From 39380e8e8bdb3b9e29569a263277c9c3112b44ac Mon Sep 17 00:00:00 2001
From: Soren Stoutner Benötigt, damit WebView das Internet nutzen kann. Ohne diese Berechtigung wäre Privacy Browser âKein Browser: Schützt Ihre Privatsphäre durch Fernbleiben von jeglicher Konnektivitätâ. com.android.launcher.permission.INSTALL_SHORTCUT Benötigt, um Verknüpfungen zu Websites auf Ihrer Startseite zu erstellen. android.permission.READ_EXTERNAL_STORAGE Benötigt, um Einstellungen aus öffentlichen Ordnern zu importieren.
- Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen nur aus seinem eigenen Ordner importieren, wenn diese Berechtigung nicht erteilt wird. android.permission.WRITE_EXTERNAL_STORAGE Benötigt, um Einstellungen und Downloads in öffentlichen Ordnern zu speichern.
- Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen und Downloads nur in seinem eigenen Ordner speichern, wenn diese Berechtigung nicht erteilt wird. Zusätzlich zu den oben genannten Berechtigungen zeigt Privacy Browser Free Werbeanzeigen von Google's AdMob-Netzwerk unter Zuhilfenahme des Firebase-Backends.
- Für die "Kostenlos"-Plakette ergänzt Firebase die Liste der Berechtigungen um die Folgenden,
- obwohl diese nicht im Quellcode der Manifest-Datei
- von Privacy Browser aufgeführt werden: android.permission.ACCESS_NETWORK_STATE Erlaubt den Werbeanzeigen mitzuteilen, wenn das Gerät mit dem Internet verbunden ist und wann nicht (vermutlich damit nicht versucht wird, Werbeanzeigen neu zu laden, wenn keine Verbindung besteht).
- Diese können auch mitteilen, ob eine Verbindung via WLAN, 2G, 3G, 4G, usw. besteht. Erlaubt den Werbeanzeigen, das Gerät nicht in den Schlaf-Modus zu versetzen und das Display nicht zu dimmen. In Stoutners Tests konnte dieses Verhalten nicht festgestellt werden. com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE Erlaubt anderen Apps mitzuteilen, ob ihre Installation über eine Werbeanzeige innerhalb von Privacy Browser Free ausgelöst wurde. com.google.android.c2dm.permission.RECEIVE Erlaubt Google Informationen direkt an AdView zu senden, ohne dass zuvor eine entsprechende Anfrage getätigt wurde (cloud-to-device messaging). Privacy Browser Free sammelt keinerlei Benutzer-Informationen. Google Play hat seine eigene Datenschutzerklärung.
- Google stellt Entwicklern anonymisierte Installations-Informationen inklusive der Anzahl der Installationen unterteilt in die folgenden Kategorien bereit: Google Play hat seine eigene Datenschutzerklärung.
- Google stellt Entwicklern folgende anonymisierte Installations-Informationen bezüglich der Bewertungen bereit: Google Play hat seine eigene Datenschutzerklärung.
- Zusätzlich zum Namen des Rezensenten, der Bewertung und dem Text der Rezension (welche alle öffentlich zugänglich sind),
- stellt Google dem Entwickler einige oder alle der folgenden Informationen zur Verfügung: Privacy Browser Free blendet einen Werbebanner unten am Bildschirm ein und verwendet hierfür Googles Netzwerk AdMob,
- dessen eigene Datenschutzbestimmungen hier zu finden sind.
- Die Ausspielung dieser Werbebanner erfolgt dabei nicht-personalisiert.
- AdMob überträgt zudem anonymisierte Zusammenfassungen folgender Informationen an die Entwickler: Benutzer können z.B. per Email und Kommentaren auf stoutner.com direkt mit Stoutner Kontakt aufnehmen. Stoutner kann diese Informationen nutzen, um die Entwicklung von Privacy Browser zu unterstützen und den Status des Projekts an Benutzer zu melden.
- Stoutner wird die Informationen niemals verkaufen oder an Dritte weitergeben, welche diese für Anzeigen oder Marketing nutzen. Revision 1.7, 14. Mai 2019 Required for the WebView to access the internet. Without this permission, Privacy Browser would be âNo Browser: Protecting Your Privacy by Staying Completely Off the Internetâ. com.android.launcher.permission.INSTALL_SHORTCUT Required to add shortcuts for websites to the launcher desktop. android.permission.READ_EXTERNAL_STORAGE Required to import settings from public folders. On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can import settings from the appâs folders instead. android.permission.WRITE_EXTERNAL_STORAGE Required to export settings and download files to the public folders.
- On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can export settings and store downloads in the appâs folders instead. In addition, Privacy Browser Free displays ads from Googleâs AdMob network using the Firebase backend.
- For the free flavor, Firebase adds the following permissions even though they are not listed in the source code
- manifest file. android.permission.ACCESS_NETWORK_STATE Allows the ads to tell when you are connected to the internet and when you arenât (presumably so they donât try to reload an ad when you are disconnected).
- They can also tell if you are connected via Wi-Fi, 2G, 3G, 4G, etc. Allows the ads to keep the processor from sleeping and the screen from dimming, although in my testing I donât think the ads actually do this. com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE Allows other apps to tell if their installation was launched from an ad in Privacy Browser Free. com.google.android.c2dm.permission.RECEIVE Allows Google to send information directly to the AdView without having to receive a request first (cloud-to-device messaging). Privacy Browser Free does not collect any user information. Privacy Browser Free does not collect any user information. Privacy Browser Free does not collect any user information. Google Play has its own privacy policy.
- Google provides anonymized summary installation information to developers, including the number of installs organized by the following categories. Google Play has its own privacy policy.
- Google provides developers with anonymized summaries of the following information related to user ratings. Google Play has its own privacy policy.
- In addition to the name of the reviewer, the rating, and the text of the review (which are all available publicly), Google provides some or all of the following information to the developer. Privacy Browser Free displays a banner ad across the bottom of the screen using Google's AdMob network,
- which has its own privacy policy.
- These ads are set to be non-personalized.
- AdMob reports anonymized summaries of the following information to developers. Users may choose to send direct communications to Stoutner, like email messages and comments on stoutner.com. Stoutner may use this information to assist in the development of Privacy Browser and communicate the status of the project to users.
- Stoutner will never sell this information nor transfer it to any third party that would use it for advertising or marketing. Revision 1.7, 14 May 2019 Requerido para que WebView consiga acceso a internet. Sin este permiso, Navegador Privado serÃa, âSin Navegador: Protegiendo su privacidad estando completamente desconectado de internetâ. com.android.launcher.permission.INSTALL_SHORTCUT Requerido para añadir accesos directos de páginas web en el escritorio. android.permission.READ_EXTERNAL_STORAGE Requerido para importar la configuración de las carpetas públicas.
- En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio importar la configuración desde las carpetas de la aplicación. android.permission.WRITE_EXTERNAL_STORAGE Requerido para exportar la configuración y descargar archivos a las carpetas públicas.
- En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio exportar la configuración y almacenar las descargas en las carpetas de la aplicación. Además, Navegador Privado Gratuito muestra anuncios de Google AdMob usando el proveedor Firebase.
- En el sabor gratuito, Firebase añade los siguientes permisos aunque no aparecen en el
- archivo de manifiesto de código fuente. android.permission.ACCESS_NETWORK_STATE Permite a los anuncios saber si el dispositivo está conectado a internet y cuando no (probablemente para no tratar de recargar un anuncio cuando está desconectado).
- También les permite saber si está conectado por wifi, 2G, 3G, 4G, etcétera. Permite a los anuncios impedir al procesador dormir y a la pantalla atenuar, aunque en mis pruebas no parece que los anuncios lo hagan asÃ. com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE Permite a otras aplicaciones saber si su instalación se ha iniciado desde un anuncio en el Navegador Privado gratuito. com.google.android.c2dm.permission.RECEIVE Permite a Google enviar información directamente al AdView sin tener que recibir primero una solicitud (mensajes de nube a dispositivo). Navegador Privado Gratuito no recoge ninguna información del usuario. Navegador Privado Gratuito no recoge ninguna información del usuario. Navegador Privado Gratuito no recoge ninguna información del usuario. Google Play tiene su propia polÃtica de privacidad.
- Google proporciona información resumida y anónima de instalación a los desarrolladores, incluyendo el número de instalaciones, organizadas por las siguientes categorÃas. Google Play tiene su propia polÃtica de privacidad.
- Google proporciona a los desarrolladores resúmenes anónimos de la siguiente información relativa a las valoraciones de los usuarios. Google Play tiene su propia polÃtica de privacidad.
- Además del nombre del comentador, la calificación y el texto del comentario (las cuales están disponibles públicamente),
- Google proporciona alguna o toda la siguiente información al desarrollador. Navegador Privado Gratuito muestra un banner publicitario en la parte inferior de la pantalla mediante la red AdMob de Google,
- que tiene su propia polÃtica de privacidad.
- Estos anuncios están configurados para ser no personalizados.
- AdMob reporta resúmenes anónimos de la siguiente información a los desarrolladores. Los usuarios pueden elegir enviar comunicaciones directas a Stoutner, como mensajes de correo electrónico y comentarios en stoutner.com. Stoutner puede utilizar esta información para ayudar en el desarrollo de Navegador Privado y comunicar el estado del proyecto a los usuarios.
- Stoutner nunca vendrá la información ni la transferirá a ninguna tercera parte que la pudiera usar para publicidad o marketing. Revisión 1.7, 14 de mayo de 2019 Requis pour que WebView puisse accéder à Internet. Sans cette autorisation, Privacy Browser serait «No Browser: protégez votre vie privée en restant complètement hors d'Internet». com.android.launcher.permission.INSTALL_SHORTCUT Requis pour ajouter des raccourcis pour les sites Web au bureau du programme de lancement. android.permission.READ_EXTERNAL_STORAGE Requis pour importer les paramètres des dossiers publics. Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée,
- Privacy Browser peut importer les paramètres à partir des dossiers de l'application. android.permission.WRITE_EXTERNAL_STORAGE Requis pour exporter les paramètres et télécharger les fichiers dans les dossiers publics.
- Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée,
- Privacy Browser peut exporter les paramètres et stocker les téléchargements dans les dossiers de l'application. En outre, Privacy Browser Free affiche les annonces du réseau AdMob de Google à l'aide du backend Firebase.
- Pour la version gratuite, Firebase ajoute les autorisations suivantes même si elles ne sont pas répertoriées dans le code source.
- manifest file. android.permission.ACCESS_NETWORK_STATE Permet aux annonces de dire quand vous êtes connecté à Internet et quand vous n'êtes pas (vraisemblablement pour ne pas essayer de recharger une annonce lorsque vous êtes déconnecté).
- Ils peuvent également savoir si vous êtes connecté via Wi-Fi, 2G, 3G, 4G, etc. Permet aux annonces d'empêcher le processeur de dormir et l'éclairage de l'écran, bien que lors de mes tests, je ne pense pas que les annonces le fassent réellement. com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE Permet aux autres applications de savoir si leur installation a été lancée à partir d'une annonce dans Privacy Browser Free. com.google.android.c2dm.permission.RECEIVE Permet à Google d'envoyer des informations directement à AdView sans avoir à recevoir de demande préalable (messagerie de périphérique à périphérique). Privacy Browser ne collecte aucune information sur l'utilisateur. Google Play a sa propre règle de confidentialité .
- Google fournit aux développeurs des informations d'installation récapitulatives et anonymisées, notamment le nombre d'installations organisées selon les catégories suivantes. Google Play a sa propre règle de confidentialité .
- Google fournit aux développeurs des résumés anonymisés des informations suivantes relatives aux évaluations des utilisateurs. Google Play a sa propre règle de confidentialité.
- Outre le nom du réviseur, l'évaluation et le texte de la révision (tous disponibles publiquement), Google fournit au développeur tout ou partie des informations suivantes. Privacy Browser Free affiche une bannière publicitaire en bas de l'écran à l'aide du réseau AdMob de Google,
- qui a sa propre politique de confidentialité.
- Ces annonces sont définies pour être non-personalisées.
- AdMob transmet aux développeurs des résumés anonymisés des informations suivantes. Les utilisateurs peuvent choisir d'envoyer des communications directes à Stoutner, telles que des courriels et des commentaires sur stoutner.com. Stoutner peut utiliser ces informations pour contribuer au développement de Privacy Browser et communiquer le statut du projet aux utilisateurs.
- Stoutner ne vendra jamais ces informations ni ne les transférera à des tiers qui les utiliseraient à des fins publicitaires ou marketing. Revision 1.7, 14 Mai 2019 E' richiesto per permettere l'accesso Internet a WebView. Senza questo permesso, Privacy Browser sarebbe âNessun Browser: Protegge la tua Privacy restando completamente isolato da Internetâ. com.android.launcher.permission.INSTALL_SHORTCUT E' richiesto per poter creare collegamenti a siti web sulla schermata principale del dispositivo. android.permission.READ_EXTERNAL_STORAGE Richiesta per l'importazione delle impostazioni dalle cartelle pubbliche.
- A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può importare le impostazioni solo dalle cartelle dell'applicazione. android.permission.WRITE_EXTERNAL_STORAGE Richiesta per l'esportazione delle applicazioni e per il download di file nelle cartelle pubbliche.
- A partire da Android Marshmallow (API 23), se questo permesso è negato Privacy Browser può esportare le impostazioni e salvare i download solo nelle cartelle dell'applicazione. Oltre ai permessi sopraelencati, Privacy Browser Free mostra gli annunci provenienti dalla Google's AdMob network utilizzando il Firebase backend.
- Se si utilizza la versione Free, Firebase aggiunge i seguenti permessi anche se non sono elencati nel codice sorgente del file
- âmanifestâ. android.permission.ACCESS_NETWORK_STATE Permette agli annunci di dire quando si è o non si è connessi a internet (presumibilmente per evitare il tentativo di ricaricare un annuncio quando non si è connessi).
- Gli annunci possono anche dire se si è connessi via Wi-Fi, 2G, 3G, 4G, ecc. Permette agli annunci di impedire al processore di entrare in modalità sleeping e allo schermo di spegnersi, anche se dopo vari test eseguiti non sembra che il comportamento sia questo. com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE Permette alle altre applicazioni di informare se la loro installazione è stata eseguita attraverso un annuncio pubblicitario in Privacy Browser Free. com.google.android.c2dm.permission.RECEIVE Permette a Google di inviare informazioni a AdView senza la necessità di ricevere una richiesta preventiva (messaggistica âcloud-to-deviceâ). Privacy Browser Free non raccoglie alcuna informazione dagli utenti. Privacy Browser Free non raccoglie alcuna informazione dagli utenti. Privacy Browser Free non raccoglie alcuna informazione dagli utenti. Google Play ha una propria privacy policy.
- Google fornisce agli sviluppatori informazioni anonime sulle installazioni, incluso il numero di installazioni, secondo le seguenti categorie. Google Play ha una propria privacy policy.
- Google fornisce agli sviluppatori sintesi anonime delle seguenti informazioni collegate ai ratings degli utenti. Google Play ha una propria privacy policy.
- Oltre al nome del recensore, al rating, e al testo della recensione (i quali sono tutti pubblicamente disponibili), Google fornisce alcune o tutte le seguenti informazioni allo sviluppatore. Privacy Browser Free mostra un banner pubblicitario nella parte inferiore dello schermo utilizzando la Google's AdMob network,
- che ha una propria privacy policy.
- Questi annunci sono impostati in modo da essere non-personalizzati.
- AdMob fornisce agli sviluppatori sintesi anonime delle seguenti informazioni. E' possibile inviare comunicazioni dirette a Stoutner, ad esempio email o commenti su stoutner.com. Stoutner si riserva l'utilizzo di queste informazioni come supporto per lo sviluppo di Privacy Browser e per comunicazioni sullo stato del progetto verso gli utenti.
- Stoutner non rivenderà o comunque non trasferirà mai nessuna informazione a terze parti che potrebbero utilizzarle a scopi pubblicitari o di marketing. Revisione 1.7, 14 Maggio 2019 ТÑебÑеÑÑÑ Ð´Ð»Ñ Ð´Ð¾ÑÑÑпа WebView к инÑеÑнеÑÑ. Ðез ÑÑого ÑазÑеÑÐµÐ½Ð¸Ñ Privacy Browser бÑÐ´ÐµÑ Ð¾ÑобÑажаÑÑ âÐÐµÑ Ð±ÑаÑзеÑа: ÑгÑÐ¾Ð·Ñ Ð²Ð°Ñей конÑиденÑиалÑноÑÑи Ð½ÐµÑ Ð¸Ð·-за оÑÑÑÑÑÑÐ²Ð¸Ñ Ð´Ð¾ÑÑÑпа к инÑеÑнеÑÑâ. com.android.launcher.permission.INSTALL_SHORTCUT ТÑебÑеÑÑÑ Ð´Ð»Ñ Ð´Ð¾Ð±Ð°Ð²Ð»ÐµÐ½Ð¸Ñ ÑÑлÑков веб-ÑайÑов на главнÑй ÑкÑан. android.permission.READ_EXTERNAL_STORAGE ТÑебÑеÑÑÑ Ð´Ð»Ñ Ð¸Ð¼Ð¿Ð¾ÑÑа наÑÑÑоек из обÑиÑ
папок.
- Ð Android Marshmallow (API 23) и более поздниÑ
веÑÑиÑÑ
, еÑли ÑÑо ÑазÑеÑение полÑÑено не бÑдеÑ, Privacy Browser Ð¼Ð¾Ð¶ÐµÑ Ð¸Ð¼Ð¿Ð¾ÑÑиÑоваÑÑ Ð½Ð°ÑÑÑойки из папок пÑиложениÑ. android.permission.WRITE_EXTERNAL_STORAGE ТÑебÑеÑÑÑ Ð´Ð»Ñ ÑкÑпоÑÑа наÑÑÑоек и загÑÑзки Ñайлов в обÑие папки.
- Ð Android Marshmallow (API 23) и более поздниÑ
веÑÑиÑÑ
, еÑли ÑÑо ÑазÑеÑение полÑÑено не бÑдеÑ, Privacy Browser Ð¼Ð¾Ð¶ÐµÑ ÑкÑпоÑÑиÑоваÑÑ Ð½Ð°ÑÑÑойки и Ñ
ÑаниÑÑ Ð·Ð°Ð³ÑÑзки в папкаÑ
пÑиложениÑ. ÐÑоме Ñого, Privacy Browser Free оÑобÑÐ°Ð¶Ð°ÐµÑ Ð¾Ð±ÑÑÐ²Ð»ÐµÐ½Ð¸Ñ Ð¸Ð· ÑеÑи Google AdMob Ñ Ð¸ÑполÑзованием бÑкенда Firebase.
- ÐÐ»Ñ Ð±ÐµÑплаÑной веÑÑии Firebase добавлÑÐµÑ ÑледÑÑÑие ÑазÑеÑениÑ, даже еÑли они не пеÑеÑиÑÐ»ÐµÐ½Ñ Ð²
- Ñайле маниÑеÑÑа иÑÑ
одного кода. android.permission.ACCESS_NETWORK_STATE ÐозволÑÐµÑ Ñекламе ÑзнаваÑÑ Ð½Ð°Ð»Ð¸Ñие подклÑÑÐµÐ½Ð¸Ñ Ðº инÑеÑнеÑÑ (возможно, Ñаким обÑазом пÑедоÑвÑаÑаÑÑÑÑ Ð¿Ð¾Ð¿ÑÑки загÑÑзки ÑÐµÐºÐ»Ð°Ð¼Ñ Ð¿Ñи оÑÑÑÑÑÑвии акÑивного ÑоединениÑ).
- ÐÑоме Ñого, пеÑедаеÑÑÑ Ñип подклÑÑÐµÐ½Ð¸Ñ - Wi-Fi, 2G, 3G, 4G, и Ñ.д. ÐозволÑÐµÑ Ñекламе пÑедоÑвÑаÑаÑÑ Ð¿ÐµÑеÑ
од пÑоÑеÑÑоÑа в Ñежим Ñна и ÑкÑан Ð¾Ñ Ð²ÑклÑÑениÑ. РезÑлÑÑаÑÑ ÑеÑÑиÑовании не ÑвидеÑелÑÑÑвÑÑÑ Ð¾ Ñом, ÑÑо Ñеклама на Ñамом деле ÑÑо делаеÑ. com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE ÐозволÑÐµÑ ÑÑоÑонним пÑиложениÑм ÑообÑаÑÑ Ð¾ запÑÑке инÑÑаллÑÑии из ÑÐµÐºÐ»Ð°Ð¼Ñ Ð² Privacy Browser Free. com.google.android.c2dm.permission.RECEIVE ÐозволÑÐµÑ Google оÑпÑавлÑÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð½ÐµÐ¿Ð¾ÑÑедÑÑвенно в AdView без необÑ
одимоÑÑи ÑнаÑала полÑÑаÑÑ Ð·Ð°Ð¿ÑÐ¾Ñ (обмен ÑообÑениÑми Ð¼ÐµÐ¶Ð´Ñ Ð¾Ð±Ð»Ð°ÐºÐ¾Ð¼ и ÑÑÑÑойÑÑвом). Privacy Browser не ÑобиÑÐ°ÐµÑ Ð½Ð¸ÐºÐ°ÐºÐ¾Ð¹ полÑзоваÑелÑÑкой инÑоÑмаÑии. Google Play Ð¸Ð¼ÐµÐµÑ ÑобÑÑвеннÑÑ Ð¿Ð¾Ð»Ð¸ÑÐ¸ÐºÑ ÐºÐ¾Ð½ÑиденÑиалÑноÑÑи.
- Google пÑедоÑÑавлÑÐµÑ ÑазÑабоÑÑикам ÑводнÑÑ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð¸Ð·Ð¸ÑованнÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾Ð± ÑÑÑановке, вклÑÑаÑÑÑÑ Ð¸Ñ
колиÑеÑÑво, оÑганизованнÑÑ Ð¿Ð¾ ÑледÑÑÑим каÑегоÑиÑм. Google Play Ð¸Ð¼ÐµÐµÑ ÑобÑÑвеннÑÑ Ð¿Ð¾Ð»Ð¸ÑÐ¸ÐºÑ ÐºÐ¾Ð½ÑиденÑиалÑноÑÑи.
- Google пÑедоÑÑавлÑÐµÑ ÑазÑабоÑÑикам анонимизиÑованнÑе Ñводки ÑледÑÑÑей инÑоÑмаÑии, ÑвÑзанной Ñ Ð¿Ð¾Ð»ÑзоваÑелÑÑкими ÑейÑингами. Google Play Ð¸Ð¼ÐµÐµÑ ÑобÑÑвеннÑÑ Ð¿Ð¾Ð»Ð¸ÑÐ¸ÐºÑ ÐºÐ¾Ð½ÑиденÑиалÑноÑÑи.
- Ðомимо имени авÑоÑа оÑзÑва, оÑенки и ÑекÑÑа оÑзÑва (вÑе они доÑÑÑÐ¿Ð½Ñ Ð¿ÑблиÑно), Google пÑедоÑÑавлÑÐµÑ ÑазÑабоÑÑÐ¸ÐºÑ Ð½ÐµÐºÐ¾ÑоÑÑÑ Ð¸Ð»Ð¸ вÑÑ ÑледÑÑÑÑÑ Ð¸Ð½ÑоÑмаÑиÑ. Privacy Browser Free оÑобÑÐ°Ð¶Ð°ÐµÑ ÑекламнÑй Ð±Ð°Ð½Ð½ÐµÑ Ð² нижней ÑаÑÑи ÑкÑана Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑеÑи Google AdMob,
- коÑоÑÐ°Ñ Ð¸Ð¼ÐµÐµÑ ÑобÑÑвеннÑÑ Ð¿Ð¾Ð»Ð¸ÑÐ¸ÐºÑ ÐºÐ¾Ð½ÑиденÑиалÑноÑÑи.
- ÐÑа Ñеклама не пеÑÑонализиÑÑеÑÑÑ.
- AdMob оÑпÑавлÑÐµÑ Ð°Ð½Ð¾Ð½Ð¸Ð¼Ð½Ñе оÑÑеÑÑ ÑазÑабоÑÑикам, ÑодеÑжаÑие ÑледÑÑÑÑÑ Ð¸Ð½ÑоÑмаÑиÑ. ÐолÑзоваÑели могÑÑ Ð½Ð°Ð¿ÑÑмÑÑ ÑвÑзаÑÑÑÑ Ñо Stoutner пÑи помоÑи ÑлекÑÑонной поÑÑÑ Ð¸ комменÑаÑиев на stoutner.com. Stoutner Ð¼Ð¾Ð¶ÐµÑ Ð¸ÑполÑзоваÑÑ ÑÑÑ Ð¸Ð½ÑоÑмаÑиÑ, как помоÑÑ Ð² ÑазÑабоÑке Privacy Browser и ÑообÑаÑÑ Ð¾ ÑÑаÑÑÑе пÑоекÑа полÑзоваÑелÑм.
- Stoutner никогда не бÑÐ´ÐµÑ Ð¿ÑодаваÑÑ ÑÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¸Ð»Ð¸ пеÑедаваÑÑ ÐµÐµ ÑÑеÑÑей ÑÑоÑоне, коÑоÑÐ°Ñ Ð¸ÑполÑзовала Ð±Ñ ÐµÐµ Ð´Ð»Ñ ÑÐµÐºÐ»Ð°Ð¼Ñ Ð¸Ð»Ð¸ маÑкеÑинга. Ð ÐµÐ²Ð¸Ð·Ð¸Ñ 1.7, 14 Ð¼Ð°Ñ 2019 года WebViewâın internete eriÅimi için gereklidir. Bu izin olmadan, Privacy Browser, âÄ°nternet Olmadan GizliliÄinizi Koruyan Bir Tarayıcıâ olacaktır. com.android.launcher.permission.INSTALL_SHORTCUT BaÅlatıcı masaüstüne web sayfalarının kısayollarını eklemek için gereklidir. android.permission.READ_EXTERNAL_STORAGE Ayarları ortak klasörden içe aktarmak için gereklidir.
- Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediÄinde, Privacy Browser, uygulama klasörlerinden ayarları içe aktarır. android.permission.WRITE_EXTERNAL_STORAGE Ayarları ve indirilen dosyaları ortak klasörlere aktarmak için gereklidir.
- Android Marshmallow (API 23) versiyonunda ve daha yeni versiyonlarda bu izin verilmediÄinde, Privacy Browser,
- indirilenleri uygulama klasörlerine depolar ve ayarları uygulama klasörlerine aktarır. Ek olarak, Privacy Browser Ãcretsiz, Firebase backend kullanarak Google'ın AdMob aÄından reklamlar görüntüler.
- Ãcretsiz sürüm için Firebase, kaynak kod bildirim dosyasında
- listelenmemiÅ olsalar bile aÅaÄıdaki izinleri ilave eder. android.permission.ACCESS_NETWORK_STATE Reklamların, internet eriÅimine ne zaman sahip olup olmadıÄınızı bilmesine izin verir (internet eriÅiminiz yoksa muhtemelen reklamı tekrar yüklemeyi denemezler).
- Ayrıca internete Wi-Fi, 2g, 3g, 4g vs. baÄlantı Åekillerinden hangisiyle baÄlandıÄınızı da anlayabilirler. Reklamların, iÅlemcinin uyku moduna geçmesini ve ekranın kararmasını engellemesine izin verir. KiÅisel deneyimime göre reklamların bunu yapabileceÄini sanmıyorum. com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE DiÄer uygulamaların, kurulumlarının Privacy Browser Ãcretsizde görüntülenen bir reklamdan baÅlatılıp baÅlatılmadıÄını anlamasına izin verir. com.google.android.c2dm.permission.RECEIVE Google'ın, öncesinde bir istek almasına gerek duymadan, AdView'e doÄrudan bilgi göndermesine izin verir (buluttan cihaza iletiÅim). Privacy Browser herhangi bir kullanıcı bilgisi toplamaz. Google Play kendisine özgü gizlilik politikasına sahiptir.
- Google, aÅaÄıdaki kategorilerce düzenlenen, indirme sayıları da dahil, anonimleÅtirilmiŠözet kurulum bilgilerini geliÅtiricilere verir. Google Play kendisine özgü gizlilik politikasına sahiptir.
- Google, kullanıcı deÄerlendirmeleriyle iliÅkili aÅaÄıdaki bilgilerin anonimleÅtirilmiŠözetlerini geliÅtiricilere verir. Google Play kendisine özgü gizlilik politikasına sahiptir.
- Google, inceleme yapan kiÅinin ismine, deÄerlendirmeye ve inceleme metninine (tümü halka açıktır) ek olarak, aÅaÄıdaki bilgilerin bir kısmını ya da tamamını geliÅtiricilere verir. Privacy Browser Ãcretsiz, Google'ın, kendisine özgü gizlilik politikası olan
- AdMob aÄını kullanarak ekranın alt kısmında bir banner reklam gösterir.
- Bu reklamlar kiÅiselleÅtirilmemiÅ olarak ayarlanmıÅtır.
- AdMob, geliÅtiricilere aÅaÄıdaki bilgilerin anonimleÅtirilmiŠözetlerini rapor eder. Kullanıcılar, stoutner.com üzerinden Stoutner ile doÄrudan iletiÅime (E-posta atmak ya da yorum yapmak gibi) geçebilir. Stoutner bu bilgileri, Privacy Browser'ın geliÅtirilmesine yardımcı olması ve kullanıcılarla projenin durumuyla ilgili iletiÅime geçmek için kullanabilir.
