X-Git-Url: https://gitweb.stoutner.com/?a=blobdiff_plain;ds=sidebyside;f=app%2Fsrc%2Fmain%2Fassets%2Fru%2Fguide_proxies_light.html;fp=app%2Fsrc%2Fmain%2Fassets%2Fru%2Fguide_proxies_light.html;h=0e3946f47e4ccebde5c0c635a188c3fa0facb44b;hb=81179d84ced6b43360d42a4b44eb8fb329532ff4;hp=0000000000000000000000000000000000000000;hpb=ca7516a7edb9e06d0f9fe9186513986cd82be716;p=PrivacyBrowserAndroid.git diff --git a/app/src/main/assets/ru/guide_proxies_light.html b/app/src/main/assets/ru/guide_proxies_light.html new file mode 100644 index 00000000..0e3946f4 --- /dev/null +++ b/app/src/main/assets/ru/guide_proxies_light.html @@ -0,0 +1,86 @@ + + + +
+ + + + + + +СÑÑеÑÑвÑÑÑ Ð´Ð²Ðµ оÑновнÑе оÑÑиÑаÑелÑнÑе каÑегоÑии ÑÑбÑекÑов, коÑоÑÑе наÑÑÑаÑÑ ÐºÐ¾Ð½ÑиденÑиалÑноÑÑÑ Ð² инÑеÑнеÑе: злонамеÑеннÑе пÑавиÑелÑÑÑва, имеÑÑие доÑÑÑп к инÑеÑнеÑ-пÑовайдеÑам и кÑÑпнÑе коÑпоÑаÑии, + коÑоÑÑе ÑпÑавлÑÑÑ ÑоÑиалÑнÑми и ÑекламнÑми ÑеÑÑми. + Proxies like TOR (The Onion Router) and I2P (the Invisible Internet Project) are useful in protecting privacy from malicious governments (which spy on traffic in transit) + but not from mega corporations (which embed malicious code on web servers).
+ + +ÐлонамеÑеннÑе пÑавиÑелÑÑÑва ÑаÑÑо ÑледÑÑ Ð·Ð° Ñвоими гÑажданами, ÑÑÐ¾Ð±Ñ Ð½Ð°ÐºÐ°Ð·Ð°ÑÑ Ð·Ð° инакомÑÑлие или пÑавозаÑиÑнÑÑ Ð´ÐµÑÑелÑноÑÑÑ. + Ðак пÑавило, они либо ÑабоÑаÑÑ Ñ Ð»Ð¾ÐºÐ°Ð»ÑнÑми инÑеÑнеÑ-пÑовайдеÑами, либо могÑÑ Ð·Ð°ÑÑавиÑÑ Ð¸Ñ ÑаÑкÑÑÑÑ Ð¸Ð½ÑоÑмаÑиÑ, ÑодеÑжаÑÑÑ ÑÑаÑиÑÑÐ¸ÐºÑ Ð¿Ð¾ÑеÑений ÑайÑов нÑжного полÑзоваÑелÑ. + Layered proxies are designed to defeat this infringement of privacy by encrypting the traffic from a userâs device and routing it through multiple servers on the internet + before sending it on to the final destination. + This means that no individual ISP, server, or website, can know both the IP address of the userâs device and the IP address of the final web server. + Malicious governments and the ISPs they control cannot tell which web servers a user is accessing, although they can tell that the user is using a layered proxy service. + In some parts of the world, using proxies could be construed as an evidence of illegal behavior (âIf you didnât have anything to hide you wouldnât be encrypting your trafficâ) + and users could be punished because governments assume they are doing something that is prohibited. Thus, proxies can be helpful, but they arenât a panacea.
+ + +Ðогда полÑзоваÑÐµÐ»Ñ Ð¿Ð¾Ð´ÐºÐ»ÑÑаеÑÑÑ Ðº веб-ÑеÑвеÑÑ, ÑеÑÐ²ÐµÑ Ð¼Ð¾Ð¶ÐµÑ Ð²Ð¸Ð´ÐµÑÑ IP-адÑÐµÑ Ð¿Ð¾Ð»ÑзоваÑелÑ. + ÐеÑмоÑÑÑ Ð½Ð° Ñо, ÑÑо пока ÑÑо ÑабоÑÐ°ÐµÑ Ð½Ðµ идеалÑно, IP-адÑеÑа могÑÑ Ð±ÑÑÑ Ð¿ÑевÑаÑÐµÐ½Ñ Ð² ÑизиÑеÑкие адÑеÑа Ñ Ð´Ð¾ÑÑаÑоÑнÑм колиÑеÑÑвом ÑоÑноÑÑи. + Small web servers typically rely on IP addresses to identify the location of the users visiting their site. Proxies are a good solution to mask the userâs location from these servers. + Ðо кÑÑпнÑе коÑпоÑаÑии, коÑоÑÑе владеÑÑ ÑоÑиалÑнÑми и ÑекламнÑми ÑеÑÑми, иÑполÑзÑÑÑ Ð²ÐµÑÑ Ð¿ÑоÑÐ¸Ð»Ñ Ð¸Ð½ÑоÑмаÑии, коÑоÑÑй пÑедназнаÑен Ð´Ð»Ñ Ð¾ÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей ÑеÑез ÑÑÑÑойÑÑва и IP-адÑеÑа. + Ð ÑÑÐ¸Ñ Ð¿ÑоÑилÑÑ Ð¸ÑполÑзÑÑÑÑÑ ÑазлиÑнÑе меÑÐ¾Ð´Ñ Ð¸Ð´ÐµÐ½ÑиÑикаÑии полÑзоваÑелей, вклÑÑÐ°Ñ JavaScript, ÑÐ°Ð¹Ð»Ñ cookie, + иденÑиÑикаÑоÑÑ Ð¾ÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¸ оÑпеÑаÑок бÑаÑзеÑа. + ÐоÑколÑÐºÑ Ð¿Ð¾Ð´Ð°Ð²Ð»ÑÑÑее болÑÑинÑÑво веб-ÑайÑов в инÑеÑнеÑе загÑÑжаÑÑ ÑÐµÐºÐ»Ð°Ð¼Ñ Ð¾Ñ Ð¾Ð´Ð½Ð¾Ð¹ из оÑновнÑÑ ÑеÑей или вÑÑÑаиваÑÑ Ð·Ð½Ð°Ñки ÑоÑиалÑнÑÑ ÑеÑей Ñ Ð°ÑÑоÑииÑованнÑм Ñ Ð½Ð¸Ð¼Ð¸ JavaScript, + ÑÑи коÑпоÑаÑии имеÑÑ Ð²ÑÑÑоеннÑе пÑоÑили поÑÑи Ð´Ð»Ñ ÐºÐ°Ð¶Ð´Ð¾Ð³Ð¾ полÑзоваÑÐµÐ»Ñ Ð² инÑеÑнеÑе и могÑÑ Ð¾ÑÑлеживаÑÑ Ð¸Ð½ÑеÑнеÑ-акÑивноÑÑÑ Ð½Ð° неÑвÑзаннÑÑ ÑайÑÐ°Ñ .
+ +Ðни оÑÑлеживаÑÑ ÐºÐ°Ð¶Ð´Ñй поÑеÑаемÑй ÑайÑ, вÑе, ÑÑо пÑиобÑеÑаеÑÑÑ, каждÑÑ ÐºÑедиÑнÑÑ ÐºÐ°ÑÑÑ, иÑполÑзÑемÑÑ Ð´Ð»Ñ ÑовеÑÑÐµÐ½Ð¸Ñ Ð¿Ð¾ÐºÑпки, каждÑй адÑеÑ, кÑда оÑпÑавлÑÑÑÑÑ ÑоваÑÑ, + меÑаданнÑе GPS каждого изобÑажениÑ, загÑÑжаемого в инÑеÑнеÑ. + Ðни ÑоздаÑÑ Ð¿ÑоÑÐ¸Ð»Ñ Ð¸Ð· возÑаÑÑа полÑзоваÑелÑ, пола, Ñемейного положениÑ, адÑеÑа, полиÑиÑеÑÐºÐ¸Ñ Ð¿ÑиÑÑÑаÑÑий, Ñелигиозной пÑинадлежноÑÑи, ÑемейнÑÑ Ð¾Ð±ÑÑоÑÑелÑÑÑв, + колиÑеÑÑва домаÑÐ½Ð¸Ñ Ð¶Ð¸Ð²Ð¾ÑнÑÑ Ð¸ вÑего оÑÑалÑного, ÑÑо им ÑдаеÑÑÑ Ð¿Ð¾Ð»ÑÑиÑÑ. + Ðни даже ÑкÑпаÑÑ Ð±Ð°Ð·Ñ Ð´Ð°Ð½Ð½ÑÑ ÑÑанзакÑий по кÑедиÑнÑм каÑÑам в меÑÑнÑÑ Ð¼Ð°Ð³Ð°Ð·Ð¸Ð½Ð°Ñ , поÑÑÐ¾Ð¼Ñ Ð¾Ð½Ð¸ могÑÑ Ð¾ÑÑлеживаÑÑ Ð°Ð²ÑономнÑе модели покÑпок полÑзоваÑелей в ÑÐ²Ð¾Ð¸Ñ Ð¿ÑоÑилÑÑ . + Because they already have much more accurate address information about a user than an IP address discloses, proxies provides no real privacy protection against mega corporations.
+ +ÐдинÑÑвенной и Ñамой лÑÑÑей заÑиÑой конÑиденÑиалÑноÑÑи Ð¾Ñ ÐºÑÑпнÑÑ ÐºÐ¾ÑпоÑаÑий ÑвлÑеÑÑÑ Ð¿ÑоÑмоÑÑ Ð²ÐµÐ±-ÑайÑа Ñ Ð¾ÑклÑÑеннÑм JavaScript, за коÑоÑÑм ÑледÑÐµÑ Ð±Ð»Ð¾ÐºÐ¸Ñование ÑекламнÑÑ ÑеÑей, + оÑклÑÑение Ñайлов cookie и Ñ ÑанилиÑа DOM, а Ñакже иÑполÑзование бÑаÑзеÑа, оÑпеÑаÑок коÑоÑого ÑÑÑдно опÑеделиÑÑ.
+ + +Despite their limitations, proxies can be useful in some circumstances. + Tor and I2p + have Android apps that make it easy to use their proxy networks. When proxying is turned on in Privacy Browser, the app bar will have a light blue background instead of the default light grey. + Because traffic is being routed through several proxy nodes, using a layered proxy is often much slower than connecting directly to the internet.
+ + + +When Orbot is operating in proxy mode, browsing the internet using Privacy Browser will be routed through the proxy, but file downloads will not. + This is because Privacy Browser uses Androidâs builtin download manager to download files, which doesnât have a proxy option. + Users who want to download files via Orbot need to enable its VPN mode. There is currently no way to download files through I2P.
+ + + + \ No newline at end of file