mirror of
https://github.com/privacyguides/i18n.git
synced 2025-06-16 07:51:13 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
parent
395ff53610
commit
28a4f71d1f
@ -6,7 +6,7 @@ description: Torは、可能な限りプライバシーを守ってインター
|
||||
|
||||
Torは、可能な限りプライバシーを守ってインターネットを利用するために設計された、自由に利用できる分散型ネットワークです。 適切に使用すれば、プライベートで匿名のブラウジングや通信を行うことができます。
|
||||
|
||||
## Safely Connecting to Tor
|
||||
## Torへの安全な接続
|
||||
|
||||
Before connecting to [Tor](../tor.md), you should carefully consider what you're looking to accomplish by using Tor in the first place, and who you're trying to hide your network activity from.
|
||||
|
||||
@ -55,11 +55,11 @@ Setting up bad configurations like these is difficult to do accidentally, becaus
|
||||
|
||||
Determining whether you should first use a VPN to connect to the Tor network will require some common sense and knowledge of your own government's and ISP's policies relating to what you're connecting to. However, again in most cases you will be better off being seen as connecting to a commercial VPN network than directly to the Tor network. If VPN providers are censored in your area, then you can also consider using Tor pluggable transports (e.g. Snowflake or meek bridges) as an alternative, but using these bridges may arouse more suspicion than standard WireGuard/OpenVPN tunnels.
|
||||
|
||||
## What Tor is Not
|
||||
## Torでないもの
|
||||
|
||||
The Tor network is not the perfect privacy protection tool in all cases, and has a number of drawbacks which should be carefully considered. These things should not discourage you from using Tor if it is appropriate for your needs, but they are still things to think about when deciding which solution is most appropriate for you.
|
||||
|
||||
### Tor is not a free VPN
|
||||
### Torは無料のVPNではありません
|
||||
|
||||
The release of the *Orbot* mobile app has lead many people to describe Tor as a "free VPN" for all of your device traffic. However, treating Tor like this poses some dangers compared to a typical VPN.
|
||||
|
||||
@ -67,7 +67,7 @@ Unlike Tor exit nodes, VPN providers are usually not *actively* [malicious](#cav
|
||||
|
||||
As we've alluded to already, Tor is also easily identifiable on the network. Unlike an actual VPN provider, using Tor will make you stick out as a person likely attempting to evade authorities. In a perfect world, Tor would be seen by network administrators and authorities as a tool with many uses (like how VPNs are viewed), but in reality the perception of Tor is still far less legitimate than the perception of commercial VPNs, so using a real VPN provides you with plausible deniability, e.g. "I was just using it to watch Netflix," etc.
|
||||
|
||||
### Tor usage is not undetectable
|
||||
### Torの使用は検出不可能ではありません
|
||||
|
||||
**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established.
|
||||
|
||||
|
@ -15,9 +15,9 @@ Using a VPN hides even this information from your ISP, by shifting the trust you
|
||||
|
||||
When we refer to "Virtual Private Networks" on this website, we are usually referring to **commercial** [VPN providers](../vpn.md), who you pay a monthly fee to in exchange for routing your internet traffic securely through their public servers. There are many other forms of VPN, such as ones you host yourself or ones operated by workplaces which allow you to securely connect to internal/employee network resources, however, these VPNs are usually designed for accessing remote networks securely, rather than protecting the privacy of your internet connection.
|
||||
|
||||
## How does a VPN work?
|
||||
## VPNの仕組み
|
||||
|
||||
VPNs encrypt your traffic between your device and a server owned by your VPN provider. From the perspective of anyone between you and the VPN server, it looks like you're connecting to the VPN server. From the perspective of anyone between the VPN server and your destination site, all they can see is the VPN server connecting to the website.
|
||||
VPNは、あなたのデバイスとVPNプロバイダーが所有するサーバー間のトラフィックを暗号化します。 From the perspective of anyone between you and the VPN server, it looks like you're connecting to the VPN server. From the perspective of anyone between the VPN server and your destination site, all they can see is the VPN server connecting to the website.
|
||||
|
||||
``` mermaid
|
||||
flowchart LR
|
||||
@ -42,7 +42,7 @@ VPNs can provide *some* of the same benefits Tor provides, such as hiding your I
|
||||
|
||||
VPNs cannot encrypt data outside the connection between your device and the VPN server. VPN providers can also see and modify your traffic the same way your ISP could, so there is still a level of trust you are placing in them. And there is no way to verify a VPN provider's "no logging" policies in any way.
