From 9b6e876e15607a782ae0b1201f60326412196c32 Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Mon, 27 Nov 2023 18:32:11 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/ar/cloud.md | 1 + i18n/ar/encryption.md | 19 ------------------- i18n/ar/notebooks.md | 2 +- i18n/ar/real-time-communication.md | 2 +- i18n/ar/tools.md | 1 - i18n/bn-IN/cloud.md | 1 + i18n/bn-IN/encryption.md | 19 ------------------- i18n/bn-IN/notebooks.md | 2 +- i18n/bn-IN/real-time-communication.md | 2 +- i18n/bn-IN/tools.md | 1 - i18n/bn/cloud.md | 1 + i18n/bn/encryption.md | 19 ------------------- i18n/bn/notebooks.md | 2 +- i18n/bn/real-time-communication.md | 2 +- i18n/bn/tools.md | 1 - i18n/cs/cloud.md | 1 + i18n/cs/encryption.md | 19 ------------------- i18n/cs/notebooks.md | 2 +- i18n/cs/real-time-communication.md | 2 +- i18n/cs/tools.md | 1 - i18n/de/cloud.md | 1 + i18n/de/encryption.md | 19 ------------------- i18n/de/notebooks.md | 2 +- i18n/de/real-time-communication.md | 2 +- i18n/de/tools.md | 1 - i18n/el/cloud.md | 1 + i18n/el/encryption.md | 19 ------------------- i18n/el/notebooks.md | 2 +- i18n/el/real-time-communication.md | 2 +- i18n/el/tools.md | 1 - i18n/eo/cloud.md | 1 + i18n/eo/encryption.md | 19 ------------------- i18n/eo/notebooks.md | 2 +- i18n/eo/real-time-communication.md | 2 +- i18n/eo/tools.md | 1 - i18n/es/cloud.md | 4 ++-- i18n/es/encryption.md | 19 ------------------- i18n/es/notebooks.md | 2 +- i18n/es/real-time-communication.md | 2 +- i18n/es/tools.md | 1 - i18n/fa/cloud.md | 1 + i18n/fa/encryption.md | 19 ------------------- i18n/fa/notebooks.md | 2 +- i18n/fa/real-time-communication.md | 2 +- i18n/fa/tools.md | 1 - i18n/fr/cloud.md | 3 ++- i18n/fr/encryption.md | 19 ------------------- i18n/fr/notebooks.md | 2 +- i18n/fr/real-time-communication.md | 2 +- i18n/fr/tools.md | 11 +++++------ i18n/he/cloud.md | 3 ++- i18n/he/encryption.md | 19 ------------------- i18n/he/notebooks.md | 2 +- i18n/he/real-time-communication.md | 2 +- i18n/he/tools.md | 11 +++++------ i18n/hi/cloud.md | 1 + i18n/hi/encryption.md | 19 ------------------- i18n/hi/notebooks.md | 2 +- i18n/hi/real-time-communication.md | 2 +- i18n/hi/tools.md | 1 - i18n/hu/cloud.md | 1 + i18n/hu/encryption.md | 19 ------------------- i18n/hu/notebooks.md | 2 +- i18n/hu/real-time-communication.md | 2 +- i18n/hu/tools.md | 3 +-- i18n/id/cloud.md | 1 + i18n/id/encryption.md | 19 ------------------- i18n/id/notebooks.md | 2 +- i18n/id/real-time-communication.md | 2 +- i18n/id/tools.md | 11 +++++------ i18n/it/cloud.md | 9 +++++---- i18n/it/encryption.md | 19 ------------------- i18n/it/notebooks.md | 2 +- i18n/it/real-time-communication.md | 2 +- i18n/it/tools.md | 11 +++++------ i18n/ja/cloud.md | 1 + i18n/ja/encryption.md | 19 ------------------- i18n/ja/notebooks.md | 2 +- i18n/ja/real-time-communication.md | 2 +- i18n/ja/tools.md | 1 - i18n/ko/cloud.md | 1 + i18n/ko/encryption.md | 19 ------------------- i18n/ko/notebooks.md | 2 +- i18n/ko/real-time-communication.md | 2 +- i18n/ko/tools.md | 11 +++++------ i18n/ku-IQ/cloud.md | 1 + i18n/ku-IQ/encryption.md | 19 ------------------- i18n/ku-IQ/notebooks.md | 2 +- i18n/ku-IQ/real-time-communication.md | 2 +- i18n/ku-IQ/tools.md | 1 - i18n/nl/cloud.md | 1 + i18n/nl/encryption.md | 19 ------------------- i18n/nl/notebooks.md | 2 +- i18n/nl/real-time-communication.md | 2 +- i18n/nl/tools.md | 1 - i18n/pl/cloud.md | 1 + i18n/pl/encryption.md | 19 ------------------- i18n/pl/notebooks.md | 2 +- i18n/pl/real-time-communication.md | 2 +- i18n/pl/tools.md | 1 - i18n/pt-BR/cloud.md | 1 + i18n/pt-BR/encryption.md | 19 ------------------- i18n/pt-BR/notebooks.md | 2 +- i18n/pt-BR/real-time-communication.md | 2 +- i18n/pt-BR/tools.md | 1 - i18n/pt/cloud.md | 1 + i18n/pt/encryption.md | 19 ------------------- i18n/pt/notebooks.md | 2 +- i18n/pt/real-time-communication.md | 2 +- i18n/pt/tools.md | 11 +++++------ i18n/ru/cloud.md | 1 + i18n/ru/encryption.md | 19 ------------------- i18n/ru/notebooks.md | 2 +- i18n/ru/real-time-communication.md | 2 +- i18n/ru/tools.md | 11 +++++------ i18n/sv/cloud.md | 1 + i18n/sv/encryption.md | 19 ------------------- i18n/sv/notebooks.md | 2 +- i18n/sv/real-time-communication.md | 2 +- i18n/sv/tools.md | 5 ++--- i18n/tr/cloud.md | 3 ++- i18n/tr/encryption.md | 19 ------------------- i18n/tr/notebooks.md | 2 +- i18n/tr/real-time-communication.md | 2 +- i18n/tr/tools.md | 1 - i18n/uk/cloud.md | 1 + i18n/uk/encryption.md | 19 ------------------- i18n/uk/notebooks.md | 2 +- i18n/uk/real-time-communication.md | 2 +- i18n/uk/tools.md | 1 - i18n/vi/cloud.md | 1 + i18n/vi/encryption.md | 17 ----------------- i18n/vi/notebooks.md | 2 +- i18n/vi/real-time-communication.md | 2 +- i18n/vi/tools.md | 1 - i18n/zh-Hant/cloud.md | 3 ++- i18n/zh-Hant/encryption.md | 24 ------------------------ i18n/zh-Hant/notebooks.md | 2 +- i18n/zh-Hant/real-time-communication.md | 2 +- i18n/zh-Hant/tools.md | 1 - i18n/zh/cloud.md | 1 + i18n/zh/encryption.md | 19 ------------------- i18n/zh/notebooks.md | 2 +- i18n/zh/real-time-communication.md | 2 +- i18n/zh/tools.md | 9 +++++---- 145 files changed, 139 insertions(+), 692 deletions(-) diff --git a/i18n/ar/cloud.md b/i18n/ar/cloud.md index fcfec1c5..9d15aa37 100644 --- a/i18n/ar/cloud.md +++ b/i18n/ar/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/ar/encryption.md b/i18n/ar/encryption.md index dcbacc03..e09ff924 100644 --- a/i18n/ar/encryption.md +++ b/i18n/ar/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/ar/notebooks.md b/i18n/ar/notebooks.md index 56fd0657..aad0c7b8 100644 --- a/i18n/ar/notebooks.md +++ b/i18n/ar/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/ar/real-time-communication.md b/i18n/ar/real-time-communication.md index 9500ff07..c72373b2 100644 --- a/i18n/ar/real-time-communication.md +++ b/i18n/ar/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/ar/tools.md b/i18n/ar/tools.md index 7009e838..9c8c6d83 100644 --- a/i18n/ar/tools.md +++ b/i18n/ar/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/bn-IN/cloud.md b/i18n/bn-IN/cloud.md index fcfec1c5..9d15aa37 100644 --- a/i18n/bn-IN/cloud.md +++ b/i18n/bn-IN/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/bn-IN/encryption.md b/i18n/bn-IN/encryption.md index dcbacc03..e09ff924 100644 --- a/i18n/bn-IN/encryption.md +++ b/i18n/bn-IN/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/bn-IN/notebooks.md b/i18n/bn-IN/notebooks.md index 56fd0657..aad0c7b8 100644 --- a/i18n/bn-IN/notebooks.md +++ b/i18n/bn-IN/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/bn-IN/real-time-communication.md b/i18n/bn-IN/real-time-communication.md index 9500ff07..c72373b2 100644 --- a/i18n/bn-IN/real-time-communication.md +++ b/i18n/bn-IN/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/bn-IN/tools.md b/i18n/bn-IN/tools.md index 7009e838..9c8c6d83 100644 --- a/i18n/bn-IN/tools.md +++ b/i18n/bn-IN/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/bn/cloud.md b/i18n/bn/cloud.md index fcfec1c5..9d15aa37 100644 --- a/i18n/bn/cloud.md +++ b/i18n/bn/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/bn/encryption.md b/i18n/bn/encryption.md index dcbacc03..e09ff924 100644 --- a/i18n/bn/encryption.md +++ b/i18n/bn/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/bn/notebooks.md b/i18n/bn/notebooks.md index 56fd0657..aad0c7b8 100644 --- a/i18n/bn/notebooks.md +++ b/i18n/bn/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/bn/real-time-communication.md b/i18n/bn/real-time-communication.md index 9500ff07..c72373b2 100644 --- a/i18n/bn/real-time-communication.md +++ b/i18n/bn/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/bn/tools.md b/i18n/bn/tools.md index 7009e838..9c8c6d83 100644 --- a/i18n/bn/tools.md +++ b/i18n/bn/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/cs/cloud.md b/i18n/cs/cloud.md index fcfec1c5..9d15aa37 100644 --- a/i18n/cs/cloud.md +++ b/i18n/cs/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/cs/encryption.md b/i18n/cs/encryption.md index dcbacc03..e09ff924 100644 --- a/i18n/cs/encryption.md +++ b/i18n/cs/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/cs/notebooks.md b/i18n/cs/notebooks.md index 56fd0657..aad0c7b8 100644 --- a/i18n/cs/notebooks.md +++ b/i18n/cs/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/cs/real-time-communication.md b/i18n/cs/real-time-communication.md index 9500ff07..c72373b2 100644 --- a/i18n/cs/real-time-communication.md +++ b/i18n/cs/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/cs/tools.md