/text_fields.svg new file mode 100644 index 00000000..137afada --- /dev/null +++ b/app/src/main/assets/shared_images/text_fields.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/text_fields_dark.png b/app/src/main/assets/shared_images/text_fields_dark.png deleted file mode 100644 index c6dd101a..00000000 Binary files a/app/src/main/assets/shared_images/text_fields_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/text_fields_light.png b/app/src/main/assets/shared_images/text_fields_light.png deleted file mode 100644 index de558366..00000000 Binary files a/app/src/main/assets/shared_images/text_fields_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/thumbs_up_down.svg b/app/src/main/assets/shared_images/thumbs_up_down.svg new file mode 100644 index 00000000..24a90572 --- /dev/null +++ b/app/src/main/assets/shared_images/thumbs_up_down.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/thumbs_up_down_dark.png b/app/src/main/assets/shared_images/thumbs_up_down_dark.png deleted file mode 100644 index 09d615d1..00000000 Binary files a/app/src/main/assets/shared_images/thumbs_up_down_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/thumbs_up_down_light.png b/app/src/main/assets/shared_images/thumbs_up_down_light.png deleted file mode 100644 index 6f1f7910..00000000 Binary files a/app/src/main/assets/shared_images/thumbs_up_down_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/vertical_align_bottom.svg b/app/src/main/assets/shared_images/vertical_align_bottom.svg new file mode 100644 index 00000000..5dcd212a --- /dev/null +++ b/app/src/main/assets/shared_images/vertical_align_bottom.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/vertical_align_bottom_dark.png b/app/src/main/assets/shared_images/vertical_align_bottom_dark.png deleted file mode 100644 index 3a97e6ab..00000000 Binary files a/app/src/main/assets/shared_images/vertical_align_bottom_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/vertical_align_bottom_light.png b/app/src/main/assets/shared_images/vertical_align_bottom_light.png deleted file mode 100644 index 620a1201..00000000 Binary files a/app/src/main/assets/shared_images/vertical_align_bottom_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/vertical_align_top.svg b/app/src/main/assets/shared_images/vertical_align_top.svg new file mode 100644 index 00000000..d738c2bf --- /dev/null +++ b/app/src/main/assets/shared_images/vertical_align_top.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/vertical_align_top_dark.png b/app/src/main/assets/shared_images/vertical_align_top_dark.png deleted file mode 100644 index 30ab1c5a..00000000 Binary files a/app/src/main/assets/shared_images/vertical_align_top_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/vertical_align_top_light.png b/app/src/main/assets/shared_images/vertical_align_top_light.png deleted file mode 100644 index 607c9e6a..00000000 Binary files a/app/src/main/assets/shared_images/vertical_align_top_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/visibility_off.svg b/app/src/main/assets/shared_images/visibility_off.svg new file mode 100644 index 00000000..82e11f4a --- /dev/null +++ b/app/src/main/assets/shared_images/visibility_off.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/visibility_off_blue_dark.png b/app/src/main/assets/shared_images/visibility_off_blue_dark.png deleted file mode 100644 index 9753a697..00000000 Binary files a/app/src/main/assets/shared_images/visibility_off_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/visibility_off_blue_light.png b/app/src/main/assets/shared_images/visibility_off_blue_light.png deleted file mode 100644 index e2737258..00000000 Binary files a/app/src/main/assets/shared_images/visibility_off_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/visibility_off_dark.png b/app/src/main/assets/shared_images/visibility_off_dark.png deleted file mode 100644 index 8c81329d..00000000 Binary files a/app/src/main/assets/shared_images/visibility_off_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/visibility_off_light.png b/app/src/main/assets/shared_images/visibility_off_light.png deleted file mode 100644 index a4bcb6ac..00000000 Binary files a/app/src/main/assets/shared_images/visibility_off_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/vpn_key.svg b/app/src/main/assets/shared_images/vpn_key.svg new file mode 100644 index 00000000..d503ff74 --- /dev/null +++ b/app/src/main/assets/shared_images/vpn_key.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/vpn_key_blue_dark.png b/app/src/main/assets/shared_images/vpn_key_blue_dark.png deleted file mode 100644 index 6c715c5f..00000000 Binary files a/app/src/main/assets/shared_images/vpn_key_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/vpn_key_blue_light.png b/app/src/main/assets/shared_images/vpn_key_blue_light.png deleted file mode 100644 index 1a01778d..00000000 Binary files a/app/src/main/assets/shared_images/vpn_key_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/vpn_key_dark.png b/app/src/main/assets/shared_images/vpn_key_dark.png deleted file mode 100644 index c80d4b8e..00000000 Binary files a/app/src/main/assets/shared_images/vpn_key_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/vpn_key_light.png b/app/src/main/assets/shared_images/vpn_key_light.png deleted file mode 100644 index 28be5b70..00000000 Binary files a/app/src/main/assets/shared_images/vpn_key_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/vpn_lock.svg b/app/src/main/assets/shared_images/vpn_lock.svg new file mode 100644 index 00000000..1a41bc7a --- /dev/null +++ b/app/src/main/assets/shared_images/vpn_lock.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/vpn_lock_blue_dark.png b/app/src/main/assets/shared_images/vpn_lock_blue_dark.png deleted file mode 100644 index 134a19bf..00000000 Binary files a/app/src/main/assets/shared_images/vpn_lock_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/vpn_lock_blue_light.png b/app/src/main/assets/shared_images/vpn_lock_blue_light.png deleted file mode 100644 index 60c5c166..00000000 Binary files a/app/src/main/assets/shared_images/vpn_lock_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/vpn_lock_dark.png b/app/src/main/assets/shared_images/vpn_lock_dark.png deleted file mode 100644 index 32367357..00000000 Binary files a/app/src/main/assets/shared_images/vpn_lock_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/vpn_lock_light.png b/app/src/main/assets/shared_images/vpn_lock_light.png deleted file mode 100644 index 5adb9cfc..00000000 Binary files a/app/src/main/assets/shared_images/vpn_lock_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/warning.png b/app/src/main/assets/shared_images/warning.png deleted file mode 100644 index 99d0db5f..00000000 Binary files a/app/src/main/assets/shared_images/warning.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/warning.svg b/app/src/main/assets/shared_images/warning.svg new file mode 100644 index 00000000..19fc6d59 --- /dev/null +++ b/app/src/main/assets/shared_images/warning.svg @@ -0,0 +1,45 @@ + + + + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/web.svg b/app/src/main/assets/shared_images/web.svg new file mode 100644 index 00000000..3e9f4f90 --- /dev/null +++ b/app/src/main/assets/shared_images/web.svg @@ -0,0 +1,28 @@ + + + + + + \ No newline at end of file diff --git a/app/src/main/assets/shared_images/web_blue_dark.png b/app/src/main/assets/shared_images/web_blue_dark.png deleted file mode 100644 index fe3939e4..00000000 Binary files a/app/src/main/assets/shared_images/web_blue_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/web_blue_light.png b/app/src/main/assets/shared_images/web_blue_light.png deleted file mode 100644 index d3030bef..00000000 Binary files a/app/src/main/assets/shared_images/web_blue_light.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/web_dark.png b/app/src/main/assets/shared_images/web_dark.png deleted file mode 100644 index 0ece4668..00000000 Binary files a/app/src/main/assets/shared_images/web_dark.png and /dev/null differ diff --git a/app/src/main/assets/shared_images/web_light.png b/app/src/main/assets/shared_images/web_light.png deleted file mode 100644 index 5ffe93a1..00000000 Binary files a/app/src/main/assets/shared_images/web_light.png and /dev/null differ diff --git a/app/src/main/assets/tr/about_changelog.html b/app/src/main/assets/tr/about_changelog.html new file mode 100644 index 00000000..2e47d9b3 --- /dev/null +++ b/app/src/main/assets/tr/about_changelog.html @@ -0,0 +1,686 @@ + + + + + + + + + + + + + +

3.5.1 (version code 51)

+

28 August 2020 - minimum API 19, target API 29

+
    +
  • Fix a bug that caused new intents (links from other apps) to not load if Privacy Browser had been killed by the OS in the background.
  • +
  • Fix a bug that caused the app to initialize incorrectly if the app theme was set to the opposite of the OS theme.
  • +
+ +

3.5 (version code 50)

+

18 August 2020 - minimum API 19, target API 29

+ + +

3.4.1 (version code 49)

+

1 Nisan 2020 - minimum API 19, target API 29

+ + +

3.4 (version code 48)

+

28 Mart 2020 - minimum API 19, target API 29

+ + +

3.3 (version code 47)

+

3 Ocak 2020 - minimum API 19, target API 29

+ + +

3.2 (version code 46)

+

20 July 2019 - minimum API 19, target API 28

+ + +

3.1 (version code 45)

+

27 Mayıs 2019 - minimum API 19, target API 28

+ + +

3.0.1 (version code 44)

+

2 Mayıs 2019 - minimum API 19, target API 28

+ + +

3.0 (version code 43)

+

26 Nisan 2019 - minimum API 19, target API 28

+
    +
  • Sekmeli tarama eklendi.
  • +
  • Uygulama çubuğu kaydırma devredışı olduğunda Web Görünümü'nün alt kısmının kesilmesine sebep olan hata düzeltildi.
  • +
  • Ne zaman bir Bluetooth klavye bağlandığında/bağlantısı kesildiğinde Privacy Browser'i yeniden başlatmaya sebep olan hata düzeltildi.
  • +
  • Kısmi Türkçe çevirisi yapıldı.
  • +
  • Almanca çevirisi güncellendi. (Çevirmen Bernhard G. Keller.)
  • +
  • Ä°talyan çevirisi güncellendi. (Çevirmen Francesco Buratti.)
  • +
  • Rusça çevirisi güncellendi.
  • +
  • Ä°spanyol çevirisi güncellendi. (Çevirmen Jose A. León.)
  • +
+ +

2.17.1 (version code 42)

+

5 Mart 2019 - minimum API 19, target API 28

+ + +

2.17 (version code 41)

+

27 Şubat 2019 - minimum API 19, target API 28

+ + +

2.16 (version code 40)

+

31 Ocak 2019 - minimum API 19, target API 28

+ + +

2.15.1 (version code 39)

+

27 Aralık 2018 - minimum API 19, target API 28

+ + +

2.15 (version code 38)

+

24 Aralık 2018 - minimum API 19, target API 28

+ + +

2.14 (version code 37)

+

8 Aralık 2018 - minimum API 19, target API 28

+ + +

2.13 (version code 36)

+

29 October 2018 - minimum API 19, target API 28

+ + +

2.12 (version code 35)

+

31 July 2018 - minimum API 19, target API 27

+ + +

2.11 (version code 34)

+

10 July 2018 - minimum API 19, target API 27

+ + +

2.10 (version code 33)

+

24 Mayıs 2018 - minimum API 19, target API 27

+ + +

2.9 (version code 32)

+

9 Mayıs 2018 - minimum API 19, target API 27

+ + +

2.8.1 (version code 31)

+

1 Mart 2018 - minimum API 19, target API 27

+ + +

2.8 (version code 30)

+

22 Şubat 2018 - minimum API 19, target API 27

+ + +

2.7.2 (version code 29)

+

22 November 2017 - minimum API 19, target API 26

+ + +

2.7.1 (version code 28)

+

9 November 2017 - minimum API 19, target API 26

+ + +

2.7 (version code 27)

+

7 November 2017 - minimum API 19, target API 26

+
    +
  • Add a bookmarks drawer that is accessed by sliding from the right.
  • +
  • Prevent Night Mode from flashing a white background when loading new pages.
  • +
  • Update the user agents.
  • +
  • Bump target API to 26 (Android Oreo, 8.0.0).
  • +
  • Updated Italian translation provided by Francesco Buratti.
  • +
  • Updated Spanish translation provided by Jose A. León.
  • +
+ +

2.6 (version code 26)

+

18 September 2017 - minimum API 19, target API 25

+ + +

2.5 (version code 25)

+

26 August 2017 - minimum API 19, target API 25

+ + +

2.4 (version code 24)

+

23 June 2017 - minimum API 19, target API 25

+ + +

2.3 (version code 23)

+

26 Mayıs 2017 - minimum API 19, target API 25

+ + +

2.2 (version code 22)

+

27 Nisan 2017 - minimum API 19, target API 25

+ + +

2.1 (version code 21)

+

25 Mart 2017 - minimum API 19, target API 25

+ + +

2.0.1 (version code 20)

+

21 Mart 2017 - minimum API 19, target API 25

+ + +

2.0 (version code 19)

+

16 Mart 2017 - minimum API 19, target API 25

+ + +

1.15 (version code 18)

+

11 Şubat 2017 - minimum API 19, target API 25

+ + +

1.14.1 (version code 17)

+

4 Ocak 2017 - minimum API 19, target API 25

+ + +

1.14 (version code 16)

+

26 Aralık 2016 - minimum API 19, target API 25

+ + +

1.13 (version code 15)

+

28 November 2016 - minimum API 19, target API 24

+ + +

1.12 (version code 14)

+

9 November 2016 - minimum API 19, target API 24

+ + +

1.11 (version code 13)

+

22 October 2016 - minimum API 19, target API 24

+ + +

1.10 (version code 12)

+

15 September 2016 - minimum API 19, target API 23

+ + +

1.9.1 (version code 11)

+

27 August 2016 - minimum API 19, target API 23

+
    +
  • Changed asset image links to relative paths so Privacy Browser will build on F-Droid.
  • +
+ +

1.9 (version code 10)

+

26 August 2016 - minimum API 19, target API 23

+ + +

1.8 (version code 9)

+

16 July 2016 - minimum API 19, target API 23

+ + +

1.7 (version code 8)

+

16 June 2016 - minimum API 19, target API 23

+ + +

1.6 (version code 7)

+

11 Mayıs 2016 - minimum API 15, target API 23

+ + +

1.5 (version code 6)

+

5 Mayıs 2016 - minimum API 15, target API 23

+
    +
  • Add the option to disable swipe to refresh so that certain websites, like Google Maps, will function correctly.
  • +
+ +

1.4 (version code 5)

+

28 Nisan 2016 - minimum API 15, target API 23

+ + +

1.3 (version code 4)

+

7 Nisan 2016 - minimum API 15, target API 23

+ + +

1.2 (version code 3)

+

23 Mart 2016 - minimum API 15, target API 23

+ + +

1.1 (version code 2)

+

9 Mart 2016 - minimum API 10, target API 23

+
    +
  • Separate the standard and the free flavors so that Privacy Browser builds correctly on F-Droid.
  • +
+ +

1.0 (version code 1)

+

24 Şubat 2016 - minimum API 10, target API 23

+
    +
  • Toggle JavaScript, DOM storage, and cookies.
  • +
  • Set default enabled status for JavaScript, DOM storage, and cookies.
  • +
  • Clear DOM storage and cookies.
  • +
  • Add shortcuts to the home screen.
  • +
  • Utilize download manager.
  • +
  • Navigate forward and back.
  • +
  • Cut, copy, paste URLs.
  • +
  • Share URLs.
  • +
  • Set homepage.
  • +
  • Scroll URL bar.
  • +
  • Maintain WebView scroll location when rotating screen.
  • +
  • Swipe to refresh WebView.
  • +
  • Play full screen videos (requires JavaScript to be enabled).
  • +
  • Clear and Exit menu item.
  • +
+ + \ No newline at end of file diff --git a/app/src/main/assets/tr/about_changelog_dark.html b/app/src/main/assets/tr/about_changelog_dark.html deleted file mode 100644 index f82c1b5e..00000000 --- a/app/src/main/assets/tr/about_changelog_dark.html +++ /dev/null @@ -1,683 +0,0 @@ - - - - - - - - - - -

3.5.1 (version code 51)

-

28 August 2020 - minimum API 19, target API 29

-
    -
  • Fix a bug that caused new intents (links from other apps) to not load if Privacy Browser had been killed by the OS in the background.
  • -
  • Fix a bug that caused the app to initialize incorrectly if the app theme was set to the opposite of the OS theme.
  • -
- -

3.5 (version code 50)

-

18 August 2020 - minimum API 19, target API 29

- - -

3.4.1 (version code 49)

-

1 Nisan 2020 - minimum API 19, target API 29

- - -

3.4 (version code 48)

-

28 Mart 2020 - minimum API 19, target API 29

- - -

3.3 (version code 47)

-

3 Ocak 2020 - minimum API 19, target API 29

- - -

3.2 (version code 46)

-

20 July 2019 - minimum API 19, target API 28

- - -

3.1 (version code 45)

-

27 Mayıs 2019 - minimum API 19, target API 28

- - -

3.0.1 (version code 44)

-

2 Mayıs 2019 - minimum API 19, target API 28

- - -

3.0 (version code 43)

-

26 Nisan 2019 - minimum API 19, target API 28

-
    -
  • Sekmeli tarama eklendi.
  • -
  • Uygulama çubuğu kaydırma devredışı olduğunda Web Görünümü'nün alt kısmının kesilmesine sebep olan hata düzeltildi.
  • -
  • Ne zaman bir Bluetooth klavye bağlandığında/bağlantısı kesildiğinde Privacy Browser'i yeniden başlatmaya sebep olan hata düzeltildi.
  • -
  • Kısmi Türkçe çevirisi yapıldı.
  • -
  • Almanca çevirisi güncellendi. (Çevirmen Bernhard G. Keller.)
  • -
  • Ä°talyan çevirisi güncellendi. (Çevirmen Francesco Buratti.)
  • -
  • Rusça çevirisi güncellendi.
  • -
  • Ä°spanyol çevirisi güncellendi. (Çevirmen Jose A. León.)
  • -
- -

2.17.1 (version code 42)

-

5 Mart 2019 - minimum API 19, target API 28

- - -

2.17 (version code 41)

-

27 Şubat 2019 - minimum API 19, target API 28

- - -

2.16 (version code 40)

-

31 Ocak 2019 - minimum API 19, target API 28

- - -

2.15.1 (version code 39)

-

27 Aralık 2018 - minimum API 19, target API 28

- - -

2.15 (version code 38)

-

24 Aralık 2018 - minimum API 19, target API 28

- - -

2.14 (version code 37)

-

8 Aralık 2018 - minimum API 19, target API 28

- - -

2.13 (version code 36)

-

29 October 2018 - minimum API 19, target API 28

- - -

2.12 (version code 35)

-

31 July 2018 - minimum API 19, target API 27

- - -

2.11 (version code 34)

-

10 July 2018 - minimum API 19, target API 27

- - -

2.10 (version code 33)

-

24 Mayıs 2018 - minimum API 19, target API 27

- - -

2.9 (version code 32)

-

9 Mayıs 2018 - minimum API 19, target API 27

- - -

2.8.1 (version code 31)

-

1 Mart 2018 - minimum API 19, target API 27

- - -

2.8 (version code 30)

-

22 Şubat 2018 - minimum API 19, target API 27

- - -

2.7.2 (version code 29)

-

22 November 2017 - minimum API 19, target API 26

- - -

2.7.1 (version code 28)

-

9 November 2017 - minimum API 19, target API 26

- - -

2.7 (version code 27)

-

7 November 2017 - minimum API 19, target API 26

-
    -
  • Add a bookmarks drawer that is accessed by sliding from the right.
  • -
  • Prevent Night Mode from flashing a white background when loading new pages.
  • -
  • Update the user agents.
  • -
  • Bump target API to 26 (Android Oreo, 8.0.0).
  • -
  • Updated Italian translation provided by Francesco Buratti.
  • -
  • Updated Spanish translation provided by Jose A. León.
  • -
- -

2.6 (version code 26)

-

18 September 2017 - minimum API 19, target API 25

- - -

2.5 (version code 25)

-

26 August 2017 - minimum API 19, target API 25

- - -

2.4 (version code 24)

-

23 June 2017 - minimum API 19, target API 25

- - -

2.3 (version code 23)

-

26 Mayıs 2017 - minimum API 19, target API 25

- - -

2.2 (version code 22)

-

27 Nisan 2017 - minimum API 19, target API 25

- - -

2.1 (version code 21)

-

25 Mart 2017 - minimum API 19, target API 25

- - -

2.0.1 (version code 20)

-

21 Mart 2017 - minimum API 19, target API 25

- - -

2.0 (version code 19)

-

16 Mart 2017 - minimum API 19, target API 25

- - -

1.15 (version code 18)

-

11 Şubat 2017 - minimum API 19, target API 25

- - -

1.14.1 (version code 17)

-

4 Ocak 2017 - minimum API 19, target API 25

- - -

1.14 (version code 16)

-

26 Aralık 2016 - minimum API 19, target API 25

- - -

1.13 (version code 15)

-

28 November 2016 - minimum API 19, target API 24

- - -

1.12 (version code 14)

-

9 November 2016 - minimum API 19, target API 24

- - -

1.11 (version code 13)

-

22 October 2016 - minimum API 19, target API 24

- - -

1.10 (version code 12)

-

15 September 2016 - minimum API 19, target API 23

- - -

1.9.1 (version code 11)

-

27 August 2016 - minimum API 19, target API 23

-
    -
  • Changed asset image links to relative paths so Privacy Browser will build on F-Droid.
  • -
- -

1.9 (version code 10)

-

26 August 2016 - minimum API 19, target API 23

- - -

1.8 (version code 9)

-

16 July 2016 - minimum API 19, target API 23

- - -

1.7 (version code 8)

-

16 June 2016 - minimum API 19, target API 23

- - -

1.6 (version code 7)

-

11 Mayıs 2016 - minimum API 15, target API 23

- - -

1.5 (version code 6)

-

5 Mayıs 2016 - minimum API 15, target API 23

-
    -
  • Add the option to disable swipe to refresh so that certain websites, like Google Maps, will function correctly.
  • -
- -

1.4 (version code 5)

-

28 Nisan 2016 - minimum API 15, target API 23

- - -

1.3 (version code 4)

-

7 Nisan 2016 - minimum API 15, target API 23

- - -

1.2 (version code 3)

-

23 Mart 2016 - minimum API 15, target API 23

- - -

1.1 (version code 2)

-

9 Mart 2016 - minimum API 10, target API 23

-
    -
  • Separate the standard and the free flavors so that Privacy Browser builds correctly on F-Droid.
  • -
- -

1.0 (version code 1)

-

24 Şubat 2016 - minimum API 10, target API 23

-
    -
  • Toggle JavaScript, DOM storage, and cookies.
  • -
  • Set default enabled status for JavaScript, DOM storage, and cookies.
  • -
  • Clear DOM storage and cookies.
  • -
  • Add shortcuts to the home screen.
  • -
  • Utilize download manager.
  • -
  • Navigate forward and back.
  • -
  • Cut, copy, paste URLs.
  • -
  • Share URLs.
  • -
  • Set homepage.
  • -
  • Scroll URL bar.
  • -
  • Maintain WebView scroll location when rotating screen.
  • -
  • Swipe to refresh WebView.
  • -
  • Play full screen videos (requires JavaScript to be enabled).
  • -
  • Clear and Exit menu item.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/tr/about_changelog_light.html b/app/src/main/assets/tr/about_changelog_light.html deleted file mode 100644 index 7ce4ce18..00000000 --- a/app/src/main/assets/tr/about_changelog_light.html +++ /dev/null @@ -1,683 +0,0 @@ - - - - - - - - - - -

3.5.1 (version code 51)

-

28 August 2020 - minimum API 19, target API 29

-
    -
  • Fix a bug that caused new intents (links from other apps) to not load if Privacy Browser had been killed by the OS in the background.
  • -
  • Fix a bug that caused the app to initialize incorrectly if the app theme was set to the opposite of the OS theme.
  • -
- -

3.5 (version code 50)

-

18 August 2020 - minimum API 19, target API 29

- - -

3.4.1 (version code 49)

-

1 Nisan 2020 - minimum API 19, target API 29

- - -

3.4 (version code 48)

-

28 Mart 2020 - minimum API 19, target API 29

- - -

3.3 (version code 47)

-

3 Ocak 2020 - minimum API 19, target API 29

- - -

3.2 (version code 46)

-

20 July 2019 - minimum API 19, target API 28

- - -

3.1 (version code 45)

-

27 Mayıs 2019 - minimum API 19, target API 28

- - -

3.0.1 (version code 44)

-

2 Mayıs 2019 - minimum API 19, target API 28

- - -

3.0 (version code 43)

-

26 Nisan 2019 - minimum API 19, target API 28

-
    -
  • Sekmeli tarama eklendi.
  • -
  • Uygulama çubuğu kaydırma devredışı olduğunda Web Görünümü'nün alt kısmının kesilmesine sebep olan hata düzeltildi.
  • -
  • Ne zaman bir Bluetooth klavye bağlandığında/bağlantısı kesildiğinde Privacy Browser'i yeniden başlatmaya sebep olan hata düzeltildi.
  • -
  • Kısmi Türkçe çevirisi yapıldı.
  • -
  • Almanca çevirisi güncellendi. (Çevirmen Bernhard G. Keller.)
  • -
  • Ä°talyan çevirisi güncellendi. (Çevirmen Francesco Buratti.)
  • -
  • Rusça çevirisi güncellendi.
  • -
  • Ä°spanyol çevirisi güncellendi. (Çevirmen Jose A. León.)
  • -
- -

2.17.1 (version code 42)

-

5 Mart 2019 - minimum API 19, target API 28

- - -

2.17 (version code 41)

-

27 Şubat 2019 - minimum API 19, target API 28

- - -

2.16 (version code 40)

-

31 Ocak 2019 - minimum API 19, target API 28

- - -

2.15.1 (version code 39)

-

27 Aralık 2018 - minimum API 19, target API 28

- - -

2.15 (version code 38)

-

24 Aralık 2018 - minimum API 19, target API 28

- - -

2.14 (version code 37)

-

8 Aralık 2018 - minimum API 19, target API 28

- - -

2.13 (version code 36)

-

29 October 2018 - minimum API 19, target API 28

- - -

2.12 (version code 35)

-

31 July 2018 - minimum API 19, target API 27

- - -

2.11 (version code 34)

-

10 July 2018 - minimum API 19, target API 27

- - -

2.10 (version code 33)

-

24 Mayıs 2018 - minimum API 19, target API 27

- - -

2.9 (version code 32)

-

9 Mayıs 2018 - minimum API 19, target API 27

- - -

2.8.1 (version code 31)

-

1 Mart 2018 - minimum API 19, target API 27

- - -

2.8 (version code 30)

-

22 Şubat 2018 - minimum API 19, target API 27

- - -

2.7.2 (version code 29)

-

22 November 2017 - minimum API 19, target API 26

- - -

2.7.1 (version code 28)

-

9 November 2017 - minimum API 19, target API 26

- - -

2.7 (version code 27)

-

7 November 2017 - minimum API 19, target API 26

-
    -
  • Add a bookmarks drawer that is accessed by sliding from the right.
  • -
  • Prevent Night Mode from flashing a white background when loading new pages.
  • -
  • Update the user agents.
  • -
  • Bump target API to 26 (Android Oreo, 8.0.0).
  • -
  • Updated Italian translation provided by Francesco Buratti.
  • -
  • Updated Spanish translation provided by Jose A. León.
  • -
- -

2.6 (version code 26)

-

18 September 2017 - minimum API 19, target API 25

- - -

2.5 (version code 25)

-

26 August 2017 - minimum API 19, target API 25

- - -

2.4 (version code 24)

-

23 June 2017 - minimum API 19, target API 25

- - -

2.3 (version code 23)

-

26 Mayıs 2017 - minimum API 19, target API 25

- - -

2.2 (version code 22)

-

27 Nisan 2017 - minimum API 19, target API 25

- - -

2.1 (version code 21)

-

25 Mart 2017 - minimum API 19, target API 25

- - -

2.0.1 (version code 20)

-

21 Mart 2017 - minimum API 19, target API 25

- - -

2.0 (version code 19)

-

16 Mart 2017 - minimum API 19, target API 25

- - -

1.15 (version code 18)

-

11 Şubat 2017 - minimum API 19, target API 25

- - -

1.14.1 (version code 17)

-

4 Ocak 2017 - minimum API 19, target API 25

- - -

1.14 (version code 16)

-

26 Aralık 2016 - minimum API 19, target API 25

- - -

1.13 (version code 15)

-

28 November 2016 - minimum API 19, target API 24

- - -

1.12 (version code 14)

-

9 November 2016 - minimum API 19, target API 24

- - -

1.11 (version code 13)

-

22 October 2016 - minimum API 19, target API 24

- - -

1.10 (version code 12)

-

15 September 2016 - minimum API 19, target API 23

- - -

1.9.1 (version code 11)

-

27 August 2016 - minimum API 19, target API 23

-
    -
  • Changed asset image links to relative paths so Privacy Browser will build on F-Droid.
  • -
- -

1.9 (version code 10)

-

26 August 2016 - minimum API 19, target API 23

- - -

1.8 (version code 9)

-

16 July 2016 - minimum API 19, target API 23

- - -

1.7 (version code 8)

-

16 June 2016 - minimum API 19, target API 23

- - -

1.6 (version code 7)

-

11 Mayıs 2016 - minimum API 15, target API 23

- - -

1.5 (version code 6)

-

5 Mayıs 2016 - minimum API 15, target API 23

-
    -
  • Add the option to disable swipe to refresh so that certain websites, like Google Maps, will function correctly.
  • -
- -

1.4 (version code 5)

-

28 Nisan 2016 - minimum API 15, target API 23

- - -

1.3 (version code 4)

-

7 Nisan 2016 - minimum API 15, target API 23

- - -

1.2 (version code 3)

-

23 Mart 2016 - minimum API 15, target API 23

- - -

1.1 (version code 2)

-

9 Mart 2016 - minimum API 10, target API 23

-
    -
  • Separate the standard and the free flavors so that Privacy Browser builds correctly on F-Droid.
  • -
- -

1.0 (version code 1)

-

24 Şubat 2016 - minimum API 10, target API 23

-
    -
  • Toggle JavaScript, DOM storage, and cookies.
  • -
  • Set default enabled status for JavaScript, DOM storage, and cookies.
  • -
  • Clear DOM storage and cookies.
  • -
  • Add shortcuts to the home screen.
  • -
  • Utilize download manager.
  • -
  • Navigate forward and back.
  • -
  • Cut, copy, paste URLs.
  • -
  • Share URLs.
  • -
  • Set homepage.
  • -
  • Scroll URL bar.
  • -
  • Maintain WebView scroll location when rotating screen.
  • -
  • Swipe to refresh WebView.
  • -
  • Play full screen videos (requires JavaScript to be enabled).
  • -
  • Clear and Exit menu item.
  • -
- - \ No newline at end of file diff --git a/app/src/main/assets/tr/about_contributors.html b/app/src/main/assets/tr/about_contributors.html new file mode 100644 index 00000000..11ac1920 --- /dev/null +++ b/app/src/main/assets/tr/about_contributors.html @@ -0,0 +1,52 @@ + + + + + + + + + + + + + +

Baş Geliştirici

+

Privacy Browser, ağırlıklı olmak üzere Soren Stoutner tarafından geliştirilmiştir.

+ +

Kodlayıcılar

+ Thomas Jensen
+ Hendrik Knackstedt + +

Çevirmenler

+ Thiago Nazareno Conceição Silva de Jesus: Brazilian Portuguese
+ Kévin LE FLOHIC: French
+ Bernhard G. Keller: Almanca
+ Francesco Buratti: Ä°talyanca
+ Jose A. León: İspanyolca + +

Önceki Çevirmenler

+ Stefan Erhardt: Almanca
+ Aaron Gerlach: Almanca + +
+
+

Katkıda bulunmak isteyenler hem kod hem de çeviri gönderebilir.

+ + \ No newline at end of file diff --git a/app/src/main/assets/tr/about_contributors_dark.html b/app/src/main/assets/tr/about_contributors_dark.html deleted file mode 100644 index 8ffb882b..00000000 --- a/app/src/main/assets/tr/about_contributors_dark.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - - - - - - - -

Baş Geliştirici

-

Privacy Browser, ağırlıklı olmak üzere Soren Stoutner tarafından geliştirilmiştir.

- -

Kodlayıcılar

- Thomas Jensen
- Hendrik Knackstedt - -

Çevirmenler

- Thiago Nazareno Conceição Silva de Jesus: Brazilian Portuguese
- Kévin LE FLOHIC: French
- Bernhard G. Keller: Almanca
- Francesco Buratti: Ä°talyanca
- Jose A. León: İspanyolca - -

Önceki Çevirmenler

- Stefan Erhardt: Almanca
- Aaron Gerlach: Almanca - -
-
-

Katkıda bulunmak isteyenler hem kod hem de çeviri gönderebilir.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/about_contributors_light.html b/app/src/main/assets/tr/about_contributors_light.html deleted file mode 100644 index 44ce32a8..00000000 --- a/app/src/main/assets/tr/about_contributors_light.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - - - - - - - -

Baş Geliştirici

-

Privacy Browser, ağırlıklı olmak üzere Soren Stoutner tarafından geliştirilmiştir.

- -

Kodlayıcılar

- Thomas Jensen
- Hendrik Knackstedt - -

Çevirmenler

- Thiago Nazareno Conceição Silva de Jesus: Brazilian Portuguese
- Kévin LE FLOHIC: French
- Bernhard G. Keller: Almanca
- Francesco Buratti: Ä°talyanca
- Jose A. León: İspanyolca - -

Önceki Çevirmenler

- Stefan Erhardt: Almanca
- Aaron Gerlach: Almanca - -
-
-

Katkıda bulunmak isteyenler hem kod hem de çeviri gönderebilir.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/about_licenses.html b/app/src/main/assets/tr/about_licenses.html new file mode 100644 index 00000000..6161994c --- /dev/null +++ b/app/src/main/assets/tr/about_licenses.html @@ -0,0 +1,1069 @@ + + + + + + + + + + + + + +

Telif Hakkı

+

Privacy Browser telif hakkı © 2015-2020 Soren Stoutner.

+ +

Lisans

+

Privacy Browser GPLv3+ lisansı altında yayınlandı. Lisansın tam metni aşağıdadır. + Kaynak kodu git.stoutner.com adresinden temin edilebilir.

+ +

Engel Listeleri

+

EasyList ve EasyPrivacy listeleri + GPLv3+ ve Creative Commons Attribution-ShareAlike 3.0+ Unported + lisansları altında çift lisanslıdır. + Privacy Browser GPLv3+ seçeneğini kullanarak bunları kapsama almıştır.

+ +

Fanboy’s Annoyance List ve Fanboy’s Social Blocking List listeleri + GPLv3+ ile uyumlu olan + Creative Commons Attribution 3.0 Unported license lisansı altında yayınlandı. Listeler Privacy Browser'a değiştirilmeden eklenmiştir.

+ +

Engel listeleri hakkında daha fazla bilgiyi EasyList adresinde bulabilirsiniz.

+ +

Kütüphaneler

+

Privacy Browser is built with the AndroidX Libraries, + the Kotlin libraries, + and code from the Google Material Maven repository, + which are released under the Apache License 2.0.

+ +

Privacy Browser ücretsiz versiyonu Android Software Development Kit lisansı altında yayınlanan + Firebase Ads ile oluşturulmuştur.

+ +

Sınıflar

+

com.stoutner.privacybrowser.views.CheckedLinearLayout is a modified version of a class contained in the + Android Kamera + kaynak kodunda bulunan bir sınıfın modifiye edilmiş bir sürümüdür. + Orijinal dosya Apache License 2.0 altında yayınlandı. + Değiştirilen dosya GPLv3+ lisansı altında yayınlandı.

+ +

Simgeler

+

+ Apache License 2.0 altında yayınlanan ve + Android Material simge setinin bir parçası olan security ve language'den elde edilmiştir. + Lisansın tüm metni aşağıdadır. Değişikliklerin telif hakkı © 2016 Soren Stoutner. + Ortaya çıkan görüntüler GPLv3+ lisansı altında yayınlandı.

+

Apache License 2.0 altında yayınlanan ve + Android Material simge setinin bir parçası olan folder ve exit_to_app elementlerinden elde edilmiştir. + Değişikliklerin telif hakkı © 2017 Soren Stoutner. + Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

+

Apache License 2.0 altında yayınlanan ve + Android Material simge setinin bir parçası olan bookmarks ve create_new_folder elementlerinden elde edilmiştir. + Değişikliklerin telif hakkı © 2017 Soren Stoutner. + Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

+

Apache License 2.0 altında yayınlanan ve + Android Material simge setinin bir parçası olan create_new_folder'dan elde edilmiştir. + Değişikliklerin telif hakkı © 2017 Soren Stoutner. + Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

+

Apache License 2.0 altında yayınlanan ve + Android Material simge setinin bir parçası olan exit_to_app'ten elde edilmiştir. + Değişikliklerin telif hakkı © 2017 Soren Stoutner. + Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

+

Apache License 2.0 altında yayınlanan ve + Android Material simge setinin bir parçası olan compare'den elde edilmiştir. + Değişikliklerin telif hakkı © 2017 Soren Stoutner. + Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

+

Apache License 2.0 altında yayınlanan ve + Android Material simge setinin bir parçası olan sort'dan elde edilmiştir. + Değişikliklerin telif hakkı © 2019 Soren Stoutner. + Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

+

cookie Google tarafından oluşturuldu. + Apache License 2.0 altında yayınlandı ve Material Design + simgelerinden indirilebilir. Renk ve ebat gibi düzen bilgileri dışında herhangi bir değişiklik yapılmamıştır.

+

Aşağıdaki simgeler Apache License 2.0 altında yayınlanan Android Material + simge setinden gelmektedir. Renk ve ebat gibi düzen bilgileri dışında herhangi bir değişiklik yapılmamıştır. Bazıları koddaki kullanımlarıyla uygun olacak şekilde yeniden adlandırıldı. + Orijinal simgeler ve adlar aşağıda gösterilmiştir.

+

add.

+

arrow_back.

+

arrow_forward.

+

bookmarks.

+

bug_report.

+

camera_enhance.

+

chrome_reader_mode.

+

close.

+

delete.

+

delete_forever.

+

devices_other.

+

dns.

+

donut_small.

+

edit.

+

expand_less.

+

expand_more.

+

file_copy.

+

file_download.

+

find_in_page.

+

folder.

+

home.

+

image.

+

import_contacts.

+

import_export.

+

important_devices.

+

info_outline.

+

language.

+

link_off.

+

list.

+

local_activity.

+

location_off.

+

lock.

+

map.

+

more.

+

new releases.

+

open_in_browser.

+

payment.

+

question_answer.

+

refresh.

+

save.

+

search.

+

select_all.

+

settings.

+

settings_overscan.

+

share.

+

smartphone.

+

sort.

+

style.

+

subtitles.

+

tab.

+

text_fields.

+

thumbs_up_down.

+

vertical_align_bottom.

+

vertical_align_top.

+

visibility_off.

+

vpn_key.

+

vpn_lock.

+

web.

+ +
+ +

GNU General Public License

+

Version 3, 29 June 2007

+ +

Copyright © 2007 Free Software Foundation, Inc. + <http://fsf.org/>

+ +

Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed.

+ +

Preamble

+ +

The GNU General Public License is a free, copyleft license for + software and other kinds of works.

+ +

The licenses for most software and other practical works are designed + to take away your freedom to share and change the works. By contrast, + the GNU General Public License is intended to guarantee your freedom to + share and change all versions of a program—to make sure it remains free + software for all its users. We, the Free Software Foundation, use the + GNU General Public License for most of our software; it applies also to + any other work released this way by its authors. You can apply it to + your programs, too.

+ +

When we speak of free software, we are referring to freedom, not + price. Our General Public Licenses are designed to make sure that you + have the freedom to distribute copies of free software (and charge for + them if you wish), that you receive source code or can get it if you + want it, that you can change the software or use pieces of it in new + free programs, and that you know you can do these things.

+ +

To protect your rights, we need to prevent others from denying you + these rights or asking you to surrender the rights. Therefore, you have + certain responsibilities if you distribute copies of the software, or if + you modify it: responsibilities to respect the freedom of others.

+ +

For example, if you distribute copies of such a program, whether + gratis or for a fee, you must pass on to the recipients the same + freedoms that you received. You must make sure that they, too, receive + or can get the source code. And you must show them these terms so they + know their rights.

+ +

Developers that use the GNU GPL protect your rights with two steps: + (1) assert copyright on the software, and (2) offer you this License + giving you legal permission to copy, distribute and/or modify it.

