diff --git a/i18n/pt-BR/android/general-apps.md b/i18n/pt-BR/android/general-apps.md index 04919076..18cd0fa6 100644 --- a/i18n/pt-BR/android/general-apps.md +++ b/i18n/pt-BR/android/general-apps.md @@ -49,7 +49,7 @@ Shelter supports blocking contact search cross profiles and sharing files across
Warning
+Aviso
When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. diff --git a/i18n/pt-BR/basics/hardware.md b/i18n/pt-BR/basics/hardware.md index 579b9a2d..0848caaf 100644 --- a/i18n/pt-BR/basics/hardware.md +++ b/i18n/pt-BR/basics/hardware.md @@ -53,7 +53,7 @@ Biometrics can prevent someone from watching you type in your password, so if sh Most implementations of face authentication require you to be looking at your phone and also only work from a relatively close distance, so you don't need to worry too much about someone pointing your phone at your face to unlock it without your consent. You can still disable biometrics when your phone is locked if you want. On iOS, you can hold the side button and a volume button for 3 seconds to disable Face ID on models that support it. On Android, hold the power button and press Lockdown on the menu.Warning
+Aviso
Some devices do not have the proper hardware for secure face authentication. There's two main types of face authentication: 2D and 3D. 3D face authentication makes use of a dot projector that lets the device create a 3D depth map of your face. Make sure that your device has this capability. @@ -82,7 +82,7 @@ Hardware keys are devices that use strong cryptography to authenticate you to a If you don't want to trust your OS's permission controls to prevent the camera from activating in the first place, you can buy camera blockers that physically prevent light from reaching the camera. You could also buy a device that doesn't have a built-in camera and use an external camera that you can unplug whenever you're done using it. Some devices come with built-in camera blockers or hardware switches that physically disconnect the camera from power.Warning
+Aviso
You should only buy covers that fit your laptop and won't cause damage when you close the lid. Covering the camera will interfere with automatic brightness and face authentication features. diff --git a/i18n/pt-BR/basics/multi-factor-authentication.md b/i18n/pt-BR/basics/multi-factor-authentication.md index cb5b83ac..2ac44044 100644 --- a/i18n/pt-BR/basics/multi-factor-authentication.md +++ b/i18n/pt-BR/basics/multi-factor-authentication.md @@ -135,7 +135,7 @@ The command will prevent an adversary from bypassing MFA when the computer boots ### LinuxWarning
+Aviso
If the hostname of your system changes (such as due to DHCP), you would be unable to login. It is vital that you set up a proper hostname for your computer before following this guide. diff --git a/i18n/pt-BR/data-redaction.md b/i18n/pt-BR/data-redaction.md index 96b979bc..46f028e8 100644 --- a/i18n/pt-BR/data-redaction.md +++ b/i18n/pt-BR/data-redaction.md @@ -13,7 +13,7 @@ cover: data-redaction.webp Ao compartilhar arquivos, é importante remover metadados associados. Os arquivos de imagem geralmente incluem dados [Exif](https://en.wikipedia.org/wiki/Exif). Às vezes, as fotos incluem até mesmo coordenadas de GPS nos metadados do arquivo.Warning
+Aviso
You should **never** use blur to redact [text in images](https://bishopfox.com/blog/unredacter-tool-never-pixelation). If you want to redact text in an image, you should draw a box over the text. diff --git a/i18n/pt-BR/desktop.md b/i18n/pt-BR/desktop.md index ad02d72f..6e4c66e3 100644 --- a/i18n/pt-BR/desktop.md +++ b/i18n/pt-BR/desktop.md @@ -173,7 +173,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/WhWarning
+Aviso
Tails [doesn't erase](https://gitlab.tails.boum.org/tails/tails/-/issues/5356) the [video memory](https://en.wikipedia.org/wiki/Dual-ported_video_RAM) when shutting down. When you restart your computer after using Tails, it might briefly display the last screen that was displayed in Tails. If you shut down your computer instead of restarting it, the video memory will erase itself automatically after being unpowered for some time. diff --git a/i18n/pt-BR/device-integrity.md b/i18n/pt-BR/device-integrity.md index fd35bf03..90683207 100644 --- a/i18n/pt-BR/device-integrity.md +++ b/i18n/pt-BR/device-integrity.md @@ -87,7 +87,7 @@ These tools can trigger false-positives. If any of these tools finds indicatorsWarning
+Aviso
Using MVT is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. @@ -141,7 +141,7 @@ iMazing automates and interactively guides you through the process of using [MVT These are apps you can install which check your device and operating system for signs of tampering, and validate the identity of your device.Warning
+Aviso
Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. @@ -198,7 +198,7 @@ If your [threat model](basics/threat-modeling.md) requires privacy, you could co These are apps you can install on your device which scan your device for signs of compromise.Warning
+Aviso
Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. diff --git a/i18n/pt-BR/dns.md b/i18n/pt-BR/dns.md index b3f59191..16aee637 100644 --- a/i18n/pt-BR/dns.md +++ b/i18n/pt-BR/dns.md @@ -191,7 +191,7 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or OrbotWarning
+Aviso
The anonymized DNS feature does [not](advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) anonymize other network traffic. diff --git a/i18n/pt-BR/email-clients.md b/i18n/pt-BR/email-clients.md index 39a61dfc..990d9fa8 100644 --- a/i18n/pt-BR/email-clients.md +++ b/i18n/pt-BR/email-clients.md @@ -53,7 +53,7 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/FoWarning
+Aviso
When replying to someone on a mailing list in Thunderbird Mobile, the "reply" option may also include the mailing list. For more information see [thunderbird/thunderbird-android #3738](https://github.com/thunderbird/thunderbird-android/issues/3738). @@ -136,7 +136,7 @@ Apple Mail has the ability to load remote content in the background or block itWarning
+Aviso
-When using E2EE technology like OpenPGP your email will still have some metadata that is not encrypted in the header of the email, generally including the subject line! Read more about [email metadata](basics/email-security.md#email-metadata-overview). +Ao usar a tecnologia E2EE, como o OpenPGP, seu e-mail ainda terá alguns metadados que não são criptografados no cabeçalho do e-mail, geralmente incluindo a linha de assunto! Leia mais sobre [metadados de e-mail](basics/email-security.md#email-metadata-overview). -OpenPGP also does not support Forward secrecy, which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. [How do I protect my private keys?](basics/email-security.md#how-do-i-protect-my-private-keys) +OpenPGP também não suporta Encaminhamento Sigiloso, isso significa que se a sua chave ou a do destinatário é alguma vez roubada, todas as mensagens anteriores encriptadas com essa chave serão expostas. [Como eu protejo minhas chaves privadas?](basics/email-security.md#how-do-i-protect-my-private-keys)Warning
+Aviso
Invidious does not proxy video streams by default. Videos watched through Invidious will still make direct connections to Google's servers (e.g. `googlevideo.com`); however, some instances support video proxying—simply enable *Proxy videos* within the instances' settings or add `&local=true` to the URL. @@ -169,7 +169,7 @@ When using FreeTube, your subscription list and playlists are saved locally on yWarning
+Aviso
When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -204,7 +204,7 @@ When using Yattee, your subscription list is saved locally on your device.Warning
+Aviso
When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -239,7 +239,7 @@ Your subscription list and playlists are saved locally on your Android device.Warning
+Aviso
When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -275,7 +275,7 @@ Your subscription list and playlists are saved locally on your Android device. 1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**.Warning
+Aviso
