mirror of
https://github.com/privacyguides/i18n.git
synced 2025-08-24 15:19:19 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@@ -3,6 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
|
||||
title: "Android"
|
||||
icon: 'simple/android'
|
||||
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
|
||||
cover: android.png
|
||||
schema:
|
||||
-
|
||||
"@context": http://schema.org
|
||||
|
@@ -2,6 +2,7 @@
|
||||
title: "Clientes de e-mail"
|
||||
icon: material/calendar
|
||||
description: Calendars contain some of your most sensitive data; use products that implement encryption at rest.
|
||||
cover: calendar.png
|
||||
---
|
||||
|
||||
Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them.
|
||||
|
@@ -3,6 +3,7 @@ meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guide
|
||||
title: "Email"
|
||||
icon: material/file-cloud
|
||||
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
|
||||
cover: cloud.png
|
||||
---
|
||||
|
||||
Many cloud storage providers require your full trust that they will not look at your files. The alternatives listed below eliminate the need for trust by implementing secure E2EE.
|
||||
|
@@ -2,6 +2,7 @@
|
||||
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
|
||||
title: Cryptocurrency
|
||||
icon: material/bank-circle
|
||||
cover: cryptocurrency.png
|
||||
---
|
||||
|
||||
Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:
|
||||
|
@@ -3,6 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva
|
||||
title: "Ferramentas de encriptação"
|
||||
icon: material/tag-remove
|
||||
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
|
||||
cover: data-redaction.png
|
||||
---
|
||||
|
||||
Ao partilhar ficheiros, certifique-se de que remove os metadados associados. Os arquivos de imagem geralmente incluem [EXIF](https://en.wikipedia.org/wiki/Exif) dados. As fotos às vezes até incluem [GPS](https://en.wikipedia.org/wiki/Global_Positioning_System) coordenadas nos metadados do arquivo.
|
||||
|
@@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
|
||||
title: "Desktop Browsers"
|
||||
icon: material/laptop
|
||||
description: These web browsers provide stronger privacy protections than Google Chrome.
|
||||
cover: desktop-browsers.png
|
||||
schema:
|
||||
-
|
||||
"@context": http://schema.org
|
||||
|
@@ -2,6 +2,7 @@
|
||||
title: "Armazenamento em nuvem"
|
||||
icon: fontawesome/brands/linux
|
||||
description: Linux distributions are commonly recommended for privacy protection and software freedom.
|
||||
cover: desktop.png
|
||||
---
|
||||
|
||||
Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions.
|
||||
|
@@ -2,6 +2,7 @@
|
||||
title: "Introdução ao DNS"
|
||||
icon: material/dns
|
||||
description: These are some encrypted DNS providers we recommend switching to, to replace your ISP's default configuration.
|
||||
cover: dns.png
|
||||
---
|
||||
|
||||
Encrypted DNS with third-party servers should only be used to get around basic [DNS blocking](https://en.wikipedia.org/wiki/DNS_blocking) when you can be sure there won't be any consequences. DNS criptografado não o ajudará a ocultar qualquer atividade de navegação.
|
||||
|
@@ -2,6 +2,7 @@
|
||||
title: "Partilha de ficheiros"
|
||||
icon: material/email-open
|
||||
description: These email clients are privacy-respecting and support OpenPGP email encryption.
|
||||
cover: email-clients.png
|
||||
---
|
||||
|
||||
Nossa lista de recomendações contém clientes de e-mail que suportam tanto [OpenPGP](/encryption/#openpgp) e autenticação forte como [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth permite-lhe utilizar [Multi-Factor Authentication](/multi-factor-authentication) e prevenir o roubo de contas.
|
||||
|
@@ -3,6 +3,7 @@ meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
|
||||
title: "Email Services"
|
||||
icon: material/email
|
||||
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
|
||||
cover: email.png
|
||||
---
|
||||
|
||||
Encontre um provedor de e-mail seguro que manterá sua privacidade em mente. Não se contente com plataformas suportadas por anúncios.
|
||||
|
@@ -3,6 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt,
|
||||
title: "Software de encriptação"
|
||||
icon: material/file-lock
|
||||
description: A encriptação de dados é a única forma de controlar quem pode acessá-los. These tools allow you to encrypt your emails and any other files.
|
||||
cover: encryption.png
|
||||
---
|
||||
|
||||
A encriptação de dados é a única forma de controlar quem pode acessá-los. Se você não estiver usando software de criptografia para o seu disco rígido, e-mails ou arquivos, você deve escolher uma opção aqui.
|
||||
|
@@ -2,6 +2,7 @@
|
||||
title: "Ferramentas de Autenticação Multi-Factor"
|
||||
icon: material/share-variant
|
||||
description: Descubra como partilhar os seus ficheiros em privado entre os seus dispositivos, com os seus amigos e família, ou anonimamente online.
|
||||
cover: file-sharing.png
|
||||
---
|
||||
|
||||
Descubra como partilhar os seus ficheiros em privado entre os seus dispositivos, com os seus amigos e família, ou anonimamente online.
|
||||
|
@@ -1,6 +1,7 @@
|
||||
---
|
||||
title: Financial Services
|
||||
icon: material/bank
|
||||
cover: financial-services.png
|
||||
---
|
||||
|
||||
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:
|
||||
|
@@ -2,6 +2,7 @@
|
||||
title: "Gestores de senhas"
|
||||
icon: material/flip-to-front
|
||||
description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances.
|
||||
cover: frontends.png
|
||||
---
|
||||
|
||||
Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions.
|
||||
|
@@ -3,6 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac
|
||||
title: "Mobile Browsers"
|
||||
icon: material/cellphone-information
|
||||
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.
|
||||
cover: mobile-browsers.png
|
||||
schema:
|
||||
-
|
||||
"@context": http://schema.org
|
||||
|
@@ -2,6 +2,7 @@
|
||||
title: "Autenticadores Multi-Factor"
|
||||
icon: 'O uso de AMF forte pode parar mais de 99% dos acessos não autorizados à conta, e é fácil de configurar nos serviços que você já usa.'
|
||||
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
|
||||
cover: multi-factor-authentication.png
|
||||
---
|
||||
|
||||
## Chaves de Segurança de Hardware
|
||||
|
@@ -2,6 +2,7 @@
|
||||
title: "Comunicação em Tempo Real"
|
||||
icon: material/rss
|
||||
description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS.
|
||||
cover: news-aggregators.png
|
||||
---
|
||||
|
||||
A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites.
|
||||
|
@@ -2,6 +2,7 @@
|
||||
title: "Cadernos de notas"
|
||||
icon: material/notebook-edit-outline
|
||||
description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party.
|
||||
cover: notebooks.png
|
||||
---
|
||||
|
||||
Mantenha um registo das suas notas e diários sem os entregar a terceiros.
|
||||
|
@@ -3,6 +3,7 @@ meta_title: "The Best Password Managers to Protect Your Privacy and Security - P
|
||||
title: "Redes Auto-Contidas"
|
||||
icon: material/form-textbox-password
|
||||
description: Password managers allow you to securely store and manage passwords and other credentials.
|
||||
cover: passwords.png
|
||||
schema:
|
||||
-
|
||||
"@context": http://schema.org
|
||||
|
@@ -2,6 +2,7 @@
|
||||
title: "Clientes de streaming de vídeo"
|
||||
icon: material/file-sign
|
||||
description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do.
|
||||
cover: productivity.png
|
||||
---
|
||||
|
||||
Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do. The privacy policy may legally protect your rights, but it does not provide technical access constraints.
|
||||
|
@@ -3,6 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides"
|
||||
title: "Clientes de streaming de vídeo"
|
||||
icon: material/chat-processing
|
||||
description: Other instant messengers make all of your private conversations available to the company that runs them.
|
||||
cover: real-time-communication.png
|
||||
---
|
||||
|
||||
These are our recommendations for encrypted real-time communication.
|
||||
|
@@ -2,6 +2,7 @@
|
||||
title: "Router Firmware"
|
||||
icon: material/router-wireless
|
||||
description: These alternative operating systems can be used to secure your router or Wi-Fi access point.
|
||||
cover: router.png
|
||||
---
|
||||
|
||||
Abaixo estão alguns sistemas operacionais alternativos, que podem ser usados em roteadores, pontos de acesso Wi-Fi, etc.
|
||||
|
@@ -3,6 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy
|
||||
title: "Motores de Busca"
|
||||
icon: material/search-web
|
||||
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
|
||||
cover: search-engines.png
|
||||
---
|
||||
|
||||
Use um motor de busca que não construa um perfil publicitário baseado nas suas pesquisas.
|
||||
|
@@ -3,6 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
|
||||
title: "Tor Network"
|
||||
icon: simple/torproject
|
||||
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
|
||||
cover: tor.png
|
||||
schema:
|
||||
-
|
||||
"@context": http://schema.org
|
||||
|
@@ -2,6 +2,7 @@
|
||||
title: "Transmissão de vídeo"
|
||||
icon: material/video-wireless
|
||||
description: These networks allow you to stream internet content without building an advertising profile based on your interests.
|
||||
cover: video-streaming.png
|
||||
---
|
||||
|
||||
A principal ameaça ao usar uma plataforma de streaming de vídeo é que os seus hábitos de streaming e listas de assinaturas podem ser usados para traçar o seu perfil. Você deve combinar estas ferramentas com um [VPN](/vpn) ou [Tor](https://www.torproject.org/) para tornar mais difícil o perfil do seu uso.
|
||||
|
@@ -3,6 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or
|
||||
title: "VPN Services"
|
||||
icon: material/vpn
|
||||
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isn’t out to spy on you.
|
||||
cover: vpn.png
|
||||
---
|
||||
|
||||
If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest:
|
||||
|
Reference in New Issue
Block a user