diff --git a/i18n/ar/basics/multi-factor-authentication.md b/i18n/ar/basics/multi-factor-authentication.md index c035dfb1..d94d4718 100644 --- a/i18n/ar/basics/multi-factor-authentication.md +++ b/i18n/ar/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/bn-IN/basics/multi-factor-authentication.md b/i18n/bn-IN/basics/multi-factor-authentication.md index 5da7417e..28f8aa2f 100644 --- a/i18n/bn-IN/basics/multi-factor-authentication.md +++ b/i18n/bn-IN/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/bn/basics/multi-factor-authentication.md b/i18n/bn/basics/multi-factor-authentication.md index c035dfb1..d94d4718 100644 --- a/i18n/bn/basics/multi-factor-authentication.md +++ b/i18n/bn/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/cs/basics/multi-factor-authentication.md b/i18n/cs/basics/multi-factor-authentication.md index c035dfb1..d94d4718 100644 --- a/i18n/cs/basics/multi-factor-authentication.md +++ b/i18n/cs/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/de/basics/multi-factor-authentication.md b/i18n/de/basics/multi-factor-authentication.md index 32d75ce3..58089934 100644 --- a/i18n/de/basics/multi-factor-authentication.md +++ b/i18n/de/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/el/basics/multi-factor-authentication.md b/i18n/el/basics/multi-factor-authentication.md index 1665d6f7..41bf41af 100644 --- a/i18n/el/basics/multi-factor-authentication.md +++ b/i18n/el/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/eo/basics/multi-factor-authentication.md b/i18n/eo/basics/multi-factor-authentication.md index c035dfb1..d94d4718 100644 --- a/i18n/eo/basics/multi-factor-authentication.md +++ b/i18n/eo/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/es/basics/multi-factor-authentication.md b/i18n/es/basics/multi-factor-authentication.md index 3e2b3edd..393fd1f3 100644 --- a/i18n/es/basics/multi-factor-authentication.md +++ b/i18n/es/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ Si usas MFA de SMS, utiliza un operador que no cambie tu número de teléfono a Además de proteger tus inicios de sesión del sitio web, la autenticación de múltiples factores también se puede utilizar para proteger tus inicios de sesión locales, claves SSH o incluso bases de datos de contraseñas. -### Windows - -Yubico tiene un [Proveedor de Credenciales](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) dedicado que añade la autenticación Challenge-Response para el flujo de inicio de sesión con nombre de usuario + contraseña para las cuentas locales de Windows. Si tienes una YubiKey con soporte de autenticación Challenge-Response, echa un ojo a la [Guía de Configuración de Yubico Login para Windows](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), que te permitirá configurar MFA en tu ordenador Windows. - ### macOS macOS tiene [soporte nativo](https://support.apple.com/es-es/guide/deployment/depd0b888248/web) para la autenticación con tarjetas inteligentes (PIV). Si tienes una tarjeta inteligente o una llave de seguridad de hardware compatible con la interfaz PIV como la YubiKey, te recomendamos que sigas la documentación de tu tarjeta inteligente/vendedor de seguridad de hardware y configures la autenticación de segundo factor para tu ordenador macOS. diff --git a/i18n/fa/basics/multi-factor-authentication.md b/i18n/fa/basics/multi-factor-authentication.md index 45efcdb2..ae0fcabd 100644 --- a/i18n/fa/basics/multi-factor-authentication.md +++ b/i18n/fa/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/fr/basics/multi-factor-authentication.md b/i18n/fr/basics/multi-factor-authentication.md index 83ba37da..06588036 100644 --- a/i18n/fr/basics/multi-factor-authentication.md +++ b/i18n/fr/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ Si vous utilisez la MFA par SMS, utilisez un opérateur qui ne changera pas votr Au-delà de la simple sécurisation des connexions à votre site web, l'authentification multifactorielle peut être utilisée pour sécuriser vos connexions locales, vos clés SSH ou même vos bases de données de mots de passe. -### Windows - -Yubico dispose d'un [fournisseur