b/i18n/cs/tools.md index 7009e838..9c8c6d83 100644 --- a/i18n/cs/tools.md +++ b/i18n/cs/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/de/cloud.md b/i18n/de/cloud.md index fcfec1c5..9d15aa37 100644 --- a/i18n/de/cloud.md +++ b/i18n/de/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/de/encryption.md b/i18n/de/encryption.md index dcbacc03..e09ff924 100644 --- a/i18n/de/encryption.md +++ b/i18n/de/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/de/notebooks.md b/i18n/de/notebooks.md index 56fd0657..aad0c7b8 100644 --- a/i18n/de/notebooks.md +++ b/i18n/de/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/de/real-time-communication.md b/i18n/de/real-time-communication.md index 9500ff07..c72373b2 100644 --- a/i18n/de/real-time-communication.md +++ b/i18n/de/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/de/tools.md b/i18n/de/tools.md index c1299d39..09ba1efd 100644 --- a/i18n/de/tools.md +++ b/i18n/de/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/el/cloud.md b/i18n/el/cloud.md index fcfec1c5..9d15aa37 100644 --- a/i18n/el/cloud.md +++ b/i18n/el/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/el/encryption.md b/i18n/el/encryption.md index dcbacc03..e09ff924 100644 --- a/i18n/el/encryption.md +++ b/i18n/el/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/el/notebooks.md b/i18n/el/notebooks.md index 56fd0657..aad0c7b8 100644 --- a/i18n/el/notebooks.md +++ b/i18n/el/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/el/real-time-communication.md b/i18n/el/real-time-communication.md index 9500ff07..c72373b2 100644 --- a/i18n/el/real-time-communication.md +++ b/i18n/el/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/el/tools.md b/i18n/el/tools.md index 6da6dc53..d3482962 100644 --- a/i18n/el/tools.md +++ b/i18n/el/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/eo/cloud.md b/i18n/eo/cloud.md index fcfec1c5..9d15aa37 100644 --- a/i18n/eo/cloud.md +++ b/i18n/eo/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/eo/encryption.md b/i18n/eo/encryption.md index dcbacc03..e09ff924 100644 --- a/i18n/eo/encryption.md +++ b/i18n/eo/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/eo/notebooks.md b/i18n/eo/notebooks.md index 56fd0657..aad0c7b8 100644 --- a/i18n/eo/notebooks.md +++ b/i18n/eo/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/eo/real-time-communication.md b/i18n/eo/real-time-communication.md index 9500ff07..c72373b2 100644 --- a/i18n/eo/real-time-communication.md +++ b/i18n/eo/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/eo/tools.md b/i18n/eo/tools.md index 7009e838..9c8c6d83 100644 --- a/i18n/eo/tools.md +++ b/i18n/eo/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/es/cloud.md b/i18n/es/cloud.md index 032c64cb..73c603a9 100644 --- a/i18n/es/cloud.md +++ b/i18n/es/cloud.md @@ -27,12 +27,12 @@ Si estas alternativas no se ajustan a tus necesidades, te sugerimos que busques [:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentación} [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Código Fuente" } - ??? downloads "Descargas" - + ??? downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) La aplicación web Proton Drive ha sido auditada de forma independiente por Securitum en [2021](https://proton.me/blog/security-audit-all-proton-apps), no se han facilitado todos los detalles, pero la carta de certificación de Securitum afirma lo siguiente: diff --git a/i18n/es/encryption.md b/i18n/es/encryption.md index 3da798f2..d0866271 100644 --- a/i18n/es/encryption.md +++ b/i18n/es/encryption.md @@ -187,25 +187,6 @@ Recomendamos almacenar una clave de recuperación local en un lugar seguro en lu cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Basado en Navegador - -El cifrado basado en navegador puede ser útil cuando necesita cifrar un archivo pero no puede instalar software o aplicaciones en su dispositivo. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** es una aplicación web que proporciona cifrado seguro de archivos del lado del cliente en su navegador. También puede ser autoalojado y es útil si necesita cifrar un archivo pero no puede instalar ningún software en su dispositivo debido a políticas organizativas. - - [:octicons-globe-16: Sitio Web](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Politica de Privacidad" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentación} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Código Fuente" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Puede encontrar los métodos de donación en la parte inferior del sitio web" } - ## Línea de Comandos Las herramientas con interfaces de línea de comandos son útiles para integrar scripts de shell. diff --git a/i18n/es/notebooks.md b/i18n/es/notebooks.md index c273e6a2..bb11d379 100644 --- a/i18n/es/notebooks.md +++ b/i18n/es/notebooks.md @@ -87,7 +87,7 @@ Notesnook solo permite el cifrado local de notas con la función [private vault] - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin no admite la protección mediante contraseña/PIN de la[ propia aplicación ni de las notas y cuadernos individuales](https://github.com/laurent22/joplin/issues/289). Sin embargo, tus datos están encriptados en tránsito y en la ubicación de sincronización utilizando tu clave maestra. Desde enero de 2023, Joplin admite el bloqueo biométrico de aplicaciones para [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) e [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Sin embargo, tus datos están encriptados en tránsito y en la ubicación de sincronización utilizando tu clave maestra. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/es/real-time-communication.md b/i18n/es/real-time-communication.md index 2694ae26..41e8b304 100644 --- a/i18n/es/real-time-communication.md +++ b/i18n/es/real-time-communication.md @@ -139,7 +139,7 @@ Las llamadas de voz y vídeo en grupo [no](https://github.com/vector-im/element- El propio protocolo Matrix [soporta teóricamente PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), sin embargo [no está soportado actualmente en Element](https://github.com/vector-im/element-web/issues/7101) debido a que rompe algunos aspectos de la experiencia del usuario como las copias de seguridad de claves y el historial de mensajes compartidos. -El protocolo fue [auditado](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) de forma independiente en 2016. La especificación del protocolo Matrix puede encontrarse en su [documentación](https://spec.matrix.org/latest/). El trinquete criptográfico [Olm](https://matrix.org/docs/projects/other/olm) utilizado por Matrix es una implementación del algoritmo [Double Ratchet](https://signal.org/docs/specifications/doubleratchet/) de Signal. +El protocolo fue [auditado](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) de forma independiente en 2016. La especificación del protocolo Matrix puede encontrarse en su [documentación](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/es/tools.md b/i18n/es/tools.md index bf4070be..3d88b2cb 100644 --- a/i18n/es/tools.md +++ b/i18n/es/tools.md @@ -287,7 +287,6 @@ Para obtener más información sobre cada proyecto, por qué han sido elegidos y - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Basado en el navegador)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/fa/cloud.md b/i18n/fa/cloud.md index 0e0bd6ad..4bf7fa2f 100644 --- a/i18n/fa/cloud.md +++ b/i18n/fa/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/fa/encryption.md b/i18n/fa/encryption.md index dcbacc03..e09ff924 100644 --- a/i18n/fa/encryption.md +++ b/i18n/fa/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/fa/notebooks.md b/i18n/fa/notebooks.md index 5a72e9e9..9e3fc79f 100644 --- a/i18n/fa/notebooks.md +++ b/i18n/fa/notebooks.md @@ -85,7 +85,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/fa/real-time-communication.md b/i18n/fa/real-time-communication.md index 9500ff07..c72373b2 100644 --- a/i18n/fa/real-time-communication.md +++ b/i18n/fa/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/fa/tools.md b/i18n/fa/tools.md index 7009e838..9c8c6d83 100644 --- a/i18n/fa/tools.md +++ b/i18n/fa/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/fr/cloud.md b/i18n/fr/cloud.md index a6125da0..d9f0b756 100644 --- a/i18n/fr/cloud.md +++ b/i18n/fr/cloud.md @@ -27,11 +27,12 @@ Si ces alternatives ne répondent pas à vos besoins, nous vous suggérons d'uti [:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Code