diff --git a/articles/badwolf.html b/articles/badwolf.html index a3b62ce..2a69764 100644 --- a/articles/badwolf.html +++ b/articles/badwolf.html @@ -19,13 +19,13 @@

Spyware Level: Not Spyware

BadWolf makes no unsolicited requests at all.

BadWolf is a pretty decent browser worth looking into. A couple of neat features worth noting is that BadWolf has a JavaScript switch and an image viewer switch, which is useful for daily tasks.

-
+

Further Reading

BadWolf Homepage

-
+

This article was created on 6/19/2021

This article was lasted edited on 6/19/2021

-
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License diff --git a/articles/badwolf_de.html b/articles/badwolf_de.html index 92c36e3..1ca052f 100644 --- a/articles/badwolf_de.html +++ b/articles/badwolf_de.html @@ -19,13 +19,13 @@

Spyware-Level: Keine Spyware

BadWolf stellt nicht ungefragt Verbindungen her.

BadWolf ist ein guter Browser und definitiv einen Blick wert. Die nützlichsten Funktionen sind der integrierte JavaScript-Schalter und die Option, Bilder standardmässig nicht anzuzeigen.

-
+

Weitere Informationen

BadWolf Homepage

-
+

Dieser Artikel wurde am 19.6.2022 erstellt

Dieser Artikel wurde zuletzt am 12.2.2022 bearbeitet

-
+

If you want to edit this article, or contribute your own article(s), visit us diff --git a/articles/bleachbit.html b/articles/bleachbit.html index 2faacb7..aa14c79 100644 --- a/articles/bleachbit.html +++ b/articles/bleachbit.html @@ -18,12 +18,12 @@

Bleachbit is Tool to Clean Your System and Free Disk Space. Also, BleachBit can Shred Files.

Spyware Level: Not Spyware

BleachBit makes no unsolicited requests at all.

-
+

Further Reading

BleachBit Home Page

-
+

This article was created on 5/1/2022

-
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License diff --git a/articles/brave.html b/articles/brave.html index 6a244b3..d628808 100644 --- a/articles/brave.html +++ b/articles/brave.html @@ -53,7 +53,7 @@

Not spyware related, but worth noting

Anti-privacy search engine by default

Google is the default search engine of Brave. For a browser that claims to be privacy oriented, this is a red flag. They at least make it easy for you to change the default search engine on the first run.

-
+

Sources

@@ -147,10 +147,10 @@ [ghostarchive.org]

-
+
This article was created on 5/7/2018
This article was last edited on 8/17/2021 -
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

diff --git a/articles/brave_ru.html b/articles/brave_ru.html index 37f8f21..f70b9de 100644 --- a/articles/brave_ru.html +++ b/articles/brave_ru.html @@ -53,7 +53,7 @@

Не связано со слежением, но стоит отметить

Неконфиденциальный поисковик по умолчанию

Google - стандартная поисковая система в Brave. Это очень странно для браузера, позиционирующего себя приватным. По крайней мере, при первом запуске Brave даёт выбор поисковой системы по умолчанию.

-
+

Источники

@@ -145,10 +145,10 @@ [web.archive.org] [ghostarchive.org]

-
+
Этот перевод был создан 13/07/2021
Этот перевод в последний раз изменялся 13/07/2021 -
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License diff --git a/articles/http.html b/articles/http.html index 26e96c6..3306782 100644 --- a/articles/http.html +++ b/articles/http.html @@ -25,7 +25,7 @@

In the HTTP specification, the W3C explicitly acknowledges the serious privacy violations that implementations of this protocol are capable of comitting. Section 15.1[2] of the HTTP specification has a very detailed analysis of the implications of the comprimization of privacy that the User-Agent allows to happen and suggests how to use the User-Agent feature: as an opt-in feature where the privacy concerns of using such a feature are properly explained to the user. Even though this is a good section, it shows a very naive viewpoint from the W3C, the expectation that this feature would not be abused, and the expectation that implementers of this standard would respect the privacy of their users and would not use these features of the protocol to datamine users.

At best, you could call this mindset naive. If you want to hold the W3C in contempt, you could call it malicious. It's easy to write in your standard that while you could use this protocol to monitor the behavior of users, you should ask for their permission. But once that standard is widely implemented, and is widely used for the exact malicious purpose that was acknowledged in its specification, who's fault is that?

-
+

Sources

@@ -40,10 +40,10 @@ [web.archive.org] [ghostarchive.org]

-
+

This article was created on 5/14/2018

This article was lasted edited on 10/11/2020

-
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License diff --git a/articles/lynx.html b/articles/lynx.html index 9b7490d..132affe 100644 --- a/articles/lynx.html +++ b/articles/lynx.html @@ -23,13 +23,13 @@

Spyware Level: Not Spyware

Lynx makes no unsolicited requests at all.

It is also fully libre software under the GPLv2 license.

-
+

Further Reading

lynx.browser.org

-
+

This article was created on 4/6/2020

This article was lasted edited on 10/7/2020

-
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License diff --git a/articles/lynx_pl.html b/articles/lynx_pl.html index 7e208ba..d3c5884 100644 --- a/articles/lynx_pl.html +++ b/articles/lynx_pl.html @@ -23,13 +23,13 @@

Poziom Oprogramowania Szpiegowskiego: Brak oprogramowania szpiegowskiego

Lynx nie wysyła żadnych niepożądanych żądań.

Jest także w pełni otwartym oprogramowaniem licencjonowanym na licencji GPLv2.

