====== Общие рекомендации по безопасности ====== This page describes the general guidelines for security and privacy on the internet without delving into specific software and technical solutions. See recommended software solutions [[Рекомендованные_программные_решения|here]]. ====== Not Recommended ====== - [[Существующие_решения_для_организации_связи#.D0.9F.D0.BE.D0.BB.D1.8C.D0.B7.D0.BE.D0.B2.D0.B0.D1.82.D0.B5.D0.BB.D1.8C.3C.3E.D0.A1.D0.B5.D1.80.D0.B2.D0.B5.D1.80_.28_.D1.86.D0.B5.D0.BD.D1.82.D1.80.D0.B0.D0.BB.D0.B8.D0.B7.D0.BE.D0.B2.D0.B0.D0.BD.D0.BD.D0.B0.D1.8F_.D0.BC.D0.BE.D0.B4.D0.B5.D0.BB.D1.8C_.29|Using centralized systems for exchanging data]]. - Sharing unnecessary personal data with these services. - Using services that require private data for registration (phone number, passport data) - Using [[https://en.wikipedia.org/wiki/Proprietary_software|proprietary software]] solutions. - Using solutions without encryption. - Using systems that store user data and metadata within their infrastructure. ====== Recommended ====== - Using [[Существующие_решения_для_организации_связи#.D0.9F.D0.BE.D0.BB.D1.8C.D0.B7.D0.BE.D0.B2.D0.B0.D1.82.D0.B5.D0.BB.D1.8C.3C.3E.D0.9F.D0.BE.D0.BB.D1.8C.D0.B7.D0.BE.D0.B2.D0.B0.D1.82.D0.B5.D0.BB.D1.8C_.28_p2p_.D0.B4.D0.B5.D1.86.D0.B5.D0.BD.D1.82.D1.80.D0.B0.D0.BB.D0.B8.D0.B7.D0.BE.D0.B2.D0.B0.D0.BD.D0.BD.D0.B0.D1.8F_.D0.BC.D0.BE.D0.B4.D0.B5.D0.BB.D1.8C_.29|decentralized]] or [[Существующие_решения_для_организации_связи#.D0.9F.D0.BE.D0.BB.D1.8C.D0.B7.D0.BE.D0.B2.D0.B0.D1.82.D0.B5.D0.BB.D1.8C.3C.3E.D0.9F.D0.BE.D1.81.D1.80.D0.B5.D0.B4.D0.BD.D0.B8.D0.BA.3C.3E.D0.9F.D0.BE.D0.BB.D1.8C.D0.B7.D0.BE.D0.B2.D0.B0.D1.82.D0.B5.D0.BB.D1.8C_.28_.D0.B3.D0.B8.D0.B1.D1.80.D0.B8.D0.B4.D0.BD.D0.B0.D1.8F_.D0.BC.D0.BE.D0.B4.D0.B5.D0.BB.D1.8C_.29|hybrid]] systems without mandatory centralized registration. - Using [[https://en.wikipedia.org/wiki/Open-source_software|open-source software]] - Using hardware and software solutions that utilize quality [[Основы_криптографии_для_начинающих#end-to-end|e2e]] encryption. - Using solutions that are time-tested or based on time-tested design. - If you need to use [[Существующие_решения_для_организации_связи#.D0.9F.D0.BE.D0.BB.D1.8C.D0.B7.D0.BE.D0.B2.D0.B0.D1.82.D0.B5.D0.BB.D1.8C.3C.3E.D0.A1.D0.B5.D1.80.D0.B2.D0.B5.D1.80_.28_.D1.86.D0.B5.D0.BD.D1.82.D1.80.D0.B0.D0.BB.D0.B8.D0.B7.D0.BE.D0.B2.D0.B0.D0.BD.D0.BD.D0.B0.D1.8F_.D0.BC.D0.BE.D0.B4.D0.B5.D0.BB.D1.8C_.29|centralized]] solutions, use an additional layer of encryption over data to prevent it from leaking to/from the centralized infrastructure. When it comes to files or text messaging, you can use archivers that support encryption or PGP (see description in [[Рекомендованные_программные_решения|Recommended Software Solutions]]) //(This will not help protect metadata)//