+ +

For the developers’ and authors’ protection, the GPL clearly explains + that there is no warranty for this free software. For both users’ and + authors’ sake, the GPL requires that modified versions be marked as + changed, so that their problems will not be attributed erroneously to + authors of previous versions.

+ +

Some devices are designed to deny users access to install or run + modified versions of the software inside them, although the manufacturer + can do so. This is fundamentally incompatible with the aim of + protecting users’ freedom to change the software. The systematic + pattern of such abuse occurs in the area of products for individuals to + use, which is precisely where it is most unacceptable. Therefore, we + have designed this version of the GPL to prohibit the practice for those + products. If such problems arise substantially in other domains, we + stand ready to extend this provision to those domains in future versions + of the GPL, as needed to protect the freedom of users.

+ +

Finally, every program is threatened constantly by software patents. + States should not allow patents to restrict development and use of + software on general-purpose computers, but in those that do, we wish to + avoid the special danger that patents applied to a free program could + make it effectively proprietary. To prevent this, the GPL assures that + patents cannot be used to render the program non-free.

+ +

The precise terms and conditions for copying, distribution and + modification follow.

+ +

TERMS AND CONDITIONS

+ +

0. Definitions.

+ +

“This License” refers to version 3 of the GNU General Public License.

+ +

“Copyright” also means copyright-like laws that apply to other kinds of + works, such as semiconductor masks.

+ +

“The Program” refers to any copyrightable work licensed under this + License. Each licensee is addressed as “you”. “Licensees” and + “recipients” may be individuals or organizations.

+ +

To “modify” a work means to copy from or adapt all or part of the work + in a fashion requiring copyright permission, other than the making of an + exact copy. The resulting work is called a “modified version” of the + earlier work or a work “based on” the earlier work.

+ +

A “covered work” means either the unmodified Program or a work based + on the Program.

+ +

To “propagate” a work means to do anything with it that, without + permission, would make you directly or secondarily liable for + infringement under applicable copyright law, except executing it on a + computer or modifying a private copy. Propagation includes copying, + distribution (with or without modification), making available to the + public, and in some countries other activities as well.

+ +

To “convey” a work means any kind of propagation that enables other + parties to make or receive copies. Mere interaction with a user through + a computer network, with no transfer of a copy, is not conveying.

+ +

An interactive user interface displays “Appropriate Legal Notices” + to the extent that it includes a convenient and prominently visible + feature that (1) displays an appropriate copyright notice, and (2) + tells the user that there is no warranty for the work (except to the + extent that warranties are provided), that licensees may convey the + work under this License, and how to view a copy of this License. If + the interface presents a list of user commands or options, such as a + menu, a prominent item in the list meets this criterion.

+ +

1. Source Code.

+ +

The “source code” for a work means the preferred form of the work + for making modifications to it. “Object code” means any non-source + form of a work.

+ +

A “Standard Interface” means an interface that either is an official + standard defined by a recognized standards body, or, in the case of + interfaces specified for a particular programming language, one that + is widely used among developers working in that language.

+ +

The “System Libraries” of an executable work include anything, other + than the work as a whole, that (a) is included in the normal form of + packaging a Major Component, but which is not part of that Major + Component, and (b) serves only to enable use of the work with that + Major Component, or to implement a Standard Interface for which an + implementation is available to the public in source code form. A + “Major Component”, in this context, means a major essential component + (kernel, window system, and so on) of the specific operating system + (if any) on which the executable work runs, or a compiler used to + produce the work, or an object code interpreter used to run it.

+ +

The “Corresponding Source” for a work in object code form means all + the source code needed to generate, install, and (for an executable + work) run the object code and to modify the work, including scripts to + control those activities. However, it does not include the work’s + System Libraries, or general-purpose tools or generally available free + programs which are used unmodified in performing those activities but + which are not part of the work. For example, Corresponding Source + includes interface definition files associated with source files for + the work, and the source code for shared libraries and dynamically + linked subprograms that the work is specifically designed to require, + such as by intimate data communication or control flow between those + subprograms and other parts of the work.

+ +

The Corresponding Source need not include anything that users + can regenerate automatically from other parts of the Corresponding + Source.

+ +

The Corresponding Source for a work in source code form is that + same work.

+ +

2. Basic Permissions.

+ +

All rights granted under this License are granted for the term of + copyright on the Program, and are irrevocable provided the stated + conditions are met. This License explicitly affirms your unlimited + permission to run the unmodified Program. The output from running a + covered work is covered by this License only if the output, given its + content, constitutes a covered work. This License acknowledges your + rights of fair use or other equivalent, as provided by copyright law.

+ +

You may make, run and propagate covered works that you do not + convey, without conditions so long as your license otherwise remains + in force. You may convey covered works to others for the sole purpose + of having them make modifications exclusively for you, or provide you + with facilities for running those works, provided that you comply with + the terms of this License in conveying all material for which you do + not control copyright. Those thus making or running the covered works + for you must do so exclusively on your behalf, under your direction + and control, on terms that prohibit them from making any copies of + your copyrighted material outside their relationship with you.

+ +

Conveying under any other circumstances is permitted solely under + the conditions stated below. Sublicensing is not allowed; section 10 + makes it unnecessary.

+ +

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

+ +

No covered work shall be deemed part of an effective technological + measure under any applicable law fulfilling obligations under article + 11 of the WIPO copyright treaty adopted on 20 December 1996, or + similar laws prohibiting or restricting circumvention of such + measures.

+ +

When you convey a covered work, you waive any legal power to forbid + circumvention of technological measures to the extent such circumvention + is effected by exercising rights under this License with respect to + the covered work, and you disclaim any intention to limit operation or + modification of the work as a means of enforcing, against the work’s + users, your or third parties’ legal rights to forbid circumvention of + technological measures.

+ +

4. Conveying Verbatim Copies.

+ +

You may convey verbatim copies of the Program’s source code as you + receive it, in any medium, provided that you conspicuously and + appropriately publish on each copy an appropriate copyright notice; + keep intact all notices stating that this License and any + non-permissive terms added in accord with section 7 apply to the code; + keep intact all notices of the absence of any warranty; and give all + recipients a copy of this License along with the Program.

+ +

You may charge any price or no price for each copy that you convey, + and you may offer support or warranty protection for a fee.

+ +

5. Conveying Modified Source Versions.

+ +

You may convey a work based on the Program, or the modifications to + produce it from the Program, in the form of source code under the + terms of section 4, provided that you also meet all of these conditions:

+ +
    +
  • a) The work must carry prominent notices stating that you modified + it, and giving a relevant date.
  • + +
  • b) The work must carry prominent notices stating that it is + released under this License and any conditions added under section + 7. This requirement modifies the requirement in section 4 to + “keep intact all notices”.
  • + +
  • c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it.
  • + +
  • d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so.
  • +
+ +

A compilation of a covered work with other separate and independent + works, which are not by their nature extensions of the covered work, + and which are not combined with it such as to form a larger program, + in or on a volume of a storage or distribution medium, is called an + “aggregate” if the compilation and its resulting copyright are not + used to limit the access or legal rights of the compilation’s users + beyond what the individual works permit. Inclusion of a covered work + in an aggregate does not cause this License to apply to the other + parts of the aggregate.

+ +

6. Conveying Non-Source Forms.

+ +

You may convey a covered work in object code form under the terms + of sections 4 and 5, provided that you also convey the + machine-readable Corresponding Source under the terms of this License, + in one of these ways:

+ +
    +
  • a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange.
  • + +
  • b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the + Corresponding Source from a network server at no charge.
  • + +
  • c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b.
  • + +
  • d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements.
  • + +
  • e) Convey the object code using peer-to-peer transmission, provided + you inform other peers where the object code and Corresponding + Source of the work are being offered to the general public at no + charge under subsection 6d.
  • +
+ +

A separable portion of the object code, whose source code is excluded + from the Corresponding Source as a System Library, need not be + included in conveying the object code work.

+ +

A “User Product” is either (1) a “consumer product”, which means any + tangible personal property which is normally used for personal, family, + or household purposes, or (2) anything designed or sold for incorporation + into a dwelling. In determining whether a product is a consumer product, + doubtful cases shall be resolved in favor of coverage. For a particular + product received by a particular user, “normally used” refers to a + typical or common use of that class of product, regardless of the status + of the particular user or of the way in which the particular user + actually uses, or expects or is expected to use, the product. A product + is a consumer product regardless of whether the product has substantial + commercial, industrial or non-consumer uses, unless such uses represent + the only significant mode of use of the product.

+ +

“Installation Information” for a User Product means any methods, + procedures, authorization keys, or other information required to install + and execute modified versions of a covered work in that User Product from + a modified version of its Corresponding Source. The information must + suffice to ensure that the continued functioning of the modified object + code is in no case prevented or interfered with solely because + modification has been made.

+ +

If you convey an object code work under this section in, or with, or + specifically for use in, a User Product, and the conveying occurs as + part of a transaction in which the right of possession and use of the + User Product is transferred to the recipient in perpetuity or for a + fixed term (regardless of how the transaction is characterized), the + Corresponding Source conveyed under this section must be accompanied + by the Installation Information. But this requirement does not apply + if neither you nor any third party retains the ability to install + modified object code on the User Product (for example, the work has + been installed in ROM).

+ +

The requirement to provide Installation Information does not include a + requirement to continue to provide support service, warranty, or updates + for a work that has been modified or installed by the recipient, or for + the User Product in which it has been modified or installed. Access to a + network may be denied when the modification itself materially and + adversely affects the operation of the network or violates the rules and + protocols for communication across the network.

+ +

Corresponding Source conveyed, and Installation Information provided, + in accord with this section must be in a format that is publicly + documented (and with an implementation available to the public in + source code form), and must require no special password or key for + unpacking, reading or copying.

+ +

7. Additional Terms.

+ +

“Additional permissions” are terms that supplement the terms of this + License by making exceptions from one or more of its conditions. + Additional permissions that are applicable to the entire Program shall + be treated as though they were included in this License, to the extent + that they are valid under applicable law. If additional permissions + apply only to part of the Program, that part may be used separately + under those permissions, but the entire Program remains governed by + this License without regard to the additional permissions.

+ +

When you convey a copy of a covered work, you may at your option + remove any additional permissions from that copy, or from any part of + it. (Additional permissions may be written to require their own + removal in certain cases when you modify the work.) You may place + additional permissions on material, added by you to a covered work, + for which you have or can give appropriate copyright permission.

+ +

Notwithstanding any other provision of this License, for material you + add to a covered work, you may (if authorized by the copyright holders of + that material) supplement the terms of this License with terms:

+ +
    +
  • a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or
  • + +
  • b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or
  • + +
  • c) Prohibiting misrepresentation of the origin of that material, or + requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or
  • + +
  • d) Limiting the use for publicity purposes of names of licensors or + authors of the material; or
  • + +
  • e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or
  • + +
  • f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions of + it) with contractual assumptions of liability to the recipient, for + any liability that these contractual assumptions directly impose on + those licensors and authors.
  • +
+ +

All other non-permissive additional terms are considered “further + restrictions” within the meaning of section 10. If the Program as you + received it, or any part of it, contains a notice stating that it is + governed by this License along with a term that is a further + restriction, you may remove that term. If a license document contains + a further restriction but permits relicensing or conveying under this + License, you may add to a covered work material governed by the terms + of that license document, provided that the further restriction does + not survive such relicensing or conveying.

+ +

If you add terms to a covered work in accord with this section, you + must place, in the relevant source files, a statement of the + additional terms that apply to those files, or a notice indicating + where to find the applicable terms.

+ +

Additional terms, permissive or non-permissive, may be stated in the + form of a separately written license, or stated as exceptions; + the above requirements apply either way.

+ +

8. Termination.

+ +

You may not propagate or modify a covered work except as expressly + provided under this License. Any attempt otherwise to propagate or + modify it is void, and will automatically terminate your rights under + this License (including any patent licenses granted under the third + paragraph of section 11).

+ +

However, if you cease all violation of this License, then your + license from a particular copyright holder is reinstated (a) + provisionally, unless and until the copyright holder explicitly and + finally terminates your license, and (b) permanently, if the copyright + holder fails to notify you of the violation by some reasonable means + prior to 60 days after the cessation.

+ +

Moreover, your license from a particular copyright holder is + reinstated permanently if the copyright holder notifies you of the + violation by some reasonable means, this is the first time you have + received notice of violation of this License (for any work) from that + copyright holder, and you cure the violation prior to 30 days after + your receipt of the notice.

+ +

Termination of your rights under this section does not terminate the + licenses of parties who have received copies or rights from you under + this License. If your rights have been terminated and not permanently + reinstated, you do not qualify to receive new licenses for the same + material under section 10.

+ +

9. Acceptance Not Required for Having Copies.

+ +

You are not required to accept this License in order to receive or + run a copy of the Program. Ancillary propagation of a covered work + occurring solely as a consequence of using peer-to-peer transmission + to receive a copy likewise does not require acceptance. However, + nothing other than this License grants you permission to propagate or + modify any covered work. These actions infringe copyright if you do + not accept this License. Therefore, by modifying or propagating a + covered work, you indicate your acceptance of this License to do so.

+ +

10. Automatic Licensing of Downstream Recipients.

+ +

Each time you convey a covered work, the recipient automatically + receives a license from the original licensors, to run, modify and + propagate that work, subject to this License. You are not responsible + for enforcing compliance by third parties with this License.

+ +

An “entity transaction” is a transaction transferring control of an + organization, or substantially all assets of one, or subdividing an + organization, or merging organizations. If propagation of a covered + work results from an entity transaction, each party to that + transaction who receives a copy of the work also receives whatever + licenses to the work the party’s predecessor in interest had or could + give under the previous paragraph, plus a right to possession of the + Corresponding Source of the work from the predecessor in interest, if + the predecessor has it or can get it with reasonable efforts.

+ +

You may not impose any further restrictions on the exercise of the + rights granted or affirmed under this License. For example, you may + not impose a license fee, royalty, or other charge for exercise of + rights granted under this License, and you may not initiate litigation + (including a cross-claim or counterclaim in a lawsuit) alleging that + any patent claim is infringed by making, using, selling, offering for + sale, or importing the Program or any portion of it.

+ +

11. Patents.

+ +

A “contributor” is a copyright holder who authorizes use under this + License of the Program or a work on which the Program is based. The + work thus licensed is called the contributor’s “contributor version”.

+ +

A contributor’s “essential patent claims” are all patent claims + owned or controlled by the contributor, whether already acquired or + hereafter acquired, that would be infringed by some manner, permitted + by this License, of making, using, or selling its contributor version, + but do not include claims that would be infringed only as a + consequence of further modification of the contributor version. For + purposes of this definition, “control” includes the right to grant + patent sublicenses in a manner consistent with the requirements of + this License.

+ +

Each contributor grants you a non-exclusive, worldwide, royalty-free + patent license under the contributor’s essential patent claims, to + make, use, sell, offer for sale, import and otherwise run, modify and + propagate the contents of its contributor version.

+ +

In the following three paragraphs, a “patent license” is any express + agreement or commitment, however denominated, not to enforce a patent + (such as an express permission to practice a patent or covenant not to + sue for patent infringement). To “grant” such a patent license to a + party means to make such an agreement or commitment not to enforce a + patent against the party.

+ +

If you convey a covered work, knowingly relying on a patent license, + and the Corresponding Source of the work is not available for anyone + to copy, free of charge and under the terms of this License, through a + publicly available network server or other readily accessible means, + then you must either (1) cause the Corresponding Source to be so + available, or (2) arrange to deprive yourself of the benefit of the + patent license for this particular work, or (3) arrange, in a manner + consistent with the requirements of this License, to extend the patent + license to downstream recipients. “Knowingly relying” means you have + actual knowledge that, but for the patent license, your conveying the + covered work in a country, or your recipient’s use of the covered work + in a country, would infringe one or more identifiable patents in that + country that you have reason to believe are valid.

+ +

If, pursuant to or in connection with a single transaction or + arrangement, you convey, or propagate by procuring conveyance of, a + covered work, and grant a patent license to some of the parties + receiving the covered work authorizing them to use, propagate, modify + or convey a specific copy of the covered work, then the patent license + you grant is automatically extended to all recipients of the covered + work and works based on it.

+ +

A patent license is “discriminatory” if it does not include within + the scope of its coverage, prohibits the exercise of, or is + conditioned on the non-exercise of one or more of the rights that are + specifically granted under this License. You may not convey a covered + work if you are a party to an arrangement with a third party that is + in the business of distributing software, under which you make payment + to the third party based on the extent of your activity of conveying + the work, and under which the third party grants, to any of the + parties who would receive the covered work from you, a discriminatory + patent license (a) in connection with copies of the covered work + conveyed by you (or copies made from those copies), or (b) primarily + for and in connection with specific products or compilations that + contain the covered work, unless you entered into that arrangement, + or that patent license was granted, prior to 28 March 2007.

+ +

Nothing in this License shall be construed as excluding or limiting + any implied license or other defenses to infringement that may + otherwise be available to you under applicable patent law.

+ +

12. No Surrender of Others’ Freedom.

+ +

If conditions are imposed on you (whether by court order, agreement or + otherwise) that contradict the conditions of this License, they do not + excuse you from the conditions of this License. If you cannot convey a + covered work so as to satisfy simultaneously your obligations under this + License and any other pertinent obligations, then as a consequence you may + not convey it at all. For example, if you agree to terms that obligate you + to collect a royalty for further conveying from those to whom you convey + the Program, the only way you could satisfy both those terms and this + License would be to refrain entirely from conveying the Program.

+ +

13. Use with the GNU Affero General Public License.

+ +

Notwithstanding any other provision of this License, you have + permission to link or combine any covered work with a work licensed + under version 3 of the GNU Affero General Public License into a single + combined work, and to convey the resulting work. The terms of this + License will continue to apply to the part which is the covered work, + but the special requirements of the GNU Affero General Public License, + section 13, concerning interaction through a network will apply to the + combination as such.

+ +

14. Revised Versions of this License.

+ +

The Free Software Foundation may publish revised and/or new versions of + the GNU General Public License from time to time. Such new versions will + be similar in spirit to the present version, but may differ in detail to + address new problems or concerns.

+ +

Each version is given a distinguishing version number. If the + Program specifies that a certain numbered version of the GNU General + Public License “or any later version” applies to it, you have the + option of following the terms and conditions either of that numbered + version or of any later version published by the Free Software + Foundation. If the Program does not specify a version number of the + GNU General Public License, you may choose any version ever published + by the Free Software Foundation.

+ +

If the Program specifies that a proxy can decide which future + versions of the GNU General Public License can be used, that proxy’s + public statement of acceptance of a version permanently authorizes you + to choose that version for the Program.

+ +

Later license versions may give you additional or different + permissions. However, no additional obligations are imposed on any + author or copyright holder as a result of your choosing to follow a + later version.

+ +

15. Disclaimer of Warranty.

+ +

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY + APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT + HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY + OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, + THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM + IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF + ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

+ +

16. Limitation of Liability.

+ +

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING + WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS + THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY + GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE + USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF + DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD + PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), + EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF + SUCH DAMAGES.

+ +

17. Interpretation of Sections 15 and 16.

+ +

If the disclaimer of warranty and limitation of liability provided + above cannot be given local legal effect according to their terms, + reviewing courts shall apply local law that most closely approximates + an absolute waiver of all civil liability in connection with the + Program, unless a warranty or assumption of liability accompanies a + copy of the Program in return for a fee.

+ +

END OF TERMS AND CONDITIONS

+ +

How to Apply These Terms to Your New Programs

+ +

If you develop a new program, and you want it to be of the greatest + possible use to the public, the best way to achieve this is to make it + free software which everyone can redistribute and change under these terms.

+ +

To do so, attach the following notices to the program. It is safest + to attach them to the start of each source file to most effectively + state the exclusion of warranty; and each file should have at least + the “copyright” line and a pointer to where the full notice is found.

+ +
<one line to give the program’s name
+and a brief idea of what it does.>
+Copyright (C) <year>  <name of author>
+
+This program is free software: you can
+redistribute it and/or modify
+it under the terms of the GNU General
+Public License as published by the Free
+Software Foundation, either version 3
+of the License, or(at your option)
+any later version.
+
+This program is distributed in the hope
+that it will be useful, but WITHOUT ANY
+WARRANTY; without even the implied
+warranty of MERCHANTABILITY or FITNESS
+FOR A PARTICULAR PURPOSE.  See the GNU
+General Public License for more details.
+
+You should have received a copy of the
+GNU General Public License along with
+this program.  If not, see
+<http://www.gnu.org/licenses/>.
+ +

Also add information on how to contact you by electronic and paper mail.

+ +

If the program does terminal interaction, make it output a short + notice like this when it starts in an interactive mode:

+ +
<program>  Copyright (C) <year>
+<name of author>
+This program comes with ABSOLUTELY NO
+WARRANTY; for details type `show w'.
+This is free software, and you are
+welcome to redistribute it under
+certain conditions; type `show c'
+for details.
+ +

The hypothetical commands `show w' and `show c' should show the appropriate + parts of the General Public License. Of course, your program’s commands + might be different; for a GUI interface, you would use an “about box”.

+ +

You should also get your employer (if you work as a programmer) or school, + if any, to sign a “copyright disclaimer” for the program, if necessary. + For more information on this, and how to apply and follow the GNU GPL, see + <http://www.gnu.org/licenses/>.

+ +

The GNU General Public License does not permit incorporating your program + into proprietary programs. If your program is a subroutine library, you + may consider it more useful to permit linking proprietary applications with + the library. If this is what you want to do, use the GNU Lesser General + Public License instead of this License. But first, please read + <http://www.gnu.org/philosophy/why-not-lgpl.html>.

+ +
+ +

Apache License

+

Version 2.0, January 2004

+

http://www.apache.org/licenses/

+ +

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

+ +

1. Definitions.

+ +

“License” shall mean the terms and conditions for use, reproduction, and + distribution as defined by Sections 1 through 9 of this document.

+ +

“Licensor” shall mean the copyright owner or entity authorized by the + copyright owner that is granting the License.

+ +

“Legal Entity” shall mean the union of the acting entity and all other + entities that control, are controlled by, or are under common control with + that entity. For the purposes of this definition, “control” means (i) the + power, direct or indirect, to cause the direction or management of such + entity, whether by contract or otherwise, or (ii) ownership of fifty + percent (50%) or more of the outstanding shares, or (iii) beneficial + ownership of such entity.

+ +

“You” (or “Your”) shall mean an individual or Legal Entity exercising + permissions granted by this License.

+ +

“Source” form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation source, + and configuration files.

+ +

“Object” form shall mean any form resulting from mechanical transformation + or translation of a Source form, including but not limited to compiled + object code, generated documentation, and conversions to other media types.

+ +

“Work” shall mean the work of authorship, whether in Source or Object form, + made available under the License, as indicated by a copyright notice that + is included in or attached to the work (an example is provided in the + Appendix below).

+ +

“Derivative Works” shall mean any work, whether in Source or Object form, + that is based on (or derived from) the Work and for which the editorial + revisions, annotations, elaborations, or other modifications represent, as + a whole, an original work of authorship. For the purposes of this License, + Derivative Works shall not include works that remain separable from, or + merely link (or bind by name) to the interfaces of, the Work and Derivative + Works thereof.

+ +

“Contribution” shall mean any work of authorship, including the original + version of the Work and any modifications or additions to that Work or + Derivative Works thereof, that is intentionally submitted to Licensor for + inclusion in the Work by the copyright owner or by an individual or Legal + Entity authorized to submit on behalf of the copyright owner. For the + purposes of this definition, “submitted” means any form of electronic, + verbal, or written communication sent to the Licensor or its + representatives, including but not limited to communication on electronic + mailing lists, source code control systems, and issue tracking systems that + are managed by, or on behalf of, the Licensor for the purpose of discussing + and improving the Work, but excluding communication that is conspicuously + marked or otherwise designated in writing by the copyright owner as “Not a + Contribution.”

+ +

“Contributor” shall mean Licensor and any individual or Legal Entity on + behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work.

+ +

2. Grant of Copyright License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby + grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, + irrevocable copyright license to reproduce, prepare Derivative Works of, publicly + display, publicly perform, sublicense, and distribute the Work and such + Derivative Works in Source or Object form.

+ +

3. Grant of Patent License.

+ +

Subject to the terms and conditions of this License, each Contributor hereby grants + to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, use, + offer to sell, sell, import, and otherwise transfer the Work, where such + license applies only to those patent claims licensable by such Contributor + that are necessarily infringed by their Contribution(s) alone or by + combination of their Contribution(s) with the Work to which such + Contribution(s) was submitted. If You institute patent litigation against + any entity (including a cross-claim or counterclaim in a lawsuit) alleging + that the Work or a Contribution incorporated within the Work constitutes + direct or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate as of the + date such litigation is filed.

+ +

4. Redistribution.

+ +

You may reproduce and distribute copies of the Work or Derivative Works thereof + in any medium, with or without modifications, and in Source or Object form, provided + that You meet the following conditions:

+ +
    +
  1. You must give any other recipients of the Work or Derivative Works a + copy of this License; and
  2. + +
  3. You must cause any modified files to carry prominent notices stating + that You changed the files; and
  4. + +
  5. You must retain, in the Source form of any Derivative Works that You + distribute, all copyright, patent, trademark, and attribution notices from + the Source form of the Work, excluding those notices that do not pertain to + any part of the Derivative Works; and
  6. + +
  7. If the Work includes a “NOTICE” text file as part of its distribution, + then any Derivative Works that You distribute must include a readable copy + of the attribution notices contained within such NOTICE file, excluding + those notices that do not pertain to any part of the Derivative Works, in + at least one of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or documentation, + if provided along with the Derivative Works; or, within a display generated + by the Derivative Works, if and wherever such third-party notices normally + appear. The contents of the NOTICE file are for informational purposes only + and do not modify the License. You may add Your own attribution notices + within Derivative Works that You distribute, alongside or as an addendum to + the NOTICE text from the Work, provided that such additional attribution + notices cannot be construed as modifying the License. +
    +
    + You may add Your own copyright statement to Your modifications and may + provide additional or different license terms and conditions for use, + reproduction, or distribution of Your modifications, or for any such + Derivative Works as a whole, provided Your use, reproduction, and + distribution of the Work otherwise complies with the conditions stated in + this License.
  8. +
+ +

5. Submission of Contributions.

+ +

Unless You explicitly state otherwise, any Contribution intentionally submitted for + inclusion in the Work by You to the Licensor shall be under the terms and + conditions of this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify the + terms of any separate license agreement you may have executed with Licensor + regarding such Contributions.

+ +

6. Trademarks.

+ +

This License does not grant permission to use the trade names, trademarks, service marks, + or product names of the Licensor, except as required for reasonable and customary use + in describing the origin of the Work and reproducing the content of the + NOTICE file.

+ +

7. Disclaimer of Warranty.

+ +

Unless required by applicable law or agreed to in writing, Licensor provides the Work + (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT + WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, + without limitation, any warranties or conditions of TITLE, + NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You + are solely responsible for determining the appropriateness of using or + redistributing the Work and assume any risks associated with Your exercise + of permissions under this License.

+ +

8. Limitation of Liability.

+ +

In no event and under no legal theory, whether in tort (including negligence), contract, + or otherwise, unless required by applicable law (such as deliberate and + grossly negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a result + of this License or out of the use or inability to use the Work (including + but not limited to damages for loss of goodwill, work stoppage, computer + failure or malfunction, or any and all other commercial damages or losses), + even if such Contributor has been advised of the possibility of such + damages.

+ +

9. Accepting Warranty or Additional Liability.

+ +

While redistributing the Work or Derivative Works thereof, You may choose + to offer, and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this License. + However, in accepting such obligations, You may act only on Your own behalf + and on Your sole responsibility, not on behalf of any other Contributor, + and only if You agree to indemnify, defend, and hold each Contributor + harmless for any liability incurred by, or claims asserted against, such + Contributor by reason of your accepting any such warranty or additional + liability.

+ +

END OF TERMS AND CONDITIONS

+ +

APPENDIX: How to apply the Apache License to your work

+ +

To apply the Apache License to your work, attach the following boilerplate + notice, with the fields enclosed by brackets “[]” replaced with your own + identifying information. (Don’t include the brackets!) The text should be + enclosed in the appropriate comment syntax for the file format. We also + recommend that a file or class name and description of purpose be included + on the same “printed page” as the copyright notice for easier + identification within third-party archives.

+
Copyright [yyyy] [name of copyright owner]
+
+Licensed under the Apache License,
+Version 2.0 (the “License”);
+you may not use this file except
+in compliance with the License.
+You may obtain a copy of the License at
+
+http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law
+or agreed to in writing, software
+distributed under the License is
+distributed on an “AS IS” BASIS,
+WITHOUT WARRANTIES OR CONDITIONS
+OF ANY KIND, either express or implied.
+See the License for the specific
+language governing permissions and
+limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/tr/about_licenses_dark.html b/app/src/main/assets/tr/about_licenses_dark.html deleted file mode 100644 index 9d16f4dd..00000000 --- a/app/src/main/assets/tr/about_licenses_dark.html +++ /dev/null @@ -1,1066 +0,0 @@ - - - - - - - - - - -

Telif Hakkı

-

Privacy Browser telif hakkı © 2015-2020 Soren Stoutner.

- -

Lisans

-

Privacy Browser GPLv3+ lisansı altında yayınlandı. Lisansın tam metni aşağıdadır. - Kaynak kodu git.stoutner.com adresinden temin edilebilir.

- -

Engel Listeleri

-

EasyList ve EasyPrivacy listeleri - GPLv3+ ve Creative Commons Attribution-ShareAlike 3.0+ Unported - lisansları altında çift lisanslıdır. - Privacy Browser GPLv3+ seçeneğini kullanarak bunları kapsama almıştır.

- -

Fanboy’s Annoyance List ve Fanboy’s Social Blocking List listeleri - GPLv3+ ile uyumlu olan - Creative Commons Attribution 3.0 Unported license lisansı altında yayınlandı. Listeler Privacy Browser'a değiştirilmeden eklenmiştir.

- -

Engel listeleri hakkında daha fazla bilgiyi EasyList adresinde bulabilirsiniz.

- -

Kütüphaneler

-

Privacy Browser is built with the AndroidX Libraries, - the Kotlin libraries, - and code from the Google Material Maven repository, - which are released under the Apache License 2.0.

- -

Privacy Browser ücretsiz versiyonu Android Software Development Kit lisansı altında yayınlanan - Firebase Ads ile oluşturulmuştur.

- -

Sınıflar

-

com.stoutner.privacybrowser.views.CheckedLinearLayout is a modified version of a class contained in the - Android Kamera - kaynak kodunda bulunan bir sınıfın modifiye edilmiş bir sürümüdür. - Orijinal dosya Apache License 2.0 altında yayınlandı. - Değiştirilen dosya GPLv3+ lisansı altında yayınlandı.

- -

Simgeler

-

- Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan security ve language'den elde edilmiştir. - Lisansın tüm metni aşağıdadır. Değişikliklerin telif hakkı © 2016 Soren Stoutner. - Ortaya çıkan görüntüler GPLv3+ lisansı altında yayınlandı.

-

Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan folder ve exit_to_app elementlerinden elde edilmiştir. - Değişikliklerin telif hakkı © 2017 Soren Stoutner. - Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

-

Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan bookmarks ve create_new_folder elementlerinden elde edilmiştir. - Değişikliklerin telif hakkı © 2017 Soren Stoutner. - Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

-

Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan create_new_folder'dan elde edilmiştir. - Değişikliklerin telif hakkı © 2017 Soren Stoutner. - Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

-

Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan exit_to_app'ten elde edilmiştir. - Değişikliklerin telif hakkı © 2017 Soren Stoutner. - Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

-

Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan compare'den elde edilmiştir. - Değişikliklerin telif hakkı © 2017 Soren Stoutner. - Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

-

Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan sort'dan elde edilmiştir. - Değişikliklerin telif hakkı © 2019 Soren Stoutner. - Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

-

cookie Google tarafından oluşturuldu. - Apache License 2.0 altında yayınlandı ve Material Design - simgelerinden indirilebilir. Renk ve ebat gibi düzen bilgileri dışında herhangi bir değişiklik yapılmamıştır.

-

Aşağıdaki simgeler Apache License 2.0 altında yayınlanan Android Material - simge setinden gelmektedir. Renk ve ebat gibi düzen bilgileri dışında herhangi bir değişiklik yapılmamıştır. Bazıları koddaki kullanımlarıyla uygun olacak şekilde yeniden adlandırıldı. - Orijinal simgeler ve adlar aşağıda gösterilmiştir.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

- -
- -

GNU General Public License

-

Version 3, 29 June 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.

- -

Preamble

- -

The GNU General Public License is a free, copyleft license for - software and other kinds of works.

- -

The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a program—to make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.

- -

When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.

- -

To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.

- -

For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.

- -

Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.

- -

For the developers’ and authors’ protection, the GPL clearly explains - that there is no warranty for this free software. For both users’ and - authors’ sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.

- -

Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting users’ freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.

- -

Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.

- -

The precise terms and conditions for copying, distribution and - modification follow.

- -

TERMS AND CONDITIONS

- -

0. Definitions.

- -

“This License” refers to version 3 of the GNU General Public License.

- -

“Copyright” also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.

- -

“The Program” refers to any copyrightable work licensed under this - License. Each licensee is addressed as “you”. “Licensees” and - “recipients” may be individuals or organizations.

- -

To “modify” a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a “modified version” of the - earlier work or a work “based on” the earlier work.

- -

A “covered work” means either the unmodified Program or a work based - on the Program.

- -

To “propagate” a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.

- -

To “convey” a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.

- -

An interactive user interface displays “Appropriate Legal Notices” - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.

- -

1. Source Code.

- -

The “source code” for a work means the preferred form of the work - for making modifications to it. “Object code” means any non-source - form of a work.

- -

A “Standard Interface” means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.

- -

The “System Libraries” of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - “Major Component”, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.

- -

The “Corresponding Source” for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the work’s - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.

- -

The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.

- -

The Corresponding Source for a work in source code form is that - same work.

- -

2. Basic Permissions.

- -

All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.

- -

You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.

- -

Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.

- -

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

- -

No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.

- -

When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the work’s - users, your or third parties’ legal rights to forbid circumvention of - technological measures.

- -

4. Conveying Verbatim Copies.

- -

You may convey verbatim copies of the Program’s source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.

- -

You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.

- -

5. Conveying Modified Source Versions.

- -

You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:

- -
    -
  • a) The work must carry prominent notices stating that you modified - it, and giving a relevant date.
  • - -
  • b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - “keep intact all notices”.
  • - -
  • c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it.
  • - -
  • d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so.
  • -
- -

A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - “aggregate” if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilation’s users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.

- -

6. Conveying Non-Source Forms.

- -

You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:

- -
    -
  • a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange.
  • - -
  • b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge.
  • - -
  • c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b.
  • - -
  • d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements.
  • - -
  • e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d.
  • -
- -

A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.

- -

A “User Product” is either (1) a “consumer product”, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, “normally used” refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.

- -

“Installation Information” for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.

- -

If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).

- -

The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.

- -

Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.

- -

7. Additional Terms.

- -

“Additional permissions” are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.

- -

When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.

- -

Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:

- -
    -
  • a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or
  • - -
  • b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or
  • - -
  • c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or
  • - -
  • d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or
  • - -
  • e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or
  • - -
  • f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors.
  • -
- -

All other non-permissive additional terms are considered “further - restrictions” within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.

- -

If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.

- -

Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.

- -

8. Termination.

- -

You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).

- -

However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.

- -

Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.

- -

Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.

- -

9. Acceptance Not Required for Having Copies.

- -

You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.

- -

10. Automatic Licensing of Downstream Recipients.

- -

Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.

- -

An “entity transaction” is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the party’s predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.

- -

You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.

- -

11. Patents.

- -

A “contributor” is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributor’s “contributor version”.

- -

A contributor’s “essential patent claims” are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, “control” includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.

- -

Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributor’s essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.

- -

In the following three paragraphs, a “patent license” is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To “grant” such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.

- -

If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. “Knowingly relying” means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipient’s use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.

- -

If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.

- -

A patent license is “discriminatory” if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.

- -

Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.

- -

12. No Surrender of Others’ Freedom.

- -

If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.

- -

13. Use with the GNU Affero General Public License.

- -

Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.

- -

14. Revised Versions of this License.

- -

The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.

- -

Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License “or any later version” applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.

- -

If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxy’s - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.

- -

Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.

- -

15. Disclaimer of Warranty.

- -

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

- -

16. Limitation of Liability.

- -

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.

- -

17. Interpretation of Sections 15 and 16.

- -

If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.

- -

END OF TERMS AND CONDITIONS

- -

How to Apply These Terms to Your New Programs

- -

If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.

- -

To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the “copyright” line and a pointer to where the full notice is found.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Also add information on how to contact you by electronic and paper mail.

- -

If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your program’s commands - might be different; for a GUI interface, you would use an “about box”.

- -

You should also get your employer (if you work as a programmer) or school, - if any, to sign a “copyright disclaimer” for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.

- -

The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/tr/about_licenses_light.html b/app/src/main/assets/tr/about_licenses_light.html deleted file mode 100644 index 5878e2dd..00000000 --- a/app/src/main/assets/tr/about_licenses_light.html +++ /dev/null @@ -1,1066 +0,0 @@ - - - - - - - - - - -

Telif Hakkı

-

Privacy Browser telif hakkı © 2015-2020 Soren Stoutner.

- -

Lisans

-

Privacy Browser GPLv3+ lisansı altında yayınlandı. Lisansın tam metni aşağıdadır. - Kaynak kodu git.stoutner.com adresinden temin edilebilir.

- -

Engel Listeleri

-

EasyList ve EasyPrivacy listeleri - GPLv3+ ve Creative Commons Attribution-ShareAlike 3.0+ Unported - lisansları altında çift lisanslıdır. - Privacy Browser GPLv3+ seçeneğini kullanarak bunları kapsama almıştır.

- -

Fanboy’s Annoyance List ve Fanboy’s Social Blocking List listeleri - GPLv3+ ile uyumlu olan - Creative Commons Attribution 3.0 Unported license lisansı altında yayınlandı. Listeler Privacy Browser'a değiştirilmeden eklenmiştir.

- -

Engel listeleri hakkında daha fazla bilgiyi EasyList adresinde bulabilirsiniz.

- -

Kütüphaneler

-

Privacy Browser is built with the AndroidX Libraries, - the Kotlin libraries, - and code from the Google Material Maven repository, - which are released under the Apache License 2.0.

- -

Privacy Browser ücretsiz versiyonu Android Software Development Kit lisansı altında yayınlanan - Firebase Ads ile oluşturulmuştur.

- -

Sınıflar

-

com.stoutner.privacybrowser.views.CheckedLinearLayout is a modified version of a class contained in the - Android Kamera - kaynak kodunda bulunan bir sınıfın modifiye edilmiş bir sürümüdür. - Orijinal dosya Apache License 2.0 altında yayınlandı. - Değiştirilen dosya GPLv3+ lisansı altında yayınlandı.

- -

Simgeler

-

- Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan security ve language'den elde edilmiştir. - Lisansın tüm metni aşağıdadır. Değişikliklerin telif hakkı © 2016 Soren Stoutner. - Ortaya çıkan görüntüler GPLv3+ lisansı altında yayınlandı.

-

Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan folder ve exit_to_app elementlerinden elde edilmiştir. - Değişikliklerin telif hakkı © 2017 Soren Stoutner. - Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

-

Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan bookmarks ve create_new_folder elementlerinden elde edilmiştir. - Değişikliklerin telif hakkı © 2017 Soren Stoutner. - Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

-

Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan create_new_folder'dan elde edilmiştir. - Değişikliklerin telif hakkı © 2017 Soren Stoutner. - Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

-

Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan exit_to_app'ten elde edilmiştir. - Değişikliklerin telif hakkı © 2017 Soren Stoutner. - Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

-

Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan compare'den elde edilmiştir. - Değişikliklerin telif hakkı © 2017 Soren Stoutner. - Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

-

Apache License 2.0 altında yayınlanan ve - Android Material simge setinin bir parçası olan sort'dan elde edilmiştir. - Değişikliklerin telif hakkı © 2019 Soren Stoutner. - Ortaya çıkan görüntü GPLv3+ lisansı altında yayınlandı.