-
+

Further Reading

lynx.browser.org

-
+

This article was created on 4/6/2020

This article was lasted edited on 10/7/2020

-
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License diff --git a/articles/lynx_ru.html b/articles/lynx_ru.html index b25dcce..e9f6f61 100644 --- a/articles/lynx_ru.html +++ b/articles/lynx_ru.html @@ -23,13 +23,13 @@

Уровень слежки: Нет

Lynx никогда не делает нежелательных запросов.

Это полностью свободное программное обеспечение, лиценизрованное по GPLv2.

-
+

Дополнительная информация

lynx.browser.org

-
+

Этот перевод был создан 9/7/2021

Этот перевод в последний раз был изменён 9/7/2021

-
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License diff --git a/articles/otter.html b/articles/otter.html index d0683b1..ea729ec 100644 --- a/articles/otter.html +++ b/articles/otter.html @@ -18,10 +18,10 @@

From their website: "Otter Browser aims to recreate the best aspects of the classic Opera (12.x) UI using Qt5." Their motto is: "Controlled by the user, not vice versa". Version tested: 0.9.12 (SlackBuild from slackbuilds.org). Program used for testing requests: Mitmproxy.

Spyware Level: Not Spyware

Otter Browser makes no unsolicited requests at all. It is fully open source. The developers, also, don't plan to include any spyware "features" in the future. This seems like a true privacy-based web browser (at least for now).

-
+

This article was created on 11/25/2017

This article was lasted edited on 10/5/2020

-
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License diff --git a/articles/qutebrowser.html b/articles/qutebrowser.html index 7ea79b7..ee1e155 100644 --- a/articles/qutebrowser.html +++ b/articles/qutebrowser.html @@ -21,10 +21,10 @@

Qutebrowser is a keyboard-focused browser with a minimal GUI. It's based on Python and PyQt5 and free software, licensed under the GPL. Program tested: v1.6.1 for Debian Buster. Mitmproxy was used to check for connections.

Spyware Level: Not Spyware

Qutebrowser makes no unsolicited requests at all. It is also libre software. This web browser is a great choice to use, and there is nothing to complain about from a privacy standpoint. (although I don't really know how to use the User Interface that well...) So far this browser looks like it can stand tall in the ranks of the other privacy-respecting web browsers out there.

-
+

This article was created on 5/10/2018

This article was lasted edited on 10/7/2020

-
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License diff --git a/articles/qutebrowser_ru.html b/articles/qutebrowser_ru.html index 605a41f..db47d8a 100644 --- a/articles/qutebrowser_ru.html +++ b/articles/qutebrowser_ru.html @@ -21,10 +21,10 @@

Qutebrowser - веб-браузер, ориентированный на управление с клавиатуры, с минимальным графическим интерфейсом. Он основан на Python, PyQt5 и свободном ПО, лицензированном под GPL. Программа протестирована: v1.6.1 для Debian Buster. Mitmproxy было использовано для проверки соединений.

Spyware Level: Not Spyware

Qutebrowser никогда не делает нежелательных запросов. Это свободное программное обеспечение. Этот браузер - отличный выбор, и с точки зрения приватности жаловаться здесь не на что (хотя я не знаю как управляться с этим пользовательским интерфейсом...). Пока этот браузер выглядит достойным, чтобы стоять в одном ряду с другими браузерами, уважающими конфиденциальность пользователя.

-
+

Этот перевод был создан 9/7/2021

Этот перевод в последний раз изменялся 9/7/2021

-
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License diff --git a/articles/seamonkey.html b/articles/seamonkey.html index da6b81f..9b49cab 100644 --- a/articles/seamonkey.html +++ b/articles/seamonkey.html @@ -27,10 +27,10 @@ SeaMonkey Logo (WikiMedia)

2. https://www.seamonkey-project.org/about[web.archive.org]

-
+
This article was created on 1/17/2021
This article was last edited on 5/3/2021 -
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License diff --git a/articles/telegram.html b/articles/telegram.html index 9c7fc49..6e931dc 100644 --- a/articles/telegram.html +++ b/articles/telegram.html @@ -26,7 +26,7 @@

Telegram does not follow its GPLv2 Obligations

Telegram clients are advertised as free software, but in practice the source code is not immediately accessible.[2], the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since it's not provable whether or not the binaries that are distributed have unknown spyware or not.

-
+

Sources

1. @@ -42,10 +42,10 @@ [archive.is] [ghostarchive.org]

-
+

This article was created on 2/18/2019

This article was lasted edited on 10/11/2020

-
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License diff --git a/articles/webbrowser.html b/articles/webbrowser.html index 059553d..028818b 100644 --- a/articles/webbrowser.html +++ b/articles/webbrowser.html @@ -19,14 +19,14 @@

Spyware Level: Not Spyware

Web Browser makes no unsolicited requests at all. It is also fully open source.[1] Due to it being based on Pale Moon, it has access to all of the XUL plugins available.

-
+

Sources

1.Project's homepage

-
+

This article was created on 4/3/20

This article was lasted edited on 10/11/2020

-
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License diff --git a/articles/webdiscover.html b/articles/webdiscover.html index 09d4f09..36a5590 100644 --- a/articles/webdiscover.html +++ b/articles/webdiscover.html @@ -44,7 +44,7 @@

Phoning Home

When WebDiscover is started, it will begin making requests to ec2-54-191-159-75.us-west-2.compute.amazonaws.com

This is presumably how it collects a lot of the personal information about its users. This was discovered using Microsoft Network Monitor 3.4.

-
+

Sources

1. @@ -57,9 +57,9 @@ [archive.is] [ghostarchive.org]

-
+

This article was last edited on 8/4/2018

-
+

If you want to contribute to this website, you can always make a pull request.

All contributions must be licensed under the CC0 license to be accepted.

CC0 License