d'identifiants](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) dédié qui ajoute l'authentification à épreuve-réponse pour le flux de connexion nom d'utilisateur + mot de passe pour les comptes Windows locaux. Si vous avez une YubiKey avec la prise en charge de l'authentification à épreuve-réponse, jetez un œil au [Guide de configuration de login Yubico pour Windows](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), qui vous permettra de configurer la MFA sur votre ordinateur Windows. - ### macOS macOS dispose d'un [support natif](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) pour l'authentification par carte à puce (PIV). Si vous avez une carte à puce ou une clé de sécurité matérielle qui prend en charge l'interface PIV telle que la YubiKey, nous vous recommandons de suivre la documentation de votre fournisseur de sécurité de carte à puce/matérielle et de configurer l'authentification à second facteur pour votre ordinateur macOS. diff --git a/i18n/he/basics/multi-factor-authentication.md b/i18n/he/basics/multi-factor-authentication.md index 6299b32f..e1c87f65 100644 --- a/i18n/he/basics/multi-factor-authentication.md +++ b/i18n/he/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ When using TOTP with an authenticator app, be sure to back up your recovery keys מעבר לאבטחת כניסות האתר שלך בלבד, ניתן להשתמש באימות רב-גורמי כדי לאבטח את כניסותיך המקומיות, מפתחות SSH או אפילו מסדי נתונים של סיסמאות. -### ווינדוס - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS ל - macOS יש [תמיכה מקומית](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) לאימות עם כרטיסים חכמים (PIV). אם יש לך כרטיס חכם או מפתח אבטחה חומרה התומך בממשק PIV כגון YubiKey, אנו ממליצים לך לעקוב אחר התיעוד של ספק הכרטיס החכם/חומרה שלך ולהגדיר אימות גורם שני עבור מחשב macOS שלך. diff --git a/i18n/hi/basics/multi-factor-authentication.md b/i18n/hi/basics/multi-factor-authentication.md index c035dfb1..d94d4718 100644 --- a/i18n/hi/basics/multi-factor-authentication.md +++ b/i18n/hi/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/hu/basics/multi-factor-authentication.md b/i18n/hu/basics/multi-factor-authentication.md index f173961f..f5eadc07 100644 --- a/i18n/hu/basics/multi-factor-authentication.md +++ b/i18n/hu/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/id/basics/multi-factor-authentication.md b/i18n/id/basics/multi-factor-authentication.md index 63e5d7dd..45b5261d 100644 --- a/i18n/id/basics/multi-factor-authentication.md +++ b/i18n/id/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/it/basics/multi-factor-authentication.md b/i18n/it/basics/multi-factor-authentication.md index d9a266ae..4a5c02d9 100644 --- a/i18n/it/basics/multi-factor-authentication.md +++ b/i18n/it/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ Se utilizzi gli SMS per l'AFM, utilizza un operatore che non cambi il tuo numero Oltre a proteggere i tuoi accessi ai siti web, l'autenticazione a più fattori è utilizzabile per proteggere i tuoi accessi locali, le chiavi SSH o persino i database di password. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS [supporta nativamente](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) l'autenticazione con smart card (PIV). Se possiedi una smartcard o una chiave di sicurezza hardware che supporta l'interfaccia PIV, come YubiKey, consigliamo di seguire la documentazione del tuo fornitore di sicurezza con smartcard/hardware e di configurare l'autenticazione a due fattori per il tuo computer macOS. diff --git a/i18n/ja/basics/multi-factor-authentication.md b/i18n/ja/basics/multi-factor-authentication.md index 15046181..786580a8 100644 --- a/i18n/ja/basics/multi-factor-authentication.md +++ b/i18n/ja/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/ko/basics/multi-factor-authentication.md b/i18n/ko/basics/multi-factor-authentication.md index 74fcad04..f83088eb 100644 --- a/i18n/ko/basics/multi-factor-authentication.md +++ b/i18n/ko/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ SMS로 MFA를 사용할 경우에는 [SIM 스와핑 사기](https://en.wikipedia Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/ku-IQ/basics/multi-factor-authentication.md b/i18n/ku-IQ/basics/multi-factor-authentication.md index c035dfb1..d94d4718 100644 --- a/i18n/ku-IQ/basics/multi-factor-authentication.md +++ b/i18n/ku-IQ/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/nl/basics/multi-factor-authentication.md b/i18n/nl/basics/multi-factor-authentication.md index f7daa5a6..36c453a3 100644 --- a/i18n/nl/basics/multi-factor-authentication.md +++ b/i18n/nl/basics/multi-factor-authentication.md @@ -146,12 +146,6 @@ Naast het beveiligen van jouw website logins, kan multifactor authenticatie ook -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - - - ### macOS macOS heeft [native ondersteuning](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) voor authenticatie met smartcards (PIV). Indien je een smartcard of een hardware beveiligingssleutel heeft die de PIV interface ondersteunt, zoals de YubiKey, raden wij je aan om de documentatie van jouw smartcard/hardware beveiligingsleverancier te volgen en tweede factor authenticatie voor jouw macOS computer in te stellen. diff --git a/i18n/pl/basics/multi-factor-authentication.md b/i18n/pl/basics/multi-factor-authentication.md index a3c26e11..725ad611 100644 --- a/i18n/pl/basics/multi-factor-authentication.md +++ b/i18n/pl/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/pt-BR/basics/multi-factor-authentication.md b/i18n/pt-BR/basics/multi-factor-authentication.md index 1ca68f9c..56edb0b3 100644 --- a/i18n/pt-BR/basics/multi-factor-authentication.md +++ b/i18n/pt-BR/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/pt/basics/multi-factor-authentication.md b/i18n/pt/basics/multi-factor-authentication.md index 4455e0f5..61226bf9 100644 --- a/i18n/pt/basics/multi-factor-authentication.md +++ b/i18n/pt/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Yubico tem um guia [Usando o seu YubiKey como Smart Card em macOS](https://support.yubico.com/hc/en-us/articles/360016649059) que o pode ajudar a configurar o seu YubiKey em macOS. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/ru/basics/multi-factor-authentication.md b/i18n/ru/basics/multi-factor-authentication.md index 26d5a7df..9b326b13 100644 --- a/i18n/ru/basics/multi-factor-authentication.md +++ b/i18n/ru/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ When using TOTP with an authenticator app, be sure to back up your recovery keys Многофакторная аутентификация может использоваться не только для защиты логинов на сайте, но и для защиты локальных логинов, ключей SSH и даже баз данных паролей. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS В macOS есть [нативная поддержка](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) аутентификации с помощью смарт-карт (PIV). Если у вас есть смарт-карта или аппаратный ключ безопасности, поддерживающий интерфейс PIV (например YubiKey), мы рекомендуем вам следовать документации производителя смарт-карты/аппаратного ключа безопасности и настроить двухфакторную аутентификацию на компьютере с macOS. diff --git a/i18n/sv/basics/multi-factor-authentication.md b/i18n/sv/basics/multi-factor-authentication.md index 61fdf54e..0bab8d1f 100644 --- a/i18n/sv/basics/multi-factor-authentication.md +++ b/i18n/sv/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ Om du använder SMS MFA, använd en operatör som inte byter ditt telefonnummer Flerfaktorsautentisering kan användas för att säkra lokala inloggningar, SSH-nycklar eller till och med lösenordsdatabaser. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS har [inbyggt stöd](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) för autentisering med smarta kort (PIV). Om du har ett smartkort eller en hårdvarunyckel som stöder PIV-gränssnittet, till exempel YubiKey, rekommenderar vi att du följer dokumentationen från leverantören av smartkortet eller hårdvarunyckeln och konfigurerar andrafaktorsautentisering för din macOS-dator. diff --git a/i18n/tr/basics/multi-factor-authentication.md b/i18n/tr/basics/multi-factor-authentication.md index 4304e50b..f3551250 100644 --- a/i18n/tr/basics/multi-factor-authentication.md +++ b/i18n/tr/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/uk/basics/multi-factor-authentication.md