From c49dd15bc42adc67c64c10f5147577525ebc6b31 Mon Sep 17 00:00:00 2001 From: Soren Stoutner Date: Mon, 12 Nov 2018 13:38:14 -0700 Subject: [PATCH] Second half of update to the Guide. --- .../main/assets/de/about_licenses_dark.html | 1 + .../main/assets/de/about_licenses_light.html | 1 + .../main/assets/de/guide_bookmarks_dark.html | 7 +- .../main/assets/de/guide_bookmarks_light.html | 5 +- .../assets/de/guide_local_storage_dark.html | 2 +- .../assets/de/guide_local_storage_light.html | 2 +- app/src/main/assets/de/guide_tor_dark.html | 110 +++++++++--------- app/src/main/assets/de/guide_tor_light.html | 110 +++++++++--------- .../main/assets/de/guide_user_agent_dark.html | 4 +- .../assets/de/guide_user_agent_light.html | 4 +- .../main/assets/en/about_licenses_dark.html | 1 + .../main/assets/en/about_licenses_light.html | 1 + .../main/assets/en/guide_bookmarks_dark.html | 7 +- .../main/assets/en/guide_bookmarks_light.html | 5 +- .../assets/en/guide_local_storage_dark.html | 2 +- .../assets/en/guide_local_storage_light.html | 2 +- app/src/main/assets/en/guide_tor_dark.html | 94 +++++++-------- app/src/main/assets/en/guide_tor_light.html | 94 +++++++-------- .../main/assets/en/guide_user_agent_dark.html | 4 +- .../assets/en/guide_user_agent_light.html | 4 +- .../main/assets/es/about_licenses_dark.html | 1 + .../main/assets/es/about_licenses_light.html | 1 + .../main/assets/es/guide_bookmarks_dark.html | 9 +- .../main/assets/es/guide_bookmarks_light.html | 7 +- .../main/assets/es/guide_javascript_dark.html | 6 +- .../assets/es/guide_javascript_light.html | 6 +- .../assets/es/guide_local_storage_dark.html | 41 +++---- .../assets/es/guide_local_storage_light.html | 42 +++---- app/src/main/assets/es/guide_tor_dark.html | 36 +++--- app/src/main/assets/es/guide_tor_light.html | 36 +++--- .../main/assets/es/guide_user_agent_dark.html | 4 +- .../assets/es/guide_user_agent_light.html | 4 +- .../main/assets/it/about_licenses_dark.html | 1 + .../main/assets/it/about_licenses_light.html | 1 + .../main/assets/it/guide_bookmarks_dark.html | 11 +- .../main/assets/it/guide_bookmarks_light.html | 9 +- .../assets/it/guide_local_storage_dark.html | 2 +- .../assets/it/guide_local_storage_light.html | 2 +- app/src/main/assets/it/guide_tor_dark.html | 65 +++++------ app/src/main/assets/it/guide_tor_light.html | 65 +++++------ .../main/assets/it/guide_user_agent_dark.html | 4 +- .../assets/it/guide_user_agent_light.html | 4 +- .../main/assets/ru/about_licenses_dark.html | 1 + .../main/assets/ru/about_licenses_light.html | 1 + .../main/assets/ru/guide_bookmarks_dark.html | 9 +- .../main/assets/ru/guide_bookmarks_light.html | 9 +- .../assets/ru/guide_local_storage_dark.html | 2 +- .../assets/ru/guide_local_storage_light.html | 2 +- app/src/main/assets/ru/guide_tor_dark.html | 8 +- app/src/main/assets/ru/guide_tor_light.html | 8 +- .../main/assets/ru/guide_user_agent_dark.html | 4 +- .../assets/ru/guide_user_agent_light.html | 4 +- .../bookmarks_blue_guide_dark.png | Bin 0 -> 1534 bytes .../shared_images/language_blue_dark.png | Bin 0 -> 5198 bytes .../shared_images/language_blue_light.png | Bin 0 -> 5136 bytes .../shared_images/vpn_key_blue_dark.png | Bin 0 -> 2170 bytes .../shared_images/vpn_key_blue_light.png | Bin 0 -> 2154 bytes .../assets/shared_images/vpn_key_dark.png | Bin 0 -> 1722 bytes .../assets/shared_images/vpn_key_light.png | Bin 0 -> 1453 bytes 59 files changed, 423 insertions(+), 442 deletions(-) create mode 100644 app/src/main/assets/shared_images/bookmarks_blue_guide_dark.png create mode 100644 app/src/main/assets/shared_images/language_blue_dark.png create mode 100644 app/src/main/assets/shared_images/language_blue_light.png create mode 100644 app/src/main/assets/shared_images/vpn_key_blue_dark.png create mode 100644 app/src/main/assets/shared_images/vpn_key_blue_light.png create mode 100644 app/src/main/assets/shared_images/vpn_key_dark.png create mode 100644 app/src/main/assets/shared_images/vpn_key_light.png diff --git a/app/src/main/assets/de/about_licenses_dark.html b/app/src/main/assets/de/about_licenses_dark.html index a2c3052a..0ba5306a 100644 --- a/app/src/main/assets/de/about_licenses_dark.html +++ b/app/src/main/assets/de/about_licenses_dark.html @@ -132,6 +132,7 @@

vertical_align_bottom.

vertical_align_top.

visibility_off.

+

vpn_key.

vpn_lock.

web.

diff --git a/app/src/main/assets/de/about_licenses_light.html b/app/src/main/assets/de/about_licenses_light.html index 5e7008d2..15bf1925 100644 --- a/app/src/main/assets/de/about_licenses_light.html +++ b/app/src/main/assets/de/about_licenses_light.html @@ -132,6 +132,7 @@

vertical_align_bottom.

vertical_align_top.

visibility_off.

+

vpn_key.

vpn_lock.

web.

diff --git a/app/src/main/assets/de/guide_bookmarks_dark.html b/app/src/main/assets/de/guide_bookmarks_dark.html index f2d90f4e..facadf18 100644 --- a/app/src/main/assets/de/guide_bookmarks_dark.html +++ b/app/src/main/assets/de/guide_bookmarks_dark.html @@ -24,15 +24,14 @@ -

Lesezeichen

+

Lesezeichen

Bookmarks can be accessed in a drawer layout by swiping from the right of the screen.

Tapping the top floating action button loads the bookmarks activity, which has advanced options like moving and deleting bookmarks. - From the bookmarks activity, there is an option to load the bookmarks database view. This shows the bookmarks as they exist in the SQLite database. - This will mostly be useful for troubleshooting problems with importing - and exporting bookmarks once those features are added.

+ From the bookmarks activity, there is an option to load the bookmarks database view. + This shows the bookmarks as they exist in the SQLite database, which can be useful for troubleshooting problems with importing and exporting bookmarks.

\ No newline at end of file diff --git a/app/src/main/assets/de/guide_bookmarks_light.html b/app/src/main/assets/de/guide_bookmarks_light.html index a9cd329d..2add8062 100644 --- a/app/src/main/assets/de/guide_bookmarks_light.html +++ b/app/src/main/assets/de/guide_bookmarks_light.html @@ -31,8 +31,7 @@

Tapping the top floating action button loads the bookmarks activity, which has advanced options like moving and deleting bookmarks. - From the bookmarks activity, there is an option to load the bookmarks database view. This shows the bookmarks as they exist in the SQLite database. - This will mostly be useful for troubleshooting problems with importing - and exporting bookmarks once those features are added.

+ From the bookmarks activity, there is an option to load the bookmarks database view. + This shows the bookmarks as they exist in the SQLite database, which can be useful for troubleshooting problems with importing and exporting bookmarks.

\ No newline at end of file diff --git a/app/src/main/assets/de/guide_local_storage_dark.html b/app/src/main/assets/de/guide_local_storage_dark.html index 155aba05..01607172 100644 --- a/app/src/main/assets/de/guide_local_storage_dark.html +++ b/app/src/main/assets/de/guide_local_storage_dark.html @@ -86,7 +86,7 @@

Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. - Beginning in Android Oreo (8.0), WebView’s form data was replaced by the the Autofill service. + Beginning in Android Oreo (8.0), WebView’s form data was replaced by the Autofill service. As such, controls for form data no longer appear on newer Android devices.

\ No newline at end of file diff --git a/app/src/main/assets/de/guide_local_storage_light.html b/app/src/main/assets/de/guide_local_storage_light.html index e22ec3af..1cb74c4d 100644 --- a/app/src/main/assets/de/guide_local_storage_light.html +++ b/app/src/main/assets/de/guide_local_storage_light.html @@ -85,7 +85,7 @@

Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. - Beginning in Android Oreo (8.0), WebView’s form data was replaced by the the Autofill service. + Beginning in Android Oreo (8.0), WebView’s form data was replaced by the Autofill service. As such, controls for form data no longer appear on newer Android devices.

\ No newline at end of file diff --git a/app/src/main/assets/de/guide_tor_dark.html b/app/src/main/assets/de/guide_tor_dark.html index 226f3a2e..515e1885 100644 --- a/app/src/main/assets/de/guide_tor_dark.html +++ b/app/src/main/assets/de/guide_tor_dark.html @@ -26,62 +26,58 @@ -

Tor und seine Grenzen

- -

Faktoren, die in die Privatsphäre im Web eindringen wollen lassen sich hauptsächlich in zwei verschiedene Kategorien unterteilen: Neugierige Behörden - mit Zugriff auf Internetprovider und Megafirmen, die Soziale und Werbenetzwerke betreiben. - TOR (The Onion Router) ist nützlich, wenn es auf den Schutz der Privatsphäre vor neugierigen Behörden ankommt, aber nicht bei den Megafirmen.

- - -

Neugierige Behörden

- -

Oft spähen neugierige Behörden die Bürger aus, um Fehlverhalten und Menschenrechtsaktivitäten zu bestrafen. Üblicherweise betreiben sie entweder die Internetprovider selber - oder sie können die Provider dazu zwingen, Informationen über jede besuchte IP-Adresse und die zugehörigen Benutzer herauszugeben. - TOR wurde entwickelt, um diese Eingriffe in die Privatsphäre zu bekämpfen, indem es die Daten verschlüsselt, - die ein Nutzer sendet und sie durch viele verschiedene Server schleust, bevor sie die Zieladresse erreichen. - Das bedeutet, dass kein individueller Internetprovider, Server oder Website sowohl die IP-Adresse des Nutzers - als auch die IP-Adresse des letztendlich besuchten Webservers erfährt. Neugierige Behörden und die von ihnen kontrollierten Internetprovider können nur vermuten, welche - Webserver ein Benutzer besucht, da sie letztendlich nur sehen, dass er TOR benutzt. In einigen Teilen - der Welt könnte das Benutzen von TOR als illegale Aktivität ausgelegt werden ("wenn Du nichts zu verstecken hättest, - würdest Du nicht Deinen Traffic vor uns verstecken") und Benutzer könnten bestraft werden, da die Regierung vermutet, - sie würden etwas Untersagtes tun. Also kann TOR hilfreich sein, ist jedoch kein Allheilmittel.

- - -

Megafirmen

- -

Wenn ein Benutzer sich mit einem Webserver verbindet, kann der Webserver seine IP-Adresse sehen. Obwohl es keine ausgereifte Methode ist, - können IP-Adressen in physische Adressen umgewandelt werden - mit erstaunlicher Genauigkeit. - Kleine Webserver nutzen normalerweise die IP-Adresse, um festzulegen, woher der Benutzer die Seite besucht. - TOR ist eine gute Lösung, wenn man seinen Standort vor diesen Servern verstecken möchte. Große Megafirmen, die Soziale Netzwerke und Werbenetzwerke betreiben - nutzen jedoch richtige Profile an Informationen, um Benutzer über ihre Geräte und IP-Adressen hinaus zu tracken. - Diese Profile nutzen verschiedene Möglichkeiten an Techniken um Benutzer ausfindig zu machen, inklusive JavaScript, Cookies, - Tracking-IDs und ein "Browser-Fingerabdruck" (fingerprinting). Weil die große Mehrheit - der Websites im Internet eine Werbung entweder von den großen Werbenetzwerken oder von eingebetteten Social-Media-Buttons mit ihrem zugewiesenen JavaScript - lädt, haben diese großen Megafirmen Profile von so gut wie jedem Internetnutzer angefertigt und verfolgen ihre - Aktivitäten über zueinander unabhängige Seiten.

- -

Sie verfolgen jede besuchte Seite, alles online Gekaufte, jede für Einkäufe genutzte Kreditkarte, - jede Adresse, an die Waren verschickt werden und die GPS-Metadaten von jedem ins Internet hochgeladene Foto. - Sie fertigen Profile an von Alter, Geschlecht, Beziehungsstatus, Adresse, politischen Ansichten, - religiösen Ansichten, familiären Zuständen, Anzahl der Haustiere und allem anderen was sie über einen Nutzer herausfinden können. - Sie kaufen sogar ganze Datenbanken mit Informationen über Kreditkartennutzungen in Geschäften auf, damit sie Offline-Einkaufsverhalten von Nutzern in ihren Profilen nachverfolgen können. - Weil sie bereits weitaus genauere Adressinformationen über einen Nutzer haben als eine IP-Adresse aussagt, - bietet TOR keinen echten Schutz der Privatsphäre gegen Megafirmen.

- -

Der einzige und beste Schutz der Privatsphäre gegen Megafirmen ist es, mit deaktivieren JavaScript durchs Web zu surfen, gefolgt - von geblockten Werbenetzwerken, deaktivieren Cookies und DOM-Speicher und das Benutzen eines Browsers, der schwierig zu "fingerprinten" ist.

- - -

Benutzen von TOR

- -

Neben den Einschränkungen kann TOR in bestimmten Situationen hilfreich sein. Das TOR Project hat eine App für Android namens Orbot, - die auf F-Droid verfügbar ist - und überall sonst wo Privacy Browser angeboten wird. Privacy Browser hat eine Option um Orbot als - Proxy zu benutzen. Wenn diese aktiviert wird, hat Privacy Browser einen hellblauen Hintergrund bei der Adresszeile statt - dem standardmäßigen Hellgrau. Wenn Privacy Browsers Orbot-Proxy-Einstellung aktiviert ist, wird das Internet ausschließlich - funktionieren, solange Orbot ausgeführt und mit dem TOR-Netzwerk verbunden wird. Weil die Daten durch verschiedene Anlaufstellen geleitet werden - ist das Nutzen von TOR oft weitaus langsamer als das direkte Verbinden mit dem Internet.

- - +

Tor und seine Grenzen

+ +

Faktoren, die in die Privatsphäre im Web eindringen wollen lassen sich hauptsächlich in zwei verschiedene Kategorien unterteilen: + Neugierige Behörden mit Zugriff auf Internetprovider und Megafirmen, die Soziale und Werbenetzwerke betreiben. + TOR (The Onion Router) ist nützlich, wenn es auf den Schutz der Privatsphäre vor neugierigen Behörden ankommt, aber nicht bei den Megafirmen.

+ + +

Neugierige Behörden

+ +

Oft spähen neugierige Behörden die Bürger aus, um Fehlverhalten und Menschenrechtsaktivitäten zu bestrafen. + Üblicherweise betreiben sie entweder die Internetprovider selber oder sie können die Provider dazu zwingen, Informationen über jede besuchte IP-Adresse und die zugehörigen Benutzer herauszugeben. + TOR wurde entwickelt, um diese Eingriffe in die Privatsphäre zu bekämpfen, indem es die Daten verschlüsselt, die ein Nutzer sendet und sie durch viele verschiedene Server schleust, + bevor sie die Zieladresse erreichen. + Das bedeutet, dass kein individueller Internetprovider, Server oder Website sowohl die IP-Adresse des Nutzers + als auch die IP-Adresse des letztendlich besuchten Webservers erfährt. + Neugierige Behörden und die von ihnen kontrollierten Internetprovider können nur vermuten, welche Webserver ein Benutzer besucht, da sie letztendlich nur sehen, dass er TOR benutzt. + In einigen Teilen der Welt könnte das Benutzen von TOR als illegale Aktivität ausgelegt werden ("wenn Du nichts zu verstecken hättest, + würdest Du nicht Deinen Traffic vor uns verstecken") und Benutzer könnten bestraft werden, da die Regierung vermutet, sie würden etwas Untersagtes tun. + Also kann TOR hilfreich sein, ist jedoch kein Allheilmittel.

+ + +

Megafirmen

+ +

Wenn ein Benutzer sich mit einem Webserver verbindet, kann der Webserver seine IP-Adresse sehen. + Obwohl es keine ausgereifte Methode ist, können IP-Adressen in physische Adressen umgewandelt werden - mit erstaunlicher Genauigkeit. + Kleine Webserver nutzen normalerweise die IP-Adresse, um festzulegen, woher der Benutzer die Seite besucht. TOR ist eine gute Lösung, wenn man seinen Standort vor diesen Servern verstecken möchte. + Große Megafirmen, die Soziale Netzwerke und Werbenetzwerke betreiben nutzen jedoch richtige Profile an Informationen, um Benutzer über ihre Geräte und IP-Adressen hinaus zu tracken. + Diese Profile nutzen verschiedene Möglichkeiten an Techniken um Benutzer ausfindig zu machen, inklusive JavaScript, Cookies, Tracking-IDs und ein + "Browser-Fingerabdruck" (fingerprinting). + Weil die große Mehrheit der Websites im Internet eine Werbung entweder von den großen Werbenetzwerken oder von eingebetteten Social-Media-Buttons mit ihrem zugewiesenen JavaScript lädt, + haben diese großen Megafirmen Profile von so gut wie jedem Internetnutzer angefertigt und verfolgen ihre Aktivitäten über zueinander unabhängige Seiten.

+ +

Sie verfolgen jede besuchte Seite, alles online Gekaufte, jede für Einkäufe genutzte Kreditkarte, jede Adresse, + an die Waren verschickt werden und die GPS-Metadaten von jedem ins Internet hochgeladene Foto. + Sie fertigen Profile an von Alter, Geschlecht, Beziehungsstatus, Adresse, politischen Ansichten, religiösen Ansichten, familiären Zuständen, + Anzahl der Haustiere und allem anderen was sie über einen Nutzer herausfinden können. + Sie kaufen sogar ganze Datenbanken mit Informationen über Kreditkartennutzungen in Geschäften auf, damit sie Offline-Einkaufsverhalten von Nutzern in ihren Profilen nachverfolgen können. + Weil sie bereits weitaus genauere Adressinformationen über einen Nutzer haben als eine IP-Adresse aussagt, bietet TOR keinen echten Schutz der Privatsphäre gegen Megafirmen.

+ +

Der einzige und beste Schutz der Privatsphäre gegen Megafirmen ist es, mit deaktivieren JavaScript durchs Web zu surfen, gefolgt von geblockten Werbenetzwerken, + deaktivieren Cookies und DOM-Speicher und das Benutzen eines Browsers, der schwierig zu "fingerprinten" ist.

+ + +

Benutzen von TOR

+ +

Neben den Einschränkungen kann TOR in bestimmten Situationen hilfreich sein. + Das TOR Project hat eine App für Android namens Orbot, die auf F-Droid + verfügbar ist und überall sonst wo Privacy Browser angeboten wird. Privacy Browser hat eine Option um Orbot als Proxy zu benutzen. + Wenn diese aktiviert wird, hat Privacy Browser einen hellblauen Hintergrund bei der Adresszeile statt dem standardmäßigen Hellgrau. + Wenn Privacy Browsers Orbot-Proxy-Einstellung aktiviert ist, wird das Internet ausschließlich funktionieren, solange Orbot ausgeführt und mit dem TOR-Netzwerk verbunden wird. + Weil die Daten durch verschiedene Anlaufstellen geleitet werden ist das Nutzen von TOR oft weitaus langsamer als das direkte Verbinden mit dem Internet.

