1
0
mirror of https://github.com/privacyguides/i18n.git synced 2026-05-08 11:41:18 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2024-08-20 13:32:45 +00:00
parent 56c046443d
commit 7b168c33e5
145 changed files with 145 additions and 0 deletions
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: অ্যান্ড্রয়েড
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Übersicht
icon: simple/android
description: Android ist ein Open-Source-Betriebssystem mit starken Sicherheitsvorkehrungen, was es zu unserer ersten Wahl für Handys macht.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Ακεραιότητα Συσκευής
icon: material/security
description: Τα εξής εργαλεία μπορούν να χρησιμοποιηθούν για να ελέγξεις τις συσκευές σου για παραβίαση.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
Τα εξής εργαλεία μπορούν να χρησιμοποιηθούν για να επικυρώσεις την ακεραιότητα των κινητών σου και να τα ελέγξεις για ενδείξεις παραβίασης από "κατασκοπισμικό" (spyware) και "κακισμικό" (malware), όπως τα Pegasus, Predator, ή KingsPawn. Η παρούσα σελίδα επικεντρώνεται στην **ασφάλεια κινητών** επειδή αυτά έχουν συνήθως αναγνώσιμα-μόνο συστήματα με κοινότυπες διαμορφώσεις, οπότε ο εντοπισμός κακόβουλων τροποποιήσεων είναι ευκολότερος από ότι σε “παραδοσιακούς υπολογιστές.” Ενδέχεται να επεκτείνουμε το επίκεντρο αυτής της σελίδας στο μέλλον.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Επισκόπηση Android
icon: απλό/android
description: Το Android είναι ένα λειτουργικό σύστημα ανοιχτού κώδικα με ισχυρές δικλίδες ασφαλείας, γεγονός που το καθιστά την κορυφαία μας επιλογή για τηλέφωνα.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
En este sitio web recomendamos una amplia variedad de aplicaciones para Android. Las aplicaciones que se encuentran listadas son exclusivas para Android y están diseñadas para mejorar o reemplazar funcionalidades clave del sistema.
+1
View File
@@ -3,6 +3,7 @@ title: Integridad del Dispositivo
icon: material/security
description: Estas herramientas pueden utilizarse para comprobar si tus dispositivos están comprometidos.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
Estas herramientas pueden utilizarse para validar la integridad de tus dispositivos móviles y comprobar si presentan indicadores de compromiso por programas espía y maliciosos como Pegasus, Predator o KingsPawn. Esta página se centra en la **seguridad móvil**, porque los dispositivos móviles suelen tener sistemas de solo lectura con configuraciones bien conocidas, por lo que detectar modificaciones maliciosas es más fácil que en los sistemas de escritorio tradicionales. Es posible que en el futuro ampliemos el contenido de esta página.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Vista General de Android
icon: simple/android
description: Android es un sistema operativo de código abierto con fuertes medidas de seguridad, lo que lo convierte en nuestra primera opción para teléfonos.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Logotipo de Android](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Intégrité de l'appareil
icon: material/security
description: Ces outils peuvent être utilisés pour vérifier que vos appareils ne sont pas compromis.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
Ces outils peuvent être utilisés pour valider l'intégrité de vos appareils mobiles et vérifier s'ils présentent des indicateurs de compromission par des logiciels espions et malveillants tels que Pegasus, Predator ou KingsPawn. Cette page se concentre sur la **sécurité mobile**, car les appareils mobiles ont généralement des systèmes en lecture seule avec des configurations bien connues, de sorte que la détection de modifications malveillantes est plus facile que sur les systèmes de bureau traditionnels. Nous pourrions élargir la portée de cette page dans le futur.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Introduction à Android
icon: simple/android
description: Android est un système d'exploitation open source doté de solides protections de sécurité, ce qui en fait notre premier choix pour les téléphones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Logo d'Android](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: אנדרואיד
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: תקינות המכשיר
icon: material/security
description: ניתן להשתמש בכלים אלה כדי לבדוק אם המכשירים שלך נפגעו.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
ניתן להשתמש בכלים אלה כדי לאמת את תקינות המכשירים הניידים שלך ולבדוק אותם עבור אינדיקטורים של פשרה על ידי תוכנות ריגול ותוכנות זדוניות כגון Pegasus, Predator או KingsPawn. דף זה מתמקד ב-**אבטחת סלולר**, מכיוון שלמכשירים ניידים יש בדרך כלל מערכות לקריאה בלבד עם תצורות ידועות, כך שזיהוי שינויים זדוניים קל יותר מאשר במערכות שולחניות מסורתיות. אנו עשויים להרחיב את המיקוד של דף זה בעתיד.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![לוגו אנדרואיד](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Integrità del dispositivo
icon: material/security
description: Questi strumenti sono utilizzabili per verificare che i tuoi dispositivi non siano stati compromessi.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
Questi strumenti possono essere utilizzati per convalidare l'integrità dei tuoi dispositivi mobile e verificare la presenza di indicatori di compromissione da parte di spyware e malware come Pegasus, Predator o KingsPawn. Questa pagina affronta la **sicurezza mobile**, poiché i dispositivi mobili hanno tipicamente sistemi di sola lettura, con configurazioni ben note, quindi, rilevare modifiche dannose è più facile che con i sistemi desktop tradizionali. In futuro, potremmo espandere l'ambito di questa pagina.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Panoramica Android
icon: simple/android
description: Android è un sistema operativo open-source con forti protezioni di sicurezza, il che lo rende la nostra scelta migliore per i telefoni.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Logo di Android](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Androidの概要
icon: simple/android
description: Androidは、強力なセキュリティー保護機能を備えたオープンソースのオペレーティングシステムであり、携帯電話に関する最も優れた選択肢です。
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android 로고](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }
+1
View File
@@ -27,6 +27,7 @@ schema:
"@context": http://schema.org
"@type": WebPage
url: ./
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -20,6 +20,7 @@ schema:
name: Secure PDF Viewer
applicationCategory: Utilities
operatingSystem: Android
robots: nofollow, max-snippet:-1, max-image-preview:large
---
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
+1
View File
@@ -3,6 +3,7 @@ title: Device Integrity
icon: material/security
description: These tools can be used to check your devices for compromise.
cover: device-integrity.webp
robots: nofollow, max-snippet:-1, max-image-preview:large
---
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
+1
View File
@@ -21,6 +21,7 @@ schema:
author:
"@type": Organization
name: Privacy Guides
robots: nofollow, max-snippet:-1, max-image-preview:large
---
<small>Protects against the following threat(s):</small>
+1
View File
@@ -2,6 +2,7 @@
title: Android Overview
icon: simple/android
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
robots: nofollow, max-snippet:-1, max-image-preview:large
---
![Android logo](../assets/img/android/android.svg){ align=right }

Some files were not shown because too many files have changed in this diff Show More