b/i18n/uk/basics/multi-factor-authentication.md index c035dfb1..d94d4718 100644 --- a/i18n/uk/basics/multi-factor-authentication.md +++ b/i18n/uk/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/vi/basics/multi-factor-authentication.md b/i18n/vi/basics/multi-factor-authentication.md index c035dfb1..d94d4718 100644 --- a/i18n/vi/basics/multi-factor-authentication.md +++ b/i18n/vi/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ If you use SMS MFA, use a carrier who will not switch your phone number to a new Beyond just securing your website logins, multi-factor authentication can be used to secure your local logins, SSH keys or even password databases as well. -### Windows - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. diff --git a/i18n/zh-Hant/about/privacytools.md b/i18n/zh-Hant/about/privacytools.md index 95cd036d..41581d2b 100644 --- a/i18n/zh-Hant/about/privacytools.md +++ b/i18n/zh-Hant/about/privacytools.md @@ -48,11 +48,11 @@ Reddit要求 subreddit 有活躍的版主。 如果主要主持人長期不活 2021 年 9 月 14 日,我們[宣布](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides)開始遷移到這個新的域名: -> [...] 我們認為有必要儘早轉換,以確保人們很快就會發現這個過渡的變化。 This gives us adequate time to transition the domain name, which is currently redirecting to `www.privacyguides.org`, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. +> [...] 我們認為有必要儘早轉換,以確保人們很快就會發現這個過渡的變化。 這給我們足夠的時間來轉換網域名稱,它目前正在重定向到`www.privacyguides.org `,並希望它能給每個人足夠的時間來注意變化,更新書籤和網站等。 此更改[需要:](https://reddit.com/comments/pnhn4a) -- Redirecting `www.privacytools.io` to [www.privacyguides.org](https://www.privacyguides.org). +- 重定向` www.privacytools.io `到 [www.privacyguides.org](https://www.privacyguides.org)。 - 在GitHub上存檔源代碼,以保存我們過去的工作和問題跟蹤器,我們繼續使用這個網站未來幾個月的開發。 - 向我們的 subreddit 和各種其他社區發布公告,通知人們官方變更。 - 正式關閉 privacytools.io 服務,如 Matrix 和 Mastodon ,並鼓勵現有用戶盡快遷移。 @@ -63,7 +63,7 @@ Reddit要求 subreddit 有活躍的版主。 如果主要主持人長期不活 過渡約一周後, BurungHantu 近一年內再次出現,但由於他過去不可靠的記錄,團隊中沒有人願意回到 PrivacyTools。 他沒有為長期缺席道歉,而是立即發起攻勢,將向過渡至 Privacy Guides 定位為對他個人和他的項目之攻擊。 隨後當社區指出他缺席並放棄此專案時, [刪除](https://reddit.com/comments/pp9yie/comment/hd49wbn) 許多這類發文。 -At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from `www.privacytools.io` to [www.privacyguides.org](https://www.privacyguides.org). 我們答應了他的請求,並要求他保持 Matrix , Mastodon 和PeerTube 的子域名活躍,讓我們社區可維持幾個月的公共服務,以便這些平臺上的用戶輕鬆遷移到其他帳戶。 由於我們提供服務的聯邦性質,它們與特定的域名相關聯,因此很難遷移(在某些情況下是不可能的)。 +此時, BurungHantu 聲稱他會繼續開發 privacytools.io ,並要求我們取消把 `www.privacytools.io`重定向到 [www.privacyguides.org](https://www.privacyguides.org)。 我們答應了他的請求,並要求他保持 Matrix , Mastodon 和PeerTube 的子域名活躍,讓我們社區可維持幾個月的公共服務,以便這些平臺上的用戶輕鬆遷移到其他帳戶。 由於我們提供服務的聯邦性質,它們與特定的域名相關聯,因此很難遷移(在某些情況下是不可能的)。 不幸的是,由於r/privacytoolsIO subreddit的控制權沒有依BurungHantu 的要求歸還給他(詳細信息如下),這些子域名在10月初被 [切斷](https://reddit.com/comments/pymthv/comment/hexwrps) ,扼阻了仍在使用這些服務的用戶的遷移。 @@ -83,7 +83,7 @@ BurungHantu 還發布一篇 [推特帖子](https://twitter.com/privacytoolsIO/st > [...] Sub 的發展是 PrivacyGuides.org 團隊多年來付出巨大努力的結果。 以你們每一個人, > -> Subreddit 需要大量的工作來管理和控制。 像花園一樣,它需要細心照顧和日常護理。 It's not a task for dilettantes or commitment-challenged people. 它在園丁的遺棄下繼續茁壯成長,然後遺棄者又突然出現要求把收成當作自己的貢獻,這是不合理的。 It's unfair to the team formed years ago. 這對你不公平。 [...] +> Subreddit 需要大量的工作來管理和控制。 像花園一樣,它需要細心照顧和日常護理。 這個任務並不適合放蕩或有承諾問題的人。 它在園丁的遺棄下繼續茁壯成長,然後遺棄者又突然出現要求把收成當作自己的貢獻,這是不合理的。 這對幾年前組建的團隊不公平。 這對你不公平。 [...] Subreddit不屬於任何人,尤其不屬於品牌持有者。 他們屬於他們的社區,社區及其主持人決定支持轉移到r/PrivacyGuides。 @@ -99,7 +99,7 @@ Subreddit不屬於任何人,尤其不屬於品牌持有者。 他們屬於他 因此, OpenCollective 的資金屬於Privacy Guides 以資助我們的項目,而不是為人所知的域名所有者。 2021年9月17日向捐贈者發布的公告,我們向任何不同意此立場的捐贈者提供退款,但沒人提出退費: -> If any sponsors or backers disagree with or feel misled by these recent events and would like to request a refund given these highly unusual circumstances, please get in touch with our project admin by emailing `jonah@triplebit.net`. +> 如果任何贊助者或支持者不同意或感覺被最近這些事件誤導,且因為這些非常不尋常的情況要求退款,請發送電子郵件至 `jonah@triplebit.net `與專案管理員聯繫。 ## 延伸閱讀 diff --git a/i18n/zh-Hant/advanced/tor-overview.md b/i18n/zh-Hant/advanced/tor-overview.md index 6d57f8be..a0c0f89c 100644 --- a/i18n/zh-Hant/advanced/tor-overview.md +++ b/i18n/zh-Hant/advanced/tor-overview.md @@ -6,9 +6,9 @@ description: Tor 是一個免費使用的去中心化網路,其讓用戶在使 ![Tor logo](../assets/img/self-contained-networks/tor.svg){ align=right } -[**Tor**](../alternative-networks.md#tor) is a free to use, decentralized network designed for using the internet with as much privacy as possible. 