/
en.json
238 lines (238 loc) · 36.6 KB
/
en.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
{
"App Store": "App Store",
"Audit Notes": "Audit Notes",
"Audit Report": "Audit Report",
"Audited": "Audited",
"by": "by",
"Cellular": "Cellular",
"Communication Protocols": "Communication Protocols",
"Digital Distribution": "Digital Distribution",
"Disk Encryption": "Disk Encryption",
"DNS": "DNS",
"Email Accounts": "Email Accounts",
"Email Alternatives": "Email Alternatives",
"Email Clients": "Email Clients",
"Email Encryption": "Email Encryption",
"File Storage & Sync": "File Storage & Sync",
"Finance": "Finance",
"Firmware": "Firmware",
"firmware-notes": "LibreWRT is an FSF-endorsed derivation of OpenWrt with the proprietary blobs removed. If your device is supported by LibreWRT, definitely use it over OpenWrt.",
"Groupware": "Groupware",
"Instant Messaging": "Instant Messaging",
"IRC": "IRC",
"Mail Servers": "Mail Servers",
"Mail Transfer Agents": "Mail Transfer Agents",
"Mesh Networks": "Mesh Networks",
"Operating Systems": "Operating Systems",
"Operating Systems (Live)": "Operating Systems (Live)",
"Operating Systems (Mobile)": "Operating Systems (Mobile)",
"Password Managers": "Password Managers",
"Productivity": "Productivity",
"Raspberry Pi": "Raspberry Pi",
"SIP Servers": "SIP Servers",
"Social Networks": "Social Networks",
"Video & Voice": "Video & Voice",
"VPN": "VPN",
"VPN Accounts": "VPN Accounts",
"VPN Clients": "VPN Clients",
"VPN Servers": "VPN Servers",
"Web Analytics": "Web Analytics",
"Web Browser Addons": "Web Browser Addons",
"Web Browsers": "Web Browsers",
"Web Hosting": "Web Hosting",
"web-hosting-notes": "--",
"Web Search": "Web Search",
"World Maps": "World Maps",
"XMPP Servers": "XMPP Servers",
"warning-android": "Warning: The Android operating system provided with phones and tablets is often modified with the addition of proprietary applications from Google or others and may compromise your privacy. We strongly recommend replacing it with either [Replicant](../../projects/replicant) or [CyanogenMod](../../projects/cyanogenmod) (or compile Android from source for your device).<br><br>A must read: [Mission Impossible: Hardening Android for Security and Privacy](https://blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy), by Mike Perry at The Tor Blog.",
"warning-ios": "Warning: Apple iOS devices are affected by PRISM. Even using the software tools we recommend here, your privacy may be compromised by iOS itself. The operating system of any device can unfortunately lever out any privacy protection that a program tries to offer you. The latter has to run in the confides of the OS after all. We strongly recommend replacing your iOS device with an Android-compatible device running either [Replicant](../../projects/replicant) or [Cyanogenmod](../../projects/cyanogenmod).",
"warning-mac": "Warning: Apple OS X is affected by PRISM. Even using the software tools we recommend here, your privacy may be compromised by OS X itself. The operating system of any device can unfortunately lever out any privacy protection that a program tries to offer you. The latter has to run in the confides of the OS after all. We strongly recommend replacing OS X with either [Linux](../gnu-linux) or [BSD](../bsd).",
"warning-windows": "Warning: Microsoft Windows is affected by PRISM. Even using the software tools we recommend here, your privacy may be compromised by Windows. The operating system of any device can unfortunately lever out any privacy protection that a program tries to offer you. The latter has to run in the confides of the OS after all. We strongly recommend replacing Windows with either [Linux](../gnu-linux) or [BSD](../bsd).",
"Communication": "Communication",
"Anonymity": "Anonymity",
"Encryption": "Encryption",
"Synchronization": "Synchronization",
"Syndication": "Syndication",
"Routers": "Routers",
"Servers": "Servers",
"Web Services": "Web Services",
"About": "About",
"All": "All",
"All Categories": "All Categories",
"All Platforms": "All Platforms",
"All Projects": "All Projects",
"Browse": "Browse",
"Category": "Category",
"Categories": "Categories",
"Computer": "Computer",
"Development": "Development",
"Development Info": "Development Info",
"Free Recommendations": "Free Recommendations",
"Issues Tracker": "Issues Tracker",
"Media Mentions": "Media Mentions",
"Mobile": "Mobile",
"More Info": "More Info",
"Network": "Network",
"Official Website": "Official Website",
"One Supported Project": "One Supported Project",
