1
0
mirror of https://github.com/privacyguides/i18n.git synced 2026-03-14 11:00:41 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2026-02-25 21:43:08 +00:00
parent 20a9153a30
commit 0ba833e3d1
3 changed files with 12 additions and 12 deletions

View File

@@ -209,7 +209,7 @@ Um zu wiederholen, dies ist keine Wertschätzung von irgendeiner Plattform, wir
> Um Privatsphären-Fokussierte alternative Apps zu finden, überprüfte Seiten wie Good Reports und **Privacy Guides**, die Listen von Privatsphäre-fokussierten Apps in einer Vielzahl von Kategorien, inklusive E-Mail-Anbieter, die nicht von Big-Tech-Unternehmen betrieben werden, schreiben. > Um Privatsphären-Fokussierte alternative Apps zu finden, überprüfte Seiten wie Good Reports und **Privacy Guides**, die Listen von Privatsphäre-fokussierten Apps in einer Vielzahl von Kategorien, inklusive E-Mail-Anbieter, die nicht von Big-Tech-Unternehmen betrieben werden, schreiben.
— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) — [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) [vom Englischen übersetzt]
> Wenn du ein neues VPN suchst, kannst du zum Rabattcode von fast jedem Podcast gehen. Wenn du ein **guten** VPN suchst, brauchst du professionelle Hilfe. Das Gleiche gilt für E-Mail-Clients, Browser, Betriebssysteme und Passwortmanager. Wie weiß man welche die beste, meist Privatsphären-freundliche Option ist? Deshalb gibt es **Privacy Guides**, eine Plattform wo Freiwillige für die besten Privatsphäre-freundlichen Tools im Internet suchen. > Wenn du ein neues VPN suchst, kannst du zum Rabattcode von fast jedem Podcast gehen. Wenn du ein **guten** VPN suchst, brauchst du professionelle Hilfe. Das Gleiche gilt für E-Mail-Clients, Browser, Betriebssysteme und Passwortmanager. Wie weiß man welche die beste, meist Privatsphären-freundliche Option ist? Deshalb gibt es **Privacy Guides**, eine Plattform wo Freiwillige für die besten Privatsphäre-freundlichen Tools im Internet suchen.

View File

@@ -5,9 +5,9 @@ description: Find a new social network that doesnt pry into your data or mone
cover: social-networks.webp cover: social-networks.webp
--- ---
<small>Protects against the following threat(s):</small> <small>Schützt vor der/den folgenden Bedrohung(en):</small>
- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray } - [:material-close-outline: Zensur](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray }
- [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } - [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
These privacy-respecting **social networks** allow you to participate in online communities without giving up your personal information like your full name, phone number, and other data commonly requested by tech companies. These privacy-respecting **social networks** allow you to participate in online communities without giving up your personal information like your full name, phone number, and other data commonly requested by tech companies.
@@ -18,7 +18,7 @@ The social networks we recommend solve the issue of censorship by operating atop
You should note that **no** social networks are appropriate for private or sensitive communications. For chatting directly with others, you should use a recommended [instant messenger](real-time-communication.md) with strong end-to-end encryption, and only use direct messages on social media in order to establish a more private and secure chat platform with your contacts. You should note that **no** social networks are appropriate for private or sensitive communications. For chatting directly with others, you should use a recommended [instant messenger](real-time-communication.md) with strong end-to-end encryption, and only use direct messages on social media in order to establish a more private and secure chat platform with your contacts.
## Decentralization ## Dezentralisation
Decentralized social networks are built on an architecture that is fundamentally different than mainstream social media platforms, yet quite similar to the underlying structure of email. Instead of opening an account under a single, unified service like you would for Facebook or Discord, you instead choose an independent, public server to join. The server you join can communicate with and discover other servers; this aspect of decentralization is also known as _federation_. Decentralized social networks are built on an architecture that is fundamentally different than mainstream social media platforms, yet quite similar to the underlying structure of email. Instead of opening an account under a single, unified service like you would for Facebook or Discord, you instead choose an independent, public server to join. The server you join can communicate with and discover other servers; this aspect of decentralization is also known as _federation_.
@@ -26,7 +26,7 @@ A significant benefit of this decentralized model is that there is no central au
A caveat of this decentralized model is that each server is its own legal entity, with its own privacy policy, terms of use, administration team, and moderators. While many of these servers are far _less_ restrictive and more privacy-respecting than traditional social media platforms, some can be far _more_ restrictive or potentially _worse_ for your privacy. Typically, the software on which the social network runs does not discriminate between these administrators or place any limitations on their powers. A caveat of this decentralized model is that each server is its own legal entity, with its own privacy policy, terms of use, administration team, and moderators. While many of these servers are far _less_ restrictive and more privacy-respecting than traditional social media platforms, some can be far _more_ restrictive or potentially _worse_ for your privacy. Typically, the software on which the social network runs does not discriminate between these administrators or place any limitations on their powers.
## Censorship Resistance ## Zensurresistenz
While censorship in decentralized social networks does not exist on a network level, it is very possible to experience censorship on a server level depending on a server's administrator. Administrators have the power to _defederate_ from other servers, which leads to limiting the content you can view and the people you can interact with. While censorship in decentralized social networks does not exist on a network level, it is very possible to experience censorship on a server level depending on a server's administrator. Administrators have the power to _defederate_ from other servers, which leads to limiting the content you can view and the people you can interact with.