-

cookie Google tarafından oluşturuldu. - Apache License 2.0 altında yayınlandı ve Material Design - simgelerinden indirilebilir. Renk ve ebat gibi düzen bilgileri dışında herhangi bir değişiklik yapılmamıştır.

-

Aşağıdaki simgeler Apache License 2.0 altında yayınlanan Android Material - simge setinden gelmektedir. Renk ve ebat gibi düzen bilgileri dışında herhangi bir değişiklik yapılmamıştır. Bazıları koddaki kullanımlarıyla uygun olacak şekilde yeniden adlandırıldı. - Orijinal simgeler ve adlar aşağıda gösterilmiştir.

-

add.

-

arrow_back.

-

arrow_forward.

-

bookmarks.

-

bug_report.

-

camera_enhance.

-

chrome_reader_mode.

-

close.

-

delete.

-

delete_forever.

-

devices_other.

-

dns.

-

donut_small.

-

edit.

-

expand_less.

-

expand_more.

-

file_copy.

-

file_download.

-

find_in_page.

-

folder.

-

home.

-

image.

-

import_contacts.

-

import_export.

-

important_devices.

-

info_outline.

-

language.

-

link_off.

-

list.

-

local_activity.

-

location_off.

-

lock.

-

map.

-

more.

-

new releases.

-

open_in_browser.

-

payment.

-

question_answer.

-

refresh.

-

save.

-

search.

-

select_all.

-

settings.

-

settings_overscan.

-

share.

-

smartphone.

-

sort.

-

style.

-

subtitles.

-

tab.

-

text_fields.

-

thumbs_up_down.

-

vertical_align_bottom.

-

vertical_align_top.

-

visibility_off.

-

vpn_key.

-

vpn_lock.

-

web.

- -
- -

GNU General Public License

-

Version 3, 29 June 2007

- -

Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>

- -

Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.

- -

Preamble

- -

The GNU General Public License is a free, copyleft license for - software and other kinds of works.

- -

The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a program—to make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.

- -

When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.

- -

To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.

- -

For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.

- -

Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.

- -

For the developers’ and authors’ protection, the GPL clearly explains - that there is no warranty for this free software. For both users’ and - authors’ sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.

- -

Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting users’ freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.

- -

Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.

- -

The precise terms and conditions for copying, distribution and - modification follow.

- -

TERMS AND CONDITIONS

- -

0. Definitions.

- -

“This License” refers to version 3 of the GNU General Public License.

- -

“Copyright” also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.

- -

“The Program” refers to any copyrightable work licensed under this - License. Each licensee is addressed as “you”. “Licensees” and - “recipients” may be individuals or organizations.

- -

To “modify” a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a “modified version” of the - earlier work or a work “based on” the earlier work.

- -

A “covered work” means either the unmodified Program or a work based - on the Program.

- -

To “propagate” a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.

- -

To “convey” a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.

- -

An interactive user interface displays “Appropriate Legal Notices” - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.

- -

1. Source Code.

- -

The “source code” for a work means the preferred form of the work - for making modifications to it. “Object code” means any non-source - form of a work.

- -

A “Standard Interface” means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.

- -

The “System Libraries” of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - “Major Component”, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.

- -

The “Corresponding Source” for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the work’s - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.

- -

The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.

- -

The Corresponding Source for a work in source code form is that - same work.

- -

2. Basic Permissions.

- -

All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.

- -

You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.

- -

Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.

- -

3. Protecting Users’ Legal Rights From Anti-Circumvention Law.

- -

No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.

- -

When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the work’s - users, your or third parties’ legal rights to forbid circumvention of - technological measures.

- -

4. Conveying Verbatim Copies.

- -

You may convey verbatim copies of the Program’s source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.

- -

You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.

- -

5. Conveying Modified Source Versions.

- -

You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:

- -
    -
  • a) The work must carry prominent notices stating that you modified - it, and giving a relevant date.
  • - -
  • b) The work must carry prominent notices stating that it is - released under this License and any conditions added under section - 7. This requirement modifies the requirement in section 4 to - “keep intact all notices”.
  • - -
  • c) You must license the entire work, as a whole, under this - License to anyone who comes into possession of a copy. This - License will therefore apply, along with any applicable section 7 - additional terms, to the whole of the work, and all its parts, - regardless of how they are packaged. This License gives no - permission to license the work in any other way, but it does not - invalidate such permission if you have separately received it.
  • - -
  • d) If the work has interactive user interfaces, each must display - Appropriate Legal Notices; however, if the Program has interactive - interfaces that do not display Appropriate Legal Notices, your - work need not make them do so.
  • -
- -

A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - “aggregate” if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilation’s users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.

- -

6. Conveying Non-Source Forms.

- -

You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:

- -
    -
  • a) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by the - Corresponding Source fixed on a durable physical medium - customarily used for software interchange.
  • - -
  • b) Convey the object code in, or embodied in, a physical product - (including a physical distribution medium), accompanied by a - written offer, valid for at least three years and valid for as - long as you offer spare parts or customer support for that product - model, to give anyone who possesses the object code either (1) a - copy of the Corresponding Source for all the software in the - product that is covered by this License, on a durable physical - medium customarily used for software interchange, for a price no - more than your reasonable cost of physically performing this - conveying of source, or (2) access to copy the - Corresponding Source from a network server at no charge.
  • - -
  • c) Convey individual copies of the object code with a copy of the - written offer to provide the Corresponding Source. This - alternative is allowed only occasionally and noncommercially, and - only if you received the object code with such an offer, in accord - with subsection 6b.
  • - -
  • d) Convey the object code by offering access from a designated - place (gratis or for a charge), and offer equivalent access to the - Corresponding Source in the same way through the same place at no - further charge. You need not require recipients to copy the - Corresponding Source along with the object code. If the place to - copy the object code is a network server, the Corresponding Source - may be on a different server (operated by you or a third party) - that supports equivalent copying facilities, provided you maintain - clear directions next to the object code saying where to find the - Corresponding Source. Regardless of what server hosts the - Corresponding Source, you remain obligated to ensure that it is - available for as long as needed to satisfy these requirements.
  • - -
  • e) Convey the object code using peer-to-peer transmission, provided - you inform other peers where the object code and Corresponding - Source of the work are being offered to the general public at no - charge under subsection 6d.
  • -
- -

A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.

- -

A “User Product” is either (1) a “consumer product”, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, “normally used” refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.

- -

“Installation Information” for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.

- -

If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).

- -

The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.

- -

Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.

- -

7. Additional Terms.

- -

“Additional permissions” are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.

- -

When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.

- -

Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:

- -
    -
  • a) Disclaiming warranty or limiting liability differently from the - terms of sections 15 and 16 of this License; or
  • - -
  • b) Requiring preservation of specified reasonable legal notices or - author attributions in that material or in the Appropriate Legal - Notices displayed by works containing it; or
  • - -
  • c) Prohibiting misrepresentation of the origin of that material, or - requiring that modified versions of such material be marked in - reasonable ways as different from the original version; or
  • - -
  • d) Limiting the use for publicity purposes of names of licensors or - authors of the material; or
  • - -
  • e) Declining to grant rights under trademark law for use of some - trade names, trademarks, or service marks; or
  • - -
  • f) Requiring indemnification of licensors and authors of that - material by anyone who conveys the material (or modified versions of - it) with contractual assumptions of liability to the recipient, for - any liability that these contractual assumptions directly impose on - those licensors and authors.
  • -
- -

All other non-permissive additional terms are considered “further - restrictions” within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.

- -

If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.

- -

Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.

- -

8. Termination.

- -

You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).

- -

However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.

- -

Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.

- -

Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.

- -

9. Acceptance Not Required for Having Copies.

- -

You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.

- -

10. Automatic Licensing of Downstream Recipients.

- -

Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.

- -

An “entity transaction” is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the party’s predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.

- -

You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.

- -

11. Patents.

- -

A “contributor” is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributor’s “contributor version”.

- -

A contributor’s “essential patent claims” are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, “control” includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.

- -

Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributor’s essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.

- -

In the following three paragraphs, a “patent license” is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To “grant” such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.

- -

If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. “Knowingly relying” means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipient’s use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.

- -

If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.

- -

A patent license is “discriminatory” if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.

- -

Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.

- -

12. No Surrender of Others’ Freedom.

- -

If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.

- -

13. Use with the GNU Affero General Public License.

- -

Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.

- -

14. Revised Versions of this License.

- -

The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.

- -

Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License “or any later version” applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.

- -

If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxy’s - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.

- -

Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.

- -

15. Disclaimer of Warranty.

- -

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

- -

16. Limitation of Liability.

- -

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.

- -

17. Interpretation of Sections 15 and 16.

- -

If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.

- -

END OF TERMS AND CONDITIONS

- -

How to Apply These Terms to Your New Programs

- -

If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.

- -

To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the “copyright” line and a pointer to where the full notice is found.

- -
<one line to give the program’s name
-and a brief idea of what it does.>
-Copyright (C) <year>  <name of author>
-
-This program is free software: you can
-redistribute it and/or modify
-it under the terms of the GNU General
-Public License as published by the Free
-Software Foundation, either version 3
-of the License, or(at your option)
-any later version.
-
-This program is distributed in the hope
-that it will be useful, but WITHOUT ANY
-WARRANTY; without even the implied
-warranty of MERCHANTABILITY or FITNESS
-FOR A PARTICULAR PURPOSE.  See the GNU
-General Public License for more details.
-
-You should have received a copy of the
-GNU General Public License along with
-this program.  If not, see
-<http://www.gnu.org/licenses/>.
- -

Also add information on how to contact you by electronic and paper mail.

- -

If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:

- -
<program>  Copyright (C) <year>
-<name of author>
-This program comes with ABSOLUTELY NO
-WARRANTY; for details type `show w'.
-This is free software, and you are
-welcome to redistribute it under
-certain conditions; type `show c'
-for details.
- -

The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your program’s commands - might be different; for a GUI interface, you would use an “about box”.

- -

You should also get your employer (if you work as a programmer) or school, - if any, to sign a “copyright disclaimer” for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.

- -

The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.

- -
- -

Apache License

-

Version 2.0, January 2004

-

http://www.apache.org/licenses/

- -

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

- -

1. Definitions.

- -

“License” shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.

- -

“Licensor” shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.

- -

“Legal Entity” shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, “control” means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.

- -

“You” (or “Your”) shall mean an individual or Legal Entity exercising - permissions granted by this License.

- -

“Source” form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.

- -

“Object” form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.

- -

“Work” shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).

- -

“Derivative Works” shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.

- -

“Contribution” shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, “submitted” means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as “Not a - Contribution.”

- -

“Contributor” shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.

- -

2. Grant of Copyright License.

- -

Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.

- -

3. Grant of Patent License.

- -

Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.

- -

4. Redistribution.

- -

You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:

- -
    -
  1. You must give any other recipients of the Work or Derivative Works a - copy of this License; and
  2. - -
  3. You must cause any modified files to carry prominent notices stating - that You changed the files; and
  4. - -
  5. You must retain, in the Source form of any Derivative Works that You - distribute, all copyright, patent, trademark, and attribution notices from - the Source form of the Work, excluding those notices that do not pertain to - any part of the Derivative Works; and
  6. - -
  7. If the Work includes a “NOTICE” text file as part of its distribution, - then any Derivative Works that You distribute must include a readable copy - of the attribution notices contained within such NOTICE file, excluding - those notices that do not pertain to any part of the Derivative Works, in - at least one of the following places: within a NOTICE text file distributed - as part of the Derivative Works; within the Source form or documentation, - if provided along with the Derivative Works; or, within a display generated - by the Derivative Works, if and wherever such third-party notices normally - appear. The contents of the NOTICE file are for informational purposes only - and do not modify the License. You may add Your own attribution notices - within Derivative Works that You distribute, alongside or as an addendum to - the NOTICE text from the Work, provided that such additional attribution - notices cannot be construed as modifying the License. -
    -
    - You may add Your own copyright statement to Your modifications and may - provide additional or different license terms and conditions for use, - reproduction, or distribution of Your modifications, or for any such - Derivative Works as a whole, provided Your use, reproduction, and - distribution of the Work otherwise complies with the conditions stated in - this License.
  8. -
- -

5. Submission of Contributions.

- -

Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.

- -

6. Trademarks.

- -

This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.

- -

7. Disclaimer of Warranty.

- -

Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.

- -

8. Limitation of Liability.

- -

In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.

- -

9. Accepting Warranty or Additional Liability.

- -

While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.

- -

END OF TERMS AND CONDITIONS

- -

APPENDIX: How to apply the Apache License to your work

- -

To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets “[]” replaced with your own - identifying information. (Don’t include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same “printed page” as the copyright notice for easier - identification within third-party archives.

-
Copyright [yyyy] [name of copyright owner]
-
-Licensed under the Apache License,
-Version 2.0 (the “License”);
-you may not use this file except
-in compliance with the License.
-You may obtain a copy of the License at
-
-http://www.apache.org/licenses/LICENSE-2.0
-
-Unless required by applicable law
-or agreed to in writing, software
-distributed under the License is
-distributed on an “AS IS” BASIS,
-WITHOUT WARRANTIES OR CONDITIONS
-OF ANY KIND, either express or implied.
-See the License for the specific
-language governing permissions and
-limitations under the License.
\ No newline at end of file diff --git a/app/src/main/assets/tr/about_links.html b/app/src/main/assets/tr/about_links.html new file mode 100644 index 00000000..12f344f1 --- /dev/null +++ b/app/src/main/assets/tr/about_links.html @@ -0,0 +1,47 @@ + + + + + + + + + + + + + +

Web Sayfaları

+ +

+ Haber

+ +

+ Yol Haritası

+ +

+ Hata İzleyici ve Özellik İstekleri

+ +

+ Forum

+ +

+ GitWeb

+ + \ No newline at end of file diff --git a/app/src/main/assets/tr/about_links_dark.html b/app/src/main/assets/tr/about_links_dark.html deleted file mode 100644 index d4596c09..00000000 --- a/app/src/main/assets/tr/about_links_dark.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - - - - - - - -

Web Sayfaları

- -

- Haber

- -

- Yol Haritası

- -

- Hata İzleyici ve Özellik İstekleri

- -

- Forum

- -

- GitWeb

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/about_links_light.html b/app/src/main/assets/tr/about_links_light.html deleted file mode 100644 index 19530424..00000000 --- a/app/src/main/assets/tr/about_links_light.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - - - - - - - -

Web Sayfaları

- -

- Haber

- -

- Yol Haritası

- -

- Hata İzleyici ve Özellik İstekleri

- -

- Forum

- -

- GitWeb

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/about_permissions.html b/app/src/main/assets/tr/about_permissions.html new file mode 100644 index 00000000..d59b080b --- /dev/null +++ b/app/src/main/assets/tr/about_permissions.html @@ -0,0 +1,49 @@ + + + + + + + + + + + + + +

Tam ağ erişimine sahip olma

+

android.permission.INTERNET

+

WebView’ın internete erişimi için gereklidir. Bu izin olmadan, Privacy Browser, “İnternet Olmadan Gizliliğinizi Koruyan Bir Tarayıcı” olacaktır.

+ +

Kısayolları yükleme

+

com.android.launcher.permission.INSTALL_SHORTCUT

+

Başlatıcı masaüstüne web sayfalarının kısayollarını eklemek için gereklidir.

+ +

Depolama okuma

+

android.permission.READ_EXTERNAL_STORAGE

+

Ayarları ortak klasörden içe aktarmak için gereklidir. + Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediğinde, Privacy Browser, uygulama klasörlerinden ayarları içe aktarır.

+ +

Depolama yazma

+

android.permission.WRITE_EXTERNAL_STORAGE

+

Ayarları ve indirilen dosyaları ortak klasörlere aktarmak için gereklidir. + Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediğinde, Privacy Browser, + indirilenleri uygulama klasörlerine depolar ve ayarları uygulama klasörlerine aktarır.

+ + \ No newline at end of file diff --git a/app/src/main/assets/tr/about_permissions_dark.html b/app/src/main/assets/tr/about_permissions_dark.html deleted file mode 100644 index 4fc2e3dd..00000000 --- a/app/src/main/assets/tr/about_permissions_dark.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -

Tam ağ erişimine sahip olma

-

android.permission.INTERNET

-

WebView’ın internete erişimi için gereklidir. Bu izin olmadan, Privacy Browser, “İnternet Olmadan Gizliliğinizi Koruyan Bir Tarayıcı” olacaktır.

- -

Kısayolları yükleme

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Başlatıcı masaüstüne web sayfalarının kısayollarını eklemek için gereklidir.

- -

Depolama okuma

-

android.permission.READ_EXTERNAL_STORAGE

-

Ayarları ortak klasörden içe aktarmak için gereklidir. - Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediğinde, Privacy Browser, uygulama klasörlerinden ayarları içe aktarır.

- -

Depolama yazma

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Ayarları ve indirilen dosyaları ortak klasörlere aktarmak için gereklidir. - Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediğinde, Privacy Browser, - indirilenleri uygulama klasörlerine depolar ve ayarları uygulama klasörlerine aktarır.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/about_permissions_light.html b/app/src/main/assets/tr/about_permissions_light.html deleted file mode 100644 index 6c0ea98d..00000000 --- a/app/src/main/assets/tr/about_permissions_light.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -

Tam ağ erişimine sahip olma

-

android.permission.INTERNET

-

WebView’ın internete erişimi için gereklidir. Bu izin olmadan, Privacy Browser, “İnternet Olmadan Gizliliğinizi Koruyan Bir Tarayıcı” olacaktır.

- -

Kısayolları yükleme

-

com.android.launcher.permission.INSTALL_SHORTCUT

-

Başlatıcı masaüstüne web sayfalarının kısayollarını eklemek için gereklidir.

- -

Depolama okuma

-

android.permission.READ_EXTERNAL_STORAGE

-

Ayarları ortak klasörden içe aktarmak için gereklidir. - Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediğinde, Privacy Browser, uygulama klasörlerinden ayarları içe aktarır.

- -

Depolama yazma

-

android.permission.WRITE_EXTERNAL_STORAGE

-

Ayarları ve indirilen dosyaları ortak klasörlere aktarmak için gereklidir. - Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediğinde, Privacy Browser, - indirilenleri uygulama klasörlerine depolar ve ayarları uygulama klasörlerine aktarır.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/about_privacy_policy.html b/app/src/main/assets/tr/about_privacy_policy.html new file mode 100644 index 00000000..7b992353 --- /dev/null +++ b/app/src/main/assets/tr/about_privacy_policy.html @@ -0,0 +1,93 @@ + + + + + + + + + + + + + +

Privacy Browser

+

Privacy Browser herhangi bir kullanıcı bilgisi toplamaz.

+ + +

Google Play

+

Google Play kendisine özgü gizlilik politikasına sahiptir. + Google, aşağıdaki kategorilerce düzenlenen, indirme sayıları da dahil, anonimleştirilmiş özet kurulum bilgilerini geliştiricilere verir.

+
    +
  • Android versiyonu (örn. Android 7.1)
  • +
  • Cihaz (örn. Samsung Galaxy S6 [zeroflte])
  • +
  • Tabletler (örn. Tablets 10" ve üzeri)
  • +
  • Ülke (örn. Amerika Birleşik Devletleri)
  • +
  • Dil (örn. Ä°ngilizce [Amerika Birleşik Devletleri])
  • +
  • Uygulama versiyonu (örn. 14)
  • +
  • Telefon operatörü (örn. T-Mobile - US)
  • +
+ + +

Google Play Derecelendirmeleri

+

Google Play kendisine özgü gizlilik politikasına sahiptir. + Google, kullanıcı değerlendirmeleriyle ilişkili aşağıdaki bilgilerin anonimleştirilmiş özetlerini geliştiricilere verir.

+
    +
  • Ülke (örn. Amerika Birleşik Devletleri)
  • +
  • Dil (örn. Ä°ngilizce)
  • +
  • Uygulama versiyonu (örn. 14)
  • +
  • Android versiyonu (örn. Android 7.1)
  • +
  • Cihaz (örn. Google Nexus 5X [bullhead])
  • +
  • Tabletler (örn. Tablets 10" ve üzeri)
  • +
+ + +

Google Play Kritikleri

+

Google Play kendisine özgü gizlilik politikasına sahiptir. + Google, inceleme yapan kişinin ismine, değerlendirmeye ve inceleme metninine (tümü halka açıktır) ek olarak, aşağıdaki bilgilerin bir kısmını ya da tamamını geliştiricilere verir.

+
    +
  • Versiyon kodu (örn. 7)
  • +
  • Versiyon adı (örn. 1.6)
  • +
  • Android versiyonu (örn. Android 5.1)
  • +
  • Cihaz (örn. Galaxy S6 Edge+ [zenlte])
  • +
  • Üretici (örn. Samsung)
  • +
  • Cihaz tipi (örn. Telefon)
  • +
  • CPU markası (örn. Samsung)
  • +
  • CPU modeli (örn. Exynos 7420)
  • +
  • Piksel yoğunluğu (örn. 560 dpi)
  • +
  • Ekran boyutu (örn. 2560 x 1440)
  • +
  • RAM (örn. 4096 MB)
  • +
  • Native platformu (örn. armeabi-v7a,armeabi,arm64v8a)
  • +
  • OpenGL ES versiyonu (örn. 3.1)
  • +
  • Cihaz dili (örn. Ä°ngilizce)
  • +
+ + +

Doğrudan İletişim

+

Kullanıcılar, stoutner.com üzerinden Stoutner ile doğrudan iletişime (E-posta atmak ya da yorum yapmak gibi) geçebilir.

+ + +

Bilgilerin Kullanımı

+

Stoutner bu bilgileri, Privacy Browser'ın geliştirilmesine yardımcı olması ve kullanıcılarla projenin durumuyla ilgili iletişime geçmek için kullanabilir. + Stoutner asla bu bilgileri, reklam ve pazarlama için kullanacak üçüncü kişilere vermez ya da satmaz.

+ +
+

Revizyon 1.7, 14 Mayıs 2019

+ + \ No newline at end of file diff --git a/app/src/main/assets/tr/about_privacy_policy_dark.html b/app/src/main/assets/tr/about_privacy_policy_dark.html deleted file mode 100644 index ac692619..00000000 --- a/app/src/main/assets/tr/about_privacy_policy_dark.html +++ /dev/null @@ -1,90 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser herhangi bir kullanıcı bilgisi toplamaz.

- - -

Google Play

-

Google Play kendisine özgü gizlilik politikasına sahiptir. - Google, aşağıdaki kategorilerce düzenlenen, indirme sayıları da dahil, anonimleştirilmiş özet kurulum bilgilerini geliştiricilere verir.

-
    -
  • Android versiyonu (örn. Android 7.1)
  • -
  • Cihaz (örn. Samsung Galaxy S6 [zeroflte])
  • -
  • Tabletler (örn. Tablets 10" ve üzeri)
  • -
  • Ülke (örn. Amerika Birleşik Devletleri)
  • -
  • Dil (örn. Ä°ngilizce [Amerika Birleşik Devletleri])
  • -
  • Uygulama versiyonu (örn. 14)
  • -
  • Telefon operatörü (örn. T-Mobile - US)
  • -
- - -

Google Play Derecelendirmeleri

-

Google Play kendisine özgü gizlilik politikasına sahiptir. - Google, kullanıcı değerlendirmeleriyle ilişkili aşağıdaki bilgilerin anonimleştirilmiş özetlerini geliştiricilere verir.

-
    -
  • Ülke (örn. Amerika Birleşik Devletleri)
  • -
  • Dil (örn. Ä°ngilizce)
  • -
  • Uygulama versiyonu (örn. 14)
  • -
  • Android versiyonu (örn. Android 7.1)
  • -
  • Cihaz (örn. Google Nexus 5X [bullhead])
  • -
  • Tabletler (örn. Tablets 10" ve üzeri)
  • -
- - -

Google Play Kritikleri

-

Google Play kendisine özgü gizlilik politikasına sahiptir. - Google, inceleme yapan kişinin ismine, değerlendirmeye ve inceleme metninine (tümü halka açıktır) ek olarak, aşağıdaki bilgilerin bir kısmını ya da tamamını geliştiricilere verir.

-
    -
  • Versiyon kodu (örn. 7)
  • -
  • Versiyon adı (örn. 1.6)
  • -
  • Android versiyonu (örn. Android 5.1)
  • -
  • Cihaz (örn. Galaxy S6 Edge+ [zenlte])
  • -
  • Üretici (örn. Samsung)
  • -
  • Cihaz tipi (örn. Telefon)
  • -
  • CPU markası (örn. Samsung)
  • -
  • CPU modeli (örn. Exynos 7420)
  • -
  • Piksel yoğunluğu (örn. 560 dpi)
  • -
  • Ekran boyutu (örn. 2560 x 1440)
  • -
  • RAM (örn. 4096 MB)
  • -
  • Native platformu (örn. armeabi-v7a,armeabi,arm64v8a)
  • -
  • OpenGL ES versiyonu (örn. 3.1)
  • -
  • Cihaz dili (örn. Ä°ngilizce)
  • -
- - -

Doğrudan İletişim

-

Kullanıcılar, stoutner.com üzerinden Stoutner ile doğrudan iletişime (E-posta atmak ya da yorum yapmak gibi) geçebilir.

- - -

Bilgilerin Kullanımı

-

Stoutner bu bilgileri, Privacy Browser'ın geliştirilmesine yardımcı olması ve kullanıcılarla projenin durumuyla ilgili iletişime geçmek için kullanabilir. - Stoutner asla bu bilgileri, reklam ve pazarlama için kullanacak üçüncü kişilere vermez ya da satmaz.

- -
-

Revizyon 1.6, 22 Mayıs 2018

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/about_privacy_policy_light.html b/app/src/main/assets/tr/about_privacy_policy_light.html deleted file mode 100644 index bf43145e..00000000 --- a/app/src/main/assets/tr/about_privacy_policy_light.html +++ /dev/null @@ -1,90 +0,0 @@ - - - - - - - - - - -

Privacy Browser

-

Privacy Browser herhangi bir kullanıcı bilgisi toplamaz.

- - -

Google Play

-

Google Play kendisine özgü gizlilik politikasına sahiptir. - Google, aşağıdaki kategorilerce düzenlenen, indirme sayıları da dahil, anonimleştirilmiş özet kurulum bilgilerini geliştiricilere verir.

-
    -
  • Android versiyonu (örn. Android 7.1)
  • -
  • Cihaz (örn. Samsung Galaxy S6 [zeroflte])
  • -
  • Tabletler (örn. Tablets 10" ve üzeri)
  • -
  • Ülke (örn. Amerika Birleşik Devletleri)
  • -
  • Dil (örn. Ä°ngilizce [Amerika Birleşik Devletleri])
  • -
  • Uygulama versiyonu (örn. 14)
  • -
  • Telefon operatörü (örn. T-Mobile - US)
  • -
- - -

Google Play Derecelendirmeleri

-

Google Play kendisine özgü gizlilik politikasına sahiptir. - Google, kullanıcı değerlendirmeleriyle ilişkili aşağıdaki bilgilerin anonimleştirilmiş özetlerini geliştiricilere verir.

-
    -
  • Ülke (örn. Amerika Birleşik Devletleri)
  • -
  • Dil (örn. Ä°ngilizce)
  • -
  • Uygulama versiyonu (örn. 14)
  • -
  • Android versiyonu (örn. Android 7.1)
  • -
  • Cihaz (örn. Google Nexus 5X [bullhead])
  • -
  • Tabletler (örn. Tablets 10" ve üzeri)
  • -
- - -

Google Play Kritikleri

-

Google Play kendisine özgü gizlilik politikasına sahiptir. - Google, inceleme yapan kişinin ismine, değerlendirmeye ve inceleme metninine (tümü halka açıktır) ek olarak, aşağıdaki bilgilerin bir kısmını ya da tamamını geliştiricilere verir.

-
    -
  • Versiyon kodu (örn. 7)
  • -
  • Versiyon adı (örn. 1.6)
  • -
  • Android versiyonu (örn. Android 5.1)
  • -
  • Cihaz (örn. Galaxy S6 Edge+ [zenlte])
  • -
  • Üretici (örn. Samsung)
  • -
  • Cihaz tipi (örn. Telefon)
  • -
  • CPU markası (örn. Samsung)
  • -
  • CPU modeli (örn. Exynos 7420)
  • -
  • Piksel yoğunluğu (örn. 560 dpi)
  • -
  • Ekran boyutu (örn. 2560 x 1440)
  • -
  • RAM (örn. 4096 MB)
  • -
  • Native platformu (örn. armeabi-v7a,armeabi,arm64v8a)
  • -
  • OpenGL ES versiyonu (örn. 3.1)
  • -
  • Cihaz dili (örn. Ä°ngilizce)
  • -
- - -

Doğrudan İletişim

-

Kullanıcılar, stoutner.com üzerinden Stoutner ile doğrudan iletişime (E-posta atmak ya da yorum yapmak gibi) geçebilir.

- - -

Bilgilerin Kullanımı

-

Stoutner bu bilgileri, Privacy Browser'ın geliştirilmesine yardımcı olması ve kullanıcılarla projenin durumuyla ilgili iletişime geçmek için kullanabilir. - Stoutner asla bu bilgileri, reklam ve pazarlama için kullanacak üçüncü kişilere vermez ya da satmaz.

- -
-

Revizyon 1.6, 22 Mayıs 2018

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_domain_settings.html b/app/src/main/assets/tr/guide_domain_settings.html new file mode 100644 index 00000000..1b9e24ae --- /dev/null +++ b/app/src/main/assets/tr/guide_domain_settings.html @@ -0,0 +1,42 @@ + + + + + + + + + + + + + +

Güvenli Web Taraması

+ +

Privacy Browser, JavaScript'i, çerezleri ve DOM depolamayı varsayılan olarak devre dışı bırakır. + Ancak, bazı web sayfalarının düzgün çalışması için bu özelliklerin etkin olması gerekebilir. + Özel bir domain ziyaret edilirken, belirli bir özellik kümesi domain ayarlarından otomatik olarak aktif edilebilir.

+ + + +

Ayarları özelleştirilmiş bir domain ziyaret edilirken, URL metin kutusunun arka planı yeşil olur.

+ + + + \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_domain_settings_dark.html b/app/src/main/assets/tr/guide_domain_settings_dark.html deleted file mode 100644 index 103dacf2..00000000 --- a/app/src/main/assets/tr/guide_domain_settings_dark.html +++ /dev/null @@ -1,39 +0,0 @@ - - - - - - - - - - -

Güvenli Web Taraması

- -

Privacy Browser, JavaScript'i, çerezleri ve DOM depolamayı varsayılan olarak devre dışı bırakır. - Ancak, bazı web sayfalarının düzgün çalışması için bu özelliklerin etkin olması gerekebilir. - Özel bir domain ziyaret edilirken, belirli bir özellik kümesi domain ayarlarından otomatik olarak aktif edilebilir.

- -

- -

Ayarları özelleştirilmiş bir domain ziyaret edilirken, URL metin kutusunun arka planı yeşil olur.

- -

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_domain_settings_light.html b/app/src/main/assets/tr/guide_domain_settings_light.html deleted file mode 100644 index 771771c4..00000000 --- a/app/src/main/assets/tr/guide_domain_settings_light.html +++ /dev/null @@ -1,39 +0,0 @@ - - - - - - - - - - -

Güvenli Web Taraması

- -

Privacy Browser, JavaScript'i, çerezleri ve DOM depolamayı varsayılan olarak devre dışı bırakır. - Ancak, bazı web sayfalarının düzgün çalışması için bu özelliklerin etkin olması gerekebilir. - Özel bir domain ziyaret edilirken, belirli bir özellik kümesi domain ayarlarından otomatik olarak aktif edilebilir.

- -

- -

Ayarları özelleştirilmiş bir domain ziyaret edilirken, URL metin kutusunun arka planı yeşil olur.

- -

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_javascript.html b/app/src/main/assets/tr/guide_javascript.html new file mode 100644 index 00000000..510fbfe2 --- /dev/null +++ b/app/src/main/assets/tr/guide_javascript.html @@ -0,0 +1,60 @@ + + + + + + + + + + + + + +

JavaScript Güçlüdür

+ +

İnternetin ilk günlerinde, web sayfaları statikti, bu, ekranda görüntülenen metinleri ve görüntüleri içerdikleri, ancak kullanıcılarla etkileşime giremedikleri anlamına geliyor. + Tabii ki, statik içeriklerin birçoğu ilginç olabilir. Dinamik web sayfalarını kolaylaştırmak için çeşitli teknolojiler geliştirilmiştir. + JavaScript bu teknolojilerden biridir.

+ +

JavaScript bir programlama dilidir. Çoğu web sunucusu, web sayfasının bir parçası olarak cihazlara gönderilen JavaScript ile yazılmış programları içerir. + Cihaz, yerel işlemcisinde JavaScript’i çalıştırıp web sitesindeki görüntüleri oynatabilen, bir menü açabilen ve daha birçok yararlı şey yapabilen programın komutlarını yürütür.

+ + +

JavaScript Tehlikelidir

+ +

Tabii ki, bir web sayfasının gelişigüzel programları çalıştırma konsepti potansiyel olarak tehlikelidir. + Bu sebeple, virüs yüklemek gibi şeyler yapmaması için JavaScript üzerinde bazı sınırlamalar vardır. Ancak, bu sınırlamaların aşırı derecede geniş olduğu ortaya çıktı. + Aşağıda, JavaScript’in bir cihaz hakkında üretebileceği bilgi türünü gösteren bir web sitesi olan webkay’in ekran görüntüsü verilmiştir. + Browser Leaks de başka iyi bir kaynaktır.

+ + + +

Gizlilik amacı sebebiyle, internette gezinmek için JavaScript’i devre dışı bırakmak ideal olacaktır. + Ancak, amaçlarını yerini getirmesi için JavaScript’e ihtiyaç duyan ve o şekilde programlanabildikleri halde JavaScript olmadan düzgün çalışmayan bazı web siteleri vardır. + Privacy Browser, JavaScript’i açıp kapatmayı kolaylaştırarak bu sorunu çözme yoluna gider. + Gizlilik kalkanına dokunmak, onu mavi veya sarı + (ikisi de JavaScript’in devre dışı olduğunu gösterir) ve kırmızı (JavaScript'in etkin olduğunu gösterir) olarak değiştirecektir. + JavaScript etkinken ve devre dışıyken, webkay’in topladığı farklı bilgilere bakmak bilgilendiricidir.

+ +

İnternette JavaScript devre dışı bırakılmış olarak gezinmek ve yalnızca gerektiğinde etkin hale getirmek, gizliliği koruma adına çok yararlı olacaktır. + Buna ek olarak, JavaScript, modern web siteleriyle birlikte gelen ekstra süprüntüler ve çok sayıda rahatsız edici reklamlar için kullanılır. + Devre dışı bırakıldığında, web siteleri daha hızlı yüklenecek, daha az ağ trafiği tüketilecek ve daha fazla pil ömrünü sağlayan daha az CPU gücü kullanımına yol açacaktır.

+ + \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_javascript_dark.html b/app/src/main/assets/tr/guide_javascript_dark.html deleted file mode 100644 index 3fad8db9..00000000 --- a/app/src/main/assets/tr/guide_javascript_dark.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - - - - - - - -

JavaScript Güçlüdür

- -

İnternetin ilk günlerinde, web sayfaları statikti, bu, ekranda görüntülenen metinleri ve görüntüleri içerdikleri, ancak kullanıcılarla etkileşime giremedikleri anlamına geliyor. - Tabii ki, statik içeriklerin birçoğu ilginç olabilir. Dinamik web sayfalarını kolaylaştırmak için çeşitli teknolojiler geliştirilmiştir. - JavaScript bu teknolojilerden biridir.

- -

JavaScript bir programlama dilidir. Çoğu web sunucusu, web sayfasının bir parçası olarak cihazlara gönderilen JavaScript ile yazılmış programları içerir. - Cihaz, yerel işlemcisinde JavaScript’i çalıştırıp web sitesindeki görüntüleri oynatabilen, bir menü açabilen ve daha birçok yararlı şey yapabilen programın komutlarını yürütür.

- - -

JavaScript Tehlikelidir

- -

Tabii ki, bir web sayfasının gelişigüzel programları çalıştırma konsepti potansiyel olarak tehlikelidir. - Bu sebeple, virüs yüklemek gibi şeyler yapmaması için JavaScript üzerinde bazı sınırlamalar vardır. Ancak, bu sınırlamaların aşırı derecede geniş olduğu ortaya çıktı. - Aşağıda, JavaScript’in bir cihaz hakkında üretebileceği bilgi türünü gösteren bir web sitesi olan webkay’in ekran görüntüsü verilmiştir. - Browser Leaks de başka iyi bir kaynaktır.

- -

- -

Gizlilik amacı sebebiyle, internette gezinmek için JavaScript’i devre dışı bırakmak ideal olacaktır. - Ancak, amaçlarını yerini getirmesi için JavaScript’e ihtiyaç duyan ve o şekilde programlanabildikleri halde JavaScript olmadan düzgün çalışmayan bazı web siteleri vardır. - Privacy Browser, JavaScript’i açıp kapatmayı kolaylaştırarak bu sorunu çözme yoluna gider. - Gizlilik kalkanına dokunmak, onu mavi veya sarı - (ikisi de JavaScript’in devre dışı olduğunu gösterir) ve kırmızı (JavaScript'in etkin olduğunu gösterir) olarak değiştirecektir. - JavaScript etkinken ve devre dışıyken, webkay’in topladığı farklı bilgilere bakmak bilgilendiricidir.

- -

İnternette JavaScript devre dışı bırakılmış olarak gezinmek ve yalnızca gerektiğinde etkin hale getirmek, gizliliği koruma adına çok yararlı olacaktır. - Buna ek olarak, JavaScript, modern web siteleriyle birlikte gelen ekstra süprüntüler ve çok sayıda rahatsız edici reklamlar için kullanılır. - Devre dışı bırakıldığında, web siteleri daha hızlı yüklenecek, daha az ağ trafiği tüketilecek ve daha fazla pil ömrünü sağlayan daha az CPU gücü kullanımına yol açacaktır.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_javascript_light.html b/app/src/main/assets/tr/guide_javascript_light.html deleted file mode 100644 index 27ab1bf7..00000000 --- a/app/src/main/assets/tr/guide_javascript_light.html +++ /dev/null @@ -1,57 +0,0 @@ - - - - - - - - - - -

JavaScript Güçlüdür

- -

İnternetin ilk günlerinde, web sayfaları statikti, bu, ekranda görüntülenen metinleri ve görüntüleri içerdikleri, ancak kullanıcılarla etkileşime giremedikleri anlamına geliyor. - Tabii ki, statik içeriklerin birçoğu ilginç olabilir. Dinamik web sayfalarını kolaylaştırmak için çeşitli teknolojiler geliştirilmiştir. - JavaScript bu teknolojilerden biridir.

- -

JavaScript bir programlama dilidir. Çoğu web sunucusu, web sayfasının bir parçası olarak cihazlara gönderilen JavaScript ile yazılmış programları içerir. - Cihaz, yerel işlemcisinde JavaScript’i çalıştırıp web sitesindeki görüntüleri oynatabilen, bir menü açabilen ve daha birçok yararlı şey yapabilen programın komutlarını yürütür.

- - -

JavaScript Tehlikelidir

- -

Tabii ki, bir web sayfasının gelişigüzel programları çalıştırma konsepti potansiyel olarak tehlikelidir. - Bu sebeple, virüs yüklemek gibi şeyler yapmaması için JavaScript üzerinde bazı sınırlamalar vardır. Ancak, bu sınırlamaların aşırı derecede geniş olduğu ortaya çıktı. - Aşağıda, JavaScript’in bir cihaz hakkında üretebileceği bilgi türünü gösteren bir web sitesi olan webkay’in ekran görüntüsü verilmiştir. - Browser Leaks de başka iyi bir kaynaktır.