"Platform Support": "Platform Support",
"Platform": "Platform",
"Platforms": "Platforms",
"Platform Types": "Platform Types",
"Protocols": "Protocols",
"Project License": "Project License",
"Project License Unavailable": "Project License Unavailable",
"Projects Supported": "Projects Supported",
"Projects": "Projects",
"Security Notes": "Security Notes",
"Source Code": "Source Code",
"Source Code Unavailable": "Source Code Unavailable",
"Supported Projects": "Supported Projects",
"Supported Protocols": "Supported Protocols",
"Terms of Service": "Terms of Service",
"Wikipedia Article": "Wikipedia Article",
"Web Service": "Web Service",
"site-protocols-index": "**Browse by Protocol**\n\nBrowse F/OSS projects by supported protocol.",
"site-categories-index": "**Browse by Category**\n\nBrowse F/OSS projects by platform categories.",
"site-about-index": "**About**\n\nAbout the PRISM Break project.",
"site-about-privacy": "* This website does not collect any information about you. * This website does not track your IP address. * This website does not use any client-side JavaScript.",
"site-title": "Opt out of global data surveillance programs like PRISM, XKeyscore, and Tempora - PRISM Break",
"meta-description": "Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora. Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.",
"site-introduction": "<strong>Opt out of global data surveillance programs like <a href='https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29'>PRISM</a>, <a href='https://en.wikipedia.org/wiki/XKeyscore'>XKeyscore</a> and <a href='https://en.wikipedia.org/wiki/Tempora'>Tempora</a>.</strong> Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.",
"Menu": "Menu",
"Proprietary": "Proprietary",
"Free Alternatives": "Free Alternatives",
"Notes": "Notes",
"Operating System": "Operating system",
"trisquel": "FSF endorsed, user-friendly GNU/Linux distribution.",
"operating-systems-notes": "<p>Apple, Google, and Microsoft are allegedly a part of PRISM. Their proprietary operating systems cannot be trusted to safeguard your personal information from the NSA. We have two free alternatives: <strong><a href='https://www.gnu.org/distros/free-distros.html'>GNU/Linux</a></strong> and <strong><a href='https://en.wikipedia.org/wiki/Comparison_of_BSD_operating_systems'>BSD</a></strong>.</p><p class='hideable'>GNU/Linux has a much larger community to help you with the transition. It’s recommended that you begin your explorations by looking for a <a href='http://distrowatch.com/'>GNU/Linux distribution</a> that suits your needs. Additionally the <a href='https://www.gnu.org/distros/free-distros.html'>Free Software Foundation hosts a list of completely Free distributions</a>.</p><p><strong>Debian</strong> has a long tradition of software freedom. Contributers have to sign a social contract and adhere to the ethical manifesto. Strict inclusion guidelines make sure that only certified open source software gets packaged in the main repositories.</p><p><strong>Gentoo</strong> describes itself as a meta-distribution. The source code is compiled to binary applications on the user's machine allowing near-unlimited adaptability and complete retraceability of the program logic.</p><p>Both <strong>Fedora</strong> and <strong>openSUSE</strong> are community editions that serve as the stable basis for enterprise ready GNU/Linux distributions with commercial support. Companies all over the world trust Red Hat Inc. and SUSE Linux GmbH because of their transparency throughout the whole development process.</p><p class='hideable'><strong>Parabola</strong> GNU/Linux is effectively 99% <a href='https://www.archlinux.org/'>Arch Linux</a> with a <a href='https://en.wikipedia.org/wiki/Binary_blob'>de-blobbed</a> kernel and a meta-package that blocks unfree licenses. Both of these features can be installed under Arch.</p><p>Canonical’s Ubuntu is not recommended by PRISM Break because it contains <a href='https://www.eff.org/deeplinks/2012/10/privacy-ubuntu-1210-amazon-ads-and-data-leaks'>Amazon ads and data leaks</a> by default. GNU/Linux distributions based on Ubuntu are also currently not recommended due to <a href='https://github.com/nylira/prism-break/issues/334'>several other reasons.</a></p>",
"Live CDS and VM Images": "Live CDs & VM images",
