From 163a718e3dbf828a640662f9bbd0c91dc84fb543 Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Sat, 9 Aug 2025 15:35:15 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/cs/basics/common-threats.md | 30 +++++++++++++++--------------- i18n/cs/cryptocurrency.md | 2 +- i18n/cs/data-redaction.md | 2 +- i18n/cs/desktop.md | 2 +- i18n/cs/dns.md | 2 +- i18n/cs/financial-services.md | 4 ++-- i18n/cs/frontends.md | 2 +- i18n/cs/mobile-browsers.md | 2 +- i18n/cs/real-time-communication.md | 2 +- i18n/cs/router.md | 2 +- i18n/cs/search-engines.md | 2 +- i18n/cs/tor.md | 4 ++-- i18n/cs/vpn.md | 2 +- 13 files changed, 29 insertions(+), 29 deletions(-) diff --git a/i18n/cs/basics/common-threats.md b/i18n/cs/basics/common-threats.md index 987c5456..5258e601 100644 --- a/i18n/cs/basics/common-threats.md +++ b/i18n/cs/basics/common-threats.md @@ -181,35 +181,35 @@ Online můžete být sledováni pomocí níže uvedených metod, ale nejen těch Pokud se obáváte programů hromadného sledování, můžete využít strategie, jako je např. rozdělení vašich on-line identit, splynutí s ostatními uživateli, a taky, kdekoliv je to možné, jednoduše neposkytujte informace, které by vás mohly identifikovat. -## Surveillance as a Business Model +## Sledování jako obchodní model -:material-account-cash: Surveillance Capitalism +:material-account-cash: Kapitalismus dohledu -> Surveillance capitalism is an economic system centered around the capture and commodification of personal data for the core purpose of profit-making.[^3] +> Kapitalismus dohledu je ekonomický systém zaměřený na zachycování a komodifikaci osobních údajů s hlavní účelem tvorby zisku.[^3] -For many people, tracking and surveillance by private corporations is a growing concern. Pervasive ad networks, such as those operated by Google and Facebook, span the internet far beyond just the sites they control, tracking your actions along the way. Using tools like content blockers to limit network requests to their servers, and reading the privacy policies of the services you use can help you avoid many basic adversaries (although it can't completely prevent tracking).[^4] +Mnoho lidí se stále více obává sledování a dohledu ze strany soukromých korporací. Všudypřítomné reklamní sítě, např. ty provozované společností Google nebo Meta, rozšiřují jejich dosah na internetu i na stránky, které nemají pod přímou kontrolou, a to jim umožňuje vás sledovat. Používání nástrojů, jako jsou blokátory obsahu, které omezují posílání požadavků na jejich servery, a čtením pravidel o ochraně údajů služeb, které používáte, se můžete vyhnout mnoho základním útokům (i když sledování nejde zcela zabránit).[^4] -Additionally, even companies outside the *AdTech* or tracking industry can share your information with [data brokers](https://en.wikipedia.org/wiki/Information_broker) (such as Cambridge Analytica, Experian, or Datalogix) or other parties. You can't automatically assume your data is safe just because the service you're using doesn't fall within the typical AdTech or tracking business model. The strongest protection against corporate data collection is to encrypt or obfuscate your data whenever possible, making it difficult for different providers to correlate data with each other and build a profile on you. +Mimo to, i společnosti mimo *AdTech*, a sledovací odvětví obecně, mohou sdílet vaše údaje s [data brokery](https://en.wikipedia.org/wiki/Information_broker) (např. Cambridge Analytica, Experian nebo Datalogix) nebo jinými stranami. Nemůžete automaticky předpokládat, že jsou vaše data v bezpečí jen proto, že vámi používaná služba nespadá pod typický obchodní model AdTechu nebo sledování. Nejsilnější ochranou proti shromažďování dat korporacemi je tyto data zašifrovat nebo obfuskovat, kdykoliv je to možné, a tím ztížit různým poskytovatelům vzájemnou korelaci dat a vybudování vašeho profilu. -## Limiting Public Information +## Omezování informací dostupných veřejně -:material-account-search: Public Exposure +:material-account-search: Vystavení veřejnosti -The best way to keep your data private is simply not making it public in the first place. Deleting unwanted information you find about yourself online is one of the best first steps you can take to regain your privacy. +Nejlepší způsob, jak vaše data uchovat v soukromí, je o tom, v první řadě je nezveřejňovat. Odstraňování nežádoucích informací, které o sobě najdete on-line, je jeden z nejlepších prvních kroků, které můžete udělat pro to, abyste znovu získali své soukromí zpátky. -- [View our guide on account deletion :material-arrow-right-drop-circle:](account-deletion.md) +- [Podívejte se na našeho průvodce mazáním účtů :material-arrow-right-drop-circle:](account-deletion.md) -On sites where you do share information, checking the privacy settings of your account to limit how widely that data is spread is very important. For example, enable "private mode" on your accounts if given the option: This ensures that your account isn't being indexed by search engines, and that it can't be viewed without your permission. +Na webech, kde sdílíte své údaje, je důležité zkontrolovat nastavení soukromí, abyste zamezili šíření vašich údajů dál. Například můžete povolit „soukromý režim“ u účtů, které to umožňují: Tím si zajistíte, že váš účet nebude indexován vyhledávači a že jej nebude možné si prohlížet bez vašeho svolení. -If you've already submitted your real information to sites which shouldn't have it, consider using disinformation tactics, like submitting fictitious information related to that online identity. This makes your real information indistinguishable from the false information. +Pokud jste ale už sdíleli své pravé údaje se stránkami, které by je neměly mít, zvažte použití dezinformačních taktik, jako je sdílení falešných informací v souvislosti s vaší on-line identitou. Tím se skutečné informace stanou nerozeznatelnými od falešných. -## Avoiding Censorship +## Vyhýbání se cenzuře -:material-close-outline: Censorship +:material-close-outline: Cenzura -Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] +Cenzurování na internetu mohou (v různé míře) provádět různé subjekty, např. totalitní vlády, správci sítí, nebo poskytovatelé služeb. Tyto snahy o kontrolu komunikace a omezování přístupu k informacím budou vždy neslučitelné s lidským právem na svobodu projevu.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Cenzura na platformách vlastněných korporacemi je čím dál častější, protože se platformy jako Twitter nebo Facebook podřizují tlaku veřejnosti, trhu nebo vládních úřadů. Vládní nátlak může být jak skrytý, což je případ Bílého domu, který si [vyžádá stažení](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) provokativního videa na YouTube, nebo zjevný, jako v případě čínské vlády, která od společností vyžaduje, aby se podřídily přísnému režimu cenzury. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../social-networks.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. diff --git a/i18n/cs/cryptocurrency.md b/i18n/cs/cryptocurrency.md index 43dd58a0..acc28ace 100644 --- a/i18n/cs/cryptocurrency.md +++ b/i18n/cs/cryptocurrency.md @@ -9,7 +9,7 @@ cover: cryptocurrency.webp Protects against the following threat(s): - [:material-eye-outline: Hromadné sledování](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray} +- [:material-close-outline: Cenzura](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray} Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: diff --git a/i18n/cs/data-redaction.md b/i18n/cs/data-redaction.md index aefab365..5b5e2d2c 100644 --- a/i18n/cs/data-redaction.md +++ b/i18n/cs/data-redaction.md @@ -8,7 +8,7 @@ cover: data-redaction.webp Protects against the following threat(s): -- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} +- [:material-account-search: Vystavení veřejnosti](basics/common-threats.md#limiting-public-information ""){.pg-green} When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata. diff --git a/i18n/cs/desktop.md b/i18n/cs/desktop.md index b83da77d..b41faf90 100644 --- a/i18n/cs/desktop.md +++ b/i18n/cs/desktop.md @@ -7,7 +7,7 @@ cover: desktop.webp Protects against the following threat(s): -- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-account-cash: Kapitalismus dohledu](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. diff --git a/i18n/cs/dns.md b/i18n/cs/dns.md index 1181a373..07fb52cf 100644 --- a/i18n/cs/dns.md +++ b/i18n/cs/dns.md @@ -11,7 +11,7 @@ global: Protects against the following threat(s): -- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-account-cash: Kapitalismus dohledu](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity. diff --git a/i18n/cs/financial-services.md b/i18n/cs/financial-services.md index 448ed733..7639221d 100644 --- a/i18n/cs/financial-services.md +++ b/i18n/cs/financial-services.md @@ -7,7 +7,7 @@ description: These services can assist you in protecting your privacy from merch Protects against the following threat(s): -- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-account-cash: Kapitalismus dohledu](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: @@ -17,7 +17,7 @@ Making payments online is one of the biggest challenges to privacy. These servic Protects against the following threat(s): -- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information ""){.pg-green} +- [:material-account-search: Vystavení veřejnosti](basics/common-threats.md#limiting-public-information ""){.pg-green} There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously. diff --git a/i18n/cs/frontends.md b/i18n/cs/frontends.md index 8dd6acc9..1fc3ee22 100644 --- a/i18n/cs/frontends.md +++ b/i18n/cs/frontends.md @@ -7,7 +7,7 @@ cover: frontends.webp Protects against the following threat(s): -- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-account-cash: Kapitalismus dohledu](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to circumvent these restrictions. diff --git a/i18n/cs/mobile-browsers.md b/i18n/cs/mobile-browsers.md index 1edc8732..61d86a8f 100644 --- a/i18n/cs/mobile-browsers.md +++ b/i18n/cs/mobile-browsers.md @@ -52,7 +52,7 @@ schema: Protects against the following threat(s): -- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-account-cash: Kapitalismus dohledu](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} These are our currently recommended **mobile web browsers** and configurations for standard/non-anonymous internet browsing. If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. diff --git a/i18n/cs/real-time-communication.md b/i18n/cs/real-time-communication.md index 303a896d..3d13c22d 100644 --- a/i18n/cs/real-time-communication.md +++ b/i18n/cs/real-time-communication.md @@ -11,7 +11,7 @@ cover: real-time-communication.webp - [:material-bug-outline: Pasivní útoky](basics/common-threats.md#security-and-privacy ""){.pg-orange} - [:material-server-network: Poskytovatelé služeb](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} - [:material-eye-outline: Hromadné sledování](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} -- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-account-cash: Kapitalismus dohledu](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} These recommendations for encrypted **real-time communication** are great for securing your sensitive communications. These instant messengers come in the form of many [types of communication networks](advanced/communication-network-types.md). diff --git a/i18n/cs/router.md b/i18n/cs/router.md index 02a80691..e54ea1c9 100644 --- a/i18n/cs/router.md +++ b/i18n/cs/router.md @@ -7,7 +7,7 @@ cover: router.webp Protects against the following threat(s): -- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-account-cash: Kapitalismus dohledu](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} - [:material-bug-outline: Pasivní útoky](basics/common-threats.md#security-and-privacy ""){.pg-orange} Below are a few alternative operating systems that can be used on routers, Wi-Fi access points, etc. diff --git a/i18n/cs/search-engines.md b/i18n/cs/search-engines.md index eb3601d0..579fbf40 100644 --- a/i18n/cs/search-engines.md +++ b/i18n/cs/search-engines.md @@ -12,7 +12,7 @@ global: Protects against the following threat(s): -- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-account-cash: Kapitalismus dohledu](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} Use a **search engine** that doesn't build an advertising profile based on your searches. diff --git a/i18n/cs/tor.md b/i18n/cs/tor.md index be9af2d4..a41d7104 100644 --- a/i18n/cs/tor.md +++ b/i18n/cs/tor.md @@ -25,9 +25,9 @@ schema: Protects against the following threat(s): -- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-account-cash: Kapitalismus dohledu](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} - [:material-eye-outline: Hromadné sledování](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue} -- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray} +- [:material-close-outline: Cenzura](basics/common-threats.md#avoiding-censorship ""){.pg-blue-gray} **Tor** is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. diff --git a/i18n/cs/vpn.md b/i18n/cs/vpn.md index 26bf8db2..3cd37897 100644 --- a/i18n/cs/vpn.md +++ b/i18n/cs/vpn.md @@ -12,7 +12,7 @@ global: Protects against the following threat(s): -- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} +- [:material-account-cash: Kapitalismus dohledu](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown} If you're looking for additional *privacy* from your ISP, on a public Wi-Fi network, or while torrenting files, a **VPN** may be the solution for you.