1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-09-06 05:18:49 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2025-04-12 02:50:37 +00:00
parent 537a749186
commit 07eda0ee57
174 changed files with 799 additions and 420 deletions

View File

@@ -91,7 +91,9 @@ Son zamanlarda, merkezi VPN'lerin sahip olduğu bazı sorunları ele almak için
Çok Taraflı Aktarıcılar (MPR'ler) farklı taraflara ait birden fazla düğüm kullanır, böylece hiçbir taraf hem kim olduğunuzu hem de neye bağlandığınızı bilmez. Tor'un arkasındaki temel fikir budur, ancak şimdi bu modeli taklit etmeye çalışan bazı ücretli hizmetler var.
MPR'ler VPN'lerin doğasında olan bir sorunu çözmeye çalışır: onlara tamamen güvenmeniz gerektiği gerçeği. Bu hedefe, sorumlulukları iki veya daha fazla farklı şirket arasında bölümlere ayırarak ulaşırlar. Örneğin, Apple'ın iCloud+ Özel Aktarımı trafiğinizi iki sunucu üzerinden yönlendirir:
MPR'ler VPN'lerin doğasında olan bir sorunu çözmeye çalışır: onlara tamamen güvenmeniz gerektiği gerçeği. Bu hedefe, sorumlulukları iki veya daha fazla farklı şirket arasında bölümlere ayırarak ulaşırlar.
One example of a commercially available MPR is Apple's iCloud+ Private Relay, which routes your traffic through two servers:
1. İlk olarak, Apple tarafından işletilen bir sunucu.
@@ -101,15 +103,15 @@ MPR'ler VPN'lerin doğasında olan bir sorunu çözmeye çalışır: onlara tama
Bu sunucu aslında hedef web sitenize bağlantıyı yapar, ancak cihazınız hakkında hiçbir bilgisi yoktur. Bildiği tek IP adresi Apple'ın sunucusudur.
Google veya INVISV gibi farklı şirketler tarafından işletilen diğer MPR'ler de benzer şekilde çalışmaktadır. Segmentasyon yoluyla sağlanan bu koruma, yalnızca iki şirketin sizi anonimleştirmek için birbirleriyle işbirliği yapmayacaklarına güveniyorsanız mevcuttur.
Other MPRs run by different companies operate in a very similar manner. This protection by segmentation only exists if you trust the two companies to not collude with each other to deanonymize you.
### Merkezi Olmayan VPN'ler
Merkezi VPN hizmetleriyle ilgili sorunları çözmeye yönelik bir başka girişim de dVPN'lerdir. Bunlar blok zinciri teknolojisine dayanır ve düğümleri birçok farklı kişiye dağıtarak tek bir tarafa olan güveni ortadan kaldırdığını iddia eder. Ancak, çoğu zaman bir dVPN varsayılan olarak tek bir düğüm kullanır, bu da tıpkı geleneksel VPN'lerde olduğu gibi bu düğüme tamamen güvenmeniz gerektiği anlamına gelir. Geleneksel bir VPN'den farklı olarak, tüm trafiğinizi görebilen bu tek düğüm, denetlenebilen ve gizlilik politikalarını sürdürmek için yasal sorumlulukları olan VPN sağlayıcınız yerine rastgele bir kişidir. Bunu çözmek için çoklu atlama gereklidir, ancak bu bir kararlılık ve performans maliyeti ile birlikte gelir.
Another attempt at solving the issues with centralized VPN services are dVPNs. These are based on blockchain technology and claim to eliminate trust in a single party by distributing the nodes across lots of different people. However, many times a dVPN will default to a single node, meaning you need to trust that node completely, just like a traditional VPN. Unlike a traditional VPN, this one node that can see all your traffic is a random person instead of your VPN provider that can be audited and has legal responsibilities to uphold their privacy policy. Multi-hop is needed to solve this, but that comes with a stability and performance cost.
Bir diğer husus ise yasal sorumluluktur. Çıkış düğümünün, Tor ağının tüm varlığı boyunca mücadele ettiği bir konu olan, ağın kötüye kullanımından kaynaklanan yasal sorunlarla başa çıkması gerekecektir. Bu, sıradan insanları düğüm çalıştırmaktan caydırır ve çok fazla kaynağa sahip kötü niyetli bir aktör için düğüm barındırmayı daha cazip hale getirir. Hizmet tek düğümlü ise bu büyük bir sorundur, çünkü potansiyel olarak kötü niyetli çıkış düğümü kim olduğunuzu ve neye bağlandığınızı görebilir.
Another consideration is legal liability. The exit node will need to deal with legal problems from misuse of the network, an issue that the Tor network has contended with for its entire existence. This discourages regular people from running nodes and makes it more attractive for a malicious actor with lots of resources to host one. This is a big problem if the service is single-node, as the potentially malicious exit node can see who you are and what you're connecting to.
Birçok dVPN, en iyi hizmeti vermekten ziyade bir kripto para birimini zorlamak için kullanılır. Ayrıca daha az düğüme sahip daha küçük ağlar olma eğilimindedirler, bu da onları [Sybil saldırılarına](https://en.wikipedia.org/wiki/Sybil_attack) karşı daha savunmasız hale getirir.
Many dVPNs are used to push a cryptocurrency rather than to make the best service. They also tend to be smaller networks with fewer nodes, making them more vulnerable to [Sybil attacks](https://en.wikipedia.org/wiki/Sybil_attack).
## İlgili VPN Bilgileri

