1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-11-16 05:12:38 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2025-11-11 14:37:07 +00:00
parent aaf5a279ba
commit 6d039374e4
2 changed files with 35 additions and 35 deletions

View File

@@ -22,11 +22,11 @@ global:
除此之外,我們還推薦各種基於可持續商業模式和內建安全和隱私功能的電子郵件提供商。 閱讀我們[完整的標準清單](#criteria),瞭解更多資訊。 除此之外,我們還推薦各種基於可持續商業模式和內建安全和隱私功能的電子郵件提供商。 閱讀我們[完整的標準清單](#criteria),瞭解更多資訊。
| 供應商 | OpenPGP / WKD | IMAP / SMTP | 零存取加密 | 匿名付款方式 | | 供應商 | OpenPGP / WKD | IMAP / SMTP | 零存取加密 | 匿名付款方式 |
| ----------------------------- | -------------------------------------- | ------------------------------------------------- | ------------------------------------------------- | ----------------------------------------------------- | | ----------------------------- | -------------------------------------- | ------------------------------------------------- | ------------------------------------------------- | --------------------------------- |
| [Proton Mail](#proton-mail) | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } 僅提供付費版 | :material-check:{ .pg-green } | 現金<br>透過第三方使用 Monero | | [Proton Mail](#proton-mail) | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } 僅提供付費版 | :material-check:{ .pg-green } | 現金<br>透過第三方使用 Monero |
| [Mailbox Mail](#mailbox-mail) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } 限 Mail | 現金 | | [Mailbox Mail](#mailbox-mail) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } 限 Mail | 現金 |
| [Tuta](#tuta) | :material-alert-outline:{ .pg-orange } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | Monero via third party <br>Cash via third party | | [Tuta](#tuta) | :material-alert-outline:{ .pg-orange } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | 透過第三方使用 Monero<br>透過第三方使用現金 |
除了這裡建議的電子郵件供應商及他們的替代品之外,您也可以考慮使用專用的[電子郵件別名服務](email-aliasing.md#recommended-providers)來保護您的隱私。 除此之外,這些服務有助於保護真實收件匣免受垃圾郵件的侵害,防止行銷人員關聯您的帳戶,並使用 PGP 加密所有傳入的訊息。 除了這裡建議的電子郵件供應商及他們的替代品之外,您也可以考慮使用專用的[電子郵件別名服務](email-aliasing.md#recommended-providers)來保護您的隱私。 除此之外,這些服務有助於保護真實收件匣免受垃圾郵件的侵害,防止行銷人員關聯您的帳戶,並使用 PGP 加密所有傳入的訊息。
@@ -85,25 +85,25 @@ Proton 免費方案提供 500 MB 的郵件儲存空間,您可以免費增加
</div> </div>
Free accounts have some limitations, such as not being able to search body text and not having access to [Proton Mail Bridge](https://proton.me/mail/bridge), which is required to use a [recommended desktop email client](email-clients.md) such as Thunderbird. 付費帳戶包括 Proton Mail Bridge、額外儲存空間和自訂網域支援等功能。 The Proton Unlimited plan or any multi-user Proton plan includes access to [SimpleLogin](email-aliasing.md#simplelogin) Premium. 免費帳號有部份限制,例如無法搜尋信件正文,也無法使用 [Proton Mail Bridge](https://proton.me/mail/bridge),後者是使用[推薦的桌面電子郵件客戶端](email-clients.md)(如 Thunderbird)所必須的。 付費帳戶包括 Proton Mail Bridge、額外儲存空間和自訂網域支援等功能。 Proton Unlimited 方案或任何多使用者 Proton 方案都包含使用 [SimpleLogin](email-aliasing.md#simplelogin) Premium
A [letter of attestation](https://res.cloudinary.com/dbulfrlrz/images/v1714639878/wp-pme/letter-of-attestation-proton-mail-20211109_3138714c61/letter-of-attestation-proton-mail-20211109_3138714c61.pdf) was provided for Proton Mail's apps in November 2021 by [Securitum](https://research.securitum.com). [Securitum](https://research.securitum.com) 於2021年11月為 Proton Mail 應用程式提供了[認證函](https://res.cloudinary.com/dbulfrlrz/images/v1714639878/wp-pme/letter-of-attestation-proton-mail-20211109_3138714c61/letter-of-attestation-proton-mail-20211109_3138714c61.pdf)