- Stoutner asla bu bilgileri, reklam ve pazarlama için kullanacak üçüncü kiÅilere vermez ya da satmaz. Revizyon 1.7, 14 Mayıs 2019 28. August 2020 - Mindest-API 19, Ziel-API 29 18. August 2020 - Mindest-API 19, Ziel-API 29 1. April 2020 - Mindest-API 19, Ziel-API 29 28. März 2020 - Mindest-API 19, Ziel-API 29 3. Januar 2020 - Mindest-API 19, Ziel-API 29 20. Juli 2019 - Mindest-API 19, Ziel-API 28 27. Mai 2019 - Mindest-API 19, Ziel-API 28 2. Mai 2019 - Mindest-API 19, Ziel-API 28 26. April 2019 - Mindest-API 19, Ziel-API 28 5. März 2019 - Mindest-API 19, Ziel-API 28 27. Februar 2019 - Mindest-API 19, Ziel-API 28 31. Januar 2019 - Mindest-API 19, Ziel-API 28 27. Dezember 2018 - Mindest-API 19, Ziel-API 28 24. Dezember 2018 - Mindest-API 19, Ziel-API 28 8. Dezember 2018 - Mindest-API 19, Ziel-API 28 29. Oktober 2018 - Mindest-API 19, Ziel-API 28 31. Juli 2018 - Mindest-API 19, Ziel-API 27 10. Juli 2018 - Mindest-API 19, Ziel-API 27 24. Mai 2018 - Mindest-API 19, Ziel-API 27 9. Mai 2018 - Mindest-API 19, Ziel-API 27 1. März 2018 - Mindest-API 19, Ziel-API 27 22. Februar 2018 - Mindest-API 19, Ziel-API 27 22. November 2017 - Mindest-API 19, Ziel-API 26 9. November 2017 - Mindest-API 19, Ziel-API 26 7. November 2017 - Mindest-API 19, Ziel-API 26 18. September 2017 - Mindest-API 19, Ziel-API 25 26. August 2017 - Mindest-API 19, Ziel-API 25 23. Juni 2017 - Mindest-API 19, Ziel-API 25 26. Mai 2017 - Mindest-API 19, Ziel-API 25 27. April 2017 - Mindest-API 19, Ziel-API 25 25. März 2017 - Mindest-API 19, Ziel-API 25 21. März 2017 - Mindest-API 19, Ziel-API 25 16. März 2017 - Mindest-API 19, Ziel-API 25 11. Februar 2017 - Mindest-API 19, Ziel-API 25 4. Januar 2017 - Mindest-API 19, Ziel-API 25 26. Dezember 2016 - Mindest-API 19, Ziel-API 25 28. November 2016 - Mindest-API 19, Ziel-API 24 9. November 2016 - Mindest-API 19, Ziel-API 24 22. Oktober 2016 - Mindest-API 19, Ziel-API 24 15. September 2016 - Mindest-API 19, Ziel-API 23 27. August 2016 - Mindest-API 19, Ziel-API 23 26. August 2016 - Mindest-API 19, Ziel-API 23 16. Juli 2016 - Mindest-API 19, Ziel-API 23 16. Juni 2016 - Mindest-API 19, Ziel-API 23 11. Mai 2016 - Mindest-API 15, Ziel-API 23 5. Mai 2016 - Mindest-API 15, Ziel-API 23 28. April 2016 - Mindest-API 15, Ziel-API 23 7. April 2016 - Mindest-API 15, Ziel-API 23 23. März 2016 - Mindest-API 15, Ziel-API 23 9. März 2016 - Mindest-API 10, Ziel-API 23 24. Februar 2016 - Mindest-API 10, Ziel-API 23 Privacy Browser wird primär von Soren Stoutner entwickelt. Mitwirkung ist willkommen in Form von Code und Ãbersetzung.Voller Netzwerkzugriff
-
- Verknüpfungen installieren
- Speicher lesen
- Speicher schreiben
-
-
-
-
- Netzwerk-Verbindungen anzeigen
- Schlaf-Modus des Telefons verhindern
-
- Play Install Referrer API
- Daten aus Internet empfangen
- Privacy Browser Free
- Google Play
-
-
-
-
- Google Play Bewertungen
-
-
-
-
- Google Play Rezensionen
-
-
-
-
- Werbeeinblendungen
-
-
-
-
- Direkte Kommunikation
- Daten-Nutzung
-
- Have full network access
-
- Install shortcuts
- Read storage
- Write storage
-
-
-
-
- View network connections
- Prevent phone from sleeping
-
- Play Install Referrer API
- Receive data from Internet
- Privacy Browser Free
- Google Play
diff --git a/app/src/free/assets/en/about_privacy_policy_light.html b/app/src/free/assets/en/about_privacy_policy_light.html
deleted file mode 100644
index 2a469bb5..00000000
--- a/app/src/free/assets/en/about_privacy_policy_light.html
+++ /dev/null
@@ -1,103 +0,0 @@
-
-
-
-
-
-
-
-
-
-
- Privacy Browser Free
- Google Play
-
-
-
-
- Google Play Ratings
-
-
-
-
- Google Play Reviews
-
-
-
-
- Advertisements
-
-
-
-
- Direct Communications
- Use of Information
-
- Tener acceso completo a la red
-
- Instalar accesos directos
- Almacenamiento de lectura
- Almacenamiento de escritura
-
-
-
-
- Ver conexiones de red
- Impedir que el teléfono entre en modo de suspensión
-
- API Install Referrer de Play
- Recibir datos de internet
- Navegador Privado Gratuito
- Google Play
diff --git a/app/src/free/assets/es/about_privacy_policy_dark.html b/app/src/free/assets/es/about_privacy_policy_dark.html
deleted file mode 100644
index f14b7ecb..00000000
--- a/app/src/free/assets/es/about_privacy_policy_dark.html
+++ /dev/null
@@ -1,105 +0,0 @@
-
-
-
-
-
-
-
-
-
-
- Navegador Privado Gratuito
- Google Play
-
-
-
-
- Calificaciones de Google Play
-
-
-
-
- Comentarios de Google Play
-
-
-
-
- Anuncios
-
-
-
-
- Comunicaciones directas
- Uso de Información
-
- Disposer d'un accès réseau complet
-
- Installer les raccourcis
- Lire le stockage
- Mémoire d'écriture
-
-
-
-
- Afficher les connexions réseau
- Empêcher le téléphone de dormir
-
- Jouer Installer l'API Référent
- Recevoir des données d'Internet
- Privacy Browser
- Google Play
-
-
-
-
- Notes Google Play
-
-
-
-
- Avis Google Play
-
-
-
-
- Annonces
-
-
-
-
- Communications directes
- Utilisation de l'information
-
- Accesso completo alla rete
-
- Creazione di collegamenti
- Lettura dalla memoria
- Scrittura della memoria
-
-
-
-
- Visualizzare connessioni di rete
- Impedire al dispositivo di entrare in modalità sleeping
-
- API Play Install Referrer
- Ricezione dati da Internet
- Privacy Browser Free
- Google Play
diff --git a/app/src/free/assets/it/about_privacy_policy_light.html b/app/src/free/assets/it/about_privacy_policy_light.html
deleted file mode 100644
index 32b7fb0d..00000000
--- a/app/src/free/assets/it/about_privacy_policy_light.html
+++ /dev/null
@@ -1,105 +0,0 @@
-
-
-
-
-
-
-
-
-
-
- Privacy Browser Free
- Google Play
-
-
-
-
- Ratings di Google Play
-
-
-
-
- Recensioni di Google Play
-
-
-
-
- Annunci
-
-
-
-
- Comunicazioni Dirette
- Utilizzo delle informazioni
-
- ÐолнÑй доÑÑÑп к ÑеÑи
-
- УÑÑановка ÑÑлÑков
- ЧÑение Ñ
ÑанилиÑа
- ÐапиÑÑ Ñ
ÑанилиÑа
-
-
-
-
- ÐÑоÑмоÑÑ ÑеÑевÑÑ
подклÑÑений
- ÐÑедоÑвÑаÑение заÑÑÐ¿Ð°Ð½Ð¸Ñ ÑÑÑÑойÑÑва
-
- Play Install Referrer API
- ÐолÑÑение даннÑÑ
из инÑеÑнеÑа
- Privacy Browser
- Google Play
-
-
-
-
- РейÑинги Google Play
-
-
-
-
- ÐÑзÑÐ²Ñ Google Play
-
-
-
-
- Реклама
-
-
-
-
- ÐÑÑÐ¼Ð°Ñ ÑвÑзÑ
- ÐÑполÑзование инÑоÑмаÑии
-
- Tam aÄ eriÅimine sahip olma
-
- Kısayolları yükleme
- Depolama okuma
- Depolama yazma
-
-
-
-
- AÄ baÄlantılarını görüntüle
- Telefonun uyku moduna geçmesini engelleme
-
- Play Install Referrer API
- Ä°nternetten veri alma
- Privacy Browser
- Google Play
-
-
-
-
- Google Play Derecelendirmeleri
-
-
-
-
- Google Play Kritikleri
-
-
-
-
- <Reklamlar
-
-
-
-
- DoÄrudan Ä°letiÅim
- Bilgilerin Kullanımı
-
- 3.5.1 (version code 51)
-
-
-
- 3.5 (version code 50)
-
-
-
- 3.4.1 (version code 49)
-
-
-
- 3.4 (version code 48)
-
-
-
- 3.3 (version code 47)
-
-
-
- 3.2 (version code 46)
-
-
-
- 3.1 (version code 45)
-
-
-
- 3.0.1 (version code 44)
-
-
-
- 3.0 (version code 43)
-
-
-
- 2.17.1 (version code 42)
-
-
-
- 2.17 (version code 41)
-
-
-
- 2.16 (version code 40)
-
-
-
- 2.15.1 (version code 39)
-
-
-
- 2.15 (version code 38)
-
-
-
- 2.14 (version code 37)
-
-
-
- 2.13 (version code 36)
-
-
-
- 2.12 (version code 35)
-
-
-
- 2.11 (version code 34)
-
-
-
- 2.10 (version code 33)
-
-
-
- 2.9 (version code 32)
-
-
-
- 2.8.1 (version code 31)
-
-
-
- 2.8 (version code 30)
-
-
-
- 2.7.2 (version code 29)
-
-
-
- 2.7.1 (version code 28)
-
-
-
- 2.7 (version code 27)
-
-
-
- 2.6 (version code 26)
-
-
-
- 2.5 (version code 25)
-
-
-
- 2.4 (version code 24)
-
-
-
- 2.3 (version code 23)
-
-
-
- 2.2 (version code 22)
-
-
-
- 2.1 (version code 21)
-
-
-
- 2.0.1 (version code 20)
-
-
-
- 2.0 (version code 19)
-
-
-
- 1.15 (version code 18)
-
-
-
- 1.14.1 (version code 17)
-
-
-
- 1.14 (version code 16)
-
-
-
- 1.13 (version code 15)
-
-
-
- 1.12 (version code 14)
-
-
-
- 1.11 (version code 13)
-
-
-
- 1.10 (version code 12)
-
-
-
- 1.9.1 (version code 11)
-
-
-
- 1.9 (version code 10)
-
-
-
- 1.8 (version code 9)
-
-
-
- 1.7 (version code 8)
-
-
-
- 1.6 (version code 7)
-
-
-
- 1.5 (version code 6)
-
-
-
- 1.4 (version code 5)
-
-
-
- 1.3 (version code 4)
-
-
-
- 1.2 (version code 3)
-
-
-
- 1.1 (version code 2)
-
-
-
- 1.0 (version code 1)
-
-
-
-
\ No newline at end of file
diff --git a/app/src/main/assets/de/about_contributors_light.html b/app/src/main/assets/de/about_contributors.html
similarity index 90%
rename from app/src/main/assets/de/about_contributors_light.html
rename to app/src/main/assets/de/about_contributors.html
index a8a3a6d0..ee884cbf 100644
--- a/app/src/main/assets/de/about_contributors_light.html
+++ b/app/src/main/assets/de/about_contributors.html
@@ -24,7 +24,10 @@
-
+
+
+
+
diff --git a/app/src/main/assets/de/about_contributors_dark.html b/app/src/main/assets/de/about_contributors_dark.html
deleted file mode 100644
index 326c2177..00000000
--- a/app/src/main/assets/de/about_contributors_dark.html
+++ /dev/null
@@ -1,53 +0,0 @@
-
-
-
-
-
-
-
-
-
-
- Leitender Entwickler
- Weitere Entwickler
- Thomas Jensen
- Hendrik Knackstedt
-
- Mitwirkende
- Bernhard G. Keller: Deutsch
- Thiago Nazareno Conceição Silva de Jesus: Brasilianisches Portugiesisch
- Kévin LE FLOHIC: Französisch
- Francesco Buratti: Italienisch
- Jose A. León: Spanisch
-
- Frühere Mitwirkende
- Stefan Erhardt: Deutsch
- Aaron Gerlach: Deutsch
-
-
-
-
- are derived from security
and language
,
+
+ are derived from security
and language
,
which are part of the Android Material icon set and are released under the Apache License 2.0.
The full text of the license is below. Modifications copyright © 2016 Soren Stoutner.
The resulting images are released under the GPLv3+ license.
is derived from elements of folder
and exit_to_app
,
+
is derived from elements of folder
and exit_to_app
,
which are part of the Android Material icon set
and are released under the Apache License 2.0.
Modifications copyright © 2017 Soren Stoutner.
The resulting image is released under the GPLv3+ license.
is derived from elements of bookmark
and create_new_folder
, which are part of the
+
is derived from elements of bookmark
and create_new_folder
, which are part of the
Android Material icon set and are released under the Apache License 2.0.
Modifications copyright © 2017 Soren Stoutner.
The resulting image is released under the GPLv3+ license.
is derived from create_new_folder
,
+
is derived from create_new_folder
,
which is part of the Android Material icon set and is released under the Apache License 2.0.
Modifications copyright © 2017 Soren Stoutner.
The resulting image is released under the GPLv3+ license.
is derived from exit_to_app
, which is part of the Android Material icon set
+
is derived from exit_to_app
, which is part of the Android Material icon set
and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner.
The resulting image is released under the GPLv3+ license.
is derived from compare
, which is part of the Android Material icon set
+
is derived from compare
, which is part of the Android Material icon set
and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner.
The resulting image is released under the GPLv3+ license.
is derived from sort
, which is part of the Android Material icon set
+
is derived from sort
, which is part of the Android Material icon set
and is released under the Apache License 2.0. Modifications copyright © 2019 Soren Stoutner.
The resulting image is released under the GPLv3+ license.
cookie
was created by Google.
+
cookie
was created by Google.
It is released under the Apache License 2.0
and can be downloaded from Material Design Icons. It is unchanged except for layout information like color and size.
The following icons come from the Android Material icon set, which is released under the Apache License 2.0. They are unchanged except for layout information like color and size. Some of them have been renamed to match their use in the code. The original icons and names are shown below.
-add.
-arrow_back.
-arrow_forward.
-bookmarks.
-bug_report.
-camera_enhance.
-chrome_reader_mode.
-close.
-delete.
-delete_forever.
-devices_other.
-dns.
-donut_small.
-edit.
-expand_less.
-expand_more.
-file_copy.
-file_download.
-find_in_page.
-folder.
-home.
-image.
-import_contacts.
-import_export.
-important_devices.
-info_outline.
-language.
-link_off.
-list.
-local_activity.
-location_off.
-lock.
-map.
-more.
-new releases.
-open_in_browser.
-payment.
-question_answer.
-refresh.
-save.
-search.
-select_all.
-settings.
-settings_overscan.
-share.
-smartphone.
-sort.
-style.
-subtitles.
-tab.
-text_fields.
-thumbs_up_down.
-vertical_align_bottom.
-vertical_align_top.
-visibility_off.
-vpn_key.
-vpn_lock.
-web.
+add.
+arrow_back.
+arrow_forward.
+bookmarks.
+bug_report.
+camera_enhance.
+chrome_reader_mode.
+close.
+delete.
+delete_forever.
+devices_other.
+dns.
+donut_small.
+edit.
+expand_less.
+expand_more.
+file_copy.
+file_download.
+find_in_page.
+folder.
+home.
+image.
+import_contacts.
+import_export.
+important_devices.
+info_outline.
+language.
+link_off.
+list.
+local_activity.
+location_off.
+lock.
+map.
+more.
+new releases.
+open_in_browser.
+payment.
+question_answer.
+refresh.
+save.
+search.
+select_all.
+settings.
+settings_overscan.
+share.
+smartphone.
+sort.
+style.
+subtitles.
+tab.
+text_fields.
+thumbs_up_down.
+vertical_align_bottom.
+vertical_align_top.
+visibility_off.
+vpn_key.
+vpn_lock.
+web.
Privacy Browser ist copyright © 2015-2020 von Soren Stoutner.
- -Privacy Browser ist veröffentlicht unter der GPLv3+ Lizenz. The full text of the license is below. - The source code is available from git.stoutner.com.
- -EasyList and EasyPrivacy - are dual licensed under the GPLv3+ - and the Creative Commons Attribution-ShareAlike 3.0+ Unported licenses. - Privacy Browser incorporates them using the GPLv3+ option.
- -Fanboyâs Annoyance List and Fanboyâs Social Blocking List - are released under the Creative Commons Attribution 3.0 Unported license, - which is compatible with the GPLv3+. The lists are included unchanged in Privacy Browser.
- -More information about the blocklists can be found on the EasyList website.
- -Privacy Browser baut auf den AndroidX-Bibliotheken, - den Kotlin-Bibliotheken - und Code des Google Material Maven repository, - auf, welche unter der Apache Lizenz 2.0 veröffentlicht werden.
- -Die kostenlose Variante von Privacy Browser verwendet Firebase Ads, - welche unter der Android Software Development Kit Lizenz veröffentlicht werden.
- -com.stoutner.privacybrowser.views.CheckedLinearLayout
is a modified version of a class contained in the
- Android Camera source code.
- The original file was released under the Apache License 2.0.
- The modified file is released under the GPLv3+ license.
- are derived from security
and language
,
- which are part of the Android Material icon set and are released under the Apache License 2.0.
- The full text of the license is below. Modifications copyright © 2016 Soren Stoutner.
- The resulting images are released under the GPLv3+ license.
is derived from elements of folder
and exit_to_app
, which are part of the
- Android Material icon set and are released under the Apache License 2.0.
- Modifications copyright © 2017 Soren Stoutner.
- The resulting image is released under the GPLv3+ license.
is derived from elements of bookmark
and create_new_folder
, which are part of the
- Android Material icon set and are released under the Apache License 2.0.
- Modifications copyright © 2017 Soren Stoutner.
- The resulting image is released under the GPLv3+ license.
is derived from create_new_folder
,
- which is part of the Android Material icon set and is released under the Apache License 2.0.
- Modifications copyright © 2017 Soren Stoutner.
- The resulting image is released under the GPLv3+ license.
is derived from exit_to_app
, which is part of the Android Material icon set
- and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner.
- The resulting image is released under the GPLv3+ license.
is derived from compare
, which is part of the Android Material icon set
- and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner.
- The resulting image is released under the GPLv3+ license.
is derived from sort
, which is part of the Android Material icon set
- and is released under the Apache License 2.0. Modifications copyright © 2019 Soren Stoutner.
- The resulting image is released under the GPLv3+ license.
cookie
was created by Google.
- It is released under the Apache License 2.0
- and can be downloaded from Material Design Icons. It is unchanged except for layout information like color and size.
The following icons come from the Android Material icon set, - which is released under the Apache License 2.0. - They are unchanged except for layout information like color and size. Some of them have been renamed to match their use in the code. The original icons and names are shown below.
-add.
-arrow_back.
-arrow_forward.
-bookmarks.
-bug_report.
-camera_enhance.
-chrome_reader_mode.
-close.
-delete.
-delete_forever.
-devices_other.
-dns.
-donut_small.
-edit.
-expand_less.
-expand_more.
-file_copy.
-file_download.
-find_in_page.
-folder.
-home.
-image.
-import_contacts.
-import_export.
-important_devices.
-info_outline.
-language.
-link_off.
-list.
-local_activity.
-location_off.
-lock.
-map.
-more.
-new releases.
-open_in_browser.
-payment.
-question_answer.
-refresh.
-save.
-search.
-select_all.
-settings.
-settings_overscan.
-share.
-smartphone.
-sort.
-style.
-subtitles.
-tab.
-text_fields.
-thumbs_up_down.
-vertical_align_bottom.
-vertical_align_top.
-visibility_off.
-vpn_key.
-vpn_lock.
-web.
- -Offizielle deutsche Ãbersetzung der GNU General Public License
- -Version 3, 29 June 2007
- -Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>
- -Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.
- -The GNU General Public License is a free, copyleft license for - software and other kinds of works.
- -The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a programâto make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.
- -When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.
- -To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.
- -For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.
- -Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.
- -For the developersâ and authorsâ protection, the GPL clearly explains - that there is no warranty for this free software. For both usersâ and - authorsâ sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.
- -Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting usersâ freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.
- -Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.
- -The precise terms and conditions for copying, distribution and - modification follow.
- -âThis Licenseâ refers to version 3 of the GNU General Public License.
- -âCopyrightâ also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.
- -âThe Programâ refers to any copyrightable work licensed under this - License. Each licensee is addressed as âyouâ. âLicenseesâ and - ârecipientsâ may be individuals or organizations.
- -To âmodifyâ a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a âmodified versionâ of the - earlier work or a work âbased onâ the earlier work.
- -A âcovered workâ means either the unmodified Program or a work based - on the Program.
- -To âpropagateâ a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.
- -To âconveyâ a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.
- -An interactive user interface displays âAppropriate Legal Noticesâ - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.
- -The âsource codeâ for a work means the preferred form of the work - for making modifications to it. âObject codeâ means any non-source - form of a work.
- -A âStandard Interfaceâ means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.
- -The âSystem Librariesâ of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - âMajor Componentâ, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.
- -The âCorresponding Sourceâ for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the workâs - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.
- -The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.
- -The Corresponding Source for a work in source code form is that - same work.
- -All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.
- -You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.
- -Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.
- -No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.
- -When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the workâs - users, your or third partiesâ legal rights to forbid circumvention of - technological measures.
- -You may convey verbatim copies of the Programâs source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.
- -You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.
- -You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:
- -A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - âaggregateâ if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilationâs users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.
- -You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:
- -A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.
- -A âUser Productâ is either (1) a âconsumer productâ, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, ânormally usedâ refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.
- -âInstallation Informationâ for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.
- -If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).
- -The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.
- -Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.
- -âAdditional permissionsâ are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.
- -When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.
- -Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:
- -All other non-permissive additional terms are considered âfurther - restrictionsâ within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.
- -If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.
- -Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.
- -You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).
- -However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.
- -Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.
- -Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.
- -You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.
- -Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.
- -An âentity transactionâ is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the partyâs predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.
- -You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.
- -A âcontributorâ is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributorâs âcontributor versionâ.
- -A contributorâs âessential patent claimsâ are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, âcontrolâ includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.
- -Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributorâs essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.
- -In the following three paragraphs, a âpatent licenseâ is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To âgrantâ such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.
- -If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. âKnowingly relyingâ means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipientâs use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.
- -If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.
- -A patent license is âdiscriminatoryâ if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.
- -Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.
- -If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.
- -Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.
- -The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.
- -Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License âor any later versionâ applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.
- -If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxyâs - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.
- -Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.
- -THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM âAS ISâ WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
- -IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.
- -If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.
- -END OF TERMS AND CONDITIONS
- -If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.
- -To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the âcopyrightâ line and a pointer to where the full notice is found.
- -<one line to give the programâs name -and a brief idea of what it does.> -Copyright (C) <year> <name of author> - -This program is free software: you can -redistribute it and/or modify -it under the terms of the GNU General -Public License as published by the Free -Software Foundation, either version 3 -of the License, or(at your option) -any later version. - -This program is distributed in the hope -that it will be useful, but WITHOUT ANY -WARRANTY; without even the implied -warranty of MERCHANTABILITY or FITNESS -FOR A PARTICULAR PURPOSE. See the GNU -General Public License for more details. - -You should have received a copy of the -GNU General Public License along with -this program. If not, see -<http://www.gnu.org/licenses/>.- -
Also add information on how to contact you by electronic and paper mail.
- -If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:
- -<program> Copyright (C) <year> -<name of author> -This program comes with ABSOLUTELY NO -WARRANTY; for details type `show w'. -This is free software, and you are -welcome to redistribute it under -certain conditions; type `show c' -for details.- -
The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your programâs commands - might be different; for a GUI interface, you would use an âabout boxâ.
- -You should also get your employer (if you work as a programmer) or school, - if any, to sign a âcopyright disclaimerâ for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.
- -The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.
- -Version 2.0, January 2004
-http://www.apache.org/licenses/
- -âLicenseâ shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.
- -âLicensorâ shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.
- -âLegal Entityâ shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, âcontrolâ means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.
- -âYouâ (or âYourâ) shall mean an individual or Legal Entity exercising - permissions granted by this License.
- -âSourceâ form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.
- -âObjectâ form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.
- -âWorkâ shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).
- -âDerivative Worksâ shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.
- -âContributionâ shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, âsubmittedâ means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as âNot a - Contribution.â
- -âContributorâ shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.
- -Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.
- -Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.
- -You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:
- -Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.
- -This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.
- -Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an âAS ISâ BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.
- -In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.
- -While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.
- -END OF TERMS AND CONDITIONS
- -To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets â[]â replaced with your own - identifying information. (Donât include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same âprinted pageâ as the copyright notice for easier - identification within third-party archives.
-Copyright [yyyy] [name of copyright owner] - -Licensed under the Apache License, -Version 2.0 (the âLicenseâ); -you may not use this file except -in compliance with the License. -You may obtain a copy of the License at - -http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law -or agreed to in writing, software -distributed under the License is -distributed on an âAS ISâ BASIS, -WITHOUT WARRANTIES OR CONDITIONS -OF ANY KIND, either express or implied. -See the License for the specific -language governing permissions and -limitations under the License.\ No newline at end of file diff --git a/app/src/main/assets/de/about_links_light.html b/app/src/main/assets/de/about_links.html similarity index 71% rename from app/src/main/assets/de/about_links_light.html rename to app/src/main/assets/de/about_links.html index eb21ce41..b36d2ae3 100644 --- a/app/src/main/assets/de/about_links_light.html +++ b/app/src/main/assets/de/about_links.html @@ -1,5 +1,5 @@ +
Bug-Tracker und Feature-Anfragen
- - \ No newline at end of file diff --git a/app/src/main/assets/de/about_links_dark.html b/app/src/main/assets/de/about_links_dark.html deleted file mode 100644 index ceff2b4d..00000000 --- a/app/src/main/assets/de/about_links_dark.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - - - - - - - -- Roadmap
- -- Bug-Tracker und Feature-Anfragen
- -- Forum
- -- GitWeb
- - \ No newline at end of file diff --git a/app/src/main/assets/de/about_permissions_dark.html b/app/src/main/assets/de/about_permissions.html similarity index 90% rename from app/src/main/assets/de/about_permissions_dark.html rename to app/src/main/assets/de/about_permissions.html index dbda03a0..bd90da57 100644 --- a/app/src/main/assets/de/about_permissions_dark.html +++ b/app/src/main/assets/de/about_permissions.html @@ -1,5 +1,5 @@ + diff --git a/app/src/main/assets/de/about_permissions_light.html b/app/src/main/assets/de/about_permissions_light.html deleted file mode 100644 index ecaf7b57..00000000 --- a/app/src/main/assets/de/about_permissions_light.html +++ /dev/null @@ -1,50 +0,0 @@ - - - - - - - - - - -Benötigt, damit WebView das Internet nutzen kann. Ohne diese Berechtigung wäre Privacy Browser âKein Browser: Schützt Ihre Privatsphäre durch Fernbleiben von jeglicher Konnektivitätâ.
- -com.android.launcher.permission.INSTALL_SHORTCUT
-Benötigt, um Verknüpfungen zu Websites auf Ihrer Startseite zu erstellen.
- -android.permission.READ_EXTERNAL_STORAGE
-Benötigt, um Einstellungen aus öffentlichen Ordnern zu importieren. Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen nur aus seinem eigenen Ordner importieren, wenn diese Berechtigung nicht erteilt wird.
- -android.permission.WRITE_EXTERNAL_STORAGE
-Benötigt, um Einstellungen und Downloads in öffentlichen Ordnern zu speichern. - Unter Android Marshmallow (API 23) und neuer kann Privacy Browser Einstellungen und Downloads nur in seinem eigenen Ordner speichern, wenn diese Berechtigung nicht erteilt wird.
- - \ No newline at end of file diff --git a/app/src/main/assets/de/about_privacy_policy_light.html b/app/src/main/assets/de/about_privacy_policy.html similarity index 92% rename from app/src/main/assets/de/about_privacy_policy_light.html rename to app/src/main/assets/de/about_privacy_policy.html index dccd9447..43e6bcb4 100644 --- a/app/src/main/assets/de/about_privacy_policy_light.html +++ b/app/src/main/assets/de/about_privacy_policy.html @@ -1,5 +1,5 @@ + @@ -86,6 +89,6 @@ Stoutner wird die Informationen niemals verkaufen oder an Dritte weitergeben, welche diese für Anzeigen oder Marketing nutzen.Revision 1.6, 22. Mai 2018
+Revision 1.7, 14. Mai 2019
\ No newline at end of file diff --git a/app/src/main/assets/de/about_privacy_policy_dark.html b/app/src/main/assets/de/about_privacy_policy_dark.html deleted file mode 100644 index 62a05e73..00000000 --- a/app/src/main/assets/de/about_privacy_policy_dark.html +++ /dev/null @@ -1,91 +0,0 @@ - - - - - - - - - - -Privacy Browser sammelt keinerlei Benutzer-Informationen.
- - -Google Play hat seine eigene Datenschutzerklärung. - Google stellt Entwicklern anonymisierte Installations-Informationen inklusive der Anzahl der Installationen unterteilt in die folgenden Kategorien bereit:
-Google Play hat seine eigene Datenschutzerklärung. - Google stellt Entwicklern folgende anonymisierte Installations-Informationen bezüglich der Bewertungen bereit:
-Google Play hat seine eigene Datenschutzerklärung. - Zusätzlich zum Namen des Rezensenten, der Bewertung und dem Text der Rezension (welche alle öffentlich zugänglich sind), stellt Google dem Entwickler einige oder alle der folgenden Informationen zur Verfügung:
-Benutzer können z.B. per Email und Kommentaren auf stoutner.com direkt mit Stoutner Kontakt aufnehmen.
- -Stoutner kann diese Informationen nutzen, um die Entwicklung von Privacy Browser zu unterstützen und den Status des Projekts an Benutzer zu melden. - Stoutner wird die Informationen niemals verkaufen oder an Dritte weitergeben, welche diese für Anzeigen oder Marketing nutzen.
- -Revision 1.6, 22. Mai 2018
- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_domain_settings_light.html b/app/src/main/assets/de/guide_domain_settings.html similarity index 73% rename from app/src/main/assets/de/guide_domain_settings_light.html rename to app/src/main/assets/de/guide_domain_settings.html index abd39a41..ffabdebc 100644 --- a/app/src/main/assets/de/guide_domain_settings_light.html +++ b/app/src/main/assets/de/guide_domain_settings.html @@ -1,5 +1,5 @@ + -Privacy Browserâs Vorgabe ist das Surfen ohne JavaScript, Cookies und DOM-Speicher. Allerdings gibt es Websites, die nur korrekt funktionieren, wenn eine oder mehrere dieser Funktionen aktiviert sind. Sie können daher eine oder mehrere dieser Funktionen automatisch aktivieren, wenn Sie eine solche Seite (Domain) besuchen.
- +Wenn Sie ein Seite besuchen, für die zuvor bereits entsprechende Einstellungen getätigt wurden, wird der Hintergrund der URL-Textbox grün dargestellt.
- + \ No newline at end of file diff --git a/app/src/main/assets/de/guide_domain_settings_dark.html b/app/src/main/assets/de/guide_domain_settings_dark.html deleted file mode 100644 index 2c0f2322..00000000 --- a/app/src/main/assets/de/guide_domain_settings_dark.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -Privacy Browserâs Vorgabe ist das Surfen ohne JavaScript, Cookies und DOM-Speicher. - Allerdings gibt es Websites, die nur korrekt funktionieren, wenn eine oder mehrere dieser Funktionen aktiviert sind. - Sie können daher eine oder mehrere dieser Funktionen automatisch aktivieren, wenn Sie eine solche Seite (Domain) besuchen.
- - - -Wenn Sie ein Seite besuchen, für die zuvor bereits entsprechende Einstellungen getätigt wurden, wird der Hintergrund der URL-Textbox grün dargestellt.
- - - - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_javascript_light.html b/app/src/main/assets/de/guide_javascript.html similarity index 85% rename from app/src/main/assets/de/guide_javascript_light.html rename to app/src/main/assets/de/guide_javascript.html index e85c348f..11e56059 100644 --- a/app/src/main/assets/de/guide_javascript_light.html +++ b/app/src/main/assets/de/guide_javascript.html @@ -1,5 +1,5 @@ + -In den frühen Tagen des Internets waren Websites statisch, zeigten also nur Text und Bilder, welche auf dem Bildschirm sichtbar sind, veränderten sich oder interagierten aber nicht. Natürlich passierte auf solch statischen Websites nicht viel Interessantes. Viele verschiedene Technologien wurden für dynamische Websites entwickelt. Javascript war eine davon.
@@ -36,7 +39,7 @@Javascript ist eine Programmiersprache. Viele Webserver hosten in Javascript geschriebene Programme, welche als Teil der Website an die abrufenden Geräte gesandt werden. Das Gerät führt die Skripts dann auf dem lokalen Gerät aus und folgt den Anweisungen des Programms, um beispielsweise Bilder zu animieren, Menüs zu öffnen und andere derartige Dinge.
-Natürlich birgt das Konzept von willkürlich ausgeführten Programmen aus einer Website heraus auch ein groÃes Gefahrenprotenzial. Also werden Limitierungen in Javascript gesetzt, die etwa Viren verhindern sollen, jedoch nicht immer wirksam sind. @@ -44,13 +47,13 @@ einer Website die Beispiele für von einem Gerät produzierten Informationen bietet, wenn Javascript auf einem Gerät läuft. Browser Leaks ist eine andere gute Quelle.
- +Zum Schutz der Privatsphäre wäre es ideal, das Web ohne Javascript zu nutzen. Jedoch benötigen manche Websites legitimerweise JavaScript, um ihre Zwecke zu erfüllen und andere funktionieren nicht korrekt ohne Javascript, selbst wenn sie dazu umprogrammiert werden könnten. Privacy Browser geht auf diese Problematik ein und macht es einfach, Javascript zu (de-)aktivieren. Ein Knopfdruck auf das Privatsphäre-Schild wechselt zwischen blau - oder gelb (beide zeigen an, dass - JavaScript aus ist) und rot (JavaScript aktiviert) und aktualisiert die Website. + oder gelb (beide zeigen an, dass + JavaScript aus ist) und rot (JavaScript aktiviert) und aktualisiert die Website. Der Vergleich der verschiedenen Informationen, die webkay mit und ohne Javascript sammeln kann, ist sehr informativ.
