mirror of
https://github.com/privacyguides/i18n.git
synced 2025-06-20 09:44:20 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@ -53,7 +53,7 @@ La valutazione dei rischi è un procedimento personale e soggettivo. Molte perso
|
|||||||
|
|
||||||
Esistono molti modi in cui un avversario potrebbe ottenere l'accesso ai tuoi dati. Ad esempio, un avversario può leggere le tue comunicazioni private mentre passano per la rete, o può eliminare o corrompere i tuoi dati.
|
Esistono molti modi in cui un avversario potrebbe ottenere l'accesso ai tuoi dati. Ad esempio, un avversario può leggere le tue comunicazioni private mentre passano per la rete, o può eliminare o corrompere i tuoi dati.
|
||||||
|
|
||||||
==Le motivazioni degli avversari differiscono ampiamente, come le loro tattiche.== Un governo che prova a impedire la diffusione di un video che mostra la violenza della polizia, potrebbe essere contenuto, oppure potrebbe semplicemente essere eliminato o ridotto in disponibilità. Al contrario, un rivale politico potrebbe desiderare di ottenere accesso al contenuto segreto e pubblicarlo senza che tu lo sappia.
|
==Le motivazioni degli avversari sono molto diverse, così come le loro tattiche.== Un governo che cerca di impedire la diffusione di un video che mostra la violenza della polizia può accontentarsi di cancellare o ridurre la disponibilità di quel video. Al contrario, un rivale politico potrebbe desiderare di ottenere accesso al contenuto segreto e pubblicarlo senza che tu lo sappia.
|
||||||
|
|
||||||
La pianificazione della sicurezza comporta la comprensione di quanto negative potrebbero essere le conseguenze, se un avversario ottenesse l'accesso a una delle tue risorse. Per determinarle, dovresti considerare le capacità del tuo avversario. Ad esempio, il tuo fornitore di telefonia mobile ha accesso a tutti i tuoi registri telefonici. Un hacker su una rete Wi-Fi può accedere alle tue comunicazioni non crittografate. Il tuo governo potrebbe avere capacità maggiori.
|
La pianificazione della sicurezza comporta la comprensione di quanto negative potrebbero essere le conseguenze, se un avversario ottenesse l'accesso a una delle tue risorse. Per determinarle, dovresti considerare le capacità del tuo avversario. Ad esempio, il tuo fornitore di telefonia mobile ha accesso a tutti i tuoi registri telefonici. Un hacker su una rete Wi-Fi può accedere alle tue comunicazioni non crittografate. Il tuo governo potrebbe avere capacità maggiori.
|
||||||
|
|
||||||
|
@ -53,21 +53,21 @@ OAuth 是一種驗證協定可在註冊服務時無須對供應商分享註冊
|
|||||||
|
|
||||||
主要優勢是:
|
主要優勢是:
|
||||||
|
|
||||||
- **Security**: you don't have to trust the security practices of the service you're logging into when it comes to storing your login credentials, because they are stored with the external OAuth provider, which when it comes to services like Apple and Google typically follow the best security practices, continuously audit their authentication systems, and don't store credentials inappropriately (such as in plain text).
|
- **安全性**: 在儲存登入憑證時,無須信任所登入服務的安全實踐,因為它們是儲存在外部OAuth 提供者。使用 Apple 和 Google 等服務時,通常會遵循最佳安全實踐,持續審核其身份驗證系統,妥當儲存憑證(例如不會以純文字形式)。
|
||||||
- **易用性**:多個帳戶由單一登入管理。
|
- **易用性**:多個帳戶由單一登入管理。
|
||||||
|
|
||||||
但也有一些缺陷:
|
但也有一些缺陷:
|
||||||
|
|
||||||
- **隱私**: OAuth 讓您利用已註冊的服務作登入新服務。
|
- **隱私**: OAuth 讓您利用已註冊的服務作登入新服務。
|
||||||
- **Centralization**: if the account you use for OAuth is compromised, or you aren't able to log in to it, all other accounts connected to it are affected.
|
- **集中化**: 如果您使用的 OAuth 帳戶被駭或是無法利用它登入,與之連結的其它帳戶也會受到影響。
|
||||||
|
|
||||||
OAuth can be especially useful in those situations where you could benefit from deeper integration between services. 我們建議將 OAuth 限制在需要的地方,用 [MFA](multi-factor-authentication.md)來保護主帳戶。
|
OAuth 在那些服務之間深度整合情況下,可以特別有用。 我們建議將 OAuth 限制在需要的地方,用 [MFA](multi-factor-authentication.md)來保護主帳戶。
|
||||||
|
|
||||||
All the services that use OAuth will be as secure as your underlying OAuth provider's account. 例如,想用硬體密鑰保護某個帳戶,但該服務不支持硬體密鑰,則可用硬體密鑰保護您的 OAuth 帳戶,現在您所有帳戶基本上都有硬體 MFA。 但值得注意的是,OAuth 帳戶的弱認證意味著與該登入方式相關的其它帳戶也會很弱。
|
所有使用 OAuth 的服務都將與您的基礎提供商帳戶一樣安全。 例如,想用硬體密鑰保護某個帳戶,但該服務不支持硬體密鑰,則可用硬體密鑰保護您的 OAuth 帳戶,現在您所有帳戶基本上都有硬體 MFA。 但值得注意的是,OAuth 帳戶的弱認證意味著與該登入方式相關的其它帳戶也會很弱。
|
||||||
|
|
||||||
There is an additional danger when using *Sign in with Google*, *Facebook*, or another service, which is that typically the OAuth process allows for *bidirectional* data sharing. For example, logging in to a forum with your Twitter account could grant that forum access to do things on your Twitter account such as post, read your messages, or access other personal data. OAuth providers will typically present you with a list of things you are granting the external service access to, and you should always ensure that you read through that list and don't inadvertently grant the external service access to anything it doesn't require.
|
使用* Google 登入*、*Facebook* 或其他服務時還有額外的危險,通常是OAuth 流程允許*雙向*資料共享。 例如,使用 Twitter 帳戶登入論壇可授予該論壇存取權限,以便在您的 Twitter 帳戶上執行操作,例如發佈、閱讀您的訊息或存取其他個人資料。 OAuth providers will typically present you with a list of things you are granting the external service access to, and you should always ensure that you read through that list and don't inadvertently grant the external service access to anything it doesn't require.
|
||||||
|
|
||||||
Malicious applications, particularly on mobile devices where the application has access to the WebView session used for logging in to the OAuth provider, can also abuse this process by hijacking your session with the OAuth provider and gaining access to your OAuth account through those means. Using the *Sign in with* option with any provider should usually be considered a matter of convenience that you only use with services you trust to not be actively malicious.
|
惡意應用程式(特別是行動裝置,它們可以用來存取登入OAuth 提供者的WebView 會話)也可以透過劫持與 OAuth 提供者的會話來取得對 OAuth 帳戶的存取權限。 Using the *Sign in with* option with any provider should usually be considered a matter of convenience that you only use with services you trust to not be actively malicious.
|
||||||
|
|
||||||
### 電話號碼
|
### 電話號碼
|
||||||
|
|
||||||
|
@ -13,7 +13,7 @@ cover: calendar.webp
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/).
|
**Tuta** 在其支援平台上提供免費加密的行事曆。 功能包括:所有數據的自動E2EE ,共享功能,匯入/匯出功能,多因素驗證和 [more](https://tuta.com/calendar-app-comparison/)。
|
||||||
|
|
||||||
多個行事曆和擴展共享功能僅限於付費訂閱者。
|
多個行事曆和擴展共享功能僅限於付費訂閱者。
|
||||||
|
|
||||||
@ -23,7 +23,7 @@ cover: calendar.webp
|
|||||||
[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" }
|
[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" }
|
||||||
[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute }
|
[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute }
|
||||||
|
|
||||||
??? downloads
|
??? downloads "下載"
|
||||||
|
|
||||||
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota)
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota)
|
||||||
- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609)
|
- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609)
|
||||||
|
@ -52,21 +52,21 @@ Qubes OS在主機作業系統上 利用 [dom0](https://wiki.xenproject.org/wiki/
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Connecting to Tor via a VPN
|
## 透過 VPN 連接 Tor
|
||||||
|
|
||||||
We [recommend](../advanced/tor-overview.md) connecting to the Tor network via a [VPN](../vpn.md) provider, and luckily Qubes makes this easy to do with a combination of ProxyVMs and Whonix.