View File

@@ -318,15 +318,6 @@ Brave allows you to select additional content filters within the internal `brave
1. Disabling the V8 optimizer reduces your attack surface by disabling [*some*](https://grapheneos.social/@GrapheneOS/112708049232710156) parts of JavaScript Just-In-Time (JIT) compilation.
<div class="admonition tip" markdown>
<p class="admonition-title">Sanitizing on close</p>
- [x] Select **Delete data sites have saved to your device when you close all windows** under *Sites and Shields Settings**Content**Additional content settings**On-device site data*.
If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis under the *Customized behaviors* section.
</div>
##### Tor windows
[**Private Window with Tor**](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) allows you to route your traffic through the Tor network in Private Windows and access .onion services, which may be useful in some cases. However, Brave is **not** as resistant to fingerprinting as the Tor Browser is, and far fewer people use Brave with Tor, so you will stand out. If your threat model requires strong anonymity, use the [Tor Browser](tor.md#tor-browser).

View File

@@ -214,6 +214,25 @@ Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, et
For further information about how Qubes works, read our full [Qubes OS overview](os/qubes-overview.md) page.
### Secureblue
<div class="admonition recommendation" markdown>
![Secureblue logo](assets/img/linux-desktop/secureblue.svg){ align=right }
**Secureblue** is a security-focused operating system based on [Fedora Atomic Desktops](#fedora-atomic-desktops). It includes a number of [security features](https://secureblue.dev/features) intended to proactively defend against the exploitation of both known and unknown vulnerabilities, and ships with [Trivalent](https://github.com/secureblue/Trivalent), their hardened, Chromium-based web browser.
[:octicons-home-16: Homepage](https://secureblue.dev){ .md-button .md-button--primary }
[:octicons-info-16:](https://secureblue.dev/install){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/secureblue/secureblue){ .card-link title="Source Code" }
[:octicons-heart-16:](https://secureblue.dev/donate){ .card-link title="Contribute" }
</div>
**Trivalent** is Secureblue's hardened Chromium for desktop Linux inspired by [GrapheneOS](android/distributions.md#grapheneos)'s Vanadium browser.
Secureblue also provides GrapheneOS's [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc) and enables it globally (including for Flatpaks).
### Kicksecure
While we [recommend against](os/linux-overview.md#release-cycle) "perpetually outdated" distributions like Debian for desktop use in most cases, Kicksecure is a Debian-based operating system which has been hardened to be much more than a typical Linux install.