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. diff --git a/i18n/pt-BR/index.md b/i18n/pt-BR/index.md index 4acf3202..54b434ba 100644 --- a/i18n/pt-BR/index.md +++ b/i18n/pt-BR/index.md @@ -91,7 +91,7 @@ Trying to protect all your data from everyone all the time is impractical, expen --- - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG é localizado em Genève, Suíça. The Proton Mail Free plan comes with 500MB of Mail storage, which you can increase up to 1GB for free. + Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG é localizado em Genève, Suíça. O plano Proton Mail Free vem com 500 Mb de armazenamento de e-mail, que você pode aumentar até 1 GB gratuitamente. [:octicons-arrow-right-24: Read Full Review](email.md#proton-mail) @@ -99,7 +99,7 @@ Trying to protect all your data from everyone all the time is impractical, expen --- - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2GB storage, which can be upgraded as needed. + Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. Eles estão operando desde 2014. Mailbox.org é sediado em Berlim, Alemanha. Accounts start with up to 2GB storage, which can be upgraded as needed. [:octicons-arrow-right-24: Read Full Review](email.md#mailboxorg) diff --git a/i18n/pt-BR/meta/admonitions.md b/i18n/pt-BR/meta/admonitions.md index 84067e71..3213519d 100644 --- a/i18n/pt-BR/meta/admonitions.md +++ b/i18n/pt-BR/meta/admonitions.md @@ -104,7 +104,7 @@ Lorem ipsum dolor sit amet, consectetur adipiscing elit. #### `warning`Warning
+Aviso
Lorem ipsum dolor sit amet, consectetur adipiscing elit. diff --git a/i18n/pt-BR/mobile-phones.md b/i18n/pt-BR/mobile-phones.md index 298e7738..b67d7fe2 100644 --- a/i18n/pt-BR/mobile-phones.md +++ b/i18n/pt-BR/mobile-phones.md @@ -36,7 +36,7 @@ The mobile devices listed here provide a long lifespan of guaranteed security up [Recommended Custom OSes :material-arrow-right-drop-circle:](android/distributions.md){ .md-button .md-button--primary } [Details about Android Security :material-arrow-right-drop-circle:](os/android-overview.md#security-protections){ .md-button }Warning
+Aviso
End-of-life devices (such as GrapheneOS's "extended support" devices) do not have full security patches (firmware updates) due to the OEM discontinuing support. These devices cannot be considered completely secure regardless of installed software. diff --git a/i18n/pt-BR/os/android-overview.md b/i18n/pt-BR/os/android-overview.md index c4fca1e0..d55f69c9 100644 --- a/i18n/pt-BR/os/android-overview.md +++ b/i18n/pt-BR/os/android-overview.md @@ -75,7 +75,7 @@ An app may request a permission for a specific feature it has. For example, any [Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.Warning
+Aviso
If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. diff --git a/i18n/pt-BR/os/ios-overview.md b/i18n/pt-BR/os/ios-overview.md index 460f68d3..b80eab01 100644 --- a/i18n/pt-BR/os/ios-overview.md +++ b/i18n/pt-BR/os/ios-overview.md @@ -157,7 +157,7 @@ After enabling Stolen Device Protection, [certain actions](https://support.apple iPhones are already resistant to brute-force attacks by making you wait long periods of time after multiple failed attempts; however, there have historically been exploits to get around this. To be extra safe, you can set your phone to wipe itself after 10 failed passcode attempts.Warning
+Aviso
With this setting enabled, someone could intentionally wipe your phone by entering the wrong password many times. Make sure you have proper backups and only enable this setting if you feel comfortable with it. diff --git a/i18n/pt-BR/os/macos-overview.md b/i18n/pt-BR/os/macos-overview.md index fec01198..87a0d09c 100644 --- a/i18n/pt-BR/os/macos-overview.md +++ b/i18n/pt-BR/os/macos-overview.md @@ -151,7 +151,7 @@ macOS employs defense in depth by relying on multiple layers of software and har ### Software SecurityWarning
+Aviso
macOS allows you to install beta updates. These are unstable and may come with extra telemetry since they're for testing purposes. Because of this, we recommend you avoid beta software in general. @@ -176,7 +176,7 @@ System Integrity Protection makes critical file locations read-only to protect a On macOS, whether an app is sandboxed is determined by the developer when they sign it. The App Sandbox protects against vulnerabilities in the apps you run by limiting what a malicious actor can access in the event that the app is exploited. The App Sandbox *alone* can't protect against [:material-package-variant-closed-remove: Supply Chain Attacks](../basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian} by malicious developers. For that, sandboxing needs to be enforced by someone other than the developer themselves, as it is on the App Store.Warning
+Aviso
Software downloaded from outside the official App Store is not required to be sandboxed. If your threat model prioritizes defending against [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }, then you may want to check if the software you download outside the App Store is sandboxed, which is up to the developer to *opt in*. @@ -187,7 +187,7 @@ You can check if an app uses the App Sandbox in a few ways: You can check if apps that are already running are sandboxed using the [Activity Monitor](https://developer.apple.com/documentation/security/protecting-user-data-with-app-sandbox#Verify-that-your-app-uses-App-Sandbox).Warning
+Aviso
Just because one of an app's processes is sandboxed doesn't mean they all are. diff --git a/i18n/pt-BR/real-time-communication.md b/i18n/pt-BR/real-time-communication.md index ae5101eb..f5f8784a 100644 --- a/i18n/pt-BR/real-time-communication.md +++ b/i18n/pt-BR/real-time-communication.md @@ -180,7 +180,7 @@ Briar supports forward secrecy[^1] by using the Bramble [Handshake](https://code ## Additional OptionsWarning
+Aviso
These messengers do not have forward secrecy[^1], and while they fulfill certain needs that our previous recommendations may not, we do not recommend them for long-term or sensitive communications. Any key compromise among message recipients would affect the confidentiality of **all** past communications. diff --git a/i18n/pt-BR/security-keys.md b/i18n/pt-BR/security-keys.md index 23948548..3248c4b1 100644 --- a/i18n/pt-BR/security-keys.md +++ b/i18n/pt-BR/security-keys.md @@ -41,7 +41,7 @@ This key provides only basic FIDO2 functionality, but for most people that is al If you need any of those features, you should consider their higher-end [YubiKey](#yubikey) of products instead.Warning
+Aviso
The firmware of Yubico's Security Keys is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. @@ -74,7 +74,7 @@ YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/suppor For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker.Warning
+Aviso
The firmware of YubiKey is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. @@ -105,14 +105,14 @@ Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface.Warning
+Aviso
While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP secrets, we highly recommend that you use a YubiKey instead.Warning
+Aviso
Resetting the OpenPGP interface on a Nitrokey will also make the password database [inaccessible](https://docs.nitrokey.com/pro/linux/factory-reset). diff --git a/i18n/pt-BR/tools.md b/i18n/pt-BR/tools.md index 2cf67cac..94df08e5 100644 --- a/i18n/pt-BR/tools.md +++ b/i18n/pt-BR/tools.md @@ -188,7 +188,7 @@ If you're looking for added **security**, you should always ensure you're connec --- - Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG é localizado em Genève, Suíça. The Proton Mail Free plan comes with 500MB of Mail storage, which you can increase up to 1GB for free. + Proton Mail is an email service with a focus on privacy, encryption, security, and ease of use. They have been in operation since 2013. Proton AG é localizado em Genève, Suíça. O plano Proton Mail Free vem com 500 Mb de armazenamento de e-mail, que você pode aumentar até 1 GB gratuitamente. [Read Full Review :material-arrow-right-drop-circle:](email.md#proton-mail) @@ -196,7 +196,7 @@ If you're looking for added **security**, you should always ensure you're connec --- - Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with up to 2GB storage, which can be upgraded as needed. + Mailbox.org is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. Eles estão operando desde 2014. Mailbox.org é sediado em Berlim, Alemanha. Accounts start with up to 2GB storage, which can be upgraded as needed. [Read Full Review :material-arrow-right-drop-circle:](email.md#mailboxorg)