From 806555d819611ea2234fa5c92c71c268d695a66f Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Sat, 7 Oct 2023 20:33:08 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/ja/basics/common-threats.md | 2 +- i18n/ja/basics/vpn-overview.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/i18n/ja/basics/common-threats.md b/i18n/ja/basics/common-threats.md index 925c6044..b293bcb9 100644 --- a/i18n/ja/basics/common-threats.md +++ b/i18n/ja/basics/common-threats.md @@ -71,7 +71,7 @@ Thankfully, E2EE can alleviate this issue by encrypting communications between y Even with E2EE, service providers can still profile you based on **metadata**, which typically isn't protected. While the service provider can't read your messages, they can still observe important things, such as who you're talking to, how often you message them, and when you're typically active. Protection of metadata is fairly uncommon, and—if it's within your [threat model](threat-modeling.md)—you should pay close attention to the technical documentation of the software you're using to see if there's any metadata minimization or protection at all. -## Mass Surveillance Programs +## 大量監視プログラム :material-eye-outline: Mass Surveillance diff --git a/i18n/ja/basics/vpn-overview.md b/i18n/ja/basics/vpn-overview.md index bfbc0670..e9a12343 100644 --- a/i18n/ja/basics/vpn-overview.md +++ b/i18n/ja/basics/vpn-overview.md @@ -66,7 +66,7 @@ For situations like these, or if you have another compelling reason, the VPN pro ## Sources and Further Reading 1. [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert -1. [Tor Network Overview](../advanced/tor-overview.md) +1. [Torネットワークの概要](../advanced/tor-overview.md) 1. [IVPN Privacy Guides](https://www.ivpn.net/privacy-guides) 1. ["Do I need a VPN?"](https://www.doineedavpn.com), a tool developed by IVPN to challenge aggressive VPN marketing by helping individuals decide if a VPN is right for them.