mirror of
https://github.com/privacyguides/i18n.git
synced 2026-05-09 12:11:19 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: অ্যান্ড্রয়েড
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Übersicht
|
||||
icon: simple/android
|
||||
description: Android ist ein Open-Source-Betriebssystem mit starken Sicherheitsvorkehrungen, was es zu unserer ersten Wahl für Handys macht.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Ακεραιότητα Συσκευής
|
||||
icon: material/security
|
||||
description: Τα εξής εργαλεία μπορούν να χρησιμοποιηθούν για να ελέγξεις τις συσκευές σου για παραβίαση.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
Τα εξής εργαλεία μπορούν να χρησιμοποιηθούν για να επικυρώσεις την ακεραιότητα των κινητών σου και να τα ελέγξεις για ενδείξεις παραβίασης από "κατασκοπισμικό" (spyware) και "κακισμικό" (malware), όπως τα Pegasus, Predator, ή KingsPawn. Η παρούσα σελίδα επικεντρώνεται στην **ασφάλεια κινητών** επειδή αυτά έχουν συνήθως αναγνώσιμα-μόνο συστήματα με κοινότυπες διαμορφώσεις, οπότε ο εντοπισμός κακόβουλων τροποποιήσεων είναι ευκολότερος από ότι σε “παραδοσιακούς υπολογιστές.” Ενδέχεται να επεκτείνουμε το επίκεντρο αυτής της σελίδας στο μέλλον.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Επισκόπηση Android
|
||||
icon: απλό/android
|
||||
description: Το Android είναι ένα λειτουργικό σύστημα ανοιχτού κώδικα με ισχυρές δικλίδες ασφαλείας, γεγονός που το καθιστά την κορυφαία μας επιλογή για τηλέφωνα.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
En este sitio web recomendamos una amplia variedad de aplicaciones para Android. Las aplicaciones que se encuentran listadas son exclusivas para Android y están diseñadas para mejorar o reemplazar funcionalidades clave del sistema.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Integridad del Dispositivo
|
||||
icon: material/security
|
||||
description: Estas herramientas pueden utilizarse para comprobar si tus dispositivos están comprometidos.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
Estas herramientas pueden utilizarse para validar la integridad de tus dispositivos móviles y comprobar si presentan indicadores de compromiso por programas espía y maliciosos como Pegasus, Predator o KingsPawn. Esta página se centra en la **seguridad móvil**, porque los dispositivos móviles suelen tener sistemas de solo lectura con configuraciones bien conocidas, por lo que detectar modificaciones maliciosas es más fácil que en los sistemas de escritorio tradicionales. Es posible que en el futuro ampliemos el contenido de esta página.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Vista General de Android
|
||||
icon: simple/android
|
||||
description: Android es un sistema operativo de código abierto con fuertes medidas de seguridad, lo que lo convierte en nuestra primera opción para teléfonos.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Intégrité de l'appareil
|
||||
icon: material/security
|
||||
description: Ces outils peuvent être utilisés pour vérifier que vos appareils ne sont pas compromis.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
Ces outils peuvent être utilisés pour valider l'intégrité de vos appareils mobiles et vérifier s'ils présentent des indicateurs de compromission par des logiciels espions et malveillants tels que Pegasus, Predator ou KingsPawn. Cette page se concentre sur la **sécurité mobile**, car les appareils mobiles ont généralement des systèmes en lecture seule avec des configurations bien connues, de sorte que la détection de modifications malveillantes est plus facile que sur les systèmes de bureau traditionnels. Nous pourrions élargir la portée de cette page dans le futur.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Introduction à Android
|
||||
icon: simple/android
|
||||
description: Android est un système d'exploitation open source doté de solides protections de sécurité, ce qui en fait notre premier choix pour les téléphones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: אנדרואיד
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: תקינות המכשיר
|
||||
icon: material/security
|
||||
description: ניתן להשתמש בכלים אלה כדי לבדוק אם המכשירים שלך נפגעו.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
ניתן להשתמש בכלים אלה כדי לאמת את תקינות המכשירים הניידים שלך ולבדוק אותם עבור אינדיקטורים של פשרה על ידי תוכנות ריגול ותוכנות זדוניות כגון Pegasus, Predator או KingsPawn. דף זה מתמקד ב-**אבטחת סלולר**, מכיוון שלמכשירים ניידים יש בדרך כלל מערכות לקריאה בלבד עם תצורות ידועות, כך שזיהוי שינויים זדוניים קל יותר מאשר במערכות שולחניות מסורתיות. אנו עשויים להרחיב את המיקוד של דף זה בעתיד.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Integrità del dispositivo
|
||||
icon: material/security
|
||||
description: Questi strumenti sono utilizzabili per verificare che i tuoi dispositivi non siano stati compromessi.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
Questi strumenti possono essere utilizzati per convalidare l'integrità dei tuoi dispositivi mobile e verificare la presenza di indicatori di compromissione da parte di spyware e malware come Pegasus, Predator o KingsPawn. Questa pagina affronta la **sicurezza mobile**, poiché i dispositivi mobili hanno tipicamente sistemi di sola lettura, con configurazioni ben note, quindi, rilevare modifiche dannose è più facile che con i sistemi desktop tradizionali. In futuro, potremmo espandere l'ambito di questa pagina.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Panoramica Android
|
||||
icon: simple/android
|
||||
description: Android è un sistema operativo open-source con forti protezioni di sicurezza, il che lo rende la nostra scelta migliore per i telefoni.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Androidの概要
|
||||
icon: simple/android
|
||||
description: Androidは、強力なセキュリティー保護機能を備えたオープンソースのオペレーティングシステムであり、携帯電話に関する最も優れた選択肢です。
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
@@ -27,6 +27,7 @@ schema:
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
url: ./
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -20,6 +20,7 @@ schema:
|
||||
name: Secure PDF Viewer
|
||||
applicationCategory: Utilities
|
||||
operatingSystem: Android
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||||
|
||||
@@ -3,6 +3,7 @@ title: Device Integrity
|
||||
icon: material/security
|
||||
description: These tools can be used to check your devices for compromise.
|
||||
cover: device-integrity.webp
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
These tools can be used to validate the integrity of your mobile devices and check them for indicators of compromise by spyware and malware such as Pegasus, Predator, or KingsPawn. This page focuses on **mobile security**, because mobile devices typically have read-only systems with well-known configurations, so detecting malicious modifications is easier than on traditional desktop systems. We may expand the focus of this page in the future.
|
||||
|
||||
@@ -21,6 +21,7 @@ schema:
|
||||
author:
|
||||
"@type": Organization
|
||||
name: Privacy Guides
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
<small>Protects against the following threat(s):</small>
|
||||
|
||||
@@ -2,6 +2,7 @@
|
||||
title: Android Overview
|
||||
icon: simple/android
|
||||
description: Android is an open-source operating system with strong security protections, which makes it our top choice for phones.
|
||||
robots: nofollow, max-snippet:-1, max-image-preview:large
|
||||
---
|
||||
|
||||
{ align=right }
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user