1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-12-17 12:02:15 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2025-11-27 15:36:02 +00:00
parent 9fc1706926
commit 5136454c93
5 changed files with 44 additions and 44 deletions

View File

@@ -1,6 +1,6 @@
--- ---
title: "PrivacyTools FAQ" title: "PrivacyTools FAQ"
description: The real story behind the team transition from privacytools.io to privacyguides.org description: Het echte verhaal achter de teamtransitie van privacytools.io naar privacyguides.org
--- ---
In september 2021 hebben alle actieve medewerkers unaniem ingestemd om van PrivacyTools over te stappen naar deze site: Privacy Guides. Deze beslissing werd genomen omdat de oprichter van PrivacyTools en beheerder van de domeinnaam voor langere tijd was verdwenen en niet kon worden gecontacteerd. In september 2021 hebben alle actieve medewerkers unaniem ingestemd om van PrivacyTools over te stappen naar deze site: Privacy Guides. Deze beslissing werd genomen omdat de oprichter van PrivacyTools en beheerder van de domeinnaam voor langere tijd was verdwenen en niet kon worden gecontacteerd.

View File

@@ -1,15 +1,15 @@
--- ---
title: Browser Extensions title: Browserextensies
icon: material/puzzle-outline icon: material/puzzle-outline
description: These browser extensions can enhance your browsing experience and protect your privacy. description: Deze browserextensies kunnen je browserervaring verbeteren en je privacy beschermen.
cover: browser-extensions.webp cover: browser-extensions.webp
--- ---
<small>Protects against the following threat(s):</small> <small>Beschermt tegen de volgende bedreiging(en):</small>
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } - [:material-account-cash: Surveillance Capitalisme](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface. They have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. Over het algemeen raden we aan om je browserextensies tot een minimum te beperken om je aanvalsoppervlak te verkleinen. They have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation.
However, some provide functionality which can outweigh these downsides in certain situations, particularly when it comes to [content blocking](basics/common-threats.md#mass-surveillance-programs). However, some provide functionality which can outweigh these downsides in certain situations, particularly when it comes to [content blocking](basics/common-threats.md#mass-surveillance-programs).
@@ -41,11 +41,11 @@ Don't install extensions which you don't immediately have a need for, or ones th
</div> </div>
We suggest following the [developer's documentation](https://github.com/gorhill/uBlock/wiki/Blocking-mode) and picking one of the "modes". Additional filter lists can impact performance and [may increase attack surface](https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css). We raden aan om de [documentatie van de ontwikkelaar](https://github.com/gorhill/uBlock/wiki/Blocking-mode) te volgen en een van de "modi" te kiezen. Additional filter lists can impact performance and [may increase attack surface](https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css).
These are some other [filter lists](https://github.com/gorhill/uBlock/wiki/Dashboard:-Filter-lists) that you may want to consider adding: These are some other [filter lists](https://github.com/gorhill/uBlock/wiki/Dashboard:-Filter-lists) that you may want to consider adding:
- [x] Check **Privacy** > **AdGuard URL Tracking Protection** - [x] Controleer **Privacy** > **AdGuard URL Tracking Protection**
- Add [Actually Legitimate URL Shortener Tool](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt) - Add [Actually Legitimate URL Shortener Tool](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt)
### uBlock Origin Lite ### uBlock Origin Lite
@@ -88,18 +88,18 @@ uBlock Origin Lite only receives block list updates whenever the extension is up
### AdGuard ### AdGuard
We recommend [Safari](mobile-browsers.md#safari-ios) for iOS users, which unfortunately is not supported by uBlock Origin. Luckily, AdGuard provides an adequate alternative: Wij raden [Safari](mobile-browsers.md#safari-ios) aan voor iOS-gebruikers, die helaas niet wordt ondersteund door uBlock Origin. Gelukkig biedt AdGuard een geschikt alternatief:
<div class="admonition recommendation" markdown> <div class="admonition recommendation" markdown>
![AdGuard logo](assets/img/browsers/adguard.svg){ align=right } ![AdGuard-logo](assets/img/browsers/adguard.svg){ align=right }
**AdGuard for iOS** is a free and open-source content-blocking extension for Safari that uses the native [Content Blocker API](https://developer.apple.com/documentation/safariservices/creating_a_content_blocker). **AdGuard voor iOS** is een gratis en open-source inhoud-blokkerende extensie voor Safari die gebruik maakt van de native [Content Blocker API](https://developer.apple.com/documentation/safariservices/creating_a_content_blocker).
[:octicons-home-16: Homepage](https://adguard.com/en/adguard-ios/overview.html){ .md-button .md-button--primary } [:octicons-home-16: Homepage](https://adguard.com/en/adguard-ios/overview.html){ .md-button .md-button--primary }
[:octicons-eye-16:](https://adguard.com/privacy/ios.html){ .card-link title="Privacy Policy" } [:octicons-eye-16:](https://adguard.com/privacy/ios.html){ .card-link title="Privacybeleid" }
[:octicons-info-16:](https://kb.adguard.com/ios){ .card-link title=Documentation} [:octicons-info-16:](https://kb.adguard.com/ios){ . ard-link title=Documentatie}
[:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Source Code" } [:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Broncode" }
<details class="downloads" markdown> <details class="downloads" markdown>
<summary>Downloads</summary> <summary>Downloads</summary>

View File

@@ -5,7 +5,7 @@ description: Ontdek hoe je jouw bestanden privé kunt delen tussen jouw apparate
cover: file-sharing.webp cover: file-sharing.webp
--- ---
<small>Protects against the following threat(s):</small> <small>Beschermt tegen de volgende bedreiging(en):</small>
- [:material-server-network: Dienstverleners](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} - [:material-server-network: Dienstverleners](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal}

View File

@@ -1,68 +1,68 @@
--- ---
title: Mobile Phones title: Mobiele telefoons
icon: material/cellphone-check icon: materiaal/cellphone-check
description: These mobile devices provide the best hardware security support for custom Android operating systems. description: Deze mobiele apparaten bieden de beste hardwarebeveiligingsondersteuning voor aangepaste Android-besturingssystemen.
cover: android.webp cover: android.webp
schema: schema:
- "@context": http://schema.org - "@context": http://schema.org
"@type": WebPage "@type": WebPage
name: Mobile Phone Recommendations name: Aanbevelingen voor mobiele telefoons
url: "./" url: "./"
- "@context": http://schema.org - "@context": http://schema.org
"@type": Product "@type": Product
name: Pixel name: Pixel
brand: brand:
"@type": Brand "@type": Merk
name: Google name: Google
image: /assets/img/android/google-pixel.png image: /assets/img/android/google-pixel.png
sameAs: https://en.wikipedia.org/wiki/Google_Pixel sameAs: https://en.wikipedia.org/wiki/Google_Pixel
review: review:
"@type": Review "@type": Beoordeling
author: author:
"@type": Organization "@type": Organisatie
name: Privacy Guides name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large robots: nofollow, max-snippet:-1, max-image-preview:large
--- ---
<small>Protects against the following threat(s):</small> <small>Beschermt tegen de volgende bedreiging(en):</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red } - [:material-target-account: Gerichte aanvallen](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red }
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange } - [:material-bug-outline: Passieve aanvallen](basics/common-threats.md#security-and-privacy){ .pg-orange }
Most **mobile phones** receive short or limited windows of security updates from OEMs; after these devices reach the end of their support period, they **cannot** be considered secure as they no longer receive firmware or driver security updates. Most **mobile phones** receive short or limited windows of security updates from OEMs; after these devices reach the end of their support period, they **cannot** be considered secure as they no longer receive firmware or driver security updates.
The mobile devices listed here provide a long lifespan of guaranteed security updates and allow you to install a custom operating system without violating the Android security model. The mobile devices listed here provide a long lifespan of guaranteed security updates and allow you to install a custom operating system without violating the Android security model.
[Recommended Android Distributions :material-arrow-right-drop-circle:](android/distributions.md){ .md-button .md-button--primary } [Details about Android Security :material-arrow-right-drop-circle:](os/android-overview.md#security-protections){ .md-button } [Aanbevolen Android distributies :material-arrow-right-drop-circle:](android/distributions.md){ .md-button .md-button--primary } [Details over Android beveiliging :material-arrow-right-drop-circle:](os/android-overview.md#security-protections){ .md-button }
<div class="admonition warning" markdown> <div class="admonition warning" markdown>
<p class="admonition-title">Waarschuwing</p> <p class="admonition-title">Waarschuwing</p>
End-of-life devices (such as GrapheneOS's "extended support" devices) do not have full security patches (firmware updates) due to the OEM discontinuing support. These devices cannot be considered completely secure regardless of installed software. End-of-life apparaten (zoals de 'extended support' apparaten van GrapheneOS) hebben geen volledige beveiligingspatches (firmware-updates) omdat de OEM de ondersteuning heeft stopgezet. Deze apparaten kunnen niet als volledig veilig worden beschouwd, ongeacht de geïnstalleerde software.
</div> </div>
## General Purchasing Advice ## Algemeen aankoopadvies
When purchasing a device, we recommend getting one as new as possible. The software and firmware of mobile devices are only supported for a limited time, so buying new extends that lifespan as much as possible. Als je een apparaat koopt, raden we aan om het zo nieuw mogelijk te kopen. The software and firmware of mobile devices are only supported for a limited time, so buying new extends that lifespan as much as possible.
Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution.
Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. Be very **careful** about buying second hand phones from online marketplaces. Controleer altijd de reputatie van de verkoper. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner.
A few more tips regarding Android devices and operating system compatibility: A few more tips regarding Android devices and operating system compatibility:
- Do not buy devices that have reached or are near their end-of-life; additional firmware updates must be provided by the manufacturer. - Do not buy devices that have reached or are near their end-of-life; additional firmware updates must be provided by the manufacturer.
- Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with.
- In short, if a device is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! - Kortom, als een apparaat hier niet tussen staat, is daar waarschijnlijk een goede reden voor. Kijk op ons [forum](https://discuss.privacyguides.net) voor meer informatie!
## Google Pixel ## Google Pixel
Google Pixel phones are the **only** devices we recommend for purchase. Pixel phones have stronger hardware security than any other Android devices currently on the market, due to proper AVB support for third-party operating systems and Google's custom [Titan](https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html) security chips acting as the Secure Element. Google Pixel-telefoons zijn de **enige** apparaten die we aanraden om te kopen. Pixel phones have stronger hardware security than any other Android devices currently on the market, due to proper AVB support for third-party operating systems and Google's custom [Titan](https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html) security chips acting as the Secure Element.
<div class="admonition recommendation" markdown> <div class="admonition recommendation" markdown>
![Google Pixel 6](assets/img/android/google-pixel.png){ align=right } Google Pixel 6](assets/img/android/google-pixel.png){ align=right }
**Google Pixel** devices are known to have good security and properly support [Verified Boot](https://source.android.com/security/verifiedboot), even when installing custom operating systems. **Google Pixel** devices are known to have good security and properly support [Verified Boot](https://source.android.com/security/verifiedboot), even when installing custom operating systems.
@@ -72,7 +72,7 @@ Beginning with the **Pixel 8** and **8 Pro**, Pixel devices receive a minimum of
</div> </div>
### Hardware Security ### Hardware Beveiliging
Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment (TEE) used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for _all_ of those functions, resulting in a larger attack surface. Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment (TEE) used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for _all_ of those functions, resulting in a larger attack surface.
@@ -80,9 +80,9 @@ Google Pixel phones use a TEE OS called Trusty which is [open source](https://so
The Pixel 8 series and later supports ARM's Memory Tagging Extension ([MTE](https://developer.arm.com/documentation/108035/0100/Introduction-to-the-Memory-Tagging-Extension)), a hardware security enhancement that drastically lowers the probability of exploits occurring through memory corruption bugs. The stock Pixel OS allows you to enable MTE for supported apps through Google's Advanced Protection Program or via a developer option, but its usability is quite limited. [GrapheneOS](android/distributions.md#grapheneos), an alternative Android OS we recommend, greatly improves the usability and coverage of MTE in its implementation of the feature. The Pixel 8 series and later supports ARM's Memory Tagging Extension ([MTE](https://developer.arm.com/documentation/108035/0100/Introduction-to-the-Memory-Tagging-Extension)), a hardware security enhancement that drastically lowers the probability of exploits occurring through memory corruption bugs. The stock Pixel OS allows you to enable MTE for supported apps through Google's Advanced Protection Program or via a developer option, but its usability is quite limited. [GrapheneOS](android/distributions.md#grapheneos), an alternative Android OS we recommend, greatly improves the usability and coverage of MTE in its implementation of the feature.
### Buying a Google Pixel ### Een Google Pixel kopen
A few more tips for purchasing a Google Pixel: Nog een paar tips voor de aanschaf van een Google Pixel:
- If you're after a bargain on a Pixel device, we suggest buying an "**a**" model, just after the next flagship is released. Discounts are usually available because Google will be trying to clear their stock. - If you're after a bargain on a Pixel device, we suggest buying an "**a**" model, just after the next flagship is released. Discounts are usually available because Google will be trying to clear their stock.
- Consider price beating options and specials offered at physical stores. - Consider price beating options and specials offered at physical stores.

View File

@@ -21,23 +21,23 @@ description: 參與 Pull Request 討論的指南。
若要對 PR 留下_一般性_的註解請點擊檔案右方的 :octicons-comment-16: 評論圖示: 若要對 PR 留下_一般性_的註解請點擊檔案右方的 :octicons-comment-16: 評論圖示:
![Screenshot of an image file on the "Files changed" page of a pull request. To the right of the file, a comment icon is outlined in orange.](https://docs.github.com/assets/cb-73771/mw-1440/images/help/pull_requests/pull-request-comment-on-file.webp) ![Pull request 的 "Files changed" 頁面當中圖檔的擷圖。 檔案右側,註解圖示有橘色外框。](https://docs.github.com/assets/cb-73771/mw-1440/images/help/pull_requests/pull-request-comment-on-file.webp)
If the PR has multiple files changed, comment on the primary or most relevant file changed, or comment on the first file if you can't decide. 如果 PR 一次變更了多個檔案,則只註解主要或最相關的變更檔案;如果無法決定,則註解在第一個檔案。
To leave a comment _on a specific line_ of a PR, hover over the line where you'd like to add a comment, and click the blue comment icon: 若只要對 PR 的_特定行_留下註解請將滑鼠停留在您要新增註解的那一行然後點擊藍色的註解圖示
![Screenshot of a diff in a pull request. Next to a line number, a blue plus icon is highlighted with an orange outline.](https://docs.github.com/assets/cb-44227/mw-1440/images/help/commits/hover-comment-icon.webp) ![Pull request 當中的修改差異擷圖。 在行號旁邊,有一個橘色外框強調的藍色加號圖示。](https://docs.github.com/assets/cb-44227/mw-1440/images/help/commits/hover-comment-icon.webp)
(Optionally, you can add a comment on multiple lines. You can click the line number of the first line you want to comment on and drag down to select a range of lines, then click the blue comment icon on the last line you want to comment on. Alternatively, you can click the blue comment icon next to the first line you want to comment on, then drag down to the last line you want to comment on.) (您也可以選擇性一次針對多行加入註解。 點擊想要加入註解的第一行,然後向下拖曳出要註解的範圍,再點擊範圍最後一行的藍色註解圖示。 或者也可以點擊要註解的第一行旁邊的藍色註解圖示,然後往下拖曳至要註解的最後一行。)
Then, type your comment and click **Add single comment**. 然後輸入註解,再點擊 **Add single comment**
## 審核 ## 審核
When performing a review, follow the same steps as above, but click **Start a review** (and subsequently, **Add a review comment**) instead of **Add single comment**. 進行審核時,請依照上述步驟,但點擊 **Start a review**(然後是 **Add a review comment**),而非 **Add single comment**
Then, click the green **Finish your review** button at the top of the page. 然後點擊頁面頂端的 **Finish your review** 按鈕。
Do not leave any discussion comments in the _Leave a comment_ box in the review finalization pop-up. You can leave it blank, or leave a short note if it will not require any follow-up. To comment on something that will require further discussion, add a comment on a file as described above instead. Do not leave any discussion comments in the _Leave a comment_ box in the review finalization pop-up. You can leave it blank, or leave a short note if it will not require any follow-up. To comment on something that will require further discussion, add a comment on a file as described above instead.