mirror of
https://github.com/privacyguides/i18n.git
synced 2025-06-27 21:12:35 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### এটি আমার কতটা রক্ষা করা প্রয়োজন?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ Para responder a esta pregunta, es importante identificar quién podría querer
|
||||
|
||||
*Haz una lista de tus adversarios o de aquellos que podrían querer apoderarse de tus activos. Su lista puede incluir individuos, una agencia gubernamental o empresas.*
|
||||
|
||||
Dependiendo de quiénes sean tus adversarios, en algunas circunstancias, esta lista podría ser algo que quisieras destruir después de que hayas terminado de planificar la seguridad.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### ¿Qué tan probable será que necesite protegerlo?
|
||||
|
||||
|
@ -54,8 +54,8 @@ La mayoría de las soluciones de gestión de fotos en la nube, como Google Photo
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads "Descargas"</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ Pour répondre à cette question, il est important d'identifier qui pourrait vou
|
||||
|
||||
*Dressez une liste de vos adversaires, ou de ceux qui pourraient vouloir s'emparer de vos actifs. Votre liste peut comprendre des particuliers, une agence gouvernementale ou des sociétés.*
|
||||
|
||||
Selon l'identité de vos adversaires, dans certaines circonstances, cette liste peut être quelque chose que vous souhaitez détruire après avoir terminé ce plan de sécurité.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### Quelle est la probabilité que je doive le protéger ?
|
||||
|
||||
|
@ -54,8 +54,8 @@ La plupart des solutions cloud de gestion de photos, telles que Google Photos, F
|
||||
<details class="downloads" markdown>
|
||||
<summary>Téléchargements</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ description: איזון בין אבטחה, פרטיות ושימושיות הי
|
||||
|
||||
*ערוך רשימה של היריבים שלך או של אלה שאולי ירצו להשיג את הנכסים שלך. הרשימה עשויה לכלול אנשים פרטיים, סוכנות ממשלתית או תאגידים.*
|
||||
|
||||
תלוי מי הם היריבים שלך, בנסיבות מסוימות, רשימה זו עשויה להיות משהו שאתה רוצה להרוס אחרי שתסיים את התכנון ביטחוני.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### עד כמה סביר שאצטרך להגן עליו?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ Untuk menjawab pertanyaan ini, penting untuk mengidentifikasi siapa yang mungkin
|
||||
|
||||
*Buatlah daftar musuh Anda atau mereka yang mungkin ingin mendapatkan aset Anda. Daftar Anda dapat mencakup individu, lembaga pemerintah, atau perusahaan.*
|
||||
|
||||
Tergantung pada siapa musuh Anda, dalam beberapa keadaan, daftar ini mungkin sesuatu yang ingin Anda hancurkan setelah Anda selesai merencanakan keamanan.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### Seberapa besar kemungkinan saya perlu melindunginya?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ Per rispondere a questa domanda, è importante identificare chi potrebbe voler p
|
||||
|
||||
*Crea un elenco dei tuoi avversari o di coloro che potrebbero voler entrare in possesso delle tue risorse. Il tuo elenco può includere individui, agenzie governative o aziende.*
|
||||
|
||||
A seconda di chi siano i tuoi avversari, sotto certe circostanze, questo elenco potrebbe essere qualcosa da distruggere, in seguito al completamento della pianificazione sulla sicurezza.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### Quanto è probabile che io debba proteggerle?
|
||||
|
||||
|
@ -54,8 +54,8 @@ La maggior parte delle soluzioni di gestione delle foto cloud, come Google Photo
|
||||
<details class="downloads" markdown>
|
||||
<summary>Download</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ description: セキュリティ、プライバシー、使いやすさのバラ
|
||||
|
||||
*あなたの敵対者やあなたの資産を手に入れたいと考える人の一覧を作成します。 一覧には個人、政府機関、企業が含まれる可能性があります。*
|
||||
|
||||
敵対者の種類によっては、この一覧は、セキュリティ計画作成後に破棄した方がよいかもしれません。
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### 守る必要がどの程度あるか?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ description: 보안, 프라이버시, 사용성 간의 균형 조절은 프라
|
||||
|
||||
*공격자 또는 여러분의 자산을 손에 넣으려는 사람들의 목록을 정리하세요. 목록에는 개인, 정부 기관, 법인 등이 포함될 수 있습니다.*
|
||||
|
||||
공격자가 누구인지, 그리고 상황에 따라 이 목록은 보안 계획을 세우고 나면 삭제해야 하는 항목일 수도 있습니다.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### 실제 위협이 발생할 가능성이 얼마나 되나요?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ Om deze vraag te beantwoorden, is het belangrijk na te gaan wie je of jouw infor
|
||||
|
||||
*Maak een lijst van jouw tegenstanders, of van degenen die jouw bezittingen in handen zouden willen krijgen. Jouw lijst kan personen, een overheidsinstantie of bedrijven omvatten.*
|
||||
|
||||
Afhankelijk van wie ujouw tegenstanders zijn, kan deze lijst onder bepaalde omstandigheden iets zijn dat je wilt vernietigen nadat je klaar bent met de beveiligingsplanning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### Hoe groot is de kans dat ik het zal moeten beschermen?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ Przed odpowiedzeniem na te pytania warto ustalić, kto może chcieć próbować
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Twoja lista może zawierać osoby fizyczne, agencje rządowe lub korporacje.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### Na ile prawdopodobne jest to, że zajdzie potrzeba to chronić?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ Para responder a esta pergunta, é importante identificar quem pode querer ter c
|
||||
|
||||
*Faça uma lista dos seus adversários ou daqueles que podem querer apropriar-se dos seus ativos. A sua lista pode incluir indivíduos, agências governamentais ou corporações.*
|
||||
|
||||
Dependendo de quem são os seus adversários, em algumas circunstâncias, essa lista pode ser algo que vai querer destruir depois de concluir o planeamento de segurança.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### Qual é a probabilidade de eu precisar de o proteger?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ description: Баланс между безопасностью, конфиде
|
||||
|
||||
*Составьте список ваших противников или тех, кто может захотеть завладеть вашим имуществом. В ваш список могут входить отдельные люди, государственные учреждения или корпорации.*
|
||||
|
||||
В зависимости от того, кто является вашими противниками, при некоторых обстоятельствах этот список может быть тем, что вы захотите уничтожить после завершения планирования безопасности.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### Насколько вероятно, что мне понадобится это защищать?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Listeniz bireyleri, bir devlet kurumunu veya şirketleri içerebilir.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ description: Баланс між безпекою, конфіденційніс
|
||||
|
||||
*Складіть список ваших супротивників або тих, хто може захотіти заволодіти вашими активами. Ваш список може включати фізичних осіб, державні установи або корпорації.*
|
||||
|
||||
Залежно від того, хто є вашими супротивниками, за певних обставин цей список може бути чимось, що ви захочете знищити після того, як завершите планування безпеки.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### Наскільки ймовірно, що мені доведеться це захищати?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ description: 安全性、隱私權和可用性之間取得平衡是隱私權之
|
||||
|
||||
*列出對手或那些可能想要獲取您的資產的敵人。 您的名單可能包括個人、政府機構或公司。*
|
||||
|
||||
根據對手是誰,在某些情況下,這份清單可能是在完成安全計劃後必須鎖毀的東西。
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### 它需要被保護的可能性有多大?
|
||||
|
||||
|
@ -54,8 +54,8 @@ cover: photo-management.webp
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads "下載"</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
@ -37,7 +37,7 @@ description: 在安全、隐私和可用性之间取得平衡是你在隐私之
|
||||
|
||||
*列出一份名单,包含你的对手或那些可能想要掌握你的资产的人。 你的名单可能包括个人、政府机构或公司。*
|
||||
|
||||
根据你的对手是谁,在某些情况下,这份名单你可能需要在完成安全规划后把它销毁。
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### 它有多大的可能性需要保护?
|
||||
|
||||
|
@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
|
||||
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
|
||||
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
|
||||
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
|
||||
- [:simple-github: GitHub](https://github.com/stingle)
|
||||
|
||||
|
Reference in New Issue
Block a user