From 02de71f0c02d51358681eb51ad3ac35a6b2b7b89 Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Thu, 1 Feb 2024 06:31:41 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/ar/basics/threat-modeling.md | 2 +- i18n/ar/photo-management.md | 4 ++-- i18n/bn-IN/basics/threat-modeling.md | 2 +- i18n/bn-IN/photo-management.md | 4 ++-- i18n/bn/basics/threat-modeling.md | 2 +- i18n/bn/photo-management.md | 4 ++-- i18n/cs/basics/threat-modeling.md | 2 +- i18n/cs/photo-management.md | 4 ++-- i18n/de/basics/threat-modeling.md | 2 +- i18n/de/photo-management.md | 4 ++-- i18n/el/basics/threat-modeling.md | 2 +- i18n/el/photo-management.md | 4 ++-- i18n/eo/basics/threat-modeling.md | 2 +- i18n/eo/photo-management.md | 4 ++-- i18n/es/basics/threat-modeling.md | 2 +- i18n/es/photo-management.md | 4 ++-- i18n/fa/basics/threat-modeling.md | 2 +- i18n/fa/photo-management.md | 4 ++-- i18n/fr/basics/threat-modeling.md | 2 +- i18n/fr/photo-management.md | 4 ++-- i18n/he/basics/threat-modeling.md | 2 +- i18n/he/photo-management.md | 4 ++-- i18n/hi/basics/threat-modeling.md | 2 +- i18n/hi/photo-management.md | 4 ++-- i18n/hu/basics/threat-modeling.md | 2 +- i18n/hu/photo-management.md | 4 ++-- i18n/id/basics/threat-modeling.md | 2 +- i18n/id/photo-management.md | 4 ++-- i18n/it/basics/threat-modeling.md | 2 +- i18n/it/photo-management.md | 4 ++-- i18n/ja/basics/threat-modeling.md | 2 +- i18n/ja/photo-management.md | 4 ++-- i18n/ko/basics/threat-modeling.md | 2 +- i18n/ko/photo-management.md | 4 ++-- i18n/ku-IQ/basics/threat-modeling.md | 2 +- i18n/ku-IQ/photo-management.md | 4 ++-- i18n/nl/basics/threat-modeling.md | 2 +- i18n/nl/photo-management.md | 4 ++-- i18n/pl/basics/threat-modeling.md | 2 +- i18n/pl/photo-management.md | 4 ++-- i18n/pt-BR/basics/threat-modeling.md | 2 +- i18n/pt-BR/photo-management.md | 4 ++-- i18n/pt/basics/threat-modeling.md | 2 +- i18n/pt/photo-management.md | 4 ++-- i18n/ru/basics/threat-modeling.md | 2 +- i18n/ru/photo-management.md | 4 ++-- i18n/sv/basics/threat-modeling.md | 2 +- i18n/sv/photo-management.md | 4 ++-- i18n/tr/basics/threat-modeling.md | 2 +- i18n/tr/photo-management.md | 4 ++-- i18n/uk/basics/threat-modeling.md | 2 +- i18n/uk/photo-management.md | 4 ++-- i18n/vi/basics/threat-modeling.md | 2 +- i18n/vi/photo-management.md | 4 ++-- i18n/zh-Hant/basics/threat-modeling.md | 2 +- i18n/zh-Hant/photo-management.md | 4 ++-- i18n/zh/basics/threat-modeling.md | 2 +- i18n/zh/photo-management.md | 4 ++-- 58 files changed, 87 insertions(+), 87 deletions(-) diff --git a/i18n/ar/basics/threat-modeling.md b/i18n/ar/basics/threat-modeling.md index 5f16a964..0e42bb5f 100644 --- a/i18n/ar/basics/threat-modeling.md +++ b/i18n/ar/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/ar/photo-management.md b/i18n/ar/photo-management.md index 96a95d95..f14bbac2 100644 --- a/i18n/ar/photo-management.md +++ b/i18n/ar/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/bn-IN/basics/threat-modeling.md b/i18n/bn-IN/basics/threat-modeling.md index 1dcd5ff6..e3c7e0e0 100644 --- a/i18n/bn-IN/basics/threat-modeling.md +++ b/i18n/bn-IN/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### এটি আমার কতটা রক্ষা করা প্রয়োজন? diff --git a/i18n/bn-IN/photo-management.md b/i18n/bn-IN/photo-management.md index 96a95d95..f14bbac2 100644 --- a/i18n/bn-IN/photo-management.md +++ b/i18n/bn-IN/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/bn/basics/threat-modeling.md b/i18n/bn/basics/threat-modeling.md index 2cf64c5e..922c7450 100644 --- a/i18n/bn/basics/threat-modeling.md +++ b/i18n/bn/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/bn/photo-management.md b/i18n/bn/photo-management.md index 96a95d95..f14bbac2 100644 --- a/i18n/bn/photo-management.md +++ b/i18n/bn/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/cs/basics/threat-modeling.md b/i18n/cs/basics/threat-modeling.md index 2cf64c5e..922c7450 100644 --- a/i18n/cs/basics/threat-modeling.md +++ b/i18n/cs/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/cs/photo-management.md b/i18n/cs/photo-management.md index 96a95d95..f14bbac2 100644 --- a/i18n/cs/photo-management.md +++ b/i18n/cs/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/de/basics/threat-modeling.md b/i18n/de/basics/threat-modeling.md index 0ad27801..7897fd33 100644 --- a/i18n/de/basics/threat-modeling.md +++ b/i18n/de/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/de/photo-management.md b/i18n/de/photo-management.md index 96a95d95..f14bbac2 100644 --- a/i18n/de/photo-management.md +++ b/i18n/de/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/el/basics/threat-modeling.md b/i18n/el/basics/threat-modeling.md index 2cf64c5e..922c7450 100644 --- a/i18n/el/basics/threat-modeling.md +++ b/i18n/el/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/el/photo-management.md b/i18n/el/photo-management.md index 96a95d95..f14bbac2 100644 --- a/i18n/el/photo-management.md +++ b/i18n/el/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/eo/basics/threat-modeling.md b/i18n/eo/basics/threat-modeling.md index 2cf64c5e..922c7450 100644 --- a/i18n/eo/basics/threat-modeling.md +++ b/i18n/eo/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/eo/photo-management.md b/i18n/eo/photo-management.md index 96a95d95..f14bbac2 100644 --- a/i18n/eo/photo-management.md +++ b/i18n/eo/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/es/basics/threat-modeling.md b/i18n/es/basics/threat-modeling.md index 831fc90b..6ec582ff 100644 --- a/i18n/es/basics/threat-modeling.md +++ b/i18n/es/basics/threat-modeling.md @@ -37,7 +37,7 @@ Para responder a esta pregunta, es importante identificar quién podría querer *Haz una lista de tus adversarios o de aquellos que podrían querer apoderarse de tus activos. Su lista puede incluir individuos, una agencia gubernamental o empresas.* -Dependiendo de quiénes sean tus adversarios, en algunas circunstancias, esta lista podría ser algo que quisieras destruir después de que hayas terminado de planificar la seguridad. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### ¿Qué tan probable será que necesite protegerlo? diff --git a/i18n/es/photo-management.md b/i18n/es/photo-management.md index ed00d61d..11a59ebb 100644 --- a/i18n/es/photo-management.md +++ b/i18n/es/photo-management.md @@ -54,8 +54,8 @@ La mayoría de las soluciones de gestión de fotos en la nube, como Google Photo
Downloads "Descargas" -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/fa/basics/threat-modeling.md b/i18n/fa/basics/threat-modeling.md index 2cf64c5e..922c7450 100644 --- a/i18n/fa/basics/threat-modeling.md +++ b/i18n/fa/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/fa/photo-management.md b/i18n/fa/photo-management.md index 96a95d95..f14bbac2 100644 --- a/i18n/fa/photo-management.md +++ b/i18n/fa/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/fr/basics/threat-modeling.md b/i18n/fr/basics/threat-modeling.md index 0e22e544..a3551f84 100644 --- a/i18n/fr/basics/threat-modeling.md +++ b/i18n/fr/basics/threat-modeling.md @@ -37,7 +37,7 @@ Pour répondre à cette question, il est important d'identifier qui pourrait vou *Dressez une liste de vos adversaires, ou de ceux qui pourraient vouloir s'emparer de vos actifs. Votre liste peut comprendre des particuliers, une agence gouvernementale ou des sociétés.