|
[建議](../advanced/tor-overview.md) 使用 [VPN](../vpn.md) 來連接 Tor 網絡,Qubes 可以很輕鬆地結合 ProxyVMs 與 Whonix 來操作。
|
||||||
|
|
||||||
After [creating a new ProxyVM](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) which connects to the VPN of your choice, you can chain your Whonix qubes to that ProxyVM **before** they connect to the Tor network, by setting the NetVM of your Whonix **Gateway** (`sys-whonix`) to the newly-created ProxyVM.
|
[建立新的 ProxyVM](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) 後再連接到所選的 VPN,可**先將** Whonix qubes 串接至 ProxyVM 再連上 Tor 網絡,其用法是設置Whonix 所建立的 NetVM **Gateway** (`sys-whonix`) 。
|
||||||
|
|
||||||
Your qubes should be configured in a manner similar to this:
|
Qubes 設置大概像這樣:
|
||||||
|
|
||||||
| Qube name | Qube description | NetVM |
|
| Qube 名稱 | Qube 簡述 | NetVM |
|
||||||
| --------------- | ---------------------------------------------------------------------------------------------------------------- | --------------- |
|
| --------------- | ---------------------------------------------------------------------------------------------------- | --------------- |
|
||||||
| sys-net | *Your default network qube (pre-installed)* | *n/a* |
|
| sys-net | *預設的網路 qube (已預先安裝)* | *n/a* |
|
||||||
| sys-firewall | *Your default firewall qube (pre-installed)* | sys-net |
|
| sys-firewall | *預設的防火牆 qube (已預先安裝)* | sys-net |
|
||||||
| ==sys-proxyvm== | The VPN ProxyVM you [created](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) | sys-firewall |
|
| ==sys-proxyvm== | [建立的 VPN ProxyVM](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) | sys-firewall |
|
||||||
| sys-whonix | Your Whonix Gateway VM | ==sys-proxyvm== |
|
| sys-whonix | Whonix Gateway VM | ==sys-proxyvm== |
|
||||||
| anon-whonix | Your Whonix Workstation VM | sys-whonix |
|
| anon-whonix | Whonix Workstation VM | sys-whonix |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Photo Management
|
title: 照片管理
|
||||||
icon: material/image
|
icon: material/image
|
||||||
description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access.
|
description: Photo management tools to keep your personal photos safe from the prying eyes of cloud storage providers and other unauthorized access.
|
||||||
cover: photo-management.webp
|
cover: photo-management.webp
|
||||||
|
@ -172,7 +172,7 @@ description: Privacy Guides 是最透明和可靠的網站,用於尋找保護
|
|||||||
|
|
||||||
[了解更多 :material-arrow-right-drop-circle:](financial-services.md#gift-card-marketplaces)
|
[了解更多 :material-arrow-right-drop-circle:](financial-services.md#gift-card-marketplaces)
|
||||||
|
|
||||||
### Photo Management
|
### 照片管理
|
||||||
|
|
||||||
<div class="grid cards" markdown>
|
<div class="grid cards" markdown>
|
||||||
|
|
||||||
@ -481,11 +481,11 @@ description: Privacy Guides 是最透明和可靠的網站,用於尋找保護
|
|||||||
|
|
||||||
[了解更多 :material-arrow-right-drop-circle:](router.md)
|
[了解更多 :material-arrow-right-drop-circle:](router.md)
|
||||||
|
|
||||||
## Advanced Tools
|
## 進階工具
|
||||||
|
|
||||||
These tools may provide utility for certain individuals. They provide functionality which most people do not need to worry about, and often require more in-depth technical knowledge to utilize effectively.
