New Crowdin translations by GitHub Action
|
Before Width: | Height: | Size: 61 KiB After Width: | Height: | Size: 55 KiB |
|
Before Width: | Height: | Size: 50 KiB After Width: | Height: | Size: 53 KiB |
|
Before Width: | Height: | Size: 80 KiB After Width: | Height: | Size: 58 KiB |
|
Before Width: | Height: | Size: 69 KiB After Width: | Height: | Size: 57 KiB |
|
Before Width: | Height: | Size: 64 KiB After Width: | Height: | Size: 47 KiB |
|
Before Width: | Height: | Size: 52 KiB After Width: | Height: | Size: 46 KiB |
@@ -1,10 +1,10 @@
|
||||
---
|
||||
title: "刪除帳戶"
|
||||
icon: 'material/account-remove'
|
||||
description: 一般人很容易累積大量的網路服務帳戶,這裏有一些如何順理這些資料的小訣竅。
|
||||
title: 刪除帳戶
|
||||
icon: material/account-remove
|
||||
description: It's easy to accumulate a large number of internet accounts. Here are some tips on how to prune your collection.
|
||||
---
|
||||
|
||||
隨著時間的推移,一般人很容易地積累一些網路帳戶,但可能其中有不少早已不再使用。 刪除這些未使用的帳戶是收回隱私的重要一步,因為休眠帳戶容易受到數據洩露的影響。 資料外洩是指服務的安全性受到破壞,受保護的資訊被未經授權的行為者檢視、傳輸或竊取。 不幸的是近來資料外洩事件 [已見怪不怪](https://haveibeenpwned.com/PwnedWebsites) ,保持良好的數位清潔才能減輕資料外洩對個人生活的衝擊。 本指南的目標是幫助您通過令人討厭的帳戶刪除過程----往往透由 [欺騙性設計](https://deceptive.design)讓刪除困難,來改善網路現身。
|
||||
隨著時間的推移,一般人很容易地積累一些網路帳戶,但可能其中有不少早已不再使用。 刪除這些未使用的帳戶是收回隱私的重要一步,因為休眠帳戶容易受到數據洩露的影響。 A data breach occurs when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. 不幸的是近來資料外洩事件 [已見怪不怪](https://haveibeenpwned.com/PwnedWebsites) ,保持良好的數位清潔才能減輕資料外洩對個人生活的衝擊。 本指南的目標是幫助您通過令人討厭的帳戶刪除過程----往往透由 [欺騙性設計](https://deceptive.design)讓刪除困難,來改善網路現身。
|
||||
|
||||
## 查找舊帳戶
|
||||
|
||||
@@ -16,14 +16,13 @@ description: 一般人很容易累積大量的網路服務帳戶,這裏有一
|
||||

|
||||
</figure>
|
||||
|
||||
即使您之前沒有明確使用過密碼管理器,但可能在無意中早已透過瀏覽器或手機中使用了密碼管理器。 例如: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336).
|
||||
Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser ([Firefox](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Chrome](https://passwords.google.com/intro), [Edge](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336)) or your phone ([Google](https://passwords.google.com/intro) on stock Android, [Passwords](https://support.apple.com/HT211146) on iOS) without even realizing it.
|
||||
|
||||
桌面平臺通常還有一個密碼管理器,可以幫助您恢復忘記的密碼:
|
||||
|
||||
- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0)
|
||||
- macOS [Passwords](https://support.apple.com/HT211145)
|
||||
- iOS [Passwords](https://support.apple.com/HT211146)
|
||||
- Linux, Gnome Keyring, 可透過 [Seahorse](https://wiki.gnome.org/Apps/Seahorse) 或 [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager)來取用。
|
||||
- Windows: [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0)
|
||||
- macOS: [Passwords](https://support.apple.com/HT211145)
|
||||
- Linux: Gnome Keyring (accessed through [Seahorse](https://gitlab.gnome.org/GNOME/seahorse#seahorse)) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager)
|
||||
|
||||
### 電子郵件
|
||||
|
||||
|
||||
@@ -97,11 +97,11 @@ Modifications other than adjusting this setting would make your fingerprint uniq
|
||||
|
||||
### 防止指紋識別
|
||||
|
||||
在**不**使用 [VPN](vpn.md) 的情況下,Mullvad 瀏覽器可提供與其他隱私瀏覽器 (例如 Firefox + [Arkenfox](#arkenfox-advanced) 或 [Brave](#brave)) 相同的防護措施,以對抗[單純的指紋辨識腳本](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting)。 Mullvad 瀏覽器在開箱即用的情況下提供了這些保護措施,代價是可能會犧牲其他隱私瀏覽器所具備的靈活性和便利性。
|
||||
**Without** using a [VPN](vpn.md), Mullvad Browser provides protections against [naive fingerprinting scripts](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) similar to other private browsers like Firefox+[Arkenfox](#arkenfox-advanced) or [Brave](#brave). Mullvad 瀏覽器在開箱即用的情況下提供了這些保護措施,代價是可能會犧牲其他隱私瀏覽器所具備的靈活性和便利性。
|
||||
|
||||
==要獲得最強大的防指紋辨識防護,我們建議將 Mullvad 瀏覽器 **搭配** VPN 一同使用== ,不論是 Mullvad 或其他推薦的 VPN 供應商皆可。 當您將 VPN 與 Mullvad 瀏覽器搭配使用時,您將與許多其他使用者共用一個指紋和 IP 位址池,以讓你混在「人群」之中。 這個策略是阻止進階追蹤腳本的唯一方法,也同樣是 Tor 瀏覽器使用的防指紋辨識技術。
|
||||
|
||||
請注意,雖然您可以將 Mullvad 瀏覽器與任何 VPN 供應商一起使用,但該 VPN 上的其他使用者也必須使用 Mullvad 瀏覽器,才能形成這個「人群」,而這在 Mullvad VPN 上比其他供應商更有可能發生,特別是在 Mullvad 瀏覽器推出後不久。 Mullvad 瀏覽器沒有內建 VPN,也不會在瀏覽之前檢查是否使用 VPN,必須另外設定和管理 VPN 連線。
|
||||
Note that while you can use Mullvad Browser with any VPN provider, other people on that VPN must also be using Mullvad Browser for this "crowd" to exist, something which is more likely on Mullvad VPN compared to other providers. Mullvad 瀏覽器沒有內建 VPN,也不會在瀏覽之前檢查是否使用 VPN,必須另外設定和管理 VPN 連線。
|
||||
|
||||
Mullvad 瀏覽器附帶預先安裝的 *uBlock Origin* 和 *NoScript* 擴充功能。 我們通常不建議新增*額外*的[瀏覽器擴充功能](browser-extensions.md),且這些與瀏覽器預裝的擴充功能**不**應移除或修改成任何預設值以外的設定,一旦隨意更動,您的瀏覽器指紋會明顯有別於其他 Mullvad 瀏覽器使用者。 它還預先安裝了 Mullvad 瀏覽器擴充功能,但也*可*將其安全地移除,而不會影響您的瀏覽器指紋,但即使您不使用 Mullvad VPN,也可以安全地保留它。
|
||||
|
||||
@@ -223,7 +223,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s
|
||||
<div class="admonition tip" markdown>
|
||||
<p class="admonition-title">使用 Mullvad 瀏覽器以防止更進階的指紋識別</p>
|
||||
|
||||
[Mullvad 瀏覽器](#mullvad-browser) 提供與 Arkenfox 相同的防指紋保護,不需要使用 Mullvad VPN 就能獲得這些保護。 結合 VPN 使用時,Mullvad 瀏覽器 能夠阻擋 Arkenfox 無法處理的進階追蹤腳本。 相較之下,Arkenfox 仍然具有更高的靈活性,可以對需要保持登入狀態的個別網站設定例外。
|
||||
[Mullvad Browser](#mullvad-browser) provides stronger anti-fingerprinting protections out of the box than Firefox, and does not require the use of Mullvad's VPN to benefit from these protections. 結合 VPN 使用時,Mullvad 瀏覽器 能夠阻擋 Arkenfox 無法處理的進階追蹤腳本。 Firefox still has the advantage of being much more flexible, and allowing per-site exceptions for websites which you need to stay logged in to.
|
||||
|
||||
</div>
|
||||
|
||||
|
||||
@@ -99,11 +99,9 @@ Note that Bluetooth is automatically turned on after every system update.
|
||||
|
||||
預設情況中,您的 iPhone 裝置名稱將包含您的名字,所連接的網路中的其它人都可以看到該名稱。 所以應該將其更改為更一般的名稱,例如“iPhone”。 Select **About** → **Name** and enter the device name you prefer.
|
||||
|
||||
經常安裝 **軟體更新** 以獲得最新的安全修復非常重要。 您可以啟用 **自動更新** ,以保持手機最新,而無需不斷檢查更新。 選擇**軟體更新**→**自動更新**:
|
||||
It is important to install software updates frequently to get the latest security fixes. You can enable automatic updates to keep your phone up-to-date without needing to constantly check for updates. 選擇**軟體更新**→**自動更新**:
|
||||
|
||||
- [x] 打開 **(自動下載類別)iOS 更新項目**
|
||||
- [x] 打開 **(自動安裝類別) iOS 更新項目**
|
||||
- [x] 打開 **安全回應與系統檔案**
|
||||
- [x] Turn on **Automatically Install**
|
||||
|
||||
**AirDrop** is commonly used to easily share files, but it represents a significant privacy risk. The AirDrop protocol constantly broadcasts your personal information to your surroundings, with [very weak](https://usenix.org/system/files/sec21-heinrich.pdf) security protections. Your identity can easily be discovered by attackers even with limited resources, and the Chinese government has [openly acknowledged](https://arstechnica.com/security/2024/01/hackers-can-id-unique-apple-airdrop-users-chinese-authorities-claim-to-do-just-that) using such techniques to identify AirDrop users in public since 2022.
|
||||
|
||||
@@ -117,7 +115,19 @@ Note that Bluetooth is automatically turned on after every system update.
|
||||
|
||||
選擇 **背景 App 重新整理** 並切掉無需在背景下繼續刷新的應用。 若不想讓任何 apps 在背景刷新,可再次選擇 **背景 App 重新整理** 並將其 **關閉**。
|
||||
|
||||
#### Siri & 尋找
|
||||
#### Apple Intelligence & Siri
|
||||
|
||||
This is available if your device supports **[Apple Intelligence](https://support.apple.com/guide/iphone/apple-intelligence-and-privacy-iphe3f499e0e/ios)**. Apple Intelligence uses a combination of on-device processing and their **[Private Cloud Compute](https://security.apple.com/blog/private-cloud-compute)** for things that take more processing power than your device can provide.
|
||||
|
||||
To see a report of all the requests made to Apple's servers, you can navigate to **Privacy & Security** → **Apple Intelligence Report** and press **Export Activity** to see activity from the either the last 15 minutes or 7 days, depending on what you set it for. Similar to the **App Privacy Report** which shows you the recent permissions accessed by the apps on your phone, the Apple Intelligence Report likewise shows what is being sent to Apple's servers while using Apple Intelligence.
|
||||
|
||||
Apple Intelligence can integrate with [ChatGPT](https://support.apple.com/guide/iphone/use-chatgpt-with-apple-intelligence-iph00fd3c8c2/ios). If you want ChatGPT integration, you can navigate to **ChatGPT** and press **Set Up**. If you want to disable it, go to the same place:
|
||||
|
||||
- [ ] Turn off **Use ChatGPT**
|
||||
|
||||
You can also have it ask for confirmation every time if you leave ChatGPT integration on:
|
||||
|
||||
- [x] Turn on **Confirm Requests**
|
||||
|
||||
如果不希望任何人在鎖定時使用 Siri 控制您的手機,可以在此處將其關閉。
|
||||
|
||||
@@ -131,28 +141,17 @@ Note that Bluetooth is automatically turned on after every system update.
|
||||
|
||||
如果想使用 Face ID 或 Touch ID,可以立即進行設定。 您的手機將使用之前設定的密碼作為後備密碼,以防生物識別驗證失敗。 生物識別解鎖方法主要是便利,雖然它們確實可以阻止監控攝像頭或身旁的人看到您所輸入的密碼。
|
||||
|
||||
如果使用生物識別技術,應該知道如何在緊急情況下快速關閉它們。 按住側面按鈕或電源按鈕以及*任一*音量按鈕,直到看到滑動關閉滑塊為止,這將禁用生物識別功能,需要密碼才能解鎖。 設備重新啟動後還需要您的密碼。
|
||||
如果使用生物識別技術,應該知道如何在緊急情況下快速關閉它們。 Holding down the [side button](https://support.apple.com/en-us/105103) and *either* volume button until you see the Slide to Power Off slider will disable biometrics, requiring your passcode to unlock. Your passcode will be required after your device restarts.
|
||||
|
||||
On some older devices, you may have to press the power button five times to disable biometrics instead, or for devices with Touch ID, you may just have to hold down the power button and nothing else. Make sure you try this in advance, so you know which method works for your device.
|
||||
You can similarly disable biometrics by pressing the side button five times, or for devices with Touch ID, you can hold down the side button and nothing else. Make sure you try this in advance, so you know which method works for your device.
|
||||
|
||||
**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you use biometrics and the Find My Device feature in your Apple Account settings, we recommend enabling this new protection:
|
||||
**Stolen Device Protection** adds additional security intended to protect your personal data if your device is stolen while unlocked. If you enable both biometric authentication and the [Find My](#find-my) iPhone feature, we recommend enabling this protection:
|
||||
|
||||
- [x] 選擇**開啟保護**
|
||||
- [x] Turn on **Stolen Device Protection**
|
||||
|
||||
啟用被盜設備保護後,[某些操作](https://support.apple.com/HT212510)將需要生物識別身份驗證,無需密碼回退(如果駭客准竊盜已獲得您的 PIN),例如使用密碼自動填寫功能就可訪問支付資訊並關閉遺失模式。 It also adds a security delay to certain actions performed away from your home or another "familiar location," such as requiring a 1-hour timer to reset your Apple Account password or sign out of your Apple Account. 此延遲是為了有時間啟用遺失模式並在小偷重置設備前保護好您的帳戶。
|
||||
|
||||
**鎖定時允許存取** 提供您在手機鎖定時可以允許的選項。 禁用的這些選項越多,沒有密碼者可做的事情就越少,但對您來說也就更不方便。 選擇不希望其他人接觸您的手機後訪問其中哪些內容。
|
||||
|
||||
- [ ] 關閉 **今天概覽和搜尋**
|
||||
- [ ] 關閉 **通知中心**
|
||||
- [ ] 關閉 **控制中心**
|
||||
- [ ] 關閉 **鎖定畫面小工具**
|
||||
- [ ] 關閉 **Siri**
|
||||
- [ ] 關閉 **以 Message 回覆**
|
||||
- [ ] 關閉 **家庭控制**
|
||||
- [ ] 關閉 **錢包**
|
||||
- [ ] 關閉 **回撥未接來電**
|
||||
- [ ] 關閉 **USB 配件**
|
||||
**Allow Access When Locked** presents options for what you can allow when your phone is locked. Pick and choose which feature you want to disable to prevent unauthorized access if someone gets their hands on your phone. 禁用的這些選項越多,沒有密碼者可做的事情就越少,但對您來說也就更不方便。
|
||||
|
||||
iPhone 可以抵禦暴力攻擊,在多次嘗試失敗後,需要等待很長時間; 然而,過去已經有一些漏洞可以繞開這個問題。 為了更加安全,可將手機設定為在 10 次密碼嘗試錯誤後自行擦除。
|
||||
|
||||
@@ -187,17 +186,9 @@ iPhone 可以抵禦暴力攻擊,在多次嘗試失敗後,需要等待很長
|
||||
|
||||
- [ ] 關閉 **感應器 & 使用資料收集**
|
||||
|
||||
**安全檢查**可讓您快速查看和撤銷可能有權訪問您資料的某些人員和應用。 可在此處執行**緊急重設**,立即重設可能有權存取設備資源的所有人員和應用程式權限。 也可以**管理共享和共享存取權限**讓您查看並自訂有權存取裝置和帳戶資源的人員和內容。
|
||||
**[Safety Check](https://support.apple.com/guide/personal-safety/safety-check-iphone-ios-16-ips2aad835e1/1.0/web/1.0)** allows you to quickly view and revoke certain people and apps that might have permission to access your data. Here, you can perform an **Emergency Reset**, immediately resetting permissions for all people and apps which might have access to device resources. You can also **Manage Sharing & Access**, which allows you to review and customize who and what has access to your device and account resources. If you're in an abusive situation, read Apple's [Personal Safety User Guide](https://support.apple.com/guide/personal-safety/welcome/web) for guidance on what you should do.