"operating-systems-live-notes": "<p>A live distribution like <strong>Tails</strong> is the fastest and easiest way to a secure operating system. All you have to do is create a bootable CD or USB drive with the files provided and you’re set. Everything else will be preconfigured for you.</p><p>A virtual machine (VM) image like <strong>Whonix</strong> is designed to be run inside of a virtualization package like <a href='https://www.virtualbox.org/'>VirtualBox</a>. VirtualBox can be installed on Windows, Linux, OS X, and Solaris. This means that if you're stuck using Windows or OS X for whatever reason, you can install VirtualBox and use Whonix to increase your privacy and security.</p>",
"Android": "Android",
"android-notes": "<p>If <strong>Replicant</strong> supports your <a href='http://replicant.us/supported-phones/'>Android device</a>, you should definitely use it instead of CyanogenMod, as Replicant is fully free and runs without relying on proprietary system code.</p><p><strong>CyanogenMod</strong> licensing:</p><blockquote><p>“CyanogenMod does still include various hardware-specific code, which is also slowly being open-sourced anyway.”</p><footer>— <cite><a href='https://en.wikipedia.org/wiki/CyanogenMod#Licensing'>Wikipedia</a></cite></footer></blockquote><p>Google Apps (Gapps) are the proprietary applications by Google that come pre-installed with most Android devices. <a href='https://cidofficial.neocities.org/010.html'>Click here</a> to know more about Gapps and how to remove them. Anyway, remember that the best solution is flashing <strong>Replicant</strong> or <strong>CyanogenMod</strong>. We believe that replacing Android with open source software can improve the privacy, security and performance of your device. However, it is possible that your device's closed-source hardware will still remain capable of certain privacy violations.</p>",
"communication-protocols-notes": "--",
"iOS and WP": "iOS & WP",
"No Alternative": "No alternative",
"mobile-os-no-alt": "Replace the device—these operating systems have no free alternatives.",
"operating-systems-mobile-notes": "<p>iOS and WP are proprietary operating systems whose source code are not available for auditing by third parties. You should entrust neither your communications nor your data to a black box device.</p>",
"Web Browser": "Web browser",
"web-browsers-notes": "<p>Try to use <strong>Tor Browser Bundle</strong> (TBB) for all of your web surfing. It will offer you far better anonymity than any other browser. Make sure to <a href='https://www.torproject.org/docs/faq.html.en'>learn the basics of Tor</a> before using it. If the site you want to visit will not work in the TBB, try Firefox intead, but realize these browsers do not anonymize your ip by default.</p><p>TBB notes: Using the TBB to sign into websites that contain your real ID is counterproductive, and may trip the site's fraud protection. Make sure to check for HTTPS before signing in to a website through Tor. Signing into HTTP websites can result in your ID being captured by a Tor exit node.</p><p><strong>Firefox</strong> notes: This browser uses Google search by default: replace it with a more <a href='#web-search'>private alternative</a>. Another debranded alternative to Firefox is <a href='http://www.geticeweasel.org/'>Iceweasel</a>, a browser for Debian-based distributions.</p><p>Why are Chromium, SRWare Iron, et al. not recommended on PRISM Break? <a href='https://github.com/nylira/prism-break/issues/169'>More info here.</a></p><p><strong>Warning for mobile devices & Tor:</strong> Websites using HTML5 <video> tags will leak <video>-related DNS queries and data transfer outside of Tor.</p>",
"Web Browser Addons": "Web Browser Addons",
"web-browser-addons-notes": "<p>Installing your own add-ons into the Tor Browser is not recommended, as they may bypass Tor or otherwise harm your anonymity and privacy. Check the EFF's <a href='https://panopticlick.eff.org/'>Panopticlick</a> to see how trackable your browser configuration is by third parties.</p><p>If you're using a Firefox-based browser, you can safeguard your browsing habits and stop advertising companies from tracking you by installing <strong>uBlock</strong>, <strong>Request Policy</strong>, and <strong>HTTPS Everywhere</strong>.</p> <p>Install <strong>NoScript</strong> and enable ‘Forbid scripts globally’ to improve the security of your browser by preventing 0day JavaScript attacks. This is a drastic option as it will render many websites unusable as they rely heavily on JavaScript. NoScript offers a whitelist you can use to selectively enable JavaScript for sites you trust, but this is considered <a href='https://www.torproject.org/docs/faq.html.en#TBBJavaScriptEnabled'>especially bad for your anonymity</a> if you're using NoScript with the <strong>Tor Browser Bundle</strong>.</p><p>Why is Adblock Plus not recommended? Adblock Plus shows “acceptable ads” by default, which works against the purpose of the add-on. Either disable acceptable ads or use the <strong>uBlock</strong> fork instead.</p><p><a href='https://www.ghostery.com/'>Ghostery</a> is an alternative anti-tracker add-on to <strong>Request Policy</strong>. While the code is available, the license is currently proprietary.</p>",
