ç®ã«è¦ãªããã¼ã¿ã®ã»ãã¥ãªãã£ã¯ç¥ããªãã¨ãã¾ãæ°ã«ããªããããããªããåã¯ä¸å½ã«ãããé°ã§ãã£ã¡æ¹é¢ã®ç¥èãå°ã身ã«ã¤ãã¦ããã æªãã³ãã¯ãã¦ãªãããæ å ±ãçã¾ãã¦ãçãã¯ãªããããã©ã¤ãã·ã¼ã侵害ããã¦ããã®ã¯æ°åã¯æªãã ã¤ã³ã¿ã¼ããããããã¤ãã¼ããå ¬å ±ã®ç¡æWi-Fiã¾ã§å ¨ã¦ã®æ å ±ã¯ãã£ã«ã¿ãªã³ã°ããã¦åéããã¦ããããã ãããã¯ä¸å½ã ããããªãã¦ã5-Eyesã«é¢ããå½å ¨ã¦ãè¡ã£ã¦ããã®ãããããªãã çã¿è¦ããã«ãããå¼·åãªæå·åã§å®ããªããéä¿¡åºæ¥ãã¡ãã»ã¼ã¸ã¢ããªãç´¹ä»ããããç´¹ä»ããã¢ããª9é¸å ¨ã¦ã¯ãâEnd-to-End Encrypted Messagingâ ã¨è¨ã£ã¦éä¿¡è ã¨åä¿¡è 以å¤ã¯éä¿¡å 容ãè¦ããªãéä¿¡æè¡ã使ã£ã¦ããã å ã¿ã«åèªèº«ã¯æ¤è¨¼ããè¡ãæã£ã¦ããªããå ¨ã¦ã¯å¤é¨è©ä¾¡ã«åºãã¦ãå®å ¨ãã§ããã¨å¤æãã¦ããã åç §EFF
{{#tags}}- {{label}}
{{/tags}}