+ + \ No newline at end of file diff --git a/app/src/main/assets/de/guide_tor_light.html b/app/src/main/assets/de/guide_tor_light.html index ca46ebb2..87941647 100644 --- a/app/src/main/assets/de/guide_tor_light.html +++ b/app/src/main/assets/de/guide_tor_light.html @@ -26,62 +26,58 @@ -

Tor und seine Grenzen

- -

Faktoren, die in die Privatsphäre im Web eindringen wollen lassen sich hauptsächlich in zwei verschiedene Kategorien unterteilen: Neugierige Behörden - mit Zugriff auf Internetprovider und Megafirmen, die Soziale und Werbenetzwerke betreiben. - TOR (The Onion Router) ist nützlich, wenn es auf den Schutz der Privatsphäre vor neugierigen Behörden ankommt, aber nicht bei den Megafirmen.

- - -

Neugierige Behörden

- -

Oft spähen neugierige Behörden die Bürger aus, um Fehlverhalten und Menschenrechtsaktivitäten zu bestrafen. Üblicherweise betreiben sie entweder die Internetprovider selber - oder sie können die Provider dazu zwingen, Informationen über jede besuchte IP-Adresse und die zugehörigen Benutzer herauszugeben. - TOR wurde entwickelt, um diese Eingriffe in die Privatsphäre zu bekämpfen, indem es die Daten verschlüsselt, - die ein Nutzer sendet und sie durch viele verschiedene Server schleust, bevor sie die Zieladresse erreichen. - Das bedeutet, dass kein individueller Internetprovider, Server oder Website sowohl die IP-Adresse des Nutzers - als auch die IP-Adresse des letztendlich besuchten Webservers erfährt. Neugierige Behörden und die von ihnen kontrollierten Internetprovider können nur vermuten, welche - Webserver ein Benutzer besucht, da sie letztendlich nur sehen, dass er TOR benutzt. In einigen Teilen - der Welt könnte das Benutzen von TOR als illegale Aktivität ausgelegt werden ("wenn Du nichts zu verstecken hättest, - würdest Du nicht Deinen Traffic vor uns verstecken") und Benutzer könnten bestraft werden, da die Regierung vermutet, - sie würden etwas Untersagtes tun. Also kann TOR hilfreich sein, ist jedoch kein Allheilmittel.

- - -

Megafirmen

- -

Wenn ein Benutzer sich mit einem Webserver verbindet, kann der Webserver seine IP-Adresse sehen. Obwohl es keine ausgereifte Methode ist, - können IP-Adressen in physische Adressen umgewandelt werden - mit erstaunlicher Genauigkeit. - Kleine Webserver nutzen normalerweise die IP-Adresse, um festzulegen, woher der Benutzer die Seite besucht. - TOR ist eine gute Lösung, wenn man seinen Standort vor diesen Servern verstecken möchte. Große Megafirmen, die Soziale Netzwerke und Werbenetzwerke betreiben - nutzen jedoch richtige Profile an Informationen, um Benutzer über ihre Geräte und IP-Adressen hinaus zu tracken. - Diese Profile nutzen verschiedene Möglichkeiten an Techniken um Benutzer ausfindig zu machen, inklusive JavaScript, Cookies, - Tracking-IDs und ein "Browser-Fingerabdruck" (fingerprinting). Weil die große Mehrheit - der Websites im Internet eine Werbung entweder von den großen Werbenetzwerken oder von eingebetteten Social-Media-Buttons mit ihrem zugewiesenen JavaScript - lädt, haben diese großen Megafirmen Profile von so gut wie jedem Internetnutzer angefertigt und verfolgen ihre - Aktivitäten über zueinander unabhängige Seiten.

- -

Sie verfolgen jede besuchte Seite, alles online Gekaufte, jede für Einkäufe genutzte Kreditkarte, - jede Adresse, an die Waren verschickt werden und die GPS-Metadaten von jedem ins Internet hochgeladene Foto. - Sie fertigen Profile an von Alter, Geschlecht, Beziehungsstatus, Adresse, politischen Ansichten, - religiösen Ansichten, familiären Zuständen, Anzahl der Haustiere und allem anderen was sie über einen Nutzer herausfinden können. - Sie kaufen sogar ganze Datenbanken mit Informationen über Kreditkartennutzungen in Geschäften auf, damit sie Offline-Einkaufsverhalten von Nutzern in ihren Profilen nachverfolgen können. - Weil sie bereits weitaus genauere Adressinformationen über einen Nutzer haben als eine IP-Adresse aussagt, - bietet TOR keinen echten Schutz der Privatsphäre gegen Megafirmen.

- -

Der einzige und beste Schutz der Privatsphäre gegen Megafirmen ist es, mit deaktivieren JavaScript durchs Web zu surfen, gefolgt - von geblockten Werbenetzwerken, deaktivieren Cookies und DOM-Speicher und das Benutzen eines Browsers, der schwierig zu "fingerprinten" ist.

- - -

Benutzen von TOR

- -

Neben den Einschränkungen kann TOR in bestimmten Situationen hilfreich sein. Das TOR Project hat eine App für Android namens Orbot, - die auf F-Droid verfügbar ist - und überall sonst wo Privacy Browser angeboten wird. Privacy Browser hat eine Option um Orbot als - Proxy zu benutzen. Wenn diese aktiviert wird, hat Privacy Browser einen hellblauen Hintergrund bei der Adresszeile statt - dem standardmäßigen Hellgrau. Wenn Privacy Browsers Orbot-Proxy-Einstellung aktiviert ist, wird das Internet ausschließlich - funktionieren, solange Orbot ausgeführt und mit dem TOR-Netzwerk verbunden wird. Weil die Daten durch verschiedene Anlaufstellen geleitet werden - ist das Nutzen von TOR oft weitaus langsamer als das direkte Verbinden mit dem Internet.

- - +

Tor und seine Grenzen

+ +

Faktoren, die in die Privatsphäre im Web eindringen wollen lassen sich hauptsächlich in zwei verschiedene Kategorien unterteilen: + Neugierige Behörden mit Zugriff auf Internetprovider und Megafirmen, die Soziale und Werbenetzwerke betreiben. + TOR (The Onion Router) ist nützlich, wenn es auf den Schutz der Privatsphäre vor neugierigen Behörden ankommt, aber nicht bei den Megafirmen.

+ + +

Neugierige Behörden

+ +

Oft spähen neugierige Behörden die Bürger aus, um Fehlverhalten und Menschenrechtsaktivitäten zu bestrafen. + Üblicherweise betreiben sie entweder die Internetprovider selber oder sie können die Provider dazu zwingen, Informationen über jede besuchte IP-Adresse und die zugehörigen Benutzer herauszugeben. + TOR wurde entwickelt, um diese Eingriffe in die Privatsphäre zu bekämpfen, indem es die Daten verschlüsselt, die ein Nutzer sendet und sie durch viele verschiedene Server schleust, + bevor sie die Zieladresse erreichen. + Das bedeutet, dass kein individueller Internetprovider, Server oder Website sowohl die IP-Adresse des Nutzers + als auch die IP-Adresse des letztendlich besuchten Webservers erfährt. + Neugierige Behörden und die von ihnen kontrollierten Internetprovider können nur vermuten, welche Webserver ein Benutzer besucht, da sie letztendlich nur sehen, dass er TOR benutzt. + In einigen Teilen der Welt könnte das Benutzen von TOR als illegale Aktivität ausgelegt werden ("wenn Du nichts zu verstecken hättest, + würdest Du nicht Deinen Traffic vor uns verstecken") und Benutzer könnten bestraft werden, da die Regierung vermutet, sie würden etwas Untersagtes tun. + Also kann TOR hilfreich sein, ist jedoch kein Allheilmittel.

+ + +

Megafirmen

+ +

Wenn ein Benutzer sich mit einem Webserver verbindet, kann der Webserver seine IP-Adresse sehen. + Obwohl es keine ausgereifte Methode ist, können IP-Adressen in physische Adressen umgewandelt werden - mit erstaunlicher Genauigkeit. + Kleine Webserver nutzen normalerweise die IP-Adresse, um festzulegen, woher der Benutzer die Seite besucht. TOR ist eine gute Lösung, wenn man seinen Standort vor diesen Servern verstecken möchte. + Große Megafirmen, die Soziale Netzwerke und Werbenetzwerke betreiben nutzen jedoch richtige Profile an Informationen, um Benutzer über ihre Geräte und IP-Adressen hinaus zu tracken. + Diese Profile nutzen verschiedene Möglichkeiten an Techniken um Benutzer ausfindig zu machen, inklusive JavaScript, Cookies, Tracking-IDs und ein + "Browser-Fingerabdruck" (fingerprinting). + Weil die große Mehrheit der Websites im Internet eine Werbung entweder von den großen Werbenetzwerken oder von eingebetteten Social-Media-Buttons mit ihrem zugewiesenen JavaScript lädt, + haben diese großen Megafirmen Profile von so gut wie jedem Internetnutzer angefertigt und verfolgen ihre Aktivitäten über zueinander unabhängige Seiten.

+ +

Sie verfolgen jede besuchte Seite, alles online Gekaufte, jede für Einkäufe genutzte Kreditkarte, jede Adresse, + an die Waren verschickt werden und die GPS-Metadaten von jedem ins Internet hochgeladene Foto. + Sie fertigen Profile an von Alter, Geschlecht, Beziehungsstatus, Adresse, politischen Ansichten, religiösen Ansichten, familiären Zuständen, + Anzahl der Haustiere und allem anderen was sie über einen Nutzer herausfinden können. + Sie kaufen sogar ganze Datenbanken mit Informationen über Kreditkartennutzungen in Geschäften auf, damit sie Offline-Einkaufsverhalten von Nutzern in ihren Profilen nachverfolgen können. + Weil sie bereits weitaus genauere Adressinformationen über einen Nutzer haben als eine IP-Adresse aussagt, bietet TOR keinen echten Schutz der Privatsphäre gegen Megafirmen.

+ +

Der einzige und beste Schutz der Privatsphäre gegen Megafirmen ist es, mit deaktivieren JavaScript durchs Web zu surfen, gefolgt von geblockten Werbenetzwerken, + deaktivieren Cookies und DOM-Speicher und das Benutzen eines Browsers, der schwierig zu "fingerprinten" ist.

+ + +

Benutzen von TOR

+ +

Neben den Einschränkungen kann TOR in bestimmten Situationen hilfreich sein. + Das TOR Project hat eine App für Android namens Orbot, die auf F-Droid + verfügbar ist und überall sonst wo Privacy Browser angeboten wird. Privacy Browser hat eine Option um Orbot als Proxy zu benutzen. + Wenn diese aktiviert wird, hat Privacy Browser einen hellblauen Hintergrund bei der Adresszeile statt dem standardmäßigen Hellgrau. + Wenn Privacy Browsers Orbot-Proxy-Einstellung aktiviert ist, wird das Internet ausschließlich funktionieren, solange Orbot ausgeführt und mit dem TOR-Netzwerk verbunden wird. + Weil die Daten durch verschiedene Anlaufstellen geleitet werden ist das Nutzen von TOR oft weitaus langsamer als das direkte Verbinden mit dem Internet.

+ + \ No newline at end of file diff --git a/app/src/main/assets/de/guide_user_agent_dark.html b/app/src/main/assets/de/guide_user_agent_dark.html index 9132be93..8977211a 100644 --- a/app/src/main/assets/de/guide_user_agent_dark.html +++ b/app/src/main/assets/de/guide_user_agent_dark.html @@ -32,7 +32,7 @@ The web server can use this information to decide which version of the website to send to the browser. For example, many websites have different versions for desktop and mobile browsers.

-

By default, Privacy Browser uses its own user agent, which is PrivacyBrowser/1.0. This sends a minimum of information to the web server. +

By default, Privacy Browser uses its own user agent, which is PrivacyBrowser/1.0. This sends a minimum of information to the web server. Because web servers do not recognize this to be a mobile user agent, they typically display the desktop version of the site.

By comparison, WebView’s default user agent divulges a large amount of information about the hardware and software of the device. @@ -51,7 +51,7 @@

There are several preset user agents that match common browsers and operating systems. For browser fingerprinting purposes, anything that is rare is easier to track. - If Privacy Browser becomes common and many people use PrivacyBrowser/1.0 as their user agent, it will be a good choice for privacy. + If Privacy Browser becomes common and many people use PrivacyBrowser/1.0 as their user agent, it will be a good choice for privacy. Firefox or Chrome are the most common user agents, but they auto-update and their version numbers change so quickly that it is likely the user agents included in Privacy Browser will often be out of step with the majority of user agents in the server logs.

diff --git a/app/src/main/assets/de/guide_user_agent_light.html b/app/src/main/assets/de/guide_user_agent_light.html index 2415a100..0efd7d15 100644 --- a/app/src/main/assets/de/guide_user_agent_light.html +++ b/app/src/main/assets/de/guide_user_agent_light.html @@ -32,7 +32,7 @@ The web server can use this information to decide which version of the website to send to the browser. For example, many websites have different versions for desktop and mobile browsers.

-

By default, Privacy Browser uses its own user agent, which is PrivacyBrowser/1.0. This sends a minimum of information to the web server. +

By default, Privacy Browser uses its own user agent, which is PrivacyBrowser/1.0. This sends a minimum of information to the web server. Because web servers do not recognize this to be a mobile user agent, they typically display the desktop version of the site.

By comparison, WebView’s default user agent divulges a large amount of information about the hardware and software of the device. @@ -51,7 +51,7 @@

There are several preset user agents that match common browsers and operating systems. For browser fingerprinting purposes, anything that is rare is easier to track. - If Privacy Browser becomes common and many people use PrivacyBrowser/1.0 as their user agent, it will be a good choice for privacy. + If Privacy Browser becomes common and many people use PrivacyBrowser/1.0 as their user agent, it will be a good choice for privacy. Firefox or Chrome are the most common user agents, but they auto-update and their version numbers change so quickly that it is likely the user agents included in Privacy Browser will often be out of step with the majority of user agents in the server logs.

diff --git a/app/src/main/assets/en/about_licenses_dark.html b/app/src/main/assets/en/about_licenses_dark.html index 453f7011..52413da1 100644 --- a/app/src/main/assets/en/about_licenses_dark.html +++ b/app/src/main/assets/en/about_licenses_dark.html @@ -130,6 +130,7 @@

vertical_align_bottom.

vertical_align_top.

visibility_off.

+

vpn_key.

vpn_lock.

web.

diff --git a/app/src/main/assets/en/about_licenses_light.html b/app/src/main/assets/en/about_licenses_light.html index 63c3af17..9dacc41b 100644 --- a/app/src/main/assets/en/about_licenses_light.html +++ b/app/src/main/assets/en/about_licenses_light.html @@ -131,6 +131,7 @@

vertical_align_bottom.

vertical_align_top.

visibility_off.

+

vpn_key.

vpn_lock.

web.

diff --git a/app/src/main/assets/en/guide_bookmarks_dark.html b/app/src/main/assets/en/guide_bookmarks_dark.html index 665a80ac..8a367a67 100644 --- a/app/src/main/assets/en/guide_bookmarks_dark.html +++ b/app/src/main/assets/en/guide_bookmarks_dark.html @@ -24,15 +24,14 @@ -

Bookmarks

+

Bookmarks

Bookmarks can be accessed in a drawer layout by swiping from the right of the screen.

Tapping the top floating action button loads the bookmarks activity, which has advanced options like moving and deleting bookmarks. - From the bookmarks activity, there is an option to load the bookmarks database view. This shows the bookmarks as they exist in the SQLite database. - This will mostly be useful for troubleshooting problems with importing - and exporting bookmarks once those features are added.

+ From the bookmarks activity, there is an option to load the bookmarks database view. + This shows the bookmarks as they exist in the SQLite database, which can be useful for troubleshooting problems with importing and exporting bookmarks.

\ No newline at end of file diff --git a/app/src/main/assets/en/guide_bookmarks_light.html b/app/src/main/assets/en/guide_bookmarks_light.html index 839651fe..b62d05bd 100644 --- a/app/src/main/assets/en/guide_bookmarks_light.html +++ b/app/src/main/assets/en/guide_bookmarks_light.html @@ -31,8 +31,7 @@

Tapping the top floating action button loads the bookmarks activity, which has advanced options like moving and deleting bookmarks. - From the bookmarks activity, there is an option to load the bookmarks database view. This shows the bookmarks as they exist in the SQLite database. - This will mostly be useful for troubleshooting problems with importing - and exporting bookmarks once those features are added.

+ From the bookmarks activity, there is an option to load the bookmarks database view. + This shows the bookmarks as they exist in the SQLite database, which can be useful for troubleshooting problems with importing and exporting bookmarks.

\ No newline at end of file diff --git a/app/src/main/assets/en/guide_local_storage_dark.html b/app/src/main/assets/en/guide_local_storage_dark.html index 3946f311..cc94112b 100644 --- a/app/src/main/assets/en/guide_local_storage_dark.html +++ b/app/src/main/assets/en/guide_local_storage_dark.html @@ -82,7 +82,7 @@

Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. - Beginning in Android Oreo (8.0), WebView’s form data was replaced by the the Autofill service. + Beginning in Android Oreo (8.0), WebView’s form data was replaced by the Autofill service. As such, controls for form data no longer appear on newer Android devices.

\ No newline at end of file diff --git a/app/src/main/assets/en/guide_local_storage_light.html b/app/src/main/assets/en/guide_local_storage_light.html index ad71fd54..280986be 100644 --- a/app/src/main/assets/en/guide_local_storage_light.html +++ b/app/src/main/assets/en/guide_local_storage_light.html @@ -83,7 +83,7 @@

Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. - Beginning in Android Oreo (8.0), WebView’s form data was replaced by the the Autofill service. + Beginning in Android Oreo (8.0), WebView’s form data was replaced by the Autofill service. As such, controls for form data no longer appear on newer Android devices.

\ No newline at end of file diff --git a/app/src/main/assets/en/guide_tor_dark.html b/app/src/main/assets/en/guide_tor_dark.html index a2918871..13ccb456 100644 --- a/app/src/main/assets/en/guide_tor_dark.html +++ b/app/src/main/assets/en/guide_tor_dark.html @@ -24,60 +24,54 @@ -

Tor and Its Limits

+

Tor and Its Limits

-

There are two general categories of bad actors that want to infringe on the privacy of the web: malicious governments with access to ISPs (Internet Service Providers) and mega corporations that run social and advertising networks. +

There are two general categories of bad actors that want to infringe on the privacy of the web: + malicious governments with access to ISPs (Internet Service Providers) and mega corporations that run social and advertising networks. TOR (The Onion Router) is useful in protecting privacy from malicious governments (which spy on traffic in transit) but not from mega corporations (which embed malicious code on web servers).

-

Malicious Governments

- -

Malicious governments often spy on their citizens to punish dissent or human rights activity. They commonly either - operate the local ISPs or they can force them to disclose information showing every IP address that is visited - by each user. Tor is designed to defeat this infringement of privacy by encrypting the traffic - from a user’s device and routing it through three separate servers on the internet before sending it on to the final destination. - This means that no individual ISP, server, or website, can know both the IP address the user’s device - and the IP address of the final web server. Malicious governments and the ISPs they control cannot tell which - web servers a user is accessing, although they can tell that the user is using Tor. In some parts of - the world, using Tor could be construed as an evidence of illegal behavior (“if you didn’t have anything - to hide you wouldn’t be encrypting your traffic”) and users could be punished because governments - assume they are doing something that is prohibited. Thus, Tor can be helpful, but isn’t a panacea.

- - -

Mega Corporations

- -

When a user connects to a web server, the web server can see the user’s IP address. Although it isn’t a perfect science, - IP addresses can be turned into physical addresses with a fair amount of accuracy. - Small web servers typically rely on IP addresses to identify the location of the users visiting their site. - Tor is a good solution to mask the user’s location from these servers. But large mega corporations - that own social media and advertising networks use a whole profile of information that is designed to track users - across devices and IP addresses. These profiles employ a variety of techniques to identify users, including JavaScript, - cookies, tracking IDs, and browser fingerprinting. Because the vast majority - of the websites on the internet either load an ad from one of the major networks or embed social media icons with their - associated JavaScript, these corporations have built profiles for almost every user online and can track their internet - activity across unrelated sites.