|
||||
|
||||
如不想發送 Apple 使用資料,應該禁用該分析。 選擇 **分析與改進功能**:
|
||||
|
||||
- [ ] 關閉**分享 iPhone 分析** 或 **分享 iPhone & Watch 分析**
|
||||
- [ ] 關閉 **分享 iCloud 分析**
|
||||
- [ ] 關閉 **改善 Fitness+**
|
||||
- [ ] 關閉 **改進安全性**
|
||||
- [ ] 關閉 **改進 Siri 與聽寫**
|
||||
- [ ] Turn off **Improve Assistive Voice Features**
|
||||
- [ ] Turn off **Improve AR Location Accuracy**
|
||||
You should disable analytics if you don't wish to send usage data to Apple. Select **Analytics & Improvements** and unselect the type(s) of analytics that you don't want to send to Apple.
|
||||
|
||||
關閉 **個人化廣告** 如不願加入針對式行銷。 選擇 **Apple 廣告**:
|
||||
|
||||
@@ -207,7 +198,11 @@ iPhone 可以抵禦暴力攻擊,在多次嘗試失敗後,需要等待很長
|
||||
|
||||
- [x] 選擇 **開啟 App 隱私權報告**
|
||||
|
||||
[封閉模式](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode)是可以啟用的安全設定使手機更能抵抗攻擊。 請注意,某些應用和功能[將無法正常運作](https://support.apple.com/HT212650)。
|
||||
Set wired accessories to ask for permission when you connect them. Select **Wired Accessories**:
|
||||
|
||||
- [x] Select **Always Ask** or **Ask for New Accessories**
|
||||
|
||||
**[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode)** is a security setting you can enable to make your phone more resistant to attacks. 請注意,某些應用和功能[將無法正常運作](https://support.apple.com/HT212650)。
|
||||
|
||||
- [x] 選擇 **開啟封閉模式**
|
||||
|
||||
@@ -221,7 +216,13 @@ iPhone 可以抵禦暴力攻擊,在多次嘗試失敗後,需要等待很長
|
||||
|
||||
The [color of the message bubble](https://support.apple.com/en-us/104972) in the Messages app indicates whether your messages are E2EE or not. A blue bubble indicates that you're using iMessage with E2EE, while a green bubble indicates the other party is using either the outdated SMS and MMS protocols or RCS. RCS on iOS is **not** E2EE. Currently, the only way to have E2EE in Messages is for both parties to be using iMessage on Apple devices.
|
||||
|
||||
如果您或您的訊息傳遞夥伴在沒有進階資料保護下啟用 iCloud 備份,則加密金鑰會儲存在 Apple 伺服器,這意味著他們可以訪問您的訊息。 Additionally, iMessage's key exchange is not as secure as alternative implementations like Signal's (which allows you to view the recipients key and verify by QR code), so it shouldn't be relied on for particularly sensitive communications.
|
||||
如果您或您的訊息傳遞夥伴在沒有進階資料保護下啟用 iCloud 備份,則加密金鑰會儲存在 Apple 伺服器,這意味著他們可以訪問您的訊息。
|
||||
|
||||
By default, you trust Apple's identity servers that you're messaging the right person. To defend yourself from a potentially malicious server, you can enable **[Contact Key Verification](https://support.apple.com/en-us/118246)**. At the top of the **Settings** app where your name is, select it, then go to **Contact Key Verification**.
|
||||
|
||||
- [x] Turn on **Verification in iMessage**
|
||||
|
||||
Both you and your contacts need to enable Contact Key Verification and follow Apple's [instructions](https://support.apple.com/en-us/118246#verify) for the security assurances mentioned above to take effect.
|
||||
|
||||
### Photo Permissions
|
||||
|
||||
@@ -251,23 +252,40 @@ In addition to locking apps behind biometrics, you can also hide apps so that th
|
||||
|
||||
You can hide an app by long-pressing on it and selecting **Require Face ID/Touch ID** → **Hide and Require Face ID/Touch ID**. Note that pre-installed Apple apps, as well as the default web browser and email app, cannot be hidden. Hidden apps reside in a **Hidden** folder at the bottom of the App Library, which can be unlocked using biometrics. This folder appears in the App Library whether you hid any apps or not, which provides you a degree of plausible deniability.
|
||||
|
||||
### Guided Access
|
||||
|
||||
Sometimes you might want to hand your phone to someone to make a call or do a specific task, but you don't want them to have full access to your phone. In these cases, you can quickly enable **[Guided Access](https://support.apple.com/guide/iphone/lock-iphone-to-one-app-iph7fad0d10/ios)** to lock the phone to one specific app until you authenticate.
|
||||
|
||||
<div class="admonition warning" markdown>
|
||||
<p class="admonition-title">警告</p>
|
||||
|
||||
Guided Access isn't foolproof, as it's possible you could leak data unintentionally or the feature could be bypassed. You should only use Guided Access for situations where you casually hand your phone to someone to use. You should not use it as a tool to protect against advanced adversaries.
|
||||
|
||||
</div>
|
||||
|
||||
### Redacting Elements in Images
|
||||
|
||||
If you need to hide information in a photo, you can use Apple's built-in editing tools to do so.
|
||||
|
||||
If your device supports it, you can use the [Clean Up](https://support.apple.com/en-us/121429) feature to pixelate faces or remove objects from images.
|
||||
You can use the [Clean Up](https://support.apple.com/en-us/121429) feature on supported devices to pixelate faces or remove objects from images.
|
||||
|
||||
- Open the **Photos** app and tap the photo you have selected for redaction
|
||||
- Tap the :material-tune: (at the bottom of the screen)
|
||||
- Tap the :material-tune:
|
||||
- Tap the button labeled **Clean Up**
|
||||
- Draw a circle around whatever you want to redact. Faces will be pixelated, and it will attempt to delete anything else.
|
||||
|
||||
Our warning [against blurring text](../data-redaction.md) also applies here, so we recommend to instead add a black shape with 100% opacity over it. In addition to redacting text, you can also black out any face or object using the **Photos** app.
|
||||
|
||||
<div class="annotate" markdown>
|
||||
|
||||
- Tap the image you have selected for redaction
|
||||
- Tap the :material-tune: (at the bottom of the screen) → markup symbol (top right) → plus icon at the bottom right
|
||||
- Tap the :material-tune: → :material-dots-horizontal: (1) → Markup → :material-plus:
|
||||
- Select **Add Shape** and choose the square or circle
|
||||
- On the toolbar, tap the circle (left-most option) and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit.
|
||||
- On the toolbar, tap the circle and choose black as the color for filling in the shape. You can also move the shape and increase its size as you see fit.
|
||||
|
||||
</div>
|
||||
|
||||
1. This may not appear on certain iPhone models.
|
||||
|
||||
**Don't** use the highlighter to obfuscate information, as its opacity is not quite 100%.
|
||||
|
||||
@@ -284,3 +302,11 @@ Apple 會為那些希望幫助查找和報告錯誤的人先提供 iOS 測試版
|
||||
### Before First Unlock(初次解鎖之前)
|
||||
|
||||
If your threat model includes [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} that involve forensic tools, and you want to minimize the chance of exploits being used to access your phone, you should restart your device frequently. 重啟後**解鎖設備**之前的狀態稱為“首次解鎖之前”(BFU) ,當設備處於該狀態時,取證鑑識工具[明顯更加困難](https://belkasoft.com/checkm8_glossary)利用漏洞訪問您的資料。 此 BFU 狀態允許您接收電話、簡訊和鬧鐘通知,但設備上的大部分資料為加密且無法訪問。 這可能不切實際,因此請考慮權衡這個作法對於自身情況是否有意義。
|
||||
|
||||
iPhones [automatically reboot](https://support.apple.com/guide/security/protecting-user-data-in-the-face-of-attack-secf5549a4f5/1/web/1#:~:text=On%20an%20iPhone%20or%20iPad%20with%20iOS%2018%20and%20iPadOS%2018%20or%20later%2C%20a%20new%20security%20protection%20will%20restart%20devices%20if%20they%20remain%20locked%20for%20a%20prolonged%20period%20of%20time.) if they're not unlocked after a period of time.
|
||||
|
||||
### MTE
|
||||
|
||||
The iPhone 17 line and later offer a security enhancement called [Memory Tagging Extension](https://developer.arm.com/documentation/108035/0100/Introduction-to-the-Memory-Tagging-Extension) (MTE), which makes it significantly harder for an attacker to exploit memory corruption vulnerabilities. This always-on protection depends on hardware support, so it's not available for older devices.
|
||||
|
||||
For more details on Apple's implementation of MTE, read the [blog post](https://security.apple.com/blog/memory-integrity-enforcement) published by Apple Security Research. We also cover Apple's implementation of MTE and how it compares to Android's implementation in the Google Pixel 8 series and later in our [own article](https://www.privacyguides.org/posts/2025/09/20/memory-integrity-enforcement-changes-the-game-on-ios).
|
||||
|
||||