Im Internet ohne Javascript unterwegs zu sein oder dieses nur bei Bedarf zu aktivieren, ist ein daher wichtiger Schritt, um die Privatsphäre zu schützen. diff --git a/app/src/main/assets/de/guide_javascript_dark.html b/app/src/main/assets/de/guide_javascript_dark.html deleted file mode 100644 index 24829871..00000000 --- a/app/src/main/assets/de/guide_javascript_dark.html +++ /dev/null @@ -1,60 +0,0 @@ - - - -
- - - - - - -In den frühen Tagen des Internets waren Websites statisch, zeigten also nur Text und Bilder, welche auf dem Bildschirm sichtbar sind, veränderten sich oder interagierten aber nicht. - Natürlich passierte auf solch statischen Websites nicht viel Interessantes. Viele verschiedene Technologien wurden für dynamische Websites entwickelt. Javascript war eine davon.
- -Javascript ist eine Programmiersprache. Viele Webserver hosten in Javascript geschriebene Programme, welche als Teil der Website an die abrufenden Geräte gesandt werden. - Das Gerät führt die Skripts dann auf dem lokalen Gerät aus und folgt den Anweisungen des Programms, um beispielsweise Bilder zu animieren, Menüs zu öffnen und andere derartige Dinge.
- -Natürlich birgt das Konzept von willkürlich ausgeführten Programmen aus einer Website heraus auch ein groÃes Gefahrenprotenzial. - Also werden Limitierungen in Javascript gesetzt, die etwa Viren verhindern sollen, jedoch nicht immer wirksam sind. - Das Bild unten zeigt einen Screenshot von webkay, - einer Website die Beispiele für von einem Gerät produzierten Informationen bietet, wenn Javascript auf einem Gerät läuft. - Browser Leaks ist eine andere gute Quelle.
- - - -Zum Schutz der Privatsphäre wäre es ideal, das Web ohne Javascript zu nutzen. Jedoch benötigen manche Websites legitimerweise - JavaScript, um ihre Zwecke zu erfüllen und andere funktionieren nicht korrekt ohne Javascript, selbst wenn sie dazu umprogrammiert werden könnten. - Privacy Browser geht auf diese Problematik ein und macht es einfach, Javascript zu (de-)aktivieren. Ein Knopfdruck auf das Privatsphäre-Schild wechselt zwischen blau - oder gelb (beide zeigen an, dass - JavaScript aus ist) und rot (JavaScript aktiviert) und aktualisiert die Website. - Der Vergleich der verschiedenen Informationen, die webkay mit und ohne Javascript sammeln kann, ist sehr informativ.
- -Im Internet ohne Javascript unterwegs zu sein oder dieses nur bei Bedarf zu aktivieren, ist ein daher wichtiger Schritt, um die Privatsphäre zu schützen. - Darüber hinaus werden von den meisten modernen Websites nervige Werbebanner und und überflüssiger Müll mit Javascript geladen. - Wird Javascript deaktiviert, laden Websites daher meist wesentlich schneller, brauchen weniger Datenvolumen und CPU-Leistung, was auch die Lebenszeit der Batterien verlängert.
- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_local_storage_light.html b/app/src/main/assets/de/guide_local_storage.html similarity index 90% rename from app/src/main/assets/de/guide_local_storage_light.html rename to app/src/main/assets/de/guide_local_storage.html index a6cd9d5c..04d3b5a6 100644 --- a/app/src/main/assets/de/guide_local_storage_light.html +++ b/app/src/main/assets/de/guide_local_storage.html @@ -1,5 +1,5 @@ + -Cookies können in zwei Typen unterteilt werden: Erstanbieter-Cookies sind Cookies, die von der aktuell besuchten Website gesetzt werden.
@@ -43,9 +46,9 @@Nahezu alle Webseiten, bei denen eine Anmeldung notwendig ist, nutzen Erstanbieter-Cookies für den Anmeldevorgang. Damit wird sichergestellt, dass nur der angemeldete Benutzer Zugang zu den entsprechenden Informationen hat. Dies ist meiner Meinung nach eine der wenigen legitimen Verwendungen von Cookies.
-Wenn Erstanbieter-Cookies aktiviert sind, aber Javascript deaktiviert, ist das Privatsphäre-Icon als Warnung gelb .
+Wenn Erstanbieter-Cookies aktiviert sind, aber Javascript deaktiviert, ist das Privatsphäre-Icon als Warnung gelb .
-Drittanbieter-Cookies werden von Teilen einer Website gesetzt, die von einem anderen Server als dem aktuell besuchten geladen werden. Beispielsweise laden viele Websites Werbungen von einem Drittanbieter-Broker wie Googles Ad Sense. @@ -74,14 +77,14 @@ Daher werden auf diesen Geräten auch Drittanbieter-Cookies erlaubt, wenn Erstanbieter-Cookies zugelassen werden.
-DOM-Speicher (Document Object Model-Speicher) - auch bekannt als "Web Storage" - ist ein andere Art, mit der Websites Informationen speichern können. Während der gesamte Speicherplatz für Cookies einer Webseite auf maximal 4 Kilobytes begrenzt ist, können im DOM-Speicher Megabytes pro Seite gespeichert werden - diese Art der Speicherung ist daher gewissermassen Cookies auf Steroiden. Da der DOM-Speicher jedoch Javascript benötigt um Daten zu schreiben oder zu lesen, kann er nicht aktiviert werden, solange nicht auch JavaScript aktiviert ist.
-Formulardaten umfassen Informationen, die in Web-Formulare eingetippt werden, wie etwa Namen, Adressen, Telefonnummern, usw. Diese werden in Drop-Down-Listen angezeigt, wenn die betreffenden Seiten später wieder aufgerufen werden. diff --git a/app/src/main/assets/de/guide_local_storage_dark.html b/app/src/main/assets/de/guide_local_storage_dark.html deleted file mode 100644 index a31c0fca..00000000 --- a/app/src/main/assets/de/guide_local_storage_dark.html +++ /dev/null @@ -1,94 +0,0 @@ - - - -
- - - - - - -Cookies können in zwei Typen unterteilt werden: Erstanbieter-Cookies sind Cookies, die von der aktuell besuchten Website gesetzt werden.
- -Mit solchen Erstanbieter-Cookies können Websites z.B. Informationen auf einem Computer speichern, um diese bei späteren Aufrufen derselben Seite wieder zu verwenden. - Zum Beispiel kann eine Internet-Seite, die das Wetter anzeigt, den Benutzer nach seiner Postleitzahl fragen und diese in einem Cookie speichern. - Beim nächsten Besuch der Website wird dem Benutzer dann automatisch das Wetter für diese Postleitzahl/Region angezeigt, ohne dass der Benutzer diese erneut eingeben muss.
- -Wie viele anderen Dingen im Internet werden solche Cookies jedoch mittlerweile auch für Zwecke missbraucht, die Website-Besucher normalerweise nicht gestatten würden, wenn sie davon wüssten. - Zum Beispiel können Websites eindeutige Kennzeichen oder Seriennummern in Cookies speichern. - Jedes Mal wenn der Benutzer dann mit seinem Gerät diese Website aufruft, können dessen Bewegungen mit dem Profil dieser Seriennummer verknüpft werden, - auch wenn dem Gerät inzwischen eine andere IP-Adresse zugewiesen wurde. So entstehen umfangreiche Profile über die Vorlieben von Website-Besuchern.
- -Nahezu alle Webseiten, bei denen eine Anmeldung notwendig ist, nutzen Erstanbieter-Cookies für den Anmeldevorgang. - Damit wird sichergestellt, dass nur der angemeldete Benutzer Zugang zu den entsprechenden Informationen hat. Dies ist meiner Meinung nach eine der wenigen legitimen Verwendungen von Cookies.
- -Wenn Erstanbieter-Cookies aktiviert sind, aber Javascript deaktiviert, ist das Privatsphäre-Icon als Warnung gelb .
- -Drittanbieter-Cookies werden von Teilen einer Website gesetzt, die von einem anderen Server als dem aktuell besuchten geladen werden. - Beispielsweise laden viele Websites Werbungen von einem Drittanbieter-Broker wie Googles Ad Sense. - Jedes Mal wenn die Website lädt, fragt diese bei dem Werbe-Broker an, dass er Werbung zeigen soll. - Der Werbe-Broker analysiert jegliche information, die er über den Nutzer hat, vergleicht diese mit dem aktuell gezahlten Satz der werbenden Firmen, - die die Werbung platziert haben wollen und wählt die anzuzeigenden Werbungen aus. - Der Bereich der Website, auf dem die Werbung angezeigt wird, wird vom Drittanbieter-Broker statt von der eigentlich besuchten Website geladen.
- -Weil die meisten Werbungen im Internet von ein paar wenigen Brokern betrieben werden, hat es nicht lange gedauert, bis diese gemerkt haben, - dass sie einfach ein Tracking-Cookie auf dem Gerät des Benutzers hinterlassen können, um immer Bescheid zu wissen, wo sich dieser - auch über Seiten- und Domain-Grenzen hinweg - im Internet bewegt. - Jedes Mal, wenn eine Werbung von einem Broker geladen wird, ist es dessen erste Aufgabe, das Gerät auf eine einmalige Seriennummer in einem cookie zu überprüfen. - Wenn es diesen hat, sucht er das Profil für diese Seriennummer heraus und merkt sich die neu besuchte Seite. - Deshalb kann der Nutzer auf einer Seite nach einem Produkt suchen, nach dem er normalerweise nicht sucht, wie z. B. Walnüsse, - und plötzlich auf jeder anderen besuchten Website Werbungen für Walnüsse angezeigt bekommen.
- -Zusätzlich zu Werbe-Brokern machen Social-Media-Plattformen das Gleiche. - Vor ein paar Jahren haben die groÃen Plattformen wie Facebook und Twitter eine groÃe Auswahl von Websites ausgemacht, auf denen es in ihrem gröÃten Interesse wäre, Social Media-Icons zu platzieren. - Das sind nicht nur Bilder, sondern auch eingebettete Codes, - welche zurück auf die Social-Media-Plattform verlinken und - neben anderen Dingen - ein Drittanbieter-Cookie auf dem Gerät hinterlassen. - Diese Cookies werden selbst dann gesetzt, wenn der Benutzer keinen Account bei der Social-Media-Plattform hat. - Mit der Zeit bauten Firmen wie Facebook (welche ebenfalls einen Werbe-Broker betreiben) eine groÃe Anzahl von detaillierten Profilen über Personen an, die - niemals einen Account auf ihrer Seite erstellt haben.
- -Es gibt daher kaum einen Grund, solche Drittanbieter-Cookies zuzulassen. Auf Geräten mit Android KitKat oder älter (version <= 4.4.4 or API <= 20) kann - Webkit leider nicht zwischen Erstanbieter- und Drittanbieter-Cookies unterscheiden. - Daher werden auf diesen Geräten - auch Drittanbieter-Cookies erlaubt, wenn Erstanbieter-Cookies zugelassen werden.
- -DOM-Speicher (Document Object Model-Speicher) - auch bekannt als "Web Storage" - ist ein andere Art, mit der Websites Informationen speichern können. - Während der gesamte Speicherplatz für Cookies einer Webseite auf maximal 4 Kilobytes begrenzt ist, können im DOM-Speicher - Megabytes pro Seite gespeichert werden - diese Art der Speicherung ist daher gewissermassen Cookies auf Steroiden. - Da der DOM-Speicher jedoch Javascript benötigt um Daten zu schreiben oder zu lesen, kann er nicht aktiviert werden, solange nicht auch JavaScript aktiviert ist.
- -Formulardaten umfassen Informationen, die in Web-Formulare eingetippt werden, wie etwa Namen, Adressen, Telefonnummern, usw. - Diese werden in Drop-Down-Listen angezeigt, wenn die betreffenden Seiten später wieder aufgerufen werden. - Anders als die oben genannten Formen lokal gespeicherter Informationen werden Formulardaten dabei nicht ohne bewusste Interaktion des Benutzers - (z.B. Abschicken eines Formulars) an einen Webserver geschickt. - Ab Android Oreo (8.0) verwendet WebView den Autofill-Service. - Daher werden die entsprechenden Wahlmöglichkeiten für Formulardaten bei neueren Android-Geräten nicht mehr angezeigt.
- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_overview_light.html b/app/src/main/assets/de/guide_overview.html similarity index 84% rename from app/src/main/assets/de/guide_overview_light.html rename to app/src/main/assets/de/guide_overview.html index 38d4fc5d..1af07eee 100644 --- a/app/src/main/assets/de/guide_overview_light.html +++ b/app/src/main/assets/de/guide_overview.html @@ -1,5 +1,5 @@ + -Privacy Browser wurde entwickelt, um Ihnen während des Surfens die maximal mögliche Kontrolle über Ihre Privatsphäre zu gewähren. Wenn Sie sich mit einer Website verbinden, werden bestimmte Informationen, die zum Verarbeiten der Verbindung nötig sind, an den Server gesandt. @@ -41,7 +44,7 @@ Nahezu alle Browser nehmen freiwillig an dieser Verfolgung Teil, ohne den Nutzer darüber zu informieren. Privacy Browser ist dazu entwickelt, dass der Benutzer so viel Information und Kontrolle wie möglich über diese Verfolgungstechniken erhält.
-Privacy Browser nutzt Android's eingebaute WebView-Komponente zum Anzeigen von Websites. Daher gibt es einige Einschränkungen in Bezug auf die von WebView bereitgestellten Kontrollmöglichkeiten der Privatsphäre-Einstellungen. diff --git a/app/src/main/assets/de/guide_overview_dark.html b/app/src/main/assets/de/guide_overview_dark.html deleted file mode 100644 index 89aa1f5b..00000000 --- a/app/src/main/assets/de/guide_overview_dark.html +++ /dev/null @@ -1,51 +0,0 @@ - - - -
- - - - - - -Privacy Browser wurde entwickelt, um Ihnen während des Surfens die maximal mögliche Kontrolle über Ihre Privatsphäre zu gewähren. - Wenn Sie sich mit einer Website verbinden, werden bestimmte Informationen, die zum Verarbeiten der Verbindung nötig sind, an den Server gesandt. - Der Server erhält beispielsweise Ihre IP-Adresse und eine Port-Nummer, welche er benötigt, damit er weiÃ, wohin er antworten soll. - Diese Informationen werden häufig gespeichert, damit der Webseitenbetreiber Statistiken darüber generieren kann, - wie oft eine Website geladen wird und wie viele verschiedene IP-Adressen bzw. Besucher sie besucht haben.
- -Darüber hinaus wollen viele Webseitenbetreiber das Surfverhalten ihrer Besucher im ganzen Internet und nicht nur auf einem einzigen Server nachverfolgen. - Sie nutzen dabei verschiedene technische Möglichkeiten. Einige davon nutzen das Anfragen oder Platzieren von bestimmten Informationen auf Ihrem Gerät, die das Nachverfolgen ermöglichen. - Nahezu alle Browser nehmen freiwillig an dieser Verfolgung Teil, ohne den Nutzer darüber zu informieren. - Privacy Browser ist dazu entwickelt, dass der Benutzer so viel Information und Kontrolle wie möglich über diese Verfolgungstechniken erhält.
- -Privacy Browser nutzt Android's eingebaute WebView-Komponente zum Anzeigen von Websites. - Daher gibt es einige Einschränkungen in Bezug auf die von WebView bereitgestellten Kontrollmöglichkeiten der Privatsphäre-Einstellungen. - Zum Beispiel ist es nicht möglich, manche JavaScript-Kommandos zu aktivieren und andere zu deaktivieren. - Für die Zukunft ist geplant, dass Privacy Browser zu einer eigenen WebView-Komponente namens Privacy WebView wechselt.
- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_proxies_light.html b/app/src/main/assets/de/guide_proxies.html similarity index 90% rename from app/src/main/assets/de/guide_proxies_light.html rename to app/src/main/assets/de/guide_proxies.html index 1dc53edc..f6e5f6fe 100644 --- a/app/src/main/assets/de/guide_proxies_light.html +++ b/app/src/main/assets/de/guide_proxies.html @@ -24,11 +24,14 @@ - + + + + -Faktoren, die die Privatsphäre im Web einschränken wollen, lassen sich hauptsächlich in zwei verschiedene Kategorien unterteilen: Neugierige Behörden mit Zugriff auf Internetprovider und grosse Konzerne, die "soziale" und Werbe-Netzwerke betreiben. @@ -37,7 +40,7 @@ um Ihre Privatsphäre vor böswilligen Obrigkeiten (welche Ihren Datenverkehr ausspionieren) zu schützen, nicht jedoch vor Megafirmen (welche Schadcode auf Webservern einbinden).
-Oft spähen neugierige Behörden Bürger aus, um Fehlverhalten und Menschenrechtsaktivitäten zu bestrafen. Ãblicherweise betreiben sie entweder die Internetprovider selbst oder sie können Provider dazu zwingen, Informationen über jede besuchte IP-Adresse und die zugehörigen Benutzer herauszugeben. @@ -51,7 +54,7 @@ und Benutzer belangt werden, weil Obrigkeiten annehmen, dass Nutzer damit Verbotenes tun. Daher können Proxies hilfreich sein, stellen jedoch kein Allheilmittel dar.
-Wenn ein Benutzer sich mit einem Webserver verbindet, kann der Webserver seine IP-Adresse sehen. Obwohl es keine ausgereifte Methode ist, können IP-Adressen in physische Adressen umgewandelt werden - mit erstaunlicher Genauigkeit. @@ -74,7 +77,7 @@ deaktivierten Cookies und DOM-Speicher und das Benutzen eines Browsers, der schwierig zu "fingerprinten" ist.
-Trotz ihrer Einschränkungen können Proxies unter bestimmen Umständen durchaus nützlich sein. Tor und I2P @@ -83,6 +86,6 @@ Da der Datenverkehr in solchen Fällen jedoch über mehrere Proxy-Knoten geleitet wird, ist die Ãbertragungsgeschwindigkeit bei der Nutzung von Proxies meist deutlich langsamer als bei direkten Internet-Verbindungen.
- + \ No newline at end of file diff --git a/app/src/main/assets/de/guide_proxies_dark.html b/app/src/main/assets/de/guide_proxies_dark.html deleted file mode 100644 index 47f80d81..00000000 --- a/app/src/main/assets/de/guide_proxies_dark.html +++ /dev/null @@ -1,88 +0,0 @@ - - - - - - - - - - -Faktoren, die die Privatsphäre im Web einschränken wollen, lassen sich hauptsächlich in zwei verschiedene Kategorien unterteilen: - Neugierige Behörden mit Zugriff auf Internetprovider und grosse Konzerne, die "soziale" und Werbe-Netzwerke betreiben. - Proxies wie TOR (The Onion Router) und - I2P (Invisible Internet Project) können hilfreich sein, - um Ihre Privatsphäre vor böswilligen Obrigkeiten (welche Ihren Datenverkehr ausspionieren) zu schützen, nicht jedoch vor Megafirmen (welche Schadcode auf Webservern einbinden).
- - -Oft spähen neugierige Behörden Bürger aus, um Fehlverhalten und Menschenrechtsaktivitäten zu bestrafen. - Ãblicherweise betreiben sie entweder die Internetprovider selbst oder sie können Provider dazu zwingen, Informationen über jede besuchte IP-Adresse und die zugehörigen Benutzer herauszugeben. - Proxy-Server (layered proxies) versuchen solche VerstöÃe zu unterbinden, indem der Netzwerk-Verkehr eines Geräts verschlüsselt und über mehrere Server im Internet geleitet wird, - bevor er zum endgültigen Ziel geschickt wird. - Dadurch soll sichergestellt werden, dass Internet-Provider, - Server oder Websites weder die IP-Adresse des Gerätes noch die IP-Adresse des endgültigen Ziel-Webservers kennen. - Böswillige Obrigkeiten und von Ihnen kontrollierte Internet-Provider können so nicht erkennen, - auf welche Webserver ein Benutzer zugreift - sie können jedoch feststellen, dass der Benutzer einen Proxy-Service nutzt. - In einigen Teilen der Welt kann die Nutzung von Proxies als Anzeichen von illegalem Verhalten gewertet ("Wenn Du nichts zu verbergen hättest, würdest Du Deinen Datenverkehr nicht verschlüsseln") - und Benutzer belangt werden, weil Obrigkeiten annehmen, dass Nutzer damit Verbotenes tun. Daher können Proxies hilfreich sein, stellen jedoch kein Allheilmittel dar.
- - -Wenn ein Benutzer sich mit einem Webserver verbindet, kann der Webserver seine IP-Adresse sehen. - Obwohl es keine ausgereifte Methode ist, können IP-Adressen in physische Adressen umgewandelt werden - mit erstaunlicher Genauigkeit. - Kleinere Webserver verlassen sich üblicherweise auf die IP-Adresse, um den Standort von Benutzern, die Ihre Internet-Seiten besuchen, festzustellen. - Proxies sind in solchen Fällen eine gute Lösung, um den Standort eines Benutzers vor den Serverbetreibern zu verschleiern. - GroÃe Megafirmen, die "soziale" und Werbe-Netzwerke betreiben, nutzen jedoch Profile an Informationen, um Benutzer über ihre Geräte und IP-Adressen hinweg zu tracken. - Diese Profile nutzen verschiedene Techniken um Benutzer ausfindig zu machen, inklusive JavaScript, Cookies, Tracking-IDs und den sogenannten - "Browser-Fingerabdruck" (fingerprinting). - Weil die groÃe Mehrheit der Websites im Internet Werbung entweder von groÃen Werbenetzwerken oder von eingebetteten Social-Media-Buttons mit ihrem zugewiesenen JavaScript lädt, - haben die groÃen Megafirmen Profile von so gut wie jedem Internetnutzer angefertigt und verfolgen deren Aktivitäten über zueinander unabhängige Seiten.
- -Sie verfolgen jede besuchte Seite, Alles online Gekaufte, jede für Einkäufe genutzte Kreditkarte, jede Adresse, - an die Waren verschickt werden, und die GPS-Metadaten von jedem ins Internet hochgeladene Foto. - Sie fertigen Profile an, die Alter, Geschlecht, Beziehungsstatus, Adresse, politische und religiöse Ansichten, familiäre Umstände, - Anzahl der Haustiere und alles Andere, was sie über einen Nutzer herausfinden können, beinhalten. - Sie kaufen sogar ganze Datenbanken mit Informationen über Kreditkartennutzungen in Geschäften auf, damit sie das Offline-Einkaufsverhalten von Nutzern in ihren Profilen nachverfolgen können. - Da sie damit bereits wesentlich genauere Adress-Informationen über einen Benutzer haben als eine IP-Adresse offenlegt, bieten Proxies keinen nennenswerten Privatsphäre-Schutz gegen Megafirmen.
- -Der einzige und beste Schutz der Privatsphäre gegen Megafirmen ist es, mit deaktivieren JavaScript durchs Web zu surfen, gefolgt von geblockten Werbenetzwerken, - deaktivierten Cookies und DOM-Speicher und das Benutzen eines Browsers, der schwierig zu "fingerprinten" ist.
- - -Trotz ihrer Einschränkungen können Proxies unter bestimmen Umständen durchaus nützlich sein. - Tor und I2P - existieren Android-Apps, die die einfache Nutzung dieser Proxy-Netzwerke ermöglichen. - Wird die Nutzung dieser Proxy-Netzwerke in Privacy Browser aktiviert, wird die App-Leiste mit einem hellblauen statt hellgrauen Hintergrund versehen. - Da der Datenverkehr in solchen Fällen jedoch über mehrere Proxy-Knoten geleitet wird, - ist die Ãbertragungsgeschwindigkeit bei der Nutzung von Proxies meist deutlich langsamer als bei direkten Internet-Verbindungen.
- - - - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_requests_light.html b/app/src/main/assets/de/guide_requests.html similarity index 92% rename from app/src/main/assets/de/guide_requests_light.html rename to app/src/main/assets/de/guide_requests.html index 531d87f3..c19bb39b 100644 --- a/app/src/main/assets/de/guide_requests_light.html +++ b/app/src/main/assets/de/guide_requests.html @@ -1,5 +1,5 @@ + -Wenn eine URL geladen wird, wird üblicherweise eine Menge Anfragen für mit der Seite verbundene Ressourcen wie Bilder, CSS-, JavaScript- und andere Dateien an den betreffenden Webserver gestellt. Details dazu können in der Ansicht "Zugriffe" betrachtet werden, welche über das Navigations-Menü links erreicht werden kann. In dieser Ansicht wird auch dargestellt, wie viele (und welche) Anfragen geblockt wurden. Durch Antippen der betreffenden Anfragen können weitere Details dazu angezeigt werden, die zeigen, warum die Anfrage erlaubt oder blockiert wurde.
- +Privacy Browser enthält vier gebräuchliche Filterlisten, die auf der Adblock-Syntax basieren: EasyList, EasyPrivacy, Fanboyâs Annoyance Filterliste und Fanboyâs Social Blocking Filterliste. diff --git a/app/src/main/assets/de/guide_requests_dark.html b/app/src/main/assets/de/guide_requests_dark.html deleted file mode 100644 index 072b885f..00000000 --- a/app/src/main/assets/de/guide_requests_dark.html +++ /dev/null @@ -1,84 +0,0 @@ - - - -
- - - - - - -Wenn eine URL geladen wird, wird üblicherweise eine Menge Anfragen für mit der Seite verbundene Ressourcen wie Bilder, CSS-, JavaScript- und andere Dateien an den betreffenden Webserver gestellt. - Details dazu können in der Ansicht "Zugriffe" betrachtet werden, welche über das Navigations-Menü links erreicht werden kann. - In dieser Ansicht wird auch dargestellt, wie viele (und welche) Anfragen geblockt wurden. - Durch Antippen der betreffenden Anfragen können weitere Details dazu angezeigt werden, die zeigen, warum die Anfrage erlaubt oder blockiert wurde.
- - - -Privacy Browser enthält vier gebräuchliche Filterlisten, die auf der Adblock-Syntax basieren: - EasyList, EasyPrivacy, Fanboyâs Annoyance Filterliste und Fanboyâs Social Blocking Filterliste. - Diese werden in 22 Unter-Listen aufgeteilt, welche die Ressourcen-Zugriffe in der folgenden Reihenfolge überprüfen:
- -Listen mit "(URL-Anfang)" prüfen gegen den Anfang einer URL, solche mit "(URL-Ende)" gegen das Ende der URL. Domänen-Listen prüfen gegen bestimmte Domains. - Drittanbieter-Listen greifen nur, wenn die Domain der Anfrage eine andere ist als die Domain der aufgerufenen URL. - Listen mit regulären Ausdrücken folgen der Syntax für reguläre Ausdrücke. Jede Unter-Liste hat dabei einen oder mehrere Einträge. - Bei Domänen-Unterlisten werden die Ressourcen-Zugriffe nur dann überprüft, wenn der erste Eintrag der Domain der aufgerufenen URL entspricht.
- -Aufgrund von Einschränkungen in Androidâs WebView und um die Geschwindigkeit von Anfragen zu steigern, verwendet Privacy Browser eine vereinfachte Auswertung der Adblock-Syntax. - Dies kann manchmal zu "false positives" führen, bei denen Ressourcen erlaubt oder blockiert werden, die in den originalen Einträgen anders intendiert wären. - Eine detailiertere Beschreibung, wie die Listen-Einträge abgearbeitet werden, ist unter stoutner.com verfügbar.
- -Privacy Browser verfügt über drei zusätzliche Filterlisten:
- UltraList und UltraPrivacy
- blockieren Werbung und Tracker, die EasyList und EasyPrivacy durchlassen. Die dritte Filterliste blockiert alle Drittanbieter-Anfragen.
- Eine Anfrage wird dabei nur als Drittanbieter-Anfrage gewertet, wenn die Basis-Domain der Anfrage eine andere ist als die Basis-Domain der angefragten URL.
- Lädt zum Beispiel die Seite www.website.com
ein Bild von images.website.com
, wird diese Anfrage nicht als Drittanbieter-Anfrage gewertet,
- da die beiden Anfragen dieselbe Basis-Domain website.com
haben.
- Alle Drittanbieter-Anfragen zu blockieren verbessert zwar die Privatsphäre, diese Einstellung ist jedoch standardmäÃig deaktiviert, da dadurch viele Webseiten verunstaltet werden können.
Wenn Sie verschlüsselte URLs (also solche, die mit HTTPS beginnen) besuchen, verwendet der Webserver ein SSL-Zertifikat, um einerseits die zum Browser gesendeten Informationen zu verschlüsseln und andererseits um sich selbst zu identifizieren. @@ -40,13 +43,13 @@
Mittels Zertifikats-Verankerung ("Pinning") kann Privacy Browser angewiesen werden, nur ein spezielles SSL-Zertifikat für eine Domäne zuzulassen. Jedes andere Zertifikat - auch wenn dies gültig ist - wird in diesem Fall abgelehnt.
- +SSL-Zertifikate laufen zu einem festgelegten Datum ab, sodass auch verankerte Zertifikate legitimerweise von Zeit zu Zeit aktualisiert werden müssen. In der Regel müssen SSL-Zertifikate in der Mehrzahl der Fälle nicht verankert werden. Für jene, die jedoch damit rechnen müssen, dass mächtige Organisationen auf sie abzielen, kann das verankern von SSL-Zertifikaten Man-in-the-middle-Attacken aufdecken und ggf. vereiteln. Privacy Browser bietet auch die Möglichkeit, IP-Adressen zu verankern.
- +SSL-Zertifikate können in den Domänen-Einstellungen verankert werden. Neben dem Schutz gegen MITM-Attacken kann das Verankern von Zertifikaten auch für selbst-erzeugte Zertifikate genutzt werden (z.B. bei WLAN-Routern oder Access-Points). diff --git a/app/src/main/assets/de/guide_ssl_certificates_dark.html b/app/src/main/assets/de/guide_ssl_certificates_dark.html deleted file mode 100644 index 7f1c0761..00000000 --- a/app/src/main/assets/de/guide_ssl_certificates_dark.html +++ /dev/null @@ -1,56 +0,0 @@ - - - -
- - - - - - -Wenn Sie verschlüsselte URLs (also solche, die mit HTTPS beginnen) besuchen, verwendet der Webserver ein SSL-Zertifikat, - um einerseits die zum Browser gesendeten Informationen zu verschlüsseln und andererseits um sich selbst zu identifizieren. - Der Zweck der Server-Identifikation ist dabei, zu verhindern, dass ein Rechner zwischen Server und Ihrem Browser geschaltet werden kann, - der vorgibt der Server zu sein und die übertragenen Informationen auf dem Transportweg entschlüsseln oder verändern kann. Solche Angriffe werden als "Man-in-the-Middle-Atacken" (MITM) bezeichnet. - SSL-Zertifikate werden von Zertifikats-Stellen generiert, d.h. Unternehmen, die die Identität eines Servers überprüfen und dafür (meist gegen Entgelt) ein Zertifikat ausstellen. - Android beinhaltet eine Liste zuverlässiger Zertifikats-Stellen und akzeptiert jedes von einer solchen ausgestellte Zertifikat einer Webseite. - Es wird dabei davon ausgegangen, dass eine Organisation kein SSL-Zertifikat für eine Domain beantragen kann, die nicht ihr gehört. - In der Praxis konnten dies jedoch bereits viele Regierungen und groÃe Unternehmen tun.
- -Mittels Zertifikats-Verankerung ("Pinning") kann Privacy Browser angewiesen werden, nur ein spezielles SSL-Zertifikat für eine Domäne zuzulassen. - Jedes andere Zertifikat - auch wenn dies gültig ist - wird in diesem Fall abgelehnt.
- - - -SSL-Zertifikate laufen zu einem festgelegten Datum ab, sodass auch verankerte Zertifikate legitimerweise von Zeit zu Zeit aktualisiert werden müssen. - In der Regel müssen SSL-Zertifikate in der Mehrzahl der Fälle nicht verankert werden. Für jene, die jedoch damit rechnen müssen, dass mächtige Organisationen auf sie abzielen, - kann das verankern von SSL-Zertifikaten Man-in-the-middle-Attacken aufdecken und ggf. vereiteln. Privacy Browser bietet auch die Möglichkeit, IP-Adressen zu verankern.
- - - -SSL-Zertifikate können in den Domänen-Einstellungen verankert werden. - Neben dem Schutz gegen MITM-Attacken kann das Verankern von Zertifikaten auch für selbst-erzeugte Zertifikate genutzt werden (z.B. bei WLAN-Routern oder Access-Points). - In diesen Fällen werden die sonst üblichen Fehlermeldungen unterdrückt, wenn die Website des Geräts geladen wird. - Durch Antippen des aktiven Tabs wird das SSL-Zertifikat der aktuell darin angezeigten Webseite angezeigt.