Proton Mail has internal crash reports that are **not** shared with third parties and can be disabled. Proton Mail 有內部當機報告功能,**不會**與第三方分享且可停用。
=== "Web" ===「網路」
From your inbox, select :gear: → **All Settings****Account****Security and privacy****Privacy and data collection**. 從收件匣選取 :gear:→**所有設定**→**帳號**→**安全性與隱私權**→**隱私與資料蒐集**。
- [ ] Disable **Collect usage dignostics** - [ ] 停用**蒐集使用診斷資訊**
- [ ] Disable **Send crash reports** - [ ] 停用**傳送當機報告**
=== "Mobile" ===「行動裝置」
From your inbox, select :material-menu::gear: **Settings** → select your username. 從收件匣選取 :material-menu::gear: **設定**→選取您的使用者名稱。
- [ ] Disable **Send crash reports** - [ ] 停用**傳送當機報告**
- [ ] Disable **Collect usage dignostics** - [ ] 停用**蒐集使用診斷資訊**
#### :material-check:{ .pg-green } 自訂域名和別名 #### :material-check:{ .pg-green } 自訂域名和別名
@@ -111,7 +111,7 @@ Proton Mail has internal crash reports that are **not** shared with third partie
#### :material-check:{ .pg-green } 私密付款方式 #### :material-check:{ .pg-green } 私密付款方式
Proton Mail 除了 [支援](https://proton.me/support/payment-options) 郵寄**現金**外,還接受信用卡/簽帳金融卡、[比特幣](advanced/payments.md#other-coins-bitcoin-ethereum-etc) 和 PayPal 付款。 Additionally, you can use [**Monero**](cryptocurrency.md#monero) to purchase vouchers for Proton Mail Plus or Proton Unlimited via their [official](https://discuss.privacyguides.net/t/add-monero-as-an-anonymous-payment-method-for-proton-services/31058/15) reseller [ProxyStore](https://dys2p.com/en/2025-09-09-proton.html). Proton Mail 除了 [支援](https://proton.me/support/payment-options) 郵寄**現金**外,還接受信用卡/簽帳金融卡、[比特幣](advanced/payments.md#other-coins-bitcoin-ethereum-etc) 和 PayPal 付款。 此外,您可以使用 [**Monero**](cryptocurrency.md#monero) 透過他們的[官方](https://discuss.privacyguides.net/t/add-monero-as-an-anonymous-payment-method-for-proton-services/31058/15)經銷商 [ProxyStore](https://dys2p.com/en/2025-09-09-proton.html) 購買 Proton Mail Plus 或 Proton Unlimited 的禮券。
#### :material-check:{ .pg-green } 帳號安全 #### :material-check:{ .pg-green } 帳號安全
@@ -141,9 +141,9 @@ Proton Mail 的[Unlimited](https://proton.me/support/proton-plans#proton-unlimit
<div class="admonition recommendation" markdown> <div class="admonition recommendation" markdown>
![Mailbox Mail logo](assets/img/email/mailbox-mail.svg){ align=right } ![Mailbox.org 標誌](assets/img/email/mailbox-mail.svg){ align=right }
**Mailbox Mail** (formerly *Mailbox.org*) is an email service with a focus on being secure, ad-free, and powered by 100% eco-friendly energy.**2014 年** 開始運營。 Mailbox Mail 總部位於德國柏林。 **Mailbox Mail**(前身為 *Mailbox.org*是專注於安全、無廣告、100% 採用環保能源的電子郵件服務。**2014 年** 開始運營。 Mailbox Mail 總部位於德國柏林。
帳戶一開始最多只有 2 GB 儲存空間,可視需要升級。 帳戶一開始最多只有 2 GB 儲存空間,可視需要升級。
@@ -246,7 +246,7 @@ Tuta 不支援 [ IMAP 協議](https://tuta.com/support#imap) 或使用第三方
#### :material-information-outline:{ .pg-blue } 私密付款方式 #### :material-information-outline:{ .pg-blue } 私密付款方式
Tuta only directly accepts credit cards and PayPal, however you can use [**cryptocurrency**](cryptocurrency.md) to purchase gift cards via their [partnership](https://tuta.com/support/#cryptocurrency) with ProxyStore. Tuta 僅接受信用卡與 PayPal但您可以使用[**加密貨幣**](cryptocurrency.md)透過其[合作夥伴](https://tuta.com/support/#cryptocurrency) ProxyStore 購買禮品卡。
#### :material-check:{ .pg-green } 帳號安全 #### :material-check:{ .pg-green } 帳號安全

View File

@@ -179,7 +179,7 @@ macOS 的系統組件受到唯讀的[簽署系統卷宗](https://support.apple.c
#### 系統完整性保護 #### 系統完整性保護
macOS 設定了某些無法覆蓋的安全限制。 These are called [Mandatory Access Controls](https://support.apple.com/guide/security/system-integrity-protection-secb7ea06b49/1/web/1), and they form the basis of the sandbox, parental controls, and [System Integrity Protection](https://support.apple.com/en-us/102149) on macOS. macOS 設定了某些無法覆蓋的安全限制。 這些稱為[強制取用控制](https://support.apple.com/guide/security/system-integrity-protection-secb7ea06b49/1/web/1),它們構成 macOS 上的沙盒、家長控制和[系統完整性保護](https://support.apple.com/en-us/102149)的基礎。
系統完整保護使重要的檔案成為唯讀,以防止惡意代碼的修改。 這是基於硬體內核完整保護之上,可防止記憶體中的內核遭修改。 系統完整保護使重要的檔案成為唯讀,以防止惡意代碼的修改。 這是基於硬體內核完整保護之上,可防止記憶體中的內核遭修改。
@@ -187,33 +187,33 @@ macOS 設定了某些無法覆蓋的安全限制。 These are called [Mandatory
##### App 沙盒 ##### App 沙盒
On macOS, whether an app is sandboxed is determined by the developer when they sign it. The [App Sandbox](https://developer.apple.com/documentation/xcode/configuring-the-macos-app-sandbox) protects against vulnerabilities in the apps you run by limiting what a malicious actor can access in the event that the app is exploited. The App Sandbox *alone* can't protect against [:material-package-variant-closed-remove: Supply Chain Attacks](../basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian} by malicious developers. For that, sandboxing needs to be enforced by someone other than the developer themselves, as it is on the [App Store](https://support.apple.com/guide/security/gatekeeper-and-runtime-protection-sec5599b66df/1/web/1#:~:text=All%20apps%20from%20the%20App%20Store%20are%20sandboxed%20to%20restrict%20access%20to%20data%20stored%20by%20other%20apps.). macOS 上,應用程式是否受沙盒保護是由開發人員簽署時決定。 [App Sandbox](https://developer.apple.com/documentation/xcode/configuring-the-macos-app-sandbox) 會透過限制惡意行為者在應用程式被攻擊時可以存取的內容,保護您執行的應用程式。 *單靠* App Sandbox 無法防止惡意開發人員的[:material-package-variant-closed-remove: 供應鏈攻擊](../basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian}。 為此,沙盒需要由開發者以外的人執行,就像在[App Store](https://support.apple.com/guide/security/gatekeeper-and-runtime-protection-sec5599b66df/1/web/1#:~:text=All%20apps%20from%20the%20App%20Store%20are%20sandboxed%20to%20restrict%20access%20to%20data%20stored%20by%20other%20apps.) 中一樣。
<div class="admonition warning" markdown> <div class="admonition warning" markdown>
<p class="admonition-title">警告</p> <p class="admonition-title">警告</p>
從官方 App Store 之外下載的軟體不需要沙盒。 If your threat model prioritizes defending against [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }, then you may want to check if the software you download outside the App Store is sandboxed, which is up to the developer to *opt in*. 從官方 App Store 之外下載的軟體不需要沙盒。 如果您的威脅模型以防禦 [:material-bug-outline: 被動攻擊](../basics/common-threats.md#security-and-privacy){ .pg-orange }為優先,那麼可能要檢查在 App Store 以外下載的軟體是否於沙盒中運作,這要由開發人員*選擇性加入*。
</div> </div>
You can check if an app uses the App Sandbox in a few ways: 您可以透過幾種方式檢查應用程式是否使用 App Sandbox
You can check if apps that are already running are sandboxed using the [Activity Monitor](https://developer.apple.com/documentation/security/protecting-user-data-with-app-sandbox#Verify-that-your-app-uses-App-Sandbox). 您可以使用「[活動監視器](https://developer.apple.com/documentation/security/protecting-user-data-with-app-sandbox#Verify-that-your-app-uses-App-Sandbox)」檢查已執行的應用程式是否受到沙盒保護。
<div class="admonition warning" markdown> <div class="admonition warning" markdown>
<p class="admonition-title">警告</p> <p class="admonition-title">警告</p>
Just because one of an app's processes is sandboxed doesn't mean they all are. 如果應用程式當中只有部分處理程序受到沙盒保護,不代表所有處理程序都有沙盒保護。
</div> </div>
Alternatively, you can check apps before you run them by running this command in the terminal: 另外,在執行應用程式之前,您也可以在終端機執行下列指令檢查:
