diff --git a/articles/badwolf.html b/articles/badwolf.html index a3b62ce..2a69764 100644 --- a/articles/badwolf.html +++ b/articles/badwolf.html @@ -19,13 +19,13 @@
BadWolf makes no unsolicited requests at all.
BadWolf is a pretty decent browser worth looking into. A couple of neat features worth noting is that BadWolf has a JavaScript switch and an image viewer switch, which is useful for daily tasks.
-This article was created on 6/19/2021
This article was lasted edited on 6/19/2021
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/badwolf_de.html b/articles/badwolf_de.html index 92c36e3..1ca052f 100644 --- a/articles/badwolf_de.html +++ b/articles/badwolf_de.html @@ -19,13 +19,13 @@BadWolf stellt nicht ungefragt Verbindungen her.
BadWolf ist ein guter Browser und definitiv einen Blick wert. Die nützlichsten Funktionen sind der integrierte JavaScript-Schalter und die Option, Bilder standardmässig nicht anzuzeigen.
-Dieser Artikel wurde am 19.6.2022 erstellt
Dieser Artikel wurde zuletzt am 12.2.2022 bearbeitet
-If you want to edit this article, or contribute your own article(s), visit us diff --git a/articles/bleachbit.html b/articles/bleachbit.html index 2faacb7..aa14c79 100644 --- a/articles/bleachbit.html +++ b/articles/bleachbit.html @@ -18,12 +18,12 @@
Bleachbit is Tool to Clean Your System and Free Disk Space. Also, BleachBit can Shred Files.
BleachBit makes no unsolicited requests at all.
-This article was created on 5/1/2022
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/brave.html b/articles/brave.html index 6a244b3..d628808 100644 --- a/articles/brave.html +++ b/articles/brave.html @@ -53,7 +53,7 @@Google is the default search engine of Brave. For a browser that claims to be privacy oriented, this is a red flag. They at least make it easy for you to change the default search engine on the first run.
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/brave_ru.html b/articles/brave_ru.html index 37f8f21..f70b9de 100644 --- a/articles/brave_ru.html +++ b/articles/brave_ru.html @@ -53,7 +53,7 @@Google - стандартная поисковая система в Brave. Это очень странно для браузера, позиционирующего себя приватным. По крайней мере, при первом запуске Brave даёт выбор поисковой системы по умолчанию.
-@@ -145,10 +145,10 @@ [web.archive.org] [ghostarchive.org]
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/http.html b/articles/http.html index 26e96c6..3306782 100644 --- a/articles/http.html +++ b/articles/http.html @@ -25,7 +25,7 @@In the HTTP specification, the W3C explicitly acknowledges the serious privacy violations that implementations of this protocol are capable of comitting. Section 15.1[2] of the HTTP specification has a very detailed analysis of the implications of the comprimization of privacy that the User-Agent allows to happen and suggests how to use the User-Agent feature: as an opt-in feature where the privacy concerns of using such a feature are properly explained to the user. Even though this is a good section, it shows a very naive viewpoint from the W3C, the expectation that this feature would not be abused, and the expectation that implementers of this standard would respect the privacy of their users and would not use these features of the protocol to datamine users.
At best, you could call this mindset naive. If you want to hold the W3C in contempt, you could call it malicious. It's easy to write in your standard that while you could use this protocol to monitor the behavior of users, you should ask for their permission. But once that standard is widely implemented, and is widely used for the exact malicious purpose that was acknowledged in its specification, who's fault is that?
@@ -40,10 +40,10 @@ [web.archive.org] [ghostarchive.org]
-This article was created on 5/14/2018
This article was lasted edited on 10/11/2020
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/lynx.html b/articles/lynx.html index 9b7490d..132affe 100644 --- a/articles/lynx.html +++ b/articles/lynx.html @@ -23,13 +23,13 @@Lynx makes no unsolicited requests at all.
It is also fully libre software under the GPLv2 license.
-This article was created on 4/6/2020
This article was lasted edited on 10/7/2020
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/lynx_pl.html b/articles/lynx_pl.html index 7e208ba..d3c5884 100644 --- a/articles/lynx_pl.html +++ b/articles/lynx_pl.html @@ -23,13 +23,13 @@Lynx nie wysyła żadnych niepożądanych żądań.
Jest także w pełni otwartym oprogramowaniem licencjonowanym na licencji GPLv2.
-This article was created on 4/6/2020
This article was lasted edited on 10/7/2020
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/lynx_ru.html b/articles/lynx_ru.html index b25dcce..e9f6f61 100644 --- a/articles/lynx_ru.html +++ b/articles/lynx_ru.html @@ -23,13 +23,13 @@Lynx никогда не делает нежелательных запросов.
Это полностью свободное программное обеспечение, лиценизрованное по GPLv2.
-Этот перевод был создан 9/7/2021
Этот перевод в последний раз был изменён 9/7/2021
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/otter.html b/articles/otter.html index d0683b1..ea729ec 100644 --- a/articles/otter.html +++ b/articles/otter.html @@ -18,10 +18,10 @@From their website: "Otter Browser aims to recreate the best aspects of the classic Opera (12.x) UI using Qt5." Their motto is: "Controlled by the user, not vice versa". Version tested: 0.9.12 (SlackBuild from slackbuilds.org). Program used for testing requests: Mitmproxy.
Otter Browser makes no unsolicited requests at all. It is fully open source. The developers, also, don't plan to include any spyware "features" in the future. This seems like a true privacy-based web browser (at least for now).
-This article was created on 11/25/2017
This article was lasted edited on 10/5/2020
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/qutebrowser.html b/articles/qutebrowser.html index 7ea79b7..ee1e155 100644 --- a/articles/qutebrowser.html +++ b/articles/qutebrowser.html @@ -21,10 +21,10 @@Qutebrowser is a keyboard-focused browser with a minimal GUI. It's based on Python and PyQt5 and free software, licensed under the GPL. Program tested: v1.6.1 for Debian Buster. Mitmproxy was used to check for connections.
Qutebrowser makes no unsolicited requests at all. It is also libre software. This web browser is a great choice to use, and there is nothing to complain about from a privacy standpoint. (although I don't really know how to use the User Interface that well...) So far this browser looks like it can stand tall in the ranks of the other privacy-respecting web browsers out there.
-This article was created on 5/10/2018
This article was lasted edited on 10/7/2020
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/qutebrowser_ru.html b/articles/qutebrowser_ru.html index 605a41f..db47d8a 100644 --- a/articles/qutebrowser_ru.html +++ b/articles/qutebrowser_ru.html @@ -21,10 +21,10 @@Qutebrowser - веб-браузер, ориентированный на управление с клавиатуры, с минимальным графическим интерфейсом. Он основан на Python, PyQt5 и свободном ПО, лицензированном под GPL. Программа протестирована: v1.6.1 для Debian Buster. Mitmproxy было использовано для проверки соединений.
Qutebrowser никогда не делает нежелательных запросов. Это свободное программное обеспечение. Этот браузер - отличный выбор, и с точки зрения приватности жаловаться здесь не на что (хотя я не знаю как управляться с этим пользовательским интерфейсом...). Пока этот браузер выглядит достойным, чтобы стоять в одном ряду с другими браузерами, уважающими конфиденциальность пользователя.
-Этот перевод был создан 9/7/2021
Этот перевод в последний раз изменялся 9/7/2021
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/seamonkey.html b/articles/seamonkey.html index da6b81f..9b49cab 100644 --- a/articles/seamonkey.html +++ b/articles/seamonkey.html @@ -27,10 +27,10 @@ SeaMonkey Logo (WikiMedia)2. https://www.seamonkey-project.org/about[web.archive.org]
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/telegram.html b/articles/telegram.html index 9c7fc49..6e931dc 100644 --- a/articles/telegram.html +++ b/articles/telegram.html @@ -26,7 +26,7 @@Telegram clients are advertised as free software, but in practice the source code is not immediately accessible.[2], the delay sometimes being up to 5 months. So, unknown spyware features could be in the official Telegram client binaries that you download, without you knowing. It's recommended that you build an outdated version of telegram from its source code, since it's not provable whether or not the binaries that are distributed have unknown spyware or not.
1. @@ -42,10 +42,10 @@ [archive.is] [ghostarchive.org]
-This article was created on 2/18/2019
This article was lasted edited on 10/11/2020
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/webbrowser.html b/articles/webbrowser.html index 059553d..028818b 100644 --- a/articles/webbrowser.html +++ b/articles/webbrowser.html @@ -19,14 +19,14 @@Web Browser makes no unsolicited requests at all. It is also fully open source.[1] Due to it being based on Pale Moon, it has access to all of the XUL plugins available.
This article was created on 4/3/20
This article was lasted edited on 10/11/2020
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.
diff --git a/articles/webdiscover.html b/articles/webdiscover.html index 09d4f09..36a5590 100644 --- a/articles/webdiscover.html +++ b/articles/webdiscover.html @@ -44,7 +44,7 @@When WebDiscover is started, it will begin making requests to ec2-54-191-159-75.us-west-2.compute.amazonaws.com
This is presumably how it collects a lot of the personal information about its users. This was discovered using Microsoft Network Monitor 3.4.
-1. @@ -57,9 +57,9 @@ [archive.is] [ghostarchive.org]
-This article was last edited on 8/4/2018
-If you want to contribute to this website, you can always make a pull request.
All contributions must be licensed under the CC0 license to be accepted.