如果使用得當,該網路可以實現私人和匿名瀏覽和通訊。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。 +[Tor ](../alternative-networks.md#tor)是一個免費使用的去中心化網路,其讓用戶在使用網際網路之際盡可能地保護自己的隱私。 如果使用得當,該網路可以實現私人和匿名瀏覽和通訊。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。 -Tor works by routing your internet traffic through volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. 這樣可以混淆流量來源,所連接的伺服器都無法看到流量來去的完整路徑,也意味著即使您連接的伺服器無法破壞您的匿名性。 +Tor 的工作原理是通過志願者運營的服務器來引導您的網際網路路徑,而不是直接連接到您試圖訪問的網站。 這樣可以混淆流量來源,所連接的伺服器都無法看到流量來去的完整路徑,也意味著即使您連接的伺服器無法破壞您的匿名性。 [:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } @@ -18,7 +18,7 @@ Tor works by routing your internet traffic through volunteer-operated servers, i ## 正在連接到Tor -Before connecting to Tor, you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from. +在連接到 Tor 之前,應先仔細考慮想透過 Tor 實現什麼目的,想要對誰隱藏網路活動資訊。 在自由的國家,透過 Tor 存取普通內容,無需擔心 ISP 或本地網路管理員知道您正在使用 Tor,反而可能會幫助 [消除Tor 使用污名化](https://2019 .www.torproject. org/about/torusers.html.en),您可以透過標準方式直接連接到Tor,例如 diff --git a/i18n/zh-Hant/basics/account-deletion.md b/i18n/zh-Hant/basics/account-deletion.md index 5cfeb61d..9b53a474 100644 --- a/i18n/zh-Hant/basics/account-deletion.md +++ b/i18n/zh-Hant/basics/account-deletion.md @@ -39,13 +39,13 @@ description: 一般人很容易累積大量的網路服務帳戶,這裏有一 ### GDPR (僅限歐洲經濟區居民) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr-info.eu/art-17-gdpr) of the GDPR. 如果適用於您,請閱讀任何特定服務的隱私權政策,以查找有關如何行使刪除權利的資訊。 閱讀隱私政策可能很重要,因為某些服務的「刪除帳戶」選項,實際上只是停用您的帳戶,若要真正刪除,您必須採取額外行動。 有時,刪除過程中可能需填寫調查、向服務商的資料保護人員發送電子郵件,甚至提出您為歐盟居民的證明。 如果您打算這樣做,請 **不要** 覆寫帳戶資訊-可能需要歐盟居民身份。 請注意,服務的位置並不重要; GDPR 適用於為歐盟用戶服務的任何人。 若服務商不願尊重您請求刪除的權利,可聯絡所在國的[官方資料保護機關](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en),您可能有權請求金錢賠償。 +歐洲經濟區的居民享有資料刪除的額外權利,其詳見於 GDPR [第 17 條](https://gdpr-info.eu/art-17-gdpr)規定。 如果適用於您,請閱讀任何特定服務的隱私權政策,以查找有關如何行使刪除權利的資訊。 閱讀隱私政策可能很重要,因為某些服務的「刪除帳戶」選項,實際上只是停用您的帳戶,若要真正刪除,您必須採取額外行動。 有時,刪除過程中可能需填寫調查、向服務商的資料保護人員發送電子郵件,甚至提出您為歐盟居民的證明。 如果您打算這樣做,請 **不要** 覆寫帳戶資訊-可能需要歐盟居民身份。 請注意,服務的位置並不重要; GDPR 適用於為歐盟用戶服務的任何人。 若服務商不願尊重您請求刪除的權利,可聯絡所在國的[官方資料保護機關](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en),您可能有權請求金錢賠償。 ### 覆寫帳戶資訊 在某些情況下,可以採用虛假資料來覆蓋帳戶的信息。 當您登入後,請將帳戶中的所有資訊變更為偽造資訊。 原因是許多網站甚至在帳戶刪除後仍會保留您之前擁有的資訊。 希望他們會用你輸入的最新數據覆蓋之前的信息。 但是,無法保證不會有先前信息的備份。 -For the account email, either create a new alternate email account via your provider of choice or create an alias using an [email aliasing service](../email-aliasing.md). 完成後,您可以刪除替代電子郵件地址。 我們建議您不要使用臨時電子郵件提供商,因為通常可以重新啟用臨時電子郵件。 +關於帳戶電子郵件,可以透過所選擇的供應商建立一個新的備用電子郵件帳戶,或使用[電子郵件別名服務建立別名](/email/#email-aliasing-services)。 完成後,您可以刪除替代電子郵件地址。 我們建議您不要使用臨時電子郵件提供商,因為通常可以重新啟用臨時電子郵件。 ### 刪除帳戶 diff --git a/i18n/zh-Hant/basics/multi-factor-authentication.md b/i18n/zh-Hant/basics/multi-factor-authentication.md index aab01d08..ca218c1d 100644 --- a/i18n/zh-Hant/basics/multi-factor-authentication.md +++ b/i18n/zh-Hant/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ WebAuthn是最安全、最私密的第二要素驗證形式。 雖然驗證體 除了保護您的網站登錄外,多因素身份驗證還可用於保護您的本地設備的登錄、 SSH 密鑰甚至密碼資料庫。 -### Windows 作業系統 - -Yubico 有專門的 [憑證提供者](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) ,為本地 Windows 帳戶在登錄流程添加了Challenge-Response 驗證。 如果持有具 Challenge-Response 驗證支援的 YubiKey ,請查看 [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide),該指南將協助您在 Windows 電腦上設置MFA。 - ### macOS macOS 具有 [原生支援](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) 用於使用智慧卡(PIV)進行驗證。 如果您有支援 PIV 介面的智慧卡或硬體安全金鑰(例如 YubiKey) ,建議您遵循智慧卡/硬體安全供應商的文件,為您的macOS 電腦設定第二要素驗證。 diff --git a/i18n/zh-Hant/desktop.md b/i18n/zh-Hant/desktop.md index 4d2259cc..2fd808fb 100644 --- a/i18n/zh-Hant/desktop.md +++ b/i18n/zh-Hant/desktop.md @@ -177,7 +177,7 @@ Tails 關閉後[不會抹除](https://gitlab.tails.boum.org/tails/tails/-/issues 由於失憶功能(意指沒有寫入磁碟),Tails 非常適合對抗資料探集;然而,它不像 Whonix 那樣是硬化發行版。 它缺乏 Whonix 的許多匿名和安全功能,並且更新頻率較低(每六周一次)。 被惡意軟體入侵的 Tails 系統可能會繞過透明代理,使用戶去匿名化。 -Tails includes [uBlock Origin](browser-extensions.