1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-12-11 09:02:17 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2025-12-07 21:32:30 +00:00
parent 69be90aad1
commit 663d1fc619
26 changed files with 53 additions and 53 deletions

View File

@@ -217,10 +217,10 @@ W 2023 roku udostępniliśmy międzynarodowe tłumaczenia strony na język [fran
<div class="admonition danger" markdown>
The following is a human-readable summary of (and not a substitute for) the [license](https://github.com/privacyguides/privacyguides.org/blob/main/README.md#license).
Poniżej zamieszczono streszczenie [licencji](https://github.com/privacyguides/privacyguides.org/blob/main/README.md#license) w formie zrozumiałej dla ludzi (nie jest to substytut pełnej licencji).
</div>
:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-sa: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-ShareAlike 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and share your work under the same license.
:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-sa: O ile nie zaznaczono inaczej, oryginalne treści na tej stronie udostępnione są na publicznej licencji [Uznanie autorstwa Na tych samych warunkach 4.0 Międzynarodowa](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). Oznacza to, że możesz kopiować i rozpowszechniać materiały w dowolnym medium lub formacie w dowolnym celu, także komercyjnym, pod warunkiem odpowiedniego przypisania autorstwa `Privacy Guides (www.privacyguides.org)` oraz udostępnienia swojej pracy na tej samej licencji.
You may comply with these terms in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use.
Można stosować się do tych warunków w dowolny rozsądny sposób, jednak nie w sposób sugerujący, że Privacy Guides popiera Ciebie lub Twoje wykorzystanie.

View File

@@ -17,7 +17,7 @@ Ponadto Privacy Guides nie gwarantuje że strona internetowa będzie dostępna c
<div class="admonition danger" markdown>
The following is a human-readable summary of (and not a substitute for) the [license](https://github.com/privacyguides/privacyguides.org/blob/main/README.md#license).
Poniżej zamieszczono streszczenie [licencji](https://github.com/privacyguides/privacyguides.org/blob/main/README.md#license) w formie zrozumiałej dla ludzi (nie jest to substytut pełnej licencji).
</div>

View File

@@ -1,20 +1,20 @@
---
meta_title: "Recommended AI Chat: Private ChatGPT Alternatives - Privacy Guides"
title: "AI Chat"
meta_title: "Zalecane czaty AI: Prywatne alternatywy dla ChatGPT Privacy Guides"
title: "Czat AI"
icon: material/assistant
description: Unlike OpenAI's ChatGPT and its Big Tech competitors, these AI tools run locally so your data never leaves your desktop device.
description: W przeciwieństwie do ChatGPT od OpenAI i jego konkurentów z wielkich firm technologicznych, te narzędzia AI działają lokalnie, więc Twoje dane nigdy nie opuszczają komputera.
cover: ai-chatbots.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray }
- [:material-server-network: Dostawcy usług](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-account-cash: Kapitalizm inwigilacji](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-close-outline: Cenzura](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray }
The use of **AI chat**, also known as Large Language Models (LLMs), has become increasingly common since the release of ChatGPT in 2022. LLMs can help us write better, understand unfamiliar subjects, or answer a wide range of questions. They work by statistically predicting the next word in their responses based on a vast amount of data scraped from the web.
Korzystanie z **czatów AI** (lub też **czatów SI**), znanych również jako duże modele językowe (LLM), stało się coraz bardziej powszechne od czasu pojawienia się ChatGPT w 2022 roku. LLM-y mogą pomagać w lepszym pisaniu, ułatwiać zrozumienie nieznanych tematów lub odpowiadać na szeroki zakres pytań. Ich działanie polega na statystycznym przewidywaniu kolejnego słowa w odpowiedzi na podstawie ogromnej ilości danych pozyskanych z sieci.
## Privacy Concerns About LLMs
## Obawy dotyczące prywatność związane z modelami LLM
Data used to train AI models, however, includes a massive amount of publicly available data scraped from the web, which can include sensitive information like names and addresses. Cloud-based AI software often [collects your inputs](https://openai.com/policies/row-privacy-policy), meaning your chats are not private from them. This practice also introduces a risk of data breaches. Furthermore, there is a real possibility that an LLM will leak your private chat information in future conversations with other users.

View File

@@ -5,11 +5,11 @@ description: These tools allow you to access networks other than the World Wide
cover: alternative-networks.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-server-network: Dostawcy usług](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue }
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-account-cash: Kapitalizm inwigilacji](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
## Anonymizing Networks

View File

@@ -20,7 +20,7 @@ schema:
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red }
- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }

View File

@@ -24,7 +24,7 @@ schema:
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }
@@ -59,7 +59,7 @@ Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) a
### Secure Camera
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-account-search: Public Exposure](../basics/common-threats.md#limiting-public-information){ .pg-green }
@@ -103,7 +103,7 @@ The image orientation metadata is not deleted. If you enable location (in Secure
### Secure PDF Viewer
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-target-account: Targeted Attacks](../basics/common-threats.md#attacks-against-specific-individuals){ .pg-red }

View File

@@ -5,9 +5,9 @@ description: These browser extensions can enhance your browsing experience and p
cover: browser-extensions.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-account-cash: Kapitalizm inwigilacji](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface. They have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation.

View File

@@ -5,7 +5,7 @@ description: Our recommended methods for removing your personal information from
cover: data-broker-removals.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information){ .pg-green }

View File

@@ -46,7 +46,7 @@ These tools provide analysis based on the information they have the ability to a
## External Verification Tools
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red }
@@ -134,7 +134,7 @@ iMazing automates and interactively guides you through the process of using [MVT
## On-Device Verification
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red }
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange }

View File

@@ -5,9 +5,9 @@ description: Most online office suites do not support end-to-end encryption, mea
cover: document-collaboration.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-server-network: Dostawcy usług](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
Most online **document collaboration** platforms like Google Drive do not support end-to-end encryption, meaning the cloud provider has access to everything you do. The provider's privacy policy may legally protect your rights, but it does not provide technical access constraints.

View File

@@ -5,9 +5,9 @@ description: An email aliasing service allows you to easily generate a new email
cover: email-aliasing.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-account-cash: Kapitalizm inwigilacji](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information){ .pg-green }
An **email aliasing service** allows you to easily generate a new email address for every website you register for. The email aliases you generate are then forwarded to an email address of your choosing, hiding both your "main" email address and the identity of your [email provider](email.md).

View File

@@ -6,9 +6,9 @@ description: These applications are what we currently recommend for all health-
cover: health.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-server-network: Dostawcy usług](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
Keep track of your health and fitness-related goals with these apps. Unlike their mainstream alternatives, your personal health information will be kept private.

View File

@@ -5,10 +5,10 @@ description: These language tools do not send your input text to a server and ca
cover: language-tools.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-server-network: Dostawcy usług](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-account-cash: Kapitalizm inwigilacji](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time and sold to third parties. The language tools listed on this page do not store your submitted text on a server and can be self-hosted and used offline for maximum control of your data.

View File

@@ -6,9 +6,9 @@ description: Privacy-respecting map providers and navigation apps which don't bu
cover: maps.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-account-cash: Kapitalizm inwigilacji](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
Use a **map and navigation app** that doesn't build an advertising profile based on your searches and location history. Instead of using Google Maps, Apple Maps, or Waze, we recommend these privacy-respecting alternatives.

View File

@@ -24,7 +24,7 @@ schema:
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red }
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange }

View File

@@ -5,9 +5,9 @@ description: These office suites offer their full functionality without an accou
cover: office-suites.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-server-network: Dostawcy usług](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
Choose an **office suite** that does not require logging in to an account to access its full functionality. The tools listed here can be used offline and could reasonably act as a replacement for Microsoft Office for most needs.

View File

@@ -5,9 +5,9 @@ description: These tools allow you to have full control of any pasted data you s
cover: pastebins.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-server-network: Dostawcy usług](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
[**Pastebins**](https://en.wikipedia.org/wiki/Pastebin) are online services most commonly used to share large blocks of code in a convenient and efficient manner. The pastebins listed here employ client-side encryption and password protection for pasted content; both of these features prevent the website or server operator from reading or accessing the contents of any paste.

View File

@@ -5,10 +5,10 @@ description: These photo management tools keep your personal photos safe from th
cover: photo-management.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange }
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-server-network: Dostawcy usług](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
Most cloud **photo management solutions** like Google Photos, Flickr, and Amazon Photos don't secure your photos against being accessed by the cloud storage provider themselves. These options keep your personal photos private, while allowing you to share them only with family and trusted people.

View File

@@ -5,7 +5,7 @@ description: These security keys provide a form of phishing-immune authenticatio
cover: multi-factor-authentication.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals){ .pg-red }
- [:material-bug-outline: Passive Attacks](basics/common-threats.md#security-and-privacy){ .pg-orange }

View File

@@ -6,7 +6,7 @@ description: For our more technical readers, self-hosting a DNS solution can pro
cover: dns.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-server-network: Service Providers](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
- [:material-account-cash: Surveillance Capitalism](../basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }

View File

@@ -6,7 +6,7 @@ description: For our more technical readers, self-hosting your own email can pro
cover: email.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-server-network: Service Providers](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal }

View File

@@ -6,7 +6,7 @@ description: For our more technical readers, self-hosting file management tools
cover: cloud.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-server-network: Service Providers](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal }

View File

@@ -5,7 +5,7 @@ description: For our more technical readers, self-hosting software and services
cover: router.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-server-network: Service Providers](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal }

View File

@@ -5,10 +5,10 @@ description: Find a new social network that doesnt pry into your data or mone
cover: social-networks.webp
---
<small>Protects against the following threat(s):</small>
<small>Chroni przed następującymi zagrożeniami:</small>
- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray }
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
- [:material-close-outline: Cenzura](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray }
- [:material-account-cash: Kapitalizm inwigilacji](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
These privacy-respecting **social networks** allow you to participate in online communities without giving up your personal information like your full name, phone number, and other data commonly requested by tech companies.

View File

@@ -347,7 +347,7 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
## Oprogramowanie
### AI Chat
### Czat AI
<div class="grid cards" markdown>

View File

@@ -50,7 +50,7 @@
*[JNI]: Natywny interfejs Java
*[KYC]: Poznaj swojego klienta
*[LLaVA]: Large Language and Vision Assistant (wielomodalny model sztucznej inteligencji)
*[LLMy]: Duże modele językowe (modele sztucznej inteligencji, takie jak ChatGPT)
*[LLM-y]: Duże modele językowe (modele sztucznej inteligencji, takie jak ChatGPT)
*[LUKS]: Linux Unified Key Setup (szyfrowanie całego dysku)
*[MAC]: Warstwa sterowania dostępem do medium transmisyjnego
*[MDAG]: Microsoft Defender Application Guard