1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-18 16:54:21 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2024-06-13 07:32:36 +00:00
parent c1a9cc5aab
commit 00de31ab2c
3 changed files with 25 additions and 25 deletions

View File

@ -13,13 +13,13 @@
## Gitea ## Gitea
- 域名: [code.privacyguides.dev](https://code.privacyguides.dev) - 域名: [code.privacyguides.dev](https://code.privacyguides.dev)
- Availability: Invite-Only Access may be granted upon request to any team working on *Privacy Guides*-related development or content. - 可用性:僅限受邀者 根據請求授予任何參與 *Privacy Guides*相關開發或內容的團隊。
- 來源: [snapcraft.io/gitea](https://snapcraft.io/gitea) - 來源: [snapcraft.io/gitea](https://snapcraft.io/gitea)
## Matrix ## Matrix
- 域名: [matrix.privacyguides.org](https://matrix.privacyguides.org) - 域名: [matrix.privacyguides.org](https://matrix.privacyguides.org)
- Availability: Invite-Only Access may be granted upon request to Privacy Guides team members, Matrix moderators, third-party Matrix community administrators, Matrix bot operators, and other individuals in need of a reliable Matrix presence. - 可用性:僅限邀請 根據要求,可以授予 Privacy Guides 團隊成員, Matrix 主持人,第三方 Matrix 社區管理員, Matrix 機器人操作員以及其他需要可靠 Matrix 人士 。
- 來源: [github.com/spantaleev/matrix-docker-ansible-deploy](https://github.com/spantaleev/matrix-docker-ansible-deploy) - 來源: [github.com/spantaleev/matrix-docker-ansible-deploy](https://github.com/spantaleev/matrix-docker-ansible-deploy)
## SearXNG ## SearXNG
@ -31,5 +31,5 @@
## Invidious ## Invidious
- 域名: [invidious.privacyguides.net](https://invidious.privacyguides.net) - 域名: [invidious.privacyguides.net](https://invidious.privacyguides.net)
- Availability: Semi-Public We host Invidious primarily to serve embedded YouTube videos on our website, this instance is not intended for general-purpose use and may be limited at any time. - 可用性:半公開 我們託管 Invidious 主要是為了在網站上提供嵌入式 YouTube 影片,此實例不適用於一般用途,並可能隨時受到限制。
- 來源: [github.com/iv-org/invidious](https://github.com/iv-org/invidious) - 來源: [github.com/iv-org/invidious](https://github.com/iv-org/invidious)