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) 虛擬機器可能更為防洩漏may be more leak-proof, however they are not amnesic, ,但它沒有失憶功能,因此資料可以從儲存設備上進行恢復。 +Tails Tor 瀏覽器預設包含 [uBlock Origin](browser-extensions.md#ublock-origin) ,這可能會使對手更容易指紋識別 Tails 用戶。 [Whonix](desktop.md#whonix) 虛擬機器可能更為防洩漏may be more leak-proof, however they are not amnesic, ,但它沒有失憶功能,因此資料可以從儲存設備上進行恢復。 設計上, Tails 每次重新啟動後意謂將完全重置。 加密 [永久存儲](https://tails.net/doc/persistent_storage/index.en.html) 可以配置來存儲一些資料。 diff --git a/i18n/zh-Hant/email.md b/i18n/zh-Hant/email.md index ef4a09d9..a0bc796a 100644 --- a/i18n/zh-Hant/email.md +++ b/i18n/zh-Hant/email.md @@ -19,11 +19,11 @@ global: 除此之外,我們還推薦各種基於可持續商業模式和內置安全和隱私功能的電子郵件提供商。 閱讀我們的 [完整列表標準](#criteria) 以獲取更多信息。 -| 提供商 | OpenPGP / WKD | IMAP / SMTP | Zero Access Encryption | 匿名支付 | -| --------------------------- | -------------------------------------- | ---------------------------------------------------------- | ---------------------------------------------------- | ----------------------------- | -| [Proton Mail](#proton-mail) | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Paid plans only | :material-check:{ .pg-green } | 現金 | -| [Mailbox.org](#mailboxorg) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Mail only | 現金 | -| [Tuta](#tuta) | :material-alert-outline:{ .pg-orange } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | Monero & Cash via third-party | +| 提供商 | OpenPGP / WKD | IMAP / SMTP | Zero Access Encryption | 匿名支付 | +| --------------------------- | -------------------------------------- | ------------------------------------------------- | ------------------------------------------------- | ------------------- | +| [Proton Mail](#proton-mail) | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } 僅提供付費版 | :material-check:{ .pg-green } | 現金 | +| [Mailbox.org](#mailboxorg) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } 限 Mail | 現金 | +| [Tuta](#tuta) | :material-alert-outline:{ .pg-orange } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | 透過第三方 Monero & Cash | 除(或代替)此處推薦的電子郵件提供者之外,可能還希望考慮使用專門的[電子郵件別名服務](email-aliasing.md)來保護隱私。 除此之外,這些服務有助於保護真實收件匣免受垃圾郵件的侵害,防止行銷人員關聯您的帳戶,並使用 PGP 加密所有傳入的訊息。 diff --git a/i18n/zh-Hant/encryption.md b/i18n/zh-Hant/encryption.md index 6a5b12ab..746c6ecb 100644 --- a/i18n/zh-Hant/encryption.md +++ b/i18n/zh-Hant/encryption.md @@ -287,7 +287,7 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im ![Tomb logo](assets/img/encryption-software/tomb.png){ align=right } -**Tomb** 是 LUKS 的命令行 shell 包裝器。 It supports steganography via [third-party tools](https://dyne.org/software/tomb/#advanced-usage). +**Tomb** 是 LUKS 的命令行 shell 包裝器。 它通過 [第三方工具](https://dyne.org/software/tomb/#advanced-usage) 支持隱寫。 [:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} @@ -368,7 +368,7 @@ gpg --quick-gen-key alice@example.com future-default

Note "備註"

-We suggest [Canary Mail](email-clients.md#canary-mail-ios) for using PGP with email on iOS devices. +建議 [Canary Mail](email-clients.md#canary-mail-ios) 在 iOS 裝置上使用 PGP 和電子郵件。
@@ -376,7 +376,7 @@ We suggest [Canary Mail](email-clients.md#canary-mail-ios) for using PGP with em ![GPG Suite logo](assets/img/encryption-software/gpgsuite.png){ align=right } -**GPG Suite** provides OpenPGP support for [Apple Mail](email-clients.md#apple-mail-macos) and macOS. +**GPG Suite** 爲 [Apple Mail](email-clients.md#apple-mail-macos) 和macOS 提供 OpenPGP。 我們建議您查看他們的 [第一步指南](https://gpgtools.tenderapp.com/kb/how-to/first-steps-where-do-i-start-where-do-i-begin-setup-gpgtools-create-a-new-key-your-first-encrypted-email)和 [使用知識庫](https://gpgtools.tenderapp.com/kb) 以取得支援。 @@ -400,7 +400,7 @@ We suggest [Canary Mail](email-clients.md#canary-mail-ios) for using PGP with em ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** 是 GnuPG 的Android 實作。 It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail-android) and [FairEmail](email-clients.md#fairemail-android) and other Android apps to provide encryption support. Cure53 於2015年10月完成了 OpenKeychain 3.6 的 [安全審核](https://openkeychain.org/openkeychain-3-6)。 審核 OpenKeychain 方案的 [技術細節在此](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015)。 +**OpenKeychain** 是 GnuPG 的Android 實作。 