1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-08-25 07:39:15 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2023-04-18 04:03:49 +00:00
parent 4c36e3083f
commit 7346421bed
774 changed files with 1336 additions and 487 deletions

View File

@@ -1,19 +1,19 @@
---
title: "Privacy Policy"
title: "プライバシーポリシー"
---
Privacy Guides is a community project operated by a number of active volunteer contributors. The public list of team members [can be found on GitHub](https://github.com/orgs/privacyguides/people).
## Data We Collect From Visitors
## 私たちが閲覧者から収集するデータ
The privacy of our website visitors is important to us, so we do not track any individual people. As a visitor to our website:
私たちは、ウェブサイト閲覧者のプライバシーを重視しているため、各個人を追跡することはありません。 As a visitor to our website:
- No personal information is collected
- No information such as cookies are stored in the browser
- No information is shared with, sent to or sold to third-parties
- No information is shared with advertising companies
- 個人情報を収集しません
- Cookieなどの情報をブラウザに保存しません
- 第三者に情報を共有・送信・販売しません
- 広告会社に情報を共有しません
- No information is mined and harvested for personal and behavioral trends
- No information is monetized
- 情報を収益化しません
You can view the data we collect on our [statistics](statistics.md) page.
@@ -40,7 +40,7 @@ On some websites and services you may provide additional information for your ac
We will store your account data as long as your account remains open. After closing an account, we may retain some or all of your account data in the form of backups or archives for up to 90 days.
## Contacting Us
## 連絡先
The Privacy Guides team generally does not have access to personal data outside of limited access granted via some moderation panels. Inquiries regarding your personal information should be sent directly to:
@@ -54,7 +54,7 @@ For all other inquiries, you can contact any member of our team.
For complaints under GDPR more generally, you may lodge complaints with your local data protection supervisory authorities. In France it's the Commission Nationale de l'Informatique et des Libertés which take care and handle the complaints. They provide a [template of complaint letter](https://www.cnil.fr/en/plaintes) to use.
## About This Policy
## このポリシーについて
We will post any new versions of this statement [here](privacy-policy.md). We may change how we announce changes in future versions of this document. In the meantime we may update our contact information at any time without announcing a change. Please refer to the [Privacy Policy](privacy-policy.md) for the latest contact information at any time.

View File

@@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
cover: android.png
schema:
-
"@context": http://schema.org

View File

@@ -2,6 +2,7 @@
title: "カレンダー同期"
icon: material/calendar
description: Calendars contain some of your most sensitive data; use products that implement encryption at rest.
cover: calendar.png
---
Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them.

View File

@@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide
title: "クラウドストレージ"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
cover: cloud.png
---
Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE.

View File

@@ -2,6 +2,7 @@
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: 暗号通貨
icon: material/bank-circle
cover: cryptocurrency.png
---
Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva
title: "データとメタデータの編集"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
cover: data-redaction.png
---
When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata.