View File

@ -1,13 +1,13 @@
--- ---
title: 替代網路 title: 替代網路
icon: material/vector-polygon icon: material/vector-polygon
description: These tools allow you to access networks other than the World Wide Web. description: 這些工具可存取萬維網以外的網路。
cover: alternative-networks.webp cover: alternative-networks.webp
--- ---
## 匿名網路 ## 匿名網路
When it comes to anonymizing networks, we want to specially note that [Tor](advanced/tor-overview.md) is our top choice. It is by far the most utilized, robustly studied, and actively developed anonymous network. Using other networks could be more likely to endanger your anonymity, unless you know what you're doing. 當談到匿名網路時,要特別注意的是 我們首選的[Tor](advanced/tor-overview.md) 。 它是迄今為止使用最多、研究最深入、開發最活躍的匿名網路。 使用其他網路有可能危及匿名性,除非知道自己在做什麼。
### Tor ### Tor
@ -15,7 +15,7 @@ When it comes to anonymizing networks, we want to specially note that [Tor](adva
![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right } ![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right }
The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. 個人和組織還可以通過 Tor 網絡與“.onion 隱藏服務”分享資訊,而不會損害他們的隱私。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。 **Tor** 網絡是一組由志願者操作的伺服器,可免費連線,並改善隱私權和安全性。 個人和組織還可以通過 Tor 網絡與“.onion 隱藏服務”分享資訊,而不會損害他們的隱私。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。
[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage }
[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" }
@ -25,14 +25,14 @@ The **Tor** network is a group of volunteer-operated servers that allows you to
</div> </div>
The recommended way to access the Tor network is via the official Tor Browser, which we have covered in more detail on a dedicated page: 存取 Tor 網路的建議方式是透過官方 Tor 瀏覽器,我們在專用頁面作了更詳細的介紹:
[Tor Browser Info :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Detailed Tor Overview :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button } [Tor 瀏覽器資訊 :material-arrow-right-drop-circle:](tor.md){ .md-button .md-button--primary } [Tor 詳細介紹 :material-arrow-right-drop-circle:](advanced/tor-overview.md){ .md-button }
<div class="admonition example" markdown> <div class="admonition example" markdown>
<p class="admonition-title">試用一下!</p> <p class="admonition-title">試用一下!</p>
You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion). 可以嘗試透過 Tor 連線到_Privacy Guides_[xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion](http://www.xoe4vn5uwdztif6goazfbmogh6wh5jc4up35bqdflu6bkdc5cas5vjqd.onion).
</div> </div>
@ -43,9 +43,9 @@ You can try connecting to _Privacy Guides_ via Tor at [xoe4vn5uwdztif6goazfbmogh
![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right } ![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ align=right }
![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right } ![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ align=right }
**Snowflake** allows you to donate bandwidth to the Tor Project by operating a "Snowflake proxy" within your browser. **Snowflake** 可透過瀏覽器中執行「Snowflake 代理」來向 Tor 專案捐贈頻寬。
People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. 被審查的人可以使用 Snowflake 代理來連接 Tor 網絡。 Snowflake 是貢獻 Tor 網路的好方法,即便沒有運行 Tor 中繼或橋接的技術知識。
[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary }
[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation}
@ -56,22 +56,22 @@ People who are censored can use Snowflake proxies to connect to the Tor network.
</div> </div>
You can enable Snowflake in your browser by opening it in another tab and turning the switch on. You can leave it running in the background while you browse to contribute your connection. We don't recommend installing Snowflake as a browser extension, because adding third-party extensions can increase your attack surface. 要啟用瀏覽器的 Snowflake 請在另一個標籤分頁下開啟其切換開關。 您可讓它在背景下執行而您的瀏覽器會協助其連接。 不建議將 Snowflake 作為瀏覽器附加元件安裝,因為第三方的擴展往往會增加攻擊面。
[Run Snowflake in your Browser :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button } [瀏覽器下執行 Snowflake :material-arrow-right-drop-circle:](https://snowflake.torproject.org/embed.html){ .md-button }
Snowflake does not increase your privacy in any way, nor is it used to connect to the Tor network within your personal browser. However, if your internet connection is uncensored, you should consider running it to help people in censored networks achieve better privacy themselves. There is no need to worry about which websites people are accessing through your proxy—their visible browsing IP address will match their Tor exit node, not yours. Snowflake 無法加強隱私,也不會在個人瀏覽器中連接 Tor 網絡。 但如果網際網路連接沒有被審查的情形,請考慮使用它,幫助受審查網路中的人們能有更好的隱私。 無需擔心人們通過您的代理訪問哪些網站----他們的可見瀏覽 IP 地址將與其 Tor 出口節點相匹配,而不是您的 IP 地址。
Running a Snowflake proxy is low-risk, even more so than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. 運行 Snowflake 代理風險很低,甚至低於運行 Tor 中繼或橋接器,而這些中繼器或橋接器已經不算是特別高風險的工作。 但是,它通過您的網路進行代理流量,在某些方面可能會產生影響,特別是所用的網路頻寬有限制的話。 在決定是否要執行代理程式之前,請確保了解 [Snowflake 的工作原理'(https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home)
### I2P (The Invisible Internet Project) ### I2P (隱形網際網路計劃)
<div class="admonition recommendation" markdown> <div class="admonition recommendation" markdown>
![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right } ![I2P logo](assets/img/self-contained-networks/i2p.svg#only-light){ align=right }
![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right } ![I2P logo](assets/img/self-contained-networks/i2p-dark.svg#only-dark){ align=right }
**I2P** is an network layer which encrypts your connections and routes them via a network of computers distributed around the world. It is mainly focused on creating an alternative, privacy-protecting network rather than making regular internet connections anonymous. **I2P**是一個網路層,對連接進行加密,並透過分佈在世界各地的電腦網路路由它們。 它主要致力創建一個替代性的隱私保護網絡,而不是使常規的互聯網連接匿名。
[:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary } [:octicons-home-16: Homepage](https://geti2p.net/en){ .md-button .md-button--primary }
[:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation } [:octicons-info-16:](https://geti2p.net/en/about/software){ .card-link title=Documentation }
@ -91,17 +91,17 @@ Running a Snowflake proxy is low-risk, even more so than running a Tor relay or
</div> </div>
Unlike Tor, all I2P traffic is internal to the I2P network, which means regular internet websites are **not** directly accessible from I2P. Instead, you can connect to websites which are hosted anonymously and directly on the I2P network, which are called "eepsites" and have domains which end in `.i2p`. 不同於 Tor ,所有 I2P 流量都是 I2P 網路內部的,這意味著常規互聯網網站**不能**直接從 I2P 存取。 相反,可以連接到直接在 I2P 網路上匿名託管的網站這些網站稱為“eepsites”並且具有以“.i2p”結尾的網域。
<div class="admonition example" markdown> <div class="admonition example" markdown>
<p class="admonition-title">試用一下!</p> <p class="admonition-title">試用一下!</p>
You can try connecting to _Privacy Guides_ via I2P at [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p). 可試試透過 I2P 訪問 _Privacy Guides_ [privacyguides.i2p](http://privacyguides.i2p/?i2paddresshelper=fvbkmooriuqgssrjvbxu7nrwms5zyhf34r3uuppoakwwsm7ysv6q.b32.i2p).
</div> </div>
Also, unlike Tor, every I2P node will relay traffic for other users by default, instead of relying on dedicated relay volunteers to run nodes. There are approximately [10,000](https://metrics.torproject.org/networksize.html) relays and bridges on the Tor network compared to ~50,000 on I2P, meaning there is potentially more ways for your traffic to be routed to maximize anonymity. I2P also tends to be more performant than Tor, although this is likely a side-effect of Tor being more focused on regular "clearnet" internet traffic and thus using more bottlenecked exit nodes. Hidden service performance is generally considered to be much better on I2P compared to Tor. While running P2P applications like BitTorrent is challenging on Tor (and can massively impact Tor network performance), it is very easy and performant on I2P. 再者,每個 I2P 節點預設都會為其他使用者中繼流量,而不是依賴專門的中繼志工來運行節點。 Tor 網路大約有[10,000](https://metrics.torproject.org/networksize.html) 個中繼和網橋而I2P 上有大約50,000 個中繼和網橋,這意味著流量可能有更多的路由方式來最大化匿名性。 I2P 也比 Tor 效能更高,這可能是由於 Tor 更關注常規「clearnet」網路流量使用更多瓶頸出口節點的副作用。 與 Tor 相比,通常認為 I2P 上的隱藏服務效能更優。 在 Tor 上運行 BitTorrent 等 P2P 應用程式具有挑戰性(並且會極大地影響 Tor 網路效能),而在 I2P 上運行卻非常簡單且高效能。
There are downsides to I2P's approach, however. Tor relying on dedicated exit nodes means more people in less safe environments can use it, and the relays that do exist on Tor are likely to be more performant and stable, as they generally aren't run on residential connections. Tor is also far more focused on **browser privacy** (i.e. anti-fingerprinting), with a dedicated [Tor Browser](tor.md) to make browsing activity as anonymous as possible. I2P is used via your [regular web browser](desktop-browsers.md), and while you can configure your browser to be more privacy-protecting, you probably still won't have the same browser fingerprint as other I2P users (there's no "crowd" to blend in with in that regard). 然而I2P 的方法也有缺點。 Tor 依賴專用的出口節點這意味著更多的人可以在不太安全的環境中使用它而且Tor 上確實存在的中繼可能性能更高、更穩定,因為它們通常不在長駐連接上運行。 Tor 也更關注**瀏覽器隱私**(即防指紋),並配有專用的 [Tor 瀏覽器](tor.md) 來盡可能使瀏覽活動匿名。 I2P 透過[常用網頁瀏覽器](desktop-browsers.md) 使用,雖然可以將瀏覽器設定為更保護隱私,但可能不會與其他 I2P 使用者有相同的瀏覽器指紋(沒有在這方面混在「人群」)。
Tor is likely to be more resistant to censorship, due to their robust network of bridges and varying [pluggable transports](https://tb-manual.torproject.org/circumvention). On the other hand, I2P uses directory servers for the initial connection which are varying/untrusted and run by volunteers, compared to the hard-coded/trusted ones Tor uses which are likely easier to block. 由於其強大的橋接網絡和不同的[可插拔傳輸](https://tb-manual.torproject.org/circumvention)Tor 更能抵抗審查。 另一方面I2P 使用目錄伺服器進行初始連接,這些目錄伺服器是變化的/不受信任的,由志願者運行,而 Tor 使用的硬編碼/受信任的伺服器可能更容易被阻止。