郵件客戶端通常需要它,例如 [K-9 Mail](email-clients.md#k-9-mail-android) 和 [FairEmail](email-clients.md#fairemail-android) 以及其他 Android 應用程序提供加密支持。 Cure53 於2015年10月完成了 OpenKeychain 3.6 的 [安全審核](https://openkeychain.org/openkeychain-3-6)。 審核 OpenKeychain 方案的 [技術細節在此](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015)。 [:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } diff --git a/i18n/zh-Hant/file-sharing.md b/i18n/zh-Hant/file-sharing.md index 8ce14d80..e1c4b48a 100644 --- a/i18n/zh-Hant/file-sharing.md +++ b/i18n/zh-Hant/file-sharing.md @@ -15,7 +15,7 @@ cover: file-sharing.webp ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla's discontinued Firefox Send service which allows you to send files to others with a link. 檔案在您的裝置上已加密,因此無法被伺服器讀取,並且它們也可以選擇受密碼保護。 Send 維護者託管 [公共實例](https://send.vis.ee)。 你可以利用其他公開實例,也可以自行託管 Send。 +**Send** 是分支自 Mozilla 已停止的 Firefox Send服務,它允許您使用鏈接將檔案發送給其他人。 檔案在您的裝置上已加密,因此無法被伺服器讀取,並且它們也可以選擇受密碼保護。 Send 維護者託管 [公共實例](https://send.vis.ee)。 你可以利用其他公開實例,也可以自行託管 Send。 [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} diff --git a/i18n/zh-Hant/multi-factor-authentication.md b/i18n/zh-Hant/multi-factor-authentication.md index acaae803..14e57f3a 100644 --- a/i18n/zh-Hant/multi-factor-authentication.md +++ b/i18n/zh-Hant/multi-factor-authentication.md @@ -1,5 +1,5 @@ --- -title: "多重因素驗證" +title: "多重因素驗證器" icon: 'material/two-factor-authentication' description: 這些工具可協助透過多重身份驗證保護網路帳戶,而無需將您的祕密傳送給第三方。 cover: multi-factor-authentication.webp @@ -110,7 +110,7 @@ Nitrokey Pro 2、Nitrokey Storage 2 和即將推出的 Nitrokey 3 支持筆記 ![ente Auth logo](assets/img/multi-factor-authentication/ente-auth.png){ align=right } -**ente Auth** is a free and open-source app which stores and generates TOTP tokens. 它可以與線上帳戶一起使用,以安全、端對端加密的方式在裝置上備份和同步令牌(並透過網頁介面存取它們)。 它也可在單一設備上離線使用,無需帳戶。 +**ente Auth** 是一款免費的開源應用,可在行動裝置上儲存和產生 TOTP 令牌。 它可以與線上帳戶一起使用,以安全、端對端加密的方式在裝置上備份和同步令牌(並透過網頁介面存取它們)。 它也可在單一設備上離線使用,無需帳戶。 [:octicons-home-16: Homepage](https://ente.io/auth){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } diff --git a/i18n/zh-Hant/vpn.md b/i18n/zh-Hant/vpn.md index 757dcd06..3c72d96e 100644 --- a/i18n/zh-Hant/vpn.md +++ b/i18n/zh-Hant/vpn.md @@ -74,7 +74,7 @@ Proton VPN 在 [91 個國家/地區設有伺服器](https://protonvpn.com/vpn-se #### :material-check:{ .pg-green } 獨立稽核 -截至 2020 年 1 月, Proton VPN 已通過 SEC Consult 的獨立審計。 SEC Consult 在 Proton VPN Windows、Android 和 iOS 應用程式中發現一些中低風險漏洞,Proton VPN 已在報告發布之前全部 “妥善修復” 了這些漏洞。 所發現的問題都不會讓攻擊者遠端存取您的裝置或流量。 您可以在 [protonvpn.com](https://protonvpn.com/blog/open-source) 查看各個平臺的報告。 In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit). [Securitum](https://research.securitum.com) 於 2021 年 11 月 9 日簽發 Proton VPN 的[應用程式認證函](https://proton.me/blog/security-audit-all-proton-apps) 。 +截至 2020 年 1 月, Proton VPN 已通過 SEC Consult 的獨立審計。 SEC Consult 在 Proton VPN Windows、Android 和 iOS 應用程式中發現一些中低風險漏洞,Proton VPN 已在報告發布之前全部 “妥善修復” 了這些漏洞。 所發現的問題都不會讓攻擊者遠端存取您的裝置或流量。 您可以在 [protonvpn.com](https://protonvpn.com/blog/open-source) 查看各個平臺的報告。 2022 年 4 月,Proton VPN 接受[另一次審核](https://protonvpn.com/blog/no-logs-audit)。 [Securitum](https://research.securitum.com) 於 2021 年 11 月 9 日簽發 Proton VPN 的[應用程式認證函](https://proton.me/blog/security-audit-all-proton-apps) 。 #### :material-check:{ .pg-green } 開源客戶端 @@ -110,7 +110,7 @@ Proton VPN 有自己的 [Stealth](https://protonvpn.com/blog/stealth-vpn-protoco #### :material-information-outline:{ .pg-blue } 補充說明 -Proton VPN clients support two factor authentication on all platforms. Proton VPN 在瑞士、冰島和瑞典擁有自己的伺服器和資料中心。 他們透過自己的 DNS 服務,提供內容封鎖和已知的惡意軟體網域。 Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](tor.md#tor-browser) for this purpose. +Proton VPN 客戶端目前支持所有平臺上的雙因素身份驗證。 Proton VPN 在瑞士、冰島和瑞典擁有自己的伺服器和資料中心。 他們透過自己的 DNS 服務,提供內容封鎖和已知的惡意軟體網域。 此外,Proton VPN 還提供 "Tor" 伺服器,可輕鬆連接到洋蔥網站,但我們仍然強烈建議您使用 [官方 Tor 瀏覽器](tor.md#tor-browser) 來完成此類目的。 ##### :material-alert-outline:{ .pg-orange } Killswitch 無法在基於 Intel 處理器的 Mac 電腦上使用 @@ -122,7 +122,7 @@ Proton VPN clients support two factor authentication on all platforms. Proton VP ![IVPN logo](assets/img/vpn/ivpn.svg){ align=right } -**IVPN** 是另一個高級 VPN 提供商,自 2009 年開始運營。 