forked from unitoo/website
595 lines
54 KiB
YAML
595 lines
54 KiB
YAML
---
|
||
meta:
|
||
titles:
|
||
index: "Homepage with our featured services"
|
||
aboutus: "About us and what we are passionate about"
|
||
projects: "The projects we have under development for our purposes"
|
||
software: "Free as in freedom software as a project and basic requirement, some details"
|
||
services_and_products: "Our services and products aimed at the IT sector"
|
||
technical_assistance: "360-degree IT assistance and consultancy"
|
||
cybersecurity: "IT security, risk analysis and decisive action plans"
|
||
communications: "Software and services dedicated to effective and secure communication"
|
||
radio: "Our free radio, always dedicated to CC content and software"
|
||
channel: "Our Peertube channel dedicated to video content (under development)"
|
||
contacts: "How to contact us, what are our procedures, our dedicated number and our email"
|
||
funkwhale: "Partners - Funkwhale Italia"
|
||
libreboot: "Libreboot - The free as in freedom BIOS"
|
||
peertube: "Partners - Peertube Italia"
|
||
news: "Canale Telegram dedicato alle news che abbiamo selezionato per noi e per voi"
|
||
privacy_policy: "Privacy policy"
|
||
blackhole: "Blackhole"
|
||
sonde: "Module Probe, also known as Vulnerability Assessment"
|
||
defence: "Module Defence, our post Vulnerability Assessment intervention plans"
|
||
rover: "Module Rover, an advanced and personalized Vulnerability Assessment"
|
||
monitoring: "Module Monitoring, an active server monitoring system"
|
||
referral: "Referral"
|
||
graphene: "Module Grafene, configuration of secure and reliable mobile devices"
|
||
|
||
tags:
|
||
bot: "#bot"
|
||
products: "#products"
|
||
periodica: "#periodica"
|
||
policy: "#policy"
|
||
cybersecurity: "#cybersecurity"
|
||
communications: "#communications"
|
||
chat: "#chat"
|
||
practices: "#practices"
|
||
software: "#software"
|
||
video: "#video"
|
||
radio: "#radio"
|
||
foss: "#foss"
|
||
aboutus: "#aboutus"
|
||
grafana: "#grafana"
|
||
server: "#server"
|
||
rss: "#rss"
|
||
unitoo: "#unitoo"
|
||
privacy: "#privacy"
|
||
program: "#program"
|
||
gnupg: "#gnupg"
|
||
servizi: "#servizi"
|
||
libreboot: "#libreboot"
|
||
dnsserver: "#dnsserver"
|
||
company: "#company"
|
||
care: "#care"
|
||
azuracast: "#azuracast"
|
||
freesoftware: "#freesoftware"
|
||
messaging: "#messaging"
|
||
peertube: "#peertube"
|
||
development: "#development"
|
||
prodotti: "#prodotti"
|
||
creativecommons: "#creativecommons"
|
||
informatica: "#informatica"
|
||
condivisione: "#condivisione"
|
||
feed: "#feed"
|
||
email: "#email"
|
||
pihole: "#pihole"
|
||
nextcloud: "#nextcloud"
|
||
rights: "#rights"
|
||
defence: "#defence"
|
||
chisiamo: "#chisiamo"
|
||
prometheus: "#prometheus"
|
||
referral: "#referral"
|
||
consulenza: "#consulenza"
|
||
bios: "#bios"
|
||
element: "#element"
|
||
contacts: "#contacts"
|
||
sonda: "#sonda"
|
||
blackhole: "#blackhole"
|
||
podcast: "#podcast"
|
||
team: "#team"
|
||
technical: "#technical"
|
||
rover: "#rover"
|
||
hardening: "#hardening"
|
||
sonde: "#sonde"
|
||
music: "#music"
|
||
progetti: "#progetti"
|
||
patch: "#patch"
|
||
calendar: "#calendar"
|
||
services: "#services"
|
||
bot: "#bot"
|
||
best: "#best"
|
||
customer: "#customer"
|
||
funkwhale: "#funkwhale"
|
||
projects: "#projects"
|
||
adblock: "#adblock"
|
||
interviste: "#interviste"
|
||
freebios: "#freebios"
|
||
dns: "#dns"
|
||
cloud: "#cloud"
|
||
assistance: "#assistance"
|
||
riunioni: "#riunioni"
|
||
sicurezza: "#sicurezza"
|
||
partners: "#partners"
|
||
mattermost: "#mattermost"
|
||
coreboot: "#coreboot"
|
||
news: "#news"
|
||
matrix: "#matrix"
|
||
comunicazioni: "#comunicazioni"
|
||
freedom: "#freedom"
|
||
telegram: "#telegram"
|
||
nodrm: "#nodrm"
|
||
filestorage: "#filestorage"
|
||
monitoring: "#monitoring"
|
||
technicaladvice: "#technicaladvice"
|
||
module: "#module"
|
||
contatti: "#contatti"
|
||
grapheneos: "#grapheneos"
|
||
|
||
descriptions:
|
||
index: "We develop software and do IT consultancy. Ethics, concreteness and cutting edge technology distinguish us."
|
||
aboutus: "About us, our core values and mission."
|
||
projects: "Our projects, to make everyone participate in our mission."
|
||
software: "The projects we are mainly supporting in the field of free as in freedom software. Starting with free as in freedom BIOS ending with DRM removal."
|
||
services_and_products: "The services and products that we mainly offer, always and exclusively using free as in freedom software."
|
||
radio: "The Italian radio to know and spread free as in freedom software."
|
||
channel: "A Peertube channel dedicated to free as in freedom software, interviews and other digital content"
|
||
contacts: "All our contacts for a proper and safe communication."
|
||
funkwhale: "A free as in freedom platform, which we support, for the spread of music content"
|
||
libreboot: "Free as in freedom software and the importance of a free as in freedom BIOS. All in one breath."
|
||
peertube: "A free as in freedom platform, which we support, for the spread of video content"
|
||
news: "The news we like about free as in freedom software and software development in general"
|
||
privacy_policy: "Our privacy policy according to European Regulation 2016/679"
|
||
communications: "Our software solutions for efficient and ethical team communication."
|
||
blackhole: "Our hardware and software solution to block trackers, malware, ransomware, spam, scams and so on and so forth."
|
||
sonde: "A simple but effective analysis that allows you to discover the most common vulnerabilities, commonly known as Vulnerability Assessment"
|
||
defence: "The solutions built to protect your infrastructures and your servers."
|
||
rover: "A detailed and meticulous analysis, carried out one-by-one to obtain the greatest amount of information."
|
||
monitoring: "Software solutions for monitoring your servers"
|
||
referral: "Find out how to become a Guardian of the User Space"
|
||
cybersecurity: "Vulnerability Assessment and procedures for containing IT risk"
|
||
technical_assistance: "Solutions for IT consultancy and assistance, also in the cyber security field"
|
||
graphene: "Configuring and installing the GrapheneOS operating system"
|
||
|
||
tags:
|
||
bot: "Pages related to the tag #bot"
|
||
|
||
alt:
|
||
header_radio: "Screenshot of the Unitoo radio based on Azuracast software"
|
||
gplv3_logo: "Official logo license GPLv3"
|
||
mastodon_logo: "Official logo of Mastodon, a decentralized microblogging social network"
|
||
stefano_amandonico: "Portrait photo of Stefano Amandonico, founder of grafixprint.it"
|
||
logo_extended_dark: "Unitoo official logo"
|
||
libreboot_logo: "Official logo of Libreboot, free in freedom BIOS derived from Coreboot"
|
||
header_peertube: "Screenshot of the Unitoo Peertube channel"
|
||
sydro: "Portrait photo of Angelo \"Sydro\""
|
||
liberapay_logo: "Liberapay official logo"
|
||
yamabiiko: "Portrait photo of Lorenzo Tucci"
|
||
cmaradonna: "Portrait photo of Claudio Maradonna"
|
||
frenky: "Portrait photo of Simone Capparucci"
|
||
fabio_purple: "Portrait photo of Fabio \"Desmovalvo\""
|
||
sara: "Portrait photo of Sara Freddoni"
|
||
starfighter_example: "Illustration of a space defence spacecraft"
|
||
cruiser_example: "Illustration of a spacecraft for the most advanced space defence"
|
||
stardestroyer_example: "Illustration of a very advanced and performing space defence spacecraft"
|
||
technical_assistance_example: "Illustration of a particular spacecraft that serves as a probe and search system"
|
||
cybersecurity_example: "Illustration of a rover for checking the defence perimeter"
|
||
communications_example: "Illustration of a space probe"
|
||
blackhole_example: "Photo of a Raspberry Pi Zero 2 W"
|
||
|
||
buttons:
|
||
go_to_radio: "Go to the Radio"
|
||
contactsus: "Contact us"
|
||
about_us: "About us"
|
||
more_about_us: "Come and find out more about us"
|
||
services_and_products: "Services and Products"
|
||
projects: "Projects"
|
||
know_us_on_fediverse: "Here is our profile!"
|
||
know_more: "Find out more"
|
||
go_to_channel: "Go to the channel"
|
||
discover_our_services: "Discover the services"
|
||
go_to_cybersecurity: "Check out our defence systems"
|
||
go_to_communications: "Improve your communications"
|
||
go_to_blackhole: "Contact us to find out more!"
|
||
become_a_guardian_of_user_space: "Join us and discover the benefits of being a Guardian of the User Space!"
|
||
technical_assistance: "IT consultancy"
|
||
cybersecurity: "Cybersecurity"
|
||
communications: "Communications"
|
||
go_to_telegram_bot: "Got to the Telegram Bot"
|
||
privacy_policy: "Privacy policy"
|
||
approve: "Approve"
|
||
download_rss_feed_list: "Download the feed list in XML format"
|
||
|
||
titles:
|
||
go_to_radio: "radio.unitoo.it, the link will open in a separate tab. You will be able to listen to music and podcasts released under Creative Commons licenses"
|
||
know_us_on_fediverse: "The profile is public, you will need a federated account to participate in conversations"
|
||
go_to_telegram_bot: "The channel publishes news from the sources as soon as possible. Content is available in English and Italian"
|
||
|
||
inputs:
|
||
search: "Do you want to look for something?"
|
||
no_results: "No result"
|
||
|
||
index:
|
||
header_title: "{ Hack. Evolve. Repeat. }"
|
||
header_title_mobile: "{ Hack.<br>Evolve.<br>Repeat. }"
|
||
header_lead: "Software solutions, IT security and uncompromising IT consultancy"
|
||
aside_radio: "Are you looking for our radio dedicated to software and Creative Commons music?"
|
||
products_title: "Services and products"
|
||
products:
|
||
introduction: "The Cyber Space Mission"
|
||
introduction_description: "Like in a science fiction movie, we have created a set of <strong> optimized solutions and procedures </strong> designed to form a <strong> safe and reliable working environment </strong>.<br><br>Our goal is to also to increase the awareness of our customers about the dangers of the IT world and the methods used in IT security.<br><br>For this reason we have structured a <strong>simple path</strong> in which the customer can expose his IT situation, giving us the opportunity to apply our method.<br><br><h3>How can I know and improve my IT situation?</h3><ol><li><strong>Contact us to get a free and non-binding appointment </strong> with our technicians, also available via web call (you need just a browser)</li><li>Make yourself <strong>available</strong> in the appointment <strong>to answer some questions</strong> (we will compile a checklist for you, lasting about 25/35 minutes), maybe also involving your trusted technician </li><li>We will then develop a personalized <strong>resolutive quote</strong> starting from the problems that emerged from the inspection, divided into risk factors (from the most critical to the less serious) or keeping in mind your requests and/or needs.</li></ol><br><strong>You will be free to choose the path, and therefore the Modules, which you consider most useful and functional for your Business.</strong>"
|
||
technical_assistance: "IT Consultancy"
|
||
technical_assistance_text: "
|
||
The provision of our IT consulting service is available in two solutions: <strong>the Intelligence Module</strong>, the most extensive and flexible solution that allows you to obtain solutions aimed at various requests; <strong>the Vita Module</strong> instead is designed to improve and optimize your office and specifically workstations.<br><br>It is possible to schedule periodic and maintenance appointments, obtain support for problems involving the use of the computer and for the configuration of various services and servers as well as being able to know our opinion in the face of certain technical choices."
|
||
|
||
cybersecurity: "Cybersecurity"
|
||
cybersecurity_text: "
|
||
In informative technology, hardening is the process of securing a system that reduces its vulnerable surfaces.<br><br>Reducing the available attack modes typically includes changing default passwords, adding systems of two-factor authentication, removing software and/or services, usernames or unnecessary logins ...<br><br>For us, security is a process, which also passes through the training of the individual, and not a simple product."