- - \ No newline at end of file diff --git a/app/src/main/assets/de/guide_tracking_ids_light.html b/app/src/main/assets/de/guide_tracking_ids.html similarity index 80% rename from app/src/main/assets/de/guide_tracking_ids_light.html rename to app/src/main/assets/de/guide_tracking_ids.html index 1cf57698..8c0379d6 100644 --- a/app/src/main/assets/de/guide_tracking_ids_light.html +++ b/app/src/main/assets/de/guide_tracking_ids.html @@ -1,5 +1,5 @@ + -Vor einigen Jahren wurde vom W3C (World Wide Web Consortium) ein Mechanismus für Internet-Browser entwickelt, der Webserver davon in Kenntnis setzen sollte, dass deren Benutzer nicht getrackt werden wollen. @@ -38,7 +41,7 @@ So ignorieren zum Beispiel mit Yahoo, Google, Microsoft und Facebook so gut wie alle grossen Internet-Anbieter zumindest einige DNT-Header.
-Privacy Browser entfernt Tracking-relevante Teile aus URLs, wie z.B. ?utm_
von Google Analytics und
?fbclick=
von Facebook. Die URL-Bereinigung kann in den Einstellungen deaktiviert werden, sollte sie Probleme verursachen.
Vor einigen Jahren wurde vom W3C (World Wide Web Consortium) ein Mechanismus für Internet-Browser entwickelt, der Webserver davon in Kenntnis setzen sollte, - dass deren Benutzer nicht getrackt werden wollen. - Dies wird über den DNT-Header (Do-Not-Track-Header) innerhalb von Ressourcen-Anfragen bewerkstelligt.
- -Der DNT-Header bewirkt jedoch de facto so gut wie keine Privatsphäre, da er von den meisten Webservern schlicht ignoriert wird. - So ignorieren zum Beispiel mit Yahoo, Google, Microsoft und Facebook so gut wie alle grossen Internet-Anbieter zumindest einige DNT-Header.
- - -Privacy Browser entfernt Tracking-relevante Teile aus URLs, wie z.B. ?utm_
von Google Analytics und
- ?fbclick=
von Facebook. Die URL-Bereinigung kann in den Einstellungen deaktiviert werden, sollte sie Probleme verursachen.
Wenn sich Internet-Browser mit Webseiten verbinden, senden Sie automatisch den sog. "User-Agent", welcher den Browser und dessen Anzeige-Fähigkeiten ausweist. Der Webserver kann diese Informationen dann nutzen, um verschiedene Versionen der Webseite an unterschiedliche Browser auszuliefern. @@ -45,7 +48,7 @@ Der Screenshot unterhalb zeigt ein Pixel 2 XL mit Android 10 und Android WebView 84.0.4147.125. Die meisten Webserver erkennen diesen User-Agent als Mobil-Browser und liefern eine Mobil-Version der Seite aus, so eine solche existiert.
- +Der User-Agent beinhaltet normalerweise genügend Informationen, dass nur wenige Besucher einer Webseite denselben haben. Wenn der User-Agent daher mit anderen nicht-eindeutigen Identifizierungs-Informationen kombiniert wird, kann dies ausreichen, um einen eindeutigen Fingerabdruck zu ergeben. @@ -54,7 +57,7 @@ Wenn dieser Test mit aktiviertem JavaScript absolviert wird, steigt die Menge der offengelegten Informationen drastisch an. Browser Leaks und Am I Unique sind ebenfalls gute Quellen für Informationen zu diesem Thema.
- +Privacy Browser bietet verschiedene Voreinstellungen für den User-Agent an, um sich als gebräuchliche Browser und Betriebssysteme auszugeben. Dabei gilt grundsätzlich: Je unüblicher der User-Agent ist, des einfacher ist das Tracking. diff --git a/app/src/main/assets/de/guide_user_agent_dark.html b/app/src/main/assets/de/guide_user_agent_dark.html deleted file mode 100644 index 7b7e20ff..00000000 --- a/app/src/main/assets/de/guide_user_agent_dark.html +++ /dev/null @@ -1,71 +0,0 @@ - - - -
- - - - - - -Wenn sich Internet-Browser mit Webseiten verbinden, senden Sie automatisch den sog. "User-Agent", welcher den Browser und dessen Anzeige-Fähigkeiten ausweist. - Der Webserver kann diese Informationen dann nutzen, um verschiedene Versionen der Webseite an unterschiedliche Browser auszuliefern. - Zum Beispiel haben viele Internet-Seiten unterschiedliche Versionen für Desktop- und Mobil-Browser, - damit die Seiten in Anhängigkeit von der Displaygrösse möglichst optimal genutzt werden können.
- -In der Voreinstellung nutzt Privacy Browser seinen eigenen User-Agent, welcher PrivacyBrowser/1.0
lautet.
- Damit wird lediglich ein Minimum an Informationen an den jeweiligen Webserver gesendet.
- Da jedoch manche Webserver diesen User-Agent nicht als mobilen Browser erkennen, liefern sie ggf. die Desktop-Version der betreffenden Webseite aus.
Im Vergleich dazu plaudert der Standard-User-Agent von WebView eine grosse Menge an Informationen über die Hard- und Software des genutzten Geräts aus. - Wird auf der Einstellungen-Seite von Privacy Browser WebView-Standard als User-Agent ausgewählt, - wird der dadurch übermittelte User-Agent angezeigt. - Der Screenshot unterhalb zeigt ein Pixel 2 XL mit Android 10 und Android WebView 84.0.4147.125. - Die meisten Webserver erkennen diesen User-Agent als Mobil-Browser und liefern eine Mobil-Version der Seite aus, so eine solche existiert.
- - - -Der User-Agent beinhaltet normalerweise genügend Informationen, dass nur wenige Besucher einer Webseite denselben haben. - Wenn der User-Agent daher mit anderen nicht-eindeutigen Identifizierungs-Informationen kombiniert wird, kann dies ausreichen, um einen eindeutigen Fingerabdruck zu ergeben. - Die Electronic Frontier Foundation hat das Werkzeug Panopticlick geschaffen, - um zu zeigen, wie viele Informationen aus diesen Quellen gesammelt werden kann. - Wenn dieser Test mit aktiviertem JavaScript absolviert wird, steigt die Menge der offengelegten Informationen drastisch an. - Browser Leaks und Am I Unique sind ebenfalls gute Quellen für Informationen zu diesem Thema.
- - - -Privacy Browser bietet verschiedene Voreinstellungen für den User-Agent an, um sich als gebräuchliche Browser und Betriebssysteme auszugeben.
- Dabei gilt grundsätzlich: Je unüblicher der User-Agent ist, des einfacher ist das Tracking.
- Wenn Privacy Browser gebräuchlicher wird und viele Personen den User-Agent PrivacyBrowser/1.0
nutzen, wird dies eine gute Wahl für die Privatsphäre sein.
- Firefox und Chrome sind aktuell die gebräuchlichsten Browser.
- Da sie jedoch häufig aktualisiert werden und in deren User-Agent auch die jeweilige Browser-Version mitsenden, kann es sein,
- dass die in Privacy Browser mitgelieferten User-Agents für Firefox und Chrome wiederum in den Server-Logs auffallen.
Manche Websites funktionieren nicht korrekt, wenn sie einen User-Agent nicht erkennen. - Wird für derartige Webseiten in den Domänen-Einstellungen von Privacy Browser der User-Agent WebView Standard oder ein anderer gebräuchlicher User-Agent ausgewählt, - verschwinden diese Probleme meist. - Androids WebView erlaubt keinen leeren User Agent. Wenn das der Fall ist, wird der Standard-User Agent an den Server gesandt.
- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_changelog_dark.html b/app/src/main/assets/en/about_changelog.html similarity index 99% rename from app/src/main/assets/en/about_changelog_dark.html rename to app/src/main/assets/en/about_changelog.html index 67526ba8..0a64681b 100644 --- a/app/src/main/assets/en/about_changelog_dark.html +++ b/app/src/main/assets/en/about_changelog.html @@ -20,7 +20,10 @@ - + + + + diff --git a/app/src/main/assets/en/about_changelog_light.html b/app/src/main/assets/en/about_changelog_light.html deleted file mode 100644 index 0bf674fb..00000000 --- a/app/src/main/assets/en/about_changelog_light.html +++ /dev/null @@ -1,681 +0,0 @@ - - - - - - - - - - -28 August 2020 - minimum API 19, target API 29
-18 August 2020 - minimum API 19, target API 29
-1 April 2020 - minimum API 19, target API 29
-28 March 2020 - minimum API 19, target API 29
-3 January 2020 - minimum API 19, target API 29
-20 July 2019 - minimum API 19, target API 28
-27 May 2019 - minimum API 19, target API 28
-2 May 2019 - minimum API 19, target API 28
-26 April 2019 - minimum API 19, target API 28
-5 March 2019 - minimum API 19, target API 28
-27 February 2019 - minimum API 19, target API 28
-31 January 2019 - minimum API 19, target API 28
-27 December 2018 - minimum API 19, target API 28
-24 December 2018 - minimum API 19, target API 28
-8 December 2018 - minimum API 19, target API 28
-29 October 2018 - minimum API 19, target API 28
-31 July 2018 - minimum API 19, target API 27
-10 July 2018 - minimum API 19, target API 27
-24 May 2018 - minimum API 19, target API 27
-9 May 2018 - minimum API 19, target API 27
-1 March 2018 - minimum API 19, target API 27
-22 February 2018 - minimum API 19, target API 27
-22 November 2017 - minimum API 19, target API 26
-9 November 2017 - minimum API 19, target API 26
-7 November 2017 - minimum API 19, target API 26
-18 September 2017 - minimum API 19, target API 25
-26 August 2017 - minimum API 19, target API 25
-23 June 2017 - minimum API 19, target API 25
-26 May 2017 - minimum API 19, target API 25
-27 April 2017 - minimum API 19, target API 25
-25 March 2017 - minimum API 19, target API 25
-21 March 2017 - minimum API 19, target API 25
-16 March 2017 - minimum API 19, target API 25
-11 February 2017 - minimum API 19, target API 25
-4 January 2017 - minimum API 19, target API 25
-26 December 2016 - minimum API 19, target API 25
-28 November 2016 - minimum API 19, target API 24
-9 November 2016 - minimum API 19, target API 24
-22 October 2016 - minimum API 19, target API 24
-15 September 2016 - minimum API 19, target API 23
-27 August 2016 - minimum API 19, target API 23
-26 August 2016 - minimum API 19, target API 23
-16 July 2016 - minimum API 19, target API 23
-16 June 2016 - minimum API 19, target API 23
-11 May 2016 - minimum API 15, target API 23
-5 May 2016 - minimum API 15, target API 23
-28 April 2016 - minimum API 15, target API 23
-7 April 2016 - minimum API 15, target API 23
-23 March 2016 - minimum API 15, target API 23
-9 March 2016 - minimum API 10, target API 23
-24 February 2016 - minimum API 10, target API 23
-Privacy Browser is primarily developed by Soren Stoutner.
- -Contributors are welcome to submit both code and translations.
- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_licenses_light.html b/app/src/main/assets/en/about_licenses.html similarity index 88% rename from app/src/main/assets/en/about_licenses_light.html rename to app/src/main/assets/en/about_licenses.html index 84b93359..5b94176e 100644 --- a/app/src/main/assets/en/about_licenses_light.html +++ b/app/src/main/assets/en/about_licenses.html @@ -20,7 +20,10 @@ - + + + + @@ -59,97 +62,99 @@ The modified file is released under the GPLv3+ license.
- are derived from security
and language
,
+
+ are derived from security
and language
,
which are part of the Android Material icon set and are released under the Apache License 2.0.
The full text of the license is below. Modifications copyright © 2016 Soren Stoutner.
The resulting images are released under the GPLv3+ license.
is derived from elements of folder
and exit_to_app
,
+
is derived from elements of folder
and exit_to_app
,
which are part of the Android Material icon set
and are released under the Apache License 2.0.
Modifications copyright © 2017 Soren Stoutner.
The resulting image is released under the GPLv3+ license.
is derived from elements of bookmark
and create_new_folder
, which are part of the
+
is derived from elements of bookmark
and create_new_folder
, which are part of the
Android Material icon set and are released under the Apache License 2.0.
Modifications copyright © 2017 Soren Stoutner.
The resulting image is released under the GPLv3+ license.
is derived from create_new_folder
,
+
is derived from create_new_folder
,
which is part of the Android Material icon set and is released under the Apache License 2.0.
Modifications copyright © 2017 Soren Stoutner.
The resulting image is released under the GPLv3+ license.
is derived from exit_to_app
, which is part of the Android Material icon set
- and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner.
+
is derived from exit_to_app
,
+ which is part of the Android Material icon set and is released under the Apache License 2.0.
+ Modifications copyright © 2017 Soren Stoutner.
The resulting image is released under the GPLv3+ license.
is derived from compare
, which is part of the Android Material icon set
- and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner.
+
is derived from compare
,
+ which is part of the Android Material icon set and is released under the Apache License 2.0.
+ Modifications copyright © 2017 Soren Stoutner.
The resulting image is released under the GPLv3+ license.
is derived from sort
, which is part of the Android Material icon set
+
is derived from sort
, which is part of the Android Material icon set
and is released under the Apache License 2.0. Modifications copyright © 2019 Soren Stoutner.
The resulting image is released under the GPLv3+ license.
cookie
was created by Google.
+
cookie
was created by Google.
It is released under the Apache License 2.0
and can be downloaded from Material Design Icons. It is unchanged except for layout information like color and size.
The following icons come from the Android Material icon set, which is released under the Apache License 2.0. They are unchanged except for layout information like color and size. Some of them have been renamed to match their use in the code. The original icons and names are shown below.
-add.
-arrow_back.
-arrow_forward.
-bookmarks.
-bug_report.
-camera_enhance.
-chrome_reader_mode.
-close.
-delete.
-delete_forever.
-devices_other.
-dns.
-donut_small.
-edit.
-expand_less.
-expand_more.
-file_copy.
-file_download.
-find_in_page.
-folder.
-home.
-image.
-import_contacts.
-import_export.
-important_devices.
-info_outline.
-language.
-link_off.
-list.
-local_activity.
-location_off.
-lock.
-map.
-more.
-new releases.
-open_in_browser.
-payment.
-question_answer.
-refresh.
-save.
-search.
-select_all.
-settings.
-settings_overscan.
-share.
-smartphone.
-sort.
-style.
-subtitles.
-tab.
-text_fields.
-thumbs_up_down.
-vertical_align_bottom.
-vertical_align_top.
-visibility_off.
-vpn_key.
-vpn_lock.
-web.
+add.
+arrow_back.
+arrow_forward.
+bookmarks.
+bug_report.
+camera_enhance.
+chrome_reader_mode.
+close.
+delete.
+delete_forever.
+devices_other.
+dns.
+donut_small.
+edit.
+expand_less.
+expand_more.
+file_copy.
+file_download.
+find_in_page.
+folder.
+home.
+image.
+import_contacts.
+import_export.
+important_devices.
+info_outline.
+language.
+link_off.
+list.
+local_activity.
+location_off.
+lock.
+map.
+more.
+new releases.
+open_in_browser.
+payment.
+question_answer.
+refresh.
+save.
+search.
+select_all.
+settings.
+settings_overscan.
+share.
+smartphone.
+sort.
+style.
+subtitles.
+tab.
+text_fields.
+thumbs_up_down.
+vertical_align_bottom.
+vertical_align_top.
+visibility_off.
+vpn_key.
+vpn_lock.
+web.
Privacy Browser copyright © 2015-2020 Soren Stoutner.
- -Privacy Browser is released under the GPLv3+ license. The full text of the license is below. - The source code is available from git.stoutner.com.
- -EasyList and EasyPrivacy - are dual licensed under the GPLv3+ - and the Creative Commons Attribution-ShareAlike 3.0+ Unported licenses. - Privacy Browser incorporates them using the GPLv3+ option.
- -Fanboyâs Annoyance List and Fanboyâs Social Blocking List - are released under the Creative Commons Attribution 3.0 Unported license, - which is compatible with the GPLv3+. The lists are included unchanged in Privacy Browser.
- -More information about the blocklists can be found on the EasyList website.
- -Privacy Browser is built with the AndroidX Libraries, - the Kotlin libraries, - and code from the Google Material Maven repository, - which are released under the Apache License 2.0.
- -The free flavor of Privacy Browser is built with Firebase Ads, - which is released under the Android Software Development Kit License.
- -com.stoutner.privacybrowser.views.CheckedLinearLayout
is a modified version of a class contained in the
- Android Camera source code.
- The original file was released under the Apache License 2.0.
- The modified file is released under the GPLv3+ license.
- are derived from security
and language
,
- which are part of the Android Material icon set and are released under the Apache License 2.0.
- The full text of the license is below. Modifications copyright © 2016 Soren Stoutner.
- The resulting images are released under the GPLv3+ license.
is derived from elements of folder
and exit_to_app
, which are part of the
- Android Material icon set and are released under the Apache License 2.0.
- Modifications copyright © 2017 Soren Stoutner.
- The resulting image is released under the GPLv3+ license.
is derived from elements of bookmark
and create_new_folder
, which are part of the
- Android Material icon set and are released under the Apache License 2.0.
- Modifications copyright © 2017 Soren Stoutner.
- The resulting image is released under the GPLv3+ license.
is derived from create_new_folder
,
- which is part of the Android Material icon set and is released under the Apache License 2.0.
- Modifications copyright © 2017 Soren Stoutner.
- The resulting image is released under the GPLv3+ license.
is derived from exit_to_app
, which is part of the Android Material icon set
- and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner.
- The resulting image is released under the GPLv3+ license.
is derived from compare
, which is part of the Android Material icon set
- and is released under the Apache License 2.0. Modifications copyright © 2017 Soren Stoutner.
- The resulting image is released under the GPLv3+ license.
is derived from sort
, which is part of the Android Material icon set
- and is released under the Apache License 2.0. Modifications copyright © 2019 Soren Stoutner.
- The resulting image is released under the GPLv3+ license.
cookie
was created by Google.
- It is released under the Apache License 2.0
- and can be downloaded from Material Design Icons. It is unchanged except for layout information like color and size.
The following icons come from the Android Material icon set, - which is released under the Apache License 2.0. - They are unchanged except for layout information like color and size. Some of them have been renamed to match their use in the code. The original icons and names are shown below.
-add.
-arrow_back.
-arrow_forward.
-bookmarks.
-bug_report.
-camera_enhance.
-chrome_reader_mode.
-close.
-delete.
-delete_forever.
-devices_other.
-dns.
-donut_small.
-edit.
-expand_less.
-expand_more.
-file_copy.
-file_download.
-find_in_page.
-folder.
-home.
-image.
-import_contacts.
-import_export.
-important_devices.
-info_outline.
-language.
-link_off.
-list.
-local_activity.
-location_off.
-lock.
-map.
-more.
-new releases.
-open_in_browser.
-payment.
-question_answer.
-refresh.
-save.
-search.
-select_all.
-settings.
-settings_overscan.
-share.
-smartphone.
-sort.
-style.
-subtitles.
-tab.
-text_fields.
-thumbs_up_down.
-vertical_align_bottom.
-vertical_align_top.
-visibility_off.
-vpn_key.
-vpn_lock.
-web.
- -Version 3, 29 June 2007
- -Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>
- -Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.
- -The GNU General Public License is a free, copyleft license for - software and other kinds of works.
- -The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a programâto make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.
- -When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.
- -To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.
- -For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.
- -Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.
- -For the developersâ and authorsâ protection, the GPL clearly explains - that there is no warranty for this free software. For both usersâ and - authorsâ sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.
- -Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting usersâ freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.
- -Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.
- -The precise terms and conditions for copying, distribution and - modification follow.
- -âThis Licenseâ refers to version 3 of the GNU General Public License.
- -âCopyrightâ also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.
- -âThe Programâ refers to any copyrightable work licensed under this - License. Each licensee is addressed as âyouâ. âLicenseesâ and - ârecipientsâ may be individuals or organizations.
- -To âmodifyâ a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a âmodified versionâ of the - earlier work or a work âbased onâ the earlier work.
- -A âcovered workâ means either the unmodified Program or a work based - on the Program.
- -To âpropagateâ a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.
- -To âconveyâ a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.
- -An interactive user interface displays âAppropriate Legal Noticesâ - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.
- -The âsource codeâ for a work means the preferred form of the work - for making modifications to it. âObject codeâ means any non-source - form of a work.
- -A âStandard Interfaceâ means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.
- -The âSystem Librariesâ of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - âMajor Componentâ, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.
- -The âCorresponding Sourceâ for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the workâs - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.
- -The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.
- -The Corresponding Source for a work in source code form is that - same work.
- -All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.
- -You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.
- -Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.
- -No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.
- -When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the workâs - users, your or third partiesâ legal rights to forbid circumvention of - technological measures.
- -You may convey verbatim copies of the Programâs source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.
- -You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.
- -You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:
- -A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - âaggregateâ if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilationâs users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.
- -You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:
- -A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.
- -A âUser Productâ is either (1) a âconsumer productâ, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, ânormally usedâ refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.
- -âInstallation Informationâ for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.
- -If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).
- -The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.
- -Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.
- -âAdditional permissionsâ are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.
- -When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.
- -Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:
- -All other non-permissive additional terms are considered âfurther - restrictionsâ within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.
- -If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.
- -Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.
- -You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).
- -However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.
- -Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.
- -Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.
- -You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.
- -Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.
- -An âentity transactionâ is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the partyâs predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.
- -You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.
- -A âcontributorâ is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributorâs âcontributor versionâ.
- -A contributorâs âessential patent claimsâ are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, âcontrolâ includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.
- -Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributorâs essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.
- -In the following three paragraphs, a âpatent licenseâ is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To âgrantâ such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.
- -If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. âKnowingly relyingâ means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipientâs use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.
- -If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.
- -A patent license is âdiscriminatoryâ if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.
- -Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.
- -If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.
- -Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.
- -The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.
- -Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License âor any later versionâ applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.
- -If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxyâs - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.
- -Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.
- -THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM âAS ISâ WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
- -IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.
- -If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.
- -END OF TERMS AND CONDITIONS
- -If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.
- -To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the âcopyrightâ line and a pointer to where the full notice is found.
- -<one line to give the programâs name -and a brief idea of what it does.> -Copyright (C) <year> <name of author> - -This program is free software: you can -redistribute it and/or modify -it under the terms of the GNU General -Public License as published by the Free -Software Foundation, either version 3 -of the License, or(at your option) -any later version. - -This program is distributed in the hope -that it will be useful, but WITHOUT ANY -WARRANTY; without even the implied -warranty of MERCHANTABILITY or FITNESS -FOR A PARTICULAR PURPOSE. See the GNU -General Public License for more details. - -You should have received a copy of the -GNU General Public License along with -this program. If not, see -<http://www.gnu.org/licenses/>.- -
Also add information on how to contact you by electronic and paper mail.
- -If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:
- -<program> Copyright (C) <year> -<name of author> -This program comes with ABSOLUTELY NO -WARRANTY; for details type `show w'. -This is free software, and you are -welcome to redistribute it under -certain conditions; type `show c' -for details.- -
The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your programâs commands - might be different; for a GUI interface, you would use an âabout boxâ.
- -You should also get your employer (if you work as a programmer) or school, - if any, to sign a âcopyright disclaimerâ for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.
- -The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.
- -Version 2.0, January 2004
-http://www.apache.org/licenses/
- -âLicenseâ shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.
- -âLicensorâ shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.
- -âLegal Entityâ shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, âcontrolâ means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.
- -âYouâ (or âYourâ) shall mean an individual or Legal Entity exercising - permissions granted by this License.
- -âSourceâ form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.
- -âObjectâ form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.
- -âWorkâ shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).
- -âDerivative Worksâ shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.
- -âContributionâ shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, âsubmittedâ means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as âNot a - Contribution.â
- -âContributorâ shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.
- -Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.
- -Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.
- -You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:
- -Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.
- -This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.
- -Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an âAS ISâ BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.
- -In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.
- -While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.
- -END OF TERMS AND CONDITIONS
- -To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets â[]â replaced with your own - identifying information. (Donât include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same âprinted pageâ as the copyright notice for easier - identification within third-party archives.
-Copyright [yyyy] [name of copyright owner] - -Licensed under the Apache License, -Version 2.0 (the âLicenseâ); -you may not use this file except -in compliance with the License. -You may obtain a copy of the License at - -http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law -or agreed to in writing, software -distributed under the License is -distributed on an âAS ISâ BASIS, -WITHOUT WARRANTIES OR CONDITIONS -OF ANY KIND, either express or implied. -See the License for the specific -language governing permissions and -limitations under the License.\ No newline at end of file diff --git a/app/src/main/assets/en/about_links_light.html b/app/src/main/assets/en/about_links.html similarity index 68% rename from app/src/main/assets/en/about_links_light.html rename to app/src/main/assets/en/about_links.html index 8bc38d67..20fc7da6 100644 --- a/app/src/main/assets/en/about_links_light.html +++ b/app/src/main/assets/en/about_links.html @@ -1,5 +1,5 @@ +
Bug Tracker and Feature Requests
- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_links_dark.html b/app/src/main/assets/en/about_links_dark.html deleted file mode 100644 index 7f5cd124..00000000 --- a/app/src/main/assets/en/about_links_dark.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - - - - - - - -- News
- -- Roadmap
- -- Bug Tracker and Feature Requests
- -- Forum
- -- GitWeb
- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_permissions_light.html b/app/src/main/assets/en/about_permissions.html similarity index 88% rename from app/src/main/assets/en/about_permissions_light.html rename to app/src/main/assets/en/about_permissions.html index 7a293538..71629fdf 100644 --- a/app/src/main/assets/en/about_permissions_light.html +++ b/app/src/main/assets/en/about_permissions.html @@ -1,5 +1,5 @@ + diff --git a/app/src/main/assets/en/about_permissions_dark.html b/app/src/main/assets/en/about_permissions_dark.html deleted file mode 100644 index 5da4b04d..00000000 --- a/app/src/main/assets/en/about_permissions_dark.html +++ /dev/null @@ -1,44 +0,0 @@ - - - - - - - - - - -Required for the WebView to access the internet. Without this permission, Privacy Browser would be âNo Browser: Protecting Your Privacy by Staying Completely Off the Internetâ.
- -com.android.launcher.permission.INSTALL_SHORTCUT
-Required to add shortcuts for websites to the launcher desktop.
- -android.permission.READ_EXTERNAL_STORAGE
-Required to import settings from public folders. On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can import settings from the appâs folders instead.
- -android.permission.WRITE_EXTERNAL_STORAGE
-Required to export settings and download files to the public folders. - On Android Marshmallow (API 23) and newer, if this permission is denied Privacy Browser can export settings and store downloads in the appâs folders instead.
- - \ No newline at end of file diff --git a/app/src/main/assets/en/about_privacy_policy_light.html b/app/src/main/assets/en/about_privacy_policy.html similarity index 92% rename from app/src/main/assets/en/about_privacy_policy_light.html rename to app/src/main/assets/en/about_privacy_policy.html index 6dd9a17e..f9828196 100644 --- a/app/src/main/assets/en/about_privacy_policy_light.html +++ b/app/src/main/assets/en/about_privacy_policy.html @@ -1,5 +1,5 @@ + @@ -85,6 +88,6 @@ Stoutner will never sell this information nor transfer it to any third party that would use it for advertising or marketing.Revision 1.6, 22 May 2018
+Revision 1.7, 14 May 2019
\ No newline at end of file diff --git a/app/src/main/assets/en/about_privacy_policy_dark.html b/app/src/main/assets/en/about_privacy_policy_dark.html deleted file mode 100644 index 1ded6ebf..00000000 --- a/app/src/main/assets/en/about_privacy_policy_dark.html +++ /dev/null @@ -1,90 +0,0 @@ - - - - - - - - - - -Privacy Browser does not collect any user information.
- - -Google Play has its own privacy policy. - Google provides anonymized summary installation information to developers, including the number of installs organized by the following categories.
-Google Play has its own privacy policy. - Google provides developers with anonymized summaries of the following information related to user ratings.
-Google Play has its own privacy policy. - In addition to the name of the reviewer, the rating, and the text of the review (which are all available publicly), Google provides some or all of the following information to the developer.
-Users may choose to send direct communications to Stoutner, like email messages and comments on stoutner.com.
- - -Stoutner may use this information to assist in the development of Privacy Browser and communicate the status of the project to users. - Stoutner will never sell this information nor transfer it to any third party that would use it for advertising or marketing.
- -Revision 1.6, 22 May 2018
- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_domain_settings_dark.html b/app/src/main/assets/en/guide_domain_settings.html similarity index 70% rename from app/src/main/assets/en/guide_domain_settings_dark.html rename to app/src/main/assets/en/guide_domain_settings.html index 73e661fa..28d90e2b 100644 --- a/app/src/main/assets/en/guide_domain_settings_dark.html +++ b/app/src/main/assets/en/guide_domain_settings.html @@ -1,5 +1,5 @@ + -Privacy Browserâs default is to browse with JavaScript, cookies, and DOM storage disabled. However, some websites legitimately need these features enabled to function correctly. Domain settings can automatically turn on a specified set of features when visiting a designated domain.
- +When visiting a domain that has domain settings specified, the background of the URL text box is green.
- + \ No newline at end of file diff --git a/app/src/main/assets/en/guide_domain_settings_light.html b/app/src/main/assets/en/guide_domain_settings_light.html deleted file mode 100644 index 4e9a8956..00000000 --- a/app/src/main/assets/en/guide_domain_settings_light.html +++ /dev/null @@ -1,39 +0,0 @@ - - - - - - - - - - -Privacy Browserâs default is to browse with JavaScript, cookies, and DOM storage disabled. - However, some websites legitimately need these features enabled to function correctly. - Domain settings can automatically turn on a specified set of features when visiting a designated domain.
- - - -When visiting a domain that has domain settings specified, the background of the URL text box is green.
- - - - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_javascript_dark.html b/app/src/main/assets/en/guide_javascript.html similarity index 83% rename from app/src/main/assets/en/guide_javascript_dark.html rename to app/src/main/assets/en/guide_javascript.html index 0a03a68d..419dd0b2 100644 --- a/app/src/main/assets/en/guide_javascript_dark.html +++ b/app/src/main/assets/en/guide_javascript.html @@ -1,5 +1,5 @@ + -Back in the early days of the internet, web pages were static, meaning they they contained text and images that were displayed on the screen but didnât change or interact with the user. Of course, only so much that is interesting can happen with static content. Several different technologies were developed to facilitate dynamic web pages. @@ -34,21 +37,21 @@ The device runs the JavaScript on its local processor and follows the commands of the program, which can animate images on the website, popup a menu, and do many other useful things.
-Of course, the concept of running arbitrary programs from a website is potentially dangerous. So there are limitations placed on JavaScript to keep it from doing things like installing viruses. However, it turns out that these limitations are overly broad. Below is a screenshot from webkay, which is a website that demonstrates the type of information that JavaScript can produce about a device. Browser Leaks is another good resource.
- +For privacy purposes, the ideal would be to browse the internet with JavaScript disabled. However, there are some websites that legitimately require JavaScript to accomplish their purposes and others that donât work correctly without JavaScript even though they could be programmed to do so. Privacy Browser addresses this by making it easy to toggle JavaScript on and off. - Tapping the privacy shield will toggle it between blue or yellow - (both of which indicate that JavaScript is disabled) and red (JavaScript enabled). + Tapping the privacy shield will toggle it between blue or yellow + (both of which indicate that JavaScript is disabled) and red (JavaScript enabled). Looking at the different information webkay can collect with JavaScript enabled and disabled is informative.
Browsing the internet with JavaScript disabled, and only enabling it if needed, goes a long way toward protecting privacy. diff --git a/app/src/main/assets/en/guide_javascript_light.html b/app/src/main/assets/en/guide_javascript_light.html deleted file mode 100644 index 0e5c3d62..00000000 --- a/app/src/main/assets/en/guide_javascript_light.html +++ /dev/null @@ -1,58 +0,0 @@ - - - -
- - - - - - -Back in the early days of the internet, web pages were static, meaning they they contained text and images that were displayed on the screen but didnât change or interact with the user. - Of course, only so much that is interesting can happen with static content. Several different technologies were developed to facilitate dynamic web pages. - JavaScript is one of these technologies.
- -JavaScript is a programming language. Many web servers host programs written in JavaScript, which are sent to devices as part of the web page. - The device runs the JavaScript on its local processor and follows the commands of the program, which can animate images on the website, popup a menu, and do many other useful things.
- - -Of course, the concept of running arbitrary programs from a website is potentially dangerous. So there are limitations placed on JavaScript to keep it from doing things like installing viruses. - However, it turns out that these limitations are overly broad. - Below is a screenshot from webkay, which is a website that demonstrates the type of information that JavaScript can produce about a device. - Browser Leaks is another good resource.
- - - -For privacy purposes, the ideal would be to browse the internet with JavaScript disabled. - However, there are some websites that legitimately require JavaScript to accomplish their purposes - and others that donât work correctly without JavaScript even though they could be programmed to do so. - Privacy Browser addresses this by making it easy to toggle JavaScript on and off. - Tapping the privacy shield will toggle it between blue or yellow - (both of which indicate that JavaScript is disabled) and red (JavaScript enabled). - Looking at the different information webkay can collect with JavaScript enabled and disabled is informative.
- -Browsing the internet with JavaScript disabled, and only enabling it if needed, goes a long way toward protecting privacy. - In addition, JavaScript is used to load much of the annoying advertisements and extra cruft that comes along with most modern websites. - With it disabled, websites will load faster, consume less network traffic, and use less CPU power, which leads to longer battery life.
- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_local_storage_light.html b/app/src/main/assets/en/guide_local_storage.html similarity index 89% rename from app/src/main/assets/en/guide_local_storage_light.html rename to app/src/main/assets/en/guide_local_storage.html index 280986be..dcc22eba 100644 --- a/app/src/main/assets/en/guide_local_storage_light.html +++ b/app/src/main/assets/en/guide_local_storage.html @@ -1,5 +1,5 @@ + -First-party cookies are set by the website in the URL bar at the top of the page.
@@ -40,10 +43,10 @@Almost all websites with logins require first-party cookies to be enabled for a user to log in. That is how they make sure it is still you as you move from page to page on the site, and is, in my opinion, one of the few legitimate uses for cookies.
-If first-party cookies are enabled but JavaScript is disabled, the privacy icon will be yellow as a warning.
+If first-party cookies are enabled but JavaScript is disabled, the privacy icon will be yellow as a warning.
-Third-party cookies are set by portions of a website that are loaded from servers different from the URL at the top of the page. For example, most website that have advertisements load them from a third-party ad broker, like Googleâs Ad Sense. @@ -71,7 +74,7 @@ between first-party and third-party cookies. Thus, enabling first-party cookies will also enable third-party cookies.
-Document Object Model storage, also known as web storage, is like cookies on steroids. Whereas the maximum combined storage size for all cookies from a single URL is 4 kilobytes, @@ -79,7 +82,7 @@ Because DOM storage uses JavaScript to read and write data, it cannot be enabled unless JavaScript is also enabled.
-Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. diff --git a/app/src/main/assets/en/guide_local_storage_dark.html b/app/src/main/assets/en/guide_local_storage_dark.html deleted file mode 100644 index cc94112b..00000000 --- a/app/src/main/assets/en/guide_local_storage_dark.html +++ /dev/null @@ -1,88 +0,0 @@ - - - -
- - - - - - -First-party cookies are set by the website in the URL bar at the top of the page.
- -From the early days of the internet, it became obvious that it would be advantageous for websites to be able to store information on a computer for future access. - For example, a website that displays weather information could ask the user for a zip code, and then store it in a cookie. - The next time the user visited the website, weather information would automatically load for that zip code, without the user having to enter it again.
- -Like everything else on the web, clever people figured out all types of ways to abuse cookies to do things that users would not approve of if they knew they were happening. - For example, a website can set a cookie with a unique serial number on a device. - Then, every time a user visits the website on that device, it can be linked to a unique profile the server maintains for that serial number, - even if the device connects from different IP addresses.
- -Almost all websites with logins require first-party cookies to be enabled for a user to log in. - That is how they make sure it is still you as you move from page to page on the site, and is, in my opinion, one of the few legitimate uses for cookies.
- -If first-party cookies are enabled but JavaScript is disabled, the privacy icon will be yellow as a warning.
- - -Third-party cookies are set by portions of a website that are loaded from servers different from the URL at the top of the page. - For example, most website that have advertisements load them from a third-party ad broker, like Googleâs Ad Sense. - Every time the website loads, it requests the ad broker to display an ad. - The ad broker analyzes any information they may have about the user, looks at the current rate advertisers are willing to pay for their ads, and selects the one to display. - The section of the website that displays the ads is loaded from the third-party brokerâs server instead of the main server.
- -Because most of the advertisements on the internet are processed by only a few brokers, - it didnât take long for them to realize that they could set a tracking cookie on the userâs device and know every place that user goes. - Every time an ad loads from a broker, the first thing it does it check to see if if the device already has a unique serial number in a tracking cookie. - If it does, it looks up the profile for that serial number and makes a note of the new site. - This is why a user can do a search on one website for a product they typically donât look for, like walnuts, - and then suddenly start seeing advertisements for walnuts on every website they visit.
- -In addition to ad brokers, social media sites discovered they could get in on the action. - A few years ago, the major social media sites like Facebook and Twitter convinced a large number of websites - that it would be in their best interest to place little social media icons on their pages. - These are not just images. They contain embedded code that links back to the social media site, and, among other things, - loads a third-party cookie on the device. These cookies are placed even if the user does not have an account with the social media platform. - Over time, companies like Facebook (which also runs an ad network) have built up quite a large number of detailed profiles about people who have - never even created an account on their site.
- -There is no good reason to ever enable third-party cookies. On devices with Android KitKat or older (version <= 4.4.4 or API <= 20), WebView does not - differentiate - between first-party and third-party cookies. Thus, enabling first-party cookies will also enable third-party cookies.
- -Document Object Model storage, also known as web storage, is like cookies on steroids. - Whereas the maximum combined storage size for all cookies from a single URL is 4 kilobytes, - DOM storage can hold megabytes per site. - Because DOM storage uses JavaScript to read and write data, it cannot be enabled unless JavaScript is also enabled.
- - -Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. - Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. - Beginning in Android Oreo (8.0), WebViewâs form data was replaced by the Autofill service. - As such, controls for form data no longer appear on newer Android devices.
- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_overview_dark.html b/app/src/main/assets/en/guide_overview.html similarity index 82% rename from app/src/main/assets/en/guide_overview_dark.html rename to app/src/main/assets/en/guide_overview.html index 29fc4917..4cda1de3 100644 --- a/app/src/main/assets/en/guide_overview_dark.html +++ b/app/src/main/assets/en/guide_overview.html @@ -1,5 +1,5 @@ + -Privacy Browser is designed to let you take as much control of your privacy as possible while still browsing the internet. When a browser connects to a website, certain pieces of information which are necessary to facilitate the connection are transferred to the server. @@ -37,7 +40,7 @@ Privacy Browser is designed to grant the user as much information and control over these tracking techniques as possible.
-Privacy Browser uses Androidâs built-in WebView to render websites. There are some limitations in the controls WebView exposes for managing privacy settings. For example, it isnât possible to enable some JavaScript commands while disabling others. diff --git a/app/src/main/assets/en/guide_overview_light.html b/app/src/main/assets/en/guide_overview_light.html deleted file mode 100644 index ef717bcc..00000000 --- a/app/src/main/assets/en/guide_overview_light.html +++ /dev/null @@ -1,46 +0,0 @@ - - - -
- - - - - - -Privacy Browser is designed to let you take as much control of your privacy as possible while still browsing the internet. - When a browser connects to a website, certain pieces of information which are necessary to facilitate the connection are transferred to the server. - For example, the server will receive your IP address and a port number, which are necessary for it to know where to send the response. - This information is often logged by the server, allowing the website developer to produce reports showing how often a webpage was loaded and how many different IP addresses accessed it.
- -However, most website operators want more information about their visitors, including tracking their web browsing across multiple websites. - There are many different techniques, including requesting or placing extra information on a userâs device, that facilitate this tracking. - Almost all browsers will voluntarily participate in this tracking without informing the user they are doing so. - Privacy Browser is designed to grant the user as much information and control over these tracking techniques as possible.
- - -Privacy Browser uses Androidâs built-in WebView to render websites. There are some limitations in the controls WebView exposes for managing privacy settings. - For example, it isnât possible to enable some JavaScript commands while disabling others. - In the future, Privacy Browser will switch to a custom WebView called Privacy WebView.
- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_proxies_dark.html b/app/src/main/assets/en/guide_proxies.html similarity index 88% rename from app/src/main/assets/en/guide_proxies_dark.html rename to app/src/main/assets/en/guide_proxies.html index 1ba63a18..31d810dc 100644 --- a/app/src/main/assets/en/guide_proxies_dark.html +++ b/app/src/main/assets/en/guide_proxies.html @@ -20,11 +20,14 @@ - + + + + -There are two general categories of bad actors that want to infringe on the privacy of the web: malicious governments with access to ISPs (Internet Service Providers) and mega corporations that run social and advertising networks. @@ -32,7 +35,7 @@ but not from mega corporations (which embed malicious code on web servers).
-Malicious governments often spy on their citizens to punish dissent or human rights activity. They commonly either operate the local ISPs or they can force them to disclose information showing every IP address that is visited by each user. @@ -44,7 +47,7 @@ and users could be punished because governments assume they are doing something that is prohibited. Thus, proxies can be helpful, but they arenât a panacea.
-When a user connects to a web server, the web server can see the userâs IP address. Although it isnât a perfect science, IP addresses can be turned into physical addresses with a fair amount of accuracy. @@ -65,13 +68,13 @@ and using a browser that is difficult to fingerprint.
-Despite their limitations, proxies can be useful in some circumstances. Tor and I2P have Android apps that make it easy to use their proxy networks. When proxying is turned on in Privacy Browser, the app bar will have a light blue background instead of the default light grey. Because traffic is being routed through several proxy nodes, using a layered proxy is often much slower than connecting directly to the internet.
- + \ No newline at end of file diff --git a/app/src/main/assets/en/guide_proxies_light.html b/app/src/main/assets/en/guide_proxies_light.html deleted file mode 100644 index 8e305119..00000000 --- a/app/src/main/assets/en/guide_proxies_light.html +++ /dev/null @@ -1,77 +0,0 @@ - - - - - - - - - - -There are two general categories of bad actors that want to infringe on the privacy of the web: - malicious governments with access to ISPs (Internet Service Providers) and mega corporations that run social and advertising networks. - Proxies like TOR (The Onion Router) and I2P (the Invisible Internet Project) are useful in protecting privacy from malicious governments (which spy on traffic in transit) - but not from mega corporations (which embed malicious code on web servers).
- - -Malicious governments often spy on their citizens to punish dissent or human rights activity. - They commonly either operate the local ISPs or they can force them to disclose information showing every IP address that is visited by each user. - Layered proxies are designed to defeat this infringement of privacy by encrypting the traffic from a userâs device and routing it through multiple servers on the internet - before sending it on to the final destination. - This means that no individual ISP, server, or website, can know both the IP address of the userâs device and the IP address of the final web server. - Malicious governments and the ISPs they control cannot tell which web servers a user is accessing, although they can tell that the user is using a layered proxy service. - In some parts of the world, using proxies could be construed as an evidence of illegal behavior (âIf you didnât have anything to hide you wouldnât be encrypting your trafficâ) - and users could be punished because governments assume they are doing something that is prohibited. Thus, proxies can be helpful, but they arenât a panacea.
- - -When a user connects to a web server, the web server can see the userâs IP address. - Although it isnât a perfect science, IP addresses can be turned into physical addresses with a fair amount of accuracy. - Small web servers typically rely on IP addresses to identify the location of the users visiting their site. Proxies are a good solution to mask the userâs location from these servers. - But large mega corporations that own social media and advertising networks use a whole profile of information that is designed to track users across devices and IP addresses. - These profiles employ a variety of techniques to identify users, including JavaScript, cookies, tracking IDs, and browser fingerprinting. - Because the vast majority of the websites on the internet either load an ad from one of the major networks or embed social media icons with their associated JavaScript, - these corporations have built profiles for almost every online user and can track their internet activity across unrelated sites.
- -They track every site that is visited, everything that is purchased, every credit card that is used to make a purchase, every address that items are shipped to, - and the GPS metadata of every picture that is uploaded to the internet. - They build a profile of a userâs age, gender, marital status, address, political affiliations, religious affiliations, family circumstances, number of pets, - and everything else they can get their hands on. - They even buy up databases of credit card transactions at local stores, so they can track the off-line purchasing patterns of the users in their profiles. - Because they already have much more accurate address information about a user than an IP address discloses, proxies provides no real privacy protection against mega corporations.
- -The single best privacy protection against mega corporations is to browse the web with JavaScript disabled, followed by blocking ad networks, disabling cookies and DOM storage, - and using a browser that is difficult to fingerprint.
- - -Despite their limitations, proxies can be useful in some circumstances. - Tor and I2P - have Android apps that make it easy to use their proxy networks. When proxying is turned on in Privacy Browser, the app bar will have a light blue background instead of the default light grey. - Because traffic is being routed through several proxy nodes, using a layered proxy is often much slower than connecting directly to the internet.
- - - - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_requests_dark.html b/app/src/main/assets/en/guide_requests.html similarity index 91% rename from app/src/main/assets/en/guide_requests_dark.html rename to app/src/main/assets/en/guide_requests.html index 0f5c33c3..bfd6d8fa 100644 --- a/app/src/main/assets/en/guide_requests_dark.html +++ b/app/src/main/assets/en/guide_requests.html @@ -1,5 +1,5 @@ + -When a URL is loaded, it typically makes a number of resource requests for CCS, JavaScript, image, and other files. Details about these requests can be viewed in the Requests activity. The navigation drawer has a link to the Requests activity and also shows how many requests were blocked. Tapping on a request displays details about why it was allowed or blocked.
- +Privacy Browser includes four common blocklists based on the Adblock syntax: EasyList, EasyPrivacy, Fanboyâs Annoyance List, and Fanboyâs Social Blocking List. diff --git a/app/src/main/assets/en/guide_requests_light.html b/app/src/main/assets/en/guide_requests_light.html deleted file mode 100644 index 87ac5ad4..00000000 --- a/app/src/main/assets/en/guide_requests_light.html +++ /dev/null @@ -1,80 +0,0 @@ - - - -
- - - - - - -When a URL is loaded, it typically makes a number of resource requests for CCS, JavaScript, image, and other files. Details about these requests can be viewed in the Requests activity. - The navigation drawer has a link to the Requests activity and also shows how many requests were blocked. Tapping on a request displays details about why it was allowed or blocked.
- - - -Privacy Browser includes four common blocklists based on the Adblock syntax: - EasyList, EasyPrivacy, Fanboyâs Annoyance List, and Fanboyâs Social Blocking List. - These blocklists are processed by Privacy Browser into the following 22 sublists, which check resource requests in the order listed.
- -Initial lists check against the beginning of the URL. Final lists check against the end of the URL. Domain lists only check against certain domains. - Third-party lists only apply if the root domain of the request is different than the root domain of the main URL. - Regular expression lists follow the regular expression syntax. Each sublist item has one or more entry. - In the case of domain sublists, the resource request is only checked against the item if the first entry matches the domain of the main URL.
- -Because of limitations in Androidâs WebView, and to speed up processing of requests, Privacy Browser implements a simplified interpretation of the Adblock syntax. - This can sometimes lead to false positives, where resources are allowed or blocked in ways that werenât intended by the original entry. - A more detailed description of how the blocklist entries are processed is available at stoutner.com.
- -Privacy Browser has three additional blocklists.
- UltraList and UltraPrivacy
- block ads and trackers that EasyList and EasyPrivacy do not. The third blocks all third-party requests.
- A request is only considered third-party if the base domain of the request is different than the base domain of the URL.
- For example, if www.website.com
loads a picture from images.website.com
,
- this is not blocked as a third-party request because they both share the same base domain of website.com
.
- Blocking all third-party requests increases privacy, but this blocklist is disabled by default because it breaks a large number of websites.
When visiting an encrypted URL (one that begins with HTTPS), the webserver uses an SSL certificate to both encrypt the information sent to the browser and to identify the server. The purpose of the server identification is to prevent a machine located between the browser and the webserver from pretending to be the server and decrypting the information in transit. @@ -36,14 +39,14 @@
Pinning an SSL certificate tells the browser that only one specific SSL certificate is to be trusted for a particular domain. Any other certificate, even if it is valid, will be rejected.
- +SSL certificates expire on a specified date, so even pinned SSL certificates will legitimately need to be updated from time to time. As a general rule, pinning SSL certificates probably isnât needed in the majority of cases. But for those who suspect that powerful organizations may be targeting them, SSL certificate pinning can detect and thwart a MITM attack. Privacy Browser also has the ability to pin IP addresses.
- +SSL certificates can be pinned in Domain Settings. Besides protecting against MITM attacks, diff --git a/app/src/main/assets/en/guide_ssl_certificates_light.html b/app/src/main/assets/en/guide_ssl_certificates_light.html deleted file mode 100644 index 73e08222..00000000 --- a/app/src/main/assets/en/guide_ssl_certificates_light.html +++ /dev/null @@ -1,53 +0,0 @@ - - - -
- - - - - - -When visiting an encrypted URL (one that begins with HTTPS), the webserver uses an SSL certificate to both encrypt the information sent to the browser and to identify the server. - The purpose of the server identification is to prevent a machine located between the browser and the webserver from pretending to be the server and decrypting the information in transit. - This type of attack is known as a Man In The Middle (MITM) attack. - SSL certificates are generated by certificate authorities: companies that verify a serverâs identity and produce a certificate for a fee. - Android has a list of trusted certificate authorities, and will accept any of their certificates for any website. - It isnât supposed to be possible for an organization to acquire an SSL certificate for a domain they do not control, - but in practice many governments and large corporations have been able to do so.
- -Pinning an SSL certificate tells the browser that only one specific SSL certificate is to be trusted for a particular domain. Any other certificate, even if it is valid, will be rejected.
- - - -SSL certificates expire on a specified date, so even pinned SSL certificates will legitimately need to be updated from time to time. - As a general rule, pinning SSL certificates probably isnât needed in the majority of cases. - But for those who suspect that powerful organizations may be targeting them, SSL certificate pinning can detect and thwart a MITM attack. - Privacy Browser also has the ability to pin IP addresses.
- - - -SSL certificates can be pinned in Domain Settings. - Besides protecting against MITM attacks, - pinning a self-signed certificate for a device like a wireless router or access point will remove the error message that is normally presented every time its website is loaded. - Tapping on the active tab displays the current website SSL certificate.
- - \ No newline at end of file diff --git a/app/src/main/assets/en/guide_tracking_ids_dark.html b/app/src/main/assets/en/guide_tracking_ids.html similarity index 76% rename from app/src/main/assets/en/guide_tracking_ids_dark.html rename to app/src/main/assets/en/guide_tracking_ids.html index ed492368..ce93eca9 100644 --- a/app/src/main/assets/en/guide_tracking_ids_dark.html +++ b/app/src/main/assets/en/guide_tracking_ids.html @@ -1,5 +1,5 @@ + -A few years ago the W3C (World Wide Web Consortium) created a mechanism for browsers to inform web servers that they would not like to be tracked. This is accomplished by including a DNT (Do Not Track) header with web requests.
@@ -32,7 +35,7 @@The DNT header doesn't really provide any privacy because most web servers ignore it. For example, Yahoo, Google, Microsoft, and Facebook all ignore at least some DNT headers.
-Privacy Browser removes tracking ID sections of URLs, like ?utm_
from Google Analytics and
?fbclick=
from Facebook. URL modification can be turned off in the settings if it is causing issues.
A few years ago the W3C (World Wide Web Consortium) created a mechanism for browsers to inform web servers that they would not like to be tracked. - This is accomplished by including a DNT (Do Not Track) header with web requests.
- -The DNT header doesn't really provide any privacy because most web servers ignore it. For example, Yahoo, Google, Microsoft, and Facebook all ignore at least some DNT headers.
- - -Privacy Browser removes tracking ID sections of URLs, like ?utm_
from Google Analytics and
- ?fbclick=
from Facebook. URL modification can be turned off in the settings if it is causing issues.
When web browsers connect to websites, they send a user agent, which identifies the browser and the rendering capabilities it possesses. The web server can use this information to decide which version of the website to send to the browser. diff --git a/app/src/main/assets/en/guide_user_agent_dark.html b/app/src/main/assets/en/guide_user_agent_dark.html deleted file mode 100644 index e30e822d..00000000 --- a/app/src/main/assets/en/guide_user_agent_dark.html +++ /dev/null @@ -1,60 +0,0 @@ - - - -
- - - - - - -When web browsers connect to websites, they send a user agent, which identifies the browser and the rendering capabilities it possesses. - The web server can use this information to decide which version of the website to send to the browser. - For example, many websites have different versions for desktop and mobile browsers.
- -By default, Privacy Browser uses its own user agent, which is PrivacyBrowser/1.0
. This sends a minimum of information to the web server.
- Because web servers do not recognize this to be a mobile user agent, they typically display the desktop version of the site.
By comparison, WebViewâs default user agent divulges a large amount of information about the hardware and software of the device. - On the Settings screen, selecting WebView Default as the User agent displays the user agent that will be sent. - The screenshot below shows a Pixel 2 XL running Android 10 with Android System WebView 84.0.4147.125 installed. - Most web servers will recognize this as a mobile browser and will display the mobile version of the site if they have one.
- - - -There is enough information in the user agent that sometimes only a few visitors to a website will be the same. - If the user agent is combined with another piece of non-unique identifying information, often it results in a unique fingerprint. - The Electronic Frontier Foundation created a tool called Panopticlick to demonstrate how much information can be gleaned from these sources. - If this test is run with JavaScript enabled the amount of information that is disclosed increases greatly. - Browser Leaks and Am I Unique are also good sources of information on this topic.
- - - -There are several preset user agents that match common browsers and operating systems. For browser fingerprinting purposes, anything that is rare is easier to track.
- If Privacy Browser becomes common and many people use PrivacyBrowser/1.0
as their user agent, it will be a good choice for privacy.
- Firefox or Chrome are the most common user agents, but they auto-update and their version numbers change so quickly that it is likely the user agents included in Privacy Browser
- will often be out of step with the majority of user agents in the server logs.
Some websites do not function correctly if they do not recognize the user agent. - Using domain settings to set the user agent to WebView Default, or another user agent that is commonly recognized, usually resolves the problem. - Androidâs WebView does not allow the user agent to be blank. If it is, WebView simply sends the default user agent to the server.
- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_changelog_dark.html b/app/src/main/assets/es/about_changelog.html similarity index 99% rename from app/src/main/assets/es/about_changelog_dark.html rename to app/src/main/assets/es/about_changelog.html index 6fbf28f3..aa2872aa 100644 --- a/app/src/main/assets/es/about_changelog_dark.html +++ b/app/src/main/assets/es/about_changelog.html @@ -22,7 +22,10 @@ - + + + + diff --git a/app/src/main/assets/es/about_changelog_light.html b/app/src/main/assets/es/about_changelog_light.html deleted file mode 100644 index fec818f8..00000000 --- a/app/src/main/assets/es/about_changelog_light.html +++ /dev/null @@ -1,690 +0,0 @@ - - - - - - - - - - -28 de agosto de 2020 - API mÃnimo 19, API dirigido 29
-18 de agosto de 2020 - API mÃnimo 19, API dirigido 29
-1 de abril de 2020 - API mÃnimo 19, API dirigido 29
-28 de marzo de 2020 - API mÃnimo 19, API dirigido 29
-3 de enero de 2020 - API mÃnimo 19, API dirigido 29
-20 de julio de 2019 - API mÃnimo 19, API dirigido 28
-27 de mayo de 2019 - API mÃnimo 19, API dirigido 28
-2 de mayo de 2019 - API mÃnimo 19, API dirigido 28
-26 de abril de 2019 - API mÃnimo 19, API dirigido 28
-5 de marzo de 2019 - API mÃnimo 19, API dirigido 28
-27 de febrero de 2019 - API mÃnimo 19, API dirigido 28
-31 de enero de 2019 - API mÃnimo 19, API dirigido 28
-27 de diciembre de 2018 - API mÃnimo 19, API dirigido 28
-24 de diciembre de 2018 - API mÃnimo 19, API dirigido 28
-8 de diciembre de 2018 - API mÃnimo 19, API dirigido 28
-29 de octubre de 2018 - API mÃnimo 19, API dirigido 28
-31 de julio de 2018 - API mÃnimo 19, API dirigido 27
-10 de julio de 2018 - API mÃnimo 19, API dirigido 27
-24 de mayo de 2018 - API mÃnimo 19, API dirigido 27
-9 de mayo de 2018 - API mÃnimo 19, API dirigido 27
-1 de marzo de 2018 - API mÃnimo 19, API dirigido 27
-22 de febrero de 2018 - API mÃnimo 19, API dirigido 27
-22 de noviembre de 2017 - API mÃnimo 19, API dirigido 26
-9 de noviembre de 2017 - API mÃnimo 19, API dirigido 26
-7 de noviembre de 2017 - API mÃnimo 19, API dirigido 26
-18 de septiembre de 2017 - API mÃnimo 19, API dirigido 25
-26 de agosto de 2017 - API mÃnimo 19, API dirigido 25
-23 de junio de 2017 - API mÃnimo 19, API dirigido 25
-26 de mayo de 2017 - API mÃnimo 19, API dirigido 25
-27 de abril de 2017 - API mÃnimo 19, API dirigido 25
-25 de marzo de 2017 - API mÃnimo 19, API dirigido 25
-21 de marzo de 2017 - API mÃnimo 19, API dirigido 25
-16 de marzo de 2017 - API mÃnimo 19, API dirigido 25
-11 de febrero de 2017 - API mÃnimo 19, API dirigido 25
-4 de enero de 2017 - API mÃnimo 19, API dirigido 25
-26 de diciembre de 2016 - API mÃnimo 19, API dirigido 25
-28 de noviembre de 2016 - API mÃnimo 19, API dirigido 24
-9 de noviembre de 2016 - API mÃnimo 19, API dirigido 24
-22 de octubre de 2016 - API mÃnimo 19, API dirigido 24
-15 de septiembre de 2016 - API mÃnimo 19, API dirigido 23
-27 de agosto de 2016 - API mÃnimo 19, API dirigido 23
-26 de agosto de 2016 - API mÃnimo 19, API dirigido 23
-16 de julio de 2016 - API mÃnimo 19, API dirigido 23
-16 de junio de 2016 - API mÃnimo 19, API dirigido 23
-11 de mayo de 2016 - API mÃnimo 15, API dirigido 23
-5 de mayo de 2016 - API mÃnimo 15, API dirigido 23
-28 de abril de 2016 - API mÃnimo 15, API dirigido 23
-7 de abril de 2016 - API mÃnimo 15, API dirigido 23
-23 de marzo de 2016 - API mÃnimo 15, API dirigido 23
-9 de marzo de 2016 - API mÃnimo 10, API dirigido 23
-24 de febrero de 2016 - API mÃnimo 10, API dirigido 23
-Navegador Privado es desarrollado principalmente por Soren Stoutner.
- -Los colaboradores son bienvenidos para enviar tanto código como traducciones.
- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_licenses_light.html b/app/src/main/assets/es/about_licenses.html similarity index 89% rename from app/src/main/assets/es/about_licenses_light.html rename to app/src/main/assets/es/about_licenses.html index ef5cfb4f..faedae76 100644 --- a/app/src/main/assets/es/about_licenses_light.html +++ b/app/src/main/assets/es/about_licenses.html @@ -22,7 +22,10 @@ - + + + + @@ -61,34 +64,34 @@ El archivo modificado se libera bajo la licencia GPLv3+.
- derivan de security
y de language
,
+
+ derivan de security
y de language
,
que son parte del conjunto de iconos Android Material
y son liberados bajo la Licencia Apache 2.0.
El texto completo de la licencia se encuentra debajo. Copyright de modificaciones © 2016 Soren Stoutner.
Las imágenes resultantes se liberan bajo la licencia GPLv3+.
deriva de elementos de folder
y exit_to_app
, que son parte del
+
deriva de elementos de folder
y exit_to_app
, que son parte del
conjunto de iconos Android Material y son liberados bajo la Licencia Apache 2.0.
Copyright de modificaciones © 2017 Soren Stoutner.
La imagen resultante se libera bajo la licencia GPLv3+.
deriva de elementos de bookmark
y create_new_folder
, que son parte del
+
deriva de elementos de bookmark
y create_new_folder
, que son parte del
conjunto de iconos Android Material y son liberados bajo la Licencia Apache 2.0.
Copyright de modificaciones © 2017 Soren Stoutner.
La imagen resultante se libera bajo la licencia GPLv3+.
deriva de create_new_folder
,
+
deriva de create_new_folder
,
que es parte del conjunto de iconos Android Material y es liberado bajo la Licencia Apache 2.0.
Copyright de modificaciones © 2017 Soren Stoutner.
La imagen resultante se libera bajo la licencia GPLv3+.
deriva de exit_to_app
, que es parte del conjunto de iconos Android Material
+
deriva de exit_to_app
, que es parte del conjunto de iconos Android Material
y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2017 Soren Stoutner.
La imagen resultante se libera bajo la licencia GPLv3+.
deriva de compare
, que es parte del conjunto de iconos Android Material
+
deriva de compare
, que es parte del conjunto de iconos Android Material
y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2017 Soren Stoutner.
La imagen resultante se libera bajo la licencia GPLv3+.
deriva de sort
, que es parte del conjunto de iconos Android Material
+
deriva de sort
, que es parte del conjunto de iconos Android Material
y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2019 Soren Stoutner.
La imagen resultante se libera bajo la licencia GPLv3+.
cookie
fue creado por Google.
+
cookie
fue creado por Google.
Es liberado bajo la licencia Apache 2.0
y puede ser descargado desde Material Design Icons.
Está sin cambios, excepto por la información de diseño como el color y el tamaño.
add.
-arrow_back.
-arrow_forward.
-bookmarks.
-bug_report.
-camera_enhance.
-chrome_reader_mode.
-close.
-delete.
-delete_forever.
-devices_other.
-dns.
-donut_small.
-edit.
-expand_less.
-expand_more.
-file_copy.
-file_download.
-find_in_page.
-folder.
-home.
-image.
-import_contacts.
-import_export.
-important_devices.
-info_outline.
-language.
-link_off.
-list.
-local_activity.
-location_off.
-lock.
-map.
-more.
-new releases.
-open_in_browser.
-payment.
-question_answer.
-refresh.
-save.
-search.
-select_all.
-settings.
-settings_overscan.
-share.
-smartphone.
-sort.
-style.
-subtitles.
-tab.
-text_fields.
-thumbs_up_down.
-vertical_align_bottom.
-vertical_align_top.
-visibility_off.
-vpn_key.
-vpn_lock.
-web.
+add.
+arrow_back.
+arrow_forward.
+bookmarks.
+bug_report.
+camera_enhance.
+chrome_reader_mode.
+close.
+delete.
+delete_forever.
+devices_other.
+dns.
+donut_small.
+edit.
+expand_less.
+expand_more.
+file_copy.
+file_download.
+find_in_page.
+folder.
+home.
+image.
+import_contacts.
+import_export.
+important_devices.
+info_outline.
+language.
+link_off.
+list.
+local_activity.
+location_off.
+lock.
+map.
+more.
+new releases.
+open_in_browser.
+payment.
+question_answer.
+refresh.
+save.
+search.
+select_all.
+settings.
+settings_overscan.
+share.
+smartphone.
+sort.
+style.
+subtitles.
+tab.
+text_fields.
+thumbs_up_down.
+vertical_align_bottom.
+vertical_align_top.
+visibility_off.
+vpn_key.
+vpn_lock.
+web.
Navegador Privado tiene derechos de autor © 2015-2020 por Soren Stoutner.
- -Navegador Privado está liberado bajo la licencia GPLv3+. - El texto completo de la licencia se encuentra en la parte inferior de este documento (se deja en el idioma original). - El código fuente está disponible en git.stoutner.com.
- -EasyList y EasyPrivacy - tienen licencia dual bajo las licencias GPLv3+ - y Creative Commons Attribution-ShareAlike 3.0+ Unported. Navegador Privado las incorpora usando la opción GPLv3+.
- -La lista molesta de Fanboy y la lista de bloqueo social de Fanboy - se liberan bajo la licencia Creative Commons Attribution 3.0 Unported, - la cual es compatible con la GPLv3+. Las listas se incluyen sin cambios en Navegador Privado.
- -Más información sobre las listas de bloqueo puede encontrarse en la página web de EasyList.
- -Navegador Privado está construido con las librerÃas de AndroidX, - las librerÃas de Kotlin, - y código del repositorio de Google Material Maven, - que se publican bajo la Licencia Apache 2.0.
- -El sabor o versión libre de Navegador Privado está construido con anuncios de Firebase, - que se libera bajo la Licencia del Android Software Development Kit.
- -com.stoutner.privacybrowser.views.CheckedLinearLayout
es una versión modificada de una clase incluida en el código fuente de
- Android Camera.
- El archivo original se liberó bajo la Licencia Apache 2.0.
- El archivo modificado se libera bajo la licencia GPLv3+.
- derivan de security
y de language
,
- que son parte del conjunto de iconos Android Material
- y son liberados bajo la Licencia Apache 2.0. El texto completo de la licencia se encuentra debajo.
- Copyright de modificaciones © 2016 Soren Stoutner.
- Las imágenes resultantes se liberan bajo la licencia GPLv3+.
deriva de elementos de folder
y exit_to_app
, que son parte del
- conjunto de iconos Android Material y son liberados bajo la Licencia Apache 2.0.
- Copyright de modificaciones © 2017 Soren Stoutner.
- La imagen resultante se libera bajo la licencia GPLv3+.
deriva de elementos de bookmark
y create_new_folder
, que son parte del
- conjunto de iconos Android Material y son liberados bajo la Licencia Apache 2.0.
- Copyright de modificaciones © 2017 Soren Stoutner.
- La imagen resultante se libera bajo la licencia GPLv3+.
deriva de create_new_folder
,
- que es parte del conjunto de iconos Android Material y es liberado bajo la Licencia Apache 2.0.
- Copyright de modificaciones © 2017 Soren Stoutner.
- La imagen resultante se libera bajo la licencia GPLv3+.
deriva de exit_to_app
, que es parte del conjunto de iconos Android Material
- y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2017 Soren Stoutner.
- La imagen resultante se libera bajo la licencia GPLv3+.
deriva de compare
, que es parte del conjunto de iconos Android Material
- y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2017 Soren Stoutner.
- La imagen resultante se libera bajo la licencia GPLv3+.
deriva de sort
, que es parte del conjunto de iconos Android Material
- y es liberado bajo la Licencia Apache 2.0. Copyright de modificaciones © 2019 Soren Stoutner.
- La imagen resultante se libera bajo la licencia GPLv3+.
cookie
fue creado por Google. Es liberado bajo la licencia Apache 2.0
- y puede ser descargado desde Material Design Icons.
- Está sin cambios, excepto por la información de diseño como el color y el tamaño.
Los siguientes iconos proceden de conjunto de iconos Android Material, - el cual es liberado bajo la licencia Apache 2.0. - Están sin cambios, excepto por la información de diseño como el color y el tamaño. Algunos de ellos se han renombrado para que coincida con su uso en el código. - Los iconos y los nombres originales se muestran a continuación.
-add.
-arrow_back.
-arrow_forward.
-bookmarks.
-bug_report.
-camera_enhance.
-chrome_reader_mode.
-close.
-delete.
-delete_forever.
-devices_other.
-dns.
-donut_small.
-edit.
-expand_less.
-expand_more.
-file_copy.
-file_download.
-find_in_page.
-folder.
-home.
-image.
-import_contacts.
-import_export.
-important_devices.
-info_outline.
-language.
-link_off.
-list.
-local_activity.
-location_off.
-lock.
-map.
-more.
-new releases.
-open_in_browser.
-payment.
-question_answer.
-refresh.
-save.
-search.
-select_all.
-settings.
-settings_overscan.
-share.
-smartphone.
-sort.
-style.
-subtitles.
-tab.
-text_fields.
-thumbs_up_down.
-vertical_align_bottom.
-vertical_align_top.
-visibility_off.
-vpn_key.
-vpn_lock.
-web.
-Version 3, 29 June 2007
- -Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>
- -Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.
- -The GNU General Public License is a free, copyleft license for - software and other kinds of works.
- -The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a program--to make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.
- -When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.
- -To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.
- -For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.
- -Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.
- -For the developers' and authors' protection, the GPL clearly explains - that there is no warranty for this free software. For both users' and - authors' sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.
- -Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting users' freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.
- -Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.
- -The precise terms and conditions for copying, distribution and - modification follow.
- -âThis Licenseâ refers to version 3 of the GNU General Public License.
- -âCopyrightâ also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.
- -âThe Programâ refers to any copyrightable work licensed under this - License. Each licensee is addressed as âyouâ. âLicenseesâ and - ârecipientsâ may be individuals or organizations.
- -To âmodifyâ a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a âmodified versionâ of the - earlier work or a work âbased onâ the earlier work.
- -A âcovered workâ means either the unmodified Program or a work based - on the Program.
- -To âpropagateâ a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.
- -To âconveyâ a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.
- -An interactive user interface displays âAppropriate Legal Noticesâ - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.
- -The âsource codeâ for a work means the preferred form of the work - for making modifications to it. âObject codeâ means any non-source - form of a work.
- -A âStandard Interfaceâ means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.
- -The âSystem Librariesâ of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - âMajor Componentâ, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.
- -The âCorresponding Sourceâ for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the work's - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.
- -The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.
- -The Corresponding Source for a work in source code form is that - same work.
- -All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.
- -You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.
- -Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.
- -No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.
- -When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the work's - users, your or third parties' legal rights to forbid circumvention of - technological measures.
- -You may convey verbatim copies of the Program's source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.
- -You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.
- -You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:
- -A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - âaggregateâ if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilation's users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.
- -You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:
- -A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.
- -A âUser Productâ is either (1) a âconsumer productâ, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, ânormally usedâ refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.
- -âInstallation Informationâ for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.
- -If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).
- -The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.
- -Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.
- -âAdditional permissionsâ are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.
- -When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.
- -Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:
- -All other non-permissive additional terms are considered âfurther - restrictionsâ within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.
- -If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.
- -Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.
- -You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).
- -However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.
- -Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.
- -Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.
- -You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.
- -Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.
- -An âentity transactionâ is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the party's predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.
- -You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.
- -A âcontributorâ is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributor's âcontributor versionâ.
- -A contributor's âessential patent claimsâ are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, âcontrolâ includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.
- -Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributor's essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.
- -In the following three paragraphs, a âpatent licenseâ is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To âgrantâ such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.
- -If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. âKnowingly relyingâ means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipient's use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.
- -If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.
- -A patent license is âdiscriminatoryâ if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.
- -Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.
- -If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.
- -Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.
- -The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.
- -Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License âor any later versionâ applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.
- -If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxy's - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.
- -Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.
- -THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM âAS ISâ WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
- -IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.
- -If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.
- -END OF TERMS AND CONDITIONS
- -If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.
- -To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the âcopyrightâ line and a pointer to where the full notice is found.
- -<one line to give the programâs name -and a brief idea of what it does.> -Copyright (C) <year> <name of author> - -This program is free software: you can -redistribute it and/or modify -it under the terms of the GNU General -Public License as published by the Free -Software Foundation, either version 3 -of the License, or(at your option) -any later version. - -This program is distributed in the hope -that it will be useful, but WITHOUT ANY -WARRANTY; without even the implied -warranty of MERCHANTABILITY or FITNESS -FOR A PARTICULAR PURPOSE. See the GNU -General Public License for more details. - -You should have received a copy of the -GNU General Public License along with -this program. If not, see -<http://www.gnu.org/licenses/>.- -
Also add information on how to contact you by electronic and paper mail.
- -If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:
- -<program> Copyright (C) <year> -<name of author> -This program comes with ABSOLUTELY NO -WARRANTY; for details type `show w'. -This is free software, and you are -welcome to redistribute it under -certain conditions; type `show c' -for details.- -
The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your program's commands - might be different; for a GUI interface, you would use an âabout boxâ.
- -You should also get your employer (if you work as a programmer) or school, - if any, to sign a âcopyright disclaimerâ for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.
- -The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.
- -Version 2.0, January 2004
-http://www.apache.org/licenses/
- -âLicenseâ shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.
- -âLicensorâ shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.
- -âLegal Entityâ shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, âcontrolâ means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.
- -âYouâ (or âYourâ) shall mean an individual or Legal Entity exercising - permissions granted by this License.
- -âSourceâ form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.
- -âObjectâ form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.
- -âWorkâ shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).
- -âDerivative Worksâ shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.
- -âContributionâ shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, âsubmittedâ means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as âNot a - Contribution.â
- -âContributorâ shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.
- -Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.
- -Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.
- -You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:
- -Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.
- -This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.
- -Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an âAS ISâ BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.
- -In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.
- -While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.
- -END OF TERMS AND CONDITIONS
- -To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets â[]â replaced with your own - identifying information. (Donât include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same âprinted pageâ as the copyright notice for easier - identification within third-party archives.
-Copyright [yyyy] [name of copyright owner] - -Licensed under the Apache License, -Version 2.0 (the âLicenseâ); -you may not use this file except -in compliance with the License. -You may obtain a copy of the License at - -http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law -or agreed to in writing, software -distributed under the License is -distributed on an âAS ISâ BASIS, -WITHOUT WARRANTIES OR CONDITIONS -OF ANY KIND, either express or implied. -See the License for the specific -language governing permissions and -limitations under the License.\ No newline at end of file diff --git a/app/src/main/assets/es/about_links_light.html b/app/src/main/assets/es/about_links.html similarity index 70% rename from app/src/main/assets/es/about_links_light.html rename to app/src/main/assets/es/about_links.html index d3cc091e..0dc204d7 100644 --- a/app/src/main/assets/es/about_links_light.html +++ b/app/src/main/assets/es/about_links.html @@ -1,5 +1,5 @@ +
Seguimiento de errores y petición de funciones
- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_links_dark.html b/app/src/main/assets/es/about_links_dark.html deleted file mode 100644 index 5a89bcbf..00000000 --- a/app/src/main/assets/es/about_links_dark.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -- Noticias
- - - -- Seguimiento de errores y petición de funciones
- -- Foro
- -- GitWeb
- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_permissions_dark.html b/app/src/main/assets/es/about_permissions.html similarity index 90% rename from app/src/main/assets/es/about_permissions_dark.html rename to app/src/main/assets/es/about_permissions.html index 17e65e21..5a4a7e80 100644 --- a/app/src/main/assets/es/about_permissions_dark.html +++ b/app/src/main/assets/es/about_permissions.html @@ -1,5 +1,5 @@ + diff --git a/app/src/main/assets/es/about_permissions_light.html b/app/src/main/assets/es/about_permissions_light.html deleted file mode 100644 index b674b8b5..00000000 --- a/app/src/main/assets/es/about_permissions_light.html +++ /dev/null @@ -1,47 +0,0 @@ - - - - - - - - - - -Requerido para que WebView consiga acceso a internet. Sin este permiso, Navegador Privado serÃa âSin Navegador: Protegiendo su privacidad estando completamente desconectado de internetâ.
- -com.android.launcher.permission.INSTALL_SHORTCUT
-Requerido para añadir accesos directos de páginas web en el escritorio.
- -android.permission.READ_EXTERNAL_STORAGE
-Requerido para importar la configuración de las carpetas públicas. - En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio importar la configuración desde las carpetas de la aplicación.
- -android.permission.WRITE_EXTERNAL_STORAGE
-Requerido para exportar la configuración y descargar archivos a las carpetas públicas. - En Android Marshmallow (API 23) y posteriores, si se niega este permiso, Privacy Browser puede en cambio exportar la configuración y almacenar las descargas en las carpetas de la aplicación.
- - \ No newline at end of file diff --git a/app/src/main/assets/es/about_privacy_policy_dark.html b/app/src/main/assets/es/about_privacy_policy.html similarity index 92% rename from app/src/main/assets/es/about_privacy_policy_dark.html rename to app/src/main/assets/es/about_privacy_policy.html index 46369378..4a1469a6 100644 --- a/app/src/main/assets/es/about_privacy_policy_dark.html +++ b/app/src/main/assets/es/about_privacy_policy.html @@ -1,5 +1,5 @@ + @@ -86,6 +89,6 @@ Stoutner nunca vendrá la información ni la transferirá a ninguna tercera parte que la pudiera usar para publicidad o marketing.Revisión 1.6, 22 de mayo de 2018
+Revisión 1.7, 14 de mayo de 2019
\ No newline at end of file diff --git a/app/src/main/assets/es/about_privacy_policy_light.html b/app/src/main/assets/es/about_privacy_policy_light.html deleted file mode 100644 index abe6d65e..00000000 --- a/app/src/main/assets/es/about_privacy_policy_light.html +++ /dev/null @@ -1,91 +0,0 @@ - - - - - - - - - - -Navegador Privado no recoge ninguna información del usuario.
- - -Google Play tiene su propia polÃtica de privacidad. - Google proporciona información resumida y anónima de instalación a los desarrolladores, incluyendo el número de instalaciones, organizadas por las siguientes categorÃas.
-Google Play tiene su propia polÃtica de privacidad. - Google proporciona a los desarrolladores resúmenes anónimos de la siguiente información relativa a las valoraciones de los usuarios.
-Google Play tiene su propia polÃtica de privacidad. - Además del nombre del comentador, la calificación y el texto del comentario (las cuales están disponibles públicamente), Google proporciona alguna o toda la siguiente información al desarrollador.
-Los usuarios pueden elegir enviar comunicaciones directas a Stoutner, como mensajes de correo electrónico y comentarios en stoutner.com.
- -Stoutner puede utilizar esta información para ayudar en el desarrollo de Navegador Privado y comunicar el estado del proyecto a los usuarios. - Stoutner nunca vendrá la información ni la transferirá a ninguna tercera parte que la pudiera usar para publicidad o marketing.
- -Revisión 1.6, 22 de mayo de 2018
- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_domain_settings_dark.html b/app/src/main/assets/es/guide_domain_settings.html similarity index 73% rename from app/src/main/assets/es/guide_domain_settings_dark.html rename to app/src/main/assets/es/guide_domain_settings.html index dfe37d13..906057df 100644 --- a/app/src/main/assets/es/guide_domain_settings_dark.html +++ b/app/src/main/assets/es/guide_domain_settings.html @@ -1,5 +1,5 @@ + -Por defecto Navegador Privado navega con Javascript, cookies y almacenamiento DOM desactivados. Sin embargo, algunas páginas web necesitan legÃtimamente estas caracterÃsticas para funcionar correctamente. La configuración de dominio puede activar automáticamente un conjunto especÃfico de caracterÃsticas al visitar un dominio designado.
- +Al visitar un dominio que tiene la configuración de dominio especificada, el fondo de la casilla de texto de la URL es verde.
- + \ No newline at end of file diff --git a/app/src/main/assets/es/guide_domain_settings_light.html b/app/src/main/assets/es/guide_domain_settings_light.html deleted file mode 100644 index 607d1e75..00000000 --- a/app/src/main/assets/es/guide_domain_settings_light.html +++ /dev/null @@ -1,41 +0,0 @@ - - - - - - - - - - -Por defecto Navegador Privado navega con Javascript, cookies y almacenamiento DOM desactivados. - Sin embargo, algunas páginas web necesitan legÃtimamente estas caracterÃsticas para funcionar correctamente. - La configuración de dominio puede activar automáticamente un conjunto especÃfico de caracterÃsticas al visitar un dominio designado.
- - - -Al visitar un dominio que tiene la configuración de dominio especificada, el fondo de la casilla de texto de la URL es verde.
- - - - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_javascript_dark.html b/app/src/main/assets/es/guide_javascript.html similarity index 84% rename from app/src/main/assets/es/guide_javascript_dark.html rename to app/src/main/assets/es/guide_javascript.html index f8532a6b..d3936f48 100644 --- a/app/src/main/assets/es/guide_javascript_dark.html +++ b/app/src/main/assets/es/guide_javascript.html @@ -1,5 +1,5 @@ + -En los principios de internet las páginas web eran estáticas, sólo contenÃan textos e imágenes que eran mostradas en la pantalla y no podÃan cambiarse o interactuar con el usuario. Por supuesto, nada muy interesante puede pasar con contenido estático. Se desarrollaron diferentes tecnologÃas para facilitar páginas web dinámicas. Javascript es una de estas tecnologÃas.
@@ -36,19 +39,19 @@ y hacer muchas otras cosas útiles. -Por supuesto, el concepto de ejecutar programas arbitrarios de un sitio web es potencialmente peligroso. Es por ello que hay limitaciones en Javascript para evitar que haga cosas como instalar virus. Sin embargo, resulta que estas limitaciones son demasiado amplias. Abajo tenemos una captura de pantalla de la web webkay, que es una web que muestra el tipo de información que Javascript puede producir sobre un dispositivo. Browser Leaks es otro buen recurso.
- +Con fines de privacidad, lo ideal serÃa navegar por internet con Javascript deshabilitado. Sin embargo, hay algunas páginas web que requieren legÃtimamente de Javascript para lograr sus propósitos, y otras que no funcionan correctamente sin Javascript aunque pudieran programarse para hacerlo asÃ. Navegador Privado aborda esto haciendo sencillo el poder activar y desactivar Javascript. - Tocando el escudo de privacidad alternará entre azul o amarillo - (los cuales indican que Javascript está deshabilitado) y rojo (Javascript habilitado). + Tocando el escudo de privacidad alternará entre azul o amarillo + (los cuales indican que Javascript está deshabilitado) y rojo (Javascript habilitado). Revisar la diferente información que webkay puede recoger con Javascript habilitado y deshabilitado es informativo.
Navegar por internet con Javascript desactivado, y activarlo únicamente cuando se necesite, contribuye en gran medida en la protección de la privacidad del usuario. diff --git a/app/src/main/assets/es/guide_javascript_light.html b/app/src/main/assets/es/guide_javascript_light.html deleted file mode 100644 index c76e62af..00000000 --- a/app/src/main/assets/es/guide_javascript_light.html +++ /dev/null @@ -1,58 +0,0 @@ - - - -
- - - - - - -En los principios de internet las páginas web eran estáticas, sólo contenÃan textos e imágenes que eran mostradas en la pantalla y no podÃan cambiarse o interactuar con el usuario. - Por supuesto, nada muy interesante puede pasar con contenido estático. Se desarrollaron diferentes tecnologÃas para facilitar páginas web dinámicas. Javascript es una de estas tecnologÃas.
- -Javascript es un lenguaje de programación. Muchos servidores web alojan programas escritos en Javascript, que son enviados a los dispositivos como parte de la página web. - El dispositivo ejecuta este Javascript en su procesador local y sigue los comandos del programa, el cual puede animar imágenes en dicho sitio web, abrir un menú emergente, - y hacer muchas otras cosas útiles.
- - -Por supuesto, el concepto de ejecutar programas arbitrarios de un sitio web es potencialmente peligroso. Es por ello que hay limitaciones en Javascript para evitar que haga cosas como instalar virus. - Sin embargo, resulta que estas limitaciones son demasiado amplias. Abajo tenemos una captura de pantalla de la web webkay, - que es una web que muestra el tipo de información que Javascript puede producir sobre un dispositivo. Browser Leaks es otro buen recurso.
- - - -Con fines de privacidad, lo ideal serÃa navegar por internet con Javascript deshabilitado. - Sin embargo, hay algunas páginas web que requieren legÃtimamente de Javascript para lograr sus propósitos, - y otras que no funcionan correctamente sin Javascript aunque pudieran programarse para hacerlo asÃ. Navegador Privado aborda esto haciendo sencillo el poder activar y desactivar Javascript. - Tocando el escudo de privacidad alternará entre azul o amarillo - (los cuales indican que Javascript está deshabilitado) y rojo (Javascript habilitado). - Revisar la diferente información que webkay puede recoger con Javascript habilitado y deshabilitado es informativo.
- -Navegar por internet con Javascript desactivado, y activarlo únicamente cuando se necesite, contribuye en gran medida en la protección de la privacidad del usuario. - Además, JavaScript se utiliza para cargar gran parte de los anuncios molestos y el arsenal adicional que viene junto con la mayorÃa de las páginas web modernas. - Con esta opción desactivada, las páginas web se cargarán más rápido, consumirán menos tráfico de red y usarán menos energÃa de la CPU, lo que se traduce en una mayor duración de la baterÃa.
- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_local_storage_dark.html b/app/src/main/assets/es/guide_local_storage.html similarity index 90% rename from app/src/main/assets/es/guide_local_storage_dark.html rename to app/src/main/assets/es/guide_local_storage.html index 8634221a..7ca21a52 100644 --- a/app/src/main/assets/es/guide_local_storage_dark.html +++ b/app/src/main/assets/es/guide_local_storage.html @@ -1,5 +1,5 @@ + -Las cookies de primera parte son cookies establecidas por la página web en la barra URL de la parte superior de la página.
@@ -43,10 +46,10 @@ Asà es como se aseguran de que sigues siendo tu al moverte de una página a otra en el sitio, y es, en mi opinión, uno de los pocos usos legÃtimos de las cookies.Si las cookies de primera parte están habilitadas pero Javascript está deshabilitado, - el icono de privacidad será amarillo como advertencia.
+ el icono de privacidad será amarillo como advertencia. -Las cookies de terceras partes son establecidas por ciertas partes de una página web que son cargadas desde servidores diferentes a la URL de la parte superior de la página. Por ejemplo, la mayorÃa de páginas web que tienen anuncios los cargan desde una compañÃa de publicidad de terceros, como Ad Sense de Google. @@ -74,7 +77,7 @@ y cookies de teceras partes. Por lo tanto, si se habilitan las cookies de primera parte también se habilitarán las de teceras partes.
-Document Object Model storage (o Almacenamiento de modelos de objetos de documento), también conocido como almacenamiento web, es como cookies con esteroides. Mientras que el tamaño máximo de almacenamiento combinado para todas las cookies de una única URL es de 4 kilobytes, el almacenamiento DOM puede contener @@ -82,7 +85,7 @@ Ya que el almacenamiento DOM usa JavaScript para leer y escribir datos, no puede activarse a menos que JavaScript esté también activado.
-Los datos de formulario contienen información escrita en formularios web, como nombres de usuario, direcciones, números de teléfono, etc., y los enumera en un cuadro desplegable en futuras visitas. A diferencia de las otras formas de almacenamiento local, los datos de los formularios no se envÃan al servidor web sin la interacción especÃfica del usuario. diff --git a/app/src/main/assets/es/guide_local_storage_light.html b/app/src/main/assets/es/guide_local_storage_light.html deleted file mode 100644 index 9639c5f7..00000000 --- a/app/src/main/assets/es/guide_local_storage_light.html +++ /dev/null @@ -1,93 +0,0 @@ - - - -
- - - - - - -Las cookies de primera parte son cookies establecidas por la página web en la barra URL de la parte superior de la página.
- -Desde los primeros dÃas de internet, se hizo evidente que serÃa ventajoso para las páginas web el poder almacenar información en un ordenador para un acceso futuro. - Por ejemplo, una página web que muestre información meteorológica podrÃa solicitar al usuario un código postal y luego almacenarlo en una cookie. - La próxima vez que el usuario visite la página web, la información meteorológica se cargará automáticamente para ese código postal, sin que el usuario tenga que volver a introducirlo.
- -Como todo en la web, gente inteligente descubrió todo tipo de maneras de abusar de las cookies para hacer cosas que los usuarios no aprobarÃan si supieran que estaban ocurriendo. - Por ejemplo, una página web puede establecer una cookie con un número de serie único en un dispositivo. - Luego, cada vez que un usuario visite la página web con ese dispositivo, puede vincularse a un perfil único que el servidor mantiene para ese número de serie, - incluso si el dispositivo se conecta desde diferentes direcciones IP.
- -Casi todas las páginas web con inicios de sesión requieren que las cookies de primera parte estén habilitadas para que el usuario pueda iniciar sesión. - Asà es como se aseguran de que sigues siendo tu al moverte de una página a otra en el sitio, y es, en mi opinión, uno de los pocos usos legÃtimos de las cookies.
- -Si las cookies de primera parte están habilitadas pero Javascript está deshabilitado, - el icono de privacidad será amarillo como advertencia.
- - -Las cookies de terceras partes son establecidas por ciertas partes de una página web que son cargadas desde servidores diferentes a la URL de la parte superior de la página. - Por ejemplo, la mayorÃa de páginas web que tienen anuncios los cargan desde una compañÃa de publicidad de terceros, como Ad Sense de Google. - Cada vez que se carga la página web, solicita a la compañÃa de publicidad que muestre un anuncio. - La compañÃa de publicidad analiza cualquier información que pueda tener sobre el usuario, analiza la tasa actual que los anunciantes están dispuestos a pagar por sus anuncios, - y selecciona uno para mostrar. La sección de la página web que muestra los anuncios es cargada desde el servidor de la compañÃa de terceros en vez de hacerlo desde el servidor principal.
- -Ya que la mayorÃa de los anuncios en internet se muestran desde solo unas pequeñas compañÃas, - no les llevó a éstas mucho tiempo en darse cuenta que podrÃan establecer una cookie de seguimiento en el dispositivo del usuario y asà conocer cualquier lugar al que el usuario va. - Cada vez que un anuncio se carga desde una compañÃa, lo primero que hace es comprobar si el dispositivo ya tiene un único número de serie en una cookie de seguimiento. - Si es asÃ, busca el perfil para ese número de serie y toma nota del nuevo sitio web. - Es por esto que un usuario puede hacer una búsqueda en una página web por un producto que normalmente no busca, como nueces, - y luego de pronto empieza a ver anuncios de nueces en cada página web que visita.
- -Además de compañÃas de publicidad, las páginas de redes sociales descubrieron que también podÃan entrar en acción. - Hace unos pocos años, las principales páginas de redes sociales como Facebook y Twitter convencieron a un gran número de páginas web - que serÃa por su mejor interés colocar pequeños iconos de redes sociales en sus páginas. Ãstos no son sólo imágenes. - Contienen código incrustado que enlazan de nuevo a la web de la red social, - y entre otras cosas cargan una cookie de terceras partes en el dispositivo. Estas cookies se colocan aunque el usuario no tenga una cuenta con la plataforma de la red social. - A través del tiempo, compañÃas como Facebook (la cual también corre una red de anuncios) han construÃdo un gran número de perfiles detallados sobre personas que - ni siquiera han creado una cuenta en su web. - -
No existe ninguna buena razón para habilitar cookies de terceras partes. En dispositivos con Android KitKat o anteriores (versión <= 4.4.4 o API <= 20), WebView no - distingue entre cookies de primera parte - y cookies de teceras partes. Por lo tanto, si se habilitan las cookies de primera parte también se habilitarán las de teceras partes.
- - -Document Object Model storage (o Almacenamiento de modelos de objetos de documento), también conocido como almacenamiento web, es como cookies con esteroides. - Mientras que el tamaño máximo de almacenamiento combinado para todas las cookies de una única URL es de 4 kilobytes, el almacenamiento DOM puede contener - megabytes por sitio. - Ya que el almacenamiento DOM usa JavaScript para leer y escribir datos, no puede activarse a menos que JavaScript esté también activado.
- - -Los datos de formulario contienen información escrita en formularios web, como nombres de usuario, direcciones, números de teléfono, etc., y los enumera en un cuadro desplegable en futuras visitas. - A diferencia de las otras formas de almacenamiento local, los datos de los formularios no se envÃan al servidor web sin la interacción especÃfica del usuario. - A partir de Android Oreo (8.0), los datos de formulario de WebView fueron reemplazados por el - servicio Autofill. - Como tal, los controles para los datos de formulario ya no aparecen en los dispositivos Android más nuevos.
- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_overview_dark.html b/app/src/main/assets/es/guide_overview.html similarity index 83% rename from app/src/main/assets/es/guide_overview_dark.html rename to app/src/main/assets/es/guide_overview.html index 2ae4fcdd..44d4f151 100644 --- a/app/src/main/assets/es/guide_overview_dark.html +++ b/app/src/main/assets/es/guide_overview.html @@ -1,5 +1,5 @@ + -Navegador Privado está diseñado para ofrecerte todo el control posible de tu privacidad mientras navegas por internet. Cuando conectas a un sitio web, parte de la información que es necesaria para facilitar la conexión son transferidas al servidor. @@ -40,7 +43,7 @@ Navegador Privado está diseñado para ofrecer al usuario toda la información y control sobre estas técnicas de rastreo como sea posible.
-Navegador Privado usa el WebView que incorpora Android para interpretar los sitios web. Existen algunas limitaciones en los controles que WebView expone para administrar la configuración de privacidad. diff --git a/app/src/main/assets/es/guide_overview_light.html b/app/src/main/assets/es/guide_overview_light.html deleted file mode 100644 index feeba621..00000000 --- a/app/src/main/assets/es/guide_overview_light.html +++ /dev/null @@ -1,50 +0,0 @@ - - - -
- - - - - - -Navegador Privado está diseñado para ofrecerte todo el control posible de tu privacidad mientras navegas por internet. - Cuando conectas a un sitio web, parte de la información que es necesaria para facilitar la conexión son transferidas al servidor. - Por ejemplo, el servidor recibirá tu dirección IP y un número de puerto, los cuales son necesarios, asà sabe dónde enviar la respuesta. - Esta información es a menudo registrada por el servidor, - permitiendo al desarrollador del sitio web realizar informes mostrando las veces que ha sido cargada una web y cuántas diferentes direcciones IP accedieron a ella.
- -Sin embargo, la mayorÃa de operadores de un sitio web quieren rastrear tu navegación web a través de muchas webs, no sólo en un servidor. - Existen muchas técnicas que usan para conseguirlo. Algunas de ellas solicitan o colocan información extra en tu dispositivo que facilita este rastreo. - Casi todos los navegadores participarán voluntariamente en este rastreo sin informar al usuario de lo que están haciendo. - Navegador Privado está diseñado para ofrecer al usuario toda la información y control sobre estas técnicas de rastreo como sea posible.
- - -Navegador Privado usa el WebView que incorpora Android para interpretar los sitios web. - Existen algunas limitaciones en los controles que WebView expone para administrar la configuración de privacidad. - Por ejemplo, no es posible habilitar algunos comandos JavaScript mientras que se deshabilitan otros. - En el futuro, Navegador Privado cambiará a un WebView personalizado llamado WebView Privado.
- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_proxies_dark.html b/app/src/main/assets/es/guide_proxies.html similarity index 89% rename from app/src/main/assets/es/guide_proxies_dark.html rename to app/src/main/assets/es/guide_proxies.html index ae8c1c4c..55e95fdc 100644 --- a/app/src/main/assets/es/guide_proxies_dark.html +++ b/app/src/main/assets/es/guide_proxies.html @@ -22,11 +22,14 @@ - + + + + -Existen dos categorÃas generales de malos actores que quieren infringir la privacidad de la web: gobiernos maliciosos con acceso a ISPs (Proveedores de Servicios de Internet) y grandes corporaciones que ofrecen redes sociales y de publicidad. @@ -34,7 +37,7 @@ pero no de las mega corporaciones (que incrustan código malicioso en los servidores web).
-Los gobiernos maliciosos a menudo espÃan a sus ciudadanos para castigar la disidencia o la actividad de derechos humanos. Normalmente suelen operar los ISPs locales o los fuerzan a revelar información mostrando cada dirección IP que visita cada usuario. @@ -47,7 +50,7 @@ y los usuarios podrÃan ser castigados porque los gobiernos asumen que están haciendo algo que está prohibido. Por lo tanto, los proxis pueden ser útiles, pero no son una panacea.
-Cuando un usuario se conecta a un servidor web, éste puede ver la dirección IP del usuario. Aunque esto no es una ciencia perfecta, las direcciones IP se pueden convertir a direcciones fÃsicas con bastante precisión. @@ -73,7 +76,7 @@ inhabilitar cookies y almacenamiento DOM, y usar un navegador del que sea difÃcil recoger huellas.
-A pesar de sus limitaciones, los proxis pueden ser útiles en algunas circunstancias. Tor e I2P @@ -81,6 +84,6 @@ la barra de aplicaciones tendrá un fondo azul claro en lugar del gris claro predeterminado. Debido a que el tráfico está siendo enrutado a través de varios nodos proxy, usar un proxy en capas es a menudo mucho más lento que conectarse directamente a Internet.
- + \ No newline at end of file diff --git a/app/src/main/assets/es/guide_proxies_light.html b/app/src/main/assets/es/guide_proxies_light.html deleted file mode 100644 index 8e22ae84..00000000 --- a/app/src/main/assets/es/guide_proxies_light.html +++ /dev/null @@ -1,86 +0,0 @@ - - - - - - - - - - -Existen dos categorÃas generales de malos actores que quieren infringir la privacidad de la web: - gobiernos maliciosos con acceso a ISPs (Proveedores de Servicios de Internet) y grandes corporaciones que ofrecen redes sociales y de publicidad. - Los proxies como TOR (The Onion Router) e I2P (the Invisible Internet Project) son útiles para proteger la privacidad frente a los gobiernos maliciosos (que espÃan el tráfico en tránsito) - pero no de las mega corporaciones (que incrustan código malicioso en los servidores web).
- - -Los gobiernos maliciosos a menudo espÃan a sus ciudadanos para castigar la disidencia o la actividad de derechos humanos. - Normalmente suelen operar los ISPs locales o los fuerzan a revelar información mostrando cada dirección IP que visita cada usuario. - Los proxis en capas están diseñados para derrotar esta violación de la privacidad mediante el cifrado del tráfico del dispositivo de un usuario - y su enrutamiento a través de múltiples servidores en Internet antes de enviarlo al destino final. - Esto significa que ningún ISP, servidor o sitio web individual puede conocer tanto la dirección IP del dispositivo del usuario como la dirección IP del servidor web final. - Los gobiernos malintencionados y los ISP que ellos controlan no pueden saber a qué servidores web está accediendo un usuario, - aunque sà pueden saber que el usuario está utilizando un servicio proxy en capas. - En algunas partes del mundo, el uso de proxis podrÃa ser interpretado como una evidencia de comportamiento ilegal (âSi no tuvieras nada que ocultar no estarÃas cifrando tu tráficoâ) - y los usuarios podrÃan ser castigados porque los gobiernos asumen que están haciendo algo que está prohibido. Por lo tanto, los proxis pueden ser útiles, pero no son una panacea.
- - -Cuando un usuario se conecta a un servidor web, éste puede ver la dirección IP del usuario. - Aunque esto no es una ciencia perfecta, las direcciones IP se pueden convertir a direcciones fÃsicas con bastante precisión. - Los pequeños servidores web suelen depender de las direcciones IP para identificar la ubicación de los usuarios que visitan su sitio. - Los proxis son una buena solución para enmascarar la ubicación del usuario desde estos servidores. - Pero las más grandes corporaciones que poseen medios sociales y redes de publicidad usan un perfil completo de información - diseñado para rastrear a los usuarios a través de los dispositivos y direcciones IP. - Estos perfiles emplean una variedad de técnicas para identificar a los usuarios, incluyendo Javascript, cookies, IDs de seguimiento, - y huellas del navegador. - Debido a que la gran mayorÃa de páginas web en internet, o cargan un anuncio de una de las principales redes, o integran iconos de medios sociales con su Javascript asociado, - estas corporaciones han creado perfiles para casi todos los usuarios en lÃnea y pueden rastrear su actividad en internet a través de sitios que no están relacionados.
- -Ellos rastrean cada sitio web visitado, todo lo que se compra, cada tarjeta de crédito que es usada para realizar una compra, cada dirección a la que se envÃan los artÃculos, - y los metadatos GPS de cada imagen que se sube a internet. - Construyen un perfil de la edad del usuario, género, estado civil, dirección, afiliaciones polÃticas, afiliaciones religiosas, circunstancias familiares, número de mascotas, - y cualquier otra cosa que caiga en sus manos. - Incluso compran bases de datos de transacciones con tarjeta de crédito en tiendas locales, - para asà poder rastrear de los usuarios en sus perfiles los patrones de compra que hacen cuando no están conectados. - Debido a que tienen ya una información de dirección mucho más precisa sobre un usuario que la que revela una dirección IP, - los proxis no proporcionan ninguna protección real de privacidad contra las mega corporaciones.
- -La única mejor protección de la privacidad contra las grandes corporaciones es navegar por la web con Javascript deshabilitado, seguido de bloquear redes publicitarias, - inhabilitar cookies y almacenamiento DOM, y usar un navegador del que sea difÃcil recoger huellas.
- - -A pesar de sus limitaciones, los proxis pueden ser útiles en algunas circunstancias. - Tor e I2P - tienen aplicaciones Android que facilitan el uso de sus redes de proxy. Cuando se activa el proxy en Navegador Privado, - la barra de aplicaciones tendrá un fondo azul claro en lugar del gris claro predeterminado. - Debido a que el tráfico está siendo enrutado a través de varios nodos proxy, usar un proxy en capas es a menudo mucho más lento que conectarse directamente a Internet.
- - - - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_requests_dark.html b/app/src/main/assets/es/guide_requests.html similarity index 91% rename from app/src/main/assets/es/guide_requests_dark.html rename to app/src/main/assets/es/guide_requests.html index fd14918f..bbc0e106 100644 --- a/app/src/main/assets/es/guide_requests_dark.html +++ b/app/src/main/assets/es/guide_requests.html @@ -1,5 +1,5 @@ + -Cuando se carga una URL, normalmente realiza una serie de peticiones de recursos para CCS, JavaScript, imágenes y otros archivos. Los detalles sobre estas solicitudes se pueden ver en la Actividad de peticiones. El cajón de navegación tiene un enlace a la Actividad de peticiones y también muestra cuántas órdenes se bloquearon. Al tocar una solicitud se muestran los detalles de por qué se ha permitido o bloqueado.
- +Navegador Privado incluye cuatro listas de bloqueo comunes basadas en la sintaxis de Adblock: EasyList, EasyPrivacy, Lista molesta de Fanboy y Lista de bloqueo social de Fanboy. diff --git a/app/src/main/assets/es/guide_requests_light.html b/app/src/main/assets/es/guide_requests_light.html deleted file mode 100644 index 3693a53b..00000000 --- a/app/src/main/assets/es/guide_requests_light.html +++ /dev/null @@ -1,84 +0,0 @@ - - - -
- - - - - - -Cuando se carga una URL, normalmente realiza una serie de peticiones de recursos para CCS, JavaScript, imágenes y otros archivos. - Los detalles sobre estas solicitudes se pueden ver en la Actividad de peticiones. El cajón de navegación tiene un enlace a la Actividad de peticiones y también muestra cuántas órdenes se bloquearon. - Al tocar una solicitud se muestran los detalles de por qué se ha permitido o bloqueado.
- - - -Navegador Privado incluye cuatro listas de bloqueo comunes basadas en la sintaxis de Adblock: - EasyList, EasyPrivacy, Lista molesta de Fanboy y Lista de bloqueo social de Fanboy. - Estas listas de bloqueo son procesadas por Navegador Privado en las siguientes 22 sublistas, que verifican las solicitudes de recursos en el orden listado.
- -Las listas iniciales se comparan con el principio de la URL. Las listas finales se comparan con el final de la URL. Las listas de dominios sólo se comparan con ciertos dominios. - Las listas de terceras partes sólo se aplican si el dominio raÃz de la solicitud es diferente del dominio raÃz de la URL principal. - Las listas de expresiones regulares siguen la sintaxis de las expresiones regulares. - Cada elemento de la sublista tiene una o más entradas. - En el caso de sublistas de dominio, la solicitud de recurso sólo se compara con el artÃculo si la primera entrada coincide con el dominio de la URL principal.
- -Debido a las limitaciones del WebView de Android, y para acelerar el procesamiento de las solicitudes, Navegador Privado implementa una interpretación simplificada de la sintaxis de Adblock. - Esto puede conducir a veces a falsos positivos, en los que los recursos se permiten o bloquean de formas que no estaban previstas en la entrada original. - Una descripción más detallada de cómo se procesan las entradas de la lista de bloqueo está disponible en stoutner.com.
- -Navegador Privado tiene tres listas de bloqueo adicionales.
- UltraList y UltraPrivacy
- bloquean los anuncios y rastreadores que EasyList y EasyPrivacy no bloquea. La tercera bloquea todas las peticiones de terceras partes.
- Una solicitud sólo se considera de terceras partes si el dominio base de la solicitud es diferente del dominio base de la URL.
- Por ejemplo, si www.website.com
carga una imagen de images.website.com
,
- esto no se bloquea como petición de una tercera parte porque ambos comparten el mismo dominio base de website.com
.
- El bloqueo de todas las solicitudes de terceras partes aumenta la privacidad, pero esta lista de bloqueo está desactivada por defecto porque rompe un gran número de páginas web.
Al visitar una URL cifrada (que empieza con HTTPS), el servidor web usa un certificado SSL para cifrar tanto la información enviada al navegador como asimismo para identificar al servidor. El propósito de la identificación del servidor es para prevenir que una máquina ubicada entre el navegador y el servidor web pretenda ser el servidor y descifrar la información en tránsito. @@ -39,14 +42,14 @@
Al fijar un certificado SSL se le indica al navegador que sólo se puede confiar en un certificado SSL especÃfico para un dominio en particular. Cualquier otro certificado, aunque sea válido, será rechazado.
- +Los certificados SSL expiran en una fecha especificada, por lo que incluso los certificados SSL fijados necesitarán legÃtimamente ser actualizados de vez en cuando. Como regla general, fijar los certificados SSL probablemente no sea necesario en la mayorÃa de los casos. Pero para aquellos que sospechan que organizaciones poderosas puedan estar apuntando hacia ellos, la fijación de certificados SSL puede detectar y frustar un ataque MITM. Navegador Privado también tiene la capacidad de fijar direcciones IP.
- +Los certificados SSL pueden ser fijados en Configuración de Dominios. Además de proteger contra ataques MITM, diff --git a/app/src/main/assets/es/guide_ssl_certificates_light.html b/app/src/main/assets/es/guide_ssl_certificates_light.html deleted file mode 100644 index b65280a3..00000000 --- a/app/src/main/assets/es/guide_ssl_certificates_light.html +++ /dev/null @@ -1,56 +0,0 @@ - - - -
- - - - - - -Al visitar una URL cifrada (que empieza con HTTPS), el servidor web usa un certificado SSL para cifrar tanto la información enviada al navegador como asimismo para identificar al servidor. - El propósito de la identificación del servidor es para prevenir que una máquina ubicada entre el navegador y el servidor web pretenda ser el servidor y descifrar la información en tránsito. - Este clase de ataque es conocido como Hombre en Medio (MITM en sus iniciales en inglés). - Los certificados SSL son generados por las autoridades certificadoras: compañÃas que verifican la identidad de un servidor y producen un certificado a cambio de una tarifa. - Android tiene una lista de autoridades certificadoras de confianza y aceptará cualquiera de sus certificados para cualquier página web. - Se supone que no es posible que una organización adquiera un certificado SSL para un dominio que no controla, - pero en la práctica muchos gobiernos y grandes corporaciones han sido capaces de hacerlo.
- -Al fijar un certificado SSL se le indica al navegador que sólo se puede confiar en un certificado SSL especÃfico para un dominio en particular. - Cualquier otro certificado, aunque sea válido, será rechazado.
- - - -Los certificados SSL expiran en una fecha especificada, por lo que incluso los certificados SSL fijados necesitarán legÃtimamente ser actualizados de vez en cuando. - Como regla general, fijar los certificados SSL probablemente no sea necesario en la mayorÃa de los casos. - Pero para aquellos que sospechan que organizaciones poderosas puedan estar apuntando hacia ellos, la fijación de certificados SSL puede detectar y frustar un ataque MITM. - Navegador Privado también tiene la capacidad de fijar direcciones IP.
- - - -Los certificados SSL pueden ser fijados en Configuración de Dominios. - Además de proteger contra ataques MITM, - fijar un certificado autofirmado para un dispositivo como un router inalámbrico o punto de acceso eliminará el mensaje de error que se presenta normalmente cada vez que se carga su página web. - Al tocar la pestaña activa se muestra el certificado SSL de la página web actual.
- - \ No newline at end of file diff --git a/app/src/main/assets/es/guide_tracking_ids_dark.html b/app/src/main/assets/es/guide_tracking_ids.html similarity index 78% rename from app/src/main/assets/es/guide_tracking_ids_dark.html rename to app/src/main/assets/es/guide_tracking_ids.html index e03279bc..23cd6569 100644 --- a/app/src/main/assets/es/guide_tracking_ids_dark.html +++ b/app/src/main/assets/es/guide_tracking_ids.html @@ -1,5 +1,5 @@ + -Hace algunos años la W3C (Consorcio Mundial de la Red) creó un mecanismo para que los navegadores informaran a los servidores web que no les gustarÃa ser rastreados. Esto se logra incluyendo un encabezado DNT (Do Not Track o No Rastrear) con las solicitudes web.
@@ -35,7 +38,7 @@ todos ellos ignoran al menos algunos encabezados DNT. -Navegador Privado elimina las secciones de ID de seguimiento de las URL, como ?utm_
de Google Analytics y
?fbclick=
de Facebook. La modificación de URL puede desactivarse en la configuración si está causando problemas.
Hace algunos años la W3C (Consorcio Mundial de la Red) creó un mecanismo para que los navegadores informaran a los servidores web que no les gustarÃa ser rastreados. - Esto se logra incluyendo un encabezado DNT (Do Not Track o No Rastrear) con las solicitudes web.
- -El encabezado DNT no provee realmente de mucha privacidad porque la mayorÃa de servidores web lo ignoran. Por ejemplo, Yahoo, Google, Microsoft y Facebook, - todos ellos ignoran al menos algunos encabezados DNT.
- - -Navegador Privado elimina las secciones de ID de seguimiento de las URL, como ?utm_
de Google Analytics y
- ?fbclick=
de Facebook. La modificación de URL puede desactivarse en la configuración si está causando problemas.
Cuando los navegadores web se conectan a las páginas web, envÃan un agente de usuario, que identifica al navegador y a las capacidades de rendering que posee. El servidor web puede usar esta información para decidir qué versión de página web enviar al navegador. @@ -40,7 +43,7 @@ La captura de pantalla de abajo muestra un Pixel 2 XL corriendo Android 10 con el sistema de android WebView 84.0.4147.125 instalado. La mayorÃa de servidores web reconocerán esto como un navegador móvil y mostrará la versión móvil del sitio si dispone de ella.
- +Existe tanta información en el agente de usuario que algunas veces será el mismo con sólo unos pocos visitantes a una página web. Si el agente de usuario es combinado con otra pieza de información identificativa que no es única, esto da lugar a menudo a una huella única. @@ -49,7 +52,7 @@ Si esta prueba se realiza con javascript habilitado, la cantidad de información que es revelada aumenta grandemente. Browser Leaks (Fugas del navegador) y Am I Unique (¿Soy único?) son también buenas fuentes de información.
- +Existen varios agentes de usuario preestablecidos que coinciden con los más comunes navegadores y sistemas operativos. A los efectos de huellas del navegador, todo lo que sea extraño es más fácil de rastrear. diff --git a/app/src/main/assets/es/guide_user_agent_light.html b/app/src/main/assets/es/guide_user_agent_light.html deleted file mode 100644 index a0e5b4db..00000000 --- a/app/src/main/assets/es/guide_user_agent_light.html +++ /dev/null @@ -1,65 +0,0 @@ - - - -
- - - - - - -Cuando los navegadores web se conectan a las páginas web, envÃan un agente de usuario, que identifica al navegador y a las capacidades de rendering que posee. - El servidor web puede usar esta información para decidir qué versión de página web enviar al navegador. - Por ejemplo, muchas páginas web tienen diferentes versiones para escritorio y para navegadores móviles.
- -Por defecto, Navegador Privado usa su propio agente de usuario, que es PrivacyBrowser/1.0
. Ãste envÃa un mÃnimo de información al servidor web.
- Ya que los servidores web no lo reconocen como un agente de usuario móvil, lo que normalmente muestran es la versión de escritorio del sitio.
En comparación, el agente de usuario por defecto de WebView divulga una gran cantidad de información sobre el hardware y el software del dispositivo. - En la ventana Configuración, seleccionando WebView por defecto como el Agente de usuario muestra el agente de usuario que se enviará. - La captura de pantalla de abajo muestra un Pixel 2 XL corriendo Android 10 con el sistema de android WebView 84.0.4147.125 instalado. - La mayorÃa de servidores web reconocerán esto como un navegador móvil y mostrará la versión móvil del sitio si dispone de ella.
- - - -Existe tanta información en el agente de usuario que algunas veces será el mismo con sólo unos pocos visitantes a una página web. - Si el agente de usuario es combinado con otra pieza de información identificativa que no es única, esto da lugar a menudo a una huella única. - La Fundación de Frontera Electrónica (EFF) creó una herramienta llamada Panopticlick - para demostrar cuánta información puede ser recogida de estas fuentes. - Si esta prueba se realiza con javascript habilitado, la cantidad de información que es revelada aumenta grandemente. - Browser Leaks (Fugas del navegador) y Am I Unique (¿Soy único?) son también buenas fuentes de información.
- - - -Existen varios agentes de usuario preestablecidos que coinciden con los más comunes navegadores y sistemas operativos.
- A los efectos de huellas del navegador, todo lo que sea extraño es más fácil de rastrear.
- Si Navegador Privado se vuelve común y mucha gente usa PrivacyBrowser/1.0
como su usuario de agente, será entonces una buena elección para su privacidad.
- Firefox o Chrome son los usuarios de agente más comunes, pero se actualizan automáticamente y sus números de versión cambian tan rápidamente que es probable que los usuarios de agente incluÃdos
- en Privacy Browser no estén ya en sintonÃa con la mayorÃa de agentes de usuario en los registros del servidor.
Algunas páginas web no funcionan correctamente si no reconocen el agente de usuario. - Usando la configuración de dominios para establecer el agente de usuario a WebView por defecto, - o a otro agente de usuario que sea normalmente reconocido, suele resolver el problema. - El WebView de android no permite que el agente de usuario esté en blanco. Si lo está, WebView simplemente envÃa el agente de usuario por defecto al servidor.
- - \ No newline at end of file diff --git a/app/src/main/assets/fr/about_changelog_light.html b/app/src/main/assets/fr/about_changelog.html similarity index 99% rename from app/src/main/assets/fr/about_changelog_light.html rename to app/src/main/assets/fr/about_changelog.html index 06831df5..8f3448bf 100644 --- a/app/src/main/assets/fr/about_changelog_light.html +++ b/app/src/main/assets/fr/about_changelog.html @@ -22,7 +22,10 @@ - + + + + diff --git a/app/src/main/assets/fr/about_changelog_dark.html b/app/src/main/assets/fr/about_changelog_dark.html deleted file mode 100644 index 32c9f3fe..00000000 --- a/app/src/main/assets/fr/about_changelog_dark.html +++ /dev/null @@ -1,707 +0,0 @@ - - - - - - - - - - -28 Août 2020 - API minimale : 19, API optimale : 29
-18 Août 2020 - API minimale : 19, API optimale : 29
-1 Avril 2020 - API minimale : 19, API optimale : 29
-28 Mars 2020 - API minimale : 19, API optimale : 29
-3 Janvier 2020 - API minimale : 19, API optimale : 29
-20 Juillet 2019 - API minimale : 19, API optimale : 28
-27 Mai 2019 - API minimale : 19, API optimale : 28
-2 Mai 2019 - API minimale : 19, API optimale : 28
-26 Avril 2019 - API minimale : 19, API optimale : 28
-5 Mars 2019 - API minimale : 19, API optimale : 28
-27 Février 2019 - API minimale : 19, API optimale : 28
-31 Janvier 2019 - API minimale : 19, API optimale : 28
-27 Décembre 2018 - API minimale : 19, API optimale : 28
-24 Décembre 2018 - API minimale : 19, API optimale : 28
-8 Décembre 2018 - API minimale : 19, API optimale : 28
-29 Octobre 2018 - API minimale : 19, API optimale : 28
-31 Juillet 2018 - API minimale : 19, API optimale : 27
-10 Juillet 2018 - API minimale : 19, API optimale : 27
-24 Mai 2018 - API minimale : 19, API optimale : 27
-9 Mai 2018 - API minimale : 19, API optimale : 27
-1 Mars 2018 - API minimale : 19, API optimale : 27
-22 Février 2018 - API minimale : 19, API optimale : 27
-22 Novembre 2017 - API minimale : 19, API optimale : 26
-9 Novembre 2017 - API minimale : 19, API optimale : 26
-7 Novembre 2017 - API minimale : 19, API optimale : 26
-18 Septembre 2017 - API minimale : 19, API optimale : 25
-26 Août 2017 - API minimale : 19, API optimale : 25
-23 Juin 2017 - API minimale : 19, API optimale : 25
-26 Mai 2017 - API minimale : 19, API optimale : 25
-27 Avril 2017 - API minimale : 19, API optimale : 25
-25 Mars 2017 - API minimale : 19, API optimale : 25
-21 Mars 2017 - API minimale : 19, API optimale : 25
-16 Mars 2017 - API minimale : 19, API optimale : 25
-11 Février 2017 - API minimale : 19, API optimale : 25
-4 Janvier 2017 - API minimale : 19, API optimale : 25
-26 Décembre 2016 - API minimale : 19, API optimale : 25
-28 Novembre 2016 - API minimale : 19, API optimale : 24
-9 Novembre 2016 - API minimale : 19, API optimale : 24
-22 Octobre 2016 - API minimale : 19, API optimale : 24
-15 Septembre 2016 - API minimale : 19, API optimale : 23
-27 Août 2016 - API minimale : 19, API optimale : 23
-26 Août 2016 - API minimale : 19, API optimale : 23
-16 Juillet 2016 - API minimale : 19, API optimale : 23
-16 Juin 2016 - API minimale : 19, API optimale : 23
-11 Mai 2016 - API minimale : 15, API optimale : 23
-5 Mai 2016 - API minimale : 15, API optimale : 23
-28 Avril 2016 - API minimale : 15, API optimale : 23
-7 Avril 2016 - API minimale : 15, API optimale : 23
-23 Mars 2016 - API minimale : 15, API optimale : 23
-9 Mars 2016 - API minimale : 10, API optimale : 23
-24 Février 2016 - API minimale : 10, API optimale : 23
-Les contributeurs sont invités à soumettre leurs codes et leurs traductions.
- + \ No newline at end of file diff --git a/app/src/main/assets/fr/about_contributors_light.html b/app/src/main/assets/fr/about_contributors_light.html deleted file mode 100644 index 22503bc2..00000000 --- a/app/src/main/assets/fr/about_contributors_light.html +++ /dev/null @@ -1,51 +0,0 @@ - - - - - - - - - - -Privacy Browser est principalement développé par Soren Stoutner.
- -Les contributeurs sont invités à soumettre leurs codes et leurs traductions.
- - diff --git a/app/src/main/assets/fr/about_licenses_dark.html b/app/src/main/assets/fr/about_licenses.html similarity index 89% rename from app/src/main/assets/fr/about_licenses_dark.html rename to app/src/main/assets/fr/about_licenses.html index 1a5e86f1..7549c265 100644 --- a/app/src/main/assets/fr/about_licenses_dark.html +++ b/app/src/main/assets/fr/about_licenses.html @@ -22,7 +22,10 @@ - + + + + @@ -61,38 +64,38 @@ Le fichier modifié est publié sous la licence GPLv3+.
- sont dérivés de security
et de language
,
+
+ sont dérivés de security
et de language
,
qui font partie de l'ensemble d'icônes Matériel Android
et sont publiés sous la Licence Apache 2.0.
Le texte complet de la licence est ci-dessous. Modifications copyright © 2016 Soren Stoutner.
Les images résultantes sont publiées sous la licence GPLv3+.
est dérivé des éléments folder
et exit_to_app
,
+
est dérivé des éléments folder
et exit_to_app
,
qui font partie de l'ensemble d'icônes Matériel Android
et sont publiés sous Licence Apache 2.0.
Modifications copyright © 2017 Soren Stoutner.
L'image résultante est publiée sous la licence GPLv3+.
est dérivé des éléments bookmark
et create_new_folder
, qui font partie de
+
est dérivé des éléments bookmark
et create_new_folder
, qui font partie de
l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0.
Modifications copyright © 2017 Soren Stoutner.
L'image résultante est publiée sous la licence GPLv3+.
est dérivée de l'élément create_new_folder
,
+
est dérivée de l'élément create_new_folder
,
qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0.
Modifications copyright © 2017 Soren Stoutner.
L'image résultante est publiée sous la licence GPLv3+.
est dérivée de l'élément exit_to_app
, qui fait partie de
+
est dérivée de l'élément exit_to_app
, qui fait partie de
l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0.
Modifications copyright © 2017 Soren Stoutner.
L'image résultante est publiée sous la licence GPLv3+.
est dérivée de l'élément compare
,
+
est dérivée de l'élément compare
,
qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0.
Modifications copyright © 2017 Soren Stoutner.
L'image résultante est publiée sous la licence GPLv3+.
est dérivée de l'élément sort
,
+
est dérivée de l'élément sort
,
qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0.
Modifications copyright © 2019 Soren Stoutner.
L'image résultante est publiée sous la licence GPLv3+.
cookie
a été créé par Google.
+
cookie
a été créé par Google.
Il est publié sous la Licence Apache 2.0
et peut être téléchargé à partir des Icônes Material Design.
Il est inchangé sauf pour les informations de mise en page telles que la couleur et la taille.
add.
-arrow_back.
-arrow_forward.
-bookmarks.
-bug_report.
-camera_enhance.
-chrome_reader_mode.
-close.
-delete.
-delete_forever.
-devices_other.
-dns.
-donut_small.
-edit.
-expand_less.
-expand_more.
-file_copy.
-file_download.
-find_in_page.
-folder.
-home.
-image.
-import_contacts.
-import_export.
-important_devices.
-info_outline.
-language.
-link_off.
-list.
-local_activity.
-location_off.
-lock.
-map.
-more.
-new releases.
-open_in_browser.
-payment.
-question_answer.
-refresh.
-save.
-search.
-select_all.
-settings.
-settings_overscan.
-share.
-smartphone.
-sort.
-style.
-subtitles.
-tab.
-text_fields.
-thumbs_up_down.
-vertical_align_bottom.
-vertical_align_top.
-visibility_off.
-vpn_key.
-vpn_lock.
-web.
+add.
+arrow_back.
+arrow_forward.
+bookmarks.
+bug_report.
+camera_enhance.
+chrome_reader_mode.
+close.
+delete.
+delete_forever.
+devices_other.
+dns.
+donut_small.
+edit.
+expand_less.
+expand_more.
+file_copy.
+file_download.
+find_in_page.
+folder.
+home.
+image.
+import_contacts.
+import_export.
+important_devices.
+info_outline.
+language.
+link_off.
+list.
+local_activity.
+location_off.
+lock.
+map.
+more.
+new releases.
+open_in_browser.
+payment.
+question_answer.
+refresh.
+save.
+search.
+select_all.
+settings.
+settings_overscan.
+share.
+smartphone.
+sort.
+style.
+subtitles.
+tab.
+text_fields.
+thumbs_up_down.
+vertical_align_bottom.
+vertical_align_top.
+visibility_off.
+vpn_key.
+vpn_lock.
+web.
Privacy Browser copyright © 2015-2020 Soren Stoutner.
- -rivacy Browser est publié sous la licence GPLv3+. Le texte complet de la licence est ci-dessous. - Le code source est disponible à partir de git.stoutner.com.
- -EasyList et EasyPrivacy - sont licences doubles GPLv3+ - et Creative Commons Attribution-ShareAlike 3.0+ Unported. - Privacy Browser les intègre à l'aide de l'option GPLv3+.
- -Fanboyâs Annoyance List et Fanboyâs Social Blocking List - sont publiés sous la licence Creative Commons Attribution 3.0 Unported license, - qui est compatible avec la GPLv3+. Les listes ne sont pas modifiées dans Privacy Browser.
- -Pour plus d'informations sur les listes de blocage, consultez le site web EasyList.
- -Privacy Browser est construit avec les librairies AndroidX, - les librairies Kotlin, - et le code du référentiel Google Material Maven, - publiés sous la Licence Apache 2.0.
- -La version gratuite de Privacy Browser repose sur les Annonces Firebase, - publié sous la licence du kit de développement logiciel Android.
- -com.stoutner.privacybrowser.views.CheckedLinearLayout
est une version modifiée d'une classe contenue dans le code source de la
- Caméra Android.
- Le fichier d'origine a été publié sous la Licence Apache 2.0.
- Le fichier modifié est publié sous la licence GPLv3+.
- sont dérivés de security
et de language
,
- qui font partie de l'ensemble d'icônes Matériel Android
- et sont publiés sous la Licence Apache 2.0.
- Le texte complet de la licence est ci-dessous. Modifications copyright © 2016 Soren Stoutner.
- Les images résultantes sont publiées sous la licence GPLv3+.
est dérivé des éléments folder
et exit_to_app
,
- qui font partie de l'ensemble d'icônes Matériel Android
- et sont publiés sous Licence Apache 2.0.
- Modifications copyright © 2017 Soren Stoutner.
- L'image résultante est publiée sous la licence GPLv3+.
est dérivé des éléments bookmark
et create_new_folder
, qui font partie de
- l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0.
- Modifications copyright © 2017 Soren Stoutner.
- L'image résultante est publiée sous la licence GPLv3+.
est dérivée de l'élément create_new_folder
,
- qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0.
- Modifications copyright © 2017 Soren Stoutner.
- L'image résultante est publiée sous la licence GPLv3+.
est dérivée de l'élément exit_to_app
, qui fait partie de
- l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0.
- Modifications copyright © 2017 Soren Stoutner.
- L'image résultante est publiée sous la licence GPLv3+.
est dérivée de l'élément compare
,
- qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0.
- Modifications copyright © 2017 Soren Stoutner.
- L'image résultante est publiée sous la licence GPLv3+.
est dérivée de l'élément sort
,
- qui fait partie de l'ensemble d'icônes Matériel Android et sont publiés sous Licence Apache 2.0.
- Modifications copyright © 2019 Soren Stoutner.
- L'image résultante est publiée sous la licence GPLv3+.
cookie
a été créé par Google.
- Il est publié sous la Licence Apache 2.0
- et peut être téléchargé à partir des Icônes Material Design.
- Il est inchangé sauf pour les informations de mise en page telles que la couleur et la taille.
Les icônes suivantes proviennent de l'ensemble d'icônes Matériel Android, - qui est publié sous la Licence Apache 2.0. - Ils sont inchangés sauf pour les informations de mise en page comme la couleur et la taille. Certains d'entre eux ont été renommés pour correspondre à leur utilisation dans le code. - Les icônes et les noms d'origine sont indiqués ci-dessous.
-add.
-arrow_back.
-arrow_forward.
-bookmarks.
-bug_report.
-camera_enhance.
-chrome_reader_mode.
-close.
-delete.
-delete_forever.
-devices_other.
-dns.
-donut_small.
-edit.
-expand_less.
-expand_more.
-file_copy.
-file_download.
-find_in_page.
-folder.
-home.
-image.
-import_contacts.
-import_export.
-important_devices.
-info_outline.
-language.
-link_off.
-list.
-local_activity.
-location_off.
-lock.
-map.
-more.
-new releases.
-open_in_browser.
-payment.
-question_answer.
-refresh.
-save.
-search.
-select_all.
-settings.
-settings_overscan.
-share.
-smartphone.
-sort.
-style.
-subtitles.
-tab.
-text_fields.
-thumbs_up_down.
-vertical_align_bottom.
-vertical_align_top.
-visibility_off.
-vpn_key.
-vpn_lock.
-web.
- -Version 3, 29 June 2007
- -Copyright © 2007 Free Software Foundation, Inc. - <http://fsf.org/>
- -Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed.
- -The GNU General Public License is a free, copyleft license for - software and other kinds of works.
- -The licenses for most software and other practical works are designed - to take away your freedom to share and change the works. By contrast, - the GNU General Public License is intended to guarantee your freedom to - share and change all versions of a programâto make sure it remains free - software for all its users. We, the Free Software Foundation, use the - GNU General Public License for most of our software; it applies also to - any other work released this way by its authors. You can apply it to - your programs, too.
- -When we speak of free software, we are referring to freedom, not - price. Our General Public Licenses are designed to make sure that you - have the freedom to distribute copies of free software (and charge for - them if you wish), that you receive source code or can get it if you - want it, that you can change the software or use pieces of it in new - free programs, and that you know you can do these things.