``` zsh ``` zsh
codesign -dvvv --entitlements - <您的應用程式路徑> codesign -dvvv --entitlements - <您的應用程式路徑>
``` ```
If an app is sandboxed, you should see the following output: 如果應用程式有沙盒保護,應該會看到下列輸出結果:
``` zsh ``` zsh
[Key] com.apple.security.app-sandbox [Key] com.apple.security.app-sandbox
@@ -221,25 +221,25 @@ If an app is sandboxed, you should see the following output:
[Bool] true [Bool] true
``` ```
If you find that the app you want to run is not sandboxed, then you may employ methods of [compartmentalization](../basics/common-threats.md#security-and-privacy) such as virtual machines or separate devices, use a similar app that is sandboxed, or choose to not use the non-sandboxed app altogether. 如果您發現要執行的應用程式尚未沙盒化,則可以採用虛擬機器或獨立裝置等[隔離運作](../basics/common-threats.md#security-and-privacy)方法、使用有沙盒化的其他類似應用程式,或乾脆完全不要使用未經沙盒化的應用程式。
##### Hardened Runtime ##### 執行時期加固
The [Hardened Runtime](https://developer.apple.com/documentation/security/hardened_runtime) is an extra form of protection for apps that prevents certain classes of exploits. It improves the security of apps against exploitation by disabling certain features like JIT. [執行時期加固(Hardened Runtime](https://developer.apple.com/documentation/security/hardened_runtime)是應用程式的額外保護形式,可防止某些類別的攻擊。 它會停用某些功能(例如 JIT來提高應用程式的安全性以防止被破解。
You can check if an app uses the Hardened Runtime using this command: 您可以使用下列指令檢查應用程式是否使用 Hardened Runtime
``` zsh ``` zsh
codesign -dv <您的應用程式路徑> codesign -dv <您的應用程式路徑>
``` ```
If Hardened Runtime is enabled, you will see `flags=0x10000(runtime)`. The `runtime` output means Hardened Runtime is enabled. There might be other flags, but the runtime flag is what we're looking for here. 若有啟用 Hardened Runtime,會看到 `flags=0x10000(runtime)`。 這邊的 `runtime` 輸出代表已啟用 Hardened Runtime。 可能還有其他旗標,但 runtime 旗標就是我們要找的部份。
You can enable a column in Activity Monitor called "Restricted" which is a flag that prevents programs from injecting code via macOS's [dynamic linker](https://pewpewthespells.com/blog/blocking_code_injection_on_ios_and_os_x.html). Ideally, this should say "Yes". 您可以在活動監視器中開啟一欄名為「Restricted」的旗標此旗標表示會防止程式透過 macOS 的[動態連結器](https://pewpewthespells.com/blog/blocking_code_injection_on_ios_and_os_x.html)注入程式碼。 理想情況下,這裡應該顯示「是」。
##### 防毒軟體 ##### 防毒軟體
macOS comes with two forms of [malware defense](https://support.apple.com/guide/security/protecting-against-malware-sec469d47bd8/1/web/1): macOS 提供兩種[惡意軟體防禦](https://support.apple.com/guide/security/protecting-against-malware-sec469d47bd8/1/web/1)機制:
1. 首先,防止啟動惡意軟體是由 App Store 對 App Store 應用程式的審核流程或*公證**Gatekeeper* 的一部份),這是 Apple 允許運行之前掃描第三方應用程式是否存在已知惡意軟體的程式。 Apps are required to be signed by the developers using a key given to them by Apple. This ensures that you are running software from the real developers. Notarization also requires that developers enable the Hardened Runtime for their apps, which limits methods of exploitation. 1. 首先,防止啟動惡意軟體是由 App Store 對 App Store 應用程式的審核流程或*公證**Gatekeeper* 的一部份),這是 Apple 允許運行之前掃描第三方應用程式是否存在已知惡意軟體的程式。 Apps are required to be signed by the developers using a key given to them by Apple. This ensures that you are running software from the real developers. Notarization also requires that developers enable the Hardened Runtime for their apps, which limits methods of exploitation.
2. *XProtect* 提供針對其他惡意軟體的防護以及修復系統上現有惡意軟體XProtect 是 macOS 內建較傳統的防病毒軟體。 2. *XProtect* 提供針對其他惡意軟體的防護以及修復系統上現有惡意軟體XProtect 是 macOS 內建較傳統的防病毒軟體。