1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-24 19:54:23 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2024-02-01 06:31:41 +00:00
parent f30c8be4c5
commit 02de71f0c0
58 changed files with 87 additions and 87 deletions

View File

@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
### How likely is it that I will need to protect it?

View File

@ -54,8 +54,8 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho
<details class="downloads" markdown>
<summary>Downloads</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.photos)
- [:simple-android: Android](https://play.google.com/store/apps/details?id=org.stingle.photos)
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos)
- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/)
- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448)
- [:simple-github: GitHub](https://github.com/stingle)