View File

@@ -1,8 +1,9 @@
---
meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
meta_title: "プライバシーを尊重したPCとMac向けウェブブラウザ - Privacy Guides"
title: "デスクトップブラウザ"
icon: material/laptop
description: これらのウェブブラウザは、Google Chromeよりも強力なプライバシー保護を提供します。
cover: desktop-browsers.png
schema:
-
"@context": http://schema.org
@@ -81,7 +82,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins
Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead.
### Anti-Fingerprinting
### フィンガープリント対策
**Without** using a [VPN](vpn.md), Mullvad Browser provides the same protections against [naive fingerprinting scripts](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) as other private browsers like Firefox+[Arkenfox](#arkenfox-advanced) or [Brave](#brave). Mullvad Browser provides these protections out of the box, at the expense of some flexibility and convenience that other private browsers can provide.
@@ -129,19 +130,19 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-
These options can be found in :material-menu: → **Settings**
#### Search
#### 検索
- [ ] Uncheck **Provide search suggestions**
- [ ] **検索候補を使用する**のチェックを外す
Search suggestion features may not be available in your region.
Search suggestions send everything you type in the address bar to the default search engine, regardless of whether you submit an actual search. Disabling search suggestions allows you to more precisely control what data you send to your search engine provider.
#### Privacy & Security
#### プライバシーとセキュリティ
##### Enhanced Tracking Protection
##### 強化型トラッキング防止機能
- [x] Select **Strict** Enhanced Tracking Protection
- [x] 強化型トラッキング防止機能で**厳格**を選択する
This protects you by blocking social media trackers, fingerprinting scripts (note that this does not protect you from *all* fingerprinting), cryptominers, cross-site tracking cookies, and some other tracking content. ETP protects against many common threats, but it does not block all tracking avenues because it is designed to have minimal to no impact on site usability.
@@ -156,14 +157,14 @@ This protects you by blocking social media trackers, fingerprinting scripts (not
If you want to stay logged in to particular sites, you can allow exceptions in **Cookies and Site Data****Manage Exceptions...**
- [x] Check **Delete cookies and site data when Firefox is closed**
- [x] **Firefox を閉じたときに Cookie とサイトデータを削除する**にチェックをつける
This protects you from persistent cookies, but does not protect you against cookies acquired during any one browsing session. When this is enabled, it becomes possible to easily cleanse your browser cookies by simply restarting Firefox. You can set exceptions on a per-site basis, if you wish to stay logged in to a particular site you visit often.
##### Telemetry
- [ ] Uncheck **Allow Firefox to send technical and interaction data to Mozilla**
- [ ] Uncheck **Allow Firefox to install and run studies**
- [ ] **Firefox が技術的な対話データを Mozilla へ送信することを許可する**のチェックを外す
- [ ] **Firefox に調査のインストールと実行を許可する**のチェックを外す
- [ ] Uncheck **Allow Firefox to send backlogged crash reports on your behalf**
> Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs.
@@ -173,13 +174,13 @@ Additionally, the Firefox Accounts service collects [some technical data](https:
1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection)
2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts**
##### HTTPS-Only Mode
##### HTTPS-Only モード
- [x] Select **Enable HTTPS-Only Mode in all windows**
- [x] **すべてのウィンドウで HTTPS-Only モードを有効にする**を選択する
This prevents you from unintentionally connecting to a website in plain-text HTTP. Sites without HTTPS are uncommon nowadays, so this should have little to no impact on your day to day browsing.
#### Sync
#### 同期
[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE.
@@ -296,7 +297,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack
1. This option is not present on all platforms.
#### Sync
#### 同期
[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
@@ -306,7 +307,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack
**Brave Wallet** operates locally on your computer, but does not support any private cryptocurrencies, so we would discourage using this feature as well.
## Additional Resources
## 追加のリソース
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. However, uBlock Origin may prove useful if you value content blocking functionality.
@@ -314,9 +315,9 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
!!! recommendation
![uBlock Origin logo](assets/img/browsers/ublock_origin.svg){ align=right }
![uBlock Originのロゴ](assets/img/browsers/ublock_origin.svg){ align=right }
**uBlock Origin** is a popular content blocker that could help you block ads, trackers, and fingerprinting scripts.
**uBlock Origin**は、広告、トラッカー、フィンガープリントスクリプトのブロックに役立つ人気のコンテンツブロッカーです。
[:octicons-repo-16: Repository](https://github.com/gorhill/uBlock#readme){ .md-button .md-button--primary }
[:octicons-eye-16:](https://github.com/gorhill/uBlock/wiki/Privacy-policy){ .card-link title="Privacy Policy" }
@@ -338,7 +339,7 @@ These are some other [filter lists](https://github.com/gorhill/uBlock/wiki/Dashb
- [x] Check **Privacy** > **AdGuard URL Tracking Protection**
- Add [Actually Legitimate URL Shortener Tool](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt)
## Criteria
## 基準
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.

View File

@@ -2,6 +2,7 @@
title: "Desktop/PC"
icon: simple/linux
description: Linux distributions are commonly recommended for privacy protection and software freedom.
cover: desktop.png
---
Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions.

View File

@@ -2,6 +2,7 @@
title: "DNS Resolvers"
icon: material/dns
description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration.
cover: dns.png
---
Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. Encrypted DNS will not help you hide any of your browsing activity.

View File

@@ -2,6 +2,7 @@
title: "メールクライアント"
icon: material/email-open
description: These email clients are privacy-respecting and support OpenPGP email encryption.
cover: email-clients.png
---
Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft.

View File

@@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
cover: email.png
---
Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy.

View File

@@ -1,8 +1,9 @@
---
meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
meta_title: "おすすめの暗号化ソフトウェア: VeraCryptCryptomatorPicoCryptOpenPGP - Privacy Guides"
title: "暗号化ソフトウェア"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
cover: encryption.png
---
Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here.
@@ -11,7 +12,7 @@ Encryption of data is the only way to control who can access it. If you are curr
The options listed here are multi-platform and great for creating encrypted backups of your data.
### Cryptomator (Cloud)
### Cryptomator(クラウド)
!!! recommendation
@@ -85,7 +86,7 @@ When encrypting with VeraCrypt, you have the option to select from different [ha
Truecrypt has been [audited a number of times](https://en.wikipedia.org/wiki/TrueCrypt#Security_audits), and VeraCrypt has also been [audited separately](https://en.wikipedia.org/wiki/VeraCrypt#VeraCrypt_audit).
## OS Full Disk Encryption
## OSのフルディスク暗号化
Modern operating systems include [FDE](https://en.wikipedia.org/wiki/Disk_encryption) and will have a [secure cryptoprocessor](https://en.wikipedia.org/wiki/Secure_cryptoprocessor).
@@ -334,7 +335,7 @@ When encrypting with PGP, you have the option to configure different options in
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain)
## Criteria
## 基準
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.

View File

@@ -2,6 +2,7 @@
title: "ファイル共有と同期"
icon: material/share-variant
description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
cover: file-sharing.png
---
Discover how to privately share your files between your devices, with your friends and family, or anonymously online.

View File

@@ -1,6 +1,7 @@
---
title: 金融サービス
icon: material/bank
cover: financial-services.png
---
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@@ -2,6 +2,7 @@
title: "フロントエンド"
icon: material/flip-to-front
description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances.
cover: frontends.png
---
Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions.

View File

@@ -1,5 +1,5 @@
---
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
meta_title: "Privacy Guides: プライバシーとセキュリティに関する独立したリソース"
template: overrides/home.ja.html
hide:
- navigation

View File

@@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
cover: mobile-browsers.png
schema:
-
"@context": http://schema.org

View File

@@ -2,6 +2,7 @@
title: "Multi-Factor Authenticators"
icon: 'material/two-factor-authentication'
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
cover: multi-factor-authentication.png
---
## Hardware Security Keys

View File

@@ -2,6 +2,7 @@
title: "News Aggregators"
icon: material/rss
description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS.
cover: news-aggregators.png
---
A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites.

View File

@@ -2,6 +2,7 @@
title: "ノート"
icon: material/notebook-edit-outline
description: 暗号化ノートアプリで、第三者による閲覧を防止しながらメモを管理できます。
cover: notebooks.png
---
第三者による閲覧を防止しながら、メモや日記を保存できます。

View File

@@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P
title: "パスワードマネージャ"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
cover: passwords.png
schema:
-
"@context": http://schema.org

View File

@@ -2,6 +2,7 @@
title: "生産性向上ツール"
icon: material/file-sign
description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do.
cover: productivity.png
---
Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints.

View File

@@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "リアルタイムコミュニケーション"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.
cover: real-time-communication.png
---
These are our recommendations for encrypted real-time communication.

View File

@@ -2,6 +2,7 @@
title: "Router Firmware"
icon: material/router-wireless
description: These alternative operating systems can be used to secure your router or Wi-Fi access point.
cover: router.png
---
Below are a few alternative operating systems, that can be used on routers, Wi-Fi access points, etc.

View File

@@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy
title: "検索エンジン"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
cover: search-engines.png
---
Use a search engine that doesn't build an advertising profile based on your searches.

View File

@@ -3,6 +3,7 @@ meta_title: "Tor Browserとネットワーク: 匿名のウェブブラウジン
title: "Torネットワーク"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
cover: tor.png
schema:
-
"@context": http://schema.org
@@ -24,7 +25,7 @@ schema:
![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right }
The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool.
**Tor**ネットワークは、ボランティアが運営するサーバ群で、無料で接続でき、インターネット上でのプライバシーとセキュリティの確保に役立ちます。 個人や組織は、プライバシーを損なうことなく、Torネットワーク上で「.onion 秘匿サービス」による情報共有が可能です。 Torトラフィックはブロックや追跡が困難であるため、Torは効果的な検閲回避ツールです。
[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage }
[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" }

View File

@@ -2,6 +2,7 @@
title: "Video Streaming"
icon: material/video-wireless
description: These networks allow you to stream internet content without building an advertising profile based on your interests.
cover: video-streaming.png
---
The primary threat when using a video streaming platform is that your streaming habits and subscription lists could be used to profile you. You should combine these tools with a [VPN](vpn.md) or [Tor](https://www.torproject.org/) to make it harder to profile your usage.

View File

@@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or
title: "VPNサービス"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isnt out to spy on you.
cover: vpn.png
---
If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: