1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-09-15 01:38:46 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2025-06-19 16:38:51 +00:00
parent 642e7ff469
commit 6db6eada03
23 changed files with 44 additions and 44 deletions

View File

@@ -151,7 +151,7 @@ macOS employs defense in depth by relying on multiple layers of software and har
### Software Security
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">تنوية</p>
macOS allows you to install beta updates. These are unstable and may come with extra telemetry since they're for testing purposes. Because of this, we recommend you avoid beta software in general.
@@ -176,7 +176,7 @@ System Integrity Protection makes critical file locations read-only to protect a
On macOS, whether an app is sandboxed is determined by the developer when they sign it. The App Sandbox protects against vulnerabilities in the apps you run by limiting what a malicious actor can access in the event that the app is exploited. The App Sandbox *alone* can't protect against [:material-package-variant-closed-remove: Supply Chain Attacks](../basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian} by malicious developers. For that, sandboxing needs to be enforced by someone other than the developer themselves, as it is on the App Store.
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">تنوية</p>
Software downloaded from outside the official App Store is not required to be sandboxed. If your threat model prioritizes defending against [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }, then you may want to check if the software you download outside the App Store is sandboxed, which is up to the developer to *opt in*.
@@ -187,7 +187,7 @@ You can check if an app uses the App Sandbox in a few ways:
You can check if apps that are already running are sandboxed using the [Activity Monitor](https://developer.apple.com/documentation/security/protecting-user-data-with-app-sandbox#Verify-that-your-app-uses-App-Sandbox).
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">تنوية</p>
Just because one of an app's processes is sandboxed doesn't mean they all are.