"web-hosting-notes": "--",
"Web Search": "Web Search",
"web-search-notes": "<p><strong>DuckDuckGo</strong> is a software-as-a-service (SaaS) hosted around the world that provides you with anonymous search results from <a href='https://dukgo.com/help/en_US/results/sources'>these sources</a>. DDG open source components are <a href='https://github.com/duckduckgo'>available here</a>.</p><p>There is also a <strong>DuckDuckGo</strong> hidden service at <a href='http://3g2upl4pq6kufc4m.onion'>3g2upl4pq6kufc4m.onion</a> for Tor users.</p><p><strong>MetaGer</strong> is a SaaS by the German non-profit <a href='https://suma-ev.de/en/index.html'>SUMA e.V.</a> that provides you with anonymous meta search results.</p><p><strong>Startpage</strong> is a SaaS hosted in the USA and the Netherlands that provides you with anonymous Google search and image results through a free proxy.</p><p><a href='https://www.ixquick.com/'>Ixquick</a> (run by the same company as Startpage) is a meta search engine that returns combined results from nearly 100 sources - excluding Google.</p><p><strong>Seeks</strong> acts as a personalizing Web server or proxy between you and your data feeds. Connect most search engines, RSS/ATOM feeds, Twitter/Identica, Youtube/Dailymotion, wikis, and basically any source of data, and Seeks will produce a fused personalized stream of results to your queries. See <a href='http://seeks-project.info/wiki/index.php/List_of_Web_Seeks_nodes'>list of Web Seeks nodes</a>.</p><p>Tor users may use <strong>Seeks</strong> hidden service at <a href='http://5plvrsgydwy2sgce.onion'>5plvrsgydwy2sgce.onion</a>.</p><p><strong>YaCy</strong> is a promising project that offers fully decentralized peer-to-peer search. The more people who start using it, the better the results will become.</p>",
"Maps": "Maps",
"world-maps-notes": "<blockquote><p>“If you spend time contributing to OpenStreetMap you are helping a good cause, and building a geographic database of the world which is free and open for all and forever.”</p><footer>— <cite><a href='https://wiki.openstreetmap.org/wiki/Google_Map_Maker'>OpenStreetMap Wiki</a></cite></footer></blockquote>",
"Email Service": "Email service",
"email-accounts-notes": "<p>For more email providers, take a look at <a href='http://prxbx.com/email/'>Privacy-Conscious Email Services</a>. Please decide for yourself whether if you trust them with your data. For more discussion about safe email providers, please see <a href='https://github.com/nylira/prism-break/issues/461'>issue #461</a>. </p><p><strong>MyKolab</strong> is hosted in Switzerland and benefits from the <a href='https://MyKolab.com/privacy'>strong Swiss privacy laws</a>. It is run exclusively with free software and using the service supports the development of <strong>Kolab</strong>. Also, it lets you export all your data at any time.</p><p><strong>Riseup’s</strong> services may also be accessed via their <a href='#mesh-networks'>Tor Hidden Service</a> addresses. A list is <a href='https://www.riseup.net/en/tor#riseups-tor-hidden-services'>available here</a>.</p><p>Why not Hushmail? See <a href='https://en.wikipedia.org/wiki/Hushmail#Compromises_to_email_privacy'>'compromises to email privacy'</a>.</p><p>If you have the technical aptitude, consider <a href='#mail-servers'>running your own mail server</a>.</p>",
"email-alternatives-notes": "<p><strong>Bitmessage</strong> is a promising alternative to email, but it has not yet been audited by security professionals. Use at your own risk. If you decide to try out Bitmessage, make sure to generate a completely random ID to greatly reduce the probability of ID collisions.</p><p><strong>RetroShare</strong> has not been thoroughly audited by security professionals for possible security issues.</p>",
"Email Client": "Email client",