- -

They track every site that is visited, everything that is purchased, every credit card that is used to - make a purchase, every address that items are shipped to, and the GPS metadata of every picture that is - uploaded to the internet. They build a profile of a user’s age, gender, marital status, address, political affiliations, - religious affiliations, family circumstances, number of pets, and everything else they can get their hands on. - They even buy up databases of credit card transactions at local stores, so they can track the off-line purchasing patterns of the users - in their profiles. Because they already have much more accurate address information about a user than an IP address discloses, - Tor provides no real privacy protection against mega corporations.

- -

The single best privacy protection against mega corporations is to browse the web with JavaScript disabled, followed - by blocking ad networks, disabling cookies and DOM storage, and using a browser that is difficult to fingerprint.

- - -

Using Tor

- -

Despite its limitations, Tor can be useful in some circumstances. The Tor project has an app for Android called Orbot, - which is available on F-Droid - and everywhere else that Privacy Browser is distributed. Privacy Browser has a setting to use Orbot as - a proxy. When this is turned on, Privacy Browser’s app bar will have a light blue background instead of - the default light grey. When Privacy Browser’s Orbot proxy setting is enabled, internet access - will not work unless Orbot is running and connected to Tor. Because traffic is being routed through several Tor nodes, - using Tor is often much slower than connecting directly to the internet.

+

Malicious Governments

+ +

Malicious governments often spy on their citizens to punish dissent or human rights activity. + They commonly either operate the local ISPs or they can force them to disclose information showing every IP address that is visited by each user. + Tor is designed to defeat this infringement of privacy by encrypting the traffic from a user’s device and routing it through three separate servers on the internet + before sending it on to the final destination. + This means that no individual ISP, server, or website, can know both the IP address the user’s device and the IP address of the final web server. + Malicious governments and the ISPs they control cannot tell which web servers a user is accessing, although they can tell that the user is using Tor. + In some parts of the world, using Tor could be construed as an evidence of illegal behavior (“if you didn’t have anything to hide you wouldn’t be encrypting your traffic”) + and users could be punished because governments assume they are doing something that is prohibited. Thus, Tor can be helpful, but isn’t a panacea.

+ + +

Mega Corporations

+ +

When a user connects to a web server, the web server can see the user’s IP address. + Although it isn’t a perfect science, IP addresses can be turned into physical addresses with a fair amount of accuracy. + Small web servers typically rely on IP addresses to identify the location of the users visiting their site. Tor is a good solution to mask the user’s location from these servers. + But large mega corporations that own social media and advertising networks use a whole profile of information that is designed to track users across devices and IP addresses. + These profiles employ a variety of techniques to identify users, including JavaScript, cookies, tracking IDs, and browser fingerprinting. + Because the vast majority of the websites on the internet either load an ad from one of the major networks or embed social media icons with their associated JavaScript, + these corporations have built profiles for almost every user online and can track their internet activity across unrelated sites.

+ +

They track every site that is visited, everything that is purchased, every credit card that is used to make a purchase, every address that items are shipped to, + and the GPS metadata of every picture that is uploaded to the internet. + They build a profile of a user’s age, gender, marital status, address, political affiliations, religious affiliations, family circumstances, number of pets, + and everything else they can get their hands on. + They even buy up databases of credit card transactions at local stores, so they can track the off-line purchasing patterns of the users in their profiles. + Because they already have much more accurate address information about a user than an IP address discloses, Tor provides no real privacy protection against mega corporations.

+ +

The single best privacy protection against mega corporations is to browse the web with JavaScript disabled, followed by blocking ad networks, disabling cookies and DOM storage, + and using a browser that is difficult to fingerprint.

+ + +

Using Tor

+ +

Despite its limitations, Tor can be useful in some circumstances. + The Tor project has an app for Android called Orbot, which is available on F-Droid + and everywhere else that Privacy Browser is distributed. Privacy Browser has a setting to use Orbot as a proxy. + When this is turned on, Privacy Browser’s app bar will have a light blue background instead of the default light grey. + When Privacy Browser’s Orbot proxy setting is enabled, internet access will not work unless Orbot is running and connected to Tor. + Because traffic is being routed through several Tor nodes, using Tor is often much slower than connecting directly to the internet.

diff --git a/app/src/main/assets/en/guide_tor_light.html b/app/src/main/assets/en/guide_tor_light.html index 7e0181e4..58805938 100644 --- a/app/src/main/assets/en/guide_tor_light.html +++ b/app/src/main/assets/en/guide_tor_light.html @@ -24,60 +24,54 @@ -

Tor and Its Limits

+

Tor and Its Limits

-

There are two general categories of bad actors that want to infringe on the privacy of the web: malicious governments with access to ISPs (Internet Service Providers) and mega corporations that run social and advertising networks. +

There are two general categories of bad actors that want to infringe on the privacy of the web: + malicious governments with access to ISPs (Internet Service Providers) and mega corporations that run social and advertising networks. TOR (The Onion Router) is useful in protecting privacy from malicious governments (which spy on traffic in transit) but not from mega corporations (which embed malicious code on web servers).

-

Malicious Governments

- -

Malicious governments often spy on their citizens to punish dissent or human rights activity. They commonly either - operate the local ISPs or they can force them to disclose information showing every IP address that is visited - by each user. Tor is designed to defeat this infringement of privacy by encrypting the traffic - from a user’s device and routing it through three separate servers on the internet before sending it on to the final destination. - This means that no individual ISP, server, or website, can know both the IP address the user’s device - and the IP address of the final web server. Malicious governments and the ISPs they control cannot tell which - web servers a user is accessing, although they can tell that the user is using Tor. In some parts of - the world, using Tor could be construed as an evidence of illegal behavior (“if you didn’t have anything - to hide you wouldn’t be encrypting your traffic”) and users could be punished because governments - assume they are doing something that is prohibited. Thus, Tor can be helpful, but isn’t a panacea.

- - -

Mega Corporations

- -

When a user connects to a web server, the web server can see the user’s IP address. Although it isn’t a perfect science, - IP addresses can be turned into physical addresses with a fair amount of accuracy. - Small web servers typically rely on IP addresses to identify the location of the users visiting their site. - Tor is a good solution to mask the user’s location from these servers. But large mega corporations - that own social media and advertising networks use a whole profile of information that is designed to track users - across devices and IP addresses. These profiles employ a variety of techniques to identify users, including JavaScript, - cookies, tracking IDs, and browser fingerprinting. Because the vast majority - of the websites on the internet either load an ad from one of the major networks or embed social media icons with their - associated JavaScript, these corporations have built profiles for almost every user online and can track their internet - activity across unrelated sites.

- -

They track every site that is visited, everything that is purchased, every credit card that is used to - make a purchase, every address that items are shipped to, and the GPS metadata of every picture that is - uploaded to the internet. They build a profile of a user’s age, gender, marital status, address, political affiliations, - religious affiliations, family circumstances, number of pets, and everything else they can get their hands on. - They even buy up databases of credit card transactions at local stores, so they can track the off-line purchasing patterns of the users - in their profiles. Because they already have much more accurate address information about a user than an IP address discloses, - Tor provides no real privacy protection against mega corporations.

- -

The single best privacy protection against mega corporations is to browse the web with JavaScript disabled, followed - by blocking ad networks, disabling cookies and DOM storage, and using a browser that is difficult to fingerprint.

- - -

Using Tor

- -

Despite its limitations, Tor can be useful in some circumstances. The Tor project has an app for Android called Orbot, - which is available on F-Droid - and everywhere else that Privacy Browser is distributed. Privacy Browser has a setting to use Orbot as - a proxy. When this is turned on, Privacy Browser’s app bar will have a light blue background instead of - the default light grey. When Privacy Browser’s Orbot proxy setting is enabled, internet access - will not work unless Orbot is running and connected to Tor. Because traffic is being routed through several Tor nodes, - using Tor is often much slower than connecting directly to the internet.

+

Malicious Governments

+ +

Malicious governments often spy on their citizens to punish dissent or human rights activity. + They commonly either operate the local ISPs or they can force them to disclose information showing every IP address that is visited by each user. + Tor is designed to defeat this infringement of privacy by encrypting the traffic from a user’s device and routing it through three separate servers on the internet + before sending it on to the final destination. + This means that no individual ISP, server, or website, can know both the IP address the user’s device and the IP address of the final web server. + Malicious governments and the ISPs they control cannot tell which web servers a user is accessing, although they can tell that the user is using Tor. + In some parts of the world, using Tor could be construed as an evidence of illegal behavior (“if you didn’t have anything to hide you wouldn’t be encrypting your traffic”) + and users could be punished because governments assume they are doing something that is prohibited. Thus, Tor can be helpful, but isn’t a panacea.

+ + +

Mega Corporations

+ +

When a user connects to a web server, the web server can see the user’s IP address. + Although it isn’t a perfect science, IP addresses can be turned into physical addresses with a fair amount of accuracy. + Small web servers typically rely on IP addresses to identify the location of the users visiting their site. Tor is a good solution to mask the user’s location from these servers. + But large mega corporations that own social media and advertising networks use a whole profile of information that is designed to track users across devices and IP addresses. + These profiles employ a variety of techniques to identify users, including JavaScript, cookies, tracking IDs, and browser fingerprinting. + Because the vast majority of the websites on the internet either load an ad from one of the major networks or embed social media icons with their associated JavaScript, + these corporations have built profiles for almost every user online and can track their internet activity across unrelated sites.

+ +

They track every site that is visited, everything that is purchased, every credit card that is used to make a purchase, every address that items are shipped to, + and the GPS metadata of every picture that is uploaded to the internet. + They build a profile of a user’s age, gender, marital status, address, political affiliations, religious affiliations, family circumstances, number of pets, + and everything else they can get their hands on. + They even buy up databases of credit card transactions at local stores, so they can track the off-line purchasing patterns of the users in their profiles. + Because they already have much more accurate address information about a user than an IP address discloses, Tor provides no real privacy protection against mega corporations.

+ +

The single best privacy protection against mega corporations is to browse the web with JavaScript disabled, followed by blocking ad networks, disabling cookies and DOM storage, + and using a browser that is difficult to fingerprint.

+ + +

Using Tor

+ +

Despite its limitations, Tor can be useful in some circumstances. + The Tor project has an app for Android called Orbot, which is available on F-Droid + and everywhere else that Privacy Browser is distributed. Privacy Browser has a setting to use Orbot as a proxy. + When this is turned on, Privacy Browser’s app bar will have a light blue background instead of the default light grey. + When Privacy Browser’s Orbot proxy setting is enabled, internet access will not work unless Orbot is running and connected to Tor. + Because traffic is being routed through several Tor nodes, using Tor is often much slower than connecting directly to the internet.

diff --git a/app/src/main/assets/en/guide_user_agent_dark.html b/app/src/main/assets/en/guide_user_agent_dark.html index 9a15c9df..ca1ff1dc 100644 --- a/app/src/main/assets/en/guide_user_agent_dark.html +++ b/app/src/main/assets/en/guide_user_agent_dark.html @@ -30,7 +30,7 @@ The web server can use this information to decide which version of the website to send to the browser. For example, many websites have different versions for desktop and mobile browsers.

-

By default, Privacy Browser uses its own user agent, which is PrivacyBrowser/1.0. This sends a minimum of information to the web server. +

By default, Privacy Browser uses its own user agent, which is PrivacyBrowser/1.0. This sends a minimum of information to the web server. Because web servers do not recognize this to be a mobile user agent, they typically display the desktop version of the site.

By comparison, WebView’s default user agent divulges a large amount of information about the hardware and software of the device. @@ -49,7 +49,7 @@

There are several preset user agents that match common browsers and operating systems. For browser fingerprinting purposes, anything that is rare is easier to track. - If Privacy Browser becomes common and many people use PrivacyBrowser/1.0 as their user agent, it will be a good choice for privacy. + If Privacy Browser becomes common and many people use PrivacyBrowser/1.0 as their user agent, it will be a good choice for privacy. Firefox or Chrome are the most common user agents, but they auto-update and their version numbers change so quickly that it is likely the user agents included in Privacy Browser will often be out of step with the majority of user agents in the server logs.

diff --git a/app/src/main/assets/en/guide_user_agent_light.html b/app/src/main/assets/en/guide_user_agent_light.html index 3616b7e7..cf0d4246 100644 --- a/app/src/main/assets/en/guide_user_agent_light.html +++ b/app/src/main/assets/en/guide_user_agent_light.html @@ -30,7 +30,7 @@ The web server can use this information to decide which version of the website to send to the browser. For example, many websites have different versions for desktop and mobile browsers.

-

By default, Privacy Browser uses its own user agent, which is PrivacyBrowser/1.0. This sends a minimum of information to the web server. +

By default, Privacy Browser uses its own user agent, which is PrivacyBrowser/1.0. This sends a minimum of information to the web server. Because web servers do not recognize this to be a mobile user agent, they typically display the desktop version of the site.

By comparison, WebView’s default user agent divulges a large amount of information about the hardware and software of the device. @@ -49,7 +49,7 @@

There are several preset user agents that match common browsers and operating systems. For browser fingerprinting purposes, anything that is rare is easier to track. - If Privacy Browser becomes common and many people use PrivacyBrowser/1.0 as their user agent, it will be a good choice for privacy. + If Privacy Browser becomes common and many people use PrivacyBrowser/1.0 as their user agent, it will be a good choice for privacy. Firefox or Chrome are the most common user agents, but they auto-update and their version numbers change so quickly that it is likely the user agents included in Privacy Browser will often be out of step with the majority of user agents in the server logs.

diff --git a/app/src/main/assets/es/about_licenses_dark.html b/app/src/main/assets/es/about_licenses_dark.html index c1b26a55..1b75465e 100644 --- a/app/src/main/assets/es/about_licenses_dark.html +++ b/app/src/main/assets/es/about_licenses_dark.html @@ -135,6 +135,7 @@

vertical_align_bottom.

vertical_align_top.

visibility_off.

+

vpn_key.

vpn_lock.

web.


diff --git a/app/src/main/assets/es/about_licenses_light.html b/app/src/main/assets/es/about_licenses_light.html index f4facaeb..e59f19b4 100644 --- a/app/src/main/assets/es/about_licenses_light.html +++ b/app/src/main/assets/es/about_licenses_light.html @@ -136,6 +136,7 @@

vertical_align_bottom.

vertical_align_top.

visibility_off.

+

vpn_key.

vpn_lock.

web.

diff --git a/app/src/main/assets/es/guide_bookmarks_dark.html b/app/src/main/assets/es/guide_bookmarks_dark.html index 1fca5236..7a1f0ed7 100644 --- a/app/src/main/assets/es/guide_bookmarks_dark.html +++ b/app/src/main/assets/es/guide_bookmarks_dark.html @@ -26,15 +26,14 @@ -

Favoritos

+

Favoritos

Se puede acceder a los favoritos en un diseño de cajón deslizando desde la derecha de la pantalla.

-

Al tocar el botón de acción flotante superior se carga la actividad de los favoritos, que tiene opciones avanzadas como mover y eliminar favoritos. - Desde la actividad de los favoritos, hay una opción para cargar la vista de la base de datos de los favoritos. Esto muestra los favoritos tal y como existen en la base de datos SQLite. - Esto será muy útil para solucionar problemas con la importación y exportación - de favoritos una vez que se hayan añadido esas funciones.

+

Tapping the top floating action button loads the bookmarks activity, which has advanced options like moving and deleting bookmarks. + From the bookmarks activity, there is an option to load the bookmarks database view. + This shows the bookmarks as they exist in the SQLite database, which can be useful for troubleshooting problems with importing and exporting bookmarks.

\ No newline at end of file diff --git a/app/src/main/assets/es/guide_bookmarks_light.html b/app/src/main/assets/es/guide_bookmarks_light.html index 88127832..1d4ad673 100644 --- a/app/src/main/assets/es/guide_bookmarks_light.html +++ b/app/src/main/assets/es/guide_bookmarks_light.html @@ -32,9 +32,8 @@ -

Al tocar el botón de acción flotante superior se carga la actividad de los favoritos, que tiene opciones avanzadas como mover y eliminar favoritos. - Desde la actividad de los favoritos, hay una opción para cargar la vista de la base de datos de los favoritos. Esto muestra los favoritos tal y como existen en la base de datos SQLite. - Esto será muy útil para solucionar problemas con la importación y exportación - de favoritos una vez que se hayan añadido esas funciones.

+

Tapping the top floating action button loads the bookmarks activity, which has advanced options like moving and deleting bookmarks. + From the bookmarks activity, there is an option to load the bookmarks database view. + This shows the bookmarks as they exist in the SQLite database, which can be useful for troubleshooting problems with importing and exporting bookmarks.

\ No newline at end of file diff --git a/app/src/main/assets/es/guide_javascript_dark.html b/app/src/main/assets/es/guide_javascript_dark.html index 81c5811c..aa2efac2 100644 --- a/app/src/main/assets/es/guide_javascript_dark.html +++ b/app/src/main/assets/es/guide_javascript_dark.html @@ -51,8 +51,8 @@ (los cuales indican que Javascript está deshabilitado) y rojo (Javascript habilitado). Revisar la diferente información que webkay puede recoger con Javascript habilitado y deshabilitado es informativo.

-

Browsing the internet with JavaScript disabled, and only enabling it if needed, goes a long way toward protecting privacy. - In addition, JavaScript is used to load much of the annoying advertisements and extra cruft that comes along with most modern websites. - With it disabled, websites will load faster, consume less network traffic, and use less CPU power, which leads to longer battery life.

+

Navegar por internet con Javascript desactivado, y activarlo únicamente cuando se necesite, contribuye en gran medida en la protección de la privacidad del usuario. + Además, JavaScript se utiliza para cargar gran parte de los anuncios molestos y el arsenal adicional que viene junto con la mayoría de las páginas web modernas. + Con esta opción desactivada, las páginas web se cargarán más rápido, consumirán menos tráfico de red y usarán menos energía de la CPU, lo que se traduce en una mayor duración de la batería.

\ No newline at end of file diff --git a/app/src/main/assets/es/guide_javascript_light.html b/app/src/main/assets/es/guide_javascript_light.html index 6a6c1ae7..db43ee69 100644 --- a/app/src/main/assets/es/guide_javascript_light.html +++ b/app/src/main/assets/es/guide_javascript_light.html @@ -51,8 +51,8 @@ (los cuales indican que Javascript está deshabilitado) y rojo (Javascript habilitado). Revisar la diferente información que webkay puede recoger con Javascript habilitado y deshabilitado es informativo.

-

Browsing the internet with JavaScript disabled, and only enabling it if needed, goes a long way toward protecting privacy. - In addition, JavaScript is used to load much of the annoying advertisements and extra cruft that comes along with most modern websites. - With it disabled, websites will load faster, consume less network traffic, and use less CPU power, which leads to longer battery life.

+

Navegar por internet con Javascript desactivado, y activarlo únicamente cuando se necesite, contribuye en gran medida en la protección de la privacidad del usuario. + Además, JavaScript se utiliza para cargar gran parte de los anuncios molestos y el arsenal adicional que viene junto con la mayoría de las páginas web modernas. + Con esta opción desactivada, las páginas web se cargarán más rápido, consumirán menos tráfico de red y usarán menos energía de la CPU, lo que se traduce en una mayor duración de la batería.

\ No newline at end of file diff --git a/app/src/main/assets/es/guide_local_storage_dark.html b/app/src/main/assets/es/guide_local_storage_dark.html index ed1da432..8634221a 100644 --- a/app/src/main/assets/es/guide_local_storage_dark.html +++ b/app/src/main/assets/es/guide_local_storage_dark.html @@ -30,17 +30,17 @@

Las cookies de primera parte son cookies establecidas por la página web en la barra URL de la parte superior de la página.