View File

@@ -317,7 +317,6 @@ We regard these features as important in order to provide a safe and optimal ser
- Encrypts email account data at rest with zero-access encryption.
- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .EML with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard.
- Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy.
- Operates on owned infrastructure, i.e. not built upon third-party email service providers.
**Best Case:**
@@ -328,6 +327,7 @@ We regard these features as important in order to provide a safe and optimal ser
- Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP.
- Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion).
- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support.
- Allows users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy.
- Catch-all or alias functionality for those who use their own domains.
- Use of standard email access protocols such as IMAP, SMTP, or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider.

View File

@@ -19,7 +19,7 @@ Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon
![Ente logo](assets/img/photo-management/ente.svg#only-light){ align=right }
![Ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right }
**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 5 GB of storage as long as you use the service at least once a year.
**Ente Photos** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is also [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). The free plan offers 10 GB of storage as long as you use the service at least once a year.
[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary }
[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" }

View File

@@ -667,14 +667,15 @@ For encrypting your OS drive, we typically recommend using the encryption tool y
<div class="grid cards" markdown>
- ![Qubes OS logosu](assets/img/qubes/qubes_os.svg){ .twemoji loading=lazy } [Qubes OS (Xen VM Dıtımı)](desktop.md#qubes-os)
- ![Fedora logosu](assets/img/linux-desktop/fedora.svg){ .twemoji loading=lazy } [Fedora Workstation](desktop.md#fedora-workstation)
- ![openSUSE Tumbleweed logosu](assets/img/linux-desktop/opensuse-tumbleweed.svg){ .twemoji loading=lazy } [openSUSE Tumbleweed](desktop.md#opensuse-tumbleweed)
- ![Arch logosu](assets/img/linux-desktop/archlinux.svg){ .twemoji loading=lazy } [Arch Linux](desktop.md#arch-linux)
- ![Fedora logosu](assets/img/linux-desktop/fedora.svg){ .twemoji loading=lazy } [Fedora Atomic Desktops](desktop.md#fedora-atomic-desktops)
- ![Qubes OS logo](assets/img/qubes/qubes_os.svg){ .twemoji loading=lazy } [Qubes OS (Xen VM Distribution)](desktop.md#qubes-os)
- ![Fedora logo](assets/img/linux-desktop/fedora.svg){ .twemoji loading=lazy } [Fedora Workstation](desktop.md#fedora-workstation)
- ![openSUSE Tumbleweed logo](assets/img/linux-desktop/opensuse-tumbleweed.svg){ .twemoji loading=lazy } [openSUSE Tumbleweed](desktop.md#opensuse-tumbleweed)
- ![Arch logo](assets/img/linux-desktop/archlinux.svg){ .twemoji loading=lazy } [Arch Linux](desktop.md#arch-linux)
- ![Fedora logo](assets/img/linux-desktop/fedora.svg){ .twemoji loading=lazy } [Fedora Atomic Desktops](desktop.md#fedora-atomic-desktops)
- ![NixOS logo](assets/img/linux-desktop/nixos.svg){ .twemoji loading=lazy } [NixOS](desktop.md#nixos)
- ![Whonix logo](assets/img/linux-desktop/whonix.svg){ .twemoji loading=lazy } [Whonix (Tor)](desktop.md#whonix)
- ![Tails logosu](assets/img/linux-desktop/tails.svg){ .twemoji loading=lazy } [Tails (Live Boot)](desktop.md#tails)
- ![Tails logo](assets/img/linux-desktop/tails.svg){ .twemoji loading=lazy } [Tails (Live Boot)](desktop.md#tails)
- ![Secureblue logo](assets/img/linux-desktop/secureblue.svg){ .twemoji loading=lazy } [Secureblue](desktop.md#secureblue)
- ![Kicksecure logo](assets/img/linux-desktop/kicksecure.svg){ .twemoji loading=lazy } [Kicksecure](desktop.md#kicksecure)
</div>