Skip to content

Commit a0c67bc

Browse files
SelYuigithub-actions[bot]
authored andcommitted
automatically update translations
1 parent b63373a commit a0c67bc

File tree

267 files changed

+4426
-2742
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

267 files changed

+4426
-2742
lines changed

i18n/be/docusaurus-plugin-content-docs/current/adguard-browser-extension/mv3-version.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,19 +21,19 @@ The old beta extension will be renamed to [**AdGuard Ad Blocker MV2**](https://c
2121

2222
- **Filtering log**
2323

24-
![Filtering log \*border](https://cdn.adtidy.org/content/blog/mv3/new/log.png)
24+
![Filtering log \*border](https://cdn.adtidy.org/content/blog/mv3/new/log.png)
2525

26-
Due to DNR restrictions, we can’t show exactly which rule worked, but we will provide an “assumed rule that was triggered” based on our engine. For precise information, you’ll need to install the “unpacked” form of the extension in your browser yourself. You’ll find detailed instructions on how to do this in a [separate article](/adguard-browser-extension/solving-problems/debug-rules/).
26+
Due to DNR restrictions, we can’t show exactly which rule worked, but we will provide an “assumed rule that was triggered” based on our engine. For precise information, you’ll need to install the “unpacked” form of the extension in your browser yourself. You’ll find detailed instructions on how to do this in a [separate article](/adguard-browser-extension/solving-problems/debug-rules/).
2727

2828
- _Tracking protection_ (formerly known as _Stealth mode_)
2929

30-
![Tracking protection \*border](https://cdn.adtidy.org/content/blog/mv3/new/tracking_screen.png)
30+
![Tracking protection \*border](https://cdn.adtidy.org/content/blog/mv3/new/tracking_screen.png)
3131

32-
There are no _Cookies_ section, along with _Self-destruction of first-party cookies_ and _Self-destruction of third-party cookies_ since we cannot set the TTL of cookies using declarative rules.
32+
There are no _Cookies_ section, along with _Self-destruction of first-party cookies_ and _Self-destruction of third-party cookies_ since we cannot set the TTL of cookies using declarative rules.
3333

3434
- _Phishing & malware protection_ is no longer available in the general settings. To protect yourself from malicious websites and scams, enable the appropriate _Security_ filters in the _Filters_ tab.
3535

36-
![Security \*border](https://cdn.adtidy.org/content/blog/mv3/new/security.png)
36+
![Security \*border](https://cdn.adtidy.org/content/blog/mv3/new/security.png)
3737

3838
## Limitations
3939

@@ -55,7 +55,7 @@ The maximum number of simultaneously enabled filters is **50**.
5555

5656
**Dynamic rules:** a strict cap of **5,000** rules is imposed, which includes a maximum of 1,000 regex rules.
5757

58-
If this limit is exceeded, only **5,000 converted rules** will be applied in the following order: first Allowlist, then User rules, Custom filters, and finally — Quick Fixes filter.
58+
If this limit is exceeded, only **5,000 converted rules** will be applied in the following order: first Allowlist, then User rules and finally Custom filters.
5959

6060
> **Converted rules** are rules that have been transformed
6161
> to [DNR format] using the [declarative converter][github-declarative-converter].

i18n/be/docusaurus-plugin-content-docs/current/adguard-for-android/features/low-level-settings.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,12 @@ If this setting is enabled, AdGuard will filter requests sent over HTTP/3 in add
138138

139139
**About HTTP/3**: This is the latest version of the HTTP protocol, based on QUIC.
140140

141+
**Limitations**:
142+
143+
- Chrome-based browsers do not accept user certificates, so HTTP/3 filtering is not supported in them.
144+
- Firefox-based browsers behave similarly by default, but you can set the `network.http.http3.disable_when_third_party_roots_found` option in `about:config` to `false` to allow user certificates for HTTP/3.
145+
- Safari supports HTTP/3 filtering without additional configuration.
146+
141147
### Outbound proxy
142148

143149
#### Show the Filter DNS requests setting

i18n/be/docusaurus-plugin-content-docs/current/adguard-for-android/solving-problems/adguard-for-android-tv.md

Lines changed: 37 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -43,18 +43,46 @@ Done, AdGuard for Android TV is installed.
4343

4444
4. Write down the IP address of your Android TV:
4545

46-
- On your Android TV, navigate to Settings.
47-
- Select _System__About_.
48-
- Find _Network_ and select _Wi-Fi_ or _Ethernet_, depending on your connection type.
49-
- Go to the network section and find _IP address_. Note down this IP address.
46+
- On your Android TV, navigate to Settings.
47+
- Select _System__About_.
48+
- Find _Network_ and select _Wi-Fi_ or _Ethernet_, depending on your connection type.
49+
- Go to the network section and find _IP address_. Note down this IP address.
5050

5151
5. Connect to Android TV via ADB:
5252

53-
- Open the terminal or command prompt on your computer.
54-
- Enter the command `adb connect` and paste the IP address of your TV.
55-
- The connection will be established.
53+
- Open the terminal or command prompt on your computer.
54+
- Enter the command `adb connect` and paste the IP address of your TV.
55+
- The connection will be established.
5656

5757
6. Install AdGuard for Android TV via ADB:
5858

59-
- In the terminal, enter the command `adb install Downloads/adguard_tv.apk`. If necessary, replace `Downloads/adguard_tv.apk` with your path.
60-
- Wait for a message in the terminal indicating the successful installation of the app.
59+
- In the terminal, enter the command `adb install Downloads/adguard_tv.apk`. If necessary, replace `Downloads/adguard_tv.apk` with your path.
60+
- Wait for a message in the terminal indicating the successful installation of the app.
61+
62+
## Installing AdGuard for Android TV via atvTools
63+
64+
**Important:** Your smartphone and TV with Android TV (TV box) must be on the same local network.
65+
66+
1. Install the [atvTools](https://play.google.com/store/apps/details?id=dev.vodik7.atvtools) app on your Android smartphone
67+
68+
2. Connect **atvTools** to **Android TV**
69+
70+
1. Enable developer mode on your Android TV device
71+
72+
`Settings``Device settings``About device` → Tap `Android TV build` until you see a message confirming that you have successfully obtained developer status
73+
74+
2. Enable USB debugging on your Android TV device
75+
76+
Go to `Settings``Device settings``For developers``Debugging`, allow and enable `USB debugging`
77+
78+
3. Launch **atvTools** on your smartphone
79+
80+
4. Find the desired **Android TV** device in the list and click it
81+
82+
5. Allow the connection on the TV
83+
84+
6. Download the [AdGuard for Android TV](https://agrd.io/tvapk) installer to your smartphone as an **APK** file
85+
86+
7. In **atvTools**, click **Install** on the main screen and wait (less than a minute) until the **AdGuard for Android TV** icon appears in the list of applications
87+
88+
![Main screen \*mobile](https://cdn.adtidy.org/content/kb/ad_blocker/android/solving_problems/android-tv/main-screen.png)

i18n/be/docusaurus-plugin-content-docs/current/adguard-for-mac/solving-problems/advanced-settings.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,12 @@ Verifies the authenticity of all certificates for the domain based on Chrome Cer
8181

8282
By setting `true`, you allow AdGuard to filter traffic sent over HTTP/3, the latest version of the HTTP protocol based on QUIC.
8383

84+
**Limitations**:
85+
86+
- Chrome-based browsers do not accept user certificates, so HTTP/3 filtering is not supported in them.
87+
- Firefox-based browsers behave similarly by default, but you can set the `network.http.http3.disable_when_third_party_roots_found` option in `about:config` to `false` to allow user certificates for HTTP/3.
88+
- Safari supports HTTP/3 filtering without additional configuration.
89+
8490
#### `network.filtering.localnetwork`
8591

8692
By setting `true`, you enable local network filtering.

i18n/be/docusaurus-plugin-content-docs/current/adguard-for-windows/solving-problems/low-level-settings.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,12 @@ Enable this feature if you want AdGuard to automatically intercept filter subscr
6565

6666
If this option is enabled, AdGuard will filter requests sent over HTTP/3 in addition to other request types.
6767

68+
**Limitations**:
69+
70+
- Chrome-based browsers do not accept user certificates, so HTTP/3 filtering is not supported in them.
71+
- Firefox-based browsers behave similarly by default, but you can set the `network.http.http3.disable_when_third_party_roots_found` option in `about:config` to `false` to allow user certificates for HTTP/3.
72+
- Safari supports HTTP/3 filtering without additional configuration.
73+
6874
### Use redirect driver mode
6975

7076
If this option is enabled, AdGuard intercepts all the traffic and redirects it to the local proxy server for further filtering.

i18n/be/docusaurus-plugin-content-docs/current/general/ad-filtering/adguard-filters.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,6 @@ This article is about the filters we create to use in AdGuard and other ad-block
3838
- **Experimental filter** serves to test some new filtering rules that can potentially cause conflicts and mess with websites' work. In case these rules perform without any issues, they get added to main filters. [View rules](https://raw.githubusercontent.com/AdguardTeam/FiltersRegistry/master/filters/filter_5_Experimental/filter.txt)
3939
- **Mobile ads filter** blocks ads on mobile devices. Contains all known mobile ad networks. [View rules](https://raw.githubusercontent.com/AdguardTeam/FiltersRegistry/master/filters/filter_11_Mobile/filter.txt)
4040
- **DNS filter** — composed of several other filters (AdGuard Base filter, Social media filter, Spyware filter, Mobile ads filter, EasyList and EasyPrivacy) and simplified specifically to be better compatible with DNS-level ad blocking. This filter is used by [AdGuard DNS](https://adguard-dns.io/kb) servers to block ads and tracking. [View rules](https://raw.githubusercontent.com/AdguardTeam/FiltersRegistry/master/filters/filter_15_DnsFilter/filter.txt)
41-
- **Quick Fixes filter** — used to quickly resolve critical content filtering issues on popular websites without updating the MV3 extension. [View rules](https://filters.adtidy.org/extension/chromium-mv3/filters/24.txt)
4241

4342
## AdGuard Filters Policy
4443

i18n/be/docusaurus-plugin-content-docs/current/general/ad-filtering/create-own-filters.md

Lines changed: 36 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -419,6 +419,19 @@ This modifier lets you narrow the rule coverage down to a specific application (
419419

420420
For Mac, you can find out the bundle ID or the process name of the app by viewing the respective request details in the Filtering log.
421421

422+
**Syntax**
423+
424+
The modifier is a list of one or more expressions, each of which is matched against an application in a particular way depending on its type. These expressions are separated by the `|` symbol.
425+
426+
```text
427+
applications = ["~"] entry_0 ["|" ["~"] entry_1 ["|" ["~"]entry_2 ["|" ... ["|" ["~"]entry_N]]]]
428+
entry_i = ( regular_app / wildcard_app / regexp )
429+
```
430+
431+
- **`regular_app`** — a regular application name (`example.app`). It corresponds to the specified application and is matched lexicographically.
432+
- **`wildcard_app`** — an application name ending with a wildcard character `*`, such as `org.example.*` or `com.ad*`. It matches all applications whose names start with the specified prefix. Matching is done lexicographically.
433+
- **`regexp`** — a regular expression that starts and ends with `/`. It works the same way as the basic URL rules, but the characters `/`, `$`, `,`, and `|` must be escaped with `\`.
434+
422435
**Examples**
423436

424437
- `||baddomain.com^$app=org.example.app` — a rule to block requests that match the specified mask and are sent from the `org.example.app` Android app.
@@ -429,16 +442,31 @@ If you want the rule not to be applied to certain apps, start the app name with
429442
- `||baddomain.com^$app=~org.example.app` — a rule to block requests that match the specified mask and are sent from any app except for the `org.example.app`.
430443
- `||baddomain.com^$app=~org.example.app1|~org.example.app2` — same as above, but now two apps are excluded: `org.example.app1` and `org.example.app2`.
431444

445+
You can use wildcards in the `$app` modifier:
446+
447+
- `||baddomain.com^$app=org.example.*` — applies to all apps whose package names start with `org.example.`
448+
449+
You can use regular expressions in the `$app` modifier by enclosing them in forward slashes `/.../`. This allows for more flexible matching — for example, targeting a group of apps from the same publisher or matching complex patterns.
450+
451+
- `||baddomain.com^$app=/org\.example\.[a-z0-9_]+/` — applies to all apps whose package name starts with `org.example` (e.g. `org.example.app1`, `org.example.utility`, etc.).
452+
- `||baddomain.com^$app=/^org\.example\.app\$\|^org\.example\.[ab].*/` — applies to `org.example.app` and to any app whose package starts with `org.example.a` or `org.example.b`.
453+
454+
The `$app` modifier supports combining all three types of entries — plain names, wildcards, and regular expressions — within the same rule, but it does not allow combining negated and non-negated expressions together.
455+
456+
- `||example.com^$app=org.example.app|org.example.*|/org\.example\.[a-z]+/` — applies to `org.example.app`, all matching `org.example.*` and `org.example.[a-z]+` apps.
457+
432458
:::caution Restrictions
433459

434-
Apps in the modifier value cannot have a wildcard, e.g. `$app=com.*.music`. Rules with such modifier are considered invalid.
460+
- Apps in the modifier value cannot include a wildcard inside the string , e.g. `$app=com.*.music`. Use a regular expression instead: `$app=/com\..*\.music/`.
461+
- You cannot combine negated (`~`) and non-negated expressions in the same `$app` modifier — this would be ambiguous.
435462

436463
:::
437464

438465
:::info Compatibility
439466

440467
- Only AdGuard for Windows, Mac, Android are technically capable of using rules with `$app` modifier.
441468
- On Windows the process name is case-insensitive starting with AdGuard for Windows with [CoreLibs][] v1.12 or later.
469+
- Support for regular expressions and for combining different types of entries (plain names, wildcards, and regular expressions) in the `$app` modifier is available starting from CoreLibs v1.19 or later.
442470

443471
:::
444472

@@ -529,38 +557,23 @@ If you want the rule not to be applied to certain domains, start a domain name w
529557

530558
**`$domain` modifier matching target domain:**
531559

532-
In some cases the `$domain` modifier can match not only the referrer domain, but also the target domain. This happens when all the following conditions are met:
533-
534-
1. The request has the `document` content type
535-
1. The rule pattern does not match any particular domains
536-
1. The rule pattern does not contain regular expressions
537-
1. The `$domain` modifier contains only excluded domains, e.g. `$domain=~example.org|~example.com`
538-
539-
The following predicate should be satisfied to perform a target domain matching:
540-
541-
```text
542-
1 AND ((2 AND 3) OR 4)
543-
```
544-
545-
That is, if the modifier `$domain` contains only excluded domains, then the rule does not need to meet the second and third conditions to match the target domain against the modifier `$domain`.
560+
In some cases the `$domain` modifier can match not only the referrer domain, but also the target domain.
546561

547-
If some of the conditions above are not met but the rule contains [`$cookie`](#cookie-modifier) or [`$csp`](#csp-modifier) modifier, the target domain will still be matched.
562+
This happens when the rule has one of the following modifiers: [`$cookie`](#cookie-modifier), [`$csp`](#csp-modifier), [`$permissions`](#permissions-modifier), [`$removeparam`](#removeparam-modifier).
548563

549-
If the referrer matches a rule with `$domain` that explicitly excludes the referrer domain, then the rule will not be applied even if the target domain also matches the rule. This affects rules with [`$cookie`](#cookie-modifier) and [`$csp`](#csp-modifier) modifiers, too.
564+
These modifiers will not be applied if the referrer matches a rule with `$domain` that explicitly excludes the referrer domain, even if the target domain also matches the rule.
550565

551566
**Examples**
552567

553568
- `*$cookie,domain=example.org|example.com` will block cookies for all requests to and from `example.org` and `example.com`.
554-
- `*$document,domain=example.org|example.com` will block all requests to and from `example.org` and `example.com`.
569+
- `*$document,domain=example.org|example.com` will block requests only from `example.org` and `example.com`, but not to them.
555570

556571
In the following examples it is implied that requests are sent from `http://example.org/page` (the referrer) and the target URL is `http://targetdomain.com/page`.
557572

558573
- `page$domain=example.org` will be matched, as it matches the referrer domain.
559-
- `page$domain=targetdomain.com` will be matched, as it matches the target domain and satisfies all requirements mentioned above.
560-
- `||*page$domain=targetdomain.com` will not be matched, as the pattern `||*page` may match specific domains, e.g. `example.page`.
574+
- `page$domain=targetdomain.com` will not be matched because it does not match the referrer domain.
561575
- `||*page$domain=targetdomain.com,cookie` will be matched because the rule contains `$cookie` modifier despite the pattern `||*page` may match specific domains.
562-
- `/banner\d+/$domain=targetdomain.com` will not be matched as it contains a regular expression.
563-
- `page$domain=targetdomain.com|~example.org` will not be matched because the referrer domain is explicitly excluded.
576+
- `page$domain=targetdomain.com|~example.org,cookie` will not be matched because the referrer domain is explicitly excluded.
564577

565578
##### `$domain` modifier limitations {#domain-modifier-limitations}
566579

@@ -1877,7 +1890,7 @@ In AdGuard for Windows, Mac and Android with [CoreLibs][] v1.11 or later, JSONPa
18771890
{
18781891
"elems": [
18791892
{
1880-
"a": {"b": {"c": 123}},
1893+
"a": {"b": {"c": 123}}
18811894
},
18821895
{
18831896
"a": {"b": {"c": "abc"}}

i18n/be/docusaurus-plugin-content-docs/current/general/ad-filtering/filter-policy.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,14 +41,12 @@ AdGuard ad-blocking filters include:
4141
- AdGuard Base filter
4242
- AdGuard Mobile Ads filter
4343
- Regional filters divided by language principle — Chinese, Dutch, French, German, Japanese, Russian, Spanish/Portuguese, Turkish, and Ukrainian
44-
- AdGuard Quick Fixes filter
4544

4645
### The purpose of these filters
4746

4847
- **Base filter** is designed to block ads on English-language websites and those for which there is no separate filter. It also contains general filtering rules that apply to all sites regardless of language
4948
- **Mobile Ads filter** blocks advertisements on mobile versions of websites and within mobile apps. There is no segmentation based on language
5049
- **Regional filters** follow the same policy as the **Base filter**, but limited to websites in certain languages
51-
- **Quick Fixes filter** used to quickly resolve critical content filtering issues on popular websites without updating the MV3 extension.
5250

5351
The goal of ad-blocking filters is to block all types of advertising on websites, applications, and certain devices that can load ads from the Internet:
5452

i18n/bn/docusaurus-plugin-content-docs/current/adguard-browser-extension/mv3-version.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ The maximum number of simultaneously enabled filters is **50**.
5555

5656
**Dynamic rules:** a strict cap of **5,000** rules is imposed, which includes a maximum of 1,000 regex rules.
5757

58-
If this limit is exceeded, only **5,000 converted rules** will be applied in the following order: first Allowlist, then User rules, Custom filters, and finally — Quick Fixes filter.
58+
If this limit is exceeded, only **5,000 converted rules** will be applied in the following order: first Allowlist, then User rules and finally Custom filters.
5959

6060
> **Converted rules** are rules that have been transformed
6161
> to [DNR format] using the [declarative converter][github-declarative-converter].

i18n/bn/docusaurus-plugin-content-docs/current/adguard-for-android/features/low-level-settings.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,12 @@ If this setting is enabled, AdGuard will filter requests sent over HTTP/3 in add
138138

139139
**About HTTP/3**: This is the latest version of the HTTP protocol, based on QUIC.
140140

141+
**Limitations**:
142+
143+
- Chrome-based browsers do not accept user certificates, so HTTP/3 filtering is not supported in them.
144+
- Firefox-based browsers behave similarly by default, but you can set the `network.http.http3.disable_when_third_party_roots_found` option in `about:config` to `false` to allow user certificates for HTTP/3.
145+
- Safari supports HTTP/3 filtering without additional configuration.
146+
141147
### Outbound proxy
142148

143149
#### Show the Filter DNS requests setting

0 commit comments

Comments
 (0)