|
||
|
||
communications: "Communications"
|
||
communications_text: "
|
||
The use of simple and efficient communication systems is a priority today to increase the productivity of every type of business, to simplify operations and increase the engagement of one's workforce. Being able to make communication systems available even on the move is an even more urgent need in the current scenario of digital business, increasingly characterized by remote working and social collaboration."
|
||
|
||
blackhole: "Black hole"
|
||
blackhole_text: "Black Hole is a hardware system for blocking trackers, malware, ransomware, porn, spam, scam, cryptomining, fraud, fake-news, gambling, adware and advertising, through a server application that acts as a DNS sinkhole and optionally with server DHCP.<br><br>Intended for use on a private network (Intranet), it is designed with low-power devices with high network capacity, such as the Raspberry Pi.<br><br>Black Hole has the capacity therefore to block traditional website advertisements and cyber threats on any device connected to the network on which it is installed."
|
||
|
||
aboutus:
|
||
header_title: "Passionate, professional and assertive"
|
||
header_lead: "We want to go beyond the allure of technological progress, we want people to be able to turn it into emotions and make it their own. This is why we give great priority to free, ethical products and training.<br><br> Our commitment is aimed at improving and strengthening the software and IT security landscape through the training and growth of the individual; this makes us feel part of progress in the strictest sense.<br><br><i> «Give a man a fish, and you feed him for a day. Teach a man to fish, and you feed him for a lifetime.»</i>"
|
||
aside_social: "Come and visit us in the Fediverse! You will also know a nice community!"
|
||
vision_and_staff_title: "Who we are and what we believe in"
|
||
vision_and_staff_text: "We want to start with a quote from Eleanor Roosevelt: <br><i>\"The future belongs to those who believe in the beauty of their dreams\"</i><br><br>We believe we can see a day when each of us will be an integral part of civilization not only as a resource, but as a man.<br>This is why we are constantly engaged in the world of free software at various levels, we train young people in this sense and we make the communities participate in our results."
|
||
staff_title: "Here is the staff"
|
||
|
||
technical_assistance:
|
||
header_title: "IT consultancy"
|
||
header_lead: "IT consultancy, suggestions in the configuration of systems and servers, ethical advice on the use of software, improvement of internal procedures, staff training; some of the examples that fully represent what we mean by Intelligence Module and Life Module."
|
||
|
||
intelligence_title: "Module Intelligence"
|
||
intelligence_text: "
|
||
The Intelligence Module allows the customer to access the know-how in our possession and therefore to obtain solutions and suggestions aimed at their needs, such as software or tools to optimize their work environments, but not only.<br><br>The main areas of expertise of our company are:
|
||
<ul>
|
||
<li>GNU/Linux systems</li>
|
||
<li>Network configurations (VPN included)</li>
|
||
<li>Solutions for the office</li>
|
||
<li>IT Security (kernel hardening, firewall ...)</li>
|
||
<li>Various software and programming languages</li>
|
||
</ul>
|
||
The module can be purchased in three different solutions: <strong>monthly, quarterly and yearly </strong>.
|
||
"
|
||
|
||
life_title: "Module Life"
|
||
life_text: "
|
||
From a purely technical point of view, re-optimization consists in the application of particular measures that allow to solve one or more problems.<br><br>Module Life therefore offers a solution suitable for optimizing the various workstations and terminals present in the structure.<br><br>The basic price of the module varies according to the type and state of obsolescence of the stations taken into consideration as well as their number.<br>"
|
||
|
||
cybersecurity:
|
||
header_title: "Cybersecurity"
|
||
header_lead: "
|
||
By definition in the IT field it is clear that security is determined by three main factors: <br><br>
|
||
<strong> Confidentiality </strong> - Access to sensitive resources and data is allowed only to authorized users <br><br>
|
||
<strong> Integrity </strong> - System data is protected from loss or modification due to attack or accident <br><br>
|
||
<strong> Availability </strong> - Availability means the ability to access a data or resource at any time."
|
||
p_text: "In information technology, hardening is the process of securing a system that reduces its vulnerable surfaces.<br><br>Reducing the available attack modes typically includes changing default passwords, adding systems two-factor authentication, removing software and/or services, usernames or unnecessary logins.<br><br>There are various methods to harden GNU/Linux based systems. This can involve, among other measures, patching the kernel, closing open network ports, adding intrusion detection systems, firewalls, and intrusion prevention systems.<br><br>There are also scripts and hardening tools such as Lynis, which can, for example, analyze a system thoroughly and allow you to disable unsolicited functionality in configuration files or perform various other security measures."
|
||
modules_title: "I nostri moduli"
|
||
|
||
sonde_title: "Module Probe"
|
||
sonde_text: "The Probe Module carries out an automated analysis of the work environment by releasing a report of the vulnerabilities and possible optimizations to be carried out based on the criticalities detected."
|
||
sonde_button: "Take control with the Probe Module"
|
||
|
||
rover_title: "Module Rover"
|
||
rover_text: "The Rover Module offers a detailed and specific analysis of all the problems and vulnerabilities of one or more structures to be analyzed, the procedure is not automated and has a higher cost than the Probe Module."
|
||
rover_button: "Climb into our Rover for a detailed exploration"
|
||
|
||
defence_title: "Module Defence"
|
||
defence_text: "The defence modules are the procedures put in place to increase the safety of the environment previously analyzed through the Probe and/or Rover modules."
|
||
defence_button: "Request the help of our fleet"
|
||
|
||
monitoring_title: "Module Monitoring"
|
||
monitoring_text: "The monitoring module retrieves any type of data from company services and allows you to view it directly in Grafana. This means you can make the most of your complex and expensive business infrastructures by viewing all data in a simple, effective and personalized way. You can also configure custom notifications that will be redirected to your favorite communication channel."
|
||
monitoring_button: "Find out how to monitor your infrastructure"
|
||
|
||
graphene_title: "Module Grafene"
|
||
graphene_text: "The Graphene Module provides the configuration and installation of the GrapheneOS operating system on a supported device.<br>This system is designed for individuals seeking a high degree of security and confidential data processing on their mobile device."