|
||||
|
||||
## When isn't a VPN suitable?
|
||||
## VPNが適していない場合
|
||||
|
||||
Using a VPN in cases where you're using your [real-life or well-known identity](common-misconceptions.md#complicated-is-better) online is unlikely be useful. Doing so may trigger spam and fraud detection systems, such as if you were to log into your bank's website.
|
||||
|
||||
@ -72,11 +72,11 @@ The feature should be viewed as a *convenient* way to access hidden services on
|
||||
|
||||
## Commercial VPN Ownership
|
||||
|
||||
Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use.
|
||||
ほとんどのVPNサービスは、同じ[少数の企業](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/)が所有しています。 These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use.
|
||||
|
||||
You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.==
|
||||
|
||||
[Our VPN Recommendations](../vpn.md ""){.md-button}
|
||||
[推奨されるVPN](../vpn.md ""){.md-button}
|
||||
|
||||
## Modern VPN Alternatives
|
||||
|
||||
|
@ -57,13 +57,13 @@ After [creating a new ProxyVM](https://github.com/Qubes-Community/Contents/blob/
|
||||
|
||||
Your qubes should be configured in a manner similar to this:
|
||||
|
||||
| Qube name | Qube description | NetVM |
|
||||
| キューブ名 | キューブの説明 | NetVM |
|
||||
| --------------- | ---------------------------------------------------------------------------------------------------------------- | --------------- |
|
||||
| sys-net | *Your default network qube (pre-installed)* | *n/a* |
|
||||
| sys-firewall | *Your default firewall qube (pre-installed)* | sys-net |
|
||||
| sys-net | *デフォルトのネットワークキューブ(プリインストール済み)* | *なし* |
|
||||
| sys-firewall | *デフォルトのファイアウォールキューブ(プリインストール済み)* | sys-net |
|
||||
| ==sys-proxyvm== | The VPN ProxyVM you [created](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) | sys-firewall |
|
||||
| sys-whonix | Your Whonix Gateway VM | ==sys-proxyvm== |
|
||||
| anon-whonix | Your Whonix Workstation VM | sys-whonix |
|
||||
| sys-whonix | WhonixゲートウェイのVM | ==sys-proxyvm== |
|
||||
| anon-whonix | WhonixワークステーションのVM | sys-whonix |
|
||||
|
||||
## その他の資料
|
||||
|
||||
|
@ -481,7 +481,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
|
||||
|
||||
[詳細 :material-arrow-right-drop-circle:](router.md)
|
||||
|
||||
## Advanced Tools
|
||||
## 高度なツール
|
||||
|
||||
These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively.
|
||||
|
||||
|
@ -8,7 +8,7 @@
|
||||
*[CLI]: コマンドライン インターフェース
|
||||
*[CSV]: Comma-Separated Values
|
||||
*[CVE]: Common Vulnerabilities and Exposures
|
||||
*[デジタルレガシー機能]: デジタルレガシーとは、あなたが亡くなったときに、他の人にあなたのデータへのアクセスを許可する機能のことです。
|
||||
*[デジタルレガシー機能]: あなたが亡くなったときに、他の人にあなたのデータへのアクセスを許可する機能。
|
||||
*[DNSSEC]: Domain Name System Security Extensions
|
||||
*[DNS]: ドメインネームシステム
|
||||
*[DoH]: DNS over HTTPS
|
||||
@ -94,6 +94,6 @@
|
||||
*[UDP]: ユーザーデータグラムプロトコル(User Datagram Protocol)
|
||||
*[VPN]: 仮想プライベートネットワーク(Virtual Private Network)
|
||||
*[VoIP]: Voice over IP
|
||||
*[W3C]: World Wide Web Consortium
|
||||
*[W3C]: ワールド・ワイド・ウェブ・コンソーシアム(World Wide Web Consortium)
|
||||
*[XMPP]: Extensible Messaging and Presence Protocol
|
||||
*[PWA]: プログレッシブウェブアプリ(Progressive Web App)
|
||||
|
Loading…
x
Reference in New Issue
Block a user