- -

- -

Gizlilik amacı sebebiyle, internette gezinmek için JavaScript’i devre dışı bırakmak ideal olacaktır. - Ancak, amaçlarını yerini getirmesi için JavaScript’e ihtiyaç duyan ve o şekilde programlanabildikleri halde JavaScript olmadan düzgün çalışmayan bazı web siteleri vardır. - Privacy Browser, JavaScript’i açıp kapatmayı kolaylaştırarak bu sorunu çözme yoluna gider. - Gizlilik kalkanına dokunmak, onu mavi veya sarı - (ikisi de JavaScript’in devre dışı olduğunu gösterir) ve kırmızı (JavaScript'in etkin olduğunu gösterir) olarak değiştirecektir. - JavaScript etkinken ve devre dışıyken, webkay’in topladığı farklı bilgilere bakmak bilgilendiricidir.

- -

İnternette JavaScript devre dışı bırakılmış olarak gezinmek ve yalnızca gerektiğinde etkin hale getirmek, gizliliği koruma adına çok yararlı olacaktır. - Buna ek olarak, JavaScript, modern web siteleriyle birlikte gelen ekstra süprüntüler ve çok sayıda rahatsız edici reklamlar için kullanılır. - Devre dışı bırakıldığında, web siteleri daha hızlı yüklenecek, daha az ağ trafiği tüketilecek ve daha fazla pil ömrünü sağlayan daha az CPU gücü kullanımına yol açacaktır.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_local_storage.html b/app/src/main/assets/tr/guide_local_storage.html new file mode 100644 index 00000000..106f70d2 --- /dev/null +++ b/app/src/main/assets/tr/guide_local_storage.html @@ -0,0 +1,93 @@ + + + + + + + + + + + + + +

Birinci Taraf Çerezler

+ +

Birinci taraf çerezler, sayfanın üst kısmında yer alan URL çubuğundaki web sitesi tarafından oluşturulur.

+ +

İnternetin ilk günlerinde, ileri zamanlı erişimler için web sitelerinin bilgisayarda bilgi depolayabilmesinin avantajlı olacağı görüşü kesinlik kazandı. + Örneğin, hava durumu bilgileri gösteren bir web sitesi, kullanıcıdan bir posta kodu isteyebilir ve daha sonra bunu bir çerezde depolar. + Kullanıcının web sitesini bir sonraki ziyaretinde, posta kodunu tekrar girmesine gerek kalmadan hava durumu bilgisi otomatik olarak yüklenir.

+ +

Web’deki diğer her olayda olduğu gibi, bazı kötü amaçlı zeki insanlar, + kullanıcıların ne olup bittiğini bilselerdi onaylamayacakları şeyleri yapmak için çerezleri kötüye kullanmanın her türlü yolunu buldular. + Örneğin, bir web sitesi, bir cihazda özgün bir seri numarasına sahip bir çerez oluşturabilir. + Daha sonra, bir kullanıcının o cihaz üzerinden web sitesini her ziyaretinde, cihaz farklı IP adreslerinden bağlansa bile, + sunucunun o seri numarası için devam ettirdiği özgün profile bağlanabilir.

+ +

Oturum açılan neredeyse tüm web sitelerine, bir kullanıcının giriş yapması için birinci taraf çerezlerin etkin olması gerekir. + Bu da web sitelerinin, site içinde sayfadan sayfaya atladığınızda, o kişinin hala siz olduğunuza emin olmasını sağlar, ki bana göre bu, çerezler için kullanılan birkaç yasal yöntemden biridir.

+ +

Birinci taraf çerezler etkinken, ancak JavaScript devre dışı bırakılmışsa, gizlilik simgesi bir uyarı olarak sarı olacaktır.

+ + +

Üçüncü Taraf Çerezler

+ +

Üçüncü taraf çerezler, sayfanın üst kısmında yer alan URL'deki farklı sunuculardan yüklenen bir web sitesinin parçaları tarafından oluşturulur. + Örneğin, kullanıcılarına reklam gösteren çoğu web sitesi, reklamlarını Google Ad Sense gibi bir üçüncü taraf reklam aracısından yükler. + Web sitesi her yüklendiğinde, reklam aracısından bir reklam göstermesi istenir. + Reklam aracısı kullanıcı hakkında sahip olabildiği her bilgiyi analiz eder, reklamları için ödemeye istekli olan reklamverenlerin güncel oranına bakar ve gösterilecek reklamı seçer. + Web sitelerinin reklamları gösteren bölümü, ana sunucu yerine üçüncü taraf aracının sunucusundan yüklenir.

+ +

İnternetteki reklamların çoğu sadece birkaç aracı tarafından işlendiğinden, aracıların, + kullanıcılarının cihazına bir izleme çerezi koyabileceklerini ve kullanıcılarının gittiği her yeri bilebileceklerini fark etmeleri uzun sürmedi. + Bir aracıdan bir reklam her yüklendiğinde, yaptığı ilk şey, cihazın bir takip çerezinin içindeki özgün bir seri numarasına sahip olup olmadığını kontrol etmek olacaktır. + Varsa, bu seri numarasının profilini arar ve yeni siteyi not eder. Bir kullanıcının ceviz gibi genellikle aramadığı bir ürün için bir web sitesinde arama yapmasının ardından, + her ziyaret ettiği web sitesinde ceviz hakkında reklamlar görmeye başlamasının sebebi budur.

+ +

Reklam aracılarına ek olarak, sosyal medya siteleri de harekete geçebileceklerini fark ettiler. + Birkaç yıl önce, Facebook ve Twitter gibi büyük sosyal medya siteleri, çok sayıda web sitesini, sayfalarına küçük sosyal medya simgelerini yerleştirmenin yararlarına olacağına ikna etti. + Bu simgeler sadece görüntü değiller, aslında sosyal medya sitesine geri bağlanan gömülü kod + içerirler ve diğer şeylerin yanı sıra, cihaza bir üçüncü taraf çerez yüklerler. Bu çerezler, kullanıcının sosyal medya platformunda bir hesabı olmasa dahi yerleştirilir. + Zaman içinde, Facebook gibi şirketler (aynı zamanda bir reklam ağı da yürüten), + sitelerinde hiç hesap oluşturmayan + insanlar hakkında oldukça fazla sayıda ayrıntılı profil oluşturdular.

+ +

Üçüncü taraf çerezlerini etkinleştirmek için hiçbir sebep yoktur. Android KitKat versiyonuna ya da daha eski versiyonlara (versiyon <=4.4.4 veya API <=20) sahip cihazlarda, WebView + + birinci ve üçüncü taraf çerezler arasında ayrım yapmaz. Böylece birinci taraf çerezlerini etkinleştirmek üçüncü taraf çerezlerini de etkinleştirir.

+ + +

DOM Depolama

+ +

Document Object Model (Belge Nesne Modeli) depolaması, web depolaması olarak bilinir, büyük kurabiyeler gibidir. + Tek bir URL'deki tüm çerezler için maksimum birleşik depolama boyutu 4 kilobayt iken, + DOM depolama bu boyutu her site için megabaytlara çıkarabilir. + DOM depolama, veri okumak ve yazmak için JavaScript kullandığından dolayı, JavaScript etkinleştirilmeden o da etkin olamaz.

+ + +

Form Verisi

+ +

Form verileri, kullanıcı adları, adresler, telefon numaraları vb. gibi web formlarına yazılan bilgileri içerir ve gelecekteki ziyaretler için onları açılır bir kutuya listeler. + Diğer yerel depolama biçimlerinin aksine, form verisi, belirli bir kullanıcı etkileşimi olmadan web sunucusuna gönderilmez. + Android Oreo (8.0) versiyonundan başlayarak, + WebView’in form verisi Otomatik Doldurma servisi ile değiştirildi. + Bu nedenle, form verisi kontrolleri artık daha yeni Android versiyona sahip cihazlarda görünmeyecek.

+ + \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_local_storage_dark.html b/app/src/main/assets/tr/guide_local_storage_dark.html deleted file mode 100644 index 39539740..00000000 --- a/app/src/main/assets/tr/guide_local_storage_dark.html +++ /dev/null @@ -1,90 +0,0 @@ - - - - - - - - - - -

Birinci Taraf Çerezler

- -

Birinci taraf çerezler, sayfanın üst kısmında yer alan URL çubuğundaki web sitesi tarafından oluşturulur.

- -

İnternetin ilk günlerinde, ileri zamanlı erişimler için web sitelerinin bilgisayarda bilgi depolayabilmesinin avantajlı olacağı görüşü kesinlik kazandı. - Örneğin, hava durumu bilgileri gösteren bir web sitesi, kullanıcıdan bir posta kodu isteyebilir ve daha sonra bunu bir çerezde depolar. - Kullanıcının web sitesini bir sonraki ziyaretinde, posta kodunu tekrar girmesine gerek kalmadan hava durumu bilgisi otomatik olarak yüklenir.

- -

Web’deki diğer her olayda olduğu gibi, bazı kötü amaçlı zeki insanlar, - kullanıcıların ne olup bittiğini bilselerdi onaylamayacakları şeyleri yapmak için çerezleri kötüye kullanmanın her türlü yolunu buldular. - Örneğin, bir web sitesi, bir cihazda özgün bir seri numarasına sahip bir çerez oluşturabilir. - Daha sonra, bir kullanıcının o cihaz üzerinden web sitesini her ziyaretinde, cihaz farklı IP adreslerinden bağlansa bile, - sunucunun o seri numarası için devam ettirdiği özgün profile bağlanabilir.

- -

Oturum açılan neredeyse tüm web sitelerine, bir kullanıcının giriş yapması için birinci taraf çerezlerin etkin olması gerekir. - Bu da web sitelerinin, site içinde sayfadan sayfaya atladığınızda, o kişinin hala siz olduğunuza emin olmasını sağlar, ki bana göre bu, çerezler için kullanılan birkaç yasal yöntemden biridir.

- -

Birinci taraf çerezler etkinken, ancak JavaScript devre dışı bırakılmışsa, gizlilik simgesi bir uyarı olarak sarı olacaktır.

- - -

Üçüncü Taraf Çerezler

- -

Üçüncü taraf çerezler, sayfanın üst kısmında yer alan URL'deki farklı sunuculardan yüklenen bir web sitesinin parçaları tarafından oluşturulur. - Örneğin, kullanıcılarına reklam gösteren çoğu web sitesi, reklamlarını Google Ad Sense gibi bir üçüncü taraf reklam aracısından yükler. - Web sitesi her yüklendiğinde, reklam aracısından bir reklam göstermesi istenir. - Reklam aracısı kullanıcı hakkında sahip olabildiği her bilgiyi analiz eder, reklamları için ödemeye istekli olan reklamverenlerin güncel oranına bakar ve gösterilecek reklamı seçer. - Web sitelerinin reklamları gösteren bölümü, ana sunucu yerine üçüncü taraf aracının sunucusundan yüklenir.

- -

İnternetteki reklamların çoğu sadece birkaç aracı tarafından işlendiğinden, aracıların, - kullanıcılarının cihazına bir izleme çerezi koyabileceklerini ve kullanıcılarının gittiği her yeri bilebileceklerini fark etmeleri uzun sürmedi. - Bir aracıdan bir reklam her yüklendiğinde, yaptığı ilk şey, cihazın bir takip çerezinin içindeki özgün bir seri numarasına sahip olup olmadığını kontrol etmek olacaktır. - Varsa, bu seri numarasının profilini arar ve yeni siteyi not eder. Bir kullanıcının ceviz gibi genellikle aramadığı bir ürün için bir web sitesinde arama yapmasının ardından, - her ziyaret ettiği web sitesinde ceviz hakkında reklamlar görmeye başlamasının sebebi budur.

- -

Reklam aracılarına ek olarak, sosyal medya siteleri de harekete geçebileceklerini fark ettiler. - Birkaç yıl önce, Facebook ve Twitter gibi büyük sosyal medya siteleri, çok sayıda web sitesini, sayfalarına küçük sosyal medya simgelerini yerleştirmenin yararlarına olacağına ikna etti. - Bu simgeler sadece görüntü değiller, aslında sosyal medya sitesine geri bağlanan gömülü kod - içerirler ve diğer şeylerin yanı sıra, cihaza bir üçüncü taraf çerez yüklerler. Bu çerezler, kullanıcının sosyal medya platformunda bir hesabı olmasa dahi yerleştirilir. - Zaman içinde, Facebook gibi şirketler (aynı zamanda bir reklam ağı da yürüten), - sitelerinde hiç hesap oluşturmayan - insanlar hakkında oldukça fazla sayıda ayrıntılı profil oluşturdular.

- -

Üçüncü taraf çerezlerini etkinleştirmek için hiçbir sebep yoktur. Android KitKat versiyonuna ya da daha eski versiyonlara (versiyon <=4.4.4 veya API <=20) sahip cihazlarda, WebView - - birinci ve üçüncü taraf çerezler arasında ayrım yapmaz. Böylece birinci taraf çerezlerini etkinleştirmek üçüncü taraf çerezlerini de etkinleştirir.

- - -

DOM Depolama

- -

Document Object Model (Belge Nesne Modeli) depolaması, web depolaması olarak bilinir, büyük kurabiyeler gibidir. - Tek bir URL'deki tüm çerezler için maksimum birleşik depolama boyutu 4 kilobayt iken, - DOM depolama bu boyutu her site için megabaytlara çıkarabilir. - DOM depolama, veri okumak ve yazmak için JavaScript kullandığından dolayı, JavaScript etkinleştirilmeden o da etkin olamaz.

- - -

Form Verisi

- -

Form verileri, kullanıcı adları, adresler, telefon numaraları vb. gibi web formlarına yazılan bilgileri içerir ve gelecekteki ziyaretler için onları açılır bir kutuya listeler. - Diğer yerel depolama biçimlerinin aksine, form verisi, belirli bir kullanıcı etkileşimi olmadan web sunucusuna gönderilmez. - Android Oreo (8.0) versiyonundan başlayarak, - WebView’in form verisi Otomatik Doldurma servisi ile değiştirildi. - Bu nedenle, form verisi kontrolleri artık daha yeni Android versiyona sahip cihazlarda görünmeyecek.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_local_storage_light.html b/app/src/main/assets/tr/guide_local_storage_light.html deleted file mode 100644 index 2cd2ecba..00000000 --- a/app/src/main/assets/tr/guide_local_storage_light.html +++ /dev/null @@ -1,90 +0,0 @@ - - - - - - - - - - -

Birinci Taraf Çerezler

- -

Birinci taraf çerezler, sayfanın üst kısmında yer alan URL çubuğundaki web sitesi tarafından oluşturulur.

- -

İnternetin ilk günlerinde, ileri zamanlı erişimler için web sitelerinin bilgisayarda bilgi depolayabilmesinin avantajlı olacağı görüşü kesinlik kazandı. - Örneğin, hava durumu bilgileri gösteren bir web sitesi, kullanıcıdan bir posta kodu isteyebilir ve daha sonra bunu bir çerezde depolar. - Kullanıcının web sitesini bir sonraki ziyaretinde, posta kodunu tekrar girmesine gerek kalmadan hava durumu bilgisi otomatik olarak yüklenir.

- -

Web’deki diğer her olayda olduğu gibi, bazı kötü amaçlı zeki insanlar, - kullanıcıların ne olup bittiğini bilselerdi onaylamayacakları şeyleri yapmak için çerezleri kötüye kullanmanın her türlü yolunu buldular. - Örneğin, bir web sitesi, bir cihazda özgün bir seri numarasına sahip bir çerez oluşturabilir. - Daha sonra, bir kullanıcının o cihaz üzerinden web sitesini her ziyaretinde, cihaz farklı IP adreslerinden bağlansa bile, - sunucunun o seri numarası için devam ettirdiği özgün profile bağlanabilir.

- -

Oturum açılan neredeyse tüm web sitelerine, bir kullanıcının giriş yapması için birinci taraf çerezlerin etkin olması gerekir. - Bu da web sitelerinin, site içinde sayfadan sayfaya atladığınızda, o kişinin hala siz olduğunuza emin olmasını sağlar, ki bana göre bu, çerezler için kullanılan birkaç yasal yöntemden biridir.

- -

Birinci taraf çerezler etkinken, ancak JavaScript devre dışı bırakılmışsa, gizlilik simgesi bir uyarı olarak sarı olacaktır.

- - -

Üçüncü Taraf Çerezler

- -

Üçüncü taraf çerezler, sayfanın üst kısmında yer alan URL'deki farklı sunuculardan yüklenen bir web sitesinin parçaları tarafından oluşturulur. - Örneğin, kullanıcılarına reklam gösteren çoğu web sitesi, reklamlarını Google Ad Sense gibi bir üçüncü taraf reklam aracısından yükler. - Web sitesi her yüklendiğinde, reklam aracısından bir reklam göstermesi istenir. - Reklam aracısı kullanıcı hakkında sahip olabildiği her bilgiyi analiz eder, reklamları için ödemeye istekli olan reklamverenlerin güncel oranına bakar ve gösterilecek reklamı seçer. - Web sitelerinin reklamları gösteren bölümü, ana sunucu yerine üçüncü taraf aracının sunucusundan yüklenir.

- -

İnternetteki reklamların çoğu sadece birkaç aracı tarafından işlendiğinden, aracıların, - kullanıcılarının cihazına bir izleme çerezi koyabileceklerini ve kullanıcılarının gittiği her yeri bilebileceklerini fark etmeleri uzun sürmedi. - Bir aracıdan bir reklam her yüklendiğinde, yaptığı ilk şey, cihazın bir takip çerezinin içindeki özgün bir seri numarasına sahip olup olmadığını kontrol etmek olacaktır. - Varsa, bu seri numarasının profilini arar ve yeni siteyi not eder. Bir kullanıcının ceviz gibi genellikle aramadığı bir ürün için bir web sitesinde arama yapmasının ardından, - her ziyaret ettiği web sitesinde ceviz hakkında reklamlar görmeye başlamasının sebebi budur.

- -

Reklam aracılarına ek olarak, sosyal medya siteleri de harekete geçebileceklerini fark ettiler. - Birkaç yıl önce, Facebook ve Twitter gibi büyük sosyal medya siteleri, çok sayıda web sitesini, sayfalarına küçük sosyal medya simgelerini yerleştirmenin yararlarına olacağına ikna etti. - Bu simgeler sadece görüntü değiller, aslında sosyal medya sitesine geri bağlanan gömülü kod - içerirler ve diğer şeylerin yanı sıra, cihaza bir üçüncü taraf çerez yüklerler. Bu çerezler, kullanıcının sosyal medya platformunda bir hesabı olmasa dahi yerleştirilir. - Zaman içinde, Facebook gibi şirketler (aynı zamanda bir reklam ağı da yürüten), - sitelerinde hiç hesap oluşturmayan - insanlar hakkında oldukça fazla sayıda ayrıntılı profil oluşturdular.

- -

Üçüncü taraf çerezlerini etkinleştirmek için hiçbir sebep yoktur. Android KitKat versiyonuna ya da daha eski versiyonlara (versiyon <=4.4.4 veya API <=20) sahip cihazlarda, WebView - - birinci ve üçüncü taraf çerezler arasında ayrım yapmaz. Böylece birinci taraf çerezlerini etkinleştirmek üçüncü taraf çerezlerini de etkinleştirir.

- - -

DOM Depolama

- -

Document Object Model (Belge Nesne Modeli) depolaması, web depolaması olarak bilinir, büyük kurabiyeler gibidir. - Tek bir URL'deki tüm çerezler için maksimum birleşik depolama boyutu 4 kilobayt iken, - DOM depolama bu boyutu her site için megabaytlara çıkarabilir. - DOM depolama, veri okumak ve yazmak için JavaScript kullandığından dolayı, JavaScript etkinleştirilmeden o da etkin olamaz.

- - -

Form Verisi

- -

Form verileri, kullanıcı adları, adresler, telefon numaraları vb. gibi web formlarına yazılan bilgileri içerir ve gelecekteki ziyaretler için onları açılır bir kutuya listeler. - Diğer yerel depolama biçimlerinin aksine, form verisi, belirli bir kullanıcı etkileşimi olmadan web sunucusuna gönderilmez. - Android Oreo (8.0) versiyonundan başlayarak, - WebView’in form verisi Otomatik Doldurma servisi ile değiştirildi. - Bu nedenle, form verisi kontrolleri artık daha yeni Android versiyona sahip cihazlarda görünmeyecek.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_overview.html b/app/src/main/assets/tr/guide_overview.html new file mode 100644 index 00000000..59b46746 --- /dev/null +++ b/app/src/main/assets/tr/guide_overview.html @@ -0,0 +1,51 @@ + + + + + + + + + + + + + +

Gerçek Gizlilik

+ +

Privacy Browser, internette gezinirken, gizliliğinizi olabildiğince çok kontrol altına alabilmenizi sağlamak için tasarlanmıştır. + Bir tarayıcı bir web sitesine bağlandığında, bağlantıyı kolaylaştırmak için sunucuya aktarılan bazı bilgiler gereklidir. + Örneğin, sunucu, yanıtı nereye göndereceğini bilmesi için IP adresinize ve bir port numarasına ihtiyaç duyar. + Bu bilgiler sunucu tarafından sık sık kaydedilir, bu da web sitenin geliştiricisinin, + bir web sayfasının kaç kez yüklendiğini ve kaç farklı IP adresinin eriştiğini gösteren raporlar üretmesini sağlar.

+ +

Ancak, çoğu web sitesi operatörü, birçok web sitesinde gezinmelerini izlemek de dahil ziyaretçilerinden daha fazla bilgi ister. + Bu izlemeyi kolaylaştırmak için bir kullanıcının cihazından ekstra bilgi talep etme ve cihazına ekstra bilgi yerleştirme amacı güden birçok farklı teknik vardır. + Neredeyse tüm tarayıcılar, eylemlerini kullanıcıyı bilgilendirmeden, gönüllü olarak bu izlemeye katılır. + Privacy Browser, kullanıcıya mümkün olduğunca fazla bilgi vermek ve kullanıcının bu izleme teknikleri üzerinde kontrol sağlaması için tasarlanmıştır.

+ + +

Android WebView Kısıtlamaları

+ +

Privacy Browser, web sitelerini oluşturmak için Android’in yerleşik WebView (Web Görünümü) sürümünü kullanır. + Gizlilik ayarlarını yönetmek için WebView’ın oluşturduğu kontrollerde bazı kısıtlamalar vardır. + Örneğin, birtakım teknolojileri devre dışı bırakırken, bazı JavaScript komutlarını etkinleştirmek mümkün değildir. + Gelecek versiyonlarında, Privacy Browser, Privacy WebView adlı özel bir WebView sürümüne geçiş yapacaktır.

+ + \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_overview_dark.html b/app/src/main/assets/tr/guide_overview_dark.html deleted file mode 100644 index 776736ef..00000000 --- a/app/src/main/assets/tr/guide_overview_dark.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - - - - - - - -

Gerçek Gizlilik

- -

Privacy Browser, internette gezinirken, gizliliğinizi olabildiğince çok kontrol altına alabilmenizi sağlamak için tasarlanmıştır. - Bir tarayıcı bir web sitesine bağlandığında, bağlantıyı kolaylaştırmak için sunucuya aktarılan bazı bilgiler gereklidir. - Örneğin, sunucu, yanıtı nereye göndereceğini bilmesi için IP adresinize ve bir port numarasına ihtiyaç duyar. - Bu bilgiler sunucu tarafından sık sık kaydedilir, bu da web sitenin geliştiricisinin, - bir web sayfasının kaç kez yüklendiğini ve kaç farklı IP adresinin eriştiğini gösteren raporlar üretmesini sağlar.

- -

Ancak, çoğu web sitesi operatörü, birçok web sitesinde gezinmelerini izlemek de dahil ziyaretçilerinden daha fazla bilgi ister. - Bu izlemeyi kolaylaştırmak için bir kullanıcının cihazından ekstra bilgi talep etme ve cihazına ekstra bilgi yerleştirme amacı güden birçok farklı teknik vardır. - Neredeyse tüm tarayıcılar, eylemlerini kullanıcıyı bilgilendirmeden, gönüllü olarak bu izlemeye katılır. - Privacy Browser, kullanıcıya mümkün olduğunca fazla bilgi vermek ve kullanıcının bu izleme teknikleri üzerinde kontrol sağlaması için tasarlanmıştır.

- - -

Android WebView Kısıtlamaları

- -

Privacy Browser, web sitelerini oluşturmak için Android’in yerleşik WebView (Web Görünümü) sürümünü kullanır. - Gizlilik ayarlarını yönetmek için WebView’ın oluşturduğu kontrollerde bazı kısıtlamalar vardır. - Örneğin, birtakım teknolojileri devre dışı bırakırken, bazı JavaScript komutlarını etkinleştirmek mümkün değildir. - Gelecek versiyonlarında, Privacy Browser, Privacy WebView adlı özel bir WebView sürümüne geçiş yapacaktır.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_overview_light.html b/app/src/main/assets/tr/guide_overview_light.html deleted file mode 100644 index 088bc3a5..00000000 --- a/app/src/main/assets/tr/guide_overview_light.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - - - - - - - -

Gerçek Gizlilik

- -

Privacy Browser, internette gezinirken, gizliliğinizi olabildiğince çok kontrol altına alabilmenizi sağlamak için tasarlanmıştır. - Bir tarayıcı bir web sitesine bağlandığında, bağlantıyı kolaylaştırmak için sunucuya aktarılan bazı bilgiler gereklidir. - Örneğin, sunucu, yanıtı nereye göndereceğini bilmesi için IP adresinize ve bir port numarasına ihtiyaç duyar. - Bu bilgiler sunucu tarafından sık sık kaydedilir, bu da web sitenin geliştiricisinin, - bir web sayfasının kaç kez yüklendiğini ve kaç farklı IP adresinin eriştiğini gösteren raporlar üretmesini sağlar.

- -

Ancak, çoğu web sitesi operatörü, birçok web sitesinde gezinmelerini izlemek de dahil ziyaretçilerinden daha fazla bilgi ister. - Bu izlemeyi kolaylaştırmak için bir kullanıcının cihazından ekstra bilgi talep etme ve cihazına ekstra bilgi yerleştirme amacı güden birçok farklı teknik vardır. - Neredeyse tüm tarayıcılar, eylemlerini kullanıcıyı bilgilendirmeden, gönüllü olarak bu izlemeye katılır. - Privacy Browser, kullanıcıya mümkün olduğunca fazla bilgi vermek ve kullanıcının bu izleme teknikleri üzerinde kontrol sağlaması için tasarlanmıştır.

- - -

Android WebView Kısıtlamaları

- -

Privacy Browser, web sitelerini oluşturmak için Android’in yerleşik WebView (Web Görünümü) sürümünü kullanır. - Gizlilik ayarlarını yönetmek için WebView’ın oluşturduğu kontrollerde bazı kısıtlamalar vardır. - Örneğin, birtakım teknolojileri devre dışı bırakırken, bazı JavaScript komutlarını etkinleştirmek mümkün değildir. - Gelecek versiyonlarında, Privacy Browser, Privacy WebView adlı özel bir WebView sürümüne geçiş yapacaktır.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_proxies.html b/app/src/main/assets/tr/guide_proxies.html new file mode 100644 index 00000000..9a2e0d0c --- /dev/null +++ b/app/src/main/assets/tr/guide_proxies.html @@ -0,0 +1,80 @@ + + + + + + + + + + + + + +

Proxies and Their Limits

+ +

İnternet gizliliğini ihlal etmek isteyen iki genel kötü oyuncu kategorisi vardır: + İSS’lere (İnternet Servis Sağlayıcıları) erişimi olan kötü niyetli hükümetler ve sosyal ve reklam ağlarını yöneten mega şirketler. + Proxies like TOR (The Onion Router) and I2P (the Invisible Internet Project) are useful in protecting privacy from malicious governments (which spy on traffic in transit) + but not from mega corporations (which embed malicious code on web servers).

+ + +

Kötü Niyetli Hükümetler

+ +

Kötü niyetli hükümetler, sık sık muhalifleri ve aktivistleri cezalandırmak için kendi vatandaşlarını gözetler. + Bunu genellikle yerel İSS’leri kullanarak ve onları, tüm kullanıcıların internet ziyaretlerinde kullandıkları IP adresleri gösteren bilgileri ifşa etmeye zorlayarak yaparlar. + Layered proxies are designed to defeat this infringement of privacy by encrypting the traffic from a user’s device and routing it through multiple servers on the internet + before sending it on to the final destination. + This means that no individual ISP, server, or website, can know both the IP address of the user’s device and the IP address of the final web server. + Malicious governments and the ISPs they control cannot tell which web servers a user is accessing, although they can tell that the user is using a layered proxy service. + In some parts of the world, using proxies could be construed as an evidence of illegal behavior (“If you didn’t have anything to hide you wouldn’t be encrypting your traffic”) + and users could be punished because governments assume they are doing something that is prohibited. Thus, proxies can be helpful, but they aren’t a panacea.

+ + +

Mega Şirketler

+ +

Bir kullanıcı bir web sunucusuna bağlandığında, web sunucusu kullanıcının IP adresini görebilir. + Mükemmel bir teknik olmasa da, IP adresleri makul bir doğrulukla fiziksel adreslere dönüştürülebilir. + Küçük web sunucuları, kendilerini ziyaret eden kullanıcılarının konumlarını belirlemek için IP adreslerine genel anlamda güvenirler. + Proxies are a good solution to mask the user’s location from these servers. + Ancak, sosyal medya ve reklam ağlarına sahip büyük mega kuruluşlar, cihazlar ve IP adresler üzerinden kullanıcıları izlemek için tüm bilgileri kullanır. + Bu profiller, JavaScript, çerezler, izleme kimlikleri ve browser fingerprinting (tarayıcı tanılama) + dahil olmak üzere kullanıcıları tanımlamak için çeşitli teknikleri kullanır. + İnternetteki web sitelerinin büyük çoğunluğu ya ana ağlardan birinden bir reklam yüklediğinden ya da JavaScript ile ilişkilendirilen sosyal medya simgelerini yerleştirdiklerinden dolayı, + mega şirketler, hemen hemen her çevrimiçi kullanıcı için profil oluşturup internet aktivitelerini ilgisi olmayan sitelerden bile takip edebilirler.

+ +

Ziyaret edilen her siteyi, satın alınan her şeyi, satın almak için kullanılan her kredi kartını, eşyaların kargolandığı her adresi ve internete yüklenen her fotoğrafın GPS metaverilerini izlerler. + Bu sayede, bir kullanıcının yaşı, cinsiyeti, medeni hali, adresi, politik görüşü, dini görüşü, aile çevresi, evcil hayvan sayısı ve elde edebildikleri her şey hakkında bir profil oluştururlar. + Hatta yerel mağazalardan kredi kart işlem veri tabanlarını satın alırlar, böylece oluşturdukları profillerdeki kullanıcıların çevrimdışı satın alma modellerini de takip edebilirler. + Because they already have much more accurate address information about a user than an IP address discloses, proxies provides no real privacy protection against mega corporations.

+ +

Mega şirketlere karşı en iyi gizlilik koruması, reklamları engellemek, JavaScript’i, DOM depolamayı ve çerezleri devre dışı bırakıp web gezintisi yapmak + ve fingerprint yapılması zor olan bir tarayıcı kullanmak olacaktır.

+ + +

Using Proxies

+ +

Despite their limitations, proxies can be useful in some circumstances. + Tor and I2P + have Android apps that make it easy to use their proxy networks. When proxying is turned on in Privacy Browser, the app bar will have a light blue background instead of the default light grey. + Because traffic is being routed through several proxy nodes, using a layered proxy is often much slower than connecting directly to the internet.

+ + + + \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_proxies_dark.html b/app/src/main/assets/tr/guide_proxies_dark.html deleted file mode 100644 index 0eaf5fb6..00000000 --- a/app/src/main/assets/tr/guide_proxies_dark.html +++ /dev/null @@ -1,77 +0,0 @@ - - - - - - - - - - -

Proxies and Their Limits

- -

İnternet gizliliğini ihlal etmek isteyen iki genel kötü oyuncu kategorisi vardır: - İSS’lere (İnternet Servis Sağlayıcıları) erişimi olan kötü niyetli hükümetler ve sosyal ve reklam ağlarını yöneten mega şirketler. - Proxies like TOR (The Onion Router) and I2P (the Invisible Internet Project) are useful in protecting privacy from malicious governments (which spy on traffic in transit) - but not from mega corporations (which embed malicious code on web servers).

- - -

Kötü Niyetli Hükümetler

- -

Kötü niyetli hükümetler, sık sık muhalifleri ve aktivistleri cezalandırmak için kendi vatandaşlarını gözetler. - Bunu genellikle yerel İSS’leri kullanarak ve onları, tüm kullanıcıların internet ziyaretlerinde kullandıkları IP adresleri gösteren bilgileri ifşa etmeye zorlayarak yaparlar. - Layered proxies are designed to defeat this infringement of privacy by encrypting the traffic from a user’s device and routing it through multiple servers on the internet - before sending it on to the final destination. - This means that no individual ISP, server, or website, can know both the IP address of the user’s device and the IP address of the final web server. - Malicious governments and the ISPs they control cannot tell which web servers a user is accessing, although they can tell that the user is using a layered proxy service. - In some parts of the world, using proxies could be construed as an evidence of illegal behavior (“If you didn’t have anything to hide you wouldn’t be encrypting your traffic”) - and users could be punished because governments assume they are doing something that is prohibited. Thus, proxies can be helpful, but they aren’t a panacea.

- - -

Mega Şirketler

- -

Bir kullanıcı bir web sunucusuna bağlandığında, web sunucusu kullanıcının IP adresini görebilir. - Mükemmel bir teknik olmasa da, IP adresleri makul bir doğrulukla fiziksel adreslere dönüştürülebilir. - Küçük web sunucuları, kendilerini ziyaret eden kullanıcılarının konumlarını belirlemek için IP adreslerine genel anlamda güvenirler. - Proxies are a good solution to mask the user’s location from these servers. - Ancak, sosyal medya ve reklam ağlarına sahip büyük mega kuruluşlar, cihazlar ve IP adresler üzerinden kullanıcıları izlemek için tüm bilgileri kullanır. - Bu profiller, JavaScript, çerezler, izleme kimlikleri ve browser fingerprinting (tarayıcı tanılama) - dahil olmak üzere kullanıcıları tanımlamak için çeşitli teknikleri kullanır. - İnternetteki web sitelerinin büyük çoğunluğu ya ana ağlardan birinden bir reklam yüklediğinden ya da JavaScript ile ilişkilendirilen sosyal medya simgelerini yerleştirdiklerinden dolayı, - mega şirketler, hemen hemen her çevrimiçi kullanıcı için profil oluşturup internet aktivitelerini ilgisi olmayan sitelerden bile takip edebilirler.

- -

Ziyaret edilen her siteyi, satın alınan her şeyi, satın almak için kullanılan her kredi kartını, eşyaların kargolandığı her adresi ve internete yüklenen her fotoğrafın GPS metaverilerini izlerler. - Bu sayede, bir kullanıcının yaşı, cinsiyeti, medeni hali, adresi, politik görüşü, dini görüşü, aile çevresi, evcil hayvan sayısı ve elde edebildikleri her şey hakkında bir profil oluştururlar. - Hatta yerel mağazalardan kredi kart işlem veri tabanlarını satın alırlar, böylece oluşturdukları profillerdeki kullanıcıların çevrimdışı satın alma modellerini de takip edebilirler. - Because they already have much more accurate address information about a user than an IP address discloses, proxies provides no real privacy protection against mega corporations.

- -

Mega şirketlere karşı en iyi gizlilik koruması, reklamları engellemek, JavaScript’i, DOM depolamayı ve çerezleri devre dışı bırakıp web gezintisi yapmak - ve fingerprint yapılması zor olan bir tarayıcı kullanmak olacaktır.

- - -

Using Proxies

- -

Despite their limitations, proxies can be useful in some circumstances. - Tor and I2P - have Android apps that make it easy to use their proxy networks. When proxying is turned on in Privacy Browser, the app bar will have a light blue background instead of the default light grey. - Because traffic is being routed through several proxy nodes, using a layered proxy is often much slower than connecting directly to the internet.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_proxies_light.html b/app/src/main/assets/tr/guide_proxies_light.html deleted file mode 100644 index fb9bac1b..00000000 --- a/app/src/main/assets/tr/guide_proxies_light.html +++ /dev/null @@ -1,77 +0,0 @@ - - - - - - - - - - -

Proxies and Their Limits

- -

İnternet gizliliğini ihlal etmek isteyen iki genel kötü oyuncu kategorisi vardır: - İSS’lere (İnternet Servis Sağlayıcıları) erişimi olan kötü niyetli hükümetler ve sosyal ve reklam ağlarını yöneten mega şirketler. - Proxies like TOR (The Onion Router) and I2P (the Invisible Internet Project) are useful in protecting privacy from malicious governments (which spy on traffic in transit) - but not from mega corporations (which embed malicious code on web servers).

- - -

Kötü Niyetli Hükümetler

- -

Kötü niyetli hükümetler, sık sık muhalifleri ve aktivistleri cezalandırmak için kendi vatandaşlarını gözetler. - Bunu genellikle yerel İSS’leri kullanarak ve onları, tüm kullanıcıların internet ziyaretlerinde kullandıkları IP adresleri gösteren bilgileri ifşa etmeye zorlayarak yaparlar. - Layered proxies are designed to defeat this infringement of privacy by encrypting the traffic from a user’s device and routing it through multiple servers on the internet - before sending it on to the final destination. - This means that no individual ISP, server, or website, can know both the IP address of the user’s device and the IP address of the final web server. - Malicious governments and the ISPs they control cannot tell which web servers a user is accessing, although they can tell that the user is using a layered proxy service. - In some parts of the world, using proxies could be construed as an evidence of illegal behavior (“If you didn’t have anything to hide you wouldn’t be encrypting your traffic”) - and users could be punished because governments assume they are doing something that is prohibited. Thus, proxies can be helpful, but they aren’t a panacea.

- - -

Mega Şirketler

- -

Bir kullanıcı bir web sunucusuna bağlandığında, web sunucusu kullanıcının IP adresini görebilir. - Mükemmel bir teknik olmasa da, IP adresleri makul bir doğrulukla fiziksel adreslere dönüştürülebilir. - Küçük web sunucuları, kendilerini ziyaret eden kullanıcılarının konumlarını belirlemek için IP adreslerine genel anlamda güvenirler. - Proxies are a good solution to mask the user’s location from these servers. - Ancak, sosyal medya ve reklam ağlarına sahip büyük mega kuruluşlar, cihazlar ve IP adresler üzerinden kullanıcıları izlemek için tüm bilgileri kullanır. - Bu profiller, JavaScript, çerezler, izleme kimlikleri ve browser fingerprinting (tarayıcı tanılama) - dahil olmak üzere kullanıcıları tanımlamak için çeşitli teknikleri kullanır. - İnternetteki web sitelerinin büyük çoğunluğu ya ana ağlardan birinden bir reklam yüklediğinden ya da JavaScript ile ilişkilendirilen sosyal medya simgelerini yerleştirdiklerinden dolayı, - mega şirketler, hemen hemen her çevrimiçi kullanıcı için profil oluşturup internet aktivitelerini ilgisi olmayan sitelerden bile takip edebilirler.

- -

Ziyaret edilen her siteyi, satın alınan her şeyi, satın almak için kullanılan her kredi kartını, eşyaların kargolandığı her adresi ve internete yüklenen her fotoğrafın GPS metaverilerini izlerler. - Bu sayede, bir kullanıcının yaşı, cinsiyeti, medeni hali, adresi, politik görüşü, dini görüşü, aile çevresi, evcil hayvan sayısı ve elde edebildikleri her şey hakkında bir profil oluştururlar. - Hatta yerel mağazalardan kredi kart işlem veri tabanlarını satın alırlar, böylece oluşturdukları profillerdeki kullanıcıların çevrimdışı satın alma modellerini de takip edebilirler. - Because they already have much more accurate address information about a user than an IP address discloses, proxies provides no real privacy protection against mega corporations.

- -

Mega şirketlere karşı en iyi gizlilik koruması, reklamları engellemek, JavaScript’i, DOM depolamayı ve çerezleri devre dışı bırakıp web gezintisi yapmak - ve fingerprint yapılması zor olan bir tarayıcı kullanmak olacaktır.

- - -

Using Proxies

- -

Despite their limitations, proxies can be useful in some circumstances. - Tor and I2P - have Android apps that make it easy to use their proxy networks. When proxying is turned on in Privacy Browser, the app bar will have a light blue background instead of the default light grey. - Because traffic is being routed through several proxy nodes, using a layered proxy is often much slower than connecting directly to the internet.

- - - - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_requests.html b/app/src/main/assets/tr/guide_requests.html new file mode 100644 index 00000000..d93dfa6f --- /dev/null +++ b/app/src/main/assets/tr/guide_requests.html @@ -0,0 +1,85 @@ + + + + + + + + + + + + + +

Kaynak Ä°stekleri

+ +

Bir URL yüklendiğinde, genellikle CCS, JavaScript, resim ve diğer dosyalar için birkaç kaynak isteği yapar. Bu isteklerle ilgili detaylar İstekler etkinliğinden ulaşılabilir. + Gezinti çekmecesi, İstekler etkinliğine götüren bir bağlantı içerir ve ayrıca bu etkinlik kaç tane isteğin engellediğini gösterir. + Bir isteğe dokunulduğunda, neden izin verildiğine ya da engellendiğine dair detaylar görüntülenir.

+ + + +

Privacy Browser, Adblock sözdizimini (Adblock syntax) temel alan 4 yaygın engel listesini içerir: + EasyList, EasyPrivacy, Fanboy’s Annoyance List ve Fanboy’s Social Blocking List. + Bu engel listeleri, Privacy Browser tarafından, aşağıda listelenmiş olan kaynak isteklerini kontrol eden 22 alt listeye göre işlenmiştir.

+ +
    +
  1. Ana Beyaz Listesi
  2. +
  3. Final Beyaz Listesi
  4. +
  5. Domain Beyaz Listesi
  6. +
  7. Domain Başlangıç Beyaz Listesi
  8. +
  9. Domain Final Beyaz Listesi
  10. +
  11. Üçüncü Taraf Beyaz Listesi
  12. +
  13. Üçüncü Taraf Domain Beyaz Listesi
  14. +
  15. Üçüncü Taraf Domain Başlangıç Beyaz Listesi
  16. +
  17. Ana Kara Listesi
  18. +
  19. Başlangıç Kara Listesi
  20. +
  21. Final Kara Listesi
  22. +
  23. Domain Kara Listesi
  24. +
  25. Domain Başlangıç Kara Listesi
  26. +
  27. Domain Final Kara Listesi
  28. +
  29. Domain Düzenli İfade (Regular Expression) Kara Listesi
  30. +
  31. Üçüncü Taraf Kara Listesi
  32. +
  33. Üçüncü Taraf Başlangıç Kara Listesi
  34. +
  35. Üçüncü Taraf Domain Kara Listesi
  36. +
  37. Üçüncü Taraf Domain Başlangıç Kara Listesi
  38. +
  39. Üçüncü Taraf Düzenli İfade (Regular Expression) Kara Listesi
  40. +
  41. Üçüncü Taraf Domain Düzenli İfade (Regular Expression) Kara Listesi
  42. +
  43. Düzenli İfade (Regular Expression) Kara Listesi
  44. +
+ +

Başlangıç listeleri, URL'nin başlangıcına göre kontrol eder. Final listeleri, URL'nin sonuna göre kontrol eder. Domain listeleri, yalnızca belli domainlere göre kontrol eder. + Üçüncü taraf listeleri, yalnızca isteğin kök domaini ana URL'nin kök domaininden farklıysa uygulanır. + Düzenli ifade listeleri, düzenli ifade sözdizimini (regular expression syntax) takip eder. + Her alt liste öğesinin bir veya daha fazla girdisi vardır. + Domain alt listeleri işe karıştığında, ilk girdi ana URL'nin domaini ile eşleşirse, kaynak isteği yalnızca öğeye göre kontrol edilir.

+ +

Anroid’in WebView kısıtlamaları yüzünden ve isteklerin işlenmesini hızlandırmak için Privacy Browser, Adblock sözdiziminin basitleştirilmiş bir yorumunu uygular. + Bu durum, bazen, kaynakların orijinal girdi tarafından amaçlanmayan şekillerde izin verildiği veya engellendiği yanlış pozitif (false positive) durumuna yol açabilir. + Engel listesi girdilerinin nasıl işlendiğine dair daha ayrıntılı bir açıklama stoutner.com adresinde bulunabilir.

+ +

Privacy Browser'a 3 yeni engel listesi eklendi. + UltraList ve UltraPrivacy, + EasyList ve EasyPrivacy'nin engellemediği reklamları ve izleyicileri de engeller. Üçüncü liste ise tüm üçüncü taraf istekleri engeller. + Bir istek yalnızca, isteğin temel domaini bağlantının temel domaininden farklıysa üçüncü taraf olarak kabul edilir. + Örneğin, www.website.com adresi images.website.com adresinden bir resim yüklüyorsa, + her ikisi de aynı temel domaini (website.com) paylaştığı için bu üçüncü taraf isteği olarak engellenmez. + Tüm üçüncü taraf istekleri engellemek gizliliği arttırır, fakat çok sayıda web sitesini bozduğu için bu engel listesi varsayılan olarak devre dışıdır.

+ + \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_requests_dark.html b/app/src/main/assets/tr/guide_requests_dark.html deleted file mode 100644 index e622e7a5..00000000 --- a/app/src/main/assets/tr/guide_requests_dark.html +++ /dev/null @@ -1,82 +0,0 @@ - - - - - - - - - - -

Kaynak Ä°stekleri

- -

Bir URL yüklendiğinde, genellikle CCS, JavaScript, resim ve diğer dosyalar için birkaç kaynak isteği yapar. Bu isteklerle ilgili detaylar İstekler etkinliğinden ulaşılabilir. - Gezinti çekmecesi, İstekler etkinliğine götüren bir bağlantı içerir ve ayrıca bu etkinlik kaç tane isteğin engellediğini gösterir. - Bir isteğe dokunulduğunda, neden izin verildiğine ya da engellendiğine dair detaylar görüntülenir.

- -

- -

Privacy Browser, Adblock sözdizimini (Adblock syntax) temel alan 4 yaygın engel listesini içerir: - EasyList, EasyPrivacy, Fanboy’s Annoyance List ve Fanboy’s Social Blocking List. - Bu engel listeleri, Privacy Browser tarafından, aşağıda listelenmiş olan kaynak isteklerini kontrol eden 22 alt listeye göre işlenmiştir.

- -
    -
  1. Ana Beyaz Listesi
  2. -
  3. Final Beyaz Listesi
  4. -
  5. Domain Beyaz Listesi
  6. -
  7. Domain Başlangıç Beyaz Listesi
  8. -
  9. Domain Final Beyaz Listesi
  10. -
  11. Üçüncü Taraf Beyaz Listesi
  12. -
  13. Üçüncü Taraf Domain Beyaz Listesi
  14. -
  15. Üçüncü Taraf Domain Başlangıç Beyaz Listesi
  16. -
  17. Ana Kara Listesi
  18. -
  19. Başlangıç Kara Listesi
  20. -
  21. Final Kara Listesi
  22. -
  23. Domain Kara Listesi
  24. -
  25. Domain Başlangıç Kara Listesi
  26. -
  27. Domain Final Kara Listesi
  28. -
  29. Domain Düzenli İfade (Regular Expression) Kara Listesi
  30. -
  31. Üçüncü Taraf Kara Listesi
  32. -
  33. Üçüncü Taraf Başlangıç Kara Listesi
  34. -
  35. Üçüncü Taraf Domain Kara Listesi
  36. -
  37. Üçüncü Taraf Domain Başlangıç Kara Listesi
  38. -
  39. Üçüncü Taraf Düzenli İfade (Regular Expression) Kara Listesi
  40. -
  41. Üçüncü Taraf Domain Düzenli İfade (Regular Expression) Kara Listesi
  42. -
  43. Düzenli İfade (Regular Expression) Kara Listesi
  44. -
- -

Başlangıç listeleri, URL'nin başlangıcına göre kontrol eder. Final listeleri, URL'nin sonuna göre kontrol eder. Domain listeleri, yalnızca belli domainlere göre kontrol eder. - Üçüncü taraf listeleri, yalnızca isteğin kök domaini ana URL'nin kök domaininden farklıysa uygulanır. - Düzenli ifade listeleri, düzenli ifade sözdizimini (regular expression syntax) takip eder. - Her alt liste öğesinin bir veya daha fazla girdisi vardır. - Domain alt listeleri işe karıştığında, ilk girdi ana URL'nin domaini ile eşleşirse, kaynak isteği yalnızca öğeye göre kontrol edilir.

- -

Anroid’in WebView kısıtlamaları yüzünden ve isteklerin işlenmesini hızlandırmak için Privacy Browser, Adblock sözdiziminin basitleştirilmiş bir yorumunu uygular. - Bu durum, bazen, kaynakların orijinal girdi tarafından amaçlanmayan şekillerde izin verildiği veya engellendiği yanlış pozitif (false positive) durumuna yol açabilir. - Engel listesi girdilerinin nasıl işlendiğine dair daha ayrıntılı bir açıklama stoutner.com adresinde bulunabilir.

- -

Privacy Browser'a 3 yeni engel listesi eklendi. - UltraList ve UltraPrivacy, - EasyList ve EasyPrivacy'nin engellemediği reklamları ve izleyicileri de engeller. Üçüncü liste ise tüm üçüncü taraf istekleri engeller. - Bir istek yalnızca, isteğin temel domaini bağlantının temel domaininden farklıysa üçüncü taraf olarak kabul edilir. - Örneğin, www.website.com adresi images.website.com adresinden bir resim yüklüyorsa, - her ikisi de aynı temel domaini (website.com) paylaştığı için bu üçüncü taraf isteği olarak engellenmez. - Tüm üçüncü taraf istekleri engellemek gizliliği arttırır, fakat çok sayıda web sitesini bozduğu için bu engel listesi varsayılan olarak devre dışıdır.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_requests_light.html b/app/src/main/assets/tr/guide_requests_light.html deleted file mode 100644 index e44ccc48..00000000 --- a/app/src/main/assets/tr/guide_requests_light.html +++ /dev/null @@ -1,82 +0,0 @@ - - - - - - - - - - -

Kaynak Ä°stekleri

- -

Bir URL yüklendiğinde, genellikle CCS, JavaScript, resim ve diğer dosyalar için birkaç kaynak isteği yapar. Bu isteklerle ilgili detaylar İstekler etkinliğinden ulaşılabilir. - Gezinti çekmecesi, İstekler etkinliğine götüren bir bağlantı içerir ve ayrıca bu etkinlik kaç tane isteğin engellediğini gösterir. - Bir isteğe dokunulduğunda, neden izin verildiğine ya da engellendiğine dair detaylar görüntülenir.

- -

- -

Privacy Browser, Adblock sözdizimini (Adblock syntax) temel alan 4 yaygın engel listesini içerir: - EasyList, EasyPrivacy, Fanboy’s Annoyance List ve Fanboy’s Social Blocking List. - Bu engel listeleri, Privacy Browser tarafından, aşağıda listelenmiş olan kaynak isteklerini kontrol eden 22 alt listeye göre işlenmiştir.

- -
    -
  1. Ana Beyaz Listesi
  2. -
  3. Final Beyaz Listesi
  4. -
  5. Domain Beyaz Listesi
  6. -
  7. Domain Başlangıç Beyaz Listesi
  8. -
  9. Domain Final Beyaz Listesi
  10. -
  11. Üçüncü Taraf Beyaz Listesi
  12. -
  13. Üçüncü Taraf Domain Beyaz Listesi
  14. -
  15. Üçüncü Taraf Domain Başlangıç Beyaz Listesi
  16. -
  17. Ana Kara Listesi
  18. -
  19. Başlangıç Kara Listesi
  20. -
  21. Final Kara Listesi
  22. -
  23. Domain Kara Listesi
  24. -
  25. Domain Başlangıç Kara Listesi
  26. -
  27. Domain Final Kara Listesi
  28. -
  29. Domain Düzenli İfade (Regular Expression) Kara Listesi
  30. -
  31. Üçüncü Taraf Kara Listesi
  32. -
  33. Üçüncü Taraf Başlangıç Kara Listesi
  34. -
  35. Üçüncü Taraf Domain Kara Listesi
  36. -
  37. Üçüncü Taraf Domain Başlangıç Kara Listesi
  38. -
  39. Üçüncü Taraf Düzenli İfade (Regular Expression) Kara Listesi
  40. -
  41. Üçüncü Taraf Domain Düzenli İfade (Regular Expression) Kara Listesi
  42. -
  43. Düzenli İfade (Regular Expression) Kara Listesi
  44. -
- -

Başlangıç listeleri, URL'nin başlangıcına göre kontrol eder. Final listeleri, URL'nin sonuna göre kontrol eder. Domain listeleri, yalnızca belli domainlere göre kontrol eder. - Üçüncü taraf listeleri, yalnızca isteğin kök domaini ana URL'nin kök domaininden farklıysa uygulanır. - Düzenli ifade listeleri, düzenli ifade sözdizimini (regular expression syntax) takip eder. - Her alt liste öğesinin bir veya daha fazla girdisi vardır. - Domain alt listeleri işe karıştığında, ilk girdi ana URL'nin domaini ile eşleşirse, kaynak isteği yalnızca öğeye göre kontrol edilir.

- -

Anroid’in WebView kısıtlamaları yüzünden ve isteklerin işlenmesini hızlandırmak için Privacy Browser, Adblock sözdiziminin basitleştirilmiş bir yorumunu uygular. - Bu durum, bazen, kaynakların orijinal girdi tarafından amaçlanmayan şekillerde izin verildiği veya engellendiği yanlış pozitif (false positive) durumuna yol açabilir. - Engel listesi girdilerinin nasıl işlendiğine dair daha ayrıntılı bir açıklama stoutner.com adresinde bulunabilir.

- -

Privacy Browser'a 3 yeni engel listesi eklendi. - UltraList ve UltraPrivacy, - EasyList ve EasyPrivacy'nin engellemediği reklamları ve izleyicileri de engeller. Üçüncü liste ise tüm üçüncü taraf istekleri engeller. - Bir istek yalnızca, isteğin temel domaini bağlantının temel domaininden farklıysa üçüncü taraf olarak kabul edilir. - Örneğin, www.website.com adresi images.website.com adresinden bir resim yüklüyorsa, - her ikisi de aynı temel domaini (website.com) paylaştığı için bu üçüncü taraf isteği olarak engellenmez. - Tüm üçüncü taraf istekleri engellemek gizliliği arttırır, fakat çok sayıda web sitesini bozduğu için bu engel listesi varsayılan olarak devre dışıdır.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_ssl_certificates.html b/app/src/main/assets/tr/guide_ssl_certificates.html new file mode 100644 index 00000000..2ca21c4a --- /dev/null +++ b/app/src/main/assets/tr/guide_ssl_certificates.html @@ -0,0 +1,56 @@ + + + + + + + + + + + + + +

Güvenle Bağlanma

+ +

Şifrelenmiş bir URL'yi (HTTPS ile başlayan) ziyaret ederken, web sunucusu hem tarayıcıya gönderilen bilgileri şifrelemek hem de sunucuyu tanımlamak için bir SSL sertifikası kullanır. + Sunucu tanımlamasının amacı, tarayıcı ile web sunucusu arasında konumlanan bir makinenin, sunucu gibi davranmasını ve nakledilen bilgilerin şifresini çözmesini önlemektir. + Bu saldırı türü Man In The Middle (Ortadaki Adam, MITM) saldırısı olarak bilinir. + SSL sertifikaları, sertifika otoriteleri tarafından oluşturulur, bu otoriteler, bir sunucunun kimliğini doğrulayan ve bir ücret karşılığında sertifika üreten şirketler topluluğudur. + Android, güvenilir sertifika otoritelerinin bir listesine sahiptir, ve herhangi bir web sitesi için bu sertifikalardan herhangi birini kabul edecektir. + Normal koşullarda, bir kuruluşun kontrol edemediği bir domain için SSL sertifikası alması mümkün değildir, + fakat gerçekte, birçok hükümet ve büyük şirket bunu rahatlıkla yapabilir.

+ +

Bir SSL sertifikası sabitlemek, tarayıcıya, özel bir domain için belirli bir SSL sertifikasına güvenebileceğini söyler. Geçerli olsa dahi, diğer sertifikalar reddedilecektir.

+ + + +

SSL sertifikalarının belirli bir tarihte süresi dolması sebebiyle, sabitlenmiş dahi olsa, SSL sertifikalarının yasal olarak zaman zaman güncellenmesi gerekir. + Genel bir kural olarak, çoğu durumda SSL sertifikalarını sabitlemeye gerek yoktur. + Ancak, bazı güçlü kuruluşların onları hedef aldığından şüphelenenler için SSL sertifikası sabitlemek bir MITM saldırısını algılayıp engelleyebilir. + Privacy Browser, aynı zamanda IP adreslerini de sabitleyebilir.

+ + + +

SSL sertifikaları Domain Ayarlarından sabitlenebilir. + MITM saldırılarına karşı korumanın yanı sıra, kablosuz bir router veya erişim noktası gibi bir cihaz için kendiliğinden imzalı bir sertifikayı sabitlemek, + web sitesinin her yüklenmesinde normal olarak gösterilen hata mesajını kaldıracaktır. + Aktif sekmeye dokunmak, geçerli web sitesinin SSL sertifikasını gösterir.

+ + \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_ssl_certificates_dark.html b/app/src/main/assets/tr/guide_ssl_certificates_dark.html deleted file mode 100644 index 2d12f59f..00000000 --- a/app/src/main/assets/tr/guide_ssl_certificates_dark.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - - - - - - - -

Güvenle Bağlanma

- -

Şifrelenmiş bir URL'yi (HTTPS ile başlayan) ziyaret ederken, web sunucusu hem tarayıcıya gönderilen bilgileri şifrelemek hem de sunucuyu tanımlamak için bir SSL sertifikası kullanır. - Sunucu tanımlamasının amacı, tarayıcı ile web sunucusu arasında konumlanan bir makinenin, sunucu gibi davranmasını ve nakledilen bilgilerin şifresini çözmesini önlemektir. - Bu saldırı türü Man In The Middle (Ortadaki Adam, MITM) saldırısı olarak bilinir. - SSL sertifikaları, sertifika otoriteleri tarafından oluşturulur, bu otoriteler, bir sunucunun kimliğini doğrulayan ve bir ücret karşılığında sertifika üreten şirketler topluluğudur. - Android, güvenilir sertifika otoritelerinin bir listesine sahiptir, ve herhangi bir web sitesi için bu sertifikalardan herhangi birini kabul edecektir. - Normal koşullarda, bir kuruluşun kontrol edemediği bir domain için SSL sertifikası alması mümkün değildir, - fakat gerçekte, birçok hükümet ve büyük şirket bunu rahatlıkla yapabilir.

- -

Bir SSL sertifikası sabitlemek, tarayıcıya, özel bir domain için belirli bir SSL sertifikasına güvenebileceğini söyler. Geçerli olsa dahi, diğer sertifikalar reddedilecektir.

- -

- -

SSL sertifikalarının belirli bir tarihte süresi dolması sebebiyle, sabitlenmiş dahi olsa, SSL sertifikalarının yasal olarak zaman zaman güncellenmesi gerekir. - Genel bir kural olarak, çoğu durumda SSL sertifikalarını sabitlemeye gerek yoktur. - Ancak, bazı güçlü kuruluşların onları hedef aldığından şüphelenenler için SSL sertifikası sabitlemek bir MITM saldırısını algılayıp engelleyebilir. - Privacy Browser, aynı zamanda IP adreslerini de sabitleyebilir.

- -

- -

SSL sertifikaları Domain Ayarlarından sabitlenebilir. - MITM saldırılarına karşı korumanın yanı sıra, kablosuz bir router veya erişim noktası gibi bir cihaz için kendiliğinden imzalı bir sertifikayı sabitlemek, - web sitesinin her yüklenmesinde normal olarak gösterilen hata mesajını kaldıracaktır. - Aktif sekmeye dokunmak, geçerli web sitesinin SSL sertifikasını gösterir.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_ssl_certificates_light.html b/app/src/main/assets/tr/guide_ssl_certificates_light.html deleted file mode 100644 index cf2b28b8..00000000 --- a/app/src/main/assets/tr/guide_ssl_certificates_light.html +++ /dev/null @@ -1,53 +0,0 @@ - - - - - - - - - - -

Güvenle Bağlanma

- -

Şifrelenmiş bir URL'yi (HTTPS ile başlayan) ziyaret ederken, web sunucusu hem tarayıcıya gönderilen bilgileri şifrelemek hem de sunucuyu tanımlamak için bir SSL sertifikası kullanır. - Sunucu tanımlamasının amacı, tarayıcı ile web sunucusu arasında konumlanan bir makinenin, sunucu gibi davranmasını ve nakledilen bilgilerin şifresini çözmesini önlemektir. - Bu saldırı türü Man In The Middle (Ortadaki Adam, MITM) saldırısı olarak bilinir. - SSL sertifikaları, sertifika otoriteleri tarafından oluşturulur, bu otoriteler, bir sunucunun kimliğini doğrulayan ve bir ücret karşılığında sertifika üreten şirketler topluluğudur. - Android, güvenilir sertifika otoritelerinin bir listesine sahiptir, ve herhangi bir web sitesi için bu sertifikalardan herhangi birini kabul edecektir. - Normal koşullarda, bir kuruluşun kontrol edemediği bir domain için SSL sertifikası alması mümkün değildir, - fakat gerçekte, birçok hükümet ve büyük şirket bunu rahatlıkla yapabilir.

- -

Bir SSL sertifikası sabitlemek, tarayıcıya, özel bir domain için belirli bir SSL sertifikasına güvenebileceğini söyler. Geçerli olsa dahi, diğer sertifikalar reddedilecektir.

- -

- -

SSL sertifikalarının belirli bir tarihte süresi dolması sebebiyle, sabitlenmiş dahi olsa, SSL sertifikalarının yasal olarak zaman zaman güncellenmesi gerekir. - Genel bir kural olarak, çoğu durumda SSL sertifikalarını sabitlemeye gerek yoktur. - Ancak, bazı güçlü kuruluşların onları hedef aldığından şüphelenenler için SSL sertifikası sabitlemek bir MITM saldırısını algılayıp engelleyebilir. - Privacy Browser, aynı zamanda IP adreslerini de sabitleyebilir.

- -

- -

SSL sertifikaları Domain Ayarlarından sabitlenebilir. - MITM saldırılarına karşı korumanın yanı sıra, kablosuz bir router veya erişim noktası gibi bir cihaz için kendiliğinden imzalı bir sertifikayı sabitlemek, - web sitesinin her yüklenmesinde normal olarak gösterilen hata mesajını kaldıracaktır. - Aktif sekmeye dokunmak, geçerli web sitesinin SSL sertifikasını gösterir.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_tracking_ids.html b/app/src/main/assets/tr/guide_tracking_ids.html new file mode 100644 index 00000000..17d6628a --- /dev/null +++ b/app/src/main/assets/tr/guide_tracking_ids.html @@ -0,0 +1,44 @@ + + + + + + + + + + + + + +

Takip Etme

+ +

Birkaç yıl önce, W3C (World Wide Web Konsorsiyumu), tarayıcıların web sunucularına izlenmesini istemediklerini bildirmek için bir mekanizma yarattı. + Bu mekanizma, web isteklerini içeren bir başlık DNT (Do Not Track) ekleyerek çalışır.

+ +

Fakat DNT(Takip Etme) başlığı, gerçekten herhangi bir gizlilik sağlamaz, çünkü çoğu web sunucusu bunu görmezden gelir. + Örneğin, Yahoo, Google, Microsoft ve Facebook, en azından bazı DNT başlıklarını yok sayar.

+ + +

URL Modifikasyonu

+ +

Privacy Browser, Google Analytics'ten ?utm_ ve Facebook'tan + ?fbclick= gibi URL'deki takip id kısımlarını kaldırır. URL modifikasyonu, herhangi bir soruna yol açması halinde ayarlardan kapatılabilir.

+ + \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_tracking_ids_dark.html b/app/src/main/assets/tr/guide_tracking_ids_dark.html deleted file mode 100644 index 8b444cde..00000000 --- a/app/src/main/assets/tr/guide_tracking_ids_dark.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -

Takip Etme

- -

Birkaç yıl önce, W3C (World Wide Web Konsorsiyumu), tarayıcıların web sunucularına izlenmesini istemediklerini bildirmek için bir mekanizma yarattı. - Bu mekanizma, web isteklerini içeren bir başlık DNT (Do Not Track) ekleyerek çalışır.

- -

Fakat DNT(Takip Etme) başlığı, gerçekten herhangi bir gizlilik sağlamaz, çünkü çoğu web sunucusu bunu görmezden gelir. - Örneğin, Yahoo, Google, Microsoft ve Facebook, en azından bazı DNT başlıklarını yok sayar.

- - -

URL Modifikasyonu

- -

Privacy Browser, Google Analytics'ten ?utm_ ve Facebook'tan - ?fbclick= gibi URL'deki takip id kısımlarını kaldırır. URL modifikasyonu, herhangi bir soruna yol açması halinde ayarlardan kapatılabilir.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_tracking_ids_light.html b/app/src/main/assets/tr/guide_tracking_ids_light.html deleted file mode 100644 index 700db3c1..00000000 --- a/app/src/main/assets/tr/guide_tracking_ids_light.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -

Takip Etme

- -

Birkaç yıl önce, W3C (World Wide Web Konsorsiyumu), tarayıcıların web sunucularına izlenmesini istemediklerini bildirmek için bir mekanizma yarattı. - Bu mekanizma, web isteklerini içeren bir başlık DNT (Do Not Track) ekleyerek çalışır.

- -

Fakat DNT(Takip Etme) başlığı, gerçekten herhangi bir gizlilik sağlamaz, çünkü çoğu web sunucusu bunu görmezden gelir. - Örneğin, Yahoo, Google, Microsoft ve Facebook, en azından bazı DNT başlıklarını yok sayar.

- - -

URL Modifikasyonu

- -

Privacy Browser, Google Analytics'ten ?utm_ ve Facebook'tan - ?fbclick= gibi URL'deki takip id kısımlarını kaldırır. URL modifikasyonu, herhangi bir soruna yol açması halinde ayarlardan kapatılabilir.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_user_agent.html b/app/src/main/assets/tr/guide_user_agent.html new file mode 100644 index 00000000..2682a44a --- /dev/null +++ b/app/src/main/assets/tr/guide_user_agent.html @@ -0,0 +1,64 @@ + + + + + + + + + + + + + +

Tarayıcı Kimliği

+ +

Web tarayıcıları web sitelerine bağlandığında, sitelere, tarayıcıyı ve sahip olduğu oluşturma (render) özelliklerini belirten bir kullanıcı aracısı gönderir. + Web sunucusu, bu bilgiyi web sitesinin hangi versiyonunun tarayıcıya gönderileceğini karar vermek için kullanabilir. + Örneğin, birçok web sitesinin masaüstü ve mobil tarayıcılar için farklı versiyonları vardır.

+ +

Privacy Browser, varsayılan olarak, kendi özel kullanıcı aracısı olan PrivacyBrowser/1.0 kullanır. Bu, web sunucusuna minimum düzeyde bilgi gönderir. + Çünkü web sunucuları bunu bir mobil kullanıcı aracısı olarak tanımlayamadıkları için genellikle sitenin masaüstü versiyonunu gösterir.

+ +

Buna kıyasla, WebView’ın varsayılan kullanıcı aracısı cihazın donanımı ve yazılımı hakkında büyük miktarda bilgiyi ortaya döker. + Ayarlar ekranında, Kullanıcı Aracısı olarak Varsayılan WebView seçmek gönderilecek kullanıcı aracısını gösterir. + Aşağıdaki ekran görüntüsü, Android 10 çalıştıran ve Android System WebView 84.0.4147.125 sürümüne sahip bir Pixel 2 XL cihazına aittir. + Çoğu web sunucusu, bunu bir mobil tarayıcı olarak tanıyacak ve eğer varsa, sitenin mobil versiyonunu gösterecektir.

+ + + +

Kullanıcı aracısında, bir web sitesini ziyaret eden birkaç kişinin aynı olacağı hakkında yeterli bilgi bazen vardır. + Eğer kullanıcı aracısı başka bir özgün olmayan tanımlayıcı bilgi ile birleştirilirse, genellikle özgün fingerprint (tanı) oluşturulur. + The Electronic Frontier Foundation, bu kaynaklardan ne kadar bilgi toplandığını göstermek için Panopticlick adlı bir araç geliştirdi. + Bu test JavaScript etkinken çalıştırıldığında, ortaya çıkarılan bilgi miktarı büyük ölçüde artar. + Ayrıca Browser Leaks ve Am I Unique bu konuda iyi bilgi kaynaklarıdır.

+ + + +

Ortak tarayıcılar ve işletim sistemleriyle eşleşen önayarlı birkaç kullanıcı aracısı vardır. + Browser Fingerprinting (Tarayıcı Tanılama) amaçları doğrultusunda, nadir olan herhangi bir şeyin takibi kolaylaşır. + Eğer Privacy Browser yaygınlaşırsa ve birçok insan kullanıcı aracısı olarak PrivacyBrowser/1.0 kullanırsa, gizlilik için iyi bir seçim olacaktır. + Firefox ve Chrome en yaygın kullanıcı aracılarıdır, ancak çok sık otomatik güncelleme aldıkları ve versiyon numaraları çok hızlı değiştiği için Privacy Browser’a dahil olan kullanıcı aracıları, + sunucu günlüklerinde yer alan kullanıcı aracılarının büyük çoğunluğu içinde gözden kaçacaktır.

+ +

Bazı web siteleri, kullanıcı aracısını tanımazlarsa düzgün çalışmaz. + Kullanıcı aracısı olarak Varsayılan WebView ayarlamak veya genel olarak tanınan bir kullanıcı aracısı ayarlamak için domain ayarlarını kullanmak genellikle problemi çözer. + Android WebView’ı kullanıcı aracısının boş olmasına izin vermez. Eğer öyleyse, WebView, sunucuya varsayılan kullanıcı aracısını gönderir.

+ + \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_user_agent_dark.html b/app/src/main/assets/tr/guide_user_agent_dark.html deleted file mode 100644 index ab87a1c8..00000000 --- a/app/src/main/assets/tr/guide_user_agent_dark.html +++ /dev/null @@ -1,61 +0,0 @@ - - - - - - - - - - -

Tarayıcı Kimliği

- -

Web tarayıcıları web sitelerine bağlandığında, sitelere, tarayıcıyı ve sahip olduğu oluşturma (render) özelliklerini belirten bir kullanıcı aracısı gönderir. - Web sunucusu, bu bilgiyi web sitesinin hangi versiyonunun tarayıcıya gönderileceğini karar vermek için kullanabilir. - Örneğin, birçok web sitesinin masaüstü ve mobil tarayıcılar için farklı versiyonları vardır.

- -

Privacy Browser, varsayılan olarak, kendi özel kullanıcı aracısı olan PrivacyBrowser/1.0 kullanır. Bu, web sunucusuna minimum düzeyde bilgi gönderir. - Çünkü web sunucuları bunu bir mobil kullanıcı aracısı olarak tanımlayamadıkları için genellikle sitenin masaüstü versiyonunu gösterir.

- -

Buna kıyasla, WebView’ın varsayılan kullanıcı aracısı cihazın donanımı ve yazılımı hakkında büyük miktarda bilgiyi ortaya döker. - Ayarlar ekranında, Kullanıcı Aracısı olarak Varsayılan WebView seçmek gönderilecek kullanıcı aracısını gösterir. - Aşağıdaki ekran görüntüsü, Android 10 çalıştıran ve Android System WebView 84.0.4147.125 sürümüne sahip bir Pixel 2 XL cihazına aittir. - Çoğu web sunucusu, bunu bir mobil tarayıcı olarak tanıyacak ve eğer varsa, sitenin mobil versiyonunu gösterecektir.

- - - -

Kullanıcı aracısında, bir web sitesini ziyaret eden birkaç kişinin aynı olacağı hakkında yeterli bilgi bazen vardır. - Eğer kullanıcı aracısı başka bir özgün olmayan tanımlayıcı bilgi ile birleştirilirse, genellikle özgün fingerprint (tanı) oluşturulur. - The Electronic Frontier Foundation, bu kaynaklardan ne kadar bilgi toplandığını göstermek için Panopticlick adlı bir araç geliştirdi. - Bu test JavaScript etkinken çalıştırıldığında, ortaya çıkarılan bilgi miktarı büyük ölçüde artar. - Ayrıca Browser Leaks ve Am I Unique bu konuda iyi bilgi kaynaklarıdır.

- - - -

Ortak tarayıcılar ve işletim sistemleriyle eşleşen önayarlı birkaç kullanıcı aracısı vardır. - Browser Fingerprinting (Tarayıcı Tanılama) amaçları doğrultusunda, nadir olan herhangi bir şeyin takibi kolaylaşır. - Eğer Privacy Browser yaygınlaşırsa ve birçok insan kullanıcı aracısı olarak PrivacyBrowser/1.0 kullanırsa, gizlilik için iyi bir seçim olacaktır. - Firefox ve Chrome en yaygın kullanıcı aracılarıdır, ancak çok sık otomatik güncelleme aldıkları ve versiyon numaraları çok hızlı değiştiği için Privacy Browser’a dahil olan kullanıcı aracıları, - sunucu günlüklerinde yer alan kullanıcı aracılarının büyük çoğunluğu içinde gözden kaçacaktır.

- -

Bazı web siteleri, kullanıcı aracısını tanımazlarsa düzgün çalışmaz. - Kullanıcı aracısı olarak Varsayılan WebView ayarlamak veya genel olarak tanınan bir kullanıcı aracısı ayarlamak için domain ayarlarını kullanmak genellikle problemi çözer. - Android WebView’ı kullanıcı aracısının boş olmasına izin vermez. Eğer öyleyse, WebView, sunucuya varsayılan kullanıcı aracısını gönderir.

- - \ No newline at end of file diff --git a/app/src/main/assets/tr/guide_user_agent_light.html b/app/src/main/assets/tr/guide_user_agent_light.html deleted file mode 100644 index 80d1703c..00000000 --- a/app/src/main/assets/tr/guide_user_agent_light.html +++ /dev/null @@ -1,61 +0,0 @@ - - - - - - - - - - -

Tarayıcı Kimliği

- -

Web tarayıcıları web sitelerine bağlandığında, sitelere, tarayıcıyı ve sahip olduğu oluşturma (render) özelliklerini belirten bir kullanıcı aracısı gönderir. - Web sunucusu, bu bilgiyi web sitesinin hangi versiyonunun tarayıcıya gönderileceğini karar vermek için kullanabilir. - Örneğin, birçok web sitesinin masaüstü ve mobil tarayıcılar için farklı versiyonları vardır.

- -

Privacy Browser, varsayılan olarak, kendi özel kullanıcı aracısı olan PrivacyBrowser/1.0 kullanır. Bu, web sunucusuna minimum düzeyde bilgi gönderir. - Çünkü web sunucuları bunu bir mobil kullanıcı aracısı olarak tanımlayamadıkları için genellikle sitenin masaüstü versiyonunu gösterir.

- -

Buna kıyasla, WebView’ın varsayılan kullanıcı aracısı cihazın donanımı ve yazılımı hakkında büyük miktarda bilgiyi ortaya döker. - Ayarlar ekranında, Kullanıcı Aracısı olarak Varsayılan WebView seçmek gönderilecek kullanıcı aracısını gösterir. - Aşağıdaki ekran görüntüsü, Android 10 çalıştıran ve Android System WebView 84.0.4147.125 sürümüne sahip bir Pixel 2 XL cihazına aittir. - Çoğu web sunucusu, bunu bir mobil tarayıcı olarak tanıyacak ve eğer varsa, sitenin mobil versiyonunu gösterecektir.

- - - -

Kullanıcı aracısında, bir web sitesini ziyaret eden birkaç kişinin aynı olacağı hakkında yeterli bilgi bazen vardır. - Eğer kullanıcı aracısı başka bir özgün olmayan tanımlayıcı bilgi ile birleştirilirse, genellikle özgün fingerprint (tanı) oluşturulur. - The Electronic Frontier Foundation, bu kaynaklardan ne kadar bilgi toplandığını göstermek için Panopticlick adlı bir araç geliştirdi. - Bu test JavaScript etkinken çalıştırıldığında, ortaya çıkarılan bilgi miktarı büyük ölçüde artar. - Ayrıca Browser Leaks ve Am I Unique bu konuda iyi bilgi kaynaklarıdır.

- - - -

Ortak tarayıcılar ve işletim sistemleriyle eşleşen önayarlı birkaç kullanıcı aracısı vardır. - Browser Fingerprinting (Tarayıcı Tanılama) amaçları doğrultusunda, nadir olan herhangi bir şeyin takibi kolaylaşır. - Eğer Privacy Browser yaygınlaşırsa ve birçok insan kullanıcı aracısı olarak PrivacyBrowser/1.0 kullanırsa, gizlilik için iyi bir seçim olacaktır. - Firefox ve Chrome en yaygın kullanıcı aracılarıdır, ancak çok sık otomatik güncelleme aldıkları ve versiyon numaraları çok hızlı değiştiği için Privacy Browser’a dahil olan kullanıcı aracıları, - sunucu günlüklerinde yer alan kullanıcı aracılarının büyük çoğunluğu içinde gözden kaçacaktır.

- -

Bazı web siteleri, kullanıcı aracısını tanımazlarsa düzgün çalışmaz. - Kullanıcı aracısı olarak Varsayılan WebView ayarlamak veya genel olarak tanınan bir kullanıcı aracısı ayarlamak için domain ayarlarını kullanmak genellikle problemi çözer. - Android WebView’ı kullanıcı aracısının boş olmasına izin vermez. Eğer öyleyse, WebView, sunucuya varsayılan kullanıcı aracısını gönderir.

