mirror of
https://github.com/privacyguides/i18n.git
synced 2025-06-19 17:24:25 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@ -25,7 +25,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca
|
|||||||
|
|
||||||
**Disadvantages:**
|
**Disadvantages:**
|
||||||
|
|
||||||
- Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like:
|
- Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). これは次のようなものも含みます。
|
||||||
- Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage.
|
- Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage.
|
||||||
- Poor or no documentation for third-party developers.
|
- Poor or no documentation for third-party developers.
|
||||||
- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on.
|
- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on.
|
||||||
|
@ -56,7 +56,7 @@ The main advantages are:
|
|||||||
- **Security**: no risk of being involved in a [data breach](https://en.wikipedia.org/wiki/Data_breach) because the website does not store your credentials.
|
- **Security**: no risk of being involved in a [data breach](https://en.wikipedia.org/wiki/Data_breach) because the website does not store your credentials.
|
||||||
- **Ease of use**: multiple accounts are managed by a single login.
|
- **Ease of use**: multiple accounts are managed by a single login.
|
||||||
|
|
||||||
But there are disadvantages:
|
しかし、以下のデメリットもあります。
|
||||||
|
|
||||||
- **Privacy**: the OAuth provider you log in with will know the services you use.
|
- **Privacy**: the OAuth provider you log in with will know the services you use.
|
||||||
- **Centralization**: if the account you use for OAuth is compromised or you aren't able to login to it, all other accounts connected to it are affected.
|
- **Centralization**: if the account you use for OAuth is compromised or you aren't able to login to it, all other accounts connected to it are affected.
|
||||||
|
@ -43,7 +43,7 @@ Email metadata is stored in the [message header](https://en.wikipedia.org/wiki/E
|
|||||||
|
|
||||||
Client software may use email metadata to show who a message is from and what time it was received. Servers may use it to determine where an email message must be sent, among [other purposes](https://en.wikipedia.org/wiki/Email#Message_header) which are not always transparent.
|
Client software may use email metadata to show who a message is from and what time it was received. Servers may use it to determine where an email message must be sent, among [other purposes](https://en.wikipedia.org/wiki/Email#Message_header) which are not always transparent.
|
||||||
|
|
||||||
### Who Can View Email Metadata?
|
### 誰が電子メールのメタデータを見ることができますか?
|
||||||
|
|
||||||
Email metadata is protected from outside observers with [Opportunistic TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS) protecting it from outside observers, but it is still able to be seen by your email client software (or webmail) and any servers relaying the message from you to any recipients including your email provider. Sometimes email servers will also use third-party services to protect against spam, which generally also have access to your messages.
|
Email metadata is protected from outside observers with [Opportunistic TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS) protecting it from outside observers, but it is still able to be seen by your email client software (or webmail) and any servers relaying the message from you to any recipients including your email provider. Sometimes email servers will also use third-party services to protect against spam, which generally also have access to your messages.
|
||||||
|
|
||||||
|
@ -45,7 +45,7 @@ By using a VPN with Tor, you're creating essentially a permanent entry node, oft
|
|||||||
|
|
||||||
## 匿名性が必要な場合は?
|
## 匿名性が必要な場合は?
|
||||||
|
|
||||||
VPNs cannot provide anonymity. Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data. Use [Tor](https://www.torproject.org/) instead.
|
VPNを使用しても匿名性は手に入りません。 Your VPN provider will still see your real IP address, and often has a money trail that can be linked directly back to you. You cannot rely on "no logging" policies to protect your data. Use [Tor](https://www.torproject.org/) instead.
|
||||||
|
|
||||||
## What about VPN providers that provide Tor nodes?
|
## What about VPN providers that provide Tor nodes?
|
||||||
|
|
||||||
|
@ -40,7 +40,7 @@ All of these concepts overlap, but it is possible to have any combination of the
|
|||||||
|
|
||||||
A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong.
|
A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong.
|
||||||
|
|
||||||
==プライバシーと秘密を混同しないでください。==私たちは浴室で何をするかを知っていますが、浴室を使うときにはドアを閉めます。 これは裸になり体を洗っているという事実を秘密にするためではなく、プライバシーを守るためにドアを閉めているのです。 私たちには、公開したくないと考える様々な事実(例えば、個人の健康に関する情報、性行動)があります。これは正常であり、良いことです。 プライバシーを求めるのは正当なことであり、プライバシーが私たちを人間たらしめているのです。 プライバシーとは、秘密を隠すことではなく、自分の情報に権利を与えることです。
|
==プライバシーと秘密を混同しないでください。==私たちは浴室で何をするかを知っていますが、浴室を使うときにはドアを閉めます。 それは、秘密をではなく、プライバシーを守りたいと思っているからです。 私たちには、公開したくないと考える様々な事実(例えば、個人の健康に関する情報、性行動)があります。これは正常であり、良いことです。 プライバシーを求めるのは正当なことであり、プライバシーが私たちを人間たらしめているのです。 プライバシーとは、秘密を隠すことではなく、自分の情報に権利を与えることです。
|
||||||
|
|
||||||
## Is Privacy About Control?
|
## Is Privacy About Control?
|
||||||
|
|
||||||
|
@ -44,12 +44,12 @@ Monero transaction graph privacy is limited by its relatively small ring signatu
|
|||||||
|
|
||||||
Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy.
|
Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy.
|
||||||
|
|
||||||
## 基準
|
## 規準
|
||||||
|
|
||||||
**私たちは、推薦するどのプロジェクトとも提携していません。**客観的に推薦できるよう、[標準となる規準](about/criteria.md)に加えて、一連の明確な要件を定めています。 プロジェクトを利用する前に、このリストをよく理解し、ご自身で調査を行って、そのプロジェクトがあなたにとって適切な選択かどうかをご確認ください。
|
**私たちは、推薦するどのプロジェクトとも提携していません。**客観的に推薦できるよう、[標準となる規準](about/criteria.md)に加えて、一連の明確な要件を定めています。 プロジェクトを利用する前に、このリストをよく理解し、ご自身で調査を行って、そのプロジェクトがあなたにとって適切な選択かどうかをご確認ください。
|
||||||
|
|
||||||
!!! example "この項目は最近作成されました"
|
!!! example "この項目は最近作成されました"
|
||||||
|
|
||||||
私たちは、サイトの各項目に関して、定義された規準の確立に取り組んでいます。この規準は変更される可能性があります。 私たちの基準について疑問がある場合は、[フォーラムで質問](https://discuss.privacyguides.net/latest)してください。また、ここに記載されていない場合でも、私たちがプロジェクトを推奨する際に、そうした事柄を考慮しなかったと仮定するのはお止めください。 プロジェクトを推奨する際に考慮され、議論される要素は多くあり、そのすべてを文書化する作業は現在進行中です。
|
私たちは、サイトの各項目に関して、定義された規準の確立に取り組んでいます。この規準は変更される可能性があります。 規準について疑問がある場合は、[フォーラムで質問](https://discuss.privacyguides.net/latest)してください。また、ここに記載されていない場合でも、私たちがプロジェクトを推奨する際に、そうした事柄を考慮しなかったと仮定するのはお止めください。 プロジェクトを推奨する際に考慮され、議論される要素は多くあり、そのすべてを文書化する作業は現在進行中です。
|
||||||
|
|
||||||
- Cryptocurrency must provide private/untraceable transactions by default.
|
- Cryptocurrency must provide private/untraceable transactions by default.
|
||||||
|
@ -259,11 +259,11 @@ Braveには、[シールド](https://support.brave.com/hc/en-us/articles/3600229
|
|||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
1. このオプションはuBlock Originの高度な[ブロックモード](https://github.com/gorhill/uBlock/wiki/Blocking-mode)や[NoScript](https://noscript.net/)拡張機能に似た機能を提供します。
|
1. このオプションでは、uBlock Originの高度な[ブロックモード](https://github.com/gorhill/uBlock/wiki/Blocking-mode)や[NoScript](https://noscript.net/)拡張機能と同様の機能が有効になります。
|
||||||
|
|
||||||
##### ソーシャルメディアのブロック
|
##### ソーシャルメディアのブロック
|
||||||
|
|
||||||
- [ ] すべてのソーシャルメディアコンポーネントのチェックを外す
|
- [ ] すべてのソーシャルメディアコンポーネントのチェックを外すこと
|
||||||
|
|
||||||
##### プライバシーとセキュリティー
|
##### プライバシーとセキュリティー
|
||||||
|
|
||||||
|
@ -79,7 +79,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin
|
|||||||
|
|
||||||
!!! example "この項目は最近作成されました"
|
!!! example "この項目は最近作成されました"
|
||||||
|
|
||||||
私たちは、サイトの各項目に関して、定義された規準の確立に取り組んでいます。この規準は変更される可能性があります。 私たちの基準について疑問がある場合は、[フォーラムで質問](https://discuss.privacyguides.net/latest)してください。また、ここに記載されていない場合でも、私たちがプロジェクトを推奨する際に、そうした事柄を考慮しなかったと仮定するのはお止めください。 プロジェクトを推奨する際に考慮され、議論される要素は多くあり、そのすべてを文書化する作業は現在進行中です。
|
私たちは、サイトの各項目に関して、定義された規準の確立に取り組んでいます。この規準は変更される可能性があります。 規準について疑問がある場合は、[フォーラムで質問](https://discuss.privacyguides.net/latest)してください。また、ここに記載されていない場合でも、私たちがプロジェクトを推奨する際に、そうした事柄を考慮しなかったと仮定するのはお止めください。 プロジェクトを推奨する際に考慮され、議論される要素は多くあり、そのすべてを文書化する作業は現在進行中です。
|
||||||
|
|
||||||
- Accepts payment in [a recommended cryptocurrency](cryptocurrency.md).
|
- Accepts payment in [a recommended cryptocurrency](cryptocurrency.md).
|
||||||
- No ID requirement.
|
- No ID requirement.
|
||||||
|
@ -44,7 +44,7 @@ schema:
|
|||||||
|
|
||||||
異人種間の結婚、女性参政権、言論の自由など多くの権利と同様に、私たちのプライバシー権は常に認められているわけではありません。 いくつかの独裁政権は、プライバシー権に否定的です。 一世代前の人々は、私たちのプライバシー権のために戦ってきました。 ==プライバシーは私たち全員に固有の人権であり、==差別なく全員がこの権利を享受できます。
|
異人種間の結婚、女性参政権、言論の自由など多くの権利と同様に、私たちのプライバシー権は常に認められているわけではありません。 いくつかの独裁政権は、プライバシー権に否定的です。 一世代前の人々は、私たちのプライバシー権のために戦ってきました。 ==プライバシーは私たち全員に固有の人権であり、==差別なく全員がこの権利を享受できます。
|
||||||
|
|
||||||
プライバシーと秘密を混同してはいけません。 トイレで用を足す時、ドアを閉めると思います。 用を足しているという事実を秘密にするためではなく、プライバシーを守るためにドアを閉めるのです。 **誰もが**守るべきものを持っています。 プライバシーは私たちを人間たらしめるものです。
|
プライバシーと秘密を混同してはいけません。 トイレで用を足す時、ドアを閉めると思います。 それは、秘密をではなく、プライバシーを守りたいと思っているからです。 **誰もが**守るべきものを持っています。 プライバシーは私たちを人間たらしめるものです。
|
||||||
|
|
||||||
[:material-book-outline: プライバシーはなぜ重要なのか](basics/why-privacy-matters.md){ class="md-button md-button--primary" }
|
[:material-book-outline: プライバシーはなぜ重要なのか](basics/why-privacy-matters.md){ class="md-button md-button--primary" }
|
||||||
|
|
||||||
|
@ -92,7 +92,7 @@ Braveには、[シールド](https://support.brave.com/hc/en-us/articles/3600229
|
|||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension.
|
1. このオプションでは、uBlock Originの高度な[ブロックモード](https://github.com/gorhill/uBlock/wiki/Blocking-mode)や[NoScript](https://noscript.net/)拡張機能と同様の機能が有効になります。
|
||||||
|
|
||||||
##### Clear browsing data
|
##### Clear browsing data
|
||||||
|
|
||||||
@ -100,7 +100,7 @@ Braveには、[シールド](https://support.brave.com/hc/en-us/articles/3600229
|
|||||||
|
|
||||||
##### Social Media Blocking
|
##### Social Media Blocking
|
||||||
|
|
||||||
- [ ] Uncheck all social media components
|
- [ ] すべてのソーシャルメディアコンポーネントのチェックを外すこと
|
||||||
|
|
||||||
##### Other privacy settings
|
##### Other privacy settings
|
||||||
|
|
||||||
|
@ -42,7 +42,7 @@ You can avoid giving many apps permission to access your media with Android's bu
|
|||||||
|
|
||||||
For example, if you want to post a picture to Discord you can open your file manager or gallery and share that picture with the Discord app, instead of granting Discord full access to your media and photos.
|
For example, if you want to post a picture to Discord you can open your file manager or gallery and share that picture with the Discord app, instead of granting Discord full access to your media and photos.
|
||||||
|
|
||||||
## セキュリティ保護
|
## セキュリティーの保護
|
||||||
|
|
||||||
### 確認付きブート
|
### 確認付きブート
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ Previously, these checks were performed via an unencrypted OCSP protocol which c
|
|||||||
|
|
||||||
While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running.
|
While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running.
|
||||||
|
|
||||||
## おすすめの設定
|
## 推奨する設定
|
||||||
|
|
||||||
Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account.
|
Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account.
|
||||||
|
|
||||||
@ -150,7 +150,7 @@ When you connect to the network again, you'll connect with a random MAC address.
|
|||||||
|
|
||||||
Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names.
|
Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names.
|
||||||
|
|
||||||
## Security Protections
|
## セキュリティーの保護
|
||||||
|
|
||||||
macOS employs defense in depth by relying on multiple layers of software and hardware-based protections, with different properties. This ensures that a failure in one layer does not compromise the system's overall security.
|
macOS employs defense in depth by relying on multiple layers of software and hardware-based protections, with different properties. This ensures that a failure in one layer does not compromise the system's overall security.
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ These messengers are great for securing your sensitive communications.
|
|||||||
|
|
||||||
**Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging, as well as voice and video calling.
|
**Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging, as well as voice and video calling.
|
||||||
|
|
||||||
All communications are E2EE. Contact lists are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with.
|
全ての通信はE2EEで行われます。 Contact lists are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
|
Reference in New Issue
Block a user