-

From the early days of the internet, it became obvious that it would be advantageous for websites to be able to store information on a computer for future access. - For example, a website that displays weather information could ask the user for a zip code, and then store it in a cookie. - The next time the user visited the website, weather information would automatically load for that zip code, without the user having to enter it again.

+

Desde los primeros días de internet, se hizo evidente que sería ventajoso para las páginas web el poder almacenar información en un ordenador para un acceso futuro. + Por ejemplo, una página web que muestre información meteorológica podría solicitar al usuario un código postal y luego almacenarlo en una cookie. + La próxima vez que el usuario visite la página web, la información meteorológica se cargará automáticamente para ese código postal, sin que el usuario tenga que volver a introducirlo.

-

Like everything else on the web, clever people figured out all types of ways to abuse cookies to do things that users would not approve of if they knew they were happening. - For example, a website can set a cookie with a unique serial number on a device. - Then, every time a user visits the website on that device, it can be linked to a unique profile the server maintains for that serial number, - even if the device connects from different IP addresses.

+

Como todo en la web, gente inteligente descubrió todo tipo de maneras de abusar de las cookies para hacer cosas que los usuarios no aprobarían si supieran que estaban ocurriendo. + Por ejemplo, una página web puede establecer una cookie con un número de serie único en un dispositivo. + Luego, cada vez que un usuario visite la página web con ese dispositivo, puede vincularse a un perfil único que el servidor mantiene para ese número de serie, + incluso si el dispositivo se conecta desde diferentes direcciones IP.

-

Almost all websites with logins require first-party cookies to be enabled for a user to log in. - That is how they make sure it is still you as you move from page to page on the site, and is, in my opinion, one of the few legitimate uses for cookies.

+

Casi todas las páginas web con inicios de sesión requieren que las cookies de primera parte estén habilitadas para que el usuario pueda iniciar sesión. + Así es como se aseguran de que sigues siendo tu al moverte de una página a otra en el sitio, y es, en mi opinión, uno de los pocos usos legítimos de las cookies.

Si las cookies de primera parte están habilitadas pero Javascript está deshabilitado, el icono de privacidad será amarillo como advertencia.

@@ -69,24 +69,25 @@ A través del tiempo, compañías como Facebook (la cual también corre una red de anuncios) han construído un gran número de perfiles detallados sobre personas que ni siquiera han creado una cuenta en su web. -

There is no good reason to ever enable third-party cookies. On devices with Android KitKat or older (version <= 4.4.4 or API <= 20), WebView does not - differentiate - between first-party and third-party cookies. Thus, enabling first-party cookies will also enable third-party cookies.

+

No existe ninguna buena razón para habilitar cookies de terceras partes. En dispositivos con Android KitKat o anteriores (versión <= 4.4.4 o API <= 20), WebView no + distingue entre cookies de primera parte + y cookies de teceras partes. Por lo tanto, si se habilitan las cookies de primera parte también se habilitarán las de teceras partes.

Almacenamiento DOM

-

Document Object Model storage, also known as web storage, is like cookies on steroids. - Whereas the maximum combined storage size for all cookies from a single URL is 4 kilobytes, - DOM storage can hold megabytes per site. - Because DOM storage uses JavaScript to read and write data, it cannot be enabled unless JavaScript is also enabled.

+

Document Object Model storage (o Almacenamiento de modelos de objetos de documento), también conocido como almacenamiento web, es como cookies con esteroides. + Mientras que el tamaño máximo de almacenamiento combinado para todas las cookies de una única URL es de 4 kilobytes, el almacenamiento DOM puede contener + megabytes por sitio. + Ya que el almacenamiento DOM usa JavaScript para leer y escribir datos, no puede activarse a menos que JavaScript esté también activado.

Datos de formulario

-

Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. - Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. - Beginning in Android Oreo (8.0), WebView’s form data was replaced by the the Autofill service. - As such, controls for form data no longer appear on newer Android devices.

+

Los datos de formulario contienen información escrita en formularios web, como nombres de usuario, direcciones, números de teléfono, etc., y los enumera en un cuadro desplegable en futuras visitas. + A diferencia de las otras formas de almacenamiento local, los datos de los formularios no se envían al servidor web sin la interacción específica del usuario. + A partir de Android Oreo (8.0), los datos de formulario de WebView fueron reemplazados por el + servicio Autofill. + Como tal, los controles para los datos de formulario ya no aparecen en los dispositivos Android más nuevos.

\ No newline at end of file diff --git a/app/src/main/assets/es/guide_local_storage_light.html b/app/src/main/assets/es/guide_local_storage_light.html index 717ef9a5..9639c5f7 100644 --- a/app/src/main/assets/es/guide_local_storage_light.html +++ b/app/src/main/assets/es/guide_local_storage_light.html @@ -30,17 +30,17 @@

Las cookies de primera parte son cookies establecidas por la página web en la barra URL de la parte superior de la página.

-

From the early days of the internet, it became obvious that it would be advantageous for websites to be able to store information on a computer for future access. - For example, a website that displays weather information could ask the user for a zip code, and then store it in a cookie. - The next time the user visited the website, weather information would automatically load for that zip code, without the user having to enter it again.

+

Desde los primeros días de internet, se hizo evidente que sería ventajoso para las páginas web el poder almacenar información en un ordenador para un acceso futuro. + Por ejemplo, una página web que muestre información meteorológica podría solicitar al usuario un código postal y luego almacenarlo en una cookie. + La próxima vez que el usuario visite la página web, la información meteorológica se cargará automáticamente para ese código postal, sin que el usuario tenga que volver a introducirlo.

-

Like everything else on the web, clever people figured out all types of ways to abuse cookies to do things that users would not approve of if they knew they were happening. - For example, a website can set a cookie with a unique serial number on a device. - Then, every time a user visits the website on that device, it can be linked to a unique profile the server maintains for that serial number, - even if the device connects from different IP addresses.

+

Como todo en la web, gente inteligente descubrió todo tipo de maneras de abusar de las cookies para hacer cosas que los usuarios no aprobarían si supieran que estaban ocurriendo. + Por ejemplo, una página web puede establecer una cookie con un número de serie único en un dispositivo. + Luego, cada vez que un usuario visite la página web con ese dispositivo, puede vincularse a un perfil único que el servidor mantiene para ese número de serie, + incluso si el dispositivo se conecta desde diferentes direcciones IP.

-

Almost all websites with logins require first-party cookies to be enabled for a user to log in. - That is how they make sure it is still you as you move from page to page on the site, and is, in my opinion, one of the few legitimate uses for cookies.

+

Casi todas las páginas web con inicios de sesión requieren que las cookies de primera parte estén habilitadas para que el usuario pueda iniciar sesión. + Así es como se aseguran de que sigues siendo tu al moverte de una página a otra en el sitio, y es, en mi opinión, uno de los pocos usos legítimos de las cookies.

Si las cookies de primera parte están habilitadas pero Javascript está deshabilitado, el icono de privacidad será amarillo como advertencia.

@@ -69,23 +69,25 @@ A través del tiempo, compañías como Facebook (la cual también corre una red de anuncios) han construído un gran número de perfiles detallados sobre personas que ni siquiera han creado una cuenta en su web. -

There is no good reason to ever enable third-party cookies. On devices with Android KitKat or older (version <= 4.4.4 or API <= 20), WebView does not - differentiate - between first-party and third-party cookies. Thus, enabling first-party cookies will also enable third-party cookies.

+

No existe ninguna buena razón para habilitar cookies de terceras partes. En dispositivos con Android KitKat o anteriores (versión <= 4.4.4 o API <= 20), WebView no + distingue entre cookies de primera parte + y cookies de teceras partes. Por lo tanto, si se habilitan las cookies de primera parte también se habilitarán las de teceras partes.

Almacenamiento DOM

-

Document Object Model storage, also known as web storage, is like cookies on steroids. - Whereas the maximum combined storage size for all cookies from a single URL is 4 kilobytes, - DOM storage can hold megabytes per site. - Because DOM storage uses JavaScript to read and write data, it cannot be enabled unless JavaScript is also enabled.

+

Document Object Model storage (o Almacenamiento de modelos de objetos de documento), también conocido como almacenamiento web, es como cookies con esteroides. + Mientras que el tamaño máximo de almacenamiento combinado para todas las cookies de una única URL es de 4 kilobytes, el almacenamiento DOM puede contener + megabytes por sitio. + Ya que el almacenamiento DOM usa JavaScript para leer y escribir datos, no puede activarse a menos que JavaScript esté también activado.

+

Datos de formulario

-

Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. - Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. - Beginning in Android Oreo (8.0), WebView’s form data was replaced by the the Autofill service. - As such, controls for form data no longer appear on newer Android devices.

+

Los datos de formulario contienen información escrita en formularios web, como nombres de usuario, direcciones, números de teléfono, etc., y los enumera en un cuadro desplegable en futuras visitas. + A diferencia de las otras formas de almacenamiento local, los datos de los formularios no se envían al servidor web sin la interacción específica del usuario. + A partir de Android Oreo (8.0), los datos de formulario de WebView fueron reemplazados por el + servicio Autofill. + Como tal, los controles para los datos de formulario ya no aparecen en los dispositivos Android más nuevos.

\ No newline at end of file diff --git a/app/src/main/assets/es/guide_tor_dark.html b/app/src/main/assets/es/guide_tor_dark.html index c9651f5a..61a8f708 100644 --- a/app/src/main/assets/es/guide_tor_dark.html +++ b/app/src/main/assets/es/guide_tor_dark.html @@ -26,13 +26,15 @@ -

Tor y sus límites

+

Tor y sus límites

-

Existen dos categorías generales de malos actores que quieren infringir la privacidad de la web: gobiernos maliciosos con acceso a ISPs (Proveedores de Servicios de Internet) y grandes corporaciones que ofrecen redes sociales y de publicidad. - TOR (El Enrutador de Cebolla) es útil en proteger la privacidad de gobiernos maliciosos (que espían el tráfico en tránsito) pero no de grandes corporaciones (que incrustan código malicioso en los servidores web).

+

Existen dos categorías generales de malos actores que quieren infringir la privacidad de la web: + gobiernos maliciosos con acceso a ISPs (Proveedores de Servicios de Internet) y grandes corporaciones que ofrecen redes sociales y de publicidad. + TOR (El Enrutador de Cebolla) es útil en proteger la privacidad de gobiernos maliciosos (que espían el tráfico en tránsito) pero no de grandes corporaciones + (que incrustan código malicioso en los servidores web).

-

Gobiernos maliciosos

+

Gobiernos maliciosos

Los gobiernos maliciosos a menudo espían a sus ciudadanos para castigar la disidencia o la actividad de derechos humanos. Normalmente suelen operar los ISPs locales o los fuerzan a revelar información mostrando cada dirección IP que visita cada usuario. @@ -44,30 +46,36 @@ y los usuarios podrían ser castigados porque los gobiernos asumen que están haciendo algo prohibido. Por tanto, Tor puede ser útil, pero no es la panacea.

-

Grandes corporaciones

+

Grandes corporaciones

Cuando un usuario se conecta a un servidor web, éste puede ver la dirección IP del usuario. Aunque esto no es una ciencia perfecta, las direcciones IP se pueden convertir a direcciones físicas con bastante precisión. - Los pequeños servidores web normalmente se basan en las direcciones IP para identificar la ubicación de los usuarios que visitan su web. Tor es una buena solución para ocultar la ubicación del usuario de estos servidores. - Pero las más grandes corporaciones que poseen medios sociales y redes de publicidad usan un perfil completo de información diseñado para rastrear a los usuarios a través de los dispositivos y direcciones IP. - Estos perfiles emplean una variedad de técnicas para identificar a los usuarios, incluyendo Javascript, cookies, IDs de seguimiento, y huellas del navegador. + Los pequeños servidores web normalmente se basan en las direcciones IP para identificar la ubicación de los usuarios que visitan su web. + Tor es una buena solución para ocultar la ubicación del usuario de estos servidores. + Pero las más grandes corporaciones que poseen medios sociales y redes de publicidad usan un perfil completo de información diseñado + para rastrear a los usuarios a través de los dispositivos y direcciones IP. + Estos perfiles emplean una variedad de técnicas para identificar a los usuarios, incluyendo Javascript, cookies, IDs de seguimiento, + y huellas del navegador. Debido a que la gran mayoría de páginas web en internet, o cargan un anuncio de una de las principales redes, o integran iconos de medios sociales con su Javascript asociado, estas corporaciones han creado perfiles para casi todos los usuarios en línea y pueden rastrear su actividad en internet a través de sitios que no están relacionados.

Ellos rastrean cada sitio web visitado, todo lo que se compra, cada tarjeta de crédito que es usada para realizar una compra, cada dirección a la que se envían los artículos, y los metadatos GPS de cada imágen que se sube a internet. - Construyen un perfil de la edad del usuario, género, estado civil, dirección, afiliaciones políticas, afiliaciones religiosas, circunstancias familiares, número de mascotas, y cualquier otra cosa que caiga en sus manos. - Incluso compran bases de datos de transacciones con tarjeta de crédito en tiendas locales, para así poder rastrear de los usuarios en sus perfiles los patrones de compra que hacen cuando no están conectados. + Construyen un perfil de la edad del usuario, género, estado civil, dirección, afiliaciones políticas, afiliaciones religiosas, circunstancias familiares, número de mascotas, + y cualquier otra cosa que caiga en sus manos. + Incluso compran bases de datos de transacciones con tarjeta de crédito en tiendas locales, + para así poder rastrear de los usuarios en sus perfiles los patrones de compra que hacen cuando no están conectados. Debido a que ya tienen información de dirección mucho más precisa sobre un usuario que lo que pueda revelar una dirección IP, Tor no ofrece una verdadera protección de la privacidad contra las grandes corporaciones.

-

La única mejor protección de la privacidad contra las grandes corporaciones es navegar por la web con Javascript deshabilitado, seguido de bloquear redes publicitarias, inhabilitar cookies y almacenamiento DOM, - y usar un navegador del que sea difícil recoger huellas.

+

La única mejor protección de la privacidad contra las grandes corporaciones es navegar por la web con Javascript deshabilitado, seguido de bloquear redes publicitarias, + inhabilitar cookies y almacenamiento DOM, y usar un navegador del que sea difícil recoger huellas.

-

Usando Tor

+

Usando Tor

-

A pesar de sus limitaciones, Tor puede ser útil en algunas circunstancias. El proyecto Tor tiene una app para Android llamada Orbot, que está disponible en F-Droid y en todos los sitios donde se distribuye Navegador Privado. +

A pesar de sus limitaciones, Tor puede ser útil en algunas circunstancias. + El proyecto Tor tiene una app para Android llamada Orbot, que está disponible en F-Droid y en todos los sitios donde se distribuye Navegador Privado. Navegador Privado tiene un ajuste para usar Orbot como un proxy. Cuando se enciende, la barra de aplicaciones de Navegador Privado tendrá un fondo azul claro en lugar del gris claro por defecto. Cuando el ajuste proxy Orbot de Navegador Privado está habilitado, el acceso a internet no funcionará a menos que se esté ejecutando Orbot y esté conectado a Tor. Ya que el tráfico se está enrutando a través de varios nodos Tor, usar Tor es a menudo mucho más lento que conectar directamente a internet.

diff --git a/app/src/main/assets/es/guide_tor_light.html b/app/src/main/assets/es/guide_tor_light.html index 5896bbc0..ac6ea80e 100644 --- a/app/src/main/assets/es/guide_tor_light.html +++ b/app/src/main/assets/es/guide_tor_light.html @@ -26,13 +26,15 @@ -

Tor y sus límites

+

Tor y sus límites

-

Existen dos categorías generales de malos actores que quieren infringir la privacidad de la web: gobiernos maliciosos con acceso a ISPs (Proveedores de Servicios de Internet) y grandes corporaciones que ofrecen redes sociales y de publicidad. - TOR (El Enrutador de Cebolla) es útil en proteger la privacidad de gobiernos maliciosos (que espían el tráfico en tránsito) pero no de grandes corporaciones (que incrustan código malicioso en los servidores web).

+

Existen dos categorías generales de malos actores que quieren infringir la privacidad de la web: + gobiernos maliciosos con acceso a ISPs (Proveedores de Servicios de Internet) y grandes corporaciones que ofrecen redes sociales y de publicidad. + TOR (El Enrutador de Cebolla) es útil en proteger la privacidad de gobiernos maliciosos (que espían el tráfico en tránsito) pero no de grandes corporaciones + (que incrustan código malicioso en los servidores web).

-

Gobiernos maliciosos

+

Gobiernos maliciosos

Los gobiernos maliciosos a menudo espían a sus ciudadanos para castigar la disidencia o la actividad de derechos humanos. Normalmente suelen operar los ISPs locales o los fuerzan a revelar información mostrando cada dirección IP que visita cada usuario. @@ -44,30 +46,36 @@ y los usuarios podrían ser castigados porque los gobiernos asumen que están haciendo algo prohibido. Por tanto, Tor puede ser útil, pero no es la panacea.

-

Grandes corporaciones

+

Grandes corporaciones

Cuando un usuario se conecta a un servidor web, éste puede ver la dirección IP del usuario. Aunque esto no es una ciencia perfecta, las direcciones IP se pueden convertir a direcciones físicas con bastante precisión. - Los pequeños servidores web normalmente se basan en las direcciones IP para identificar la ubicación de los usuarios que visitan su web. Tor es una buena solución para ocultar la ubicación del usuario de estos servidores. - Pero las más grandes corporaciones que poseen medios sociales y redes de publicidad usan un perfil completo de información diseñado para rastrear a los usuarios a través de los dispositivos y direcciones IP. - Estos perfiles emplean una variedad de técnicas para identificar a los usuarios, incluyendo Javascript, cookies, IDs de seguimiento, y huellas del navegador. + Los pequeños servidores web normalmente se basan en las direcciones IP para identificar la ubicación de los usuarios que visitan su web. + Tor es una buena solución para ocultar la ubicación del usuario de estos servidores. + Pero las más grandes corporaciones que poseen medios sociales y redes de publicidad usan un perfil completo de información diseñado + para rastrear a los usuarios a través de los dispositivos y direcciones IP. + Estos perfiles emplean una variedad de técnicas para identificar a los usuarios, incluyendo Javascript, cookies, IDs de seguimiento, + y huellas del navegador. Debido a que la gran mayoría de páginas web en internet, o cargan un anuncio de una de las principales redes, o integran iconos de medios sociales con su Javascript asociado, estas corporaciones han creado perfiles para casi todos los usuarios en línea y pueden rastrear su actividad en internet a través de sitios que no están relacionados.

Ellos rastrean cada sitio web visitado, todo lo que se compra, cada tarjeta de crédito que es usada para realizar una compra, cada dirección a la que se envían los artículos, y los metadatos GPS de cada imágen que se sube a internet. - Construyen un perfil de la edad del usuario, género, estado civil, dirección, afiliaciones políticas, afiliaciones religiosas, circunstancias familiares, número de mascotas, y cualquier otra cosa que caiga en sus manos. - Incluso compran bases de datos de transacciones con tarjeta de crédito en tiendas locales, para así poder rastrear de los usuarios en sus perfiles los patrones de compra que hacen cuando no están conectados. + Construyen un perfil de la edad del usuario, género, estado civil, dirección, afiliaciones políticas, afiliaciones religiosas, circunstancias familiares, número de mascotas, + y cualquier otra cosa que caiga en sus manos. + Incluso compran bases de datos de transacciones con tarjeta de crédito en tiendas locales, + para así poder rastrear de los usuarios en sus perfiles los patrones de compra que hacen cuando no están conectados. Debido a que ya tienen información de dirección mucho más precisa sobre un usuario que lo que pueda revelar una dirección IP, Tor no ofrece una verdadera protección de la privacidad contra las grandes corporaciones.

-

La única mejor protección de la privacidad contra las grandes corporaciones es navegar por la web con Javascript deshabilitado, seguido de bloquear redes publicitarias, inhabilitar cookies y almacenamiento DOM, - y usar un navegador del que sea difícil recoger huellas.

+

La única mejor protección de la privacidad contra las grandes corporaciones es navegar por la web con Javascript deshabilitado, seguido de bloquear redes publicitarias, + inhabilitar cookies y almacenamiento DOM, y usar un navegador del que sea difícil recoger huellas.

-

Usando Tor

+

Usando Tor

-

A pesar de sus limitaciones, Tor puede ser útil en algunas circunstancias. El proyecto Tor tiene una app para Android llamada Orbot, que está disponible en F-Droid y en todos los sitios donde se distribuye Navegador Privado. +

A pesar de sus limitaciones, Tor puede ser útil en algunas circunstancias. + El proyecto Tor tiene una app para Android llamada Orbot, que está disponible en F-Droid y en todos los sitios donde se distribuye Navegador Privado. Navegador Privado tiene un ajuste para usar Orbot como un proxy. Cuando se enciende, la barra de aplicaciones de Navegador Privado tendrá un fondo azul claro en lugar del gris claro por defecto. Cuando el ajuste proxy Orbot de Navegador Privado está habilitado, el acceso a internet no funcionará a menos que se esté ejecutando Orbot y esté conectado a Tor. Ya que el tráfico se está enrutando a través de varios nodos Tor, usar Tor es a menudo mucho más lento que conectar directamente a internet.

diff --git a/app/src/main/assets/es/guide_user_agent_dark.html b/app/src/main/assets/es/guide_user_agent_dark.html index 1ded2f82..110745c0 100644 --- a/app/src/main/assets/es/guide_user_agent_dark.html +++ b/app/src/main/assets/es/guide_user_agent_dark.html @@ -32,7 +32,7 @@ El servidor web puede usar esta información para decidir qué versión de página web enviar al navegador. Por ejemplo, muchas páginas web tienen diferentes versiones para escritorio y para navegadores móviles.

-

Por defecto, Navegador Privado usa su propio agente de usuario, que es PrivacyBrowser/1.0. Éste envía un mínimo de información al servidor web. +

Por defecto, Navegador Privado usa su propio agente de usuario, que es PrivacyBrowser/1.0. Éste envía un mínimo de información al servidor web. Ya que los servidores web no lo reconocen como un agente de usuario móvil, lo que normalmente muestran es la versión de escritorio del sitio.

En comparación, el agente de usuario por defecto de WebView divulga una gran cantidad de información sobre el hardware y el software del dispositivo. @@ -53,7 +53,7 @@

Existen varios agentes de usuario preestablecidos que coinciden con los más comunes navegadores y sistemas operativos. A los efectos de huellas del navegador, todo lo que sea extraño es más fácil de rastrear. - Si Navegador Privado se vuelve común y mucha gente usa PrivacyBrowser/1.0 como su usuario de agente, será entonces una buena elección para su privacidad. + Si Navegador Privado se vuelve común y mucha gente usa PrivacyBrowser/1.0 como su usuario de agente, será entonces una buena elección para su privacidad. Firefox o Chrome son los usuarios de agente más comunes, pero se actualizan automáticamente y sus números de versión cambian tan rápidamente que es probable que los usuarios de agente incluídos en Privacy Browser no estén ya en sintonía con la mayoría de agentes de usuario en los registros del servidor.

diff --git a/app/src/main/assets/es/guide_user_agent_light.html b/app/src/main/assets/es/guide_user_agent_light.html index 4190fa3b..d9eceec1 100644 --- a/app/src/main/assets/es/guide_user_agent_light.html +++ b/app/src/main/assets/es/guide_user_agent_light.html @@ -32,7 +32,7 @@ El servidor web puede usar esta información para decidir qué versión de página web enviar al navegador. Por ejemplo, muchas páginas web tienen diferentes versiones para escritorio y para navegadores móviles.

-

Por defecto, Navegador Privado usa su propio agente de usuario, que es PrivacyBrowser/1.0. Éste envía un mínimo de información al servidor web. +

Por defecto, Navegador Privado usa su propio agente de usuario, que es PrivacyBrowser/1.0. Éste envía un mínimo de información al servidor web. Ya que los servidores web no lo reconocen como un agente de usuario móvil, lo que normalmente muestran es la versión de escritorio del sitio.

En comparación, el agente de usuario por defecto de WebView divulga una gran cantidad de información sobre el hardware y el software del dispositivo. @@ -53,7 +53,7 @@

Existen varios agentes de usuario preestablecidos que coinciden con los más comunes navegadores y sistemas operativos. A los efectos de huellas del navegador, todo lo que sea extraño es más fácil de rastrear. - Si Navegador Privado se vuelve común y mucha gente usa PrivacyBrowser/1.0 como su usuario de agente, será entonces una buena elección para su privacidad. + Si Navegador Privado se vuelve común y mucha gente usa PrivacyBrowser/1.0 como su usuario de agente, será entonces una buena elección para su privacidad. Firefox o Chrome son los usuarios de agente más comunes, pero se actualizan automáticamente y sus números de versión cambian tan rápidamente que es probable que los usuarios de agente incluídos en Privacy Browser no estén ya en sintonía con la mayoría de agentes de usuario en los registros del servidor.

diff --git a/app/src/main/assets/it/about_licenses_dark.html b/app/src/main/assets/it/about_licenses_dark.html index bffcdc26..349622fc 100644 --- a/app/src/main/assets/it/about_licenses_dark.html +++ b/app/src/main/assets/it/about_licenses_dark.html @@ -139,6 +139,7 @@

vertical_align_bottom.

vertical_align_top.

visibility_off.

+

vpn_key.

vpn_lock.

web.

diff --git a/app/src/main/assets/it/about_licenses_light.html b/app/src/main/assets/it/about_licenses_light.html index f8cf92dc..94b949be 100644 --- a/app/src/main/assets/it/about_licenses_light.html +++ b/app/src/main/assets/it/about_licenses_light.html @@ -139,6 +139,7 @@

vertical_align_bottom.

vertical_align_top.

visibility_off.

+

vpn_key.

vpn_lock.

web.

diff --git a/app/src/main/assets/it/guide_bookmarks_dark.html b/app/src/main/assets/it/guide_bookmarks_dark.html index 494db88e..9604beb0 100644 --- a/app/src/main/assets/it/guide_bookmarks_dark.html +++ b/app/src/main/assets/it/guide_bookmarks_dark.html @@ -26,17 +26,14 @@ -

Segnalibri

+

Segnalibri

E' possibile visualizzare i segnalibri attraverso un cassetto che si apre scorrendo dal lato destro dello schermo.

-

Toccando il pulsante flottante più in alto si apre la schermata principale dei segnalibri. - In questo modo sono disponibili diverse opzioni avanzate come lo spostamento e l'eliminazione dei segnalibri. - Attraverso la schermata principale dei segnalibri è anche possibile caricare la vista del database. - In questo modo è possibile visualizzare i segnalibri come sono memorizzati nel database SQLite. - Questo è utile soprattutto per la risoluzione di problemi o per funzioni avanzate come ad esempio l'importazione e - l'esportazione dei segnalibri quando tali funzioni saranno state implementate.

+

Tapping the top floating action button loads the bookmarks activity, which has advanced options like moving and deleting bookmarks. + From the bookmarks activity, there is an option to load the bookmarks database view. + This shows the bookmarks as they exist in the SQLite database, which can be useful for troubleshooting problems with importing and exporting bookmarks.

\ No newline at end of file diff --git a/app/src/main/assets/it/guide_bookmarks_light.html b/app/src/main/assets/it/guide_bookmarks_light.html index da6da667..4bd767a7 100644 --- a/app/src/main/assets/it/guide_bookmarks_light.html +++ b/app/src/main/assets/it/guide_bookmarks_light.html @@ -32,11 +32,8 @@ -

Toccando il pulsante flottante più in alto si apre la schermata principale dei segnalibri. - In questo modo sono disponibili diverse opzioni avanzate come lo spostamento e l'eliminazione dei segnalibri. - Attraverso la schermata principale dei segnalibri è anche possibile caricare la vista del database. - In questo modo è possibile visualizzare i segnalibri come sono memorizzati nel database SQLite. - Questo è utile soprattutto per la risoluzione di problemi o per funzioni avanzate come ad esempio l'importazione e - l'esportazione dei segnalibri quando tali funzioni saranno state implementate.

+

Tapping the top floating action button loads the bookmarks activity, which has advanced options like moving and deleting bookmarks. + From the bookmarks activity, there is an option to load the bookmarks database view. + This shows the bookmarks as they exist in the SQLite database, which can be useful for troubleshooting problems with importing and exporting bookmarks.

\ No newline at end of file diff --git a/app/src/main/assets/it/guide_local_storage_dark.html b/app/src/main/assets/it/guide_local_storage_dark.html index db958238..320b24a5 100644 --- a/app/src/main/assets/it/guide_local_storage_dark.html +++ b/app/src/main/assets/it/guide_local_storage_dark.html @@ -86,7 +86,7 @@

Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. - Beginning in Android Oreo (8.0), WebView’s form data was replaced by the the Autofill service. + Beginning in Android Oreo (8.0), WebView’s form data was replaced by the Autofill service. As such, controls for form data no longer appear on newer Android devices.

\ No newline at end of file diff --git a/app/src/main/assets/it/guide_local_storage_light.html b/app/src/main/assets/it/guide_local_storage_light.html index 443b0a56..9c7859e1 100644 --- a/app/src/main/assets/it/guide_local_storage_light.html +++ b/app/src/main/assets/it/guide_local_storage_light.html @@ -86,7 +86,7 @@

Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. - Beginning in Android Oreo (8.0), WebView’s form data was replaced by the the Autofill service. + Beginning in Android Oreo (8.0), WebView’s form data was replaced by the Autofill service. As such, controls for form data no longer appear on newer Android devices.

\ No newline at end of file diff --git a/app/src/main/assets/it/guide_tor_dark.html b/app/src/main/assets/it/guide_tor_dark.html index 8202af76..a429b787 100644 --- a/app/src/main/assets/it/guide_tor_dark.html +++ b/app/src/main/assets/it/guide_tor_dark.html @@ -26,61 +26,54 @@ -

Tor e i suoi limiti

+

Tor e i suoi limiti

Esistono due categorie generali di cattivi soggetti che vogliono violare la privacy del web: governi maliziosi con accesso agli ISP (Internet Service Providers) e mega corporations che gestiscono social network e agenzie pubblicitarie. TOR (The Onion Router) è utile per proteggere la privacy dai governi maliziosi (che spiano il traffico in transito) ma non dalle mega corporations (che mettono codice maligno sui web server).

-

Governi Maliziosi

+

Governi Maliziosi

-

I governi malizionsi spesso spiano i loro cittadini per punire il dissenso o le attività di difesa dei diritti umani. Solitamente, - o gestiscono loro stessi gli ISP locali oppure li obbligano a rivelare informazioni mostrando tutti gli indirizzi IP visitati da ciascun utente. - Tor è progettato per combattere questa modalità di violazione della privacy perchè cripta il traffico - dei dispositivi e lo indirizza verso tre internet server distinti prima di inviarlo alla destinazione finale. - Questo significa che nessun ISP, server, o sito web, può conoscere l'indirizzo IP dei dispositivi - e nemmeno l'indirizzo IP del server di destinazione. I governi malizionsi e gli ISP che essi controllano non possono sapere a quale - web server gli utenti stiano accedendo, nonostante sappiano che gli utenti stanno utilizzando Tor. In alcune parti del mondo l'utilizzo di Tor - potrebbe essere visto come prova di un comportamento illegale (se non si avesse nulla da nascondere non sarebbe necessario criptare - il proprio traffico) e gli utenti potrebbero essere perseguiti perchè i governi presumerebbero l'esistenza di qualche azione illegale. - Pertanto Tor può essere utile, ma non è la soluzione definitiva.

+

I governi malizionsi spesso spiano i loro cittadini per punire il dissenso o le attività di difesa dei diritti umani. + Solitamente, o gestiscono loro stessi gli ISP locali oppure li obbligano a rivelare informazioni mostrando tutti gli indirizzi IP visitati da ciascun utente. + Tor è progettato per combattere questa modalità di violazione della privacy perchè cripta il traffico dei dispositivi e lo indirizza verso tre internet server + distinti prima di inviarlo alla destinazione finale. + Questo significa che nessun ISP, server, o sito web, può conoscere l'indirizzo IP dei dispositivi e nemmeno l'indirizzo IP del server di destinazione. + I governi malizionsi e gli ISP che essi controllano non possono sapere a quale web server gli utenti stiano accedendo, nonostante sappiano che gli utenti stanno utilizzando Tor. + In alcune parti del mondo l'utilizzo di Tor potrebbe essere visto come prova di un comportamento illegale (se non si avesse nulla da nascondere non sarebbe necessario criptare il proprio traffico) + e gli utenti potrebbero essere perseguiti perchè i governi presumerebbero l'esistenza di qualche azione illegale. Pertanto Tor può essere utile, ma non è la soluzione definitiva.

-

Mega corporations

+

Mega corporations

-

Quando un utente si connette a un web server, il server può vedere l'indirizzo IP dell'utente. Nonostante non sia una scienza esatta, - è possibile convertire l'IP in indirizzi fisici con discreta accuratezza. - I piccoli web server generalmente si affidano agli indirizzi IP per identificare la posizione degli utenti collegati al sito. - Tor è una buona soluzione per nascondere la posizione a questi server. Le mega corporations proprietarie di - social media e agenzie pubblicitarie utilizzano però un intero profilo di informazioni con lo scopo di tracciare gli utenti - sui dispositivi e sgli indirizzi IP. Questi profili utilizzano molte tecniche diverse per l'identificazione degli utenti, tra cui JavaScript, - cookie, ID traccianti, e impronta digitale dei browser. Siccome la maggior parte - dei siti web carica gli annunci da una delle principali agenzie o inserisce le icone dei social media e i relativi javascript, +

Quando un utente si connette a un web server, il server può vedere l'indirizzo IP dell'utente. + Nonostante non sia una scienza esatta, è possibile convertire l'IP in indirizzi fisici con discreta accuratezza. + I piccoli web server generalmente si affidano agli indirizzi IP per identificare la posizione degli utenti collegati al sito. Tor è una buona soluzione per nascondere la posizione a questi server. + Le mega corporations proprietarie di social media e agenzie pubblicitarie utilizzano però un intero profilo di informazioni con lo scopo di tracciare gli utenti sui dispositivi e sgli indirizzi IP. + Questi profili utilizzano molte tecniche diverse per l'identificazione degli utenti, tra cui JavaScript, cookie, ID traccianti, + e impronta digitale dei browser. + Siccome la maggior parte dei siti web carica gli annunci da una delle principali agenzie o inserisce le icone dei social media e i relativi javascript, costruiscono profili per quasi tutti gli utenti e possono tracciare la loro attività su internet anche se relativa a altri siti.

-

Viene tracciato ogni sito visitato, ogni acquisto effettuato, ogni carta di credito utilizzata, ogni indirizzo di spedizione, - i metadati GPS di ogni immagine che viene caricata su internet. - Viene costruito il profilo per età, sesso, stato civile, indirizzo, appartenenza politica, - religione, situazione familiare, animali domestici, e tutto ciò su cui possono mettere le mani. - Le corporations acquistano anche i database delle transazioni con carta di credito effettuate nei negozi, per poter tracciare anche le - abitudini di acquisto off-line degli utenti nei loro profili. Dal momento che sono già in possesso di informazioni molto più - accurate sulla localizzazione di un utente rispetto a quanto ottenibile tramite indirizzo IP, +

Viene tracciato ogni sito visitato, ogni acquisto effettuato, ogni carta di credito utilizzata, ogni indirizzo di spedizione, i metadati GPS di ogni immagine che viene caricata su internet. + Viene costruito il profilo per età, sesso, stato civile, indirizzo, appartenenza politica, religione, situazione familiare, animali domestici, e tutto ciò su cui possono mettere le mani. + Le corporations acquistano anche i database delle transazioni con carta di credito effettuate nei negozi, per poter tracciare anche le abitudini di acquisto off-line degli utenti nei loro profili. + Dal momento che sono già in possesso di informazioni molto più accurate sulla localizzazione di un utente rispetto a quanto ottenibile tramite indirizzo IP, Tor non fornisce alcuna protezione sulla privacy contro le mega corporations.

-

La miglior protezione per la privacy contro le mega corporations è quella di navigare con JavaScript disabilitato, - seguita dal bloccare gli annunci pubblicitari, disabilitare i cookie e il DOM storage, e utilizzare un browser di cui è difficile avere l'impronta digitale.

+

La miglior protezione per la privacy contro le mega corporations è quella di navigare con JavaScript disabilitato, seguita dal bloccare gli annunci pubblicitari, + disabilitare i cookie e il DOM storage, e utilizzare un browser di cui è difficile avere l'impronta digitale.

-

Utilizzo di Tor

+

Utilizzo di Tor

-

Nonostante le sue limitazioni, in alcune circostanze Tor può essere utile. Il progetto Tor ha sviluppato una app per Android chiamata Orbot, - disponibile su F-Droid +

Nonostante le sue limitazioni, in alcune circostanze Tor può essere utile. + Il progetto Tor ha sviluppato una app per Android chiamata Orbot, disponibile su F-Droid e ovunque sia distribuito Privacy Browser. Privacy Browser è dotato di una impostazione per utilizzare come proxy Orbot. Quando lo si abilita, la barra principale di Privacy Browser diventa di colore azzurro chiaro al posto del grigio di default. - Quando il proxy con Orbot è abilitato nelle impostazioni di Privacy Browser, l'accesso a internet non sarà possibile a meno che - Orbot non sia in funzione e connessa a Tor. Dal momento che il traffico transita attraverso diversi nodi Tor - la connessione è spesso più lenta di una connessione a internet diretta.

+ Quando il proxy con Orbot è abilitato nelle impostazioni di Privacy Browser, l'accesso a internet non sarà possibile a meno che Orbot non sia in funzione e connessa a Tor. + Dal momento che il traffico transita attraverso diversi nodi Tor la connessione è spesso più lenta di una connessione a internet diretta.

diff --git a/app/src/main/assets/it/guide_tor_light.html b/app/src/main/assets/it/guide_tor_light.html index 87013687..f14bccf4 100644 --- a/app/src/main/assets/it/guide_tor_light.html +++ b/app/src/main/assets/it/guide_tor_light.html @@ -26,61 +26,54 @@ -

Tor e i suoi limiti

+

Tor e i suoi limiti

Esistono due categorie generali di cattivi soggetti che vogliono violare la privacy del web: governi maliziosi con accesso agli ISP (Internet Service Providers) e mega corporations che gestiscono social network e agenzie pubblicitarie. TOR (The Onion Router) è utile per proteggere la privacy dai governi maliziosi (che spiano il traffico in transito) ma non dalle mega corporations (che mettono codice maligno sui web server).

-

Governi Maliziosi

+

Governi Maliziosi

-

I governi malizionsi spesso spiano i loro cittadini per punire il dissenso o le attività di difesa dei diritti umani. Solitamente, - o gestiscono loro stessi gli ISP locali oppure li obbligano a rivelare informazioni mostrando tutti gli indirizzi IP visitati da ciascun utente. - Tor è progettato per combattere questa modalità di violazione della privacy perchè cripta il traffico - dei dispositivi e lo indirizza verso tre internet server distinti prima di inviarlo alla destinazione finale. - Questo significa che nessun ISP, server, o sito web, può conoscere l'indirizzo IP dei dispositivi - e nemmeno l'indirizzo IP del server di destinazione. I governi malizionsi e gli ISP che essi controllano non possono sapere a quale - web server gli utenti stiano accedendo, nonostante sappiano che gli utenti stanno utilizzando Tor. In alcune parti del mondo l'utilizzo di Tor - potrebbe essere visto come prova di un comportamento illegale (se non si avesse nulla da nascondere non sarebbe necessario criptare - il proprio traffico) e gli utenti potrebbero essere perseguiti perchè i governi presumerebbero l'esistenza di qualche azione illegale. - Pertanto Tor può essere utile, ma non è la soluzione definitiva.

+

I governi malizionsi spesso spiano i loro cittadini per punire il dissenso o le attività di difesa dei diritti umani. + Solitamente, o gestiscono loro stessi gli ISP locali oppure li obbligano a rivelare informazioni mostrando tutti gli indirizzi IP visitati da ciascun utente. + Tor è progettato per combattere questa modalità di violazione della privacy perchè cripta il traffico dei dispositivi e lo indirizza verso tre internet server + distinti prima di inviarlo alla destinazione finale. + Questo significa che nessun ISP, server, o sito web, può conoscere l'indirizzo IP dei dispositivi e nemmeno l'indirizzo IP del server di destinazione. + I governi malizionsi e gli ISP che essi controllano non possono sapere a quale web server gli utenti stiano accedendo, nonostante sappiano che gli utenti stanno utilizzando Tor. + In alcune parti del mondo l'utilizzo di Tor potrebbe essere visto come prova di un comportamento illegale (se non si avesse nulla da nascondere non sarebbe necessario criptare il proprio traffico) + e gli utenti potrebbero essere perseguiti perchè i governi presumerebbero l'esistenza di qualche azione illegale. Pertanto Tor può essere utile, ma non è la soluzione definitiva.

-

Mega corporations

+

Mega corporations

-

Quando un utente si connette a un web server, il server può vedere l'indirizzo IP dell'utente. Nonostante non sia una scienza esatta, - è possibile convertire l'IP in indirizzi fisici con discreta accuratezza. - I piccoli web server generalmente si affidano agli indirizzi IP per identificare la posizione degli utenti collegati al sito. - Tor è una buona soluzione per nascondere la posizione a questi server. Le mega corporations proprietarie di - social media e agenzie pubblicitarie utilizzano però un intero profilo di informazioni con lo scopo di tracciare gli utenti - sui dispositivi e sgli indirizzi IP. Questi profili utilizzano molte tecniche diverse per l'identificazione degli utenti, tra cui JavaScript, - cookie, ID traccianti, e impronta digitale dei browser. Siccome la maggior parte - dei siti web carica gli annunci da una delle principali agenzie o inserisce le icone dei social media e i relativi javascript, +

Quando un utente si connette a un web server, il server può vedere l'indirizzo IP dell'utente. + Nonostante non sia una scienza esatta, è possibile convertire l'IP in indirizzi fisici con discreta accuratezza. + I piccoli web server generalmente si affidano agli indirizzi IP per identificare la posizione degli utenti collegati al sito. Tor è una buona soluzione per nascondere la posizione a questi server. + Le mega corporations proprietarie di social media e agenzie pubblicitarie utilizzano però un intero profilo di informazioni con lo scopo di tracciare gli utenti sui dispositivi e sgli indirizzi IP. + Questi profili utilizzano molte tecniche diverse per l'identificazione degli utenti, tra cui JavaScript, cookie, ID traccianti, + e impronta digitale dei browser. + Siccome la maggior parte dei siti web carica gli annunci da una delle principali agenzie o inserisce le icone dei social media e i relativi javascript, costruiscono profili per quasi tutti gli utenti e possono tracciare la loro attività su internet anche se relativa a altri siti.

-

Viene tracciato ogni sito visitato, ogni acquisto effettuato, ogni carta di credito utilizzata, ogni indirizzo di spedizione, - i metadati GPS di ogni immagine che viene caricata su internet. - Viene costruito il profilo per età, sesso, stato civile, indirizzo, appartenenza politica, - religione, situazione familiare, animali domestici, e tutto ciò su cui possono mettere le mani. - Le corporations acquistano anche i database delle transazioni con carta di credito effettuate nei negozi, per poter tracciare anche le - abitudini di acquisto off-line degli utenti nei loro profili. Dal momento che sono già in possesso di informazioni molto più - accurate sulla localizzazione di un utente rispetto a quanto ottenibile tramite indirizzo IP, +

Viene tracciato ogni sito visitato, ogni acquisto effettuato, ogni carta di credito utilizzata, ogni indirizzo di spedizione, i metadati GPS di ogni immagine che viene caricata su internet. + Viene costruito il profilo per età, sesso, stato civile, indirizzo, appartenenza politica, religione, situazione familiare, animali domestici, e tutto ciò su cui possono mettere le mani. + Le corporations acquistano anche i database delle transazioni con carta di credito effettuate nei negozi, per poter tracciare anche le abitudini di acquisto off-line degli utenti nei loro profili. + Dal momento che sono già in possesso di informazioni molto più accurate sulla localizzazione di un utente rispetto a quanto ottenibile tramite indirizzo IP, Tor non fornisce alcuna protezione sulla privacy contro le mega corporations.

-

La miglior protezione per la privacy contro le mega corporations è quella di navigare con JavaScript disabilitato, - seguita dal bloccare gli annunci pubblicitari, disabilitare i cookie e il DOM storage, e utilizzare un browser di cui è difficile avere l'impronta digitale.

+

La miglior protezione per la privacy contro le mega corporations è quella di navigare con JavaScript disabilitato, seguita dal bloccare gli annunci pubblicitari, + disabilitare i cookie e il DOM storage, e utilizzare un browser di cui è difficile avere l'impronta digitale.

-

Utilizzo di Tor

+

Utilizzo di Tor

-

Nonostante le sue limitazioni, in alcune circostanze Tor può essere utile. Il progetto Tor ha sviluppato una app per Android chiamata Orbot, - disponibile su F-Droid +

Nonostante le sue limitazioni, in alcune circostanze Tor può essere utile. + Il progetto Tor ha sviluppato una app per Android chiamata Orbot, disponibile su F-Droid e ovunque sia distribuito Privacy Browser. Privacy Browser è dotato di una impostazione per utilizzare come proxy Orbot. Quando lo si abilita, la barra principale di Privacy Browser diventa di colore azzurro chiaro al posto del grigio di default. - Quando il proxy con Orbot è abilitato nelle impostazioni di Privacy Browser, l'accesso a internet non sarà possibile a meno che - Orbot non sia in funzione e connessa a Tor. Dal momento che il traffico transita attraverso diversi nodi Tor - la connessione è spesso più lenta di una connessione a internet diretta.

+ Quando il proxy con Orbot è abilitato nelle impostazioni di Privacy Browser, l'accesso a internet non sarà possibile a meno che Orbot non sia in funzione e connessa a Tor. + Dal momento che il traffico transita attraverso diversi nodi Tor la connessione è spesso più lenta di una connessione a internet diretta.

diff --git a/app/src/main/assets/it/guide_user_agent_dark.html b/app/src/main/assets/it/guide_user_agent_dark.html index 61bd29bc..acfbdaf5 100644 --- a/app/src/main/assets/it/guide_user_agent_dark.html +++ b/app/src/main/assets/it/guide_user_agent_dark.html @@ -32,7 +32,7 @@ Il web server può utilizzare tali informazioni per decidere quale versione del sito inviare al browser. Molti siti web infatti sono disponibili in versioni diverse a seconda che vi si acceda con browser da PC (desktop) o da dispositivo mobile.

-

Per default Privacy Browser utilizza un proprio user agent (o identificazione), ovvero PrivacyBrowser/1.0. Questo invia un set minimo di informazioni al web server. +

Per default Privacy Browser utilizza un proprio user agent (o identificazione), ovvero PrivacyBrowser/1.0. Questo invia un set minimo di informazioni al web server. Dal momento che i web server non lo riconoscono come uno user agent di un dispositivo mobile, generalmente inviano la versione desktop del sito.

In confronto, lo user agent di default di WebView invia una grande quantità di informazioni sull'hardware e sul software del dispositivo. @@ -52,7 +52,7 @@

Sono disponibili diversi user agent predefiniti che identificano i browser e i sistemi operativi più comuni. Dal punto di vista dell'impronta digitale del browser, più è rara, più è facile da tracciare. - Nel caso in cui Privacy Browser diventi di uso comune, e molti utenti utilizzino PrivacyBrowser/1.0 come user agent, sarà una buona scelta dal punto di vista della privacy. + Nel caso in cui Privacy Browser diventi di uso comune, e molti utenti utilizzino PrivacyBrowser/1.0 come user agent, sarà una buona scelta dal punto di vista della privacy. Firefox o Chrome sono gli user agents più comuni, ma vengono aggiornati spesso e il loro numero di versione cambia così di frequente che lo user agent incluso in Privacy Browser molto facilmente sarà rimasto indietro rispetto alla maggior parte degli user agent tracciati nei log dei server.

diff --git a/app/src/main/assets/it/guide_user_agent_light.html b/app/src/main/assets/it/guide_user_agent_light.html index 2dcd370e..67091400 100644 --- a/app/src/main/assets/it/guide_user_agent_light.html +++ b/app/src/main/assets/it/guide_user_agent_light.html @@ -32,7 +32,7 @@ Il web server può utilizzare tali informazioni per decidere quale versione del sito inviare al browser. Molti siti web infatti sono disponibili in versioni diverse a seconda che vi si acceda con browser da PC (desktop) o da dispositivo mobile.

-

Per default Privacy Browser utilizza un proprio user agent (o identificazione), ovvero PrivacyBrowser/1.0. Questo invia un set minimo di informazioni al web server. +

Per default Privacy Browser utilizza un proprio user agent (o identificazione), ovvero PrivacyBrowser/1.0. Questo invia un set minimo di informazioni al web server. Dal momento che i web server non lo riconoscono come uno user agent di un dispositivo mobile, generalmente inviano la versione desktop del sito.

In confronto, lo user agent di default di WebView invia una grande quantità di informazioni sull'hardware e sul software del dispositivo. @@ -52,7 +52,7 @@

Sono disponibili diversi user agent predefiniti che identificano i browser e i sistemi operativi più comuni. Dal punto di vista dell'impronta digitale del browser, più è rara, più è facile da tracciare. - Nel caso in cui Privacy Browser diventi di uso comune, e molti utenti utilizzino PrivacyBrowser/1.0 come user agent, sarà una buona scelta dal punto di vista della privacy. + Nel caso in cui Privacy Browser diventi di uso comune, e molti utenti utilizzino PrivacyBrowser/1.0 come user agent, sarà una buona scelta dal punto di vista della privacy. Firefox o Chrome sono gli user agents più comuni, ma vengono aggiornati spesso e il loro numero di versione cambia così di frequente che lo user agent incluso in Privacy Browser molto facilmente sarà rimasto indietro rispetto alla maggior parte degli user agent tracciati nei log dei server.

diff --git a/app/src/main/assets/ru/about_licenses_dark.html b/app/src/main/assets/ru/about_licenses_dark.html index b5fe7ae5..7d1f59b4 100644 --- a/app/src/main/assets/ru/about_licenses_dark.html +++ b/app/src/main/assets/ru/about_licenses_dark.html @@ -132,6 +132,7 @@

vertical_align_bottom.

vertical_align_top.

visibility_off.

+

vpn_key.

vpn_lock.

web.

diff --git a/app/src/main/assets/ru/about_licenses_light.html b/app/src/main/assets/ru/about_licenses_light.html index 264f0d52..8b2c3f5c 100644 --- a/app/src/main/assets/ru/about_licenses_light.html +++ b/app/src/main/assets/ru/about_licenses_light.html @@ -132,6 +132,7 @@

vertical_align_bottom.

vertical_align_top.

visibility_off.

+

vpn_key.

vpn_lock.

web.

diff --git a/app/src/main/assets/ru/guide_bookmarks_dark.html b/app/src/main/assets/ru/guide_bookmarks_dark.html index 58bedef8..51adecaf 100644 --- a/app/src/main/assets/ru/guide_bookmarks_dark.html +++ b/app/src/main/assets/ru/guide_bookmarks_dark.html @@ -24,15 +24,14 @@ -

Закладки

+

Закладки

К закладкам можно получить доступ из боковой панели, выполнив свайп от правой части экрана.

-

Нажатие верхней плавающей кнопки открывает панель закладок, на которой доступны операции по перемещению и удалению закладок. Из этой панели также возможен доступ к базе данных закладок. - Закладки отображаются в том же виде, в каком они существуют в базе данных SQLite. - Это будет полезно для устранения неполадок с импортом и экспортом закладок, - когда эта функция будет добавлена.

+

Tapping the top floating action button loads the bookmarks activity, which has advanced options like moving and deleting bookmarks. + From the bookmarks activity, there is an option to load the bookmarks database view. + This shows the bookmarks as they exist in the SQLite database, which can be useful for troubleshooting problems with importing and exporting bookmarks.

\ No newline at end of file diff --git a/app/src/main/assets/ru/guide_bookmarks_light.html b/app/src/main/assets/ru/guide_bookmarks_light.html index c7bb1865..9e382346 100644 --- a/app/src/main/assets/ru/guide_bookmarks_light.html +++ b/app/src/main/assets/ru/guide_bookmarks_light.html @@ -24,15 +24,14 @@ -

Закладки

+

Закладки

К закладкам можно получить доступ из боковой панели, выполнив свайп от правой части экрана.

-

Нажатие верхней плавающей кнопки открывает панель закладок, на которой доступны операции по перемещению и удалению закладок. Из этой панели также возможен доступ к базе данных закладок. - Закладки отображаются в том же виде, в каком они существуют в базе данных SQLite. - Это будет полезно для устранения неполадок с импортом и экспортом закладок, - когда эта функция будет добавлена.

+

Tapping the top floating action button loads the bookmarks activity, which has advanced options like moving and deleting bookmarks. + From the bookmarks activity, there is an option to load the bookmarks database view. + This shows the bookmarks as they exist in the SQLite database, which can be useful for troubleshooting problems with importing and exporting bookmarks.

\ No newline at end of file diff --git a/app/src/main/assets/ru/guide_local_storage_dark.html b/app/src/main/assets/ru/guide_local_storage_dark.html index 02b29626..4ac2ba0a 100644 --- a/app/src/main/assets/ru/guide_local_storage_dark.html +++ b/app/src/main/assets/ru/guide_local_storage_dark.html @@ -85,7 +85,7 @@

Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. - Beginning in Android Oreo (8.0), WebView’s form data was replaced by the the Autofill service. + Beginning in Android Oreo (8.0), WebView’s form data was replaced by the Autofill service. As such, controls for form data no longer appear on newer Android devices.

\ No newline at end of file diff --git a/app/src/main/assets/ru/guide_local_storage_light.html b/app/src/main/assets/ru/guide_local_storage_light.html index da1c9faf..4a22fdf0 100644 --- a/app/src/main/assets/ru/guide_local_storage_light.html +++ b/app/src/main/assets/ru/guide_local_storage_light.html @@ -85,7 +85,7 @@

Form data contains information typed into web forms, like user names, addresses, phone numbers, etc., and lists them in a drop-down box on future visits. Unlike the other forms of local storage, form data is not sent to the web server without specific user interaction. - Beginning in Android Oreo (8.0), WebView’s form data was replaced by the the Autofill service. + Beginning in Android Oreo (8.0), WebView’s form data was replaced by the Autofill service. As such, controls for form data no longer appear on newer Android devices.

\ No newline at end of file diff --git a/app/src/main/assets/ru/guide_tor_dark.html b/app/src/main/assets/ru/guide_tor_dark.html index 82d5c01a..e087370d 100644 --- a/app/src/main/assets/ru/guide_tor_dark.html +++ b/app/src/main/assets/ru/guide_tor_dark.html @@ -24,7 +24,7 @@ -

Tor и его ограничения

+

Tor и его ограничения

Существуют две основные отрицательные категории субъектов, которые нарушают конфиденциальность в интернете: злонамеренные правительства, имеющие доступ к интернет-провайдерам и крупные корпорации, которые управляют социальными и рекламными сетями. @@ -32,7 +32,7 @@ но не от крупных корпораций (которые внедряют вредоносный код на веб-серверах).

-

Злонамеренные правительства

+

Злонамеренные правительства

Злонамеренные правительства часто следят за своими гражданами, чтобы наказать за инакомыслие или правозащитную деятельность. Как правило, они либо работают с локальными интернет-провайдерами, либо могут заставить их раскрыть информацию, содержащую статистику посещений сайтов нужного пользователя. @@ -44,7 +44,7 @@ и пользователи могут быть наказаны, потому что правительства предполагают, что они делают то, что запрещено. Таким образом, Tor может быть полезен, но он не является панацеей.

-

Крупные корпорации

+

Крупные корпорации

Когда пользователь подключается к веб-серверу, сервер может видеть IP-адрес пользователя. Несмотря на то, что пока это работает не идеально, IP-адреса могут быть превращены в физические адреса с достаточным количеством точности. @@ -66,7 +66,7 @@ отключение файлов cookie и хранилища DOM, а также использование браузера, отпечаток которого трудно определить.

-

Использование Tor

+

Использование Tor

Несмотря на свои ограничения, Tor может быть полезен в некоторых обстоятельствах. У проекта Tor есть приложение для Android под названием Orbot, которое доступно в F-Droid и везде, diff --git a/app/src/main/assets/ru/guide_tor_light.html b/app/src/main/assets/ru/guide_tor_light.html index 75f7cab0..8b1d48b5 100644 --- a/app/src/main/assets/ru/guide_tor_light.html +++ b/app/src/main/assets/ru/guide_tor_light.html @@ -24,7 +24,7 @@ -

Tor и его ограничения

+

Tor и его ограничения

Существуют две основные отрицательные категории субъектов, которые нарушают конфиденциальность в интернете: злонамеренные правительства, имеющие доступ к интернет-провайдерам и крупные корпорации, которые управляют социальными и рекламными сетями. @@ -32,7 +32,7 @@ но не от крупных корпораций (которые внедряют вредоносный код на веб-серверах).

-

Злонамеренные правительства

+

Злонамеренные правительства

Злонамеренные правительства часто следят за своими гражданами, чтобы наказать за инакомыслие или правозащитную деятельность. Как правило, они либо работают с локальными интернет-провайдерами, либо могут заставить их раскрыть информацию, содержащую статистику посещений сайтов нужного пользователя. @@ -44,7 +44,7 @@ и пользователи могут быть наказаны, потому что правительства предполагают, что они делают то, что запрещено. Таким образом, Tor может быть полезен, но он не является панацеей.

-

Крупные корпорации

+

Крупные корпорации

Когда пользователь подключается к веб-серверу, сервер может видеть IP-адрес пользователя. Несмотря на то, что пока это работает не идеально, IP-адреса могут быть превращены в физические адреса с достаточным количеством точности. @@ -66,7 +66,7 @@ отключение файлов cookie и хранилища DOM, а также использование браузера, отпечаток которого трудно определить.

-

Использование Tor

+

Использование Tor

Несмотря на свои ограничения, Tor может быть полезен в некоторых обстоятельствах. У проекта Tor есть приложение для Android под названием Orbot, которое доступно в F-Droid и везде, diff --git a/app/src/main/assets/ru/guide_user_agent_dark.html b/app/src/main/assets/ru/guide_user_agent_dark.html index 6db7aa96..1e3ab8a9 100644 --- a/app/src/main/assets/ru/guide_user_agent_dark.html +++ b/app/src/main/assets/ru/guide_user_agent_dark.html @@ -30,7 +30,7 @@ Веб-сервер может использовать эту информацию, чтобы решить, какую версию сайта отправить в браузер. Например, многие сайты имеют разные версии для компьютерных и мобильных браузеров.

-

По умолчанию Privacy Browser использует собственный пользовательский агент PrivacyBrowser/1.0. На веб-сервер отправляется минимум информации. +

По умолчанию Privacy Browser использует собственный пользовательский агент PrivacyBrowser/1.0. На веб-сервер отправляется минимум информации. Поскольку веб-серверы не распознают его пользовательским агентом мобильного телефона, они обычно отображают версию сайта для компьютера.

Для сравнения, пользовательский агент WebView по умолчанию раскрывает большой объем информации об аппаратном и программном обеспечении устройства. @@ -51,7 +51,7 @@

Существует несколько предустановленных пользовательских агентов, которые соответствуют обычным браузерам и операционным системам. Для использования отпечатков браузера существует правило - все, что редко встречается, легче отслеживать. - По мере распространения Privacy Browser использование PrivacyBrowser/1.0 в качестве пользовательского агента станет хорошим выбором для обеспечения конфиденциальности. + По мере распространения Privacy Browser использование PrivacyBrowser/1.0 в качестве пользовательского агента станет хорошим выбором для обеспечения конфиденциальности. Firefox или Chrome являются наиболее распространенными пользовательскими агентами, но они автоматически обновляются и их номера версий меняются настолько быстро, что, скорее всего, пользовательские агенты, включенные в Privacy Browser, часто будут не соответствовать большинству пользовательских агентов в журналах сервера.

diff --git a/app/src/main/assets/ru/guide_user_agent_light.html b/app/src/main/assets/ru/guide_user_agent_light.html index a18589ba..25baf48b 100644 --- a/app/src/main/assets/ru/guide_user_agent_light.html +++ b/app/src/main/assets/ru/guide_user_agent_light.html @@ -30,7 +30,7 @@ Веб-сервер может использовать эту информацию, чтобы решить, какую версию сайта отправить в браузер. Например, многие сайты имеют разные версии для компьютерных и мобильных браузеров.

-

По умолчанию Privacy Browser использует собственный пользовательский агент PrivacyBrowser/1.0. На веб-сервер отправляется минимум информации. +

По умолчанию Privacy Browser использует собственный пользовательский агент PrivacyBrowser/1.0. На веб-сервер отправляется минимум информации. Поскольку веб-серверы не распознают его пользовательским агентом мобильного телефона, они обычно отображают версию сайта для компьютера.

Для сравнения, пользовательский агент WebView по умолчанию раскрывает большой объем информации об аппаратном и программном обеспечении устройства. @@ -51,7 +51,7 @@

Существует несколько предустановленных пользовательских агентов, которые соответствуют обычным браузерам и операционным системам. Для использования отпечатков браузера существует правило - все, что редко встречается, легче отслеживать. - По мере распространения Privacy Browser использование PrivacyBrowser/1.0 в качестве пользовательского агента станет хорошим выбором для обеспечения конфиденциальности. + По мере распространения Privacy Browser использование PrivacyBrowser/1.0 в качестве пользовательского агента станет хорошим выбором для обеспечения конфиденциальности. Firefox или Chrome являются наиболее распространенными пользовательскими агентами, но они автоматически обновляются и их номера версий меняются настолько быстро, что, скорее всего, пользовательские агенты, включенные в Privacy Browser, часто будут не соответствовать большинству пользовательских агентов в журналах сервера.

diff --git a/app/src/main/assets/shared_images/bookmarks_blue_guide_dark.png b/app/src/main/assets/shared_images/bookmarks_blue_guide_dark.png new file mode 100644 index 0000000000000000000000000000000000000000..988cf6a3241d6da3fa1c6c931b797005be1c6c9e GIT binary patch literal 1534 zcmd5+`#TeQ9RAL1F3s6U!a*}3mj`(exlFb)Iz%ojxeV1@4x6DdmorrAB;;O`=02BH zkK__s9hagJsXTI-ODKohIOjBsvwk@L!+D?Q{k+fTeSiA=@OiI$xH~JztIGob6kG`S z(-LL=pe$T6|8NK%l!$b!lZ&^k1j(}JuSs?}D&cG_0PbBs2#JjdQtGJ^~-5|}&ZY4I6TfySox z2j&c}O&Zk?YM&|H_@${X1fIUPe)9%gC_W$bkrESNWC>|Jl-*dSK*s)rHa+CQ+OT`4 zn+Z#xG>$R2qJgIUS-98_R9ifKB5BTay~VgJF{+U+E@*&tA=!1c+iJ=bUHeRD_^tzS z_j_Gh(OVOhJ^sc@#fxh~Uk6d~*=L+o1~PCmKlV{cE5ssBVWyfpRJHUi-(jSU##=G* z6eW8!DlAy*NEql(=9?#p*D2wFWzLRA21rrGO$eGZ8PTcLp z=kkE}NYMr&oUQFw*))3rU`7iz5OwG?S}Ah%cdpVi*ISk{^a`muD2LiyXGMXHs%gt{ zh8>jP(H$FxLy`2+NS}@qW1!Pcs73@w?PiQO_qe zrhcDm)JHHyTwO5-lxy!vO`6Q+Q=2O3kc5St(T>Aush+$@b1;1Q*cvM$Fb9%wv4XOS zW?~!S?csb)PsePZl?cn2AoPsQ7!x$mFe0K2)&>^ZF5xd^d{2-z(o4BG9U<_HX z%`74?k4Ov6nehO>FV}dQKDMXTE53fsKa?(F*8f>HInse0$WtPncsG)~PED1zxP**) z1*3VRbpet)w7STEl*!?rMSd~a%{46|>e|0?vQ}WX*LJ$0lawFsgiqI?3vh1spKiJ! z%@2?v7Jnn?^>fhi#NJ^XB_rgw?%3t-D*bj9eTYT8f<2}_#pL}!2`e2v-r6BvuBeh} zSC@fsI0P)v5Aqt)in8&-c3FNlXwstrQAlDlKz69=HAqif3H(b~c5a? z*sK%SO{kCoDdWB9v$Yk0JI;L4IeA}vkj@s~Qn=rGoRZk_OZ)8=~3|vO+=MVKA@CjQKy=xQb0H_C07x_Ld)li>s`D zArPD{*I_>C(UgLI8?Qz!Ml86)HWhKQ2sF$+dGx4_XM|Coq7;;H%i4(q4B`wf@A;}& z5ey8h{0ud6I^h2uI~W4U5S!8sRQRoGkS*tdptaDmiv5mAw^Mn&Ps7OhTCd5LE=bhf z9gg8sy`s`>l`a<9R2&z#CB{OR+p5LOTQ{Oh7%+?`@YOp~dv8>oYr#&!-O|h#Uzv>* z&;9sTaH*Uqb7vTVz3OPIEVKZ1L!8u;M3C<3DLze$hgN?4YLgg{vsy?+Sj+PHLVEV3 z=Flq^vs0erV%%JVca>^uq4wZM z^yc0EPG}HAUzpd;aq7A67x z`|`~joAKbY<#a_p06aEP%xAVAu|14rFzBO+amwcQM}rHLNJC`KlwqF z$tS|oh=&23Yvk}&P7Bxz26mwuaYa#o0(Ly#=l&^7`AD9S_Zj{RzuE0ARRscesyUC$u%{!)N~F-v?wN0()zGo(qwy6BG~A7$ zC-^=1U+i^1?7@o=9A7jg5PkLxK;>QBUMCnW#=1I}zkT7r(G<~4g0yQMYx}4ruelUE zKmI5OEW?2OY#eduQ79Dn03fs>7Y0d9;!q?=65yTV`bHv!Y~svv%hyi$S_nS8LNr=*3xGXGA^;V!WLf6{^L2Xi66T{?$YQ2|C>b85i zUp`sAK(gvXOaG|U*wez+=7FxakV*P2lq}$~rYawOYCdOl)iIINDlNn)t0Hl1#Z^-l z3}-yE>~~j506DWCxNIpI=oXpObRmO+ z_TzK>1&Iy0IJ6-W7n?X&t;OK5>$ZD(wi9%JlS*_&5P9dRS;;i(sk#_b+|m6Zt2032ctc_ZnopWpInBd^StNUU}OY?X4qR_HxP* z_2hr0`RTM+r>{G`cFU%DQcQb6%{2Blv8}CmZe*LP%&|Ok6cpxd4}TQZ;OJd?6>HS;`ZDBD%$pCe+70Ui&or{xm>4E;)o9^td>e+ zbGSxtmH^$ku<%aJs@}DU=jl)>#tSp!xsgRr!SUela*Yq} zjp%C^&e`#mBwOlbO5y@v3X?4*tt*}4tu&sV=65fl$-S;Qf_lq*3nIt84faJ2RGnVf zo5zynu>9E{o-p_XFDwPT)V&D+0=Z8IrztRIp7cKT=aRrmS&DLkRQjA7XQ8J!w$ERE zc~n}rupnYoM ziAbvrToK75E~GgfX_+$McwkLHyDyoLan_7|3?#DBp2;HFqJyf~|2X+toSHbALOPk0 z;Bu12btTR6XO%C#@W!dD&v`T~#NQS@cuSXl?T zN`hUT;|>&G==wXKWR@7(z+?k6(}OWg39&?wz@OX}uyUd?H%(j81{u2VN4|x1#PAcK z;Xqx(scBlLMEB=jtsiac=U?I0m@XR#BDiCs=Z%*!7bUR1uipc^v}cHxo_!Py$#wdc z7Zlmo%IJ=7yz(%lI-lE$9S!=U{Ycuxcxi3encr2O2-#R9Vr68ndFrhPyL1xDIO8L5 zvO4^HG25gqT07=3GImkBP9$<}hpfJ7tH)X{zj=BA6xgN_OGxdiRT1y(X{)6$-%E46 z8c!T@iA_cuKXL`b0;JVyK>bmPt4H8@LL;T2(rWWkS&*MQD` zR~q=0-3m!WH>Jp!!RQX2Ra#kT=!5{u&#SFz^y~l>RoL3UR213=%TVe%#EiNFgy<*7 z?S9?G%~1h&UL|Mm3HZzttyO;ASQaxqEYP<5uNL?Rg$J_~w!oUper9jtjv$(i)+;Fo zr%RUT@;yYZd4NqT&P~usx)+=K;ilnhWcR&@8;sUSpHh&2hlV{ zze7D}x1R@}KBB-!8J&HgZc`pO-NNIM-(Es&v4P}FbSAd%6w-pC>uX^|0I%j7*Jt*54wjQP7J;G3rVRqX^7gX3^AsoF`Hue{I25KDk0 zuwIPHTSYn1tPpTJrj9sSGC=hA{-B9}2m|dTrP$e} znd!0s$t$mZ0N{?5c%Q!zh`P%oG`@ciIG`;kM5i$=DK0V`1X zL$~{RwJ-w_K*rxqes|DWbm?i2aFV>9VaKOq5mF$Q{9N2#)k&9FVG6t{QwMYa?2=}{ zijR|SLG6Vgrq_tp9r$KjIh>)E*{B#+wxuW3>e7khLR-%ayJPJSF;DnwElmws074BG zAafpe`49?p9R&*;rN{v0EM&Zgeql9%GB+hY>`^dO{?;<;FUNWXQ6fne8ib4KK4Ik> z^l2l~8C_w(yhmsZ-lmdON@HdACc=jRB3&aj;eS_}Xh@KCHGQ^)yKayHidzI<<$FZ# zD+?v|G2EA7m8cZbq-L;dYtstMD3AjD8GJJ%1Kx#g_3NTNVhLYQG1EhsS% zYjoB(Jz${HM55QV!T?~-n_v=AVa5wBubY1}C#`(_V?wpJsGmy>0m3)G+DdCtT@pb} z7vh-p<2`Gn`fAeZpDHRqk_FzYfKW9&iS%{qZnYevjiHXuqOez?zx#S=GY@u=cYn;{ z&?uM}@h!;>Dl32X%q9_|EXV`ZR*pVr;g@4|2gUM1zUEPj=X6BPoBcLwarKcfZ;)(^ z#mvu*WjUoH$rigVKhfy)ZuJz|BQohC*eWoZYvs8YKt~)VR(|7c!mrVU5Wny!RfR32 zQ!he~V-+~PD|!h4?)Gj8G75h9{&GhL*u!*IcdiXlk8d|ULKiq49LQ05T5lBqQPeO| z#Y+7Mwqzl~#h>bufFuTf&W z-|!jQ4u}{CxD9ZXD5>_6z(3kPR%(u6YD-Qtir6nWu`{CZpqO?~l%+0s~Y-z%H*oCdrI-hGMyud+Jl-DvIUj z4Nvc3tO-8*ilgmgzAU!)U6RiP3DWixPlK>!@d!g#EM=&9fS!@>B`hEhrU5=!W-@!u9*Kp zXvew0$gCdT0WgTqZY_i#is@0%g-b=s2Q6&5^5t*IYl8I2$7d9JGIa#JBe81kPG_FP zK0Rl%JApgCQ?>a=EQS++Q^6Ub97W3logBF*i+i7;e1!Hw2ghf9(wXBtep} z7;4OQQM5#~-rN0XHt)n+E9Mx8fcIT!T(x!H&+Z=?l0GAe1Eea+j8vN-D88G@Q|owp z)qJpRX?ttQ%jt9x1icin!hMX+fv6;}%+;m5>V;@(mO6g74t%XwB7;MmD0zkrrwiCkR7&OIIPx6AJ`?NWFMg@cJq1@PmYDNi z@hFDmW@y^h?awa!s>(;*$@~Yl(3xm9z~@xJe7Of#AzZ#evg!0Lm^61#DIUazqa?BJ zU*?IC5URl*Xb}8xh)8pLCn(4ogGk_9f;9SHaZ3oX{6QR`?$#z@r#cRXd2;p8t(&XT z@Bpnft~j-@Xib+j1I#Lg5*CR?3DjCyJI^KRRpbX!0*Us+>{E|qth%{`$#TC}{Z-Vy zjK2Yd3{=B~a9KjiIK-;MqrR~ALfo3^p%}K0kC@ftPV2WQ=gYNB!SHuNv$g&`tS{TU z@i-INH|CV;?3oYfm-YuHk6v1oI_xm*%#9umSI5p+Qldi5Hy9g)^gsVQi))G#CZj#XYV-Sr$Y$LMD6YIl6b zjs9KOkE&v88+2au`J`w<&6&mNxSOrbH!K8v^Q*R|v;m&dvurGi-B0`bBqzJP)So1A z1R^FPNr#qltK28}JVAsQoCDrHUKIVQv9%OFw#F;y@<&=$t91)iF+D9=eD{L0{~Mgq zW0sPg`+w^gsB;XiLkU@O$G8r1b(jUnmql}L@Imbmi>n z31ojPh!nor%ESsBIU%kfwwLk*#-;QjMRzajL(NH$)d6Nn{rnP-$Lk(}sT?H7V@BAs z;@Km)QQ08IciaRcbl$-}WB4zRX*LLlQk!oWA(VQHuoV893d7b|}*oONucKC&YbF+|lz4=IC5DD`Jt^J|dQ}E1U`)F(?ZS|Et`$Z%LWtM_<1-a;QCOIV`LV=uS)rz4(LMHToZ z!aEDSlUGiNWVA^+TL(i9J~+<|&YO>nr0Sj}5_}f?NWB%{nJvYv_16U5>YC5shjeX{V@9lQPv+x6n+W@CV@EgJ0|b1c z5Y0If|1voE4n-(%8WMJ|_zcyWf+SN}M!8dlzN@T#D#@I6-Y%67&VBQbEKs=^#M=~V zke>RSxaNgDr&`(|{ndB+5&D>TQ)$g_)0@;8$YMGT zhc9?le)^UA&P%j9%n zyZ`mC)Mb7~AY51Xt-$e&jP^xQHhrodV~^r{7L*HrU?DQ3);U0)y53`>z2(gO_3^>~ d7pTbdM+mc%_sl)d%sEe>vf>j;GDb2004U|3VpOg?{-41}uFhsj zgYGLwP!t-uyGrO}}c3t0V(fP6MlIV~WKY*qZ=291iu? z+S0+uz}5t1V{ewYA@-&MAB3z}!C%jnVIwoY1}h)ZBYtNJM&DGhqRY4&FZU@h+av(7W8lC> z4>xC{4CI;;v@w2uyGQI?HnM0jVrfFe#?<(v{&M+tk3{g4#O9P3P89L4ivPgTne3ud zs+vOlm;5QRkWJ}t!kE!9J>Q}r1L;Ob>10~ex;<@%8`rpK0a)zfC~r#FI^}ue9~AI+ zv^ta@3x=qI6hKD&uztY3QF)M6YLA7_22|*)GnMB&z%BNAdSbR=cyT`UIzBMMr0nf# z-s@CNz!db54u3zg>H%IP!R02+d2w;YBbP#Gi!=k^-!mk%5^_QZL4d`{rQ{NHIstQ& zxy84Pm*QFt)4CjJaR+5${2)ErSErtyPz5wC9+**y!JMgs;(^aYiy_rfo48?h?J$tyRQy`UqH;7);RGUOYmd@nUbz|Y}Kf} zSXA&02B7Sv#B=Wr65fo7`XkUjCG&T?NLP<44~8EBWcW|Z@BIDxYG??=^al0E0OW{E zU^-lJ^%7Yj00{~4&nqLdNnN84Fj}D8I5UOf6O%E2y(4%fIo$w_kIy;6$7`5p{OnIv zRA9Z-yLYocOuf_-=?b8I_gS7m2KdKz`X-;F+haN}p0It|ENvBz?(|FmU%fX!OAez! z#HL2a3IJHSX{GuGcga+!0(tU6nppR*yU~)s(sGV1l*J@%*JGfX5>J_`g_2oUH2jqf z=s%gWlzP}o&=UcmQpw&wws={vZ3;Cx18)$)LS~<%{(XznGl_ZC#TvFeNdK!J;@2O? zgjxUmeRwkU&`@nF2B@Z3$W3rzfiHpgm`{daWInbD>sFqO4jYWRg(%3gp|i0PN8PaT zM52(XQXS*QTI&0Py>Ek&-R^};WjW1eQ?i6vd)k5M3%S25-qZXI@22$}Te2~PYc)?~Pdq)&)oaa8QTROt`D(zeyg=4(D6Nn| z!nEnxd#%5v$g$$rIN4g39~|%pn-9l1Zu$%ttd4GecfiIZr@dI#eoQAFw04+$SYe9% zoT(<Ee|XD};0lZ5APbfC$6N zEj?SQMTk`JPu^|hW9upl^!UnPuy9tSt7JeHn^OmDd63q<$FYNSsj?V5ZT$R3 ze(7qt3f0i`AH=ECe>jm1Abdl+~03i6RD3DYm%On*m=aT=H*%9bIPEV%vU z4SL2$w7P3Gl_}fihGn#O*r`-*lJ%iZ>6)I+&M}uEIl)+I#I@m17qq-GNC`__BxYY< z1nAg*7utb!?E1k4cCRa7s|iA)X!BnQ*y0u8;YC+qGjaKhLbAJ{sTn}5%OS_u`hxrn ziO%W}njCrblRakZTKSh|-}n!#bp0Pl5FML_4`I_*%H4hWSxddt9FKmuZl^}Rwb*}s z`||VgWU!mP$HeaRx^{l20Eg7LTX~VOH?~EX(M-x z9to$A&2X!nlN}-8UI2dd=~8Z4HqP`J*`v-8S$#>UM@gU|?1&#OF?Z-p7zSWhWDXED z%Ky_V#>`&nPL5uO%o0(a`mfar`Gef49uzWv8B*9ke9 zHjE>qnrorLzZ-a7r9YMcOI2^8twggQ!_TuZ{YLu7Go>kZ3kMH`q8X^)fC)j%s-3B% zL;wkk(p|$#D~n*MX}UNQ&$Fn7kI9+BBqQak9MF(^3kM7Jlrwh_Na8J4Kf}0@toF;c z0d*AFb-bvOZ@{v(Z1(hkeGhG0Iir^jWk)+bYU^v!N9jUCI{*mK4=vy?k&IK$yyrTq}G7RSm)=cK^rx|3l-+VLXO&$2C1v5=tx zkkC|kqI`TiA_ui0c=5=5ikJ$+#0q{E#>D@fX&%s5rUGu$avXPNdWN(CS2XEOReCum z;0rP={$gDqAo|jHC=RYj6wG~T!f}=xaiPPZ%S_$`eyO>1Pe<-j^IOlXGU_t_$d-HF zKaXuH^ASi&CTE-zpts0zel5_SgS|Cmn1)6;$=1>}ad~h&%N+ki zRxX-{j;N$8+{5nDq0frax6x1yY5*`NqW}}~xNt7Tl@FS;@(>TE4D#r`w%V6?g$c4O z>Y`LT+`EBin*71nE5J)0RcfMPt9Bv`t3UGtj(Oi|R=h{=G%pnjQ-JX?6Nj_k)HXO^ ziFzFT&+^UafIC0O4_{72Nf<^wJEK}x-qyx54g^8)?iL`Y(p4IKn4GUJN)fo4dyqhs zaYkoeZ0$mSE+~)ECU+M;L2s~z^ zwo#Dd9JpP;Z3lcKi(PLcp5b>FE&Cm|#~#`OZ1FVvHwwIx*s;o;18jANQ;G2@9z~o$ zKu4T(R!6Kj;NE@I`s_lXgnf3%g`Nnw(Fwtas1z*9(f|}FO>%;XIVeEheJPw`2MKjJ zx$M0G1xnl#1xkj$J{7$oKc$RbZmVwANi=dS(9b$k>?c;Fw4#J}mtW41(8` ze2S!rh2m|D*bV8z?#XD{AxwB-e`Br}(-^!j%>!0sA83-}`H29+oZI!uu3M$RXjh&z zg779fw&%OT5tY2;&c1gf6o3b&ycO2w`d6fe+k(J5ij&AvD?Qk6uQpCmIqwduPLE!4 zh!+R)QF+c2_k@gxzzG6Z{;VsqAx=WxjJ7@QR++`+rvP)UBn?ToxYu!Ku#0vM%Uh;z zAeu=nGu-FbbM!~_$*>ixk@a^!kE-6FuCPXx@TktsGda@Zzmc<*VBl@L!0%U*t2t^< zn66so=@eM1Y9sEvP?VXy>#74%-AVBZbnQ~rUL~8wmVA#v`ZT)iEF4@Vpn_Ur+jC|& z3KLl_yYPeuGZf$b7c^yJ_{o5N2+NM6XPZ^-mt$GkbLd=GJDlhcoBL(7!uz!%Q-K>} z)Sk&gwz}+Y()*A6Eq^XJ*BIAZdB^A^o%~o5^E2OZuE{BZn)Pdu6W_>31`BX}Gu?U( z__VE@73A%8GsSBIG*zq{u z*ek!Ar;GFcD4+wSAq9Wli)5$ZG*)7Z_#=J>l1z85di_gAwY45R<6MOazc0+%mTgG7 zmQ>C$`)eD*B{&zeE~;=6N^K)h|bWQ6W^ z`4KM3_%FMX-^m7#aJ6-qP6@@l50|-iWmG^ucpg~<%yQOjz@so7KH+aJT7v$#RFt3# zENv$xin1E%0gaobfQLwUu>Q#)^NGeRP71yi1|Hw=gII} zRrCXo)_2bNaWN93cd4qtQwN%dD||~8(IJVBr}V9R0>GdO1Id)_nBmR_4o2oBtF>gB zaHJKl8~7-{<`WBVMTP)xr`J5)6eU&QE(nAP^kk*fUwt)s9rCbAs^e~&C7H)5C?(V{ zV;n0MFIVAtjX)5uVfU=dMsn!A)i?5FcZ09})UxoQJn`!AU?PN~^nmxXljyVX;ZqRF z{P?Jph_(wv!3>&k*%>PQ#^P4wMiV)SQ=8N4+~*b(UH?^CpR(ywcXIqsgw62>sbGp$7@^Jy)2*6Zv4+C8Rsjs|$ytr5LqXn_t&0pu zkNVESw4Oijx7b4d7%p=(SW^;Xji-DLX1hBAh3rE{)wJLU`

NqXY~>jCa>&nXvF`r0GiB6^2weg%871@ zH9si;ZGF*@$ZinWfdV%aj6H|nDp|(Sl%{WY|H7$$b8eaL_0LILRY8+@p3b>>;<0N@ zN(^W3fI7dl7z%L<5y3wxoE8a*#LFz%h9oKK{q$&cEl<OCd;>e7BFSQi@Wukx+{b z@sVVF!?8pQ*0X(=+=;PkF@uxz)^GW9YJpPdOYrY|^hld@N1WwfJa)@T@PblI?)#z0 zai&ilNOP` z==pDt=S2;EjlY~!bW$t^nV_B(jQbH?8T1f`mxPkLGcN{v1YTTsasF~gvnk1JUwBVl z5vtrFpE)@A@eD@bpHiiyExCm+J8RB-JQvRbd$GwmVeUf|pAwglryt za}+z-Ip{dmZqvHQkVpzR2~J(pulBC9-a|fTHDnVIZ#fh_h?wSfO7X&vsxY2XaO4_n zBU|!b4n?(L}XGI_amh)Z4m$KmA z=XdwMcNsU-f`Gs0euc~zAIYy#o6|Pd3C8q^b*;*Ye%zF^q@DU!V6yb^S>i@MvlVof zBMW&DK20vBN6!H2Q(9+mjqLh;6F?DQyFE~Pf|BN|3!jv=V_*JTti}JUAxv^w&6(fX zX5`aV%_B~hp^sRZ>krHnQj}mNZquZw)wA{@(}#PboK}yIA~cQ(uy>#X|IW~sUZPn# z;9m4N(~S>~wnYQ-ZJ(J)&(Ca`i9lNn|7O@eIkqJK2oa45#UDywi{qyr;|_Mp#00&i z38AsorztN8zHE{=rG75XQTGw|k?SAwnNjHRqT$M(*M0&c{{Juhuq9Enk#e5(ttlIW zYDx8l=-2Mc)|OwY_xi;8NCG7A(A8}q6xuIHl8NVK@W8P!P0n=^Hffh7@D;!wiq9sS zS;)f3EA(qGWl9Y|AN23y?3|4v+Bz$)xO_ePb}m0+;yB%}vdTAqM6b$~I~(ih zkQgln+Pu`b^MGTPy&Wbo>ZSvyuY;YEVUbrwmNc|!L$9B5$)ovyV1KM#>B*p{iWxT>-)bAqjYz%e-ede_j0iqI;hA44*360 zg)`}obyxImn+Wl@P3aD9xYX16fVa*9DL_@{0gVnX1DFE~o-QM9>iS#)YFgp#LK;GY zIepp_&65C3|D1Lj;aFX*`O%p?dij?}XdGm)x=t^$c-UtyQd&L6*mgwyWeX_#=--1Z zrLjHG9GE;Q-=~ImmT>V?S_*3G(@*7eW*a7KDq3ABhF z^hi;#HSk;iV$GWDL~$X+XD#^?`&KA0#cwCNtL0yAk#?CPX%K)>{GitdQuYxHm#% z9P8aVOlJGnq^F~|9aRLn>N7}mIVxSmx8dN1<1h3&8qNXX3%CTdX%zj9=~|^DQ6P_` zT4lGE*462*{=iocrZccangBM(v%5o#+b5d-Olgj(8B3Re0+Pj|7!uJ#ZtslW&)6d$ z$(NQuwoG?R(YdRoP}hgo&pD&j}3k)^s9~6p_Gk}M;klb>x zazKIHIcG2R2WP;}Q_Bq<+aS$VbFMn*b$Nle5AL(N*za?pv5nOp3{k-W-=?kg*a8nF;Min&da z9JJ-91?`+H_GZ6Hc?M(OdtmTWtB?BopJ9#)$@~~Wx3fxIzJe6!`)#Y?S-|$)iyXP6 z!#d-=6ddEHXX~+RHnVvk*C3@ke$2#2C0pQrhHTJNMdM<6_Py?pVvPDemKjLT1wN3v%1ExGD7 z6Ur;B(=ah~9DK^j1e9Zt=BzNkhRnBR>AatJ#l6R?2E-i*7#L9A+3H2EZe6bDb;qKp z6|fc>9oZB4krPh7-;yR!v1pp$ryx>N>!kG_%c|pjEqN)Vs?BN5jZLi`?%5HMd3cpv z(CNoVYb#??_D_JtZFyS$`fj-iaWNV&lVP#jOxl?*D9m~hT!_zVBeZ7JfxL#h&H#37 zPNMIskNntTnlt!5r0-+!q}S3GS_9L-V;`4`$%veu=fk0tD%*01Hfrc;^uLGK{cVrz zjgM2xs`?HQ9`9(%scqpi$)jhK=!wMaZv14Tu4 z!!IBoakoFg$gWTUMFNYd5;Sn~>u+5!zi@}|XQ`Tls>)kzfhwo0_Xoa8$ORTx)7-{K zQDHuvYa9~BGeD`$RyE*+5lK>Duw&;S4!Oe3o=VxWSAv2}uv|*ewx@6MH|-b7EK&5y zn!Fc_OT%G0s%gn93S$b!(h=&)YscS)b;BLKd72cqzmG55e^P!yDLQ9z=2CC}Pna!b zLHiQV?AV*FK;vHd$|5k~bM97x-VkD>-h8!?61x0_Qj9>wWmu1AIQj>kMIVH1L$vxT zOgr>CtOyN7e^;LP$fc5w-?1XSpXH8~CbgAGJ)D;#ky^aWB;XM#apt!=PyLn1{-E3Y zMQg$nMTN){{bnAAn#*=MN*$k_A6aVTP9*o0UlJdk7B6|!J;_Ga9Q*WC^A zwUmt$MS&tdsc9?1I@6JRBlQoRl3Pi}1cJ_-!6`lQpy_cyQcFM0T{j65ju~JK)%!^{kzT6iaY!@^|ZEtMqZ>*?R z_@U(zB}fqXr9!uL53;M08sV(*W9JG@hRGr98jO76p!Ly{AMYRQQ}}uP)u6Yo4MRQw zZ-v)>e?CTqbXMmQbmeWh5LrIg*(@~3qgerW(X6b&@bdq6M&SvyM~o1JSt){f SJ?ZpM01Wj^ZdAct?*9j%!s>$n literal 0 HcmV?d00001 diff --git a/app/src/main/assets/shared_images/vpn_key_blue_light.png b/app/src/main/assets/shared_images/vpn_key_blue_light.png new file mode 100644 index 0000000000000000000000000000000000000000..1a01778de232585ab632cf5b4d7c3403deb8bd08 GIT binary patch literal 2154 zcmai0`8U*!7yb-}F^!OI>=b2tW%){x$xI?bwk%niv4x4T)lAm0MOiDQkSr-CTO&)^ z#-0o%BwM3o7b7ymXuQ++A9(LM_qpfZbMCqKm-{^TwvDx!08|PJ0Dyq`c@sNMB>r^> zF9$mjn0`*+2}7AXKsXi!@lN67{K4m4!T`X!<*$Rn0{lcdMal4U&f)er-*7x8)Ca)h z@tXcY*f1|lu#YA#^lIMPX(<5UTQE04IuP=IPUEhPI!W@;*TaH}rX$vWk{=`Y40-Hl z$yDS>(A_}T&^PY@ezqG#awIroM347DYVXh&#Sr$A!ELG~rq#qZz)^3Gn-Qd7&=bwRLgR$w;{?#G$mvN!CI>?M(w?M=5%Eij|Lxc*;LiLX z^^K?a6~3dhw7JfF5FHm)ie#@AvMc7FgI+rhMUPk|u5&ex_raZX(5vX;f@>s3reeCw zW`(|SSQGo%;aycoU_DmCADVXcHo@v>DQzRW$oC7DST&HYjbIsRId%>dwL0wcY2ZGjL2Xfw6k(}gG;-9@HEOYp)6fc z9uTk5IbIiD>H2q^>Ix)yM?Y4bH0xRI(EDQE-i=R_>0OTZ$C=$G93B*hNMmHELB z=1%?|c5~^r`)>2PM(cxcsGmnGMozeeD8;6Oh{W#4{1H9)i~yTGMK|myA-=(upc`o| z9Be<^(ZoIxvdXAt4Su&DG9xl$>T-!Uaxf^f=B3=k)^74-LyjTPxp>9?K(G_Z$ z7nMveFXJtg2{h5WxaHt`=|a;QUA7}fQd(i6^bC@cfJxj?ezC{`SS~WN<5V-?EH*X5 zUEs*fLqc&|KmMTn^FL@;gU|mc%*54n5W2S-*C7bYNuYx2WRq7Lt?V^ZMPR+n+!++E z_aBV3eAPv<)j~+2GGvI+Jga&X^KLkIun{HI+4k@=7!aIA9Lnl}iiyZV?zKqMSbuJz za4E{4>yqdRu@W-_RDxRG=NAWBRKAv<2{c|g`zYDDgL0_Xi-4rwY`anedNj1gBr^p{ zN1_*QFl6$Uk{)NXxrrHs;(bgf;TG}bwCPKEa5V_xJRdyOlAdnWAh!8!zs-`o{wC#{ zA>b`DM>5=zE_D3>W;&XA$#st8vp%dw9adQwSlC`1OJQQ%-UbPYy`KbzG{oD-QG&Yx zTI6}!1BZ7?zlF5-sgA`F4;w%!<)eLmiS9@eLrl69_EAs)TjFTc9}CsWkfO{i)LZxr z@BUBZ#ut)P^)G#*&e*tIO57&$!nH4>oIw<4S&7&oZ{& zLhm?DE7O=U@pnHOSjcc9Aj!$JiFd8WR`rusIp`Q({kk%a+q>i>l+xF8!J8@ZDsqdZ zRxZ5qQC)KDy6fX*7q&g6umD&jmS{_$t>XxGkbbBA$Kj%DgNA6!wppFGg7Pt99P+R&U9zW__q z+N@Tex?iTZ!7#-5+sJPCMNvyth{X~`Yvt6~^gHN|n7ICrsXwp4U z065NcIb^@kUmC4ZPV=n!T~%p4uS(;OdbH!HCgCDTY0UgC$epZH-kQBGgP?u^#=jNl zKc>6EF;Ta*TDfi5ZTXMp?&Mm2>$`>HhKJ>M3-)Y>Eg{AlnlHU9qr%5Bo5s{ zI!ek~cH-L9OAz>&%mT3&+S2c1p35n*3c%kElsy;*VX`UxgQbxftPDFVwaX5|O00Tm zx=|VXRD85$*o2O1^awsHzfY%L2C|zry^fxmR02nu>!*UkS|o z+%SoisEvTlB$jM^#n8pUdn)%=@255&Iu$_NKRl?U&4X5%D5`d{F!ClgweO8X8zKw^ z6uPN~wRf?23}ZR3crfn8e45JL=5{8)?$K4n?ov3utp>?St zib0l|8HSjj9oaVPvW!e)V$wm>k7s&-Z-)ecxLYi1XjBZKMqV zz;-aeCwNPlU#X?BRfXuNfh|#^dxIymwveM0Q@G`kw16-=0N}d65g9THNK=;SC`tONC2eC3jd5ddhof<9g+GOFO0#HSIV-}b-X+9uTi56NEM*ZX$AT#KgFq3H%l5nl{C@S{ab=GV$!oQ_xC`rDWsbO~C|3 zApNkUlm4alNVGDE#|qCTDlWnJWGbD1be*H~g5eLtquY3_`OfLJpq7WZSU8!J_+lzr z+4~HYS@n{~3d$zh-{tosD3L&fYLx`%=4+xhWtR{Mdm8*!5r#RV)RnoHk>^#LH5my? zg(Tmur2HySK;78E{FP&jv({0G$F32#hI>UwlG09A4;{J&!8PD{GFO$I+=z!{-iu1R zk3$#ZbY?2K1q8L-)=bzL`pEp(>@N$VCp^pvRH4KQtuEehlRr7%CZg$Ou#G=m3x zkfdxAxxdUNR>+?51G`NQRw?vai^usZ2%cmr7*!bFZ;GG@w8R5@$Qs9FIXJSO8^4%1b_h=TWax+t_r zM2I0%H|aa8B374rq0B}HJ=p^|}rl`&-aIEyT@saEv&?9OPb8}Ng308ns)qn_b7qI|D(DaJDC+8?sF z$=$*9<172X36*$N|4TmOM{TW`mAZ`+28$~WG8NE2{&Q>HWd7xZ7UO7~@G4-uKlIIe zFL3jxdIX4KHiciRpZJfZC;Oru!(w5=p1b-_S)@I8oOsF_a+M^Wp}oo=6XDhIR<(@q z{GO`_*LG=~E(s^pm4WJO66=L&`*wc&?1!v)f=aXf$V9igXMw0e3$H4g39ks0f+lFCa+QXgSR-+)63r+V+#K9<}H$g5wvpuzv>G= zFwZQdsiya^HkI1c-D6Y+!RNd5W9sR;wDiEcaBq(ArB||^)D=`b`k<#S+rK(4}No6_Wj_|hWatl zTa2KUaXs}Jv3=~?l2ZxSS)rLMg;xsU&7!s>pS7^#4I??Qf zvD}42Fblf=$$(B% zH`Ws~bFn(5j3Y?fdpT~Y(Fk-^b*wEPI^`2t|9K7*h`R18!iJUB2>>d99-jH#)buW2 z+?5(QV_w*65rt9}gmW4Ce!0DW;jE#9Q_e*sG5H=_Um literal 0 HcmV?d00001 diff --git a/app/src/main/assets/shared_images/vpn_key_light.png b/app/src/main/assets/shared_images/vpn_key_light.png new file mode 100644 index 0000000000000000000000000000000000000000..28be5b70e2c01664622df784b77c4e0902d81c2d GIT binary patch literal 1453 zcmaKseKgYx7{`CxnAcsYEs?vFDJZl3r0;GNa z8*UZSGqC)2SzlSj2v)40{nJ%)ncL@a-OSxp_I7rUxV?sk6+uY5(4X4KU+-^dtI?NZ zkNnA~6;_e7oLlJWPBGJ<+=L^Tv&=^DsqXt*_tFd`yfLTMw*81!Xz7@&e1R;7D&I1y zlol9OPV7yrc6#B?JHf3 zJmJK!4a^0s!wV`oE6l8;iVPFQBER%B0;n&-48XSO+0C3AE%J!75l=!ir@@9L=$sD5 z9#;$Z7@^V*aP-}WMUX#&#SltaM^h6~`*nMYK@>jyG=h1Ilk#;kU}7J~f&X$U!ovrh z7rCf^xH1$5zMWn+<~ZCK5q>-CB}Q6<^DIS_WpnHJJqy6yIXMYUA&okajsEYMD{aye zzy>xe5+*3R6AB}UUo8npCRA*O;jI=_I~smow%QN)D6_zHqG{fY0%N{EDye#zT2{a_Hq{i`IhI$qL268ZsKW5af^ zQ{mwKa3{LZ)t~wCoDe|@n~>V~xx}V`^u)>nGZu9TI5nXPH}Hezb=GZ<9O$CFcvO$iOXd(4TgT168mH%3?sqvKLK25y*LIfA! zkWOB*f(u!99{!NQo$faI0$|#0yNlIh%ekY$qqKVXWKfD8 z075bC)^zW~*BUY%L<2D3ZhjasX7;LT%3Jy|^JW7($sL%$bPfRA{`ps+FW5EWTpZ{C z1282C#uuN3hRBtKq5Wo?C6{GBiNN!zj)9L6dFpE7HVrhbUel644t%QIp8O#T_POZ7 zFsv1F7bNd3?>%`Gh?U`8fhdEhPW7$47-rU?OO!*qSZYbn2(Nq8kH9NY2gq<$H$I&S hn?jv8{Vw^%E1Oug-eu+xLfiUl1#n*eo^@D4_J2f%qRapQ literal 0 HcmV?d00001 -- 2.43.0