1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-09-15 01:38:46 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2025-09-11 15:35:10 +00:00
parent e466b850b4
commit 41332a0a98
333 changed files with 4340 additions and 3680 deletions

View File

@@ -1,12 +1,12 @@
---
meta_title: The Best Android Operating Systems - Privacy Guides
title: Alternative Distributions
meta_title: "The Best Android Operating Systems - Privacy Guides"
title: "Alternative Distributions"
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
schema:
- "@context": http://schema.org
"@type": WebPage
name: Private Android Operating Systems
url: ./
url: "./"
- "@context": http://schema.org
"@type": CreativeWork
name: GrapheneOS
@@ -16,7 +16,7 @@ schema:
subjectOf:
"@context": http://schema.org
"@type": WebPage
url: ./
url: "./"
robots: nofollow, max-snippet:-1, max-image-preview:large
---

View File

@@ -1,11 +1,11 @@
---
title: General Apps
title: "General Apps"
description: The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
schema:
- "@context": http://schema.org
"@type": WebPage
name: General Android Apps
url: ./
url: "./"
- "@context": http://schema.org
"@type": MobileApplication
name: Shelter

View File

@@ -1,13 +1,13 @@
---
title: Android
title: "Android"
description: Our advice for replacing privacy-invasive default Android features with private and secure alternatives.
icon: simple/android
icon: 'simple/android'
cover: android.webp
schema:
- "@context": http://schema.org
"@type": WebPage
name: Android Recommendations
url: ./
url: "./"
- "@context": http://schema.org
"@type": CreativeWork
name: Android
@@ -38,7 +38,7 @@ There are also many private alternatives to the apps that come pre-installed on
When you buy an Android phone, the default operating system comes bundled with apps and functionality that are not part of the Android Open Source Project. Many of these apps—even apps like the dialer which provide basic system functionality—require invasive integrations with Google Play Services, which in turn asks for privileges to access your files, contacts storage, call logs, SMS messages, location, camera, microphone, and numerous other things on your device in order for those basic system apps and many other apps to function in the first place. Frameworks like Google Play Services increase the attack surface of your device and are the source of various privacy concerns with Android.
This problem could be solved by using an alternative Android distribution, commonly known as a _custom ROM_, that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require more permissive SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model.
This problem could be solved by using an alternative Android distribution, commonly known as a _custom ROM_, that does not come with such invasive integration. Unfortunately, many custom Android distributions often violate the Android security model by not supporting critical security features such as AVB, rollback protection, firmware updates, and so on. Some distributions also ship [`userdebug`](https://source.android.com/setup/build/building#choose-a-target) builds which expose root via [ADB](https://developer.android.com/studio/command-line/adb) and require [more permissive](https://github.com/LineageOS/android_system_sepolicy/search?q=userdebug&type=code) SELinux policies to accommodate debugging features, resulting in a further increased attack surface and weakened security model.
Idealnya, ketika memilih distribusi Android kustom, Anda harus memastikan bahwa distribusi tersebut menjunjung tinggi model keamanan Android. At the very least, the distribution should have production builds, support for AVB, rollback protection, timely firmware and operating system updates, and SELinux in [enforcing mode](https://source.android.com/security/selinux/concepts#enforcement_levels). All of our recommended Android distributions satisfy these criteria:

View File

@@ -1,5 +1,5 @@
---
title: Obtaining Applications
title: "Obtaining Applications"
description: We recommend these methods for obtaining applications on Android without interacting with Google Play Services.
---
@@ -86,26 +86,26 @@ If you download APK files to install manually, you can verify their signature wi
3. Extract the downloaded archive:
```bash
unzip commandlinetools-*.zip
cd cmdline-tools
./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3"
```
```bash
unzip commandlinetools-*.zip
cd cmdline-tools
./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3"
```
4. Run the signature verification command:
```bash
./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk
```
```bash
./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk
```
5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website.
```bash
Signer #1 certificate DN: CN=GrapheneOS
Signer #1 certificate SHA-256 digest: 6436b155b917c2f9a9ed1d15c4993a5968ffabc94947c13f2aeee14b7b27ed59
Signer #1 certificate SHA-1 digest: 23e108677a2e1b1d6e6b056f3bb951df7ad5570c
Signer #1 certificate MD5 digest: dbbcd0cac71bd6fa2102a0297c6e0dd3
```
```bash
Signer #1 certificate DN: CN=GrapheneOS
Signer #1 certificate SHA-256 digest: 6436b155b917c2f9a9ed1d15c4993a5968ffabc94947c13f2aeee14b7b27ed59
Signer #1 certificate SHA-1 digest: 23e108677a2e1b1d6e6b056f3bb951df7ad5570c
Signer #1 certificate MD5 digest: dbbcd0cac71bd6fa2102a0297c6e0dd3
```
## F-Droid