* -Selon l'identité de vos adversaires, dans certaines circonstances, cette liste peut être quelque chose que vous souhaitez détruire après avoir terminé ce plan de sécurité. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### Quelle est la probabilité que je doive le protéger ? diff --git a/i18n/fr/photo-management.md b/i18n/fr/photo-management.md index 218b7ea6..9ce50b7a 100644 --- a/i18n/fr/photo-management.md +++ b/i18n/fr/photo-management.md @@ -54,8 +54,8 @@ La plupart des solutions cloud de gestion de photos, telles que Google Photos, F
Téléchargements -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/he/basics/threat-modeling.md b/i18n/he/basics/threat-modeling.md index 60ec1e1f..f5206f86 100644 --- a/i18n/he/basics/threat-modeling.md +++ b/i18n/he/basics/threat-modeling.md @@ -37,7 +37,7 @@ description: איזון בין אבטחה, פרטיות ושימושיות הי *ערוך רשימה של היריבים שלך או של אלה שאולי ירצו להשיג את הנכסים שלך. הרשימה עשויה לכלול אנשים פרטיים, סוכנות ממשלתית או תאגידים.* -תלוי מי הם היריבים שלך, בנסיבות מסוימות, רשימה זו עשויה להיות משהו שאתה רוצה להרוס אחרי שתסיים את התכנון ביטחוני. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### עד כמה סביר שאצטרך להגן עליו? diff --git a/i18n/he/photo-management.md b/i18n/he/photo-management.md index 9ff3303d..56f56b68 100644 --- a/i18n/he/photo-management.md +++ b/i18n/he/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/hi/basics/threat-modeling.md b/i18n/hi/basics/threat-modeling.md index 2cf64c5e..922c7450 100644 --- a/i18n/hi/basics/threat-modeling.md +++ b/i18n/hi/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/hi/photo-management.md b/i18n/hi/photo-management.md index 96a95d95..f14bbac2 100644 --- a/i18n/hi/photo-management.md +++ b/i18n/hi/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/hu/basics/threat-modeling.md b/i18n/hu/basics/threat-modeling.md index 2cf64c5e..922c7450 100644 --- a/i18n/hu/basics/threat-modeling.md +++ b/i18n/hu/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/hu/photo-management.md b/i18n/hu/photo-management.md index 75d63583..5b52fccf 100644 --- a/i18n/hu/photo-management.md +++ b/i18n/hu/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/id/basics/threat-modeling.md b/i18n/id/basics/threat-modeling.md index 6b3ddaba..28e8521e 100644 --- a/i18n/id/basics/threat-modeling.md +++ b/i18n/id/basics/threat-modeling.md @@ -37,7 +37,7 @@ Untuk menjawab pertanyaan ini, penting untuk mengidentifikasi siapa yang mungkin *Buatlah daftar musuh Anda atau mereka yang mungkin ingin mendapatkan aset Anda. Daftar Anda dapat mencakup individu, lembaga pemerintah, atau perusahaan.* -Tergantung pada siapa musuh Anda, dalam beberapa keadaan, daftar ini mungkin sesuatu yang ingin Anda hancurkan setelah Anda selesai merencanakan keamanan. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### Seberapa besar kemungkinan saya perlu melindunginya? diff --git a/i18n/id/photo-management.md b/i18n/id/photo-management.md index 108a03d3..c23ee4db 100644 --- a/i18n/id/photo-management.md +++ b/i18n/id/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/it/basics/threat-modeling.md b/i18n/it/basics/threat-modeling.md index 3546055d..7f521ac5 100644 --- a/i18n/it/basics/threat-modeling.md +++ b/i18n/it/basics/threat-modeling.md @@ -37,7 +37,7 @@ Per rispondere a questa domanda, è importante identificare chi potrebbe voler p *Crea un elenco dei tuoi avversari o di coloro che potrebbero voler entrare in possesso delle tue risorse. Il tuo elenco può includere individui, agenzie governative o aziende.