View File

@ -1,5 +1,5 @@
--- ---
title: Commit Messages title: 提交訊息
--- ---
For our commit messages we follow the style provided by [Conventional Commits](https://conventionalcommits.org). Not all of those suggestions are appropriate for Privacy Guides, so the main ones we use are: For our commit messages we follow the style provided by [Conventional Commits](https://conventionalcommits.org). Not all of those suggestions are appropriate for Privacy Guides, so the main ones we use are:
@ -12,7 +12,7 @@ We use `fix` for simple things like spelling mistakes or site related bugs. Thes
fix: Correct spelling on XYZ page (#0000) fix: Correct spelling on XYZ page (#0000)
``` ```
## Update to site ## 站台更新
This example is for a removal of an item (but could also be used for an addition); you may elaborate why it was removed in the commit paragraph below. It can also be used for the addition of any new pages. This example is for a removal of an item (but could also be used for an addition); you may elaborate why it was removed in the commit paragraph below. It can also be used for the addition of any new pages.
@ -40,7 +40,7 @@ feat: Add blah blah (#0000)
This change adds the forum topics to the main page This change adds the forum topics to the main page
``` ```
## Module update ## 模組更新
Dependency updates follow the normal recommendations of beginning with: Dependency updates follow the normal recommendations of beginning with: