1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-08-05 23:51:04 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2025-07-30 18:42:53 +00:00
parent f6da647fd6
commit 77bc96d46b
3 changed files with 8 additions and 8 deletions

View File

@@ -100,12 +100,12 @@ Teprve až si odpovíte na tyto otázky, budete moci posoudit, která opatření
Vytvoření zabezpečovacího plánu vám pomůže ujasnit si hrozby, které jsou relevantní pro vás, a zvážit faktory, jako je váš majetek, možní útočníci, jejich schopnosti, spolu s pravděpodobností rizik, kterým čelíte.
## Further Reading
## Přečtěte si také
For people looking to increase their privacy and security online, we've compiled a list of common threats our visitors face or goals our visitors have, to give you some inspiration and demonstrate the basis of our recommendations.
Sestavili jsme seznam běžných hrozeb pro lidi, kteří chtějí zvýšit svoje soukromí a bezpečnost on-line, kterým naši čtenáři čelí, a také cíle, které mají, abychom vám dodali inspiraci a předvedli vám naše základní doporučení.
- [Common Goals and Threats :material-arrow-right-drop-circle:](common-threats.md)
- [Běžné cíle a hrozby :material-arrow-right-drop-circle:](common-threats.md)
## Sources
## Zdroje
- [EFF Surveillance Self Defense: Your Security Plan](https://ssd.eff.org/en/module/your-security-plan)
- [EFF o sebeobraně proti sledování: Váš bezpečnostní plán (v angličtině)](https://ssd.eff.org/en/module/your-security-plan)

View File

@@ -289,6 +289,6 @@ When it is necessary to use one of these processors, Apple works with the vendor
Apple Silicon separates each component that requires direct memory access. For example, a Thunderbolt port can't access memory designated for the kernel.
## Sources
## Zdroje
- [Apple Platform Security](https://support.apple.com/guide/security/welcome/web)

View File

@@ -240,7 +240,7 @@ Tuta supporta l'[autenticazione a due fattori](https://tuta.com/support#2fa) tra
#### :material-check:{ .pg-green } Sicurezza dei dati
Tuta has [zero-access encryption at rest](https://tuta.com/support#what-encrypted) for your emails, [address book contacts](https://tuta.com/support#encrypted-address-book), and [calendars](https://tuta.com/support#calendar). Ciò significa che messaggi e altri dati memorizzati nel tuo profilo, sono leggibili soltanto da te.
Tuta dispone di una [crittografia ad accesso zero a riposo](https://tuta.com/support#what-encrypted) per le email, i [contatti della rubrica](https://tuta.com/support#encrypted-address-book) e i [calendari](https://tuta.com/support#calendar). Ciò significa che messaggi e altri dati memorizzati nel tuo profilo, sono leggibili soltanto da te.
#### :material-information-outline:{ .pg-blue } Crittografia Email
@@ -260,7 +260,7 @@ Tuta offre la versione business di [Tuta alle organizzazioni non profit](https:/
### Tecnologia
Consideriamo queste funzionalità come importanti per poter fornire un servizio sicuro e ottimale. You should consider whether the provider has the features you require.
Consideriamo queste funzionalità come importanti per poter fornire un servizio sicuro e ottimale. Dovresti valutare se il fornitore ha le caratteristiche da te richieste.
**Requisiti minimi:**