"email-clients-notes": "<p>Switching from a proprietary service like Gmail to one of the more transparently-run email services on PRISM Break is the first step to a secure email account.</p><p>The second step is getting you and your contacts to encrypt your plain text messages with <a href='#email-encryption'>PGP encryption</a>. This section contains free email clients that support PGP.</p><p>Read the <a href='https://emailselfdefense.fsf.org/'>Email Self-Defense</a> guide by the Free Software Foundation to learn how to encrypt your email messages.</p><p><a href='https://securityinabox.org/en/thunderbird_main'>Here is a guide</a> by Security In A Box to encrypting your email with <strong>Mozilla Thunderbird</strong>, <strong>GNU Privacy Guard (GPG)</strong>, and <strong>Enigmail</strong>.</p><p><a href='https://en.wikipedia.org/wiki/Icedove'>Find out more</a> about the differences between <strong>Mozilla Thunderbird</strong> and <strong>Icedove</strong>.",
"Email Encryption": "Email Encryption",
"email-encryption-notes": "<blockquote><p>“Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, e-mails, files, directories and whole disk partitions to increase the security of e-mail communications.”</p><footer>— <cite><a href='https://en.wikipedia.org/wiki/Pretty_Good_Privacy'>Wikipedia</a></cite></footer></blockquote><p>PRISM Break does not recommended S/MIME email encryption because of its reliance on third-party certificates from central authorities. Read more <a href='https://www.enigmail.net/forum/viewtopic.php?f=7&t=67'>here</a>.</p><p>Experimental PGP projects worth looking at are <a href='https://github.com/dschuermann/openpgp-keychain'>OpenPGP Keychain</a> (a APG fork) and <a href='https://dev.guardianproject.info/projects/gpgandroid/wiki'>GnuPG for Android</a> by the Guardian Project.</p><p>Read the <a href='https://emailselfdefense.fsf.org/'>Email Self-Defense</a> guide by the Free Software Foundation to learn how to encrypt your email messages.</p>",
"Instant Messaging": "Instant Messaging",
"instant-messaging-notes": "<blockquote><p>“Off-the-Record Messaging, commonly referred to as OTR, is a cryptographic protocol that provides strong encryption for instant messaging conversations. OTR uses a combination of the AES symmetric-key algorithm, the Diffie–Hellman key exchange, and the SHA-1 hash function. In addition to authentication and encryption, OTR provides perfect forward secrecy and malleable encryption.</p><p>The primary motivation behind the protocol was providing deniability for the conversation participants while keeping conversations confidential, like a private conversation in real life, or off the record in journalism sourcing.”</p><footer>— <cite><a href='https://en.wikipedia.org/wiki/Off-the-Record_Messaging'>Wikipedia</a></cite></footer></blockquote><p>Note that <strong>Pidgin</strong> stores your IM account passwords in <a href='https://developer.pidgin.im/wiki/PlainTextPasswords'>plain text</a>. You can avoid this by (1) not saving your password in Pidgin, (2) encrypting your file system, or (3) storing your Pidgin password securely with the Debian package <a href='https://code.google.com/p/pidgin-gnome-keyring/'>pidgin-gnome-keyring</a>.</p><p><strong>Pidgin with OTR</strong> and dbus enabled has a local security bug. See the <a href='https://developer.pidgin.im/ticket/14830'>upstream bug report</a> for more information and possible workarounds.</p><p>The Guardian Project hosts <a href='https://guardianproject.info/howto/chatsecurely/'>a fantastic how-to guide</a> to chatting securely on Android with <strong>ChatSecure</strong>.</p><p>Threema is not recommend by PRISM Break as it is closed source software. Freely available source code is a necessary condition for privacy and security.</p>",
"irc-notes": "--",
"Video and VoIP": "Video conferencing & VoIP",
"video-voice-notes": "<p>Get a free Sip-account for <strong>Jitsi</strong> and/or <strong>CSipSimple</strong> with The Guardian Project’s <a href='#sip-servers'>Ostel</a> service.</p>",
"Social Networking": "Social networking",
"Protocol": "Protocol",
"social-networks-notes": "<p>If you have system administration knowledge, please strongly consider running an instance of <strong>pump.io</strong> (or something else) for your friends, family, or favorite community. Many of them would be willing and grateful to escape Facebook if you provide them a way out.</p><p>For those of you without your own server, <strong>RetroShare</strong> is the easiest way to start your own encrypted social network.</p><p><strong><a href='https://identi.ca/'>identi.ca</a></strong> is a popular Twitter-like social networking hub for the free and open source software community runs a <strong>pump.io</strong> software platform.</p>",
"Cloud Storage": "Cloud storage",
"file-storage-sync-notes": "<p>Cloud file storage is also available via <a href='https://git.kolab.org/kolab-chwala/'>Chwala</a>/<a href='https://git.kolab.org/iRony/'>iRony</a> components of <strong>Kolab</strong> with the capability to integrate <a href='https://kolab.org/news/2013/08/07/community-news-meet-chwala-kolabs-new-files-component'>various storage backends</a>. Files are accessible via storage layer access options, WebDAV and Kolab web interface integrating Roundcube.</p><p>Tarsnap is not recommended on PRISM Break due to its lack of anonymous payment options and <a href='https://github.com/nylira/prism-break/issues/555#issuecomment-23216365'>strict copyright on the client</a> that makes it difficult to replace the service in the event Tarsnap is shut down.</p><p>BitTorrent Sync, MEGA, and SpiderOak are services that are built on either partially or fully proprietary software. They will not be recommended on PRISM Break until they open source the entirety of their codebase.</p><p> With closed source software, you need to have 100% trust in the vendor because there's nothing except for their morality in the way of them leaking your personal information. Even if you can vouch for their integrity, proprietary software invariably has more uncaught security bugs and exploits because there are fewer eyes examining the source code.</p><p>Another alternative to cloud storage is local backup with external hard drives and USB flash drives. This method is reliably more secure than storing data on a network, but comes at a convenience cost.</p>",
"Scheduling": "Scheduling",
"Online Office Suite": "Online office suite",
"productivity-notes": "<p>The <strong>etherpad</strong> project maintains a list of <a href='https://github.com/ether/etherpad-lite/wiki/Sites-that-run-Etherpad-Lite'>sites that run etherpad services</a>. Please only choose from the services that use SSL, and research the site's background before trusting them with your data.</p><p><a href='#email-accounts'><strong>Riseup</strong></a> also offers email, XMPP, and chat services, all of which are accessible through <a href='#mesh-networks'>Tor Hidden Service</a> addresses. The list of these addresses is <a href='https://www.riseup.net/en/tor#riseups-tor-hidden-services'>available here</a>.</p><p><strong>ProtectedText</strong> encrypts/decrypts text in the browser, and password (or it's hash) is never sent to the server - so that text can't be decrypted even if requested by authorities.</p>",
"Media Publishing": "Media Publishing",
"media-publishing-notes": "--",
"Online Transactions": "Online transactions",
"Alternative Cryptocurrencies": "Alternative cryptocurrencies",
"cryptocoins": "List of alternative encrypted digital currencies.",
"finance-notes": "<p>Learn more about <strong>Bitcoin</strong> and get started with your first free wallet at <a href='https://www.weusecoins.com/en/'>We Use Coins</a>.</p>",
"Digital Distribution": "Digital Distribution",
"digital-distribution-notes": "<p><strong>Desura</strong> is only the client. You will still have to trust/depend on the proprietary <a href='http://www.desura.com'>Desura service</a>.</p>",
"VPN": "VPN",
"vpn-notes": "--",
"vpn-accounts-notes": "--",
"vpn-servers-notes": "--",
"vpn-clients-notes": "<p>Encrypted virtual private network (VPN) technology can be used by ordinary Internet users to connect to proxy servers for the purpose of protecting one’s identity and online footprint.</p><p>More on <a href='https://en.wikipedia.org/wiki/Virtual_Private_Network#Security_mechanisms'>Wikipedia</a>.</p>",
"Web Analytics": "Web Analytics",
"web-analytics-notes": "--",
"DNS Provider": "DNS provider",
"dns-notes": "<p>Google Public DNS permanently logs your ISP and location information for analysis. Your ip-address is also stored for 24 hours.</p><p><strong>OpenNIC</strong> has not adopted an official policy concerning log query privacy/anonymization. More information <a href='http://wiki.opennicproject.org/Tier2'>here</a>.</p>",
"Anonymizing Networks": "Anonymizing Networks",
"Tor Hidden Services": "Tor Hidden Services",
"tor-hidden-services": "The Tor network offers access to *.onion websites.",
"app-store-notes": "--",
"Meshnet": "Meshnet",
"mesh-networks-project": "A decentralized alternative to the internet.",
"mesh-networks-notes": "<blockquote><p>A mesh-networks is a decentralized peer-to-peer network, with user-controlled physical links that are usually wireless.</p><p>“Mesh networking (topology) is a type of networking where each node must not only capture and disseminate its own data, but also serve as a relay for other nodes, that is, it must collaborate to propagate the data in the network.”</p><footer>— <cite><a href='https://en.wikipedia.org/wiki/Mesh_networking'>Wikipedia</a></cite></footer></blockquote>",
"Server Operating System": "Server operating system",
"server-os-notes": "<p>The only way to have full control over your personal data is to run your own server. This is not for everyone though, as it requires considerable time investment and technical knowledge.</p>",
"File Encryption": "File encryption",
"disk-encryption-notes": "<p>2014-05-28: TrueCrypt currently has security issues and is not recommended.<p><p>If you’re running GNU/Linux, <strong>dm-crypt</strong> with <strong>LUKS</strong> is the recommended encryption option.</p><p>Gentoo GNU/Linux <a href='https://wiki.gentoo.org/wiki/DM-Crypt_LUKS'>maintains a guide</a> for <strong>dm-crypt</strong> with <strong>LUKS</strong>.</p><p>Arch GNU/Linux <a href='https://wiki.archlinux.org/index.php/Dm-crypt_with_LUKS'>maintains a guide</a> to <strong>dm-crypt</strong> with <strong>LUKS</strong>. Also useable for Parabola GNU/Linux.</p><p>Slackware Linux <a href='http://ftp.slackware.com/pub/slackware/slackware-14.1/README_CRYPT.TXT'>maintains a guide</a> to <strong>dm-crypt</strong> with <strong>LUKS</strong>.</p><p><strong>Transparency</strong> in this context means that individual programs don't need to manage encryption of their own data, because this is provided equally for all programs by the encryption tool (like <strong>dm-crypt</strong>). <a href='https://en.wikipedia.org/wiki/Transparency_%28human%E2%80%93computer_interaction%29'>More details on this in the Wikipedia</a>.</p>",
"Mail Server": "Mail server",
"Groupware Server": "Groupware server",
"Mail Transfer Agent": "Mail Transfer Agent (MTA)",
"mail-servers-notes": "<p>A beginner’s guide to running your own mail server is available here: <a href='http://sealedabstract.com/code/nsa-proof-your-e-mail-in-2-hours/'>“NSA-proof your e-mail in 2 hours”</a>.</p><p><strong>Kolab</strong> integrates Roundcube into its webclient and offers desktop clients as well. Recent versions also feature a file cloud turning it into a complete solution for personal information management.</p><blockquote><p><strong>What is an MTA?</strong></p><p>“Within Internet message handling services (MHS), a message transfer agent or mail transfer agent (MTA) or mail relay is software that transfers electronic mail messages from one computer to another using a client–server application architecture. An MTA implements both the client (sending) and server (receiving) portions of the Simple Mail Transfer Protocol.</p><p>The terms mail server, mail exchanger, and MX host may also refer to a computer performing the MTA function. The Domain Name System (DNS) associates a mail server to a domain with mail exchanger (MX) resource records containing the domain name of a host providing MTA services.”</p><footer>— <cite><a href='https://en.wikipedia.org/wiki/Message_transfer_agent'>Wikipedia</a></cite></footer></blockquote>",
"XMPP Server": "XMPP server",
"xmpp-server-notes": "<blockquote><p>“Extensible Messaging and Presence Protocol (XMPP) is a communications protocol for message-oriented middleware based on XML (Extensible Markup Language). The protocol was originally named Jabber, and was developed by the Jabber open-source community in 1999 for near real-time, instant messaging (IM), presence information, and contact list maintenance. Designed to be extensible, the protocol has also been used for publish-subscribe systems, signalling for VoIP, video, file transfer, gaming, Internet of Things applications such as the smart grid, and social networking services.”</p><footer>— <cite><a href='https://en.wikipedia.org/wiki/XMPP'>Wikipedia</a></cite></footer></blockquote>",
"SIP Server": "Sip-server",
"sip-server-notes": "<blockquote><p>“The Session Initiation Protocol (SIP) is a signaling communications protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP) networks.”</p><footer>— <cite><a href='https://en.wikipedia.org/wiki/Session_Initiation_Protocol'>Wikipedia</a></cite></footer></blockquote><p><a href='https://kb.asipto.com/kamailio:skype-like-service-in-less-than-one-hour'>Here’s a guide</a> by Asipto to setting up and running your own Skype-like Sip-service with <strong>Kamailio</strong> in under an hour.</p>",