- - \ No newline at end of file diff --git a/app/src/main/java/com/stoutner/privacybrowser/activities/LogcatActivity.java b/app/src/main/java/com/stoutner/privacybrowser/activities/LogcatActivity.java index 2540ce49..3200c2be 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/activities/LogcatActivity.java +++ b/app/src/main/java/com/stoutner/privacybrowser/activities/LogcatActivity.java @@ -177,56 +177,52 @@ public class LogcatActivity extends AppCompatActivity implements SaveDialog.Save int menuItemId = menuItem.getItemId(); // Run the commands that correlate to the selected menu item. - switch (menuItemId) { - case R.id.copy: - // Get a handle for the clipboard manager. - ClipboardManager clipboardManager = (ClipboardManager) getSystemService(CLIPBOARD_SERVICE); + if (menuItemId == R.id.copy) { // Copy was selected. + // Get a handle for the clipboard manager. + ClipboardManager clipboardManager = (ClipboardManager) getSystemService(CLIPBOARD_SERVICE); - // Remove the incorrect lint error below that the clipboard manager might be null. - assert clipboardManager != null; + // Remove the incorrect lint error below that the clipboard manager might be null. + assert clipboardManager != null; - // Save the logcat in a clip data. - ClipData logcatClipData = ClipData.newPlainText(getString(R.string.logcat), logcatTextView.getText()); + // Save the logcat in a clip data. + ClipData logcatClipData = ClipData.newPlainText(getString(R.string.logcat), logcatTextView.getText()); - // Place the clip data on the clipboard. - clipboardManager.setPrimaryClip(logcatClipData); + // Place the clip data on the clipboard. + clipboardManager.setPrimaryClip(logcatClipData); - // Display a snackbar. - Snackbar.make(logcatTextView, R.string.logcat_copied, Snackbar.LENGTH_SHORT).show(); + // Display a snackbar. + Snackbar.make(logcatTextView, R.string.logcat_copied, Snackbar.LENGTH_SHORT).show(); - // Consume the event. - return true; + // Consume the event. + return true; + } else if (menuItemId == R.id.save) { // Save was selected. + // Instantiate the save alert dialog. + DialogFragment saveDialogFragment = SaveDialog.save(SaveDialog.SAVE_LOGCAT); - case R.id.save: - // Instantiate the save alert dialog. - DialogFragment saveDialogFragment = SaveDialog.save(SaveDialog.SAVE_LOGCAT); + // Show the save alert dialog. + saveDialogFragment.show(getSupportFragmentManager(), getString(R.string.save_logcat)); - // Show the save alert dialog. - saveDialogFragment.show(getSupportFragmentManager(), getString(R.string.save_logcat)); + // Consume the event. + return true; + } else if (menuItemId == R.id.clear) { // Clear was selected. + try { + // Clear the logcat. `-c` clears the logcat. `-b all` clears all the buffers (instead of just crash, main, and system). + Process process = Runtime.getRuntime().exec("logcat -b all -c"); - // Consume the event. - return true; + // Wait for the process to finish. + process.waitFor(); - case R.id.clear: - try { - // Clear the logcat. `-c` clears the logcat. `-b all` clears all the buffers (instead of just crash, main, and system). - Process process = Runtime.getRuntime().exec("logcat -b all -c"); - - // Wait for the process to finish. - process.waitFor(); - - // Reload the logcat. - new GetLogcat(this, 0).execute(); - } catch (IOException|InterruptedException exception) { - // Do nothing. - } - - // Consume the event. - return true; + // Reload the logcat. + new GetLogcat(this, 0).execute(); + } catch (IOException | InterruptedException exception) { + // Do nothing. + } - default: - // Don't consume the event. - return super.onOptionsItemSelected(menuItem); + // Consume the event. + return true; + } else { // The home button was pushed. + // Do not consume the event. The system will process the home command. + return super.onOptionsItemSelected(menuItem); } } diff --git a/app/src/main/java/com/stoutner/privacybrowser/activities/MainWebViewActivity.java b/app/src/main/java/com/stoutner/privacybrowser/activities/MainWebViewActivity.java index 9f51f749..e393e310 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/activities/MainWebViewActivity.java +++ b/app/src/main/java/com/stoutner/privacybrowser/activities/MainWebViewActivity.java @@ -1059,960 +1059,755 @@ public class MainWebViewActivity extends AppCompatActivity implements CreateBook } @Override - // Remove Android Studio's warning about the dangers of enabling JavaScript. We know. Oh, how we know. - @SuppressLint("SetJavaScriptEnabled") public boolean onOptionsItemSelected(MenuItem menuItem) { - // Get the selected menu item ID. - int menuItemId = menuItem.getItemId(); - // Get a handle for the shared preferences. SharedPreferences sharedPreferences = PreferenceManager.getDefaultSharedPreferences(this); // Get a handle for the cookie manager. CookieManager cookieManager = CookieManager.getInstance(); - // Run the commands that correlate to the selected menu item. - switch (menuItemId) { - case R.id.toggle_javascript: - // Toggle the JavaScript status. - currentWebView.getSettings().setJavaScriptEnabled(!currentWebView.getSettings().getJavaScriptEnabled()); - - // Update the privacy icon. `true` runs `invalidateOptionsMenu` as the last step. - updatePrivacyIcons(true); - - // Display a `Snackbar`. - if (currentWebView.getSettings().getJavaScriptEnabled()) { // JavaScrip is enabled. - Snackbar.make(webViewPager, R.string.javascript_enabled, Snackbar.LENGTH_SHORT).show(); - } else if (cookieManager.acceptCookie()) { // JavaScript is disabled, but first-party cookies are enabled. - Snackbar.make(webViewPager, R.string.javascript_disabled, Snackbar.LENGTH_SHORT).show(); - } else { // Privacy mode. - Snackbar.make(webViewPager, R.string.privacy_mode, Snackbar.LENGTH_SHORT).show(); - } - - // Reload the current WebView. - currentWebView.reload(); - - // Consume the event. - return true; - - case R.id.refresh: - if (menuItem.getTitle().equals(getString(R.string.refresh))) { // The refresh button was pushed. - // Reload the current WebView. - currentWebView.reload(); - } else { // The stop button was pushed. - // Stop the loading of the WebView. - currentWebView.stopLoading(); - } - - // Consume the event. - return true; - - case R.id.bookmarks: - // Open the bookmarks drawer. - drawerLayout.openDrawer(GravityCompat.END); - - // Consume the event. - return true; - - case R.id.toggle_first_party_cookies: - // Switch the first-party cookie status. - cookieManager.setAcceptCookie(!cookieManager.acceptCookie()); + // Get the selected menu item ID. + int menuItemId = menuItem.getItemId(); - // Store the first-party cookie status. - currentWebView.setAcceptFirstPartyCookies(cookieManager.acceptCookie()); + // Run the commands that correlate to the selected menu item. + if (menuItemId == R.id.toggle_javascript) { // JavaScript. + // Toggle the JavaScript status. + currentWebView.getSettings().setJavaScriptEnabled(!currentWebView.getSettings().getJavaScriptEnabled()); - // Update the menu checkbox. - menuItem.setChecked(cookieManager.acceptCookie()); + // Update the privacy icon. + updatePrivacyIcons(true); - // Update the privacy icon. `true` runs `invalidateOptionsMenu` as the last step. - updatePrivacyIcons(true); + // Display a `Snackbar`. + if (currentWebView.getSettings().getJavaScriptEnabled()) { // JavaScrip is enabled. + Snackbar.make(webViewPager, R.string.javascript_enabled, Snackbar.LENGTH_SHORT).show(); + } else if (cookieManager.acceptCookie()) { // JavaScript is disabled, but first-party cookies are enabled. + Snackbar.make(webViewPager, R.string.javascript_disabled, Snackbar.LENGTH_SHORT).show(); + } else { // Privacy mode. + Snackbar.make(webViewPager, R.string.privacy_mode, Snackbar.LENGTH_SHORT).show(); + } - // Display a snackbar. - if (cookieManager.acceptCookie()) { // First-party cookies are enabled. - Snackbar.make(webViewPager, R.string.first_party_cookies_enabled, Snackbar.LENGTH_SHORT).show(); - } else if (currentWebView.getSettings().getJavaScriptEnabled()) { // JavaScript is still enabled. - Snackbar.make(webViewPager, R.string.first_party_cookies_disabled, Snackbar.LENGTH_SHORT).show(); - } else { // Privacy mode. - Snackbar.make(webViewPager, R.string.privacy_mode, Snackbar.LENGTH_SHORT).show(); - } + // Reload the current WebView. + currentWebView.reload(); + // Consume the event. + return true; + } else if (menuItemId == R.id.refresh) { // Refresh. + // Run the command that correlates to the current status of the menu item. + if (menuItem.getTitle().equals(getString(R.string.refresh))) { // The refresh button was pushed. // Reload the current WebView. currentWebView.reload(); + } else { // The stop button was pushed. + // Stop the loading of the WebView. + currentWebView.stopLoading(); + } - // Consume the event. - return true; + // Consume the event. + return true; + } else if (menuItemId == R.id.bookmarks) { // Bookmarks. + // Open the bookmarks drawer. + drawerLayout.openDrawer(GravityCompat.END); - case R.id.toggle_third_party_cookies: - if (Build.VERSION.SDK_INT >= 21) { - // Switch the status of thirdPartyCookiesEnabled. - cookieManager.setAcceptThirdPartyCookies(currentWebView, !cookieManager.acceptThirdPartyCookies(currentWebView)); + // Consume the event. + return true; + } else if (menuItemId == R.id.toggle_first_party_cookies) { // First-party cookies. + // Switch the first-party cookie status. + cookieManager.setAcceptCookie(!cookieManager.acceptCookie()); - // Update the menu checkbox. - menuItem.setChecked(cookieManager.acceptThirdPartyCookies(currentWebView)); + // Store the first-party cookie status. + currentWebView.setAcceptFirstPartyCookies(cookieManager.acceptCookie()); - // Display a snackbar. - if (cookieManager.acceptThirdPartyCookies(currentWebView)) { - Snackbar.make(webViewPager, R.string.third_party_cookies_enabled, Snackbar.LENGTH_SHORT).show(); - } else { - Snackbar.make(webViewPager, R.string.third_party_cookies_disabled, Snackbar.LENGTH_SHORT).show(); - } + // Update the menu checkbox. + menuItem.setChecked(cookieManager.acceptCookie()); - // Reload the current WebView. - currentWebView.reload(); - } // Else do nothing because SDK < 21. + // Update the privacy icon. + updatePrivacyIcons(true); - // Consume the event. - return true; + // Display a snackbar. + if (cookieManager.acceptCookie()) { // First-party cookies are enabled. + Snackbar.make(webViewPager, R.string.first_party_cookies_enabled, Snackbar.LENGTH_SHORT).show(); + } else if (currentWebView.getSettings().getJavaScriptEnabled()) { // JavaScript is still enabled. + Snackbar.make(webViewPager, R.string.first_party_cookies_disabled, Snackbar.LENGTH_SHORT).show(); + } else { // Privacy mode. + Snackbar.make(webViewPager, R.string.privacy_mode, Snackbar.LENGTH_SHORT).show(); + } - case R.id.toggle_dom_storage: - // Toggle the status of domStorageEnabled. - currentWebView.getSettings().setDomStorageEnabled(!currentWebView.getSettings().getDomStorageEnabled()); + // Reload the current WebView. + currentWebView.reload(); - // Update the menu checkbox. - menuItem.setChecked(currentWebView.getSettings().getDomStorageEnabled()); + // Consume the event. + return true; + } else if (menuItemId == R.id.toggle_third_party_cookies) { // Third-party cookies. + // Only act if the API >= 21. Otherwise, there are no third-party cookie controls. + if (Build.VERSION.SDK_INT >= 21) { + // Toggle the status of thirdPartyCookiesEnabled. + cookieManager.setAcceptThirdPartyCookies(currentWebView, !cookieManager.acceptThirdPartyCookies(currentWebView)); - // Update the privacy icon. `true` refreshes the app bar icons. - updatePrivacyIcons(true); + // Update the menu checkbox. + menuItem.setChecked(cookieManager.acceptThirdPartyCookies(currentWebView)); // Display a snackbar. - if (currentWebView.getSettings().getDomStorageEnabled()) { - Snackbar.make(webViewPager, R.string.dom_storage_enabled, Snackbar.LENGTH_SHORT).show(); + if (cookieManager.acceptThirdPartyCookies(currentWebView)) { + Snackbar.make(webViewPager, R.string.third_party_cookies_enabled, Snackbar.LENGTH_SHORT).show(); } else { - Snackbar.make(webViewPager, R.string.dom_storage_disabled, Snackbar.LENGTH_SHORT).show(); + Snackbar.make(webViewPager, R.string.third_party_cookies_disabled, Snackbar.LENGTH_SHORT).show(); } // Reload the current WebView. currentWebView.reload(); + } - // Consume the event. - return true; + // Consume the event. + return true; + } else if (menuItemId == R.id.toggle_dom_storage) { // DOM storage. + // Toggle the status of domStorageEnabled. + currentWebView.getSettings().setDomStorageEnabled(!currentWebView.getSettings().getDomStorageEnabled()); - // Form data can be removed once the minimum API >= 26. - case R.id.toggle_save_form_data: - // Switch the status of saveFormDataEnabled. - currentWebView.getSettings().setSaveFormData(!currentWebView.getSettings().getSaveFormData()); + // Update the menu checkbox. + menuItem.setChecked(currentWebView.getSettings().getDomStorageEnabled()); - // Update the menu checkbox. - menuItem.setChecked(currentWebView.getSettings().getSaveFormData()); - - // Display a snackbar. - if (currentWebView.getSettings().getSaveFormData()) { - Snackbar.make(webViewPager, R.string.form_data_enabled, Snackbar.LENGTH_SHORT).show(); - } else { - Snackbar.make(webViewPager, R.string.form_data_disabled, Snackbar.LENGTH_SHORT).show(); - } + // Update the privacy icon. + updatePrivacyIcons(true); - // Update the privacy icon. `true` runs `invalidateOptionsMenu` as the last step. - updatePrivacyIcons(true); + // Display a snackbar. + if (currentWebView.getSettings().getDomStorageEnabled()) { + Snackbar.make(webViewPager, R.string.dom_storage_enabled, Snackbar.LENGTH_SHORT).show(); + } else { + Snackbar.make(webViewPager, R.string.dom_storage_disabled, Snackbar.LENGTH_SHORT).show(); + } - // Reload the current WebView. - currentWebView.reload(); + // Reload the current WebView. + currentWebView.reload(); - // Consume the event. - return true; + // Consume the event. + return true; + } else if (menuItemId == R.id.toggle_save_form_data) { // Form data. This can be removed once the minimum API >= 26. + // Switch the status of saveFormDataEnabled. + currentWebView.getSettings().setSaveFormData(!currentWebView.getSettings().getSaveFormData()); - case R.id.clear_cookies: - Snackbar.make(webViewPager, R.string.cookies_deleted, Snackbar.LENGTH_LONG) - .setAction(R.string.undo, v -> { - // Do nothing because everything will be handled by `onDismissed()` below. - }) - .addCallback(new Snackbar.Callback() { - @SuppressLint("SwitchIntDef") // Ignore the lint warning about not handling the other possible events as they are covered by `default:`. - @Override - public void onDismissed(Snackbar snackbar, int event) { - if (event != Snackbar.Callback.DISMISS_EVENT_ACTION) { // The snackbar was dismissed without the undo button being pushed. - // Delete the cookies, which command varies by SDK. - if (Build.VERSION.SDK_INT < 21) { - cookieManager.removeAllCookie(); - } else { - cookieManager.removeAllCookies(null); - } - } - } - }) - .show(); + // Update the menu checkbox. + menuItem.setChecked(currentWebView.getSettings().getSaveFormData()); - // Consume the event. - return true; + // Display a snackbar. + if (currentWebView.getSettings().getSaveFormData()) { + Snackbar.make(webViewPager, R.string.form_data_enabled, Snackbar.LENGTH_SHORT).show(); + } else { + Snackbar.make(webViewPager, R.string.form_data_disabled, Snackbar.LENGTH_SHORT).show(); + } - case R.id.clear_dom_storage: - Snackbar.make(webViewPager, R.string.dom_storage_deleted, Snackbar.LENGTH_LONG) - .setAction(R.string.undo, v -> { - // Do nothing because everything will be handled by `onDismissed()` below. - }) - .addCallback(new Snackbar.Callback() { - @SuppressLint("SwitchIntDef") // Ignore the lint warning about not handling the other possible events as they are covered by `default:`. - @Override - public void onDismissed(Snackbar snackbar, int event) { - if (event != Snackbar.Callback.DISMISS_EVENT_ACTION) { // The snackbar was dismissed without the undo button being pushed. - // Delete the DOM Storage. - WebStorage webStorage = WebStorage.getInstance(); - webStorage.deleteAllData(); - - // Initialize a handler to manually delete the DOM storage files and directories. - Handler deleteDomStorageHandler = new Handler(); - - // Setup a runnable to manually delete the DOM storage files and directories. - Runnable deleteDomStorageRunnable = () -> { - try { - // Get a handle for the runtime. - Runtime runtime = Runtime.getRuntime(); - - // Get the application's private data directory, which will be something like `/data/user/0/com.stoutner.privacybrowser.standard`, - // which links to `/data/data/com.stoutner.privacybrowser.standard`. - String privateDataDirectoryString = getApplicationInfo().dataDir; - - // A string array must be used because the directory contains a space and `Runtime.exec` will otherwise not escape the string correctly. - Process deleteLocalStorageProcess = runtime.exec(new String[]{"rm", "-rf", privateDataDirectoryString + "/app_webview/Local Storage/"}); - - // Multiple commands must be used because `Runtime.exec()` does not like `*`. - Process deleteIndexProcess = runtime.exec("rm -rf " + privateDataDirectoryString + "/app_webview/IndexedDB"); - Process deleteQuotaManagerProcess = runtime.exec("rm -f " + privateDataDirectoryString + "/app_webview/QuotaManager"); - Process deleteQuotaManagerJournalProcess = runtime.exec("rm -f " + privateDataDirectoryString + "/app_webview/QuotaManager-journal"); - Process deleteDatabasesProcess = runtime.exec("rm -rf " + privateDataDirectoryString + "/app_webview/databases"); - - // Wait for the processes to finish. - deleteLocalStorageProcess.waitFor(); - deleteIndexProcess.waitFor(); - deleteQuotaManagerProcess.waitFor(); - deleteQuotaManagerJournalProcess.waitFor(); - deleteDatabasesProcess.waitFor(); - } catch (Exception exception) { - // Do nothing if an error is thrown. - } - }; - - // Manually delete the DOM storage files after 200 milliseconds. - deleteDomStorageHandler.postDelayed(deleteDomStorageRunnable, 200); - } - } - }) - .show(); + // Update the privacy icon. + updatePrivacyIcons(true); - // Consume the event. - return true; + // Reload the current WebView. + currentWebView.reload(); - // Form data can be remove once the minimum API >= 26. - case R.id.clear_form_data: - Snackbar.make(webViewPager, R.string.form_data_deleted, Snackbar.LENGTH_LONG) - .setAction(R.string.undo, v -> { - // Do nothing because everything will be handled by `onDismissed()` below. - }) - .addCallback(new Snackbar.Callback() { - @SuppressLint("SwitchIntDef") // Ignore the lint warning about not handling the other possible events as they are covered by `default:`. - @Override - public void onDismissed(Snackbar snackbar, int event) { - if (event != Snackbar.Callback.DISMISS_EVENT_ACTION) { // The snackbar was dismissed without the undo button being pushed. - // Delete the form data. - WebViewDatabase mainWebViewDatabase = WebViewDatabase.getInstance(getApplicationContext()); - mainWebViewDatabase.clearFormData(); + // Consume the event. + return true; + } else if (menuItemId == R.id.clear_cookies) { // Clear cookies. + // Create a snackbar. + Snackbar.make(webViewPager, R.string.cookies_deleted, Snackbar.LENGTH_LONG) + .setAction(R.string.undo, v -> { + // Do nothing because everything will be handled by `onDismissed()` below. + }) + .addCallback(new Snackbar.Callback() { + @Override + public void onDismissed(Snackbar snackbar, int event) { + if (event != Snackbar.Callback.DISMISS_EVENT_ACTION) { // The snackbar was dismissed without the undo button being pushed. + // Delete the cookies, which command varies by SDK. + if (Build.VERSION.SDK_INT < 21) { + cookieManager.removeAllCookie(); + } else { + cookieManager.removeAllCookies(null); } } - }) - .show(); - - // Consume the event. - return true; - - case R.id.easylist: - // Toggle the EasyList status. - currentWebView.enableBlocklist(NestedScrollWebView.EASYLIST, !currentWebView.isBlocklistEnabled(NestedScrollWebView.EASYLIST)); - - // Update the menu checkbox. - menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.EASYLIST)); - - // Reload the current WebView. - currentWebView.reload(); - - // Consume the event. - return true; - - case R.id.easyprivacy: - // Toggle the EasyPrivacy status. - currentWebView.enableBlocklist(NestedScrollWebView.EASYPRIVACY, !currentWebView.isBlocklistEnabled(NestedScrollWebView.EASYPRIVACY)); - - // Update the menu checkbox. - menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.EASYPRIVACY)); - - // Reload the current WebView. - currentWebView.reload(); - - // Consume the event. - return true; - - case R.id.fanboys_annoyance_list: - // Toggle Fanboy's Annoyance List status. - currentWebView.enableBlocklist(NestedScrollWebView.FANBOYS_ANNOYANCE_LIST, !currentWebView.isBlocklistEnabled(NestedScrollWebView.FANBOYS_ANNOYANCE_LIST)); - - // Update the menu checkbox. - menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.FANBOYS_ANNOYANCE_LIST)); - - // Update the staus of Fanboy's Social Blocking List. - MenuItem fanboysSocialBlockingListMenuItem = optionsMenu.findItem(R.id.fanboys_social_blocking_list); - fanboysSocialBlockingListMenuItem.setEnabled(!currentWebView.isBlocklistEnabled(NestedScrollWebView.FANBOYS_ANNOYANCE_LIST)); - - // Reload the current WebView. - currentWebView.reload(); - - // Consume the event. - return true; - - case R.id.fanboys_social_blocking_list: - // Toggle Fanboy's Social Blocking List status. - currentWebView.enableBlocklist(NestedScrollWebView.FANBOYS_SOCIAL_BLOCKING_LIST, !currentWebView.isBlocklistEnabled(NestedScrollWebView.FANBOYS_SOCIAL_BLOCKING_LIST)); - - // Update the menu checkbox. - menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.FANBOYS_SOCIAL_BLOCKING_LIST)); - - // Reload the current WebView. - currentWebView.reload(); - - // Consume the event. - return true; - - case R.id.ultralist: - // Toggle the UltraList status. - currentWebView.enableBlocklist(NestedScrollWebView.ULTRALIST, !currentWebView.isBlocklistEnabled(NestedScrollWebView.ULTRALIST)); - - // Update the menu checkbox. - menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.ULTRALIST)); - - // Reload the current WebView. - currentWebView.reload(); - - // Consume the event. - return true; - - case R.id.ultraprivacy: - // Toggle the UltraPrivacy status. - currentWebView.enableBlocklist(NestedScrollWebView.ULTRAPRIVACY, !currentWebView.isBlocklistEnabled(NestedScrollWebView.ULTRAPRIVACY)); - - // Update the menu checkbox. - menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.ULTRAPRIVACY)); - - // Reload the current WebView. - currentWebView.reload(); - - // Consume the event. - return true; - - case R.id.block_all_third_party_requests: - //Toggle the third-party requests blocker status. - currentWebView.enableBlocklist(NestedScrollWebView.THIRD_PARTY_REQUESTS, !currentWebView.isBlocklistEnabled(NestedScrollWebView.THIRD_PARTY_REQUESTS)); - - // Update the menu checkbox. - menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.THIRD_PARTY_REQUESTS)); - - // Reload the current WebView. - currentWebView.reload(); - - // Consume the event. - return true; - - case R.id.proxy_none: - // Update the proxy mode. - proxyMode = ProxyHelper.NONE; - - // Apply the proxy mode. - applyProxy(true); - - // Consume the event. - return true; - - case R.id.proxy_tor: - // Update the proxy mode. - proxyMode = ProxyHelper.TOR; - - // Apply the proxy mode. - applyProxy(true); - - // Consume the event. - return true; - - case R.id.proxy_i2p: - // Update the proxy mode. - proxyMode = ProxyHelper.I2P; - - // Apply the proxy mode. - applyProxy(true); - - // Consume the event. - return true; - - case R.id.proxy_custom: - // Update the proxy mode. - proxyMode = ProxyHelper.CUSTOM; - - // Apply the proxy mode. - applyProxy(true); - - // Consume the event. - return true; - - case R.id.user_agent_privacy_browser: - // Update the user agent. - currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[0]); - - // Reload the current WebView. - currentWebView.reload(); - - // Consume the event. - return true; - - case R.id.user_agent_webview_default: - // Update the user agent. - currentWebView.getSettings().setUserAgentString(""); - - // Reload the current WebView. - currentWebView.reload(); - - // Consume the event. - return true; - - case R.id.user_agent_firefox_on_android: - // Update the user agent. - currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[2]); - - // Reload the current WebView. - currentWebView.reload(); - - // Consume the event. - return true; - - case R.id.user_agent_chrome_on_android: - // Update the user agent. - currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[3]); - - // Reload the current WebView. - currentWebView.reload(); - - // Consume the event. - return true; - - case R.id.user_agent_safari_on_ios: - // Update the user agent. - currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[4]); - - // Reload the current WebView. - currentWebView.reload(); - - // Consume the event. - return true; - - case R.id.user_agent_firefox_on_linux: - // Update the user agent. - currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[5]); + } + }) + .show(); - // Reload the current WebView. - currentWebView.reload(); + // Consume the event. + return true; + } else if (menuItemId == R.id.clear_dom_storage) { // Clear DOM storage. + // Create a snackbar. + Snackbar.make(webViewPager, R.string.dom_storage_deleted, Snackbar.LENGTH_LONG) + .setAction(R.string.undo, v -> { + // Do nothing because everything will be handled by `onDismissed()` below. + }) + .addCallback(new Snackbar.Callback() { + @Override + public void onDismissed(Snackbar snackbar, int event) { + if (event != Snackbar.Callback.DISMISS_EVENT_ACTION) { // The snackbar was dismissed without the undo button being pushed. + // Delete the DOM Storage. + WebStorage webStorage = WebStorage.getInstance(); + webStorage.deleteAllData(); + + // Initialize a handler to manually delete the DOM storage files and directories. + Handler deleteDomStorageHandler = new Handler(); + + // Setup a runnable to manually delete the DOM storage files and directories. + Runnable deleteDomStorageRunnable = () -> { + try { + // Get a handle for the runtime. + Runtime runtime = Runtime.getRuntime(); + + // Get the application's private data directory, which will be something like `/data/user/0/com.stoutner.privacybrowser.standard`, + // which links to `/data/data/com.stoutner.privacybrowser.standard`. + String privateDataDirectoryString = getApplicationInfo().dataDir; + + // A string array must be used because the directory contains a space and `Runtime.exec` will otherwise not escape the string correctly. + Process deleteLocalStorageProcess = runtime.exec(new String[]{"rm", "-rf", privateDataDirectoryString + "/app_webview/Local Storage/"}); + + // Multiple commands must be used because `Runtime.exec()` does not like `*`. + Process deleteIndexProcess = runtime.exec("rm -rf " + privateDataDirectoryString + "/app_webview/IndexedDB"); + Process deleteQuotaManagerProcess = runtime.exec("rm -f " + privateDataDirectoryString + "/app_webview/QuotaManager"); + Process deleteQuotaManagerJournalProcess = runtime.exec("rm -f " + privateDataDirectoryString + "/app_webview/QuotaManager-journal"); + Process deleteDatabasesProcess = runtime.exec("rm -rf " + privateDataDirectoryString + "/app_webview/databases"); + + // Wait for the processes to finish. + deleteLocalStorageProcess.waitFor(); + deleteIndexProcess.waitFor(); + deleteQuotaManagerProcess.waitFor(); + deleteQuotaManagerJournalProcess.waitFor(); + deleteDatabasesProcess.waitFor(); + } catch (Exception exception) { + // Do nothing if an error is thrown. + } + }; - // Consume the event. - return true; + // Manually delete the DOM storage files after 200 milliseconds. + deleteDomStorageHandler.postDelayed(deleteDomStorageRunnable, 200); + } + } + }) + .show(); - case R.id.user_agent_chromium_on_linux: - // Update the user agent. - currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[6]); + // Consume the event. + return true; + } else if (menuItemId == R.id.clear_form_data) { // Clear form data. This can be remove once the minimum API >= 26. + // Create a snackbar. + Snackbar.make(webViewPager, R.string.form_data_deleted, Snackbar.LENGTH_LONG) + .setAction(R.string.undo, v -> { + // Do nothing because everything will be handled by `onDismissed()` below. + }) + .addCallback(new Snackbar.Callback() { + @Override + public void onDismissed(Snackbar snackbar, int event) { + if (event != Snackbar.Callback.DISMISS_EVENT_ACTION) { // The snackbar was dismissed without the undo button being pushed. + // Get a handle for the webView database. + WebViewDatabase webViewDatabase = WebViewDatabase.getInstance(getApplicationContext()); + + // Delete the form data. + webViewDatabase.clearFormData(); + } + } + }) + .show(); - // Reload the current WebView. - currentWebView.reload(); + // Consume the event. + return true; + } else if (menuItemId == R.id.easylist) { // EasyList. + // Toggle the EasyList status. + currentWebView.enableBlocklist(NestedScrollWebView.EASYLIST, !currentWebView.isBlocklistEnabled(NestedScrollWebView.EASYLIST)); - // Consume the event. - return true; + // Update the menu checkbox. + menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.EASYLIST)); - case R.id.user_agent_firefox_on_windows: - // Update the user agent. - currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[7]); + // Reload the current WebView. + currentWebView.reload(); - // Reload the current WebView. - currentWebView.reload(); + // Consume the event. + return true; + } else if (menuItemId == R.id.easyprivacy) { // EasyPrivacy. + // Toggle the EasyPrivacy status. + currentWebView.enableBlocklist(NestedScrollWebView.EASYPRIVACY, !currentWebView.isBlocklistEnabled(NestedScrollWebView.EASYPRIVACY)); - // Consume the event. - return true; + // Update the menu checkbox. + menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.EASYPRIVACY)); - case R.id.user_agent_chrome_on_windows: - // Update the user agent. - currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[8]); + // Reload the current WebView. + currentWebView.reload(); - // Reload the current WebView. - currentWebView.reload(); + // Consume the event. + return true; + } else if (menuItemId == R.id.fanboys_annoyance_list) { // Fanboy's Annoyance List. + // Toggle Fanboy's Annoyance List status. + currentWebView.enableBlocklist(NestedScrollWebView.FANBOYS_ANNOYANCE_LIST, !currentWebView.isBlocklistEnabled(NestedScrollWebView.FANBOYS_ANNOYANCE_LIST)); - // Consume the event. - return true; + // Update the menu checkbox. + menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.FANBOYS_ANNOYANCE_LIST)); - case R.id.user_agent_edge_on_windows: - // Update the user agent. - currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[9]); + // Get a handle for the Fanboy's Social Block List menu item. + MenuItem fanboysSocialBlockingListMenuItem = optionsMenu.findItem(R.id.fanboys_social_blocking_list); - // Reload the current WebView. - currentWebView.reload(); + // Update the staus of Fanboy's Social Blocking List. + fanboysSocialBlockingListMenuItem.setEnabled(!currentWebView.isBlocklistEnabled(NestedScrollWebView.FANBOYS_ANNOYANCE_LIST)); - // Consume the event. - return true; + // Reload the current WebView. + currentWebView.reload(); - case R.id.user_agent_internet_explorer_on_windows: - // Update the user agent. - currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[10]); + // Consume the event. + return true; + } else if (menuItemId == R.id.fanboys_social_blocking_list) { // Fanboy's Social Blocking List. + // Toggle Fanboy's Social Blocking List status. + currentWebView.enableBlocklist(NestedScrollWebView.FANBOYS_SOCIAL_BLOCKING_LIST, !currentWebView.isBlocklistEnabled(NestedScrollWebView.FANBOYS_SOCIAL_BLOCKING_LIST)); - // Reload the current WebView. - currentWebView.reload(); + // Update the menu checkbox. + menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.FANBOYS_SOCIAL_BLOCKING_LIST)); - // Consume the event. - return true; + // Reload the current WebView. + currentWebView.reload(); - case R.id.user_agent_safari_on_macos: - // Update the user agent. - currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[11]); + // Consume the event. + return true; + } else if (menuItemId == R.id.ultralist) { // UltraList. + // Toggle the UltraList status. + currentWebView.enableBlocklist(NestedScrollWebView.ULTRALIST, !currentWebView.isBlocklistEnabled(NestedScrollWebView.ULTRALIST)); - // Reload the current WebView. - currentWebView.reload(); + // Update the menu checkbox. + menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.ULTRALIST)); - // Consume the event. - return true; + // Reload the current WebView. + currentWebView.reload(); - case R.id.user_agent_custom: - // Update the user agent. - currentWebView.getSettings().setUserAgentString(sharedPreferences.getString("custom_user_agent", getString(R.string.custom_user_agent_default_value))); + // Consume the event. + return true; + } else if (menuItemId == R.id.ultraprivacy) { // UltraPrivacy. + // Toggle the UltraPrivacy status. + currentWebView.enableBlocklist(NestedScrollWebView.ULTRAPRIVACY, !currentWebView.isBlocklistEnabled(NestedScrollWebView.ULTRAPRIVACY)); - // Reload the current WebView. - currentWebView.reload(); + // Update the menu checkbox. + menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.ULTRAPRIVACY)); - // Consume the event. - return true; + // Reload the current WebView. + currentWebView.reload(); - case R.id.font_size: - // Instantiate the font size dialog. - DialogFragment fontSizeDialogFragment = FontSizeDialog.displayDialog(currentWebView.getSettings().getTextZoom()); + // Consume the event. + return true; + } else if (menuItemId == R.id.block_all_third_party_requests) { // Block all third-party requests. + //Toggle the third-party requests blocker status. + currentWebView.enableBlocklist(NestedScrollWebView.THIRD_PARTY_REQUESTS, !currentWebView.isBlocklistEnabled(NestedScrollWebView.THIRD_PARTY_REQUESTS)); - // Show the font size dialog. - fontSizeDialogFragment.show(getSupportFragmentManager(), getString(R.string.font_size)); + // Update the menu checkbox. + menuItem.setChecked(currentWebView.isBlocklistEnabled(NestedScrollWebView.THIRD_PARTY_REQUESTS)); - // Consume the event. - return true; + // Reload the current WebView. + currentWebView.reload(); - case R.id.swipe_to_refresh: - // Toggle the stored status of swipe to refresh. - currentWebView.setSwipeToRefresh(!currentWebView.getSwipeToRefresh()); + // Consume the event. + return true; + } else if (menuItemId == R.id.proxy_none) { // Proxy - None. + // Update the proxy mode. + proxyMode = ProxyHelper.NONE; - // Get a handle for the swipe refresh layout. - SwipeRefreshLayout swipeRefreshLayout = findViewById(R.id.swiperefreshlayout); + // Apply the proxy mode. + applyProxy(true); - // Update the swipe refresh layout. - if (currentWebView.getSwipeToRefresh()) { // Swipe to refresh is enabled. - // Only enable the swipe refresh layout if the WebView is scrolled to the top. It is updated every time the scroll changes. - swipeRefreshLayout.setEnabled(currentWebView.getY() == 0); - } else { // Swipe to refresh is disabled. - // Disable the swipe refresh layout. - swipeRefreshLayout.setEnabled(false); - } + // Consume the event. + return true; + } else if (menuItemId == R.id.proxy_tor) { // Proxy - Tor. + // Update the proxy mode. + proxyMode = ProxyHelper.TOR; - // Consume the event. - return true; + // Apply the proxy mode. + applyProxy(true); - case R.id.wide_viewport: - // Toggle the viewport. - currentWebView.getSettings().setUseWideViewPort(!currentWebView.getSettings().getUseWideViewPort()); + // Consume the event. + return true; + } else if (menuItemId == R.id.proxy_i2p) { // Proxy - I2P. + // Update the proxy mode. + proxyMode = ProxyHelper.I2P; - // Consume the event. - return true; + // Apply the proxy mode. + applyProxy(true); - case R.id.display_images: - if (currentWebView.getSettings().getLoadsImagesAutomatically()) { // Images are currently loaded automatically. - // Disable loading of images. - currentWebView.getSettings().setLoadsImagesAutomatically(false); + // Consume the event. + return true; + } else if (menuItemId == R.id.proxy_custom) { // Proxy - Custom. + // Update the proxy mode. + proxyMode = ProxyHelper.CUSTOM; - // Reload the website to remove existing images. - currentWebView.reload(); - } else { // Images are not currently loaded automatically. - // Enable loading of images. Missing images will be loaded without the need for a reload. - currentWebView.getSettings().setLoadsImagesAutomatically(true); - } + // Apply the proxy mode. + applyProxy(true); - // Consume the event. - return true; + // Consume the event. + return true; + } else if (menuItemId == R.id.user_agent_privacy_browser) { // User Agent - Privacy Browser. + // Update the user agent. + currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[0]); - case R.id.dark_webview: - // Check to see if dark WebView is supported by this WebView. - if (WebViewFeature.isFeatureSupported(WebViewFeature.FORCE_DARK)) { - // Toggle the dark WebView setting. - if (WebSettingsCompat.getForceDark(currentWebView.getSettings()) == WebSettingsCompat.FORCE_DARK_ON) { // Dark WebView is currently enabled. - // Turn off dark WebView. - WebSettingsCompat.setForceDark(currentWebView.getSettings(), WebSettingsCompat.FORCE_DARK_OFF); - } else { // Dark WebView is currently disabled. - // turn on dark WebView. - WebSettingsCompat.setForceDark(currentWebView.getSettings(), WebSettingsCompat.FORCE_DARK_ON); - } - } + // Reload the current WebView. + currentWebView.reload(); - // Consume the event. - return true; + // Consume the event. + return true; + } else if (menuItemId == R.id.user_agent_webview_default) { // User Agent - WebView Default. + // Update the user agent. + currentWebView.getSettings().setUserAgentString(""); - case R.id.find_on_page: - // Get a handle for the views. - Toolbar toolbar = findViewById(R.id.toolbar); - LinearLayout findOnPageLinearLayout = findViewById(R.id.find_on_page_linearlayout); - EditText findOnPageEditText = findViewById(R.id.find_on_page_edittext); + // Reload the current WebView. + currentWebView.reload(); - // Set the minimum height of the find on page linear layout to match the toolbar. - findOnPageLinearLayout.setMinimumHeight(toolbar.getHeight()); + // Consume the event. + return true; + } else if (menuItemId == R.id.user_agent_firefox_on_android) { // User Agent - Firefox on Android. + // Update the user agent. + currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[2]); - // Hide the toolbar. - toolbar.setVisibility(View.GONE); + // Reload the current WebView. + currentWebView.reload(); - // Show the find on page linear layout. - findOnPageLinearLayout.setVisibility(View.VISIBLE); + // Consume the event. + return true; + } else if (menuItemId == R.id.user_agent_chrome_on_android) { // User Agent - Chrome on Android. + // Update the user agent. + currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[3]); - // Display the keyboard. The app must wait 200 ms before running the command to work around a bug in Android. - // http://stackoverflow.com/questions/5520085/android-show-softkeyboard-with-showsoftinput-is-not-working - findOnPageEditText.postDelayed(() -> { - // Set the focus on `findOnPageEditText`. - findOnPageEditText.requestFocus(); + // Reload the current WebView. + currentWebView.reload(); - // Get a handle for the input method manager. - InputMethodManager inputMethodManager = (InputMethodManager) getSystemService(Context.INPUT_METHOD_SERVICE); + // Consume the event. + return true; + } else if (menuItemId == R.id.user_agent_safari_on_ios) { // User Agent - Safari on iOS. + // Update the user agent. + currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[4]); - // Remove the lint warning below that the input method manager might be null. - assert inputMethodManager != null; + // Reload the current WebView. + currentWebView.reload(); - // Display the keyboard. `0` sets no input flags. - inputMethodManager.showSoftInput(findOnPageEditText, 0); - }, 200); + // Consume the event. + return true; + } else if (menuItemId == R.id.user_agent_firefox_on_linux) { // User Agent - Firefox on Linux. + // Update the user agent. + currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[5]); - // Consume the event. - return true; + // Reload the current WebView. + currentWebView.reload(); - case R.id.print: - // Get a print manager instance. - PrintManager printManager = (PrintManager) getSystemService(Context.PRINT_SERVICE); + // Consume the event. + return true; + } else if (menuItemId == R.id.user_agent_chromium_on_linux) { // User Agent - Chromium on Linux. + // Update the user agent. + currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[6]); - // Remove the lint error below that print manager might be null. - assert printManager != null; + // Reload the current WebView. + currentWebView.reload(); - // Create a print document adapter from the current WebView. - PrintDocumentAdapter printDocumentAdapter = currentWebView.createPrintDocumentAdapter(); + // Consume the event. + return true; + } else if (menuItemId == R.id.user_agent_firefox_on_windows) { // User Agent - Firefox on Windows. + // Update the user agent. + currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[7]); - // Print the document. - printManager.print(getString(R.string.privacy_browser_web_page), printDocumentAdapter, null); + // Reload the current WebView. + currentWebView.reload(); - // Consume the event. - return true; + // Consume the event. + return true; + } else if (menuItemId == R.id.user_agent_chrome_on_windows) { // User Agent - Chrome on Windows. + // Update the user agent. + currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[8]); - case R.id.save_url: - // Prepare the save dialog. The dialog will be displayed once the file size and the content disposition have been acquired. - new PrepareSaveDialog(this, this, getSupportFragmentManager(), StoragePermissionDialog.SAVE_URL, currentWebView.getSettings().getUserAgentString(), - currentWebView.getAcceptFirstPartyCookies()).execute(currentWebView.getCurrentUrl()); + // Reload