Deprecated: Constant E_STRICT is deprecated in /home/www/dokuwiki_privacy/inc/init.php on line 42
Warning: Cannot modify header information - headers already sent by (output started at /home/www/dokuwiki_privacy/inc/init.php:42) in /home/www/dokuwiki_privacy/inc/init.php on line 48
Warning: Cannot modify header information - headers already sent by (output started at /home/www/dokuwiki_privacy/inc/init.php:42) in /home/www/dokuwiki_privacy/inc/auth.php on line 437
Warning: Cannot modify header information - headers already sent by (output started at /home/www/dokuwiki_privacy/inc/init.php:42) in /home/www/dokuwiki_privacy/inc/Action/Export.php on line 104
Warning: Cannot modify header information - headers already sent by (output started at /home/www/dokuwiki_privacy/inc/init.php:42) in /home/www/dokuwiki_privacy/inc/Action/Export.php on line 104
Warning: Cannot modify header information - headers already sent by (output started at /home/www/dokuwiki_privacy/inc/init.php:42) in /home/www/dokuwiki_privacy/inc/Action/Export.php on line 104
====== Общие рекомендации по безопасности ======
This page describes the general guidelines for security and privacy on the internet without delving into specific software and technical solutions. See recommended software solutions [[Рекомендованные_программные_решения|here]].
====== Not Recommended ======
- [[Существующие_решения_для_организации_связи#.D0.9F.D0.BE.D0.BB.D1.8C.D0.B7.D0.BE.D0.B2.D0.B0.D1.82.D0.B5.D0.BB.D1.8C.3C.3E.D0.A1.D0.B5.D1.80.D0.B2.D0.B5.D1.80_.28_.D1.86.D0.B5.D0.BD.D1.82.D1.80.D0.B0.D0.BB.D0.B8.D0.B7.D0.BE.D0.B2.D0.B0.D0.BD.D0.BD.D0.B0.D1.8F_.D0.BC.D0.BE.D0.B4.D0.B5.D0.BB.D1.8C_.29|Using centralized systems for exchanging data]].
- Sharing unnecessary personal data with these services.
- Using services that require private data for registration (phone number, passport data)
- Using [[https://en.wikipedia.org/wiki/Proprietary_software|proprietary software]] solutions.
- Using solutions without encryption.
- Using systems that store user data and metadata within their infrastructure.
====== Recommended ======
- Using [[Существующие_решения_для_организации_связи#.D0.9F.D0.BE.D0.BB.D1.8C.D0.B7.D0.BE.D0.B2.D0.B0.D1.82.D0.B5.D0.BB.D1.8C.3C.3E.D0.9F.D0.BE.D0.BB.D1.8C.D0.B7.D0.BE.D0.B2.D0.B0.D1.82.D0.B5.D0.BB.D1.8C_.28_p2p_.D0.B4.D0.B5.D1.86.D0.B5.D0.BD.D1.82.D1.80.D0.B0.D0.BB.D0.B8.D0.B7.D0.BE.D0.B2.D0.B0.D0.BD.D0.BD.D0.B0.D1.8F_.D0.BC.D0.BE.D0.B4.D0.B5.D0.BB.D1.8C_.29|decentralized]] or [[Существующие_решения_для_организации_связи#.D0.9F.D0.BE.D0.BB.D1.8C.D0.B7.D0.BE.D0.B2.D0.B0.D1.82.D0.B5.D0.BB.D1.8C.3C.3E.D0.9F.D0.BE.D1.81.D1.80.D0.B5.D0.B4.D0.BD.D0.B8.D0.BA.3C.3E.D0.9F.D0.BE.D0.BB.D1.8C.D0.B7.D0.BE.D0.B2.D0.B0.D1.82.D0.B5.D0.BB.D1.8C_.28_.D0.B3.D0.B8.D0.B1.D1.80.D0.B8.D0.B4.D0.BD.D0.B0.D1.8F_.D0.BC.D0.BE.D0.B4.D0.B5.D0.BB.D1.8C_.29|hybrid]] systems without mandatory centralized registration.
- Using [[https://en.wikipedia.org/wiki/Open-source_software|open-source software]]
- Using hardware and software solutions that utilize quality [[Основы_криптографии_для_начинающих#end-to-end|e2e]] encryption.
- Using solutions that are time-tested or based on time-tested design.
- If you need to use [[Существующие_решения_для_организации_связи#.D0.9F.D0.BE.D0.BB.D1.8C.D0.B7.D0.BE.D0.B2.D0.B0.D1.82.D0.B5.D0.BB.D1.8C.3C.3E.D0.A1.D0.B5.D1.80.D0.B2.D0.B5.D1.80_.28_.D1.86.D0.B5.D0.BD.D1.82.D1.80.D0.B0.D0.BB.D0.B8.D0.B7.D0.BE.D0.B2.D0.B0.D0.BD.D0.BD.D0.B0.D1.8F_.D0.BC.D0.BE.D0.B4.D0.B5.D0.BB.D1.8C_.29|centralized]] solutions, use an additional layer of encryption over data to prevent it from leaking to/from the centralized infrastructure. When it comes to files or text messaging, you can use archivers that support encryption or PGP (see description in [[Рекомендованные_программные_решения|Recommended Software Solutions]]) //(This will not help protect metadata)//