|
||
|
||
graphene_button: "Find out more about the benefits of GrapheneOS"
|
||
|
||
sonde:
|
||
title: "Module Probe"
|
||
description: "Technically defined as <strong> \"Vulnerability Assessment\"</strong>, it is designed for offices and allows you to <strong>bring to light the most common and insidious vulnerabilities</strong>, also recognized in the most important vulnerability databases. The Probe Module is <strong>necessary to formulate a defence plan</strong> to support the customer, through the use of the Defense and Intelligence Modules.<br><br>The Probe Module also allows us to process<strong> an easily interpretable report</strong> of the vulnerabilities detected and the possible optimizations that can be carried out in the system analyzed and the possible problems in the case of missing response.<br><br> This module can also be used to analyze small servers and network infrastructures, thus taking into consideration even the most customized configurations.<br><br>The objective of the Probe Module is to make the customer aware of their IT situation, avoiding that it can turn into an unpleasant and difficult to repair reality.<br><br><h3>What should you do?</h3><br><strong>Contact us</strong>, this is the first fundamental step to start a journey towards greater security. Scroll for additional information."
|
||
|
||
rover:
|
||
title: "Module Rover"
|
||
description: "The Rover Module <strong>searches for vulnerabilities going further</strong>, arriving at a detailed assessment of every single service and criticality present in the system to be analyzed.<br>Using the one-by-one manual control,<strong> our technicians will use every available tool </strong> to elaborate a report and an action plan consistent with the criticalities detected.<br><br>By combining the Rover Module with the Defense Modules, customized, safe solutions can be obtained and efficient that allow to solve and/or mitigate the problem at the root.<br><br><strong> This Module is designed for more structured companies, which want to combine the concept of Information Security with their Business.</strong><br><br><h3>What should you do?</h3><br><strong>Contact us </strong>, this is the first fundamental step to start a journey towards greater security. Scroll for additional information."
|
||
|
||
defence:
|
||
title: "Module Defence"
|
||
description: "Below are our solutions built to protect your infrastructures and servers. These solutions offer configurations designed to embrace multiple levels of protection, which in some situations must rightly be high, such as when dealing with sensitive data or when it is necessary to ensure maximum control of the system.<br><br>Our technicians and consultants will show you the solution that best suits your needs."
|
||
|
||
starfighter: "Starfighter"
|
||
starfighter_text: "The Starfighter type solution includes, starting from the identification of the assets to be protected, the assessment of possible threats in terms of probability of occurrence and relative potential damage (severity). Certain \"best practices\" procedures are then applied to offer the customer an effective solution and at the same time able to provide protection from most of the threats present on the network; in this regard, firewalls will be configured and basic protection protocols applied. In addition, the systems will be equipped with automatic security updates with a predetermined frequency. However, this defence system is not very suitable in situations where there are several services or personalized services and in the case in which sensitive and biometric data are dealt with.<br><br><strong>This module requires in advance that an analysis be carried out through the Probe Module.</strong>"
|
||
|
||
cruiser: "Cruiser"
|
||
cruiser_text: "The Cruiser-type defence system offers a higher level of security and optimization than the Starfighter solution, the Server Hardening level of procedures also affects user permissions and kernel configuration, in addition to protection systems and security of critical and specific services through a firewall configuration. This module also allows you to encrypt and verify the authenticity of connections by setting up a system of encrypted connections through WireGuard, an open source program that allows you to create secure point-to-point connections in routed or bridged configuration. In addition, the systems will be equipped with automatic security updates on a periodic basis. The procedure allows you to offer your services in total security even where sensitive and biometric data are present.<br><br><strong>This module requires in advance that an analysis be carried out using the Rover module.</strong>"
|
||
|
||
stardestroyer: "Star Destroyer"
|
||
stardestroyer_text: "The Star Destroyer defence system adds an additional layer of security thus offering an optimized configuration of the server boot, a hardening of the partitions, a further customization of permissions and the total removal of any unused and obsolete protocols, services and applications in the operating system. In addition, the Star Destroyer module implements a technology for the synchronization and verification of certificates as well as a system of point-to-point encrypted connections (WireGuard). Threats and possible attack methodologies to which services and resources are exposed are evaluated. It also allows you to detect any system intrusions through IDS systems (Intrusion Detection System) in real time. This procedure allows to reach an advanced and personalized level of security, therefore inhospitable for possible cyber attacks. The Star Destroyer Module uses a customized automatic security update system configured ad hoc to optimize the environment in which it is applied.<br><br><strong>This Module requires in advance that an analysis be carried out through the Rover Module.</strong>"
|
||
|
||
monitoring:
|
||
title: "Module Monitoring"
|
||
description: "Using software such as Grafana and Prometheus, we are able to aggregate data from different sources and allow a personalized and effective display. In addition, these software allow you to configure advanced notification systems (such as sending alerts to software such as Mattermost), useful for knowing, for example, if there are situations of intense load on the CPU or on the server's data traffic.<br><br>Monitoring a specific service, the server or being able to observe a dataset, has never been so simple and clean."
|
||
|
||
graphene:
|
||
title: "Module Grafene"
|
||
description: "
|
||
GrapheneOS is an operating system that offers a wide range of functions dedicated to security. It is the result of the research and development of technologies aimed at improving the control of your data (regarding privacy) and increasing security, including substantial improvements to sandboxing (memory and application isolation), exploit mitigation and the authorization model.<br><br> It implements technologies to mitigate entire classes of cyber attacks and make exploitation of the most common vulnerabilities significantly more difficult.<br> Here are some of the main features and improvements to take in consideration when comparing GrapheneOS to a common Android or iOS device: <ul>
|
||
<li> Webview and Browser hardened (Bromite / Vanadium) </li>
|
||
<li> Device verified boot and Hardware-Based integrity checks with Auditor </li>
|
||
<li> Kernel and Memory Allocator Hardened </li>
|
||
<li> Improved system encryption </li>
|
||
<li> Separation of data and apps on different profiles </li>
|
||
</ul>
|
||
|
||
Here is a more exhaustive list of the functions and protections applied to the system: <a href='https://grapheneos.org/features' rel='nofollow' target='_blank'><i class='fa-link-ext'> https://grapheneos.org/features</i></a>.<br><br>
|
||
|
||
The list of supported devices is available at this address: <a href='https://grapheneos.org/faq#device-support' rel='nofollow' target='_blank'><i class='fa-link-ext '> https://grapheneos.org/faq#device-support</i></a>; moreover, up to 5 years of update and security support are guaranteed (from the release date of the device).<br><br>
|
||
|
||
<h3>To whom do we recommend this module?</h3>
|
||
|
||
We recommend this module to all those who process sensitive data or who need a high degree of security and confidentiality, we can take as an example: lawyers, journalists, judges, doctors, private investigators, law enforcement, entrepreneurs, bank officials etc...