|
這些工具可能對某些人很實用。 它們提供了多數人用不到的功能,通常需要更深入的技術知識才能有效地利用。
|
||||||
|
|
||||||
### Device Integrity Verification
|
### 設備完整性驗證
|
||||||
|
|
||||||
<div class="grid cards" markdown>
|
<div class="grid cards" markdown>
|
||||||
|
|
||||||
|
@ -41,13 +41,13 @@ Tor 的工作原理是通過志願者運營的服務器來引導您的網際網
|
|||||||
|
|
||||||
!!! tip "訣竅"
|
!!! tip "訣竅"
|
||||||
|
|
||||||
Before connecting to Tor, please ensure you've read our [overview](advanced/tor-overview.md) on what Tor is and how to connect to it safely. We often recommend connecting to Tor through a trusted [VPN provider](vpn.md), but you have to do so **properly** to avoid decreasing your anonymity.
|
在連接 Tor 之前,請先已閱讀[本站相關介紹概述](advanced/tor-overview.md),了解 Tor 是什麼以及如何安全地連接使用。 通常建議透過值得信賴的 [VPN 供應商](vpn.md) 來連接 Tor,但其操作必須**正確**,以避免降低匿名性。
|
||||||
|
|
||||||
有多種方式可以從您的設備連上 Tor 網絡,最常用的是 ** Tor 瀏覽器**,這是 Firefox 的一個分支,專為桌面電腦和 Android 的匿名瀏覽而設計。
|
有多種方式可以從您的設備連上 Tor 網絡,最常用的是 ** Tor 瀏覽器**,這是 Firefox 的一個分支,專為桌面電腦和 Android 的匿名瀏覽而設計。
|
||||||
|
|
||||||
Some of these apps are better than others, and again making a determination comes down to your threat model. If you are a casual Tor user who is not worried about your ISP collecting evidence against you, using apps like [Orbot](#orbot) or mobile browser apps to access the Tor network is probably fine. Increasing the number of people who use Tor on an everyday basis helps reduce the bad stigma of Tor, and lowers the quality of "lists of Tor users" that ISPs and governments may compile.
|
其些應用程式比其他應用程式更好,但再次提醒其選用決定取決於您的威脅模型。 如果是Tor 的一般使用者,不擔心 ISP 收集針對您的證據,那麼使用[Orbot](#orbot) 等應用程式或行動瀏覽器應用程式訪用 Tor 網絡可能沒問題。 越多人使用 Tor 有助於減少 Tor 的不良印記,降低 ISP 和政府可能編制的「Tor 用戶清單」內容。
|
||||||
|
|
||||||
If more complete anonymity is paramount to your situation, you should **only** be using the desktop Tor Browser client, ideally in a [Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) configuration. Mobile browsers are less common on Tor (and more fingerprintable as a result), and other configurations are not as rigorously tested against deanonymization.
|
如果更完全的匿名至關重要,則應 **僅使用** 桌面版的 Tor 客戶端應用,最好再加上[Whonix](desktop.md#whonix) + [Qubes](desktop.md#qubes-os) 一起搭配使用。 行動瀏覽器在 Tor 上不太常見(因此更容易識別指紋),且其他配置未經嚴格的去匿名化測試。
|
||||||
|
|
||||||
### Tor 瀏覽器
|
### Tor 瀏覽器
|
||||||
|
|
||||||
@ -77,7 +77,7 @@ If more complete anonymity is paramount to your situation, you should **only** b
|
|||||||
|
|
||||||
Tor 瀏覽器旨在防止指紋識別----根據您的瀏覽器配置識別您。 因此,您 **不應** 修改瀏覽器超出預設 [安全級別](https://tb-manual.torproject.org/security-settings/)。
|
Tor 瀏覽器旨在防止指紋識別----根據您的瀏覽器配置識別您。 因此,您 **不應** 修改瀏覽器超出預設 [安全級別](https://tb-manual.torproject.org/security-settings/)。
|
||||||
|
|
||||||
In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone.
|
除了直接在電腦安裝 Tor 瀏覽器外,還有專門設計用於連接到 Tor 網絡的操作系統,例如 [Qubes OS 作業系統](desktop.md#qubes-os) [Whonix](desktop.md#whonix),它們提供比標準 Tor 瀏覽器更高的安全性和保護。
|
||||||
|
|
||||||
### Orbot
|
### Orbot
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user