* -A seconda di chi siano i tuoi avversari, sotto certe circostanze, questo elenco potrebbe essere qualcosa da distruggere, in seguito al completamento della pianificazione sulla sicurezza. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### Quanto è probabile che io debba proteggerle? diff --git a/i18n/it/photo-management.md b/i18n/it/photo-management.md index 24e96b52..ff496d53 100644 --- a/i18n/it/photo-management.md +++ b/i18n/it/photo-management.md @@ -54,8 +54,8 @@ La maggior parte delle soluzioni di gestione delle foto cloud, come Google Photo
Download -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/ja/basics/threat-modeling.md b/i18n/ja/basics/threat-modeling.md index 400ab9d9..21cb0c3b 100644 --- a/i18n/ja/basics/threat-modeling.md +++ b/i18n/ja/basics/threat-modeling.md @@ -37,7 +37,7 @@ description: セキュリティ、プライバシー、使いやすさのバラ *あなたの敵対者やあなたの資産を手に入れたいと考える人の一覧を作成します。 一覧には個人、政府機関、企業が含まれる可能性があります。* -敵対者の種類によっては、この一覧は、セキュリティ計画作成後に破棄した方がよいかもしれません。 +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### 守る必要がどの程度あるか? diff --git a/i18n/ja/photo-management.md b/i18n/ja/photo-management.md index 8b1865e4..dc60fb36 100644 --- a/i18n/ja/photo-management.md +++ b/i18n/ja/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/ko/basics/threat-modeling.md b/i18n/ko/basics/threat-modeling.md index 546778e5..1dd10e24 100644 --- a/i18n/ko/basics/threat-modeling.md +++ b/i18n/ko/basics/threat-modeling.md @@ -37,7 +37,7 @@ description: 보안, 프라이버시, 사용성 간의 균형 조절은 프라 *공격자 또는 여러분의 자산을 손에 넣으려는 사람들의 목록을 정리하세요. 목록에는 개인, 정부 기관, 법인 등이 포함될 수 있습니다.* -공격자가 누구인지, 그리고 상황에 따라 이 목록은 보안 계획을 세우고 나면 삭제해야 하는 항목일 수도 있습니다. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### 실제 위협이 발생할 가능성이 얼마나 되나요? diff --git a/i18n/ko/photo-management.md b/i18n/ko/photo-management.md index cd156c01..5e9824e5 100644 --- a/i18n/ko/photo-management.md +++ b/i18n/ko/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/ku-IQ/basics/threat-modeling.md b/i18n/ku-IQ/basics/threat-modeling.md index 2cf64c5e..922c7450 100644 --- a/i18n/ku-IQ/basics/threat-modeling.md +++ b/i18n/ku-IQ/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/ku-IQ/photo-management.md b/i18n/ku-IQ/photo-management.md index 96a95d95..f14bbac2 100644 --- a/i18n/ku-IQ/photo-management.md +++ b/i18n/ku-IQ/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/nl/basics/threat-modeling.md b/i18n/nl/basics/threat-modeling.md index 8eb5f5d7..ccfd2423 100644 --- a/i18n/nl/basics/threat-modeling.md +++ b/i18n/nl/basics/threat-modeling.md @@ -37,7 +37,7 @@ Om deze vraag te beantwoorden, is het belangrijk na te gaan wie je of jouw infor *Maak een lijst van jouw tegenstanders, of van degenen die jouw bezittingen in handen zouden willen krijgen. Jouw lijst kan personen, een overheidsinstantie of bedrijven omvatten.* -Afhankelijk van wie ujouw tegenstanders zijn, kan deze lijst onder bepaalde omstandigheden iets zijn dat je wilt vernietigen nadat je klaar bent met de beveiligingsplanning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### Hoe groot is de kans dat ik het zal moeten beschermen? diff --git a/i18n/nl/photo-management.md b/i18n/nl/photo-management.md index 34c2c627..489012e4 100644 --- a/i18n/nl/photo-management.md +++ b/i18n/nl/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/pl/basics/threat-modeling.md b/i18n/pl/basics/threat-modeling.md index f8c1ae49..671fd4bb 100644 --- a/i18n/pl/basics/threat-modeling.md +++ b/i18n/pl/basics/threat-modeling.md @@ -37,7 +37,7 @@ Przed odpowiedzeniem na te pytania warto ustalić, kto może chcieć próbować *Make a list of your adversaries or those who might want to get ahold of your assets. Twoja lista może zawierać osoby fizyczne, agencje rządowe lub korporacje.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### Na ile prawdopodobne jest to, że zajdzie potrzeba to chronić? diff --git a/i18n/pl/photo-management.md b/i18n/pl/photo-management.md index ac5fd862..2e81806a 100644 --- a/i18n/pl/photo-management.md +++ b/i18n/pl/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/pt-BR/basics/threat-modeling.md b/i18n/pt-BR/basics/threat-modeling.md index 9e058c18..22663631 100644 --- a/i18n/pt-BR/basics/threat-modeling.md +++ b/i18n/pt-BR/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/pt-BR/photo-management.md b/i18n/pt-BR/photo-management.md index 978d2f1b..ed418d4d 100644 --- a/i18n/pt-BR/photo-management.md +++ b/i18n/pt-BR/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/pt/basics/threat-modeling.md b/i18n/pt/basics/threat-modeling.md index 701291e2..03cb90f4 100644 --- a/i18n/pt/basics/threat-modeling.md +++ b/i18n/pt/basics/threat-modeling.md @@ -37,7 +37,7 @@ Para responder a esta pergunta, é importante identificar quem pode querer ter c *Faça uma lista dos seus adversários ou daqueles que podem querer apropriar-se dos seus ativos. A sua lista pode incluir indivíduos, agências governamentais ou corporações.* -Dependendo de quem são os seus adversários, em algumas circunstâncias, essa lista pode ser algo que vai querer destruir depois de concluir o planeamento de segurança. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### Qual é a probabilidade de eu precisar de o proteger? diff --git a/i18n/pt/photo-management.md b/i18n/pt/photo-management.md index 2f0580df..4f60a56b 100644 --- a/i18n/pt/photo-management.md +++ b/i18n/pt/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/ru/basics/threat-modeling.md b/i18n/ru/basics/threat-modeling.md index a526404d..47cdeb2c 100644 --- a/i18n/ru/basics/threat-modeling.md +++ b/i18n/ru/basics/threat-modeling.md @@ -37,7 +37,7 @@ description: Баланс между безопасностью, конфиде *Составьте список ваших противников или тех, кто может захотеть завладеть вашим имуществом. В ваш список могут входить отдельные люди, государственные учреждения или корпорации.* -В зависимости от того, кто является вашими противниками, при некоторых обстоятельствах этот список может быть тем, что вы захотите уничтожить после завершения планирования безопасности. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### Насколько вероятно, что мне понадобится это защищать? diff --git a/i18n/ru/photo-management.md b/i18n/ru/photo-management.md index d728f273..a104f9dd 100644 --- a/i18n/ru/photo-management.md +++ b/i18n/ru/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/sv/basics/threat-modeling.md b/i18n/sv/basics/threat-modeling.md index 2cf64c5e..922c7450 100644 --- a/i18n/sv/basics/threat-modeling.md +++ b/i18n/sv/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/sv/photo-management.md b/i18n/sv/photo-management.md index 07a1136e..2bdd4e24 100644 --- a/i18n/sv/photo-management.md +++ b/i18n/sv/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/tr/basics/threat-modeling.md b/i18n/tr/basics/threat-modeling.md index 30bb7807..53d77ba1 100644 --- a/i18n/tr/basics/threat-modeling.md +++ b/i18n/tr/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Listeniz bireyleri, bir devlet kurumunu veya şirketleri içerebilir.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/tr/photo-management.md b/i18n/tr/photo-management.md index 96a95d95..f14bbac2 100644 --- a/i18n/tr/photo-management.md +++ b/i18n/tr/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/uk/basics/threat-modeling.md b/i18n/uk/basics/threat-modeling.md index d2ea197f..0e027487 100644 --- a/i18n/uk/basics/threat-modeling.md +++ b/i18n/uk/basics/threat-modeling.md @@ -37,7 +37,7 @@ description: Баланс між безпекою, конфіденційніс *Складіть список ваших супротивників або тих, хто може захотіти заволодіти вашими активами. Ваш список може включати фізичних осіб, державні установи або корпорації.* -Залежно від того, хто є вашими супротивниками, за певних обставин цей список може бути чимось, що ви захочете знищити після того, як завершите планування безпеки. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### Наскільки ймовірно, що мені доведеться це захищати? diff --git a/i18n/uk/photo-management.md b/i18n/uk/photo-management.md index 96a95d95..f14bbac2 100644 --- a/i18n/uk/photo-management.md +++ b/i18n/uk/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/vi/basics/threat-modeling.md b/i18n/vi/basics/threat-modeling.md index 2cf64c5e..922c7450 100644 --- a/i18n/vi/basics/threat-modeling.md +++ b/i18n/vi/basics/threat-modeling.md @@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* -Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### How likely is it that I will need to protect it? diff --git a/i18n/vi/photo-management.md b/i18n/vi/photo-management.md index 9ad14ec3..e51843fe 100644 --- a/i18n/vi/photo-management.md +++ b/i18n/vi/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/zh-Hant/basics/threat-modeling.md b/i18n/zh-Hant/basics/threat-modeling.md index 11abb9cc..fd869ba3 100644 --- a/i18n/zh-Hant/basics/threat-modeling.md +++ b/i18n/zh-Hant/basics/threat-modeling.md @@ -37,7 +37,7 @@ description: 安全性、隱私權和可用性之間取得平衡是隱私權之 *列出對手或那些可能想要獲取您的資產的敵人。 您的名單可能包括個人、政府機構或公司。* -根據對手是誰,在某些情況下,這份清單可能是在完成安全計劃後必須鎖毀的東西。 +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### 它需要被保護的可能性有多大? diff --git a/i18n/zh-Hant/photo-management.md b/i18n/zh-Hant/photo-management.md index 7efde957..f3ef72c9 100644 --- a/i18n/zh-Hant/photo-management.md +++ b/i18n/zh-Hant/photo-management.md @@ -54,8 +54,8 @@ cover: photo-management.webp
Downloads "下載" -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle) diff --git a/i18n/zh/basics/threat-modeling.md b/i18n/zh/basics/threat-modeling.md index a150a856..e378a4c6 100644 --- a/i18n/zh/basics/threat-modeling.md +++ b/i18n/zh/basics/threat-modeling.md @@ -37,7 +37,7 @@ description: 在安全、隐私和可用性之间取得平衡是你在隐私之 *列出一份名单,包含你的对手或那些可能想要掌握你的资产的人。 你的名单可能包括个人、政府机构或公司。* -根据你的对手是谁,在某些情况下,这份名单你可能需要在完成安全规划后把它销毁。 +Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model. ### 它有多大的可能性需要保护? diff --git a/i18n/zh/photo-management.md b/i18n/zh/photo-management.md index 8b281fd2..080fe355 100644 --- a/i18n/zh/photo-management.md +++ b/i18n/zh/photo-management.md @@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos) -- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) - [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)