|
||
"
|
||
|
||
communications:
|
||
header_title: "Communications"
|
||
header_lead: "The use of simple and efficient communication systems is a priority today to increase the productivity of every type of business, to simplify operations and increase the engagement of one's workforce. Being able to make communication systems available even on the move is an even more urgent need in the current scenario of digital business, increasingly characterized by remote working and social collaboration."
|
||
|
||
mattermost:
|
||
title: "Mattermost"
|
||
lead: "Mattermost allows you to connect people and tools and automate collaboration between them, for example by creating a notification system in real time for a given project. Mattermost is the ideal product for teams that need to collaborate in the design and development of a product or service.<br> Configurable for both internal and external use (therefore through a public domain), it is the best alternative to Slack.<br><br>The product also has a paid license type (directly billed by Mattermost), which allows you to access Premium features. Furthermore, Mattermost is fully extensible through third party and/or internally developed plugins."
|
||
|
||
matrix:
|
||
title: "Matrix"
|
||
lead: "Matrix is an open source project that uses a free, secure (end-to-end encryption with session-aware) and decentralized communications API standard to build a secure space for team communication.<br><br>You can then create private or public spaces, make calls (audio and video) through the integrated Jitsi server; using Element, or another valid client, you can connect to your chat and therefore to the various rooms you are part of also through another device.<br>Furthermore, Matrix has a considerable number of plugins that allow for example to connect a Telegram group to a Matrix group allowing the exchange of messages on both sides.<br>Last but not least, Matrix allows you to communicate with other Matrix servers, thus allowing communication between the users of these servers.<br><br>For more demanding and security-conscious customers, we add this link that shows the encryption algorithm and the protocol used: <a href=\"https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md\" target=\"_ blank\" title=\"The documentation explains in detail the implementation of the Megolm ratchet algorithm. The link opens on a dedicated tab.\">https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md</a>"
|
||
|
||
nextcloud:
|
||
title: "Nextcloud"
|
||
lead: "As a fully on-premise data storage solution, <strong>Nextcloud</strong> offers the benefits of online collaboration without compliance and security risks.<br>It allows to share and collaborate on Office documents (through Collabora Office or OnlyOffice), managing calendars and contacts, and to have an integrated and secure web-meeting platform (Nextcloud Talk).<br>Finally, it allows complete customization through a Marketplace containing further extensions that implement its functions.<br><br>Currently it is one of the <strong>best alternatives to</strong> services like <strong>Dropbox or Google Drive</strong>: with added steroids!"
|
||
|
||
contacts:
|
||
title: "Here's how to contact us!"
|
||
body: "
|
||
Getting information or learning more about our modules is really simple:<br><br>1.<strong> Contact us to get a free appointment</strong> with our technicians<br> 2. Make yourself <strong>available </strong> in this appointment <strong> for a free checklist</strong>, perhaps even involving your trusted technician<br> 3. We will then elaborate a personalized <strong>resolutive estimate</strong> using the information that emerged from the inspection, divided into risk factors (from the most critical to the less serious) or by the needs exposed (services, configurations, requests).<br><br>
|
||
You will therefore be free to evaluate and choose from the Modules proposed, the one you consider to be the best situation for you, always taking into account any risk factors reported.<br><br> Finally, you can contact us by sending an email<br><br><small><i>If you want to experiment with new technologies, you can also contact us in the Fediverse or on the Matrix! Our links in the footer.</i></small><br><br>
|
||
"
|
||
|
||
projects:
|
||
title: "Projects, to go further"
|
||
text: "In addition to dedicating ourselves resolutely to our customers, we develop and/or actively participate with the various free as in freedom software development communities to produce and/or improve programs of various kinds, we manage a radio that deals with issues related to the world of software and science and we have a Peertube channel, still under development, on which to share interviews and/or guides of various kinds."
|
||
radio:
|
||
title: "The radio dedicated to the software"
|
||
text: "Engaging in the spread of free as in freedom software starts from the beginning. Why not start from a radio then?<br><br>Learn more by clicking below!"
|
||
software:
|
||
title: "The software we believe in"
|
||
text: "We support projects concerning free as in freedom software, starting from the BIOS, the heart of every PC up to the distributed content (such as multimedia), trying to sensitize people and companies to the use of free software by eliminating the so-called 'trap' software such as the DRM."
|
||
peertube:
|
||
title: "The channel dedicated to video content"
|
||
text: "We have decided to use every means to spread the message of free software and software ethics and for this reason we have set up a Peertube channel where you will find interviews, content dedicated to free software and technical guides."
|
||
|
||
software:
|
||
title: "The software we believe in."
|
||
text: "We consider the Hacker ethics to be part of the foundations in software development, even in the most \"hidden\" or dedicated to specific areas.<br>We therefore support projects that concern free software, starting from the BIOS, the heart of every PC up to distributed content (such as multimedia), trying to sensitize people and companies to the use of free software by eliminating the so-called \"trap\" software such as DRM."
|
||
libreboot_title: "Libreboot"
|
||
libreboot_text: "Software is contained even in the most hidden parts, invisible to our eyes. The details in this case make a big difference."
|
||
freesoftware_title: "The free as in freedom software"
|
||
freesoftware_text: "Progress has always made use of knowledge. Today the world needs software to move forward and this needs to be freely distributed to keep knowledge free."
|
||
drm_title: "DRM-Free"
|
||
drm_text: "Being authors, being artists, makes us an integral part of culture. However, DRMs eliminate the rights that users and authors have on their works, making the efforts of sharing and free diffusion useless."
|
||
|
||
channel:
|
||
title: "Our channel dedicated to video content"
|
||
p_1: "We have decided to use every means to spread the message of free as in freedom software and software ethics and for this reason we have set up a Peertube channel where you will find interviews, content dedicated to free software and technical guides."
|
||
p_2_1: "The channel is hosted by dear friends of "
|
||
p_2_2: "and <strong> is currently in the start-up phase but we hope you will contribute as well, as you are already doing with the fabulous radio.</strong>"
|
||
title_2: "Do you have any ideas or would you like to suggest something?"
|
||
p_3: "Your contribution is always appreciated and we suggest you contact us on our channel at <a href=\"https://social.unitoo.it/admin\">Fediverse</a> or by going to the page "
|
||
|
||
funkwhale:
|
||
title: "The Funkwhale project and the fediverse"
|
||
text_1: "Taking from an article (with link at the bottom), we can summarize:"
|
||
blockquote: "
|
||
<p>
|
||
<a rel=\"nofollow\" target=\"_blank\" href=\"https://funkwhale.it\">Funkwhale.it</a> intends to put streaming back into the hands of Internet users, giving them the tools to upload, share and finance music. A long-term project, of which only the first bricks exist.
|
||
</p>
|
||
<p>
|
||
The server federation was born in 2017 with the birth of the Fediverse, and with the arrival of Mastodon, it made this model popular.
|
||
</p>
|
||
<p>
|
||
Funkwhale intends to adapt the federation to listening to music, based on the old Grooveshark, a free music service where Internet users imported their songs.
|
||
</p>
|
||
<footer class=\"blockquote-footer\"><a rel=\"nofollow\" target=\"_blank\" href=\"https://noblogo.org/funkwhale/una-piattaforma-sociale-per-ascoltare-e-condividere-musica\">Source noblogo </a></footer>"
|
||
|
||
p_1: "If, like us, you believe in the <strong>importance</strong> of a project like this, you can <strong>donate</strong> something directly to them via cryptocurrencies."
|
||
|
||
libreboot:
|
||
title_h2: "The concept of <span class='text-warning'>security</span> starts with the CPU"
|
||
title: "The \"hidden\" story"
|
||
p: "In 2006, processor manufacturers such as Intel began installing a series of self-contained \"micro-environments\" (Intel ME, AMD PSP) of unknown targets into their products.<br>Several vulnerability tests have shown that these subsystems can in specific ways provide access to third parties and can read the memory in use (compromising encryption, password and alternative security keys).<br>From this arises the desire to disable this mechanism that violates every principle and right to privacy."
|
||
title_2: "The solution"
|
||
p_2: "
|
||
<a rel=\"nofollow\" target=\"_blank\" href=\"https://github.com/corna/me_cleaner\">
|
||
<i class=\"fas fa-link-ext fa-sm\">me_cleaner</i>
|
||
</a> is the tool, initially created by Nicola Corna, which allows you to partially or totally disable the backdoor.<br>We also suggest replacing the OEM BIOS with <a target=\"_blank\" href=\"https://libreboot.org/\" rel=\"nofollow\">
|
||
<i class=\"fas fa-link-ext fa-sm\">Libreboot</i></a>, the free BIOS, based on <a target=\"_blank\" href=\"https://www.coreboot.org/\" rel=\"nofollow\"><i class=\"fas fa-link-ext fa-sm\">Coreboot</i></a>.<br>
|
||
<br> The removal tool is not completely finished on the most modern CPUs, having changed the structure of the same. Our suggestion is to contact us to help you on how to intervene.<br><br>
|
||
<small> Current companies and resellers starting to support Libreboot/Coreboot natively or offering installation services are Purism, System76, Ministry Of Freedom and Dell.</small>
|
||
"
|
||
|
||
peertube:
|
||
title: "The Peertube project and the fediverse"
|
||
text_1: "Taking from an article (with link at the bottom), we can summarize:"
|
||
blockquote: "
|
||
<p>
|
||
PeerTube's goal is to create an emancipatory alternative to centralized platforms as YouTube. In a centralized service, you sign up with a single address, and every single action, video and data are collected on one huge \"computer\". For example, that of Google, which hosts YouTube (to be precise, they are server farms rather than huge computers, but symbolically it is the same thing!)
|
||
<footer class=\"blockquote-footer\"><a rel=\"nofollow\" target=\"_blank\" href=\"https://noblogo.org/peertube/peertube-lavora-per-liberare-i-vostri-video-da-youtube\">Source noblogo.org</a></footer></p>
|
||
"
|
||
p: "If, like us, you believe in the <strong> importance </strong> of a project like this, you can <strong> donate </strong> something directly to them through Liberapay, a free alternative to PayPal."
|
||
|
||
radio:
|
||
title: "The radio dedicated to free as in freedom software"
|
||
p_1: "
|
||
The spread of free as in freedom software is certainly not new for many, however the standard means present few opportunities in this regard.
|
||
<br>
|
||
At Unitoo we have long taken this sector to heart, and we have chosen to set up a radio, with exclusively Creative Commons licensed content, dealing with free as in freedom software.<br><br>
|
||
Many weekly programs are already being played and many others are under construction thanks to our freelance speakers!<br><br>
|
||
<strong> P.S.: Don't forget to donate something to our speakers using their platforms directly! The work they are doing is something exceptional.</strong>
|
||
"
|
||
title_2: "The technology"
|
||
p_2: "We used AzuraCast with Docker on a GNU/Linux server and we use Mixxx for Dj mode.<br> Below are the various links to access the software used:"
|
||
text_1: "You can of course "
|
||
text_2: "contact us"
|
||
text_3: " to be able to create your own platform!"
|
||
title_3: "The Podcast"
|
||
text_4: "After the dear friends of "
|
||
text_5: " released the updated version of the software, we immediately moved our content to their platform. Therefore at the following link you will have the opportunity to listen, download and share (in the freedoms granted and in compliance with the CC licenses associated with each file) the various Podcasts."
|
||
|
||
news:
|
||
title: "News"
|
||
text: "For a long time we have been offering a Telegram channel that posts various news about the world of free software, software development and sometimes even some personal blogs. So we want to share here, the list of feeds that this bot uses trying to be as transparent as possible.<br><br>If you think there are inappropriate sources, or feeds of a certain caliber are missing, please let us know. You can contact us by reaching the \"Contact us\" page. <br><br> Telegram is using the following bot https://github.com/Rongronggg9/RSS-to-Telegram-Bot, so the available RSS feed list in XML format is importable."
