From 0b28d17afdc6731e927a33d42d8f3926f2b65be6 Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Tue, 29 Apr 2025 04:36:17 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/ja/basics/common-threats.md | 12 ++++++------ i18n/ja/email-clients.md | 2 +- i18n/ja/encryption.md | 10 +++++----- i18n/ja/multi-factor-authentication.md | 2 +- i18n/ja/passwords.md | 2 +- 5 files changed, 14 insertions(+), 14 deletions(-) diff --git a/i18n/ja/basics/common-threats.md b/i18n/ja/basics/common-threats.md index 23484229..87e11996 100644 --- a/i18n/ja/basics/common-threats.md +++ b/i18n/ja/basics/common-threats.md @@ -80,20 +80,20 @@ GoogleやFacebookのような巨大な広告ネットワークやその他多数 -## Attacks against Specific Individuals +## 特定の個人に対する攻撃 -:material-target-account: Targeted Attacks +:material-target-account:標的型攻撃 -Targeted attacks against a specific person are more problematic to deal with. Common attacks include sending malicious documents via email, exploiting vulnerabilities (e.g. in browsers and operating systems), and physical attacks. If this is a concern for you, you should employ more advanced threat mitigation strategies. +特定の個人に対する標的型攻撃は、より対処が難しくなります。 一般的な攻撃として、メールに悪意のある文書を添付して送ることや(ブラウザやOSなどの)脆弱性の悪用、物理的な攻撃があります。 もし、懸念がある場合はより高度に脅威を緩和する戦略を取る必要があります。
-

Tip

+

ヒント

-By design, **web browsers**, **email clients**, and **office applications** typically run untrusted code, sent to you from third parties. Running multiple virtual machines—to separate applications like these from your host system, as well as each other—is one technique you can use to mitigate the chance of an exploit in these applications compromising the rest of your system. For example, technologies like Qubes OS or Microsoft Defender Application Guard on Windows provide convenient methods to do this. +**ウェブブラウザ**、**メールクライアント**や**オフィスアプリケーション**は第三者から送られてきた信頼できないコードを実行します。 ホストのシステムからアプリケーションを分離するため、複数の仮想マシンを実行することはアプリケーションからシステムの他の部分への侵害の可能性を軽減するための方法の一つです。 例えば、Qubes OSやWindowsのMicrosoft Defender Application Guardのような技術により、実現できます。
-If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +**物理的攻撃**を懸念する場合、Android、iOS、macOSや[Windows(TPMあり)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process)のような安全な検証済みブート実装のあるOSを使うべきです。 またドライブの暗号化を行うとともに、OSがTPMやSecure[Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1)や[Element](https://developers.google.com/android/security/android-ready-se)で暗号化パスフレーズの入力レートを制限していることも確認してください。 ほとんどのデスクトップOSはユーザーごとに分けて暗号化することはできないため、信頼できない人とコンピューターを共用することは避けてください。 ## Attacks against Certain Organizations diff --git a/i18n/ja/email-clients.md b/i18n/ja/email-clients.md index 6100cdec..365958e5 100644 --- a/i18n/ja/email-clients.md +++ b/i18n/ja/email-clients.md @@ -8,7 +8,7 @@ cover: email-clients.webp Protects against the following threat(s): - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} +- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} The **email clients** we recommend support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](basics/account-creation.md#sign-in-with-oauth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) to prevent account theft. diff --git a/i18n/ja/encryption.md b/i18n/ja/encryption.md index 07f55a9b..38e94ce4 100644 --- a/i18n/ja/encryption.md +++ b/i18n/ja/encryption.md @@ -57,7 +57,7 @@ Cryptomator's documentation details its intended [security target](https://docs. Protects against the following threat(s): -- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} +- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
@@ -86,7 +86,7 @@ Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Pico Protects against the following threat(s): -- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} +- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
@@ -121,7 +121,7 @@ TrueCrypt has been [audited a number of times](https://en.wikipedia.org/wiki/Tru Protects against the following threat(s): -- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} +- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} Built-in OS encryption solutions generally leverage hardware security features such as a [secure cryptoprocessor](basics/hardware.md#tpmsecure-cryptoprocessor). Therefore, we recommend using the built-in encryption solutions for your operating system. For cross-platform encryption, we still recommend [cross-platform tools](#multi-platform) for additional flexibility and to avoid vendor lock-in. @@ -249,7 +249,7 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im Protects against the following threat(s): -- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} +- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). @@ -299,7 +299,7 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht Protects against the following threat(s): -- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} +- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} - [:material-bug-outline: パッシブ攻撃](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} diff --git a/i18n/ja/multi-factor-authentication.md b/i18n/ja/multi-factor-authentication.md index 6073c27f..e4ec1737 100644 --- a/i18n/ja/multi-factor-authentication.md +++ b/i18n/ja/multi-factor-authentication.md @@ -7,7 +7,7 @@ cover: multi-factor-authentication.webp Protects against the following threat(s): -- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} +- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}

Hardware Keys

diff --git a/i18n/ja/passwords.md b/i18n/ja/passwords.md index 7e740fdd..327b9661 100644 --- a/i18n/ja/passwords.md +++ b/i18n/ja/passwords.md @@ -122,7 +122,7 @@ schema: Protects against the following threat(s): -- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} +- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} - [:material-bug-outline: パッシブ攻撃](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal}