From 7b1e695018c439e3249845889c0458566084e5fa Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Wed, 12 Nov 2025 10:38:14 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/nl/tor.md | 4 +-- i18n/zh-TW/os/macos-overview.md | 18 +++++----- i18n/zh-TW/self-hosting/dns-filtering.md | 42 +++++++++++----------- i18n/zh-TW/self-hosting/email-servers.md | 34 +++++++++--------- i18n/zh-TW/self-hosting/file-management.md | 2 +- i18n/zh-TW/self-hosting/index.md | 2 +- 6 files changed, 51 insertions(+), 51 deletions(-) diff --git a/i18n/nl/tor.md b/i18n/nl/tor.md index 21941921..a9e384a2 100644 --- a/i18n/nl/tor.md +++ b/i18n/nl/tor.md @@ -54,7 +54,7 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the top choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepagina](https://torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } [:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title="Documentatie" } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Broncode" } @@ -94,7 +94,7 @@ In addition to installing Tor Browser on your computer directly, there are also [:material-star-box: Lees onze laatste Onion Browser review](https://www.privacyguides.org/articles/2024/09/18/onion-browser-review) -[:octicons-home-16: Homepagina](https://onionbrowser.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacybeleid" } [:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title="Documentatie" } [:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Broncode" } diff --git a/i18n/zh-TW/os/macos-overview.md b/i18n/zh-TW/os/macos-overview.md index 4db74a4a..10762c46 100644 --- a/i18n/zh-TW/os/macos-overview.md +++ b/i18n/zh-TW/os/macos-overview.md @@ -266,11 +266,11 @@ macOS 通過僅允許官方 Apple 軟體在開機時運作,以防止惡意軟 開機 ROM 構成了硬體信任根。 這可確保惡意軟體無法篡改開機流程,因為 Boot ROM 不可變更。 Mac 啟動時,開機 ROM 第一個運行,為信任鏈中的第一個環節。 -Mac computers can be configured to boot in [three security modes](https://support.apple.com/guide/deployment/startup-security-dep5810e849c/web#dep32fb404e1): *Full Security*, *Reduced Security*, and *Permissive Security*, with the default setting being Full Security. You should ideally be using Full Security mode and avoid things like **[kernel extensions](https://support.apple.com/guide/deployment/system-extensions-in-macos-depa5fb8376f/web#dep51e097f45)** that force you to lower your security mode. 請務必[檢查](https://support.apple.com/guide/mac-help/change-security-settings-startup-disk-a-mac-mchl768f7291/mac)使用的是完全安全模式。 +Mac 電腦能使用三種[安全性模式](https://support.apple.com/guide/deployment/startup-security-dep5810e849c/web#dep32fb404e1)開機:*完全安全*、*降低安全*,以及*許可式安全*,預設值為完全安全。 理想情況下,您應該使用完全安全模式,並避免使用諸如[核心擴充元件](https://support.apple.com/guide/deployment/system-extensions-in-macos-depa5fb8376f/web#dep51e097f45)等軟體,而須降低安全模式。 請務必[檢查](https://support.apple.com/guide/mac-help/change-security-settings-startup-disk-a-mac-mchl768f7291/mac)使用的是完全安全模式。 #### 安全隔離區 -The **[Secure Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/web)** is a security chip built into devices with Apple Silicon which is responsible for storing and generating encryption keys for data at rest as well as Face ID and Touch ID data. It contains its own [separate boot ROM](https://support.apple.com/en-vn/guide/security/sec59b0b31ff/web#sec43006c49f). +**[Secure Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/web)** 是內建於使用 Apple Silicon 的裝置的安全晶片,負責儲存和產生資料儲存期間,以及 Face ID 和 Touch ID 資料的加密金鑰。 它包含自己的[另一組 Boot ROM](https://support.apple.com/en-vn/guide/security/sec59b0b31ff/web#sec43006c49f)。 您可以將安全隔離區想成裝置的安全中心:它具有 AES 加密引擎和安全儲存加密金鑰機制,它與系統的其餘部分分開,因此即使主處理器受到損害,也仍然保持安全。 @@ -282,17 +282,17 @@ Apple Touch ID 功能可使用生物識別技術安全地解鎖設備。 #### 硬體麥克風斷線 -All laptops with Apple Silicon or the T2 chip feature a [hardware disconnect](https://support.apple.com/guide/security/hardware-microphone-disconnect-secbbd20b00b/web) for the built-in microphone whenever the lid is closed. 這意味著即使作業系統受到破壞,攻擊者無法監聽 Mac 的麥克風。 +所有配備 Apple Silicon 或 T2 晶片的筆記型電腦,都具備在闔上螢幕時,以[硬體方式中斷](https://support.apple.com/guide/security/hardware-microphone-disconnect-secbbd20b00b/web)內建麥克風連線的功能。 這意味著即使作業系統受到破壞,攻擊者無法監聽 Mac 的麥克風。 請注意,攝影機沒有硬體斷接,因為只要上蓋關閉時,其視線即會被遮擋。 -#### Secure Camera Indicator +#### 相機安全指示燈 -The built-in camera in a Mac is designed so that the camera can't turn on without the camera indicator light [also turning on](https://support.apple.com/en-us/102177#:~:text=The%20camera%20is%20engineered%20so%20that%20it%20can’t%20activate%20without%20the%20camera%20indicator%20light%20also%20turning%20on.%20This%20is%20how%20you%20can%20tell%20if%20your%20camera%20is%20on.). +Mac 內建的相機設計是,如果相機指示燈[沒有亮起](https://support.apple.com/en-us/102177#:~:text=The%20camera%20is%20engineered%20so%20that%20it%20can’t%20activate%20without%20the%20camera%20indicator%20light%20also%20turning%20on.%20This%20is%20how%20you%20can%20tell%20if%20your%20camera%20is%20on.),就無法開啟相機。 #### 外圍處理器安全 -Computers have [built-in processors](https://support.apple.com/en-vn/guide/security/seca500d4f2b/1/web/1) other than the main CPU that handle things like networking, graphics, power management, etc. 這些處理器可能沒有足夠的安全性且受到損害,因此蘋果試圖減少其硬體中對這類處理器的需求。 +電腦除了主要的 CPU 之外還有其他的[內建處理器](https://support.apple.com/en-vn/guide/security/seca500d4f2b/1/web/1),用於處理網路、圖形、電源管理等事務。 這些處理器可能沒有足夠的安全性且受到損害,因此蘋果試圖減少其硬體中對這類處理器的需求。 當需要使用其中某一種處理器時,Apple 會與供應商合作,以確保該處理器 @@ -305,8 +305,8 @@ Computers have [built-in processors](https://support.apple.com/en-vn/guide/secur #### 直接記憶體存取保護 -Apple Silicon separates each component that requires [direct memory access](https://support.apple.com/guide/security/direct-memory-access-protections-seca4960c2b5/1/web/1). 例如,Thunderbolt 端口無法訪問為內核指定的記憶體。 +Apple Silicon 會將需要[直接存取記憶體](https://support.apple.com/guide/security/direct-memory-access-protections-seca4960c2b5/1/web/1)的各個元件分離。 例如,Thunderbolt 端口無法訪問為內核指定的記憶體。 -#### Terminal Secure Keyboard Entry +#### 終端機鍵盤輸入安全 -Enable [Secure Keyboard Entry](https://support.apple.com/guide/terminal/use-secure-keyboard-entry-trml109/mac) to prevent other apps from detecting what you type in the terminal. +開啟 [Secure Keyboard Entry](https://support.apple.com/guide/terminal/use-secure-keyboard-entry-trml109/mac) 可防止其他應用程式偵測您在終端機中輸入的內容。 diff --git a/i18n/zh-TW/self-hosting/dns-filtering.md b/i18n/zh-TW/self-hosting/dns-filtering.md index 3c1b9749..d4f59b48 100644 --- a/i18n/zh-TW/self-hosting/dns-filtering.md +++ b/i18n/zh-TW/self-hosting/dns-filtering.md @@ -1,35 +1,35 @@ --- -title: DNS Filtering -meta_title: "Self-Hosting DNS Solutions - Privacy Guides" +title: DNS 過濾 +meta_title: "自行架設 DNS 解決方案 - Privacy Guides" icon: material/dns -description: For our more technical readers, self-hosting a DNS solution can provide filtering for devices not covered by cloud-based DNS solutions. +description: 對於技術能力較高的讀者,自行架設 DNS 解決方案可為雲端 DNS 解決方案無法涵蓋的裝置提供過濾功能。 cover: dns.webp --- 防護下列威脅: -- [:material-server-network: Service Providers](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -- [:material-account-cash: Surveillance Capitalism](../basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } +- [:material-server-network: 服務供應商](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal } +- [:material-account-cash: 監控資本主義](../basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown } -**Self-hosting DNS** is useful for providing [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) on controlled platforms, such as smart TVs and other IoT devices, as no client-side software is needed. Keep in mind that the DNS solutions below are typically restricted to your home or local network unless you set up a more advanced configuration. +\*\* 自架 DNS\*\* 無須另外安裝客戶端軟體,對於在功能受控制的平台(例如智慧型電視和其他 IoT 裝置)進行 [DNS 過濾](https://cloudflare.com/learning/access-management/what-is-dns-filtering)非常有用。 請記得,除非您進行更進階的設定,不然下列 DNS 解決方案通常都只會對您住家網路或區域網路生效。 -## DNS Sinkholes +## DNS 天坑 -[**DNS sinkholes**](https://en.wikipedia.org/wiki/DNS_sinkhole) use DNS filtering to block unwanted web content such as advertisements. +[**DNS 天坑(DNS Sinkhole)**](https://en.wikipedia.org/wiki/DNS_sinkhole)就是使用 DNS 過濾技術來封鎖廣告等不想要的網頁內容。 ### Pi-Hole
-![Pi-hole logo](../assets/img/self-hosting/pi-hole.svg){ align=right } +![Pi-hole 圖示](../assets/img/self-hosting/pi-hole.svg){ align=right } -**Pi-hole** is an open-source DNS sinkhole which features a friendly web interface to view insights and manage blocked content. Pi-hole 設計應用在 Raspberry Pi ,但它並不限於這種硬體。 +**Pi-hole** 是一套開放原始碼的 DNS 天坑,提供友善的網頁介面,讓您可以看到統計資訊,並管理要封鎖的內容。 Pi-hole 設計應用在 Raspberry Pi ,但它並不限於這種硬體。 -[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title="Documentation" } -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title="Contribute" } +[:octicons-home-16: 首頁](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="隱私權政策" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title="文件" } +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="原始碼" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title="捐款" }
@@ -37,13 +37,13 @@ cover: dns.webp
-![AdGuard Home logo](../assets/img/self-hosting/adguard-home.svg){ align=right } +![AdGuard Home 圖示](../assets/img/self-hosting/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source DNS sinkhole which features a polished web interface to view insights and manage blocked content. +**AdGuard Home** 是一套開放原始碼的 DNS 天坑,提供精緻的網頁介面,讓您可以看到統計資訊,並管理要封鎖的內容。 -[:octicons-home-16: Homepage](https://adguard.com/adguard-home/overview.html){ .md-button .md-button--primary } -[:octicons-eye-16:](https://adguard.com/privacy/home.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/AdguardTeam/AdGuardHome/wiki){ .card-link title="Documentation" } -[:octicons-code-16:](https://github.com/AdguardTeam/AdGuardHome){ .card-link title="Source Code" } +[:octicons-home-16: 首頁](https://adguard.com/adguard-home/overview.html){ .md-button .md-button--primary } +[:octicons-eye-16:](https://adguard.com/privacy/home.html){ .card-link title="隱私權政策" } +[:octicons-info-16:](https://github.com/AdguardTeam/AdGuardHome/wiki){ .card-link title="文件" } +[:octicons-code-16:](https://github.com/AdguardTeam/AdGuardHome){ .card-link title="原始碼" }
diff --git a/i18n/zh-TW/self-hosting/email-servers.md b/i18n/zh-TW/self-hosting/email-servers.md index 01d783d9..96544bad 100644 --- a/i18n/zh-TW/self-hosting/email-servers.md +++ b/i18n/zh-TW/self-hosting/email-servers.md @@ -8,9 +8,9 @@ cover: email.webp 防護下列威脅: -- [:material-server-network: Service Providers](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal } +- [:material-server-network: 服務供應商](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal } -Advanced system administrators may consider setting up their own **email server**. Mail servers require attention and continuous maintenance in order to keep things secure and mail delivery reliable. In addition to the "all-in-one" solutions below, we've picked out a few articles that cover a more manual approach: +進階的系統管理員可以考慮自行架設**電子郵件伺服器**。 郵件伺服器需要關注與持續維護,以確保安全性和郵件傳遞的可靠性。 除了下列「all-in-one」解決方案外,我們也挑選了涵蓋較為手動的幾篇文章: - [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) - [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide) (August 2017) @@ -19,14 +19,14 @@ Advanced system administrators may consider setting up their own **email server*
-![Stalwart logo](../assets/img/self-hosting/stalwart.svg){ align=right } +![Stalwart 圖示](../assets/img/self-hosting/stalwart.svg){ align=right } -**Stalwart** is a newer mail server written in Rust which supports JMAP in addition to the standard IMAP, POP3, and SMTP. It has a wide variety of configuration options, but also defaults to very reasonable settings in terms of both security and features, making it easy to use immediately. It has web-based administration with TOTP 2FA support and allows you to enter your public PGP key to encrypt **all** incoming messages. +**Stalwart** 是用 Rust 寫成的新款郵件伺服器,除了標準的 IMAP、POP3 和 SMTP 外,還支援 JMAP。 它有多種設定選項,而且預設設定在安全性和功能性方面都非常合理,很容易立即使用。 它還有網頁管理介面,支援 TOTP 2FA,並允許您輸入 PGP 公鑰以加密**所有**來信。 -[:octicons-home-16: Homepage](https://stalw.art){ .md-button .md-button--primary } -[:octicons-info-16:](https://stalw.art/docs/get-started){ .card-link title="Documentation" } -[:octicons-code-16:](https://github.com/stalwartlabs){ .card-link title="Source Code" } -[:octicons-heart-16:](https://github.com/sponsors/stalwartlabs){ .card-link title="Contribute" } +[:octicons-home-16: 首頁](https://stalw.art){ .md-button .md-button--primary } +[:octicons-info-16:](https://stalw.art/docs/get-started){ .card-link title="文件" } +[:octicons-code-16:](https://github.com/stalwartlabs){ .card-link title="原始碼" } +[:octicons-heart-16:](https://github.com/sponsors/stalwartlabs){ .card-link title="捐款" }
@@ -40,14 +40,14 @@ We use Stalwart for our own internal email at _Privacy Guides_.
-![Mailcow logo](../assets/img/self-hosting/mailcow.svg){ align=right } +![Mailcow 圖示](../assets/img/self-hosting/mailcow.svg){ align=right } **Mailcow** is an advanced mail server perfect for those with Linux experience. It has everything you need in a Docker container: a mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. -[:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.mailcow.email){ .card-link title="Documentation" } -[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title="Contribute" } +[:octicons-home-16: 首頁](https://mailcow.email){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title="文件" } +[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="原始碼" } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title="捐款" }
@@ -55,12 +55,12 @@ We use Stalwart for our own internal email at _Privacy Guides_.
-![Mail-in-a-Box logo](../assets/img/self-hosting/mail-in-a-box.svg){ align=right } +![Mail-in-a-Box 圖示](../assets/img/self-hosting/mail-in-a-box.svg){ align=right } **Mail-in-a-Box** is an automated setup script for deploying a mail server on Ubuntu. Its goal is to make it easier for people to set up their own mail server. -[:octicons-home-16: Homepage](https://mailinabox.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailinabox.email/guide.html){ .card-link title="Documentation" } -[:octicons-code-16:](https://github.com/mail-in-a-box/mailinabox){ .card-link title="Source Code" } +[:octicons-home-16: 首頁](https://mailinabox.email){ .md-button .md-button--primary } +[:octicons-info-16:](https://mailinabox.email/guide.html){ .card-link title="文件" } +[:octicons-code-16:](https://github.com/mail-in-a-box/mailinabox){ .card-link title="原始碼" }
diff --git a/i18n/zh-TW/self-hosting/file-management.md b/i18n/zh-TW/self-hosting/file-management.md index ca7f9f71..8ec750b9 100644 --- a/i18n/zh-TW/self-hosting/file-management.md +++ b/i18n/zh-TW/self-hosting/file-management.md @@ -8,7 +8,7 @@ cover: cloud.webp 防護下列威脅: -- [:material-server-network: Service Providers](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal } +- [:material-server-network: 服務供應商](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal } Self-hosting your own **file management** tools may be a good idea to reduce the risk of encryption flaws in a cloud provider's native clients. diff --git a/i18n/zh-TW/self-hosting/index.md b/i18n/zh-TW/self-hosting/index.md index 5863f232..2d4f9835 100644 --- a/i18n/zh-TW/self-hosting/index.md +++ b/i18n/zh-TW/self-hosting/index.md @@ -7,7 +7,7 @@ cover: router.webp 防護下列威脅: -- [:material-server-network: Service Providers](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal } +- [:material-server-network: 服務供應商](../basics/common-threats.md#privacy-from-service-providers){ .pg-teal } **Self-hosting** software and services can be a way to achieve a higher level of privacy through digital sovereignty, particularly independence from cloud servers controlled by product developers or vendors. By self-hosting, we mean hosting applications and data on your own hardware.