the current WebView. + currentWebView.reload(); - // Consume the event. - return true; + // Consume the event. + return true; + } else if (menuItemId == R.id.user_agent_edge_on_windows) { // User Agent - Edge on Windows. + // Update the user agent. + currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[9]); - case R.id.save_archive: - // Instantiate the save dialog. - DialogFragment saveArchiveFragment = SaveWebpageDialog.saveWebpage(StoragePermissionDialog.SAVE_ARCHIVE, null, null, getString(R.string.webpage_mht), null, - false); + // Reload the current WebView. + currentWebView.reload(); - // Show the save dialog. It must be named `save_dialog` so that the file picker can update the file name. - saveArchiveFragment.show(getSupportFragmentManager(), getString(R.string.save_dialog)); + // Consume the event. + return true; + } else if (menuItemId == R.id.user_agent_internet_explorer_on_windows) { // User Agent - Internet Explorer on Windows. + // Update the user agent. + currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[10]); - // Consume the event. - return true; + // Reload the current WebView. + currentWebView.reload(); - case R.id.save_image: - // Instantiate the save dialog. - DialogFragment saveImageFragment = SaveWebpageDialog.saveWebpage(StoragePermissionDialog.SAVE_IMAGE, null, null, getString(R.string.webpage_png), null, - false); + // Consume the event. + return true; + } else if (menuItemId == R.id.user_agent_safari_on_macos) { // User Agent - Safari on macOS. + // Update the user agent. + currentWebView.getSettings().setUserAgentString(getResources().getStringArray(R.array.user_agent_data)[11]); - // Show the save dialog. It must be named `save_dialog` so that the file picker can update the file name. - saveImageFragment.show(getSupportFragmentManager(), getString(R.string.save_dialog)); + // Reload the current WebView. + currentWebView.reload(); - // Consume the event. - return true; + // Consume the event. + return true; + } else if (menuItemId == R.id.user_agent_custom) { // User Agent - Custom. + // Update the user agent. + currentWebView.getSettings().setUserAgentString(sharedPreferences.getString("custom_user_agent", getString(R.string.custom_user_agent_default_value))); - case R.id.add_to_homescreen: - // Instantiate the create home screen shortcut dialog. - DialogFragment createHomeScreenShortcutDialogFragment = CreateHomeScreenShortcutDialog.createDialog(currentWebView.getTitle(), currentWebView.getUrl(), - currentWebView.getFavoriteOrDefaultIcon()); + // Reload the current WebView. + currentWebView.reload(); - // Show the create home screen shortcut dialog. - createHomeScreenShortcutDialogFragment.show(getSupportFragmentManager(), getString(R.string.create_shortcut)); + // Consume the event. + return true; + } else if (menuItemId == R.id.font_size) { // Font size. + // Instantiate the font size dialog. + DialogFragment fontSizeDialogFragment = FontSizeDialog.displayDialog(currentWebView.getSettings().getTextZoom()); - // Consume the event. - return true; + // Show the font size dialog. + fontSizeDialogFragment.show(getSupportFragmentManager(), getString(R.string.font_size)); - case R.id.view_source: - // Create an intent to launch the view source activity. - Intent viewSourceIntent = new Intent(this, ViewSourceActivity.class); + // Consume the event. + return true; + } else if (menuItemId == R.id.swipe_to_refresh) { // Swipe to refresh. + // Toggle the stored status of swipe to refresh. + currentWebView.setSwipeToRefresh(!currentWebView.getSwipeToRefresh()); - // Add the variables to the intent. - viewSourceIntent.putExtra("user_agent", currentWebView.getSettings().getUserAgentString()); - viewSourceIntent.putExtra("current_url", currentWebView.getUrl()); + // Get a handle for the swipe refresh layout. + SwipeRefreshLayout swipeRefreshLayout = findViewById(R.id.swiperefreshlayout); - // Make it so. - startActivity(viewSourceIntent); + // Update the swipe refresh layout. + if (currentWebView.getSwipeToRefresh()) { // Swipe to refresh is enabled. + // Only enable the swipe refresh layout if the WebView is scrolled to the top. It is updated every time the scroll changes. + swipeRefreshLayout.setEnabled(currentWebView.getY() == 0); + } else { // Swipe to refresh is disabled. + // Disable the swipe refresh layout. + swipeRefreshLayout.setEnabled(false); + } - // Consume the event. - return true; + // Consume the event. + return true; + } else if (menuItemId == R.id.wide_viewport) { // Wide viewport. + // Toggle the viewport. + currentWebView.getSettings().setUseWideViewPort(!currentWebView.getSettings().getUseWideViewPort()); - case R.id.share_url: - // Setup the share string. - String shareString = currentWebView.getTitle() + " – " + currentWebView.getUrl(); + // Consume the event. + return true; + } else if (menuItemId == R.id.display_images) { // Display images. + // Toggle the displaying of images. + if (currentWebView.getSettings().getLoadsImagesAutomatically()) { // Images are currently loaded automatically. + // Disable loading of images. + currentWebView.getSettings().setLoadsImagesAutomatically(false); - // Create the share intent. - Intent shareIntent = new Intent(Intent.ACTION_SEND); + // Reload the website to remove existing images. + currentWebView.reload(); + } else { // Images are not currently loaded automatically. + // Enable loading of images. Missing images will be loaded without the need for a reload. + currentWebView.getSettings().setLoadsImagesAutomatically(true); + } - // Add the share string to the intent. - shareIntent.putExtra(Intent.EXTRA_TEXT, shareString); + // Consume the event. + return true; + } else if (menuItemId == R.id.dark_webview) { // Dark WebView. + // Check to see if dark WebView is supported by this WebView. + if (WebViewFeature.isFeatureSupported(WebViewFeature.FORCE_DARK)) { + // Toggle the dark WebView setting. + if (WebSettingsCompat.getForceDark(currentWebView.getSettings()) == WebSettingsCompat.FORCE_DARK_ON) { // Dark WebView is currently enabled. + // Turn off dark WebView. + WebSettingsCompat.setForceDark(currentWebView.getSettings(), WebSettingsCompat.FORCE_DARK_OFF); + } else { // Dark WebView is currently disabled. + // Turn on dark WebView. + WebSettingsCompat.setForceDark(currentWebView.getSettings(), WebSettingsCompat.FORCE_DARK_ON); + } + } - // Set the MIME type. - shareIntent.setType("text/plain"); + // Consume the event. + return true; + } else if (menuItemId == R.id.find_on_page) { // Find on page. + // Get a handle for the views. + Toolbar toolbar = findViewById(R.id.toolbar); + LinearLayout findOnPageLinearLayout = findViewById(R.id.find_on_page_linearlayout); + EditText findOnPageEditText = findViewById(R.id.find_on_page_edittext); - // Set the intent to open in a new task. - shareIntent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK); + // Set the minimum height of the find on page linear layout to match the toolbar. + findOnPageLinearLayout.setMinimumHeight(toolbar.getHeight()); - // Make it so. - startActivity(Intent.createChooser(shareIntent, getString(R.string.share_url))); + // Hide the toolbar. + toolbar.setVisibility(View.GONE); - // Consume the event. - return true; + // Show the find on page linear layout. + findOnPageLinearLayout.setVisibility(View.VISIBLE); - case R.id.open_with_app: - // Open the URL with an outside app. - openWithApp(currentWebView.getUrl()); + // Display the keyboard. The app must wait 200 ms before running the command to work around a bug in Android. + // http://stackoverflow.com/questions/5520085/android-show-softkeyboard-with-showsoftinput-is-not-working + findOnPageEditText.postDelayed(() -> { + // Set the focus on the find on page edit text. + findOnPageEditText.requestFocus(); - // Consume the event. - return true; + // Get a handle for the input method manager. + InputMethodManager inputMethodManager = (InputMethodManager) getSystemService(Context.INPUT_METHOD_SERVICE); - case R.id.open_with_browser: - // Open the URL with an outside browser. - openWithBrowser(currentWebView.getUrl()); + // Remove the lint warning below that the input method manager might be null. + assert inputMethodManager != null; - // Consume the event. - return true; + // Display the keyboard. `0` sets no input flags. + inputMethodManager.showSoftInput(findOnPageEditText, 0); + }, 200); - case R.id.add_or_edit_domain: - if (currentWebView.getDomainSettingsApplied()) { // Edit the current domain settings. - // Reapply the domain settings on returning to `MainWebViewActivity`. - reapplyDomainSettingsOnRestart = true; - - // Create an intent to launch the domains activity. - Intent domainsIntent = new Intent(this, DomainsActivity.class); - - // Add the extra information to the intent. - domainsIntent.putExtra("load_domain", currentWebView.getDomainSettingsDatabaseId()); - domainsIntent.putExtra("close_on_back", true); - domainsIntent.putExtra("current_url", currentWebView.getUrl()); - - // Get the current certificate. - SslCertificate sslCertificate = currentWebView.getCertificate(); - - // Check to see if the SSL certificate is populated. - if (sslCertificate != null) { - // Extract the certificate to strings. - String issuedToCName = sslCertificate.getIssuedTo().getCName(); - String issuedToOName = sslCertificate.getIssuedTo().getOName(); - String issuedToUName = sslCertificate.getIssuedTo().getUName(); - String issuedByCName = sslCertificate.getIssuedBy().getCName(); - String issuedByOName = sslCertificate.getIssuedBy().getOName(); - String issuedByUName = sslCertificate.getIssuedBy().getUName(); - long startDateLong = sslCertificate.getValidNotBeforeDate().getTime(); - long endDateLong = sslCertificate.getValidNotAfterDate().getTime(); - - // Add the certificate to the intent. - domainsIntent.putExtra("ssl_issued_to_cname", issuedToCName); - domainsIntent.putExtra("ssl_issued_to_oname", issuedToOName); - domainsIntent.putExtra("ssl_issued_to_uname", issuedToUName); - domainsIntent.putExtra("ssl_issued_by_cname", issuedByCName); - domainsIntent.putExtra("ssl_issued_by_oname", issuedByOName); - domainsIntent.putExtra("ssl_issued_by_uname", issuedByUName); - domainsIntent.putExtra("ssl_start_date", startDateLong); - domainsIntent.putExtra("ssl_end_date", endDateLong); - } + // Consume the event. + return true; + } else if (menuItemId == R.id.print) { // Print. + // Get a print manager instance. + PrintManager printManager = (PrintManager) getSystemService(Context.PRINT_SERVICE); - // Check to see if the current IP addresses have been received. - if (currentWebView.hasCurrentIpAddresses()) { - // Add the current IP addresses to the intent. - domainsIntent.putExtra("current_ip_addresses", currentWebView.getCurrentIpAddresses()); - } + // Remove the lint error below that print manager might be null. + assert printManager != null; - // Make it so. - startActivity(domainsIntent); - } else { // Add a new domain. - // Apply the new domain settings on returning to `MainWebViewActivity`. - reapplyDomainSettingsOnRestart = true; - - // Get the current domain - Uri currentUri = Uri.parse(currentWebView.getUrl()); - String currentDomain = currentUri.getHost(); - - // Initialize the database handler. The `0` specifies the database version, but that is ignored and set instead using a constant in `DomainsDatabaseHelper`. - DomainsDatabaseHelper domainsDatabaseHelper = new DomainsDatabaseHelper(this, null, null, 0); - - // Create the domain and store the database ID. - int newDomainDatabaseId = domainsDatabaseHelper.addDomain(currentDomain); - - // Create an intent to launch the domains activity. - Intent domainsIntent = new Intent(this, DomainsActivity.class); - - // Add the extra information to the intent. - domainsIntent.putExtra("load_domain", newDomainDatabaseId); - domainsIntent.putExtra("close_on_back", true); - domainsIntent.putExtra("current_url", currentWebView.getUrl()); - - // Get the current certificate. - SslCertificate sslCertificate = currentWebView.getCertificate(); - - // Check to see if the SSL certificate is populated. - if (sslCertificate != null) { - // Extract the certificate to strings. - String issuedToCName = sslCertificate.getIssuedTo().getCName(); - String issuedToOName = sslCertificate.getIssuedTo().getOName(); - String issuedToUName = sslCertificate.getIssuedTo().getUName(); - String issuedByCName = sslCertificate.getIssuedBy().getCName(); - String issuedByOName = sslCertificate.getIssuedBy().getOName(); - String issuedByUName = sslCertificate.getIssuedBy().getUName(); - long startDateLong = sslCertificate.getValidNotBeforeDate().getTime(); - long endDateLong = sslCertificate.getValidNotAfterDate().getTime(); - - // Add the certificate to the intent. - domainsIntent.putExtra("ssl_issued_to_cname", issuedToCName); - domainsIntent.putExtra("ssl_issued_to_oname", issuedToOName); - domainsIntent.putExtra("ssl_issued_to_uname", issuedToUName); - domainsIntent.putExtra("ssl_issued_by_cname", issuedByCName); - domainsIntent.putExtra("ssl_issued_by_oname", issuedByOName); - domainsIntent.putExtra("ssl_issued_by_uname", issuedByUName); - domainsIntent.putExtra("ssl_start_date", startDateLong); - domainsIntent.putExtra("ssl_end_date", endDateLong); - } + // Create a print document adapter from the current WebView. + PrintDocumentAdapter printDocumentAdapter = currentWebView.createPrintDocumentAdapter(); - // Check to see if the current IP addresses have been received. - if (currentWebView.hasCurrentIpAddresses()) { - // Add the current IP addresses to the intent. - domainsIntent.putExtra("current_ip_addresses", currentWebView.getCurrentIpAddresses()); - } + // Print the document. + printManager.print(getString(R.string.privacy_browser_web_page), printDocumentAdapter, null); - // Make it so. - startActivity(domainsIntent); - } + // Consume the event. + return true; + } else if (menuItemId == R.id.save_url) { // Save URL. + // Prepare the save dialog. The dialog will be displayed once the file size and the content disposition have been acquired. + new PrepareSaveDialog(this, this, getSupportFragmentManager(), StoragePermissionDialog.SAVE_URL, currentWebView.getSettings().getUserAgentString(), + currentWebView.getAcceptFirstPartyCookies()).execute(currentWebView.getCurrentUrl()); - // Consume the event. - return true; + // Consume the event. + return true; + } else if (menuItemId == R.id.save_archive) { // Save archive. + // Instantiate the save dialog. + DialogFragment saveArchiveFragment = SaveWebpageDialog.saveWebpage(StoragePermissionDialog.SAVE_ARCHIVE, null, null, getString(R.string.webpage_mht), null, + false); - case R.id.ad_consent: - // Instantiate the ad consent dialog. - DialogFragment adConsentDialogFragment = new AdConsentDialog(); + // Show the save dialog. It must be named `save_dialog` so that the file picker can update the file name. + saveArchiveFragment.show(getSupportFragmentManager(), getString(R.string.save_dialog)); - // Display the ad consent dialog. - adConsentDialogFragment.show(getSupportFragmentManager(), getString(R.string.ad_consent)); + // Consume the event. + return true; + } else if (menuItemId == R.id.save_image) { // Save image. + // Instantiate the save dialog. + DialogFragment saveImageFragment = SaveWebpageDialog.saveWebpage(StoragePermissionDialog.SAVE_IMAGE, null, null, getString(R.string.webpage_png), null, + false); - // Consume the event. - return true; + // Show the save dialog. It must be named `save_dialog` so that the file picker can update the file name. + saveImageFragment.show(getSupportFragmentManager(), getString(R.string.save_dialog)); - default: - // Don't consume the event. - return super.onOptionsItemSelected(menuItem); - } - } + // Consume the event. + return true; + } else if (menuItemId == R.id.add_to_homescreen) { // Add to homescreen. + // Instantiate the create home screen shortcut dialog. + DialogFragment createHomeScreenShortcutDialogFragment = CreateHomeScreenShortcutDialog.createDialog(currentWebView.getTitle(), currentWebView.getUrl(), + currentWebView.getFavoriteOrDefaultIcon()); - // removeAllCookies is deprecated, but it is required for API < 21. - @Override - public boolean onNavigationItemSelected(@NonNull MenuItem menuItem) { - // Get the menu item ID. - int menuItemId = menuItem.getItemId(); + // Show the create home screen shortcut dialog. + createHomeScreenShortcutDialogFragment.show(getSupportFragmentManager(), getString(R.string.create_shortcut)); - // Get a handle for the shared preferences. - SharedPreferences sharedPreferences = PreferenceManager.getDefaultSharedPreferences(this); + // Consume the event. + return true; + } else if (menuItemId == R.id.view_source) { // View source. + // Create an intent to launch the view source activity. + Intent viewSourceIntent = new Intent(this, ViewSourceActivity.class); - // Run the commands that correspond to the selected menu item. - switch (menuItemId) { - case R.id.clear_and_exit: - // Clear and exit Privacy Browser. - clearAndExit(); - break; + // Add the variables to the intent. + viewSourceIntent.putExtra("user_agent", currentWebView.getSettings().getUserAgentString()); + viewSourceIntent.putExtra("current_url", currentWebView.getUrl()); - case R.id.home: - // Load the homepage. - loadUrl(currentWebView, sharedPreferences.getString("homepage", getString(R.string.homepage_default_value))); - break; + // Make it so. + startActivity(viewSourceIntent); - case R.id.back: - if (currentWebView.canGoBack()) { - // Get the current web back forward list. - WebBackForwardList webBackForwardList = currentWebView.copyBackForwardList(); + // Consume the event. + return true; + } else if (menuItemId == R.id.share_url) { // Share URL. + // Setup the share string. + String shareString = currentWebView.getTitle() + " – " + currentWebView.getUrl(); - // Get the previous entry URL. - String previousUrl = webBackForwardList.getItemAtIndex(webBackForwardList.getCurrentIndex() - 1).getUrl(); + // Create the share intent. + Intent shareIntent = new Intent(Intent.ACTION_SEND); - // Apply the domain settings. - applyDomainSettings(currentWebView, previousUrl, false, false, false); + // Add the share string to the intent. + shareIntent.putExtra(Intent.EXTRA_TEXT, shareString); - // Load the previous website in the history. - currentWebView.goBack(); - } - break; + // Set the MIME type. + shareIntent.setType("text/plain"); - case R.id.forward: - if (currentWebView.canGoForward()) { - // Get the current web back forward list. - WebBackForwardList webBackForwardList = currentWebView.copyBackForwardList(); + // Set the intent to open in a new task. + shareIntent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK); - // Get the next entry URL. - String nextUrl = webBackForwardList.getItemAtIndex(webBackForwardList.getCurrentIndex() + 1).getUrl(); + // Make it so. + startActivity(Intent.createChooser(shareIntent, getString(R.string.share_url))); - // Apply the domain settings. - applyDomainSettings(currentWebView, nextUrl, false, false, false); + // Consume the event. + return true; + } else if (menuItemId == R.id.open_with_app) { // Open with app. + // Open the URL with an outside app. + openWithApp(currentWebView.getUrl()); - // Load the next website in the history. - currentWebView.goForward(); - } - break; + // Consume the event. + return true; + } else if (menuItemId == R.id.open_with_browser) { // Open with browser. + // Open the URL with an outside browser. + openWithBrowser(currentWebView.getUrl()); - case R.id.history: - // Instantiate the URL history dialog. - DialogFragment urlHistoryDialogFragment = UrlHistoryDialog.loadBackForwardList(currentWebView.getWebViewFragmentId()); + // Consume the event. + return true; + } else if (menuItemId == R.id.add_or_edit_domain) { // Add or edit domain. + // Check if domain settings currently exist. + if (currentWebView.getDomainSettingsApplied()) { // Edit the current domain settings. + // Reapply the domain settings on returning to `MainWebViewActivity`. + reapplyDomainSettingsOnRestart = true; - // Show the URL history dialog. - urlHistoryDialogFragment.show(getSupportFragmentManager(), getString(R.string.history)); - break; + // Create an intent to launch the domains activity. + Intent domainsIntent = new Intent(this, DomainsActivity.class); - case R.id.open: - // Instantiate the open file dialog. - DialogFragment openDialogFragment = new OpenDialog(); + // Add the extra information to the intent. + domainsIntent.putExtra("load_domain", currentWebView.getDomainSettingsDatabaseId()); + domainsIntent.putExtra("close_on_back", true); + domainsIntent.putExtra("current_url", currentWebView.getUrl()); - // Show the open file dialog. - openDialogFragment.show(getSupportFragmentManager(), getString(R.string.open)); - break; + // Get the current certificate. + SslCertificate sslCertificate = currentWebView.getCertificate(); - case R.id.requests: - // Populate the resource requests. - RequestsActivity.resourceRequests = currentWebView.getResourceRequests(); + // Check to see if the SSL certificate is populated. + if (sslCertificate != null) { + // Extract the certificate to strings. + String issuedToCName = sslCertificate.getIssuedTo().getCName(); + String issuedToOName = sslCertificate.getIssuedTo().getOName(); + String issuedToUName = sslCertificate.getIssuedTo().getUName(); + String issuedByCName = sslCertificate.getIssuedBy().getCName(); + String issuedByOName = sslCertificate.getIssuedBy().getOName(); + String issuedByUName = sslCertificate.getIssuedBy().getUName(); + long startDateLong = sslCertificate.getValidNotBeforeDate().getTime(); + long endDateLong = sslCertificate.getValidNotAfterDate().getTime(); - // Create an intent to launch the Requests activity. - Intent requestsIntent = new Intent(this, RequestsActivity.class); + // Add the certificate to the intent. + domainsIntent.putExtra("ssl_issued_to_cname", issuedToCName); + domainsIntent.putExtra("ssl_issued_to_oname", issuedToOName); + domainsIntent.putExtra("ssl_issued_to_uname", issuedToUName); + domainsIntent.putExtra("ssl_issued_by_cname", issuedByCName); + domainsIntent.putExtra("ssl_issued_by_oname", issuedByOName); + domainsIntent.putExtra("ssl_issued_by_uname", issuedByUName); + domainsIntent.putExtra("ssl_start_date", startDateLong); + domainsIntent.putExtra("ssl_end_date", endDateLong); + } - // Add the block third-party requests status to the intent. - requestsIntent.putExtra("block_all_third_party_requests", currentWebView.isBlocklistEnabled(NestedScrollWebView.THIRD_PARTY_REQUESTS)); + // Check to see if the current IP addresses have been received. + if (currentWebView.hasCurrentIpAddresses()) { + // Add the current IP addresses to the intent. + domainsIntent.putExtra("current_ip_addresses", currentWebView.getCurrentIpAddresses()); + } // Make it so. - startActivity(requestsIntent); - break; - - case R.id.downloads: - // Launch the system Download Manager. - Intent downloadManagerIntent = new Intent(DownloadManager.ACTION_VIEW_DOWNLOADS); + startActivity(domainsIntent); + } else { // Add a new domain. + // Apply the new domain settings on returning to `MainWebViewActivity`. + reapplyDomainSettingsOnRestart = true; - // Launch as a new task so that Download Manager and Privacy Browser show as separate windows in the recent tasks list. - downloadManagerIntent.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK); + // Get the current domain + Uri currentUri = Uri.parse(currentWebView.getUrl()); + String currentDomain = currentUri.getHost(); - // Make it so. - startActivity(downloadManagerIntent); - break; + // Initialize the database handler. The `0` specifies the database version, but that is ignored and set instead using a constant in `DomainsDatabaseHelper`. + DomainsDatabaseHelper domainsDatabaseHelper = new DomainsDatabaseHelper(this, null, null, 0); - case R.id.domains: - // Set the flag to reapply the domain settings on restart when returning from Domain Settings. - reapplyDomainSettingsOnRestart = true; + // Create the domain and store the database ID. + int newDomainDatabaseId = domainsDatabaseHelper.addDomain(currentDomain); - // Launch the domains activity. + // Create an intent to launch the domains activity. Intent domainsIntent = new Intent(this, DomainsActivity.class); // Add the extra information to the intent. + domainsIntent.putExtra("load_domain", newDomainDatabaseId); + domainsIntent.putExtra("close_on_back", true); domainsIntent.putExtra("current_url", currentWebView.getUrl()); // Get the current certificate. @@ -2049,52 +1844,189 @@ public class MainWebViewActivity extends AppCompatActivity implements CreateBook // Make it so. startActivity(domainsIntent); - break; + } - case R.id.settings: - // Set the flag to reapply app settings on restart when returning from Settings. - reapplyAppSettingsOnRestart = true; + // Consume the event. + return true; + } else if (menuItemId == R.id.ad_consent) { // Ad consent. + // Instantiate the ad consent dialog. + DialogFragment adConsentDialogFragment = new AdConsentDialog(); - // Set the flag to reapply the domain settings on restart when returning from Settings. - reapplyDomainSettingsOnRestart = true; + // Display the ad consent dialog. + adConsentDialogFragment.show(getSupportFragmentManager(), getString(R.string.ad_consent)); - // Launch the settings activity. - Intent settingsIntent = new Intent(this, SettingsActivity.class); - startActivity(settingsIntent); - break; + // Consume the event. + return true; + } else { // There is no match with the options menu. Pass the event up to the parent method. + // Don't consume the event. + return super.onOptionsItemSelected(menuItem); + } + } - case R.id.import_export: - // Launch the import/export activity. - Intent importExportIntent = new Intent (this, ImportExportActivity.class); - startActivity(importExportIntent); - break; + // removeAllCookies is deprecated, but it is required for API < 21. + @Override + public boolean onNavigationItemSelected(@NonNull MenuItem menuItem) { + // Get a handle for the shared preferences. + SharedPreferences sharedPreferences = PreferenceManager.getDefaultSharedPreferences(this); - case R.id.logcat: - // Launch the logcat activity. - Intent logcatIntent = new Intent(this, LogcatActivity.class); - startActivity(logcatIntent); - break; + // Get the menu item ID. + int menuItemId = menuItem.getItemId(); - case R.id.guide: - // Launch `GuideActivity`. - Intent guideIntent = new Intent(this, GuideActivity.class); - startActivity(guideIntent); - break; + // Run the commands that correspond to the selected menu item. + if (menuItemId == R.id.clear_and_exit) { // Clear and exit. + // Clear and exit Privacy Browser. + clearAndExit(); + } else if (menuItemId == R.id.home) { // Home. + // Load the homepage. + loadUrl(currentWebView, sharedPreferences.getString("homepage", getString(R.string.homepage_default_value))); + } else if (menuItemId == R.id.back) { // Back. + // Check if the WebView can go back. + if (currentWebView.canGoBack()) { + // Get the current web back forward list. + WebBackForwardList webBackForwardList = currentWebView.copyBackForwardList(); + + // Get the previous entry URL. + String previousUrl = webBackForwardList.getItemAtIndex(webBackForwardList.getCurrentIndex() - 1).getUrl(); + + // Apply the domain settings. + applyDomainSettings(currentWebView, previousUrl, false, false, false); + + // Load the previous website in the history. + currentWebView.goBack(); + } + } else if (menuItemId == R.id.forward) { // Forward. + // Check if the WebView can go forward. + if (currentWebView.canGoForward()) { + // Get the current web back forward list. + WebBackForwardList webBackForwardList = currentWebView.copyBackForwardList(); - case R.id.about: - // Create an intent to launch the about activity. - Intent aboutIntent = new Intent(this, AboutActivity.class); + // Get the next entry URL. + String nextUrl = webBackForwardList.getItemAtIndex(webBackForwardList.getCurrentIndex() + 1).getUrl(); - // Create a string array for the blocklist versions. - String[] blocklistVersions = new String[] {easyList.get(0).get(0)[0], easyPrivacy.get(0).get(0)[0], fanboysAnnoyanceList.get(0).get(0)[0], fanboysSocialList.get(0).get(0)[0], - ultraList.get(0).get(0)[0], ultraPrivacy.get(0).get(0)[0]}; + // Apply the domain settings. + applyDomainSettings(currentWebView, nextUrl, false, false, false); - // Add the blocklist versions to the intent. - aboutIntent.putExtra("blocklist_versions", blocklistVersions); + // Load the next website in the history. + currentWebView.goForward(); + } + } else if (menuItemId == R.id.history) { // History. + // Instantiate the URL history dialog. + DialogFragment urlHistoryDialogFragment = UrlHistoryDialog.loadBackForwardList(currentWebView.getWebViewFragmentId()); - // Make it so. - startActivity(aboutIntent); - break; + // Show the URL history dialog. + urlHistoryDialogFragment.show(getSupportFragmentManager(), getString(R.string.history)); + } else if (menuItemId == R.id.open) { // Open. + // Instantiate the open file dialog. + DialogFragment openDialogFragment = new OpenDialog(); + + // Show the open file dialog. + openDialogFragment.show(getSupportFragmentManager(), getString(R.string.open)); + } else if (menuItemId == R.id.requests) { // Requests. + // Populate the resource requests. + RequestsActivity.resourceRequests = currentWebView.getResourceRequests(); + + // Create an intent to launch the Requests activity. + Intent requestsIntent = new Intent(this, RequestsActivity.class); + + // Add the block third-party requests status to the intent. + requestsIntent.putExtra("block_all_third_party_requests", currentWebView.isBlocklistEnabled(NestedScrollWebView.THIRD_PARTY_REQUESTS)); + + // Make it so. + startActivity(requestsIntent); + } else if (menuItemId == R.id.downloads) { // Downloads. + // Launch the system Download Manager. + Intent downloadManagerIntent = new Intent(DownloadManager.ACTION_VIEW_DOWNLOADS); + + // Launch as a new task so that Download Manager and Privacy Browser show as separate windows in the recent tasks list. + downloadManagerIntent.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK); + + // Make it so. + startActivity(downloadManagerIntent); + } else if (menuItemId == R.id.domains) { // Domains. + // Set the flag to reapply the domain settings on restart when returning from Domain Settings. + reapplyDomainSettingsOnRestart = true; + + // Launch the domains activity. + Intent domainsIntent = new Intent(this, DomainsActivity.class); + + // Add the extra information to the intent. + domainsIntent.putExtra("current_url", currentWebView.getUrl()); + + // Get the current certificate. + SslCertificate sslCertificate = currentWebView.getCertificate(); + + // Check to see if the SSL certificate is populated. + if (sslCertificate != null) { + // Extract the certificate to strings. + String issuedToCName = sslCertificate.getIssuedTo().getCName(); + String issuedToOName = sslCertificate.getIssuedTo().getOName(); + String issuedToUName = sslCertificate.getIssuedTo().getUName(); + String issuedByCName = sslCertificate.getIssuedBy().getCName(); + String issuedByOName = sslCertificate.getIssuedBy().getOName(); + String issuedByUName = sslCertificate.getIssuedBy().getUName(); + long startDateLong = sslCertificate.getValidNotBeforeDate().getTime(); + long endDateLong = sslCertificate.getValidNotAfterDate().getTime(); + + // Add the certificate to the intent. + domainsIntent.putExtra("ssl_issued_to_cname", issuedToCName); + domainsIntent.putExtra("ssl_issued_to_oname", issuedToOName); + domainsIntent.putExtra("ssl_issued_to_uname", issuedToUName); + domainsIntent.putExtra("ssl_issued_by_cname", issuedByCName); + domainsIntent.putExtra("ssl_issued_by_oname", issuedByOName); + domainsIntent.putExtra("ssl_issued_by_uname", issuedByUName); + domainsIntent.putExtra("ssl_start_date", startDateLong); + domainsIntent.putExtra("ssl_end_date", endDateLong); + } + + // Check to see if the current IP addresses have been received. + if (currentWebView.hasCurrentIpAddresses()) { + // Add the current IP addresses to the intent. + domainsIntent.putExtra("current_ip_addresses", currentWebView.getCurrentIpAddresses()); + } + + // Make it so. + startActivity(domainsIntent); + } else if (menuItemId == R.id.settings) { // Settings. + // Set the flag to reapply app settings on restart when returning from Settings. + reapplyAppSettingsOnRestart = true; + + // Set the flag to reapply the domain settings on restart when returning from Settings. + reapplyDomainSettingsOnRestart = true; + + // Launch the settings activity. + Intent settingsIntent = new Intent(this, SettingsActivity.class); + startActivity(settingsIntent); + } else if (menuItemId == R.id.import_export) { // Import/Export. + // Create an intent to launch the import/export activity. + Intent importExportIntent = new Intent(this, ImportExportActivity.class); + + // Make it so. + startActivity(importExportIntent); + } else if (menuItemId == R.id.logcat) { // Logcat. + // Create an intent to launch the logcat activity. + Intent logcatIntent = new Intent(this, LogcatActivity.class); + + // Make it so. + startActivity(logcatIntent); + } else if (menuItemId == R.id.guide) { // Guide. + // Create an intent to launch the guide activity. + Intent guideIntent = new Intent(this, GuideActivity.class); + + // Make it so. + startActivity(guideIntent); + } else if (menuItemId == R.id.about) { // About + // Create an intent to launch the about activity. + Intent aboutIntent = new Intent(this, AboutActivity.class); + + // Create a string array for the blocklist versions. + String[] blocklistVersions = new String[]{easyList.get(0).get(0)[0], easyPrivacy.get(0).get(0)[0], fanboysAnnoyanceList.get(0).get(0)[0], fanboysSocialList.get(0).get(0)[0], + ultraList.get(0).get(0)[0], ultraPrivacy.get(0).get(0)[0]}; + + // Add the blocklist versions to the intent. + aboutIntent.putExtra("blocklist_versions", blocklistVersions); + + // Make it so. + startActivity(aboutIntent); } // Close the navigation drawer. @@ -2560,13 +2492,16 @@ public class MainWebViewActivity extends AppCompatActivity implements CreateBook @Override public void onSaveBookmarkFolder(DialogFragment dialogFragment, int selectedFolderDatabaseId, Bitmap favoriteIconBitmap) { + // Remove the incorrect lint warning below that the dialog fragment might be null. + assert dialogFragment != null; + // Get the dialog. Dialog dialog = dialogFragment.getDialog(); // Remove the incorrect lint warning below that the dialog might be null. assert dialog != null; - // Get handles for the views from `dialogFragment`. + // Get handles for the views from the dialog. EditText editFolderNameEditText = dialog.findViewById(R.id.edit_folder_name_edittext); RadioButton currentFolderIconRadioButton = dialog.findViewById(R.id.edit_folder_current_icon_radiobutton); RadioButton defaultFolderIconRadioButton = dialog.findViewById(R.id.edit_folder_default_icon_radiobutton); @@ -2951,6 +2886,9 @@ public class MainWebViewActivity extends AppCompatActivity implements CreateBook @Override public void onApplyNewFontSize(DialogFragment dialogFragment) { + // Remove the incorrect lint warning below that the dialog fragment might be null. + assert dialogFragment != null; + // Get the dialog. Dialog dialog = dialogFragment.getDialog(); @@ -6208,22 +6146,19 @@ public class MainWebViewActivity extends AppCompatActivity implements CreateBook // Reset the requests counters. nestedScrollWebView.resetRequestsCounters(); - // Hide the keyboard. - inputMethodManager.hideSoftInputFromWindow(nestedScrollWebView.getWindowToken(), 0); - // Get the current page position. int currentPagePosition = webViewPagerAdapter.getPositionForId(nestedScrollWebView.getWebViewFragmentId()); - // Update the URL text bar if the page is currently selected. - if (tabLayout.getSelectedTabPosition() == currentPagePosition) { - // Clear the focus from the URL edit text. - urlEditText.clearFocus(); - + // Update the URL text bar if the page is currently selected and the URL edit text is not currently being edited. + if ((tabLayout.getSelectedTabPosition() == currentPagePosition) && !urlEditText.hasFocus()) { // Display the formatted URL text. urlEditText.setText(url); // Apply text highlighting to `urlTextBox`. highlightUrlText(); + + // Hide the keyboard. + inputMethodManager.hideSoftInputFromWindow(nestedScrollWebView.getWindowToken(), 0); } // Reset the list of host IP addresses. @@ -6483,6 +6418,10 @@ public class MainWebViewActivity extends AppCompatActivity implements CreateBook } else if (launchingIntentUriData != null){ // The intent contains a URL. // Store the URL. urlToLoadString = launchingIntentUriData.toString(); + + // Reset the intent. This prevents a duplicate tab from being created on a subsequent restart if loading an link from a new intent on restart. + // For example, this prevents a duplicate tab if a link is loaded from the Guide after changing the theme in the guide and then changing the theme again in the main activity. + setIntent(new Intent()); } else if (!url.equals("")) { // The activity has been restarted. // Load the saved URL. urlToLoadString = url; diff --git a/app/src/main/java/com/stoutner/privacybrowser/adapters/AboutPagerAdapter.java b/app/src/main/java/com/stoutner/privacybrowser/adapters/AboutPagerAdapter.java index 0a506709..27f97290 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/adapters/AboutPagerAdapter.java +++ b/app/src/main/java/com/stoutner/privacybrowser/adapters/AboutPagerAdapter.java @@ -34,9 +34,9 @@ import java.util.LinkedList; public class AboutPagerAdapter extends FragmentPagerAdapter { // Define the class variables. - private Context context; - private String[] blocklistVersions; - private LinkedList aboutFragmentList = new LinkedList<>(); + private final Context context; + private final String[] blocklistVersions; + private final LinkedList aboutFragmentList = new LinkedList<>(); public AboutPagerAdapter(FragmentManager fragmentManager, Context context, String[] blocklistVersions) { // Run the default commands. diff --git a/app/src/main/java/com/stoutner/privacybrowser/adapters/GuidePagerAdapter.java b/app/src/main/java/com/stoutner/privacybrowser/adapters/GuidePagerAdapter.java index 26d376c2..fc89cefd 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/adapters/GuidePagerAdapter.java +++ b/app/src/main/java/com/stoutner/privacybrowser/adapters/GuidePagerAdapter.java @@ -27,11 +27,11 @@ import androidx.fragment.app.FragmentManager; import androidx.fragment.app.FragmentPagerAdapter; import com.stoutner.privacybrowser.R; -import com.stoutner.privacybrowser.fragments.GuideTabFragment; +import com.stoutner.privacybrowser.fragments.GuideWebViewFragment; public class GuidePagerAdapter extends FragmentPagerAdapter { // Define the class variables. - private Context context; + private final Context context; // The default constructor. public GuidePagerAdapter(FragmentManager fragmentManager, Context context) { @@ -88,6 +88,6 @@ public class GuidePagerAdapter extends FragmentPagerAdapter { @NonNull // Setup each tab. public Fragment getItem(int tabNumber) { - return GuideTabFragment.createTab(tabNumber); + return GuideWebViewFragment.createTab(tabNumber); } } \ No newline at end of file diff --git a/app/src/main/java/com/stoutner/privacybrowser/asynctasks/SaveUrl.java b/app/src/main/java/com/stoutner/privacybrowser/asynctasks/SaveUrl.java index 10a95609..2096e139 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/asynctasks/SaveUrl.java +++ b/app/src/main/java/com/stoutner/privacybrowser/asynctasks/SaveUrl.java @@ -51,16 +51,16 @@ import java.text.NumberFormat; public class SaveUrl extends AsyncTask { // Define a weak references. - private WeakReference contextWeakReference; - private WeakReference activityWeakReference; + private final WeakReference contextWeakReference; + private final WeakReference activityWeakReference; // Define a success string constant. private final String SUCCESS = "Success"; // Define the class variables. - private String filePathString; - private String userAgent; - private boolean cookiesEnabled; + private final String filePathString; + private final String userAgent; + private final boolean cookiesEnabled; private Snackbar savingFileSnackbar; // The public constructor. @@ -225,20 +225,20 @@ public class SaveUrl extends AsyncTask { // Close the file output stream. fileOutputStream.close(); - - // Create a media scanner intent, which adds items like pictures to Android's recent file list. - Intent mediaScannerIntent = new Intent(Intent.ACTION_MEDIA_SCANNER_SCAN_FILE); - - // Add the URI to the media scanner intent. - mediaScannerIntent.setData(Uri.fromFile(file)); - - // Make it so. - activity.sendBroadcast(mediaScannerIntent); } finally { // Disconnect the HTTP URL connection. httpUrlConnection.disconnect(); } } + + // Create a media scanner intent, which adds items like pictures to Android's recent file list. + Intent mediaScannerIntent = new Intent(Intent.ACTION_MEDIA_SCANNER_SCAN_FILE); + + // Add the URI to the media scanner intent. + mediaScannerIntent.setData(Uri.fromFile(file)); + + // Make it so. + activity.sendBroadcast(mediaScannerIntent); } catch (Exception exception) { // Store the error in the save disposition string. saveDisposition = exception.toString(); diff --git a/app/src/main/java/com/stoutner/privacybrowser/dialogs/CreateBookmarkFolderDialog.kt b/app/src/main/java/com/stoutner/privacybrowser/dialogs/CreateBookmarkFolderDialog.kt index 7d4283bf..70546649 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/dialogs/CreateBookmarkFolderDialog.kt +++ b/app/src/main/java/com/stoutner/privacybrowser/dialogs/CreateBookmarkFolderDialog.kt @@ -16,6 +16,7 @@ * You should have received a copy of the GNU General Public License * along with Privacy Browser. If not, see . */ + package com.stoutner.privacybrowser.dialogs import android.annotation.SuppressLint diff --git a/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkDatabaseViewDialog.kt b/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkDatabaseViewDialog.kt index 7c2012c6..eb445a16 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkDatabaseViewDialog.kt +++ b/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkDatabaseViewDialog.kt @@ -16,6 +16,7 @@ * You should have received a copy of the GNU General Public License * along with Privacy Browser. If not, see . */ + package com.stoutner.privacybrowser.dialogs import android.annotation.SuppressLint diff --git a/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkDialog.kt b/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkDialog.kt index efe1c0d5..356de47b 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkDialog.kt +++ b/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkDialog.kt @@ -16,6 +16,7 @@ * You should have received a copy of the GNU General Public License * along with Privacy Browser. If not, see . */ + package com.stoutner.privacybrowser.dialogs import android.annotation.SuppressLint diff --git a/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkFolderDatabaseViewDialog.kt b/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkFolderDatabaseViewDialog.kt index 603dff26..9c5a3273 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkFolderDatabaseViewDialog.kt +++ b/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkFolderDatabaseViewDialog.kt @@ -16,6 +16,7 @@ * You should have received a copy of the GNU General Public License * along with Privacy Browser. If not, see . */ + package com.stoutner.privacybrowser.dialogs import android.annotation.SuppressLint diff --git a/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkFolderDialog.kt b/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkFolderDialog.kt index 5ff29c5b..ea4ea4d4 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkFolderDialog.kt +++ b/app/src/main/java/com/stoutner/privacybrowser/dialogs/EditBookmarkFolderDialog.kt @@ -16,6 +16,7 @@ * You should have received a copy of the GNU General Public License * along with Privacy Browser. If not, see . */ + package com.stoutner.privacybrowser.dialogs import android.annotation.SuppressLint diff --git a/app/src/main/java/com/stoutner/privacybrowser/dialogs/FontSizeDialog.kt b/app/src/main/java/com/stoutner/privacybrowser/dialogs/FontSizeDialog.kt index e6f3110b..c8f3de89 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/dialogs/FontSizeDialog.kt +++ b/app/src/main/java/com/stoutner/privacybrowser/dialogs/FontSizeDialog.kt @@ -16,13 +16,14 @@ * You should have received a copy of the GNU General Public License * along with Privacy Browser. If not, see . */ + package com.stoutner.privacybrowser.dialogs import android.annotation.SuppressLint import android.app.Dialog import android.content.Context import android.content.DialogInterface -import android.content.res.Configuration + import android.os.Bundle import android.view.KeyEvent import android.view.View diff --git a/app/src/main/java/com/stoutner/privacybrowser/dialogs/HttpAuthenticationDialog.kt b/app/src/main/java/com/stoutner/privacybrowser/dialogs/HttpAuthenticationDialog.kt index dca6032d..8ed2a73f 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/dialogs/HttpAuthenticationDialog.kt +++ b/app/src/main/java/com/stoutner/privacybrowser/dialogs/HttpAuthenticationDialog.kt @@ -16,6 +16,7 @@ * You should have received a copy of the GNU General Public License * along with Privacy Browser. If not, see . */ + package com.stoutner.privacybrowser.dialogs import android.annotation.SuppressLint @@ -184,7 +185,7 @@ class HttpAuthenticationDialog: DialogFragment() { ForegroundColorSpan(resources.getColor(R.color.blue_700)) } else { @Suppress("DEPRECATION") - ForegroundColorSpan(resources.getColor(R.color.violet_500)) + ForegroundColorSpan(resources.getColor(R.color.violet_700)) } // Setup the span to display the host name in blue. `SPAN_INCLUSIVE_INCLUSIVE` allows the span to grow in either direction. diff --git a/app/src/main/java/com/stoutner/privacybrowser/dialogs/PinnedMismatchDialog.java b/app/src/main/java/com/stoutner/privacybrowser/dialogs/PinnedMismatchDialog.java index 80b8b4e7..9036f9cd 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/dialogs/PinnedMismatchDialog.java +++ b/app/src/main/java/com/stoutner/privacybrowser/dialogs/PinnedMismatchDialog.java @@ -432,12 +432,12 @@ public class PinnedMismatchDialog extends DialogFragment { int currentThemeStatus = getResources().getConfiguration().uiMode & Configuration.UI_MODE_NIGHT_MASK; // Set the color spans according to the theme. The deprecated `getResources()` must be used until the minimum API >= 23. - if (currentThemeStatus == Configuration.UI_MODE_NIGHT_YES) { - blueColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.violet_500)); - redColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.red_900)); - } else { + if (currentThemeStatus == Configuration.UI_MODE_NIGHT_NO) { blueColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.blue_700)); redColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.red_a700)); + } else { + blueColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.violet_700)); + redColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.red_900)); } // Set the domain name to be blue. diff --git a/app/src/main/java/com/stoutner/privacybrowser/dialogs/SslCertificateErrorDialog.java b/app/src/main/java/com/stoutner/privacybrowser/dialogs/SslCertificateErrorDialog.java index 76a23a81..c34faaad 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/dialogs/SslCertificateErrorDialog.java +++ b/app/src/main/java/com/stoutner/privacybrowser/dialogs/SslCertificateErrorDialog.java @@ -268,7 +268,7 @@ public class SslCertificateErrorDialog extends DialogFragment { blueColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.blue_700)); redColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.red_a700)); } else { - blueColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.violet_500)); + blueColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.violet_700)); redColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.red_900)); } @@ -373,8 +373,8 @@ public class SslCertificateErrorDialog extends DialogFragment { // This must run asynchronously because it involves a network request. `String` declares the parameters. `Void` does not declare progress units. `SpannableStringBuilder` contains the results. private static class GetIpAddresses extends AsyncTask { // The weak references are used to determine if the activity or the alert dialog have disappeared while the AsyncTask is running. - private WeakReference activityWeakReference; - private WeakReference alertDialogWeakReference; + private final WeakReference activityWeakReference; + private final WeakReference alertDialogWeakReference; GetIpAddresses(Activity activity, AlertDialog alertDialog) { // Populate the weak references. diff --git a/app/src/main/java/com/stoutner/privacybrowser/dialogs/ViewSslCertificateDialog.java b/app/src/main/java/com/stoutner/privacybrowser/dialogs/ViewSslCertificateDialog.java index d27b1930..84848c6b 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/dialogs/ViewSslCertificateDialog.java +++ b/app/src/main/java/com/stoutner/privacybrowser/dialogs/ViewSslCertificateDialog.java @@ -238,12 +238,12 @@ public class ViewSslCertificateDialog extends DialogFragment { int currentThemeStatus = getResources().getConfiguration().uiMode & Configuration.UI_MODE_NIGHT_MASK; // Set the color spans according to the theme. The deprecated `getResources()` must be used until the minimum API >= 23. - if (currentThemeStatus == Configuration.UI_MODE_NIGHT_YES) { - blueColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.violet_500)); - redColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.red_900)); - } else { + if (currentThemeStatus == Configuration.UI_MODE_NIGHT_NO) { blueColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.blue_700)); redColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.red_a700)); + } else { + blueColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.violet_700)); + redColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.red_900)); } // Remove the incorrect lint error that `.equals` might produce a NullPointerException. diff --git a/app/src/main/java/com/stoutner/privacybrowser/fragments/AboutVersionFragment.java b/app/src/main/java/com/stoutner/privacybrowser/fragments/AboutVersionFragment.java index b088a88f..f1f99c8e 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/fragments/AboutVersionFragment.java +++ b/app/src/main/java/com/stoutner/privacybrowser/fragments/AboutVersionFragment.java @@ -319,7 +319,7 @@ public class AboutVersionFragment extends Fragment { if (currentThemeStatus == Configuration.UI_MODE_NIGHT_NO) { blueColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.blue_700)); } else { - blueColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.violet_500)); + blueColorSpan = new ForegroundColorSpan(getResources().getColor(R.color.violet_700)); } // Setup the spans to display the device information in blue. `SPAN_INCLUSIVE_INCLUSIVE` allows the span to grow in either direction. @@ -544,81 +544,76 @@ public class AboutVersionFragment extends Fragment { @Override public boolean onOptionsItemSelected(@NonNull MenuItem menuItem) { + // Remove the incorrect lint warning below that the activity might be null. + assert getActivity() != null; + // Get the ID of the menu item that was selected. int menuItemId = menuItem.getItemId(); - // Remove the warning below that `getActivity()` might be null. - assert getActivity() != null; - // Run the appropriate commands. - switch (menuItemId) { - case R.id.copy: - // Get the about version string. - String aboutVersionString = getAboutVersionString(); - - // Get a handle for the clipboard manager. - ClipboardManager clipboardManager = (ClipboardManager) getActivity().getSystemService(Context.CLIPBOARD_SERVICE); - - // Remove the incorrect lint error below that the clipboard manager might be null. - assert clipboardManager != null; - - // Save the about version string in a clip data. - ClipData aboutVersionClipData = ClipData.newPlainText(getString(R.string.about), aboutVersionString); - - // Place the clip data on the clipboard. - clipboardManager.setPrimaryClip(aboutVersionClipData); + if (menuItemId == R.id.copy) { // Copy. + // Get the about version string. + String aboutVersionString = getAboutVersionString(); - // Display a snackbar. - Snackbar.make(aboutVersionLayout, R.string.version_info_copied, Snackbar.LENGTH_SHORT).show(); + // Get a handle for the clipboard manager. + ClipboardManager clipboardManager = (ClipboardManager) getActivity().getSystemService(Context.CLIPBOARD_SERVICE); - // Consume the event. - return true; + // Remove the incorrect lint error below that the clipboard manager might be null. + assert clipboardManager != null; - case R.id.share: - // Get the about version string. - String aboutString = getAboutVersionString(); + // Save the about version string in a clip data. + ClipData aboutVersionClipData = ClipData.newPlainText(getString(R.string.about), aboutVersionString); - // Create an email intent. - Intent emailIntent = new Intent(Intent.ACTION_SEND); + // Place the clip data on the clipboard. + clipboardManager.setPrimaryClip(aboutVersionClipData); - // Add the about version string to the intent. - emailIntent.putExtra(Intent.EXTRA_TEXT, aboutString); + // Display a snackbar. + Snackbar.make(aboutVersionLayout, R.string.version_info_copied, Snackbar.LENGTH_SHORT).show(); - // Set the MIME type. - emailIntent.setType("text/plain"); + // Consume the event. + return true; + } else if (menuItemId == R.id.share) { // Share. + // Get the about version string. + String aboutString = getAboutVersionString(); - // Set the intent to open in a new task. - emailIntent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK); + // Create an email intent. + Intent emailIntent = new Intent(Intent.ACTION_SEND); - // Make it so. - startActivity(Intent.createChooser(emailIntent, getString(R.string.share))); + // Add the about version string to the intent. + emailIntent.putExtra(Intent.EXTRA_TEXT, aboutString); - // Consume the event. - return true; + // Set the MIME type. + emailIntent.setType("text/plain"); - case R.id.save_text: - // Instantiate the save alert dialog. - DialogFragment saveTextDialogFragment = SaveDialog.save(SaveDialog.SAVE_ABOUT_VERSION_TEXT); + // Set the intent to open in a new task. + emailIntent.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK); - // Show the save alert dialog. - saveTextDialogFragment.show(getActivity().getSupportFragmentManager(), getString(R.string.save_dialog)); + // Make it so. + startActivity(Intent.createChooser(emailIntent, getString(R.string.share))); - // Consume the event. - return true; + // Consume the event. + return true; + } else if (menuItemId == R.id.save_text) { // Save text. + // Instantiate the save alert dialog. + DialogFragment saveTextDialogFragment = SaveDialog.save(SaveDialog.SAVE_ABOUT_VERSION_TEXT); - case R.id.save_image: - // Instantiate the save alert dialog. - DialogFragment saveImageDialogFragment = SaveDialog.save(SaveDialog.SAVE_ABOUT_VERSION_IMAGE); + // Show the save alert dialog. + saveTextDialogFragment.show(getActivity().getSupportFragmentManager(), getString(R.string.save_dialog)); - // Show the save alert dialog. - saveImageDialogFragment.show(getActivity().getSupportFragmentManager(), getString(R.string.save_dialog)); + // Consume the event. + return true; + } else if (menuItemId == R.id.save_image) { // Save image. + // Instantiate the save alert dialog. + DialogFragment saveImageDialogFragment = SaveDialog.save(SaveDialog.SAVE_ABOUT_VERSION_IMAGE); - // Consume the event. - return true; + // Show the save alert dialog. + saveImageDialogFragment.show(getActivity().getSupportFragmentManager(), getString(R.string.save_dialog)); - default: - // Don't consume the event. - return super.onOptionsItemSelected(menuItem); + // Consume the event. + return true; + } else { // The home button was selected. + // Return the parent class. + return super.onOptionsItemSelected(menuItem); } } diff --git a/app/src/main/java/com/stoutner/privacybrowser/fragments/AboutWebViewFragment.java b/app/src/main/java/com/stoutner/privacybrowser/fragments/AboutWebViewFragment.java index 307512b2..78d318aa 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/fragments/AboutWebViewFragment.java +++ b/app/src/main/java/com/stoutner/privacybrowser/fragments/AboutWebViewFragment.java @@ -19,15 +19,23 @@ package com.stoutner.privacybrowser.fragments; +import android.content.Context; +import android.content.Intent; import android.content.res.Configuration; +import android.net.Uri; import android.os.Bundle; import android.view.LayoutInflater; import android.view.View; import android.view.ViewGroup; +import android.webkit.WebResourceResponse; import android.webkit.WebView; +import android.webkit.WebViewClient; import androidx.annotation.NonNull; import androidx.fragment.app.Fragment; +import androidx.webkit.WebSettingsCompat; +import androidx.webkit.WebViewAssetLoader; +import androidx.webkit.WebViewFeature; import com.stoutner.privacybrowser.R; @@ -39,7 +47,7 @@ public class AboutWebViewFragment extends Fragment { private int tabNumber; // Declare the class views. - private View aboutWebViewLayout; + private View webViewLayout; public static AboutWebViewFragment createTab(int tabNumber) { // Create an arguments bundle. @@ -69,90 +77,102 @@ public class AboutWebViewFragment extends Fragment { // Remove the incorrect lint warning below that arguments might be null. assert arguments != null; - // Store the arguments in class variables. + // Store the tab number in a class variable. tabNumber = arguments.getInt(TAB_NUMBER); } @Override public View onCreateView(@NonNull LayoutInflater layoutInflater, ViewGroup container, Bundle savedInstanceState) { - // Get the current theme status. - int currentThemeStatus = getResources().getConfiguration().uiMode & Configuration.UI_MODE_NIGHT_MASK; - // Inflate the layout. Setting false at the end of inflater.inflate does not attach the inflated layout as a child of container. The fragment will take care of attaching the root automatically. - aboutWebViewLayout = layoutInflater.inflate(R.layout.bare_webview, container, false); + webViewLayout = layoutInflater.inflate(R.layout.bare_webview, container, false); // Get a handle for tab WebView. - WebView tabWebView = (WebView) aboutWebViewLayout; - - // Load the tabs according to the theme. - if (currentThemeStatus == Configuration.UI_MODE_NIGHT_NO) { // The light theme is applied. - switch (tabNumber) { - case 1: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/about_permissions_light.html"); - break; - - case 2: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/about_privacy_policy_light.html"); - break; - - case 3: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/about_changelog_light.html"); - break; - - case 4: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/about_licenses_light.html"); - break; - - case 5: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/about_contributors_light.html"); - break; - - case 6: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/about_links_light.html"); - break; + WebView tabWebView = (WebView) webViewLayout; + + // Get a handle for the context. + Context context = getContext(); + + // Remove the incorrect lint warning below that the context might be null. + assert context != null; + + // Create a WebView asset loader. + final WebViewAssetLoader webViewAssetLoader = new WebViewAssetLoader.Builder().addPathHandler("/assets/", new WebViewAssetLoader.AssetsPathHandler(context)).build(); + + // Set a WebView client. + tabWebView.setWebViewClient(new WebViewClient() { + // `shouldOverrideUrlLoading` allows the sending of external links back to the main Privacy Browser WebView. The deprecated `shouldOverrideUrlLoading` must be used until API >= 24. + @Override + public boolean shouldOverrideUrlLoading(WebView view, String url) { + // Create an intent to view the URL. + Intent urlIntent = new Intent(Intent.ACTION_VIEW); + + // Add the URL to the intent. + urlIntent.setData(Uri.parse(url)); + + // Make it so. + startActivity(urlIntent); + return true; } - } else { // The dark theme is applied. - // Set the background color. The deprecated `.getColor()` must be used until the minimum API >= 23. - tabWebView.setBackgroundColor(getResources().getColor(R.color.gray_850)); - - // Tab numbers start at 0, with the WebView tabs starting at 1. - switch (tabNumber) { - case 1: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/about_permissions_dark.html"); - break; - - case 2: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/about_privacy_policy_dark.html"); - break; - - case 3: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/about_changelog_dark.html"); - break; - - case 4: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/about_licenses_dark.html"); - break; - - case 5: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/about_contributors_dark.html"); - break; - - case 6: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/about_links_dark.html"); - break; + + @Override + public WebResourceResponse shouldInterceptRequest(WebView webView, String url) { + // Have the WebView asset loader process the request. This allows the loading of SVG files, which otherwise is prevented by the CORS policy. + return webViewAssetLoader.shouldInterceptRequest(Uri.parse(url)); } + }); + + // Get the current theme status. + int currentThemeStatus = getResources().getConfiguration().uiMode & Configuration.UI_MODE_NIGHT_MASK; + + // Check to see if the app is in night mode. + if (currentThemeStatus == Configuration.UI_MODE_NIGHT_YES && WebViewFeature.isFeatureSupported(WebViewFeature.FORCE_DARK)) { // The app is in night mode. + // Apply the dark WebView theme. + WebSettingsCompat.setForceDark(tabWebView.getSettings(), WebSettingsCompat.FORCE_DARK_ON); + } + + // Load the indicated tab. The tab numbers start at 0, with the WebView tabs starting at 1. + switch (tabNumber) { + case 1: + // Load the Permissions tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/about_permissions.html"); + break; + + case 2: + // Load the Privacy Policy tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/about_privacy_policy.html"); + break; + + case 3: + // Load the Changelog tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/about_changelog.html"); + break; + + case 4: + // Load the Licenses tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/about_licenses.html"); + break; + + case 5: + // Load the Contributors tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/about_contributors.html"); + break; + + case 6: + // Load the Links tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/about_links.html"); + break; } // Scroll the tab if the saved instance state is not null. if (savedInstanceState != null) { - aboutWebViewLayout.post(() -> { - aboutWebViewLayout.setScrollX(savedInstanceState.getInt("scroll_x")); - aboutWebViewLayout.setScrollY(savedInstanceState.getInt("scroll_y")); + tabWebView.post(() -> { + tabWebView.setScrollX(savedInstanceState.getInt("scroll_x")); + tabWebView.setScrollY(savedInstanceState.getInt("scroll_y")); }); } - // Return the tab layout. - return aboutWebViewLayout; + // Return the formatted WebView layout. + return webViewLayout; } @Override @@ -160,10 +180,14 @@ public class AboutWebViewFragment extends Fragment { // Run the default commands. super.onSaveInstanceState(savedInstanceState); + + // Get a handle for the tab WebView. A class variable cannot be used because it gets out of sync when restarting. + WebView tabWebView = (WebView) webViewLayout; + // Save the scroll positions if the layout is not null, which can happen if a tab is not currently selected. - if (aboutWebViewLayout != null) { - savedInstanceState.putInt("scroll_x", aboutWebViewLayout.getScrollX()); - savedInstanceState.putInt("scroll_y", aboutWebViewLayout.getScrollY()); + if (tabWebView != null) { + savedInstanceState.putInt("scroll_x", tabWebView.getScrollX()); + savedInstanceState.putInt("scroll_y", tabWebView.getScrollY()); } } } \ No newline at end of file diff --git a/app/src/main/java/com/stoutner/privacybrowser/fragments/DomainSettingsFragment.java b/app/src/main/java/com/stoutner/privacybrowser/fragments/DomainSettingsFragment.java index 5e3a4336..e10af110 100644 --- a/app/src/main/java/com/stoutner/privacybrowser/fragments/DomainSettingsFragment.java +++ b/app/src/main/java/com/stoutner/privacybrowser/fragments/DomainSettingsFragment.java @@ -304,16 +304,16 @@ public class DomainSettingsFragment extends Fragment { } // Create the foreground color spans. - final ForegroundColorSpan redColorSpan; final ForegroundColorSpan blueColorSpan; + final ForegroundColorSpan redColorSpan; // Set the color spans according to the theme. The deprecated `getColor()` must be used until the minimum API >= 23. - if (currentThemeStatus == Configuration.UI_MODE_NIGHT_YES) { - redColorSpan = new ForegroundColorSpan(resources.getColor(R.color.red_900)); - blueColorSpan = new ForegroundColorSpan(resources.getColor(R.color.violet_500)); - } else { - redColorSpan = new ForegroundColorSpan(resources.getColor(R.color.red_a700)); + if (currentThemeStatus == Configuration.UI_MODE_NIGHT_NO) { blueColorSpan = new ForegroundColorSpan(resources.getColor(R.color.blue_700)); + redColorSpan = new ForegroundColorSpan(resources.getColor(R.color.red_a700)); + } else { + blueColorSpan = new ForegroundColorSpan(resources.getColor(R.color.violet_700)); + redColorSpan = new ForegroundColorSpan(resources.getColor(R.color.red_900)); } // Set the domain name from the the database cursor. @@ -421,11 +421,7 @@ public class DomainSettingsFragment extends Fragment { } } else { // First-party cookies are disabled. // Set the status of third-party cookies. - if (thirdPartyCookiesInt == 1) { - thirdPartyCookiesSwitch.setChecked(true); - } else { - thirdPartyCookiesSwitch.setChecked(false); - } + thirdPartyCookiesSwitch.setChecked(thirdPartyCookiesInt == 1); // Disable the third-party cookies switch. thirdPartyCookiesSwitch.setEnabled(false); @@ -467,11 +463,7 @@ public class DomainSettingsFragment extends Fragment { domStorageSwitch.setEnabled(false); // Set the checked status of DOM storage. - if (domStorageInt == 1) { // DOM storage is enabled but JavaScript is disabled. - domStorageSwitch.setChecked(true); - } else { // Both JavaScript and DOM storage are disabled. - domStorageSwitch.setChecked(false); - } + domStorageSwitch.setChecked(domStorageInt == 1); // Set the icon according to the theme. if (currentThemeStatus == Configuration.UI_MODE_NIGHT_YES) { @@ -606,14 +598,8 @@ public class DomainSettingsFragment extends Fragment { // Disable Fanboy's Social Blocking List switch. fanboysSocialBlockingListSwitch.setEnabled(false); - // Handle the status of Fanboy's Social Blocking List. Once the minimum API >= 21 a selector can be used as the tint mode instead of specifying different icons. - if (fanboysSocialBlockingListInt == 1) { // Fanboy's Social Blocking List is on. - // Turn on Fanboy's Social Blocking List switch. - fanboysSocialBlockingListSwitch.setChecked(true); - } else { // Fanboy's Social Blocking List is off. - // Turn off Fanboy's Social Blocking List switch. - fanboysSocialBlockingListSwitch.setChecked(false); - } + // Set the status of Fanboy's Social Blocking List. + fanboysSocialBlockingListSwitch.setChecked(fanboysSocialBlockingListInt == 1); // Set the icon according to the theme. if (currentThemeStatus == Configuration.UI_MODE_NIGHT_YES) { diff --git a/app/src/main/java/com/stoutner/privacybrowser/fragments/GuideTabFragment.java b/app/src/main/java/com/stoutner/privacybrowser/fragments/GuideTabFragment.java deleted file mode 100644 index 6f3aa0d3..00000000 --- a/app/src/main/java/com/stoutner/privacybrowser/fragments/GuideTabFragment.java +++ /dev/null @@ -1,188 +0,0 @@ -/* - * Copyright © 2016-2020 Soren Stoutner . - * - * This file is part of Privacy Browser . - * - * Privacy Browser is free software: you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation, either version 3 of the License, or - * (at your option) any later version. - * - * Privacy Browser is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with Privacy Browser. If not, see . - */ - -package com.stoutner.privacybrowser.fragments; - -import android.content.res.Configuration; -import android.os.Bundle; -import android.view.LayoutInflater; -import android.view.View; -import android.view.ViewGroup; -import android.webkit.WebView; - -import androidx.annotation.NonNull; -import androidx.fragment.app.Fragment; - -import com.stoutner.privacybrowser.R; - -public class GuideTabFragment extends Fragment { - // Define the class variables. - private int tabNumber; - private View tabLayout; - - // Store the tab number in the arguments bundle. - public static GuideTabFragment createTab (int tabNumber) { - // Create a bundle. - Bundle bundle = new Bundle(); - - // Store the tab number in the bundle. - bundle.putInt("tab_number", tabNumber); - - // Create a new guide tab fragment. - GuideTabFragment guideTabFragment = new GuideTabFragment(); - - // Add the bundle to the fragment. - guideTabFragment.setArguments(bundle); - - // Return the new fragment. - return guideTabFragment; - } - - @Override - public void onCreate(Bundle savedInstanceState) { - // Run the default commands. - super.onCreate(savedInstanceState); - - // Get a handle for the arguments. - Bundle arguments = getArguments(); - - // Remove the lint warning below that arguments might be null. - assert arguments != null; - - // Store the tab number in a class variable. - tabNumber = arguments.getInt("tab_number"); - } - - @Override - public View onCreateView(@NonNull LayoutInflater inflater, ViewGroup container, Bundle savedInstanceState) { - // Inflate the layout. The fragment will take care of attaching the root automatically. - tabLayout = inflater.inflate(R.layout.bare_webview, container, false); - - // Get a handle for the tab WebView. - WebView tabWebView = (WebView) tabLayout; - - // Get the current theme status. - int currentThemeStatus = getResources().getConfiguration().uiMode & Configuration.UI_MODE_NIGHT_MASK; - - // Load the tabs according to the theme. - if (currentThemeStatus == Configuration.UI_MODE_NIGHT_YES) { // The dark theme is applied. - tabWebView.setBackgroundColor(getResources().getColor(R.color.gray_850)); - - // Tab numbers start at 0. - switch (tabNumber) { - case 0: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_overview_dark.html"); - break; - - case 1: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_javascript_dark.html"); - break; - - case 2: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_local_storage_dark.html"); - break; - - case 3: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_user_agent_dark.html"); - break; - - case 4: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_requests_dark.html"); - break; - - case 5: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_domain_settings_dark.html"); - break; - - case 6: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_ssl_certificates_dark.html"); - break; - - case 7: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_proxies_dark.html"); - break; - - case 8: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_tracking_ids_dark.html"); - break; - } - } else { // The light theme is applied. - // Tab numbers start at 0. - switch (tabNumber) { - case 0: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_overview_light.html"); - break; - - case 1: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_javascript_light.html"); - break; - - case 2: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_local_storage_light.html"); - break; - - case 3: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_user_agent_light.html"); - break; - - case 4: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_requests_light.html"); - break; - - case 5: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_domain_settings_light.html"); - break; - - case 6: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_ssl_certificates_light.html"); - break; - - case 7: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_proxies_light.html"); - break; - - case 8: - tabWebView.loadUrl("file:///android_asset/" + getString(R.string.android_asset_path) + "/guide_tracking_ids_light.html"); - break; - } - } - - // Scroll the WebView if the saved instance state is not null. - if (savedInstanceState != null) { - tabWebView.post(() -> tabWebView.setScrollY(savedInstanceState.getInt("scroll_y"))); - } - - // Return the formatted `tabLayout`. - return tabLayout; - } - - @Override - public void onSaveInstanceState(@NonNull Bundle savedInstanceState) { - // Run the default commands. - super.onSaveInstanceState(savedInstanceState); - - // Get a handle for the tab WebView. A class variable cannot be used because it gets out of sync when restarting. - WebView tabWebView = (WebView) tabLayout; - - // Save the scroll Y position if the tab WebView is not null, which can happen if a tab is not currently selected. - if (tabWebView != null) { - savedInstanceState.putInt("scroll_y", tabWebView.getScrollY()); - } - } -} \ No newline at end of file diff --git a/app/src/main/java/com/stoutner/privacybrowser/fragments/GuideWebViewFragment.java b/app/src/main/java/com/stoutner/privacybrowser/fragments/GuideWebViewFragment.java new file mode 100644 index 00000000..0b0bc157 --- /dev/null +++ b/app/src/main/java/com/stoutner/privacybrowser/fragments/GuideWebViewFragment.java @@ -0,0 +1,204 @@ +/* + * Copyright © 2016-2020 Soren Stoutner . + * + * This file is part of Privacy Browser . + * + * Privacy Browser is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * Privacy Browser is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with Privacy Browser. If not, see . + */ + +package com.stoutner.privacybrowser.fragments; + +import android.content.Context; +import android.content.Intent; +import android.content.res.Configuration; +import android.net.Uri; +import android.os.Bundle; +import android.view.LayoutInflater; +import android.view.View; +import android.view.ViewGroup; +import android.webkit.WebResourceResponse; +import android.webkit.WebView; +import android.webkit.WebViewClient; + +import androidx.annotation.NonNull; +import androidx.fragment.app.Fragment; +import androidx.webkit.WebSettingsCompat; +import androidx.webkit.WebViewAssetLoader; +import androidx.webkit.WebViewFeature; + +import com.stoutner.privacybrowser.R; + +public class GuideWebViewFragment extends Fragment { + // Declare the class constants. + private final static String TAB_NUMBER = "tab_number"; + + // Declare the class variables. + private int tabNumber; + + // Declare the class views. + private View webViewLayout; + + // Store the tab number in the arguments bundle. + public static GuideWebViewFragment createTab (int tabNumber) { + // Create a bundle. + Bundle bundle = new Bundle(); + + // Store the tab number in the bundle. + bundle.putInt(TAB_NUMBER, tabNumber); + + // Create a new guide tab fragment. + GuideWebViewFragment guideWebViewFragment = new GuideWebViewFragment(); + + // Add the bundle to the fragment. + guideWebViewFragment.setArguments(bundle); + + // Return the new fragment. + return guideWebViewFragment; + } + + @Override + public void onCreate(Bundle savedInstanceState) { + // Run the default commands. + super.onCreate(savedInstanceState); + + // Get a handle for the arguments. + Bundle arguments = getArguments(); + + // Remove the lint warning below that arguments might be null. + assert arguments != null; + + // Store the tab number in a class variable. + tabNumber = arguments.getInt(TAB_NUMBER); + } + + @Override + public View onCreateView(@NonNull LayoutInflater inflater, ViewGroup container, Bundle savedInstanceState) { + // Inflate the layout. The fragment will take care of attaching the root automatically. + webViewLayout = inflater.inflate(R.layout.bare_webview, container, false); + + // Get a handle for the tab WebView. + WebView tabWebView = (WebView) webViewLayout; + + // Get a handle for the context. + Context context = getContext(); + + // Remove the incorrect lint warning below that the context might be null. + assert context != null; + + // Create a WebView asset loader. + final WebViewAssetLoader webViewAssetLoader = new WebViewAssetLoader.Builder().addPathHandler("/assets/", new WebViewAssetLoader.AssetsPathHandler(context)).build(); + + // Set a WebView client. + tabWebView.setWebViewClient(new WebViewClient() { + // `shouldOverrideUrlLoading` allows sending of external links back to the main Privacy Browser WebView. The deprecated `shouldOverrideUrlLoading` must be used until API >= 24. + @Override + public boolean shouldOverrideUrlLoading(WebView view, String url) { + // Create an intent to view the URL. + Intent urlIntent = new Intent(Intent.ACTION_VIEW); + + // Add the URL to the intent. + urlIntent.setData(Uri.parse(url)); + + // Make it so. + startActivity(urlIntent); + return true; + } + + @Override + public WebResourceResponse shouldInterceptRequest(WebView webView, String url) { + // Have the WebView asset loader process the request. This allows loading of SVG files, which otherwise is prevented by the CORS policy. + return webViewAssetLoader.shouldInterceptRequest(Uri.parse(url)); + } + }); + + // Get the current theme status. + int currentThemeStatus = getResources().getConfiguration().uiMode & Configuration.UI_MODE_NIGHT_MASK; + + // Check to see if the app is in night mode. + if (currentThemeStatus == Configuration.UI_MODE_NIGHT_YES && WebViewFeature.isFeatureSupported(WebViewFeature.FORCE_DARK)) { // The app is in night mode. + // Apply the dark WebView theme. + WebSettingsCompat.setForceDark(tabWebView.getSettings(), WebSettingsCompat.FORCE_DARK_ON); + } + + // Load the indicated tab. The tab numbers start at 0. + switch (tabNumber) { + case 0: + // Load the Overview tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/guide_overview.html"); + break; + + case 1: + // Load the JavaScript tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/guide_javascript.html"); + break; + + case 2: + // Load the Local Storage tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/guide_local_storage.html"); + break; + + case 3: + // Load the User Agent tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/guide_user_agent.html"); + break; + + case 4: + // Load the Requests tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/guide_requests.html"); + break; + + case 5: + // Load the Domain Settings tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/guide_domain_settings.html"); + break; + + case 6: + // Load the SSL Certificates tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/guide_ssl_certificates.html"); + break; + + case 7: + // Load the Proxies tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/guide_proxies.html"); + break; + + case 8: + // Load the Tracking IDs tab. + tabWebView.loadUrl("https://appassets.androidplatform.net/assets/" + getString(R.string.android_asset_path) + "/guide_tracking_ids.html"); + break; + } + + // Scroll the WebView if the saved instance state is not null. + if (savedInstanceState != null) { + tabWebView.post(() -> tabWebView.setScrollY(savedInstanceState.getInt("scroll_y"))); + } + + // Return the formatted WebView layout. + return webViewLayout; + } + + @Override + public void onSaveInstanceState(@NonNull Bundle savedInstanceState) { + // Run the default commands. + super.onSaveInstanceState(savedInstanceState); + + // Get a handle for the tab WebView. A class variable cannot be used because it gets out of sync when restarting. + WebView tabWebView = (WebView) webViewLayout; + + // Save the scroll Y position if the tab WebView is not null, which can happen if a tab is not currently selected. + if (tabWebView != null) { + savedInstanceState.putInt("scroll_y", tabWebView.getScrollY()); + } + } +} \ No newline at end of file diff --git a/app/src/main/res/drawable/sort_selected_day.xml b/app/src/main/res/drawable/sort_selected_day.xml index 16700851..e6505a4a 100644 --- a/app/src/main/res/drawable/sort_selected_day.xml +++ b/app/src/main/res/drawable/sort_selected_day.xml @@ -19,6 +19,6 @@ diff --git a/app/src/main/res/values-night-v23/styles.xml b/app/src/main/res/values-night-v23/styles.xml index fbc06cc0..c3673ce6 100644 --- a/app/src/main/res/values-night-v23/styles.xml +++ b/app/src/main/res/values-night-v23/styles.xml @@ -28,8 +28,8 @@ ?android:attr/colorBackground @color/violet_700 - @color/violet_500 - @color/violet_700 + @color/violet_700 + @color/violet_500 @color/button_background_color_selector_night @color/button_text_color_selector_night @color/violet_500 diff --git a/app/src/main/res/values-night-v27/styles.xml b/app/src/main/res/values-night-v27/styles.xml index 42e31ec8..759fb1a1 100644 --- a/app/src/main/res/values-night-v27/styles.xml +++ b/app/src/main/res/values-night-v27/styles.xml @@ -30,8 +30,8 @@ ?android:attr/colorBackground @color/violet_700 - @color/violet_500 - @color/violet_700 + @color/violet_700 + @color/violet_500 @color/button_background_color_selector_night @color/button_text_color_selector_night @color/violet_500 diff --git a/app/src/main/res/values-night/colors.xml b/app/src/main/res/values-night/colors.xml index 6c07cd07..8ba568fc 100644 --- a/app/src/main/res/values-night/colors.xml +++ b/app/src/main/res/values-night/colors.xml @@ -68,6 +68,7 @@ #FFF5F5F5 #FFEEEEEE #FFE0E0E0 + #FFC1C1C1 #FFBDBDBD #FFB7B7B7 #FF9E9E9E @@ -76,6 +77,7 @@ #FF515151 #FF424242 #FF313131 + #FF303030 #FF2D2D2D #FF212121 #FF202020 @@ -95,6 +97,7 @@ #FFC62828 #FFB71C1C #FFA21212 + #FF930606 #FFD50000 #00000000 diff --git a/app/src/main/res/values-night/styles.xml b/app/src/main/res/values-night/styles.xml index 0dbf04fa..1f385797 100644 --- a/app/src/main/res/values-night/styles.xml +++ b/app/src/main/res/values-night/styles.xml @@ -26,8 +26,8 @@ ?android:attr/colorBackground @color/violet_700 - @color/violet_500 - @color/violet_700 + @color/violet_700 + @color/violet_500 @color/button_background_color_selector_night @color/button_text_color_selector_night @color/violet_500 diff --git a/app/src/main/res/values-pt-rBR/strings.xml b/app/src/main/res/values-pt-rBR/strings.xml index c96e4f83..e414528a 100644 --- a/app/src/main/res/values-pt-rBR/strings.xml +++ b/app/src/main/res/values-pt-rBR/strings.xml @@ -188,18 +188,22 @@ Salvar URL Salvar Arquivo + Salvar Texto Salvar Imagem Salvar logcat Nome do Arquivo Pagina_Web.mht Pagina_Web.png Privacy Browser Logcat.txt + Privacy Browser Versão.txt + Privacy Browser Versão.png Arquivo bytes tamanho desconhecido URL inválida OK Salvando file: + Processando imagem… : Arquivo Salvo: Erro ao salvar o arquivo: @@ -432,6 +436,7 @@ Versão do certificado: Número de série: Algoritmo de Assinatura: + Informações de versão copiada. Permissões Política de Privacidade Changelog diff --git a/app/src/main/res/values/colors.xml b/app/src/main/res/values/colors.xml index 77746f32..4a24aff2 100644 --- a/app/src/main/res/values/colors.xml +++ b/app/src/main/res/values/colors.xml @@ -68,6 +68,7 @@ #FFF5F5F5 #FFEEEEEE #FFE0E0E0 + #FFC1C1C1 #FFBDBDBD #FFB7B7B7 #FF9E9E9E @@ -76,6 +77,7 @@ #FF515151 #FF424242 #FF313131 + #FF303030 #FF2D2D2D #FF212121 #FF202020 @@ -95,6 +97,7 @@ #FFC62828 #FFB71C1C #FFA21212 + #FF930606 #FFD50000 #00000000 diff --git a/build.gradle b/build.gradle index 8aa32962..3cdc9df9 100644 --- a/build.gradle +++ b/build.gradle @@ -25,7 +25,7 @@ buildscript { google() } dependencies { - classpath 'com.android.tools.build:gradle:4.0.2' + classpath 'com.android.tools.build:gradle:4.1.0' classpath "org.jetbrains.kotlin:kotlin-gradle-plugin:1.4.10" // NOTE: Do not place your application dependencies here; they belong diff --git a/gradle/wrapper/gradle-wrapper.properties b/gradle/wrapper/gradle-wrapper.properties index 47401957..4a958fdf 100644 --- a/gradle/wrapper/gradle-wrapper.properties +++ b/gradle/wrapper/gradle-wrapper.properties @@ -1,6 +1,6 @@ -#Thu May 28 22:17:21 MST 2020 +#Thu Oct 15 14:40:42 MST 2020 distributionBase=GRADLE_USER_HOME distributionPath=wrapper/dists zipStoreBase=GRADLE_USER_HOME zipStorePath=wrapper/dists -distributionUrl=https\://services.gradle.org/distributions/gradle-6.1.1-all.zip +distributionUrl=https\://services.gradle.org/distributions/gradle-6.5-bin.zip