diff --git a/i18n/ja/android.md b/i18n/ja/android.md index 13fbc16c..d62f2508 100644 --- a/i18n/ja/android.md +++ b/i18n/ja/android.md @@ -142,7 +142,7 @@ DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOSは、デフォルトのアプリストアとしてF-Droidを使用しています。 We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. !!! 警告 diff --git a/i18n/ja/basics/common-threats.md b/i18n/ja/basics/common-threats.md index fd581cb3..adb9fc0c 100644 --- a/i18n/ja/basics/common-threats.md +++ b/i18n/ja/basics/common-threats.md @@ -117,7 +117,7 @@ Additionally, even companies outside of the *AdTech* or tracking industry can sh The best way to keep your data private is simply not making it public in the first place. Deleting unwanted information you find about yourself online is one of the best first steps you can take to regain your privacy. -- [View our guide on account deletion :material-arrow-right-drop-circle:](account-deletion.md) +- [アカウント削除に関するガイド :material-arrow-right-drop-circle: を表示](account-deletion.md) On sites where you do share information, checking the privacy settings of your account to limit how widely that data is spread is very important. For example, enable "private mode" on your accounts if given the option: This ensures that your account isn't being indexed by search engines, and that it can't be viewed without your permission. diff --git a/i18n/ja/dns.md b/i18n/ja/dns.md index fb140341..38b434e2 100644 --- a/i18n/ja/dns.md +++ b/i18n/ja/dns.md @@ -16,7 +16,7 @@ Encrypted DNS with third-party servers should only be used to get around basic [ | [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DNSCrypt | Some[^1] | いいえ | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | | [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Some[^2] | いいえ | Based on personal configuration. | | [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | いいえ | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | いいえ | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | いいえ[^4] | いいえ | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | | [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | 任意 | Based on personal configuration. | | [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | 任意 | Based on personal configuration, Malware blocking by default. | diff --git a/i18n/ja/email.md b/i18n/ja/email.md index 37bc19dc..54d56e46 100644 --- a/i18n/ja/email.md +++ b/i18n/ja/email.md @@ -256,7 +256,7 @@ Tuta has [zero access encryption at rest](https://tuta.com/faq#what-encrypted) f #### :material-information-outline:{ .pg-blue } メールの暗号化 -Tuta [does not use OpenPGP](https://tuta.com/support/#pgp). Tuta accounts can only receive encrypted emails from non-Tuta email accounts when sent via a [temporary Tuta mailbox](https://tuta.com/support/#encrypted-email-external). +Tutaは[OpenPGPを使用していません](https://tuta.com/support/#pgp)。 Tuta accounts can only receive encrypted emails from non-Tuta email accounts when sent via a [temporary Tuta mailbox](https://tuta.com/support/#encrypted-email-external). #### :material-information-outline:{ .pg-blue } アカウントの停止 diff --git a/i18n/ja/os/linux-overview.md b/i18n/ja/os/linux-overview.md index 285dda21..e06a553e 100644 --- a/i18n/ja/os/linux-overview.md +++ b/i18n/ja/os/linux-overview.md @@ -24,7 +24,7 @@ It is a [common misconception](../basics/common-misconceptions.md#open-source-so In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. -### Missing Security Features +### 欠けているセキュリティーの機能 At the moment, desktop Linux [falls behind alternatives](https://discussion.fedoraproject.org/t/fedora-strategy-2028-proposal-fedora-linux-is-as-secure-as-macos/46899/9) like macOS or Android when it comes to certain security features. We hope to see improvements in these areas in the future. @@ -127,7 +127,7 @@ Additionally, some distributions will not download firmware updates automaticall ## Privacy Tweaks -### MAC Address Randomization +### MACアドレスのランダム化 Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. diff --git a/i18n/ja/os/macos-overview.md b/i18n/ja/os/macos-overview.md index f22b169d..ba0ebfa1 100644 --- a/i18n/ja/os/macos-overview.md +++ b/i18n/ja/os/macos-overview.md @@ -132,7 +132,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio - [x] Click **Turn On** -### MAC Address Randomization +### MACアドレスのランダム化 macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps. diff --git a/i18n/ja/real-time-communication.md b/i18n/ja/real-time-communication.md index e3084004..2c823abf 100644 --- a/i18n/ja/real-time-communication.md +++ b/i18n/ja/real-time-communication.md @@ -6,13 +6,13 @@ description: Other instant messengers make all of your private conversations ava cover: real-time-communication.webp --- -These are our recommendations for encrypted real-time communication. +以下は、暗号化されたリアルタイム通信に関する推奨事項です。 [Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md) ## 暗号化されたメッセンジャー -These messengers are great for securing your sensitive communications. +以下のメッセンジャーは、機密性の高い通信を保護するのに適しています。 ### Signal