"Hardware and Software Setup": "Hardware & software setup",
"self-hosting-notes": "--",
"Show All": "show all",
"Service": "Service",
"Software": "Software",
"Server Software": "Server Software",
"Peer-to-Peer Software": "Peer-to-Peer Software",
"Privacy": "Privacy",
"IP exposed": "IP exposed",
"IP hidden": "IP hidden",
"advanced": "advanced",
"Experimental": "Experimental",
"FSF endorsed": "FSF endorsed",
"invite only": "invitation required",
"approval required": "approval required",
"USA hosted": "USA hosted",
"paid service": "paid service",
"paid software": "paid software",
"newbie's choice": "easiest to use",
"editor's choice": "editor’s choice",
"most stable": "most stable",
"most cutting-edge": "most cutting edge",
"most advanced": "most advanced features",
"most paranoid": "most paranoid",
"friendly defaults": "friendly defaults",
"fsf-definition-title": "*This website uses the <strong>Free Software Foundation’s</strong> definition of free software.",
"fsf-quote": "“Free software” means software that respects users’ freedom and community. Roughly, <strong>the users have the freedom to run, copy, distribute, study, change and improve the software</strong>. With these freedoms, the users (both individually and collectively) control the program and what it does for them.",
"eff-title": "Take action against PRISM at the <strong>Electronic Frontier Foundation</strong> Action Center.",
"eff-quote-1": "<strong>MASSIVE SURVEILLANCE EXPOSED</strong>",
"eff-quote-2": "Recent reports by the Guardian and the Washington Post confirm secret spying programs on phone records and Internet activity. It's time for a full accounting of America's secret spying programs—and an end to unconstitutional surveillance.",
"more": "more …",
"The": "The",
"site-media-index-title": "Mentioned by the media.",
"Catalan": "Catalan",
"German": "German",
"English": "English",
"Spanish": "Spanish",
"French": "French",
"Italian": "Italian",
"Dutch": "Dutch",
"Polish": "Polish",
"Portuguese": "Portuguese",
"Russian": "Russian",
"Swedish": "Swedish",
"Chinese (Simplified)": "Chinese (Simplified)",
"Updated": "Updated",
"By": "By",
"Donate Bitcoin": "Donate Bitcoin",
"Contribute": "Contribute",
"License": "License",
"Changelog": "Changelog",
"site-disclaimer": "Disclaimer: Using the recommended projects on this site will not guarantee that 100% of your communications will be shielded against surveillance states. Please do your own research before trusting these projects with sensitive information.",
"Privacy Policy": "Privacy Policy",
"site-donate-index-title": "Support the PRISM Break project by donating Bitcoin.",
"site-donate-index-content": "<p><a href='https://prism-break.org/'>PRISM Break</a> launched on June 10th, 2013 on the heels of Edward Snowden's revelations about NSA mass surveillance. Since launch, more than a million privacy-conscious visitors have viewed the site over two million times around the world.</p><p>While the first version of prism-break.org took only two days to build and launch, maintaining and improving the site over the past two months has taken up much of my time. As of December 5st, 2013, I've pushed 1,695 edits to the site and spent hundreds of hours poring over privacy resources. I've made this effort in order to ensure that PRISM Break offers you the best methods to combat government surveillance.</p><p>With so many people visiting prism-break.org, I would love to devote my full attention to fixing possible security bugs, improving the projects list and making the content more user-friendly. However—like anyone else—I still need to pay my rent and buy food, and this project doesn't generate any income. This is where you can help.</p><p>If you would like to support PRISM Break, please consider donating Bitcoin to fund future development. I suggest at least 0.005 BTC, but any amount is appreciated. If you donate 0.50 BTC or more and leave a name, I will add you to this page as a PRISM Break sponsor.</p><p>Donate address:<br /><a href='bitcoin:1NAfx5GEZHR8t69LjxTeShPP4XXaxeUqQw'><strong>1NAfx5GEZHR8t69LjxTeShPP4XXaxeUqQw</strong></a></p><p>I appreciate your support.</p><p>Peng Zhong<br />PRISM Break developer</p><p>P.S. The developers of the fine projects listed on <a href='https://prism-break.org'>PRISM Break</a> would also be grateful for your support. If you enjoy using their app, seriously consider throwing some money their way to fund development.</p>"
}