- -To protect your rights, we need to prevent others from denying you - these rights or asking you to surrender the rights. Therefore, you have - certain responsibilities if you distribute copies of the software, or if - you modify it: responsibilities to respect the freedom of others.
- -For example, if you distribute copies of such a program, whether - gratis or for a fee, you must pass on to the recipients the same - freedoms that you received. You must make sure that they, too, receive - or can get the source code. And you must show them these terms so they - know their rights.
- -Developers that use the GNU GPL protect your rights with two steps: - (1) assert copyright on the software, and (2) offer you this License - giving you legal permission to copy, distribute and/or modify it.
- -For the developersâ and authorsâ protection, the GPL clearly explains - that there is no warranty for this free software. For both usersâ and - authorsâ sake, the GPL requires that modified versions be marked as - changed, so that their problems will not be attributed erroneously to - authors of previous versions.
- -Some devices are designed to deny users access to install or run - modified versions of the software inside them, although the manufacturer - can do so. This is fundamentally incompatible with the aim of - protecting usersâ freedom to change the software. The systematic - pattern of such abuse occurs in the area of products for individuals to - use, which is precisely where it is most unacceptable. Therefore, we - have designed this version of the GPL to prohibit the practice for those - products. If such problems arise substantially in other domains, we - stand ready to extend this provision to those domains in future versions - of the GPL, as needed to protect the freedom of users.
- -Finally, every program is threatened constantly by software patents. - States should not allow patents to restrict development and use of - software on general-purpose computers, but in those that do, we wish to - avoid the special danger that patents applied to a free program could - make it effectively proprietary. To prevent this, the GPL assures that - patents cannot be used to render the program non-free.
- -The precise terms and conditions for copying, distribution and - modification follow.
- -âThis Licenseâ refers to version 3 of the GNU General Public License.
- -âCopyrightâ also means copyright-like laws that apply to other kinds of - works, such as semiconductor masks.
- -âThe Programâ refers to any copyrightable work licensed under this - License. Each licensee is addressed as âyouâ. âLicenseesâ and - ârecipientsâ may be individuals or organizations.
- -To âmodifyâ a work means to copy from or adapt all or part of the work - in a fashion requiring copyright permission, other than the making of an - exact copy. The resulting work is called a âmodified versionâ of the - earlier work or a work âbased onâ the earlier work.
- -A âcovered workâ means either the unmodified Program or a work based - on the Program.
- -To âpropagateâ a work means to do anything with it that, without - permission, would make you directly or secondarily liable for - infringement under applicable copyright law, except executing it on a - computer or modifying a private copy. Propagation includes copying, - distribution (with or without modification), making available to the - public, and in some countries other activities as well.
- -To âconveyâ a work means any kind of propagation that enables other - parties to make or receive copies. Mere interaction with a user through - a computer network, with no transfer of a copy, is not conveying.
- -An interactive user interface displays âAppropriate Legal Noticesâ - to the extent that it includes a convenient and prominently visible - feature that (1) displays an appropriate copyright notice, and (2) - tells the user that there is no warranty for the work (except to the - extent that warranties are provided), that licensees may convey the - work under this License, and how to view a copy of this License. If - the interface presents a list of user commands or options, such as a - menu, a prominent item in the list meets this criterion.
- -The âsource codeâ for a work means the preferred form of the work - for making modifications to it. âObject codeâ means any non-source - form of a work.
- -A âStandard Interfaceâ means an interface that either is an official - standard defined by a recognized standards body, or, in the case of - interfaces specified for a particular programming language, one that - is widely used among developers working in that language.
- -The âSystem Librariesâ of an executable work include anything, other - than the work as a whole, that (a) is included in the normal form of - packaging a Major Component, but which is not part of that Major - Component, and (b) serves only to enable use of the work with that - Major Component, or to implement a Standard Interface for which an - implementation is available to the public in source code form. A - âMajor Componentâ, in this context, means a major essential component - (kernel, window system, and so on) of the specific operating system - (if any) on which the executable work runs, or a compiler used to - produce the work, or an object code interpreter used to run it.
- -The âCorresponding Sourceâ for a work in object code form means all - the source code needed to generate, install, and (for an executable - work) run the object code and to modify the work, including scripts to - control those activities. However, it does not include the workâs - System Libraries, or general-purpose tools or generally available free - programs which are used unmodified in performing those activities but - which are not part of the work. For example, Corresponding Source - includes interface definition files associated with source files for - the work, and the source code for shared libraries and dynamically - linked subprograms that the work is specifically designed to require, - such as by intimate data communication or control flow between those - subprograms and other parts of the work.
- -The Corresponding Source need not include anything that users - can regenerate automatically from other parts of the Corresponding - Source.
- -The Corresponding Source for a work in source code form is that - same work.
- -All rights granted under this License are granted for the term of - copyright on the Program, and are irrevocable provided the stated - conditions are met. This License explicitly affirms your unlimited - permission to run the unmodified Program. The output from running a - covered work is covered by this License only if the output, given its - content, constitutes a covered work. This License acknowledges your - rights of fair use or other equivalent, as provided by copyright law.
- -You may make, run and propagate covered works that you do not - convey, without conditions so long as your license otherwise remains - in force. You may convey covered works to others for the sole purpose - of having them make modifications exclusively for you, or provide you - with facilities for running those works, provided that you comply with - the terms of this License in conveying all material for which you do - not control copyright. Those thus making or running the covered works - for you must do so exclusively on your behalf, under your direction - and control, on terms that prohibit them from making any copies of - your copyrighted material outside their relationship with you.
- -Conveying under any other circumstances is permitted solely under - the conditions stated below. Sublicensing is not allowed; section 10 - makes it unnecessary.
- -No covered work shall be deemed part of an effective technological - measure under any applicable law fulfilling obligations under article - 11 of the WIPO copyright treaty adopted on 20 December 1996, or - similar laws prohibiting or restricting circumvention of such - measures.
- -When you convey a covered work, you waive any legal power to forbid - circumvention of technological measures to the extent such circumvention - is effected by exercising rights under this License with respect to - the covered work, and you disclaim any intention to limit operation or - modification of the work as a means of enforcing, against the workâs - users, your or third partiesâ legal rights to forbid circumvention of - technological measures.
- -You may convey verbatim copies of the Programâs source code as you - receive it, in any medium, provided that you conspicuously and - appropriately publish on each copy an appropriate copyright notice; - keep intact all notices stating that this License and any - non-permissive terms added in accord with section 7 apply to the code; - keep intact all notices of the absence of any warranty; and give all - recipients a copy of this License along with the Program.
- -You may charge any price or no price for each copy that you convey, - and you may offer support or warranty protection for a fee.
- -You may convey a work based on the Program, or the modifications to - produce it from the Program, in the form of source code under the - terms of section 4, provided that you also meet all of these conditions:
- -A compilation of a covered work with other separate and independent - works, which are not by their nature extensions of the covered work, - and which are not combined with it such as to form a larger program, - in or on a volume of a storage or distribution medium, is called an - âaggregateâ if the compilation and its resulting copyright are not - used to limit the access or legal rights of the compilationâs users - beyond what the individual works permit. Inclusion of a covered work - in an aggregate does not cause this License to apply to the other - parts of the aggregate.
- -You may convey a covered work in object code form under the terms - of sections 4 and 5, provided that you also convey the - machine-readable Corresponding Source under the terms of this License, - in one of these ways:
- -A separable portion of the object code, whose source code is excluded - from the Corresponding Source as a System Library, need not be - included in conveying the object code work.
- -A âUser Productâ is either (1) a âconsumer productâ, which means any - tangible personal property which is normally used for personal, family, - or household purposes, or (2) anything designed or sold for incorporation - into a dwelling. In determining whether a product is a consumer product, - doubtful cases shall be resolved in favor of coverage. For a particular - product received by a particular user, ânormally usedâ refers to a - typical or common use of that class of product, regardless of the status - of the particular user or of the way in which the particular user - actually uses, or expects or is expected to use, the product. A product - is a consumer product regardless of whether the product has substantial - commercial, industrial or non-consumer uses, unless such uses represent - the only significant mode of use of the product.
- -âInstallation Informationâ for a User Product means any methods, - procedures, authorization keys, or other information required to install - and execute modified versions of a covered work in that User Product from - a modified version of its Corresponding Source. The information must - suffice to ensure that the continued functioning of the modified object - code is in no case prevented or interfered with solely because - modification has been made.
- -If you convey an object code work under this section in, or with, or - specifically for use in, a User Product, and the conveying occurs as - part of a transaction in which the right of possession and use of the - User Product is transferred to the recipient in perpetuity or for a - fixed term (regardless of how the transaction is characterized), the - Corresponding Source conveyed under this section must be accompanied - by the Installation Information. But this requirement does not apply - if neither you nor any third party retains the ability to install - modified object code on the User Product (for example, the work has - been installed in ROM).
- -The requirement to provide Installation Information does not include a - requirement to continue to provide support service, warranty, or updates - for a work that has been modified or installed by the recipient, or for - the User Product in which it has been modified or installed. Access to a - network may be denied when the modification itself materially and - adversely affects the operation of the network or violates the rules and - protocols for communication across the network.
- -Corresponding Source conveyed, and Installation Information provided, - in accord with this section must be in a format that is publicly - documented (and with an implementation available to the public in - source code form), and must require no special password or key for - unpacking, reading or copying.
- -âAdditional permissionsâ are terms that supplement the terms of this - License by making exceptions from one or more of its conditions. - Additional permissions that are applicable to the entire Program shall - be treated as though they were included in this License, to the extent - that they are valid under applicable law. If additional permissions - apply only to part of the Program, that part may be used separately - under those permissions, but the entire Program remains governed by - this License without regard to the additional permissions.
- -When you convey a copy of a covered work, you may at your option - remove any additional permissions from that copy, or from any part of - it. (Additional permissions may be written to require their own - removal in certain cases when you modify the work.) You may place - additional permissions on material, added by you to a covered work, - for which you have or can give appropriate copyright permission.
- -Notwithstanding any other provision of this License, for material you - add to a covered work, you may (if authorized by the copyright holders of - that material) supplement the terms of this License with terms:
- -All other non-permissive additional terms are considered âfurther - restrictionsâ within the meaning of section 10. If the Program as you - received it, or any part of it, contains a notice stating that it is - governed by this License along with a term that is a further - restriction, you may remove that term. If a license document contains - a further restriction but permits relicensing or conveying under this - License, you may add to a covered work material governed by the terms - of that license document, provided that the further restriction does - not survive such relicensing or conveying.
- -If you add terms to a covered work in accord with this section, you - must place, in the relevant source files, a statement of the - additional terms that apply to those files, or a notice indicating - where to find the applicable terms.
- -Additional terms, permissive or non-permissive, may be stated in the - form of a separately written license, or stated as exceptions; - the above requirements apply either way.
- -You may not propagate or modify a covered work except as expressly - provided under this License. Any attempt otherwise to propagate or - modify it is void, and will automatically terminate your rights under - this License (including any patent licenses granted under the third - paragraph of section 11).
- -However, if you cease all violation of this License, then your - license from a particular copyright holder is reinstated (a) - provisionally, unless and until the copyright holder explicitly and - finally terminates your license, and (b) permanently, if the copyright - holder fails to notify you of the violation by some reasonable means - prior to 60 days after the cessation.
- -Moreover, your license from a particular copyright holder is - reinstated permanently if the copyright holder notifies you of the - violation by some reasonable means, this is the first time you have - received notice of violation of this License (for any work) from that - copyright holder, and you cure the violation prior to 30 days after - your receipt of the notice.
- -Termination of your rights under this section does not terminate the - licenses of parties who have received copies or rights from you under - this License. If your rights have been terminated and not permanently - reinstated, you do not qualify to receive new licenses for the same - material under section 10.
- -You are not required to accept this License in order to receive or - run a copy of the Program. Ancillary propagation of a covered work - occurring solely as a consequence of using peer-to-peer transmission - to receive a copy likewise does not require acceptance. However, - nothing other than this License grants you permission to propagate or - modify any covered work. These actions infringe copyright if you do - not accept this License. Therefore, by modifying or propagating a - covered work, you indicate your acceptance of this License to do so.
- -Each time you convey a covered work, the recipient automatically - receives a license from the original licensors, to run, modify and - propagate that work, subject to this License. You are not responsible - for enforcing compliance by third parties with this License.
- -An âentity transactionâ is a transaction transferring control of an - organization, or substantially all assets of one, or subdividing an - organization, or merging organizations. If propagation of a covered - work results from an entity transaction, each party to that - transaction who receives a copy of the work also receives whatever - licenses to the work the partyâs predecessor in interest had or could - give under the previous paragraph, plus a right to possession of the - Corresponding Source of the work from the predecessor in interest, if - the predecessor has it or can get it with reasonable efforts.
- -You may not impose any further restrictions on the exercise of the - rights granted or affirmed under this License. For example, you may - not impose a license fee, royalty, or other charge for exercise of - rights granted under this License, and you may not initiate litigation - (including a cross-claim or counterclaim in a lawsuit) alleging that - any patent claim is infringed by making, using, selling, offering for - sale, or importing the Program or any portion of it.
- -A âcontributorâ is a copyright holder who authorizes use under this - License of the Program or a work on which the Program is based. The - work thus licensed is called the contributorâs âcontributor versionâ.
- -A contributorâs âessential patent claimsâ are all patent claims - owned or controlled by the contributor, whether already acquired or - hereafter acquired, that would be infringed by some manner, permitted - by this License, of making, using, or selling its contributor version, - but do not include claims that would be infringed only as a - consequence of further modification of the contributor version. For - purposes of this definition, âcontrolâ includes the right to grant - patent sublicenses in a manner consistent with the requirements of - this License.
- -Each contributor grants you a non-exclusive, worldwide, royalty-free - patent license under the contributorâs essential patent claims, to - make, use, sell, offer for sale, import and otherwise run, modify and - propagate the contents of its contributor version.
- -In the following three paragraphs, a âpatent licenseâ is any express - agreement or commitment, however denominated, not to enforce a patent - (such as an express permission to practice a patent or covenant not to - sue for patent infringement). To âgrantâ such a patent license to a - party means to make such an agreement or commitment not to enforce a - patent against the party.
- -If you convey a covered work, knowingly relying on a patent license, - and the Corresponding Source of the work is not available for anyone - to copy, free of charge and under the terms of this License, through a - publicly available network server or other readily accessible means, - then you must either (1) cause the Corresponding Source to be so - available, or (2) arrange to deprive yourself of the benefit of the - patent license for this particular work, or (3) arrange, in a manner - consistent with the requirements of this License, to extend the patent - license to downstream recipients. âKnowingly relyingâ means you have - actual knowledge that, but for the patent license, your conveying the - covered work in a country, or your recipientâs use of the covered work - in a country, would infringe one or more identifiable patents in that - country that you have reason to believe are valid.
- -If, pursuant to or in connection with a single transaction or - arrangement, you convey, or propagate by procuring conveyance of, a - covered work, and grant a patent license to some of the parties - receiving the covered work authorizing them to use, propagate, modify - or convey a specific copy of the covered work, then the patent license - you grant is automatically extended to all recipients of the covered - work and works based on it.
- -A patent license is âdiscriminatoryâ if it does not include within - the scope of its coverage, prohibits the exercise of, or is - conditioned on the non-exercise of one or more of the rights that are - specifically granted under this License. You may not convey a covered - work if you are a party to an arrangement with a third party that is - in the business of distributing software, under which you make payment - to the third party based on the extent of your activity of conveying - the work, and under which the third party grants, to any of the - parties who would receive the covered work from you, a discriminatory - patent license (a) in connection with copies of the covered work - conveyed by you (or copies made from those copies), or (b) primarily - for and in connection with specific products or compilations that - contain the covered work, unless you entered into that arrangement, - or that patent license was granted, prior to 28 March 2007.
- -Nothing in this License shall be construed as excluding or limiting - any implied license or other defenses to infringement that may - otherwise be available to you under applicable patent law.
- -If conditions are imposed on you (whether by court order, agreement or - otherwise) that contradict the conditions of this License, they do not - excuse you from the conditions of this License. If you cannot convey a - covered work so as to satisfy simultaneously your obligations under this - License and any other pertinent obligations, then as a consequence you may - not convey it at all. For example, if you agree to terms that obligate you - to collect a royalty for further conveying from those to whom you convey - the Program, the only way you could satisfy both those terms and this - License would be to refrain entirely from conveying the Program.
- -Notwithstanding any other provision of this License, you have - permission to link or combine any covered work with a work licensed - under version 3 of the GNU Affero General Public License into a single - combined work, and to convey the resulting work. The terms of this - License will continue to apply to the part which is the covered work, - but the special requirements of the GNU Affero General Public License, - section 13, concerning interaction through a network will apply to the - combination as such.
- -The Free Software Foundation may publish revised and/or new versions of - the GNU General Public License from time to time. Such new versions will - be similar in spirit to the present version, but may differ in detail to - address new problems or concerns.
- -Each version is given a distinguishing version number. If the - Program specifies that a certain numbered version of the GNU General - Public License âor any later versionâ applies to it, you have the - option of following the terms and conditions either of that numbered - version or of any later version published by the Free Software - Foundation. If the Program does not specify a version number of the - GNU General Public License, you may choose any version ever published - by the Free Software Foundation.
- -If the Program specifies that a proxy can decide which future - versions of the GNU General Public License can be used, that proxyâs - public statement of acceptance of a version permanently authorizes you - to choose that version for the Program.
- -Later license versions may give you additional or different - permissions. However, no additional obligations are imposed on any - author or copyright holder as a result of your choosing to follow a - later version.
- -THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY - APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT - HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM âAS ISâ WITHOUT WARRANTY - OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, - THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR - PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM - IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF - ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
- -IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING - WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS - THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY - GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE - USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF - DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD - PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), - EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF - SUCH DAMAGES.
- -If the disclaimer of warranty and limitation of liability provided - above cannot be given local legal effect according to their terms, - reviewing courts shall apply local law that most closely approximates - an absolute waiver of all civil liability in connection with the - Program, unless a warranty or assumption of liability accompanies a - copy of the Program in return for a fee.
- -END OF TERMS AND CONDITIONS
- -If you develop a new program, and you want it to be of the greatest - possible use to the public, the best way to achieve this is to make it - free software which everyone can redistribute and change under these terms.
- -To do so, attach the following notices to the program. It is safest - to attach them to the start of each source file to most effectively - state the exclusion of warranty; and each file should have at least - the âcopyrightâ line and a pointer to where the full notice is found.
- -<one line to give the programâs name -and a brief idea of what it does.> -Copyright (C) <year> <name of author> - -This program is free software: you can -redistribute it and/or modify -it under the terms of the GNU General -Public License as published by the Free -Software Foundation, either version 3 -of the License, or(at your option) -any later version. - -This program is distributed in the hope -that it will be useful, but WITHOUT ANY -WARRANTY; without even the implied -warranty of MERCHANTABILITY or FITNESS -FOR A PARTICULAR PURPOSE. See the GNU -General Public License for more details. - -You should have received a copy of the -GNU General Public License along with -this program. If not, see -<http://www.gnu.org/licenses/>.- -
Also add information on how to contact you by electronic and paper mail.
- -If the program does terminal interaction, make it output a short - notice like this when it starts in an interactive mode:
- -<program> Copyright (C) <year> -<name of author> -This program comes with ABSOLUTELY NO -WARRANTY; for details type `show w'. -This is free software, and you are -welcome to redistribute it under -certain conditions; type `show c' -for details.- -
The hypothetical commands `show w' and `show c' should show the appropriate - parts of the General Public License. Of course, your programâs commands - might be different; for a GUI interface, you would use an âabout boxâ.
- -You should also get your employer (if you work as a programmer) or school, - if any, to sign a âcopyright disclaimerâ for the program, if necessary. - For more information on this, and how to apply and follow the GNU GPL, see - <http://www.gnu.org/licenses/>.
- -The GNU General Public License does not permit incorporating your program - into proprietary programs. If your program is a subroutine library, you - may consider it more useful to permit linking proprietary applications with - the library. If this is what you want to do, use the GNU Lesser General - Public License instead of this License. But first, please read - <http://www.gnu.org/philosophy/why-not-lgpl.html>.
- -Version 2.0, January 2004
-http://www.apache.org/licenses/
- -âLicenseâ shall mean the terms and conditions for use, reproduction, and - distribution as defined by Sections 1 through 9 of this document.
- -âLicensorâ shall mean the copyright owner or entity authorized by the - copyright owner that is granting the License.
- -âLegal Entityâ shall mean the union of the acting entity and all other - entities that control, are controlled by, or are under common control with - that entity. For the purposes of this definition, âcontrolâ means (i) the - power, direct or indirect, to cause the direction or management of such - entity, whether by contract or otherwise, or (ii) ownership of fifty - percent (50%) or more of the outstanding shares, or (iii) beneficial - ownership of such entity.
- -âYouâ (or âYourâ) shall mean an individual or Legal Entity exercising - permissions granted by this License.
- -âSourceâ form shall mean the preferred form for making modifications, - including but not limited to software source code, documentation source, - and configuration files.
- -âObjectâ form shall mean any form resulting from mechanical transformation - or translation of a Source form, including but not limited to compiled - object code, generated documentation, and conversions to other media types.
- -âWorkâ shall mean the work of authorship, whether in Source or Object form, - made available under the License, as indicated by a copyright notice that - is included in or attached to the work (an example is provided in the - Appendix below).
- -âDerivative Worksâ shall mean any work, whether in Source or Object form, - that is based on (or derived from) the Work and for which the editorial - revisions, annotations, elaborations, or other modifications represent, as - a whole, an original work of authorship. For the purposes of this License, - Derivative Works shall not include works that remain separable from, or - merely link (or bind by name) to the interfaces of, the Work and Derivative - Works thereof.
- -âContributionâ shall mean any work of authorship, including the original - version of the Work and any modifications or additions to that Work or - Derivative Works thereof, that is intentionally submitted to Licensor for - inclusion in the Work by the copyright owner or by an individual or Legal - Entity authorized to submit on behalf of the copyright owner. For the - purposes of this definition, âsubmittedâ means any form of electronic, - verbal, or written communication sent to the Licensor or its - representatives, including but not limited to communication on electronic - mailing lists, source code control systems, and issue tracking systems that - are managed by, or on behalf of, the Licensor for the purpose of discussing - and improving the Work, but excluding communication that is conspicuously - marked or otherwise designated in writing by the copyright owner as âNot a - Contribution.â
- -âContributorâ shall mean Licensor and any individual or Legal Entity on - behalf of whom a Contribution has been received by Licensor and - subsequently incorporated within the Work.
- -Subject to the terms and conditions of this License, each Contributor hereby - grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, - irrevocable copyright license to reproduce, prepare Derivative Works of, publicly - display, publicly perform, sublicense, and distribute the Work and such - Derivative Works in Source or Object form.
- -Subject to the terms and conditions of this License, each Contributor hereby grants - to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable - (except as stated in this section) patent license to make, have made, use, - offer to sell, sell, import, and otherwise transfer the Work, where such - license applies only to those patent claims licensable by such Contributor - that are necessarily infringed by their Contribution(s) alone or by - combination of their Contribution(s) with the Work to which such - Contribution(s) was submitted. If You institute patent litigation against - any entity (including a cross-claim or counterclaim in a lawsuit) alleging - that the Work or a Contribution incorporated within the Work constitutes - direct or contributory patent infringement, then any patent licenses - granted to You under this License for that Work shall terminate as of the - date such litigation is filed.
- -You may reproduce and distribute copies of the Work or Derivative Works thereof - in any medium, with or without modifications, and in Source or Object form, provided - that You meet the following conditions:
- -Unless You explicitly state otherwise, any Contribution intentionally submitted for - inclusion in the Work by You to the Licensor shall be under the terms and - conditions of this License, without any additional terms or conditions. - Notwithstanding the above, nothing herein shall supersede or modify the - terms of any separate license agreement you may have executed with Licensor - regarding such Contributions.
- -This License does not grant permission to use the trade names, trademarks, service marks, - or product names of the Licensor, except as required for reasonable and customary use - in describing the origin of the Work and reproducing the content of the - NOTICE file.
- -Unless required by applicable law or agreed to in writing, Licensor provides the Work - (and each Contributor provides its Contributions) on an âAS ISâ BASIS, WITHOUT - WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, - without limitation, any warranties or conditions of TITLE, - NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You - are solely responsible for determining the appropriateness of using or - redistributing the Work and assume any risks associated with Your exercise - of permissions under this License.
- -In no event and under no legal theory, whether in tort (including negligence), contract, - or otherwise, unless required by applicable law (such as deliberate and - grossly negligent acts) or agreed to in writing, shall any Contributor be - liable to You for damages, including any direct, indirect, special, - incidental, or consequential damages of any character arising as a result - of this License or out of the use or inability to use the Work (including - but not limited to damages for loss of goodwill, work stoppage, computer - failure or malfunction, or any and all other commercial damages or losses), - even if such Contributor has been advised of the possibility of such - damages.
- -While redistributing the Work or Derivative Works thereof, You may choose - to offer, and charge a fee for, acceptance of support, warranty, indemnity, - or other liability obligations and/or rights consistent with this License. - However, in accepting such obligations, You may act only on Your own behalf - and on Your sole responsibility, not on behalf of any other Contributor, - and only if You agree to indemnify, defend, and hold each Contributor - harmless for any liability incurred by, or claims asserted against, such - Contributor by reason of your accepting any such warranty or additional - liability.
- -END OF TERMS AND CONDITIONS
- -To apply the Apache License to your work, attach the following boilerplate - notice, with the fields enclosed by brackets â[]â replaced with your own - identifying information. (Donât include the brackets!) The text should be - enclosed in the appropriate comment syntax for the file format. We also - recommend that a file or class name and description of purpose be included - on the same âprinted pageâ as the copyright notice for easier - identification within third-party archives.
-Copyright [yyyy] [name of copyright owner] - -Licensed under the Apache License, -Version 2.0 (the âLicenseâ); -you may not use this file except -in compliance with the License. -You may obtain a copy of the License at - -http://www.apache.org/licenses/LICENSE-2.0 - -Unless required by applicable law -or agreed to in writing, software -distributed under the License is -distributed on an âAS ISâ BASIS, -WITHOUT WARRANTIES OR CONDITIONS -OF ANY KIND, either express or implied. -See the License for the specific -language governing permissions and -limitations under the License.\ No newline at end of file diff --git a/app/src/main/assets/fr/about_links_light.html b/app/src/main/assets/fr/about_links.html similarity index 70% rename from app/src/main/assets/fr/about_links_light.html rename to app/src/main/assets/fr/about_links.html index 889edd15..36badec8 100644 --- a/app/src/main/assets/fr/about_links_light.html +++ b/app/src/main/assets/fr/about_links.html @@ -1,5 +1,5 @@ +
Suivi de bogues et demandes de fonctionnalités
- - - + \ No newline at end of file diff --git a/app/src/main/assets/fr/about_links_dark.html b/app/src/main/assets/fr/about_links_dark.html deleted file mode 100644 index 1726ea10..00000000 --- a/app/src/main/assets/fr/about_links_dark.html +++ /dev/null @@ -1,46 +0,0 @@ - - - - - - - - - - -- Roadmap
- -- Suivi de bogues et demandes de fonctionnalités
- -- Forum
- -- GitWeb
- - diff --git a/app/src/main/assets/fr/about_permissions_dark.html b/app/src/main/assets/fr/about_permissions.html similarity index 90% rename from app/src/main/assets/fr/about_permissions_dark.html rename to app/src/main/assets/fr/about_permissions.html index 8a6959c9..2d69ec2f 100644 --- a/app/src/main/assets/fr/about_permissions_dark.html +++ b/app/src/main/assets/fr/about_permissions.html @@ -1,5 +1,5 @@ + diff --git a/app/src/main/assets/fr/about_permissions_light.html b/app/src/main/assets/fr/about_permissions_light.html deleted file mode 100644 index 8e8959c5..00000000 --- a/app/src/main/assets/fr/about_permissions_light.html +++ /dev/null @@ -1,48 +0,0 @@ - - - - - - - - - - -Requis pour que WebView puisse accéder à Internet. Sans cette autorisation, Privacy Browser serait «No Browser: protégez votre vie privée en restant complètement hors d'Internet».
- -com.android.launcher.permission.INSTALL_SHORTCUT
-Requis pour ajouter des raccourcis pour les sites Web au bureau du programme de lancement.
- -android.permission.READ_EXTERNAL_STORAGE
-Requis pour importer les paramètres des dossiers publics. Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, - Privacy Browser peut importer les paramètres à partir des dossiers de l'application.
- -android.permission.WRITE_EXTERNAL_STORAGE
-Requis pour exporter les paramètres et télécharger les fichiers dans les dossiers publics. - Sous Android Marshmallow (API 23) et plus récente, si cette autorisation est refusée, - Privacy Browser peut exporter les paramètres et stocker les téléchargements dans les dossiers de l'application.
- - diff --git a/app/src/main/assets/fr/about_privacy_policy_light.html b/app/src/main/assets/fr/about_privacy_policy.html similarity index 92% rename from app/src/main/assets/fr/about_privacy_policy_light.html rename to app/src/main/assets/fr/about_privacy_policy.html index 817af742..709adc0b 100644 --- a/app/src/main/assets/fr/about_privacy_policy_light.html +++ b/app/src/main/assets/fr/about_privacy_policy.html @@ -1,5 +1,5 @@ + @@ -87,6 +90,6 @@ Stoutner ne vendra jamais ces informations ni ne les transférera à des tiers qui les utiliseraient à des fins publicitaires ou marketing.Revision 1.6, 22 Mai 2018
+Revision 1.7, 14 Mai 2019
\ No newline at end of file diff --git a/app/src/main/assets/fr/about_privacy_policy_dark.html b/app/src/main/assets/fr/about_privacy_policy_dark.html deleted file mode 100644 index 11365b6c..00000000 --- a/app/src/main/assets/fr/about_privacy_policy_dark.html +++ /dev/null @@ -1,92 +0,0 @@ - - - - - - - - - - -Privacy Browser ne collecte aucune information sur l'utilisateur.
- - -Google Play a sa propre règle de confidentialité . - Google fournit aux développeurs des informations d'installation récapitulatives et anonymisées, notamment le nombre d'installations organisées selon les catégories suivantes.
-Google Play a sa propre règle de confidentialité . - Google fournit aux développeurs des résumés anonymisés des informations suivantes relatives aux évaluations des utilisateurs.
-Google Play a sa propre règle de confidentialité. - Outre le nom du réviseur, l'évaluation et le texte de la révision (tous disponibles publiquement), Google fournit au développeur tout ou partie des informations suivantes.
-Les utilisateurs peuvent choisir d'envoyer des communications directes à Stoutner, telles que des courriels et des commentaires sur stoutner.com.
- - -Stoutner peut utiliser ces informations pour contribuer au développement de Privacy Browser et communiquer le statut du projet aux utilisateurs. - Stoutner ne vendra jamais ces informations ni ne les transférera à des tiers qui les utiliseraient à des fins publicitaires ou marketing.
- -Revision 1.6, 22 Mai 2018
- - \ No newline at end of file diff --git a/app/src/main/assets/fr/guide_domain_settings_light.html b/app/src/main/assets/fr/guide_domain_settings.html similarity index 66% rename from app/src/main/assets/fr/guide_domain_settings_light.html rename to app/src/main/assets/fr/guide_domain_settings.html index d0541dc0..8aab1b51 100644 --- a/app/src/main/assets/fr/guide_domain_settings_light.html +++ b/app/src/main/assets/fr/guide_domain_settings.html @@ -1,5 +1,5 @@ + -Par défaut, Privacy Browser permet de naviguer avec JavaScript, les cookies et le stockage DOM désactivé. Cependant, certains sites Web ont légitimement besoin que ces fonctionnalités soient activées pour fonctionner correctement. Les paramètres de domaine peuvent activer automatiquement un ensemble de fonctionnalités spécifié lors de la visite d'un domaine désigné.
- + -Lors de la visite d'un domaine pour lequel des paramètres de domaine sont spécifiés, l'arrière-plan de la zone de texte de l'URL est vert.
+Lors de la visite d'un domaine pour lequel des paramètres de domaine sont spécifiés, l'arrière-plan de la zone de texte de l'URL est vert.
- +