source" } - ??? downloads "Téléchargements" + ??? downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) L'application web Proton Drive a fait l'objet d'un audit indépendant par Securitum en [2021](https://proton.me/blog/security-audit-all-proton-apps), tous les détails n'ont pas été communiqués, mais la lettre d'attestation de Securitum indique ce qui suit : diff --git a/i18n/fr/encryption.md b/i18n/fr/encryption.md index ab4c91b3..7cd14047 100644 --- a/i18n/fr/encryption.md +++ b/i18n/fr/encryption.md @@ -187,25 +187,6 @@ Nous recommandons de stocker une clé de récupération locale dans un endroit s cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Basé sur le navigateur - -Le chiffrement basé sur le navigateur peut être utile lorsque vous avez besoin de chiffrer un fichier, mais que vous ne pouvez pas installer de logiciel ou d'applications sur votre appareil. - -### hat.sh - -!!! recommendation - - ![logo hat.sh](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![logo hat.sh](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** est une application web qui fournit un chiffrement sécurisé des fichiers dans votre navigateur. Il peut également être auto-hébergé et est utile si vous devez chiffrer un fichier mais que vous ne pouvez pas installer de logiciel sur votre appareil en raison de politiques d'entreprises. - - [:octicons-globe-16: Page d'accueil](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Politique de confidentialité" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Code source" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Les méthodes de dons se trouvent au bas du site web" } - ## Ligne de commande Les outils dotés d'une interface de ligne de commande sont utiles pour intégrer des [scripts shell](https://fr.wikipedia.org/wiki/Script_shell). diff --git a/i18n/fr/notebooks.md b/i18n/fr/notebooks.md index 2cdefe5f..ec801780 100644 --- a/i18n/fr/notebooks.md +++ b/i18n/fr/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin ne prend pas en charge la protection par mot de passe/PIN de [l'application elle-même ou des notes et cahiers individuels](https://github.com/laurent22/joplin/issues/289). Les données sont toujours chiffrées en transit et à l'emplacement de la synchronisation à l'aide de votre clé principale. Depuis janvier 2023, Joplin prend en charge le verrouillage biométrique des applications pour [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) et [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Les données sont toujours chiffrées en transit et à l'emplacement de la synchronisation à l'aide de votre clé principale. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/fr/real-time-communication.md b/i18n/fr/real-time-communication.md index 27744f87..92a50482 100644 --- a/i18n/fr/real-time-communication.md +++ b/i18n/fr/real-time-communication.md @@ -139,7 +139,7 @@ Les appels vocaux et vidéo de groupe ne sont [pas](https://github.com/vector-im Le protocole Matrix lui-même [prend théoriquement en charge la PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), mais ce [n'est pas actuellement pris en charge par Element](https://github.com/vector-im/element-web/issues/7101) car elle rompt certains aspects de l'expérience utilisateur tels que la sauvegarde des clés et l'historique des messages partagés. -Le protocole a fait l'objet d'un [audit](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) indépendant en 2016. La spécification du protocole Matrix se trouve dans leur [documentation](https://spec.matrix.org/latest/). Le cliquet cryptographique [Olm](https://matrix.org/docs/projects/other/olm) utilisé par Matrix est une implémentation de l'[algorithme Cliquet Double](https://signal.org/docs/specifications/doubleratchet/) de Signal. +Le protocole a fait l'objet d'un [audit](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) indépendant en 2016. La spécification du protocole Matrix se trouve dans leur [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/fr/tools.md b/i18n/fr/tools.md index 2c178d34..79e0d054 100644 --- a/i18n/fr/tools.md +++ b/i18n/fr/tools.md @@ -284,12 +284,11 @@ Nous [recommandons](dns.md#recommended-providers) un certain nombre de serveurs
-- ![Logo Cryptomator](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) -- ![Logo Picocrypt](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) -- ![Logo VeraCrypt](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![Logo VeraCrypt](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Logo Hat.sh](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Logo Hat.sh](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) -- ![Logo Kryptor](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) -- ![Logo Tomb](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) +- ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) +- ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) +- ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) +- ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) +- ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb)
diff --git a/i18n/he/cloud.md b/i18n/he/cloud.md index 76c99998..8fb7dadb 100644 --- a/i18n/he/cloud.md +++ b/i18n/he/cloud.md @@ -27,11 +27,12 @@ cover: cloud.webp [:octicons-info-16:](https://proton.me/support/drive){ .card-link title=תיעוד} [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="קוד מקור" } - ??? downloads "הורדות" + ??? downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) אפליקציית האינטרנט של Proton Drive נבדקה באופן עצמאי על ידי Securitum ב[2021](https://proton.me/blog/security-audit-all-proton-apps), הפרטים המלאים לא זמינים, אך במכתב האישור של Securitum נאמר: diff --git a/i18n/he/encryption.md b/i18n/he/encryption.md index abb8f3b7..ba2e9557 100644 --- a/i18n/he/encryption.md +++ b/i18n/he/encryption.md @@ -187,25 +187,6 @@ BitLocker [ נתמך רק](https://support.microsoft.com/en-us/windows/turn-on-d cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/קובץ.img ``` -## מבוסס-דפדפן - -הצפנה מבוססת דפדפן יכולה להיות שימושית כאשר אתה צריך להצפין קובץ אבל לא יכול להתקין תוכנות או אפליקציות במכשיר שלך. - -### hat.sh - -!!! recommendation - - ![hat.sh לוגו](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh לוגו](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** הוא יישום אינטרנט המספק הצפנת קבצים מאובטחת בצד הלקוח בדפדפן שלך. הוא גם יכול להיות באחסון עצמי והוא שימושי אם אתה צריך להצפין קובץ אבל לא יכול להתקין שום תוכנה במכשיר שלך בגלל מדיניות ארגונית. - - [:octicons-globe-16: אתר](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="מדיניות פרטיות" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=תיעוד} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="קוד מקור" } - :octicons-heart-16:{ .card-link title="ניתן למצוא את שיטות התרומות בתחתית האתר" } - ## שורת הפקודה כלים עם ממשקי שורת פקודה שימושיים לשילוב [סקריפטים של מעטפת](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/he/notebooks.md b/i18n/he/notebooks.md index a5741e7e..d613a46f 100644 --- a/i18n/he/notebooks.md +++ b/i18n/he/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin אינו תומך בהגנה על סיסמה/PIN עבור [יישום עצמו או רשימות ומחברות בודדות](https://github.com/laurent22/joplin/issues/289). עם זאת, הנתונים שלך עדיין מוצפנים במעבר ובמיקום הסנכרון באמצעות מפתח הראשי שלך. מאז ינואר 2023, Joplin תומך בנעילת אפליקציות ביומטריה עבור [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) ו-[iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. עם זאת, הנתונים שלך עדיין מוצפנים במעבר ובמיקום הסנכרון באמצעות מפתח הראשי שלך. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/he/real-time-communication.md b/i18n/he/real-time-communication.md index ece0d7ee..3f5280a4 100644 --- a/i18n/he/real-time-communication.md +++ b/i18n/he/real-time-communication.md @@ -139,7 +139,7 @@ Briar תומך ב-Forward Secrecy באמצעות תומך ב-Forward Secrecy ב פרוטוקול Matrix עצמו [תומך תיאורטית ב-PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), עם זאת, זה [לא נתמך כרגע ב-Element](https://github.com/vector-im/element-web/issues/7101) בגלל שהוא שובר היבטים מסוימים של חוויית המשתמש, כגון גיבויי מפתח והיסטוריית הודעות משותפת. -הפרוטוקול היה מבוקר [באופן עצמאי](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) בשנת 2016. את המפרט לפרוטוקול מטריקס ניתן למצוא [בתיעוד שלהם](https://spec.matrix.org/latest/). מחגר ההצפנה [Olm](https://matrix.org/docs/projects/other/olm) המשמש את Matrix הוא יישום של [אלגוריתם ה-Double Ratchet](https://signal.org/docs/specifications/doubleratchet/) של Signal. +הפרוטוקול היה מבוקר [באופן עצמאי](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) בשנת 2016. את המפרט לפרוטוקול מטריקס ניתן למצוא [בתיעוד שלהם](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/he/tools.md b/i18n/he/tools.md index fabcb525..20dfba92 100644 --- a/i18n/he/tools.md +++ b/i18n/he/tools.md @@ -284,12 +284,11 @@ description: Privacy Guides הוא האתר השקוף והאמין ביותר
-- ![Cryptomator לוגו](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) -- ![Picocrypt לוגו](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) -- ![VeraCrypt לוגו](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt לוגו](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh לוגו](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh לוגו](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) -- ![Kryptor לוגו](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) -- ![Tomb לוגו](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) +- ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) +- ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) +- ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) +- ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) +- ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb)
diff --git a/i18n/hi/cloud.md b/i18n/hi/cloud.md index fcfec1c5..9d15aa37 100644 --- a/i18n/hi/cloud.md +++ b/i18n/hi/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/hi/encryption.md b/i18n/hi/encryption.md index dcbacc03..e09ff924 100644 --- a/i18n/hi/encryption.md +++ b/i18n/hi/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/hi/notebooks.md b/i18n/hi/notebooks.md index 56fd0657..aad0c7b8 100644 --- a/i18n/hi/notebooks.md +++ b/i18n/hi/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/hi/real-time-communication.md b/i18n/hi/real-time-communication.md index 9500ff07..c72373b2 100644 --- a/i18n/hi/real-time-communication.md +++ b/i18n/hi/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/hi/tools.md b/i18n/hi/tools.md index 7009e838..9c8c6d83 100644 --- a/i18n/hi/tools.md +++ b/i18n/hi/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/hu/cloud.md b/i18n/hu/cloud.md index 1f5fbeb5..30465fb9 100644 --- a/i18n/hu/cloud.md +++ b/i18n/hu/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/hu/encryption.md b/i18n/hu/encryption.md index 1cb77638..6cf375b2 100644 --- a/i18n/hu/encryption.md +++ b/i18n/hu/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Parancssor Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/hu/notebooks.md b/i18n/hu/notebooks.md index 2812b879..4ec0178a 100644 --- a/i18n/hu/notebooks.md +++ b/i18n/hu/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -A Joplin nem támogatja a jelszavas/PIN-kódos védelmet magához az [alkalmazáshoz vagy egyes jegyzetekhez és jegyzetfüzetekhez](https://github.com/laurent22/joplin/issues/289). Ettől függetlenül az adatok szállítás közben és a szinkronizáció helyén is titkosítva lesznek a főkulcs segítségével. 2023 januárjától a Joplin támogatja a biometrikus alkalmazászárat az [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) és a [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z) rendszerekhez. +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Ettől függetlenül az adatok szállítás közben és a szinkronizáció helyén is titkosítva lesznek a főkulcs segítségével. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/hu/real-time-communication.md b/i18n/hu/real-time-communication.md index a448e239..899594e9 100644 --- a/i18n/hu/real-time-communication.md +++ b/i18n/hu/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/hu/tools.md b/i18n/hu/tools.md index ac48aca4..01285ee7 100644 --- a/i18n/hu/tools.md +++ b/i18n/hu/tools.md @@ -286,8 +286,7 @@ Számos követelmény alapján [ajánlunk](dns.md#recommended-providers) több t - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) -- ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (TLT)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Böngésző alapú)](encryption.md#hatsh) +- ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/id/cloud.md b/i18n/id/cloud.md index 8f27d900..7cbbd739 100644 --- a/i18n/id/cloud.md +++ b/i18n/id/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/id/encryption.md b/i18n/id/encryption.md index ae81364e..486ac7d7 100644 --- a/i18n/id/encryption.md +++ b/i18n/id/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Baris perintah Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/id/notebooks.md b/i18n/id/notebooks.md index 2bc67e1c..8d04751f 100644 --- a/i18n/id/notebooks.md +++ b/i18n/id/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/id/real-time-communication.md b/i18n/id/real-time-communication.md index 3785ff13..988ac700 100644 --- a/i18n/id/real-time-communication.md +++ b/i18n/id/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/id/tools.md b/i18n/id/tools.md index abfb022c..2b3ac96b 100644 --- a/i18n/id/tools.md +++ b/i18n/id/tools.md @@ -284,12 +284,11 @@ Kami [merekomendasikan](dns.md#recommended-providers) sejumlah server DNS terenk
-- ![Cryptomator logo](assets/img/enkripsi-perangkat-lunak/cryptomator.svg){ .twemoji } [Cryptomator](enkripsi.md#cryptomator-cloud) -- ![Picocrypt logo](assets/img/enkripsi-perangkat-lunak/picocrypt.svg){ .twemoji } [Picocrypt](enkripsi.md#picocrypt-file) -- ![VeraCrypt logo](assets/img/enkripsi-perangkat lunak/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/enkripsi-perangkat lunak/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](enkripsi.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/enkripsi-perangkat-lunak/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/enkripsi-perangkat-lunak/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Berbasis peramban)](enkripsi.md#hatsh) -- ![Kryptor logo](assets/img/enkripsi-perangkat lunak/kryptor.png){ .twemoji } [Kryptor](enkripsi.md#kryptor) -- ![Tomb logo](assets/img/enkripsi-perangkat lunak/tomb.png){ .twemoji } [Tomb](enkripsi.md#tomb) +- ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) +- ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) +- ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) +- ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) +- ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb)
diff --git a/i18n/it/cloud.md b/i18n/it/cloud.md index 278466a1..afda7e54 100644 --- a/i18n/it/cloud.md +++ b/i18n/it/cloud.md @@ -27,11 +27,12 @@ Se queste alternative non soddisfano le tue esigenze, ti suggeriamo di utilizzar [:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentazione} [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Codice Sorgente" } - ??? downloads "Scarica" + ??? downloads - - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive&gl=It) - - [:simple-appstore: App Store](https://apps.apple.com/it/app/id1509667851) - - [:simple-windows11: Windows](https://proton.me/it/drive/download) + - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) + - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) + - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) L'applicazione web di Proton Drive è stata controllata indipendentemente da Securitum nel [2021](https://proton.me/blog/security-audit-all-proton-apps); i dettagli completi non sono stati resi disponibili, ma la lettera di attestazione di Securitum afferma che: diff --git a/i18n/it/encryption.md b/i18n/it/encryption.md index 54e11a07..aaec4edf 100644 --- a/i18n/it/encryption.md +++ b/i18n/it/encryption.md @@ -187,25 +187,6 @@ Consigliamo di memorizzare una chiave di recupero locale in un luogo sicuro, inv cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Basati sul browser - -La crittografia basata sul browser può essere utile quando devi crittografare un file, ma non puoi installare software o app sul tuo dispositivo. - -### hat.sh - -!!! recommendation - - ![Logo di hat.sh](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![Logo di hat.sh](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** è un'applicazione web che fornisce una crittografia dei file dal lato del client nel browser. Può anche essere ospitata autonomamente ed è utile se devi crittografare un file ma non puoi installare alcun software sul tuo dispositivo, a causa di politiche organizzative. - - [:octicons-globe-16: Sito web](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Politica sulla Privacy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentazione} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Codice Sorgente" } - :octicons-heart-16:{ .card-link title="I metodi di donazione si possono trovare in fondo al sito web" } - ## Riga di comando Gli strumenti con interfacce di riga di comando sono utili per integrare gli [script della shell](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/it/notebooks.md b/i18n/it/notebooks.md index 426b929e..f286e3a3 100644 --- a/i18n/it/notebooks.md +++ b/i18n/it/notebooks.md @@ -87,7 +87,7 @@ Notesnook consente la crittografia delle note locali solo con la funzione [priva - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/it/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin non supporta la protezione con password/PIN per [l'applicazione stessa o per i singoli appunti e blocchi note](https://github.com/laurent22/joplin/issues/289). Tuttavia, i tuoi dati sono comunque crittografati in transito e alla posizione di sincronizzazione, utilizzando la tua chiave principale. Da gennaio 2023, Joplin supporta il blocco biometrico dell'app per [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) e [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Tuttavia, i tuoi dati sono comunque crittografati in transito e alla posizione di sincronizzazione, utilizzando la tua chiave principale. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/it/real-time-communication.md b/i18n/it/real-time-communication.md index 350637cb..3aaa4ea8 100644 --- a/i18n/it/real-time-communication.md +++ b/i18n/it/real-time-communication.md @@ -139,7 +139,7 @@ Le chiamate e le videochiamate [non](https://github.com/vector-im/element-web/is Lo stesso protocollo Matrix [supporta teoricamente il PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), tuttavia [non è correntemente supportato su Element](https://github.com/vector-im/element-web/issues/7101), poiché rovina alcuni aspetti dell'esperienza utente, come il backup delle chiavi e la cronologia dei messaggi condivisi. -Il protocollo è stato [controllato](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) indipendentemente nel 2016. Le specifiche per il protocollo di Matrix possono essere trovate nella sua [documentazione](https://spec.matrix.org/latest/). L'algoritmo crittografico [Olm](https://matrix.org/docs/projects/other/olm) utilizzato da Matrix è un'implementazione dell'[algoritmo Double Ratchet](https://signal.org/docs/specifications/doubleratchet/) di Signal. +Il protocollo è stato [controllato](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) indipendentemente nel 2016. Le specifiche per il protocollo di Matrix possono essere trovate nella sua [documentazione](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/it/tools.md b/i18n/it/tools.md index 9be02837..9b10a5c9 100644 --- a/i18n/it/tools.md +++ b/i18n/it/tools.md @@ -284,12 +284,11 @@ Per ulteriori dettagli su ogni progetto, perché è stato scelto e ulteriori con
-- ![Logo di Cryptomator](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) -- ![Logo di Picocrypt](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) -- ![Logo di VeraCrypt](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![Logo di VeraCrypt](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Logo di Hat.sh](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Logo di Hat.sh](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) -- ![Logo di Kryptor](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) -- ![Logo di Tomb](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) +- ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) +- ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) +- ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) +- ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) +- ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb)
diff --git a/i18n/ja/cloud.md b/i18n/ja/cloud.md index 32972dc9..bfe0ad3f 100644 --- a/i18n/ja/cloud.md +++ b/i18n/ja/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) Proton Driveのウェブアプリケーションは、[2021](https://proton.me/blog/security-audit-all-proton-apps)年にSecuritumにより独立の監査を受けています。完全な詳細は公開されませんでしたが、Securitumの認証状態は以下の通りです。 diff --git a/i18n/ja/encryption.md b/i18n/ja/encryption.md index 69f024a3..f7c7dd2d 100644 --- a/i18n/ja/encryption.md +++ b/i18n/ja/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## ブラウザーベース - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## コマンドライン Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/ja/notebooks.md b/i18n/ja/notebooks.md index bd76505f..555d0779 100644 --- a/i18n/ja/notebooks.md +++ b/i18n/ja/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplinは、[アプリケーション自体や個々のノート](https://github.com/laurent22/joplin/issues/289)のパスワードやPINによる保護には対応していません。 ただし、データはマスターキーを使用した暗号化により転送中および同期先では常に保護されます。 2023年1月以降、Joplinは[Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z)と[iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z)で生体認証によるアプリロックに対応しています。 +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. ただし、データはマスターキーを使用した暗号化により転送中および同期先では常に保護されます。 Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/ja/real-time-communication.md b/i18n/ja/real-time-communication.md index 2c823abf..fad1c251 100644 --- a/i18n/ja/real-time-communication.md +++ b/i18n/ja/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/ja/tools.md b/i18n/ja/tools.md index a9b78a69..7deacd3b 100644 --- a/i18n/ja/tools.md +++ b/i18n/ja/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/ko/cloud.md b/i18n/ko/cloud.md index 2c5ac98b..6dc2d16b 100644 --- a/i18n/ko/cloud.md +++ b/i18n/ko/cloud.md @@ -32,6 +32,7 @@ cover: cloud.webp - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) Proton Drive 웹 어플리케이션은 [2021년에](https://proton.me/blog/security-audit-all-proton-apps) Securitum으로부터 독립적으로 감사를 받았습니다. 세부 내용은 제공되지 않았지만, Securitum 인증서에 따르면 다음과 같습니다: diff --git a/i18n/ko/encryption.md b/i18n/ko/encryption.md index 5d46649c..537b7c3c 100644 --- a/i18n/ko/encryption.md +++ b/i18n/ko/encryption.md @@ -186,25 +186,6 @@ BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-o cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## 브라우저 기반 - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: 웹사이트](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="프라이버시 정책" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=문서} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="소스 코드" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="기부 방법은 홈페이지 하단에서 확인하실 수 있습니다" } - ## 커맨드라인 커맨드라인 인터페이스가 존재하는 툴은 [Shell 스크립트](https://ko.wikipedia.org/wiki/%EC%85%B8_%EC%8A%A4%ED%81%AC%EB%A6%BD%ED%8A%B8)에 통합하는 용도로 유용합니다. diff --git a/i18n/ko/notebooks.md b/i18n/ko/notebooks.md index 8a571283..f729c4e5 100644 --- a/i18n/ko/notebooks.md +++ b/i18n/ko/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin은 [개별 노트 및 노트북이나 애플리케이션 자체](https://github.com/laurent22/joplin/issues/289)에 비밀번호/PIN 보호를 설정할 수 있는 기능을 지원하지 않습니다. 전송 과정 및 동기화 서버에서는 마스터 키로 여러분의 데이터가 암호화됩니다. Joplin은 2023년 1월부터 [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z), [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z)에서 생체 인식 앱 잠금을 지원합니다. +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. 전송 과정 및 동기화 서버에서는 마스터 키로 여러분의 데이터가 암호화됩니다. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/ko/real-time-communication.md b/i18n/ko/real-time-communication.md index 0be19cda..a2afd99e 100644 --- a/i18n/ko/real-time-communication.md +++ b/i18n/ko/real-time-communication.md @@ -139,7 +139,7 @@ Briar supports Forward Secrecy by using the Bramble [Handshake](https://code.bri Matrix 프로토콜 자체는 [이론적으로 PFS를 지원하지만](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), 키 백업 및 사용자 간 메시지 기록 공유 등의 사용자 경험을 해치기 때문에 [현시점에서 Element는 PFS를 지원하지 않습니다](https://github.com/vector-im/element-web/issues/7101). -Matrix 프로토콜은 2016년에 독립적으로 [감사를 받았습니다](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last). Matirx 프로토콜 사양은 [문서](https://spec.matrix.org/latest/)에서 확인할 수 있습니다. Matrix에서 사용하는 [Olm](https://matrix.org/docs/projects/other/olm) 암호화 래칫(Cryptographic Ratchet)은 Signal의 [더블 래칫 알고리즘(Double Ratchet algorithm)](https://signal.org/docs/specifications/doubleratchet/)을 구현한 것입니다. +Matrix 프로토콜은 2016년에 독립적으로 [감사를 받았습니다](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last). Matirx 프로토콜 사양은 [문서](https://spec.matrix.org/latest/)에서 확인할 수 있습니다. The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/ko/tools.md b/i18n/ko/tools.md index 86a3a3d7..6cf85f11 100644 --- a/i18n/ko/tools.md +++ b/i18n/ko/tools.md @@ -284,12 +284,11 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
-- ![Cryptomator 로고](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) -- ![Picocrypt 로고](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) -- ![VeraCrypt 로고](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt 로고](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh 로고](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh 로고](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (브라우저 기반)](encryption.md#hatsh) -- ![Kryptor 로고](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) -- ![Tomb 로고](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) +- ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) +- ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) +- ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) +- ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) +- ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb)
diff --git a/i18n/ku-IQ/cloud.md b/i18n/ku-IQ/cloud.md index fcfec1c5..9d15aa37 100644 --- a/i18n/ku-IQ/cloud.md +++ b/i18n/ku-IQ/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/ku-IQ/encryption.md b/i18n/ku-IQ/encryption.md index dcbacc03..e09ff924 100644 --- a/i18n/ku-IQ/encryption.md +++ b/i18n/ku-IQ/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/ku-IQ/notebooks.md b/i18n/ku-IQ/notebooks.md index 56fd0657..aad0c7b8 100644 --- a/i18n/ku-IQ/notebooks.md +++ b/i18n/ku-IQ/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/ku-IQ/real-time-communication.md b/i18n/ku-IQ/real-time-communication.md index 9500ff07..c72373b2 100644 --- a/i18n/ku-IQ/real-time-communication.md +++ b/i18n/ku-IQ/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/ku-IQ/tools.md b/i18n/ku-IQ/tools.md index 7009e838..9c8c6d83 100644 --- a/i18n/ku-IQ/tools.md +++ b/i18n/ku-IQ/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/nl/cloud.md b/i18n/nl/cloud.md index 2874b7c8..0e3bbd2f 100644 --- a/i18n/nl/cloud.md +++ b/i18n/nl/cloud.md @@ -32,6 +32,7 @@ Als deze alternatieven niet aan jouw behoeften voldoen, raden wij je aan te kijk - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) De Proton Drive webapplicatie is onafhankelijk gecontroleerd door Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), volledige details werden niet beschikbaar gesteld, maar in de verklaring van Securitum staat: diff --git a/i18n/nl/encryption.md b/i18n/nl/encryption.md index b902fa26..3335b9d2 100644 --- a/i18n/nl/encryption.md +++ b/i18n/nl/encryption.md @@ -187,25 +187,6 @@ Wij raden je aan een lokale herstelsleutel op een veilige plaats op te slaan in cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-gebaseerd - -Versleuteling via de browser kan handig zijn als je een bestand moet versleutelen, maar geen software of apps op jouw apparaat kunt installeren. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is een webapplicatie die veilige client-side versleuteling van bestanden in jouw browser biedt. Het kan ook zelf worden gehost en is handig als je een bestand moet versleutelen, maar geen software op jouw apparaat kunt installeren vanwege organisatorisch beleid. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacybeleid" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentatie} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Broncode" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donatiemogelijkheden vindt u onderaan de website" } - ## Command-line Tools met command-line interfaces zijn handig voor het integreren van [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/nl/notebooks.md b/i18n/nl/notebooks.md index 0080059b..855b8fbc 100644 --- a/i18n/nl/notebooks.md +++ b/i18n/nl/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin ondersteunt geen wachtwoord/PIN beveiliging voor de [applicatie zelf of individuele notities en notebooks](https://github.com/laurent22/joplin/issues/289). Gegevens worden nog steeds versleuteld tijdens het transport en op de synchronisatielocatie met behulp van jouw hoofdsleutel. Sinds januari 2023 ondersteunt Joplin biometrische app-vergrendeling voor [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) en [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Gegevens worden nog steeds versleuteld tijdens het transport en op de synchronisatielocatie met behulp van jouw hoofdsleutel. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/nl/real-time-communication.md b/i18n/nl/real-time-communication.md index 5c00fc06..ac606f79 100644 --- a/i18n/nl/real-time-communication.md +++ b/i18n/nl/real-time-communication.md @@ -139,7 +139,7 @@ Groepsgesprekken voor spraak en video zijn [niet](https://github.com/vector-im/e Het Matrix-protocol zelf [ondersteunt in theorie PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), maar dit wordt [momenteel niet ondersteund in Element](https://github.com/vector-im/element-web/issues/7101) omdat het sommige aspecten van de gebruikerservaring, zoals sleutelback-ups en gedeelde berichtgeschiedenis, hierdoor niet naar behoren functioneerd. -Het protocol is in 2016 onafhankelijk [gecontroleerd](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last). De specificatie van het Matrix-protocol is te vinden in hun [documentatie](https://spec.matrix.org/latest/). De [Olm](https://matrix.org/docs/projects/other/olm) cryptografische ratel die door Matrix wordt gebruikt, is een implementatie van het [Double Ratchet-algoritme van Signal](https://signal.org/docs/specifications/doubleratchet/). +Het protocol is in 2016 onafhankelijk [gecontroleerd](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last). De specificatie van het Matrix-protocol is te vinden in hun [documentatie](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/nl/tools.md b/i18n/nl/tools.md index 44727c14..6f381227 100644 --- a/i18n/nl/tools.md +++ b/i18n/nl/tools.md @@ -287,7 +287,6 @@ Wij [bevelen](dns.md#recommended-providers) een aantal versleutelde DNS servers - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/pl/cloud.md b/i18n/pl/cloud.md index b66beba1..5930c65e 100644 --- a/i18n/pl/cloud.md +++ b/i18n/pl/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/pl/encryption.md b/i18n/pl/encryption.md index ff7320e0..4d404f74 100644 --- a/i18n/pl/encryption.md +++ b/i18n/pl/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! rekomendacja - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/pl/notebooks.md b/i18n/pl/notebooks.md index abfb13e9..f4b60d2a 100644 --- a/i18n/pl/notebooks.md +++ b/i18n/pl/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/pl/real-time-communication.md b/i18n/pl/real-time-communication.md index c2b7a665..76292806 100644 --- a/i18n/pl/real-time-communication.md +++ b/i18n/pl/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/pl/tools.md b/i18n/pl/tools.md index 1744fc5c..be3dd71c 100644 --- a/i18n/pl/tools.md +++ b/i18n/pl/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/pt-BR/cloud.md b/i18n/pt-BR/cloud.md index 5726625e..e9f25c75 100644 --- a/i18n/pt-BR/cloud.md +++ b/i18n/pt-BR/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/pt-BR/encryption.md b/i18n/pt-BR/encryption.md index 963060e9..e02139cb 100644 --- a/i18n/pt-BR/encryption.md +++ b/i18n/pt-BR/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/pt-BR/notebooks.md b/i18n/pt-BR/notebooks.md index bb585d07..67671444 100644 --- a/i18n/pt-BR/notebooks.md +++ b/i18n/pt-BR/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -O Joplin não suporta proteção por senha/PIN para o [próprio aplicativo ou notas e blocos de anotações individuais](https://github.com/laurent22/joplin/issues/289). No entanto, seus dados ainda são criptografados em trânsito e no local de sincronização usando sua chave mestra. Desde janeiro de 2023, Joplin suporta bloqueio de aplicativo por biometria no [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) e [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. No entanto, seus dados ainda são criptografados em trânsito e no local de sincronização usando sua chave mestra. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Criptee diff --git a/i18n/pt-BR/real-time-communication.md b/i18n/pt-BR/real-time-communication.md index c9d20981..54d0a708 100644 --- a/i18n/pt-BR/real-time-communication.md +++ b/i18n/pt-BR/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/pt-BR/tools.md b/i18n/pt-BR/tools.md index 9bd01aef..3087a712 100644 --- a/i18n/pt-BR/tools.md +++ b/i18n/pt-BR/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/pt/cloud.md b/i18n/pt/cloud.md index 90891923..54e2876f 100644 --- a/i18n/pt/cloud.md +++ b/i18n/pt/cloud.md @@ -33,6 +33,7 @@ Recomendamos armazenar uma chave de recuperação local em um local seguro, em v - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/pt/encryption.md b/i18n/pt/encryption.md index 86153f2a..375693b2 100644 --- a/i18n/pt/encryption.md +++ b/i18n/pt/encryption.md @@ -199,25 +199,6 @@ Recomendamos armazenar uma chave de recuperação local em um local seguro, em v cryptsetup luksHeaderBackup /device/device --header-backup-file /mnt/backup/file.img ``` -## Navegador baseado em - -Ferramentas com interfaces de linha de comando são úteis para intergrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). - -### chapéu.sh - -!!! nota - Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado. - - ![hat.sh logo](/assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](/assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh*** é uma aplicação web que fornece criptografia segura de arquivos do lado do cliente no seu navegador. Também pode ser auto-hospedado e é útil se você precisar criptografar um arquivo, mas não pode instalar qualquer software no seu dispositivo, devido às políticas organizacionais. - - [Visite hat.sh](https://hat.sh){ .md-button .md-button--primary } - - **Downloads*** - - [:fontawesome-brands-github: Fonte](https://github.com/sh-dv/hat.sh) - ## Linha de comando Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/pt/notebooks.md b/i18n/pt/notebooks.md index 2eb51af8..d3d71cfc 100644 --- a/i18n/pt/notebooks.md +++ b/i18n/pt/notebooks.md @@ -90,7 +90,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -O Joplin não suporta a proteção por palavra-passe/PIN, seja para a aplicação [em si, seja para notas e cadernos individuais](https://github.com/laurent22/joplin/issues/289). No entanto, os seus dados continuam a ser encriptados em trânsito e no local de sincronização, utilizando a sua chave mestra. Desde janeiro de 2023 que o Joplin suporta o bloqueio biométrico da aplicação nas versões [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) e [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. No entanto, os seus dados continuam a ser encriptados em trânsito e no local de sincronização, utilizando a sua chave mestra. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/pt/real-time-communication.md b/i18n/pt/real-time-communication.md index b9fbc9ef..f74d23b3 100644 --- a/i18n/pt/real-time-communication.md +++ b/i18n/pt/real-time-communication.md @@ -143,7 +143,7 @@ As chamadas de voz e vídeo em grupo [não são](https://github.com/vector-im/el O próprio protocolo Matrix [suporta teoricamente o PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), no entanto, este [não é atualmente suportado no Element](https://github.com/vector-im/element-web/issues/7101) devido aos problemas que provoca em alguns aspetos da experiência do utilizador, como as cópias de segurança de chaves e o histórico de mensagens partilhadas. -O protocolo foi objeto de uma [auditoria independente](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) em 2016. A especificação do protocolo Matrix pode ser encontrada na sua [documentação](https://spec.matrix.org/latest/). O [Olm](https://matrix.org/docs/projects/other/olm) criptográfico utilizado pelo Matrix é uma implementação do algoritmo [Double Ratchet da Signal](https://signal.org/docs/specifications/doubleratchet/). +O protocolo foi objeto de uma [auditoria independente](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) em 2016. A especificação do protocolo Matrix pode ser encontrada na sua [documentação](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/pt/tools.md b/i18n/pt/tools.md index 92789e75..9c3a6df5 100644 --- a/i18n/pt/tools.md +++ b/i18n/pt/tools.md @@ -284,12 +284,11 @@ Recomendamos armazenar uma chave de recuperação local em um local seguro, em v
-- ![Logótipo Cryptomator](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) -- ![Logótipo Picocrypt](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) -- ![Logótipo VeraCrypt](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Logótipo Hat.sh](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) -- ![Logótipo Kryptor](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) -- ![Logótipo Tomb](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) +- ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) +- ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) +- ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) +- ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) +- ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb)
diff --git a/i18n/ru/cloud.md b/i18n/ru/cloud.md index 02ef7ad8..1a06ebc7 100644 --- a/i18n/ru/cloud.md +++ b/i18n/ru/cloud.md @@ -33,6 +33,7 @@ cover: cloud.webp - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) Веб-приложение Proton Drive прошло независимый аудит компании Securitum в [2021 году](https://proton.me/blog/security-audit-all-proton-apps), полные подробности не были предоставлены, но в аттестационном письме Securitum говорится: diff --git a/i18n/ru/encryption.md b/i18n/ru/encryption.md index 51a56dba..84782cb9 100644 --- a/i18n/ru/encryption.md +++ b/i18n/ru/encryption.md @@ -187,25 +187,6 @@ BitLocker [поддерживается только](https://support.microsoft. cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Шифрование через браузер - -Шифрование через браузер может быть полезным, если вам нужно зашифровать файл, но вы не можете установить программу для шифрования на свое устройство. - -### hat.sh - -!!! recommendation - - ![Логотип hat.sh](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![Логотип hat.sh](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** - это сайт, который безопасно зашифровывает данные через браузер. Сайт может быть полезен, если вам нужно зашифровать файл, но вы не можете установить какое-либо программное обеспечение на свое устройство из-за политики организации. - - [:octicons-globe-16: Сайт](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Политика конфиденциальности" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Документация} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Исходный код" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Способы донатов можно найти внизу сайта" } - ## Для командной строки Инструменты с интерфейсом командной строки полезны для интеграции [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/ru/notebooks.md b/i18n/ru/notebooks.md index 8602cc35..7f98fdcb 100644 --- a/i18n/ru/notebooks.md +++ b/i18n/ru/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin не поддерживает защиту [приложения и отдельных заметок](https://github.com/laurent22/joplin/issues/289) паролем или PIN-кодом. Но ваши данные по-прежнему шифруются вашим секретным ключом при передаче и в месте синхронизации. С января 2023 года Joplin поддерживает вход при помощи биометрии на [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) и [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Но ваши данные по-прежнему шифруются вашим секретным ключом при передаче и в месте синхронизации. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/ru/real-time-communication.md b/i18n/ru/real-time-communication.md index 58c5efae..32165002 100644 --- a/i18n/ru/real-time-communication.md +++ b/i18n/ru/real-time-communication.md @@ -139,7 +139,7 @@ Briar поддерживает прямую секретность пересы Сам протокол Matrix [теоретически поддерживает PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), однако он [в настоящее время не поддерживается в Element](https://github.com/vector-im/element-web/issues/7101) из-за того, что это нарушает некоторые аспекты работы пользователей, такие как резервное копирование ключей и общая история сообщений. -Протокол прошел независимый [аудит](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) в 2016 году. Спецификацию протокола Matrix можно найти в их [документации](https://spec.matrix.org/latest/). Криптографический ratchet [Olm](https://matrix.org/docs/projects/other/olm), используемый Matrix, является реализацией алгоритма [Double Ratchet](https://signal.org/docs/specifications/doubleratchet/) в Signal. +Протокол прошел независимый [аудит](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) в 2016 году. Спецификацию протокола Matrix можно найти в их [документации](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/ru/tools.md b/i18n/ru/tools.md index 8c92ab7e..e24e8392 100644 --- a/i18n/ru/tools.md +++ b/i18n/ru/tools.md @@ -284,12 +284,11 @@ description: Privacy Guides - это самый прозрачный и наде
-- ![ЛоготипCryptomator](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) -- ![Логотип Picocrypt](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) -- ![Логотип VeraCrypt](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![Логотип VeraCrypt](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Логотип Hat.sh](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) -- ![Логотип Kryptor](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) -- ![Логотип Tomb](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) +- ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) +- ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) +- ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) +- ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) +- ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb)
diff --git a/i18n/sv/cloud.md b/i18n/sv/cloud.md index 87d1d5b2..8cd8f3fb 100644 --- a/i18n/sv/cloud.md +++ b/i18n/sv/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/sv/encryption.md b/i18n/sv/encryption.md index e806e15d..d2a77884 100644 --- a/i18n/sv/encryption.md +++ b/i18n/sv/encryption.md @@ -185,25 +185,6 @@ Vi rekommenderar att du lagrar en lokal återställningsnyckel på en säker pla cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Webbläsarbaserad - -Webbläsarbaserad kryptering kan vara användbar när du behöver kryptera en fil men inte kan installera programvara eller appar på enheten. - -### hat.sh - -!!! recommendation - - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ align=right } - ![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ align=right } - - **VeraCrypt** är ett källkod-tillgängligt freeware-verktyg som används för on-the-fly kryptering. Det kan också vara värd för sig själv och är användbart om du behöver kryptera en fil men inte kan installera någon programvara på din enhet på grund av organisationspolicyer. - - [:octicons-globe-16: Startsida](https://cryptomator.org){ .md-button .md-button--primary } - [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Dokumentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Källkod" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations/){ .card-link title=Contribute" } - ## Kommandorad Verktyg med kommandoradsgränssnitt är användbara för att integrera [skalskript](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/sv/notebooks.md b/i18n/sv/notebooks.md index 3ffd30be..1657e4bf 100644 --- a/i18n/sv/notebooks.md +++ b/i18n/sv/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmk -Joplin stöder inte lösenord/PIN-skydd för [applikationen själv eller enskilda anteckningar och anteckningsböcker](https://github.com/laurent22/joplin/issues/289). Dina data är dock fortfarande krypterade under överföring och på synkroniseringsplatsen med hjälp av huvudnyckeln. Sedan januari 2023 stöder Joplin biometrisk applåsning för [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) och [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Dina data är dock fortfarande krypterade under överföring och på synkroniseringsplatsen med hjälp av huvudnyckeln. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/sv/real-time-communication.md b/i18n/sv/real-time-communication.md index 674d55d6..5b0393f7 100644 --- a/i18n/sv/real-time-communication.md +++ b/i18n/sv/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/sv/tools.md b/i18n/sv/tools.md index b566c015..12613353 100644 --- a/i18n/sv/tools.md +++ b/i18n/sv/tools.md @@ -287,9 +287,8 @@ Vi [rekommenderar](dns.md#recommended-providers) ett antal krypterade DNS-servra - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) -- ![Kryptor logo](assets/img/encryption software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) -- ![Tomb logo](assets/img/encryption software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) +- ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) +- ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/tr/cloud.md b/i18n/tr/cloud.md index 9e29c9d7..fc397ac9 100644 --- a/i18n/tr/cloud.md +++ b/i18n/tr/cloud.md @@ -27,11 +27,12 @@ Bu alternatifler ihtiyaçlarınızı karşılamıyorsa, başka bir bulut sağlay [:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" } - ??? indirmeler + ??? downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) Proton Drive web uygulaması [2021](https://proton.me/blog/security-audit-all-proton-apps)yılında Securitum tarafından bağımsız olarak denetlenmiştir, tüm ayrıntılar mevcut değildir, ancak Securitum'un tasdik mektubunda şunlar belirtilmiştir: diff --git a/i18n/tr/encryption.md b/i18n/tr/encryption.md index 363e79be..a9829092 100644 --- a/i18n/tr/encryption.md +++ b/i18n/tr/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! öneri - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/tr/notebooks.md b/i18n/tr/notebooks.md index 82ef6182..94e0e4e9 100644 --- a/i18n/tr/notebooks.md +++ b/i18n/tr/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/tr/real-time-communication.md b/i18n/tr/real-time-communication.md index 3206c16a..f2269718 100644 --- a/i18n/tr/real-time-communication.md +++ b/i18n/tr/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/tr/tools.md b/i18n/tr/tools.md index 77202e9f..e2b41029 100644 --- a/i18n/tr/tools.md +++ b/i18n/tr/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/uk/cloud.md b/i18n/uk/cloud.md index 075d07e6..56f76993 100644 --- a/i18n/uk/cloud.md +++ b/i18n/uk/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/uk/encryption.md b/i18n/uk/encryption.md index a5318550..bc3c4a9a 100644 --- a/i18n/uk/encryption.md +++ b/i18n/uk/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! рекомендації - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/uk/notebooks.md b/i18n/uk/notebooks.md index 4e2c50e4..7c5e4ee0 100644 --- a/i18n/uk/notebooks.md +++ b/i18n/uk/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/uk/real-time-communication.md b/i18n/uk/real-time-communication.md index a5a3d321..697fc70e 100644 --- a/i18n/uk/real-time-communication.md +++ b/i18n/uk/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/uk/tools.md b/i18n/uk/tools.md index 77dae66a..550f055b 100644 --- a/i18n/uk/tools.md +++ b/i18n/uk/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/vi/cloud.md b/i18n/vi/cloud.md index e4bbf47f..11424db7 100644 --- a/i18n/vi/cloud.md +++ b/i18n/vi/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/vi/encryption.md b/i18n/vi/encryption.md index 4e2fb246..e37344cd 100644 --- a/i18n/vi/encryption.md +++ b/i18n/vi/encryption.md @@ -191,23 +191,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! khuyến nghị - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [Homepage](https://hat.sh){ .md-button .md-button--primary } - - ??? - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/vi/notebooks.md b/i18n/vi/notebooks.md index 65d60f54..5f6fef76 100644 --- a/i18n/vi/notebooks.md +++ b/i18n/vi/notebooks.md @@ -81,7 +81,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:pg-f-droid: F-Droid](https://f-droid.org/en/packages/net.cozic.joplin) - [:fontawesome-brands-github: GitHub](https://github.com/laurent22/joplin) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). Dữ liệu vẫn được mã hóa khi chuyển tiếp và tại vị trí đồng bộ hóa bằng khóa chính của bạn. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. Dữ liệu vẫn được mã hóa khi chuyển tiếp và tại vị trí đồng bộ hóa bằng khóa chính của bạn. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### EteSync Notes diff --git a/i18n/vi/real-time-communication.md b/i18n/vi/real-time-communication.md index 92f2dbe6..d8f0f3c2 100644 --- a/i18n/vi/real-time-communication.md +++ b/i18n/vi/real-time-communication.md @@ -132,7 +132,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/vi/tools.md b/i18n/vi/tools.md index 5774b7dc..7b1bb457 100644 --- a/i18n/vi/tools.md +++ b/i18n/vi/tools.md @@ -287,7 +287,6 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/zh-Hant/cloud.md b/i18n/zh-Hant/cloud.md index f8fb36a6..17766c80 100644 --- a/i18n/zh-Hant/cloud.md +++ b/i18n/zh-Hant/cloud.md @@ -27,11 +27,12 @@ cover: cloud.webp [:octicons-info-16:](https://proton.me/support/drive){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" } - ??? downloads "下載" + ??? downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) Proton Drive 網路應用程式已於[2021