|
||
|
||
staff:
|
||
yamabiiko:
|
||
alt_img: "Portrait photo of Lorenzo Tucci"
|
||
text: "<pre><code>
|
||
Compiling yamabiiko v0.1.0 (file:///projects/unsafe-yamabiiko)<br>
|
||
error[E0133]: call to yamabiiko is unsafe and requires unsafe function or block<br>
|
||
--> src/main.rs:4:5<br>
|
||
|<br>
|
||
4 | dangerous();<br>
|
||
| ^^^^^^^^^^^ call to unsafe function<br>
|
||
|<br>
|
||
= note: consult the function's documentation for information on how to avoid undefined behavior<br>
|
||
<br>
|
||
error: aborting due to previous error<br>
|
||
<br>
|
||
For more information about this error, try `rustc --explain yamabiiko`.<br>
|
||
error: could not compile `unsafe-example`<br>
|
||
<br>
|
||
To learn more, run the command again with --verbose.<br>
|
||
</code></pre>
|
||
"
|
||
github_url: "https://github.com/yamabiiko"
|
||
gitlab_url: "https://gitlab.com/yamabik0"
|
||
cmaradonna:
|
||
alt_img: "Portrait photo of Claudio Maradonna"
|
||
text: "Unitoo founder and developer.<br> He enters the world of software at the age of 13 and from there he begins his adventure in the GNU/Linux world, between an overclock and the other.<br><br> Today he develops mainly with Ruby and Rails. He has a weakness for C++ <3"
|
||
fediverse_url: "https://social.unitoo.it/claudio"
|
||
instagram_url: "https://www.instagram.com/cmaradonna/"
|
||
github_url: "https://github.com/FiloSpaTeam"
|
||
gitlab_url: "https://gitlab.com/claudiomaradonna"
|
||
gitea_url: "https://git.unitoo.it/claudiomaradonna"
|
||
frenky:
|
||
alt_img: "Portrait photo of Simone Capparucci"
|
||
text: "
|
||
<blockquote class='blockquote'>
|
||
Non andartene docile in quella buona notte,<br>
|
||
i vecchi dovrebbero bruciare e delirare al serrarsi del giorno;<br>
|
||
infuria, infuria, contro il morire della luce.<br>
|
||
<footer class='blockquote-footer'>Dylan Thomas, Poesie (Torino, Einaudi 1965)</footer>
|
||
</blockquote>"
|
||
instagram_url: "https://www.instagram.com/xxfrenkyxx"
|
||
github_url: "https://github.com/Frenky1993"
|
||
fabio_purple:
|
||
text: "A Salentino with a PhD in computer science & engineering, but above all passionate/fanatic/sick of free as in freedom software, music, photography and so on and so forth ..."
|
||
instagram_url: "https://www.instagram.com/desmovalvo/"
|
||
twitter_url: "https://twitter.com/desmovalvo"
|
||
sydro:
|
||
text: "System Design & Automation expert, as DevOps creates customized systems for its customers, using the most modern automation and continuous building techniques. Militant in the SaLUG! for the past 20 years, he has been contributing to Free as in freedom Software projects."
|
||
instagram_url: "https://www.instagram.com/sydro83/"
|
||
twitter_url: "https://twitter.com/sydro83"
|
||
flickr_url: "https://www.flickr.com/photos/130497152@N05/"
|
||
sara:
|
||
text: "From the Marche region, graduated in Foreign Languages and Cultures, passionate about music, cinema, theater, and above all books. I became passionate about literature when I discovered that it was enough to read it with other points of view to discover that it is actually about us and can be less boring than a sequel to an epic film."
|
||
instagram_url: "https://www.instagram.com/sara_freddoni/"
|
||
facebook_url: "https://www.facebook.com/sara.freddoni"
|
||
grafixprint:
|
||
text: "Founder of Grafixprint, a company that deals with digital printing, web design and artworks. A professional like few others ... and very nice!"
|
||
website_url: "https://www.grafixprint.it"
|
||
|
||
referral:
|
||
title: "Become a Guardian of the User Space"
|
||
description: "Being part of our team does not only mean working with us, but sharing our ideals and our services, designed to be ethical, cutting edge and without a binding contract by default.<br><br>Our customers and partners are therefore invited to share their experience deriving from the use of our services, with their customers and suppliers.<br><br>Following a purchase of one of our Modules, the referring customer and the new contact will receive respectively 2 months and 1 month of Intelligence Module (IT consulting)."
|
||
description_2: "<h4>Be an active part in providing security and innovation in the companies you care about most!</h4>"
|
||
|
||
privacy_policy:
|
||
title: "Privacy policy and consent to the processing of personal data"
|
||
subtitle: "EU Regulation 2016/679 of the European Parliament and of the Council of 27 April 2016"
|
||
strong_1: "WHY THIS INFORMATION"
|
||
text_1: "This page describes the methods of processing the personal data of users who consult the website since following consultation of the site, data relating to identified or identifiable natural persons may be processed. Before communicating any personal data, Unitoo invites you to carefully read this \"Privacy Policy\", as it contains important information on the protection of personal data and on the security measures adopted to guarantee its confidentiality in full compliance with the Applicable Regulations."
|
||
text_2: "This Privacy Policy does not apply to other websites that may be reached via hypertext links published on the Site and complies with Recommendation no. 2/2001 concerning the minimum requirements for online data collection in the European Union, adopted on 17 May 2001 by the Article 29 Working Group."
|
||
text_3: "Pursuant to Article 13 of Regulation (EU) 2016/679 (\"GDPR - General Data Protection Regulation\") hereinafter \"Regulation\", the processing of personal information concerning you, which we will come into possession of, will be based on principles of correctness, lawfulness, purpose limitation and conservation, data minimization, accuracy, integrity and transparency and protection of your privacy and your rights."
|
||
text_4: "Therefore we inform you of the following:"
|
||
pp_1_title: "IDENTITY AND CONTACT DETAILS OF THE DATA CONTROLLER / DPO (DATA PROTECTION MANAGER)"
|
||
pp_1_text: "The data owner is Unitoo di Maradonna Claudio – Via Circonvallazione Sud 28/A, Monteprandone (AP), 63076 - P.IVA: IT02324570445 - Email: info@unitoo.it"
|
||
pp_2_title: "PURPOSE OF THE PROCESSING AND TYPES OF DATA PROCESSED"
|
||
pp_2_text: "
|
||
The Personal Data collected by the Site are as follows:
|
||
<br><br>
|
||
<strong>Navigation data</strong>
|
||
<div>
|
||
The computer systems and software procedures used to operate this site acquire, during their normal operation, some personal data whose transmission is implicit in the use of Internet communication protocols.
|
||
This category of data includes the IP addresses or domain names of the computers and terminals used by users, the URI/URL (Uniform Resource Identifier/Locator) addresses of the requested resources, the time of the request, the method used in the submit the request to the server, the size of the file obtained in response, the numerical code indicating the status of the response given by the server (successful, error, etc.) and other parameters relating to the operating system and the user's IT environment.
|
||
These data, necessary for the use of web services, are also processed for the purpose of:
|
||
<ul>
|
||
<li>statistical research/analysis on aggregate or anonymous data, therefore without the possibility of identifying the user, aimed at measuring the correct functioning of the Site, measuring traffic and evaluating usability and interest;</li>
|
||
</ul>
|
||
The navigation data does not persist for more than seven days (except for any need to ascertain crimes by the judicial authorities).
|
||
</div>
|
||
<br>
|
||
<strong>Data communicated by the user</strong>
|
||
<div>
|
||
The optional, explicit and voluntary sending of messages to the contact addresses of the Data Controller, the private messages sent by users to the institutional profiles/pages on social media (where this possibility is foreseen), as well as the compilation and forwarding of the data requested through the \"Contacts\" form on the site, involve the acquisition of the sender's contact data, necessary to reply, as well as all personal data included in communications. The Data Controller will process these data in compliance with the Regulations, assuming that they refer to you or to third parties who have expressly authorized you to provide them on the basis of an appropriate legal basis that legitimizes the processing of the data in question.
|
||
</div><br>
|
||
<strong>Cookies and other tracking systems</strong>
|
||
<div>
|
||
The specifications referring to the use of cookies for user profiling, other tracking methods and/or communications to third parties, are reported in the Cookies Policy on the home page of the site, which we invite you to view so that you can define your preferences and express your consent.<br>
|
||
Instead, session cookies (non-persistent) are used strictly limited to what is necessary for the safe and efficient navigation of the sites. The storage of session cookies in terminals or browsers is under the user's control, where on the servers, at the end of the HTTP sessions, information relating to cookies remains recorded in the service logs, with retention times not exceeding seven days. like other navigation data.
|
||
More information on the use of cookies and related technologies is available at https://www.garanteprivacy.it/cookie.
|
||
In addition to what is reported in point 2, the processing of the data you provide may be aimed at the purposes specified below:
|
||
<ul>
|
||
<li>fulfill the pre-contractual and contractual obligations deriving from existing relationships with you;</li>
|
||
<li>administrative and accounting management of the relationship required by law.</li>
|
||
</ul>
|
||
In this regard, specific information will be published on the pages of the site prepared for the provision of certain services.
|
||
</div>
|
||
"
|
||
pp_3_title: "RECIPIENTS OR CATEGORIES OF RECIPIENTS OF THE DATA"
|
||
pp_3_text: "The data processed for the purposes referred to in point 2 may be communicated to internal or external staff, legal persons involved in the process of completing the services requested by the interested party, including, by way of example, those in charge of sending emails and analysis of the functioning of the Site, which act on the basis of specific instructions provided regarding the purposes and methods of the processing itself.
|
||
The list is available at the headquarters of the Data Controller at the request of the interested party.
|
||
The Personal Data processed are not transferred to Recipients who are located outside the European Economic Area."
|
||
pp_4_title: "PERIOD OF STORAGE OF PERSONAL DATA"
|
||
pp_4_text: "
|
||
The retention period of personal data begins from the moment of the provision of the same by the interested party and ends with the exercise of the right to cancel the data by the interested party by registered letter with return receipt to the address Via Circonvallazione Sud 28/A , Monteprandone (AP), 63076, Italy or communication by certified e-mail: unitoo@pec.it
|
||
"
|
||
pp_5_title: "OPTIONAL NATURE OF DATA PROVISION AND CONSEQUENCES OF ANY REFUSAL"
|
||
pp_5_text: "
|
||
The provision of the data necessary for the fulfillment of the contact request and/or information is optional. However, in the event of failure to provide the requested data, the data subject will not be able to receive the information and support requested."
|
||
pp_6_title: "LEGAL BASIS OF THE PROCESSING"
|
||
pp_6_text: "
|
||
Pursuant to Article 6 of the GDPR 679/2016, the processing of data for the purposes listed in point 2 of this document has a legal basis on the explicit consent of the interested party (Article 6 letter a); in the execution of a contract of which the interested party is a party (Article 6 letter b) and in the legitimate interest of the owner (Article 6 letter f) based on the relevant relationship between the interested party and the data controller provided that the rights do not prevail and the freedoms of the interested party. The legitimate interests of the Data Controller do not prevail over the interests, rights and freedoms of the data subject."
|
||
pp_7_title: "RIGHTS OF THE INTERESTED PARTY"
|
||
pp_7_text: "At any time, the interested party may exercise his rights towards the data controller, pursuant to articles 15, 16, 17, 18, 20, 21 of the GDPR 679/2016. Specifically, the interested party has the right:
|
||
<ul>
|
||
<li> access to personal data by making an appropriate request (Article 15); </li>
|
||
<li> to obtain the rectification (Article 16) </li>
|
||
<li> to the cancellation of the same (oblivion) (Article 17); </li>
|
||
<li> to the limitation of the processing that concerns him (Article 18); </li>
|
||
<li> to data portability (Article 20); </li>
|
||
<li> to oppose the processing (Article 21); </li>
|
||
<li> to revoke the consent without prejudice to the lawfulness of the processing provided before the revocation, (Article 13 paragraph 2 letter C);
|
||
<li> to lodge a complaint with a supervisory authority (Article 13 paragraph 2 letter D). </li>
|
||
</ul>"
|
||
pp_8_title: "AUTOMATED DECISION-MAKING PROCESS AND PROFILING"
|
||
pp_8_text: "
|
||
The collection and processing of data does not provide for any type of automated decision-making and / or profiling by the Data Controller."
|
||
endtext: "<strong> IMPORTANT </strong>
|
||
<br>
|
||
This Privacy Policy is effective from 25 May 2018. The Data Controller reserves the right to modify or simply update its content, in part or completely, also due to changes in the Regulations. We therefore invite you to visit this section regularly to become aware of the most recent and updated version."
|
||
|
||
footer:
|
||
license: "The site (except logos) is fully released under the terms of the AGPLv3 license. You can find the sources here:"
|
||
|
||
sitemap: "Sitemap"
|
||
projects: "Projects"
|
||
channels: "Channels"
|
||
|
||
cookie:
|
||
description: "We use Matomo (a free as in freedom technology) to analyze traffic and give a better service."
|
||
understand: "Understand better"
|