1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-19 17:24:25 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2023-10-07 20:33:08 +00:00
parent 5f8b313e43
commit 806555d819
2 changed files with 2 additions and 2 deletions

View File

@ -71,7 +71,7 @@ Thankfully, E2EE can alleviate this issue by encrypting communications between y
Even with E2EE, service providers can still profile you based on **metadata**, which typically isn't protected. While the service provider can't read your messages, they can still observe important things, such as who you're talking to, how often you message them, and when you're typically active. Protection of metadata is fairly uncommon, and—if it's within your [threat model](threat-modeling.md)—you should pay close attention to the technical documentation of the software you're using to see if there's any metadata minimization or protection at all.
## Mass Surveillance Programs
## 大量監視プログラム
<span class="pg-blue">:material-eye-outline: Mass Surveillance</span>

View File

@ -66,7 +66,7 @@ For situations like these, or if you have another compelling reason, the VPN pro
## Sources and Further Reading
1. [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert
1. [Tor Network Overview](../advanced/tor-overview.md)
1. [Torネットワークの概要](../advanced/tor-overview.md)
1. [IVPN Privacy Guides](https://www.ivpn.net/privacy-guides)
1. ["Do I need a VPN?"](https://www.doineedavpn.com), a tool developed by IVPN to challenge aggressive VPN marketing by helping individuals decide if a VPN is right for them.