View File

@@ -91,10 +91,10 @@
*[SoC]: System on Chip *[SoC]: System on Chip
*[SSO]: Einmalanmeldung *[SSO]: Einmalanmeldung
*[Systemeingabe]: Die Systemeingabe von einem KI Chat ist die generelle Anleitung, welche einem Menschen zeigen wie er bedienen sollte. *[Systemeingabe]: Die Systemeingabe von einem KI Chat ist die generelle Anleitung, welche einem Menschen zeigen wie er bedienen sollte.
*[Temperatur]: AI temperature is a parameter used in AI models to control the level of randomness and creativity in the generated text. *[Temperatur]: KI Temperatur ist ein Parameter der in KI Modellen, um die Kontrolle der Zufälligkeit sowie Kreativität im generierten Text zu kontrollieren.
*[TCP]: Transmission Control Protocol *[TCP]: Übertragungssteuerungsprotokoll
*[TEE]: Trusted Execution Environment *[TEE]: Vertrauenswürdige Ausführungsumgebung
*[TLS]: Transport Layer Security *[TLS]: Transportschichtsicherheit
*[AGB]: Allgemeine Geschäftsbedingungen *[AGB]: Allgemeine Geschäftsbedingungen
*[TOTP]: Zeitbasiertes Einmalpasswort *[TOTP]: Zeitbasiertes Einmalpasswort
*[TPM]: Trusted Platform Module *[TPM]: Trusted Platform Module
@@ -103,9 +103,9 @@
*[UDP]: User Datagram Protocol *[UDP]: User Datagram Protocol
*[VPN]: Virtuelles Privates Netzwerk *[VPN]: Virtuelles Privates Netzwerk
*[VLAN]: Virtual Local Area Network *[VLAN]: Virtual Local Area Network
*[VoIP]: Voice over IP (Internet Protocol) *[VoIP]: Voice over IP (Internet Protokoll)
*[W3C]: World Wide Web Consortium *[W3C]: World Wide Web Consortium
*[XMPP]: Extensible Messaging and Presence Protocol *[XMPP]: Extensible Messaging and Presence Protocol
*[PWA]: Progressive Web App *[PWA]: Progressive Webanwendung
*[PWAs]: Progressive Web Apps *[PWAs]: Progressive Webanwendungen
*[WKD]: Web Key Directory *[WKD]: Web Key Directory