mirror of
https://github.com/privacyguides/i18n.git
synced 2025-06-18 16:54:21 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@ -1,11 +1,11 @@
|
|||||||
---
|
---
|
||||||
meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
|
meta_title: "Μοντελοποίηση Απειλών: Το Πρώτο σας Βήμα εις το Απόρρητο - Privacy Guides"
|
||||||
title: "Threat Modeling"
|
title: "Μοντελοποίηση Απειλών"
|
||||||
icon: 'material/target-account'
|
icon: 'material/target-account'
|
||||||
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.
|
description: Η εξισορρόπηση της ασφάλειας, της ιδιωτικότητας και της χρηστικότητας είναι μια από τις πρώτες και δυσκολότερες προκλήσεις που θα αντιμετωπίσετε στο δρόμο σας για την απόρρητη ζωή.
|
||||||
---
|
---
|
||||||
|
|
||||||
Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
|
Η εξισορρόπηση της ασφάλειας, της ιδιωτικότητας και της χρηστικότητας είναι μια από τις πρώτες και δυσκολότερες προκλήσεις που θα αντιμετωπίσετε στο δρόμο σας για την απόρρητη ζωή. Τα πάντα υπόκεινται σε αντιστάθμιση: όσο ασφαλέστερο είναι κάτι, τόσο πιο περιοριστικό και άβολο θα είναι επίσης, κατά γενικό κανόνα. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using!
|
||||||
|
|
||||||
If you wanted to use the **most** secure tools available, you'd have to sacrifice *a lot* of usability. And, even then, ==nothing is ever fully secure.== There's **high** security, but never **full** security. That's why threat models are important.
|
If you wanted to use the **most** secure tools available, you'd have to sacrifice *a lot* of usability. And, even then, ==nothing is ever fully secure.== There's **high** security, but never **full** security. That's why threat models are important.
|
||||||
|
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
*[2FA]: 2-Factor Authentication
|
*[2FA]: Αυθεντικοποίηση 2-Παραγόντων
|
||||||
*[ADB]: Android Debug Bridge
|
*[ADB]: Android Debug Bridge
|
||||||
*[AOSP]: Android Open Source Project
|
*[AOSP]: Android Open Source Project
|
||||||
*[ATA]: Advanced Technology Attachment
|
*[ATA]: Advanced Technology Attachment
|
||||||
|
Reference in New Issue
Block a user