IVPN is based in Gibraltar and does not offer a free trial. +**IVPN** 是另一個高級 VPN 提供商,自 2009 年開始運營。 IVPN 位於直布羅陀,不提供免費試用。 [:octicons-home-16: 首頁](https://ivpn.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="隱私權政策" } @@ -162,7 +162,7 @@ IVPN 已通過 [Cure53 的無日誌審計](https://cure53.de/audit-report_ivpn.p #### :material-check:{ .pg-green } 接受現金和 Monero -In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, **Monero** and **cash/local currency** (on annual plans) as anonymous forms of payment. Prepaid cards with redeem codes are [also available](https://ivpn.net/knowledgebase/billing/voucher-cards-faq). +除了接受信用卡/簽帳卡和 PayPal 外,IVPN 還接受比特幣、**Monero** 和 **現金/當地貨幣** (僅限年度方案) 作為匿名付款方式。 [也提供](https://ivpn.net/knowledgebase/billing/voucher-cards-faq).帶有兌換代碼的預付卡。 #### :material-check:{ .pg-green } 支援 WireGuard @@ -172,7 +172,7 @@ IVPN [建議](https://ivpn.net/wireguard)搭配 WireGuard 使用,IVPN 在所 #### :material-information-outline:{ .pg-blue } 支援 IPv6 -IVPN allows you to [connect to services using IPv6](https://ivpn.net/knowledgebase/general/do-you-support-ipv6) but doesn't allow you to connect from a device using an IPv6 address. +IVPN 可以[透過 IPv6 連接到服務](https://ivpn.net/knowledgebase/general/do-you-support-ipv6),但無法從僅支援 IPv6 的裝置連線。 #### :material-alert-outline:{ .pg-orange } 遠端端口轉發 @@ -188,7 +188,7 @@ IVPN 使用 [v2ray](https://v2ray.com/en/index.html) 的混淆模式,這有助 #### :material-information-outline:{ .pg-blue } 補充說明 -IVPN clients support two factor authentication. IVPN 有「[反追蹤](https://ivpn.net/antitracker)」功能,以阻絕來自網路層的廣告與追蹤。 +IVPN 用戶端支援雙因子身份驗證。 IVPN 有「[反追蹤](https://ivpn.net/antitracker)」功能,以阻絕來自網路層的廣告與追蹤。 ### Mullvad @@ -196,7 +196,7 @@ IVPN clients support two factor authentication. IVPN 有「[反追蹤](https://i ![Mullvad 標誌](assets/img/vpn/mullvad.svg){ align=right } -**Mullvad** 是一個快速且便宜的 VPN,非常注重透明和安全性。 自 **2009 年** 開始運營。 Mullvad is based in Sweden and does not offer a free trial. +**Mullvad** 是一個快速且便宜的 VPN,非常注重透明和安全性。 自 **2009 年** 開始運營。 Mullvad 總部位於瑞典,不提供免費試用。 [:octicons-home-16: 首頁](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="洋蔥服務" } @@ -245,7 +245,7 @@ Mullvad 在其 [GitHub 組織](https://github.com/mullvad/mullvadvpn-app) 中提 #### :material-check:{ .pg-green } 接受現金和 Monero -Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin, Bitcoin Cash, **Monero** and **cash/local currency** as anonymous forms of payment. Prepaid cards with redeem codes are also available. Mullvad also accepts Swish and bank wire transfers. +除了接受信用卡/簽帳卡和 PayPal 外, Mullvad 還接受比特幣, Bitcoin Cash **Monero** 和 **現金/當地貨幣** (年度方案繳費)作為匿名付款方式。 也提供帶有兌換代碼的預付卡。 Mullvad 也接受 Swish 和銀行電匯。 #### :material-check:{ .pg-green } 支援 WireGuard diff --git a/i18n/zh/basics/multi-factor-authentication.md b/i18n/zh/basics/multi-factor-authentication.md index a75625b9..716a2585 100644 --- a/i18n/zh/basics/multi-factor-authentication.md +++ b/i18n/zh/basics/multi-factor-authentication.md @@ -120,10 +120,6 @@ When using TOTP with an authenticator app, be sure to back up your recovery keys 除了保护你的网站登录之外,多因素认证还可以用来保护你的本地登录、SSH密钥甚至是密码数据库。 -### Windows 系统 - -Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. - ### mac系统 macOS [原生支持](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) 使用智能卡(PIV)进行认证。 如果你有一张支持PIV接口的智能卡或硬件安全钥匙,如YubiKey,我们建议你按照你的智能卡/硬件安全供应商的文档,为你的macOS电脑设置第二要素认证。 diff --git a/includes/strings.zh-Hant.env b/includes/strings.zh-Hant.env index c2fc97d5..6f1b1db0 100644 --- a/includes/strings.zh-Hant.env +++ b/includes/strings.zh-Hant.env @@ -38,8 +38,8 @@ NAV_TECHNICAL_GUIDES="技術指南" NAV_TECHNOLOGY_ESSENTIALS="技術要點" NAV_WRITING_GUIDE="撰寫指南" SITE_DESCRIPTION="Privacy Guides 是您重要的網路隱私與安全資源。" -SITE_LANGUAGE="English" -SITE_LANGUAGE_ENGLISH="English" +SITE_LANGUAGE="英文" +SITE_LANGUAGE_ENGLISH="英文" SITE_NAME="Privacy Guides" SOCIAL_FORUM="論壇" SOCIAL_GITHUB="GitHub" @@ -49,5 +49,5 @@ SOCIAL_TOR_SITE="隱藏服務" THEME_AUTO="切換至系統主題" THEME_DARK="切換至深色主題" THEME_LIGHT="切換至深色主題" -TRANSLATION_NOTICE="You're viewing the $SITE_LANGUAGE copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out!" +TRANSLATION_NOTICE="您正在查看 Privacy Guides 的 $SITE_LANGUAGE 版本,由我們在 Crowdin 上出色的團隊翻譯。如有您發現錯誤,或在此頁面上看到任何未翻譯的部分,請考慮提供幫助!" TRANSLATION_NOTICE_CTA="訪問 Crowdin"