1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-16 16:01:15 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot 2025-04-29 04:36:17 +00:00
parent 89378e939a
commit 0b28d17afd
5 changed files with 14 additions and 14 deletions

View File

@ -80,20 +80,20 @@ GoogleやFacebookのような巨大な広告ネットワークやその他多数
</div>
## Attacks against Specific Individuals
## 特定の個人に対する攻撃
<span class="pg-red">:material-target-account: Targeted Attacks</span>
<span class="pg-red">:material-target-account:標的型攻撃</span>
Targeted attacks against a specific person are more problematic to deal with. Common attacks include sending malicious documents via email, exploiting vulnerabilities (e.g. in browsers and operating systems), and physical attacks. If this is a concern for you, you should employ more advanced threat mitigation strategies.
特定の個人に対する標的型攻撃は、より対処が難しくなります。 一般的な攻撃として、メールに悪意のある文書を添付して送ることやブラウザやOSなどの脆弱性の悪用、物理的な攻撃があります。 もし、懸念がある場合はより高度に脅威を緩和する戦略を取る必要があります。
<div class="admonition tip" markdown>
<p class="admonition-title">Tip</p>
<p class="admonition-title">ヒント</p>
By design, **web browsers**, **email clients**, and **office applications** typically run untrusted code, sent to you from third parties. Running multiple virtual machines—to separate applications like these from your host system, as well as each other—is one technique you can use to mitigate the chance of an exploit in these applications compromising the rest of your system. For example, technologies like Qubes OS or Microsoft Defender Application Guard on Windows provide convenient methods to do this.
**ウェブブラウザ**、**メールクライアント**や**オフィスアプリケーション**は第三者から送られてきた信頼できないコードを実行します。 ホストのシステムからアプリケーションを分離するため、複数の仮想マシンを実行することはアプリケーションからシステムの他の部分への侵害の可能性を軽減するための方法の一つです。 例えば、Qubes OSやWindowsのMicrosoft Defender Application Guardのような技術により、実現できます。
</div>
If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user.
**物理的攻撃**を懸念する場合、Android、iOS、macOSや[Windows(TPMあり)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process)のような安全な検証済みブート実装のあるOSを使うべきです。 またドライブの暗号化を行うとともに、OSがTPMやSecure[Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1)や[Element](https://developers.google.com/android/security/android-ready-se)で暗号化パスフレーズの入力レートを制限していることも確認してください。 ほとんどのデスクトップOSはユーザーごとに分けて暗号化することはできないため、信頼できない人とコンピューターを共用することは避けてください。
## Attacks against Certain Organizations

View File

@ -8,7 +8,7 @@ cover: email-clients.webp
<small>Protects against the following threat(s):</small>
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal}
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
The **email clients** we recommend support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](basics/account-creation.md#sign-in-with-oauth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) to prevent account theft.

View File

@ -57,7 +57,7 @@ Cryptomator's documentation details its intended [security target](https://docs.
<small>Protects against the following threat(s):</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
<div class="admonition recommendation" markdown>
@ -86,7 +86,7 @@ Picocrypt has been [audited](https://github.com/Picocrypt/storage/blob/main/Pico
<small>Protects against the following threat(s):</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
<div class="admonition recommendation" markdown>
@ -121,7 +121,7 @@ TrueCrypt has been [audited a number of times](https://en.wikipedia.org/wiki/Tru
<small>Protects against the following threat(s):</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
Built-in OS encryption solutions generally leverage hardware security features such as a [secure cryptoprocessor](basics/hardware.md#tpmsecure-cryptoprocessor). Therefore, we recommend using the built-in encryption solutions for your operating system. For cross-platform encryption, we still recommend [cross-platform tools](#multi-platform) for additional flexibility and to avoid vendor lock-in.
@ -249,7 +249,7 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im
<small>Protects against the following threat(s):</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script).
@ -299,7 +299,7 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht
<small>Protects against the following threat(s):</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
- [:material-bug-outline: パッシブ攻撃](basics/common-threats.md#security-and-privacy ""){.pg-orange}
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal}

View File

@ -7,7 +7,7 @@ cover: multi-factor-authentication.webp
<small>Protects against the following threat(s):</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
<div class="admonition note" markdown>
<p class="admonition-title">Hardware Keys</p>

View File

@ -122,7 +122,7 @@ schema:
<small>Protects against the following threat(s):</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
- [:material-target-account:標的型攻撃](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red}
- [:material-bug-outline: パッシブ攻撃](basics/common-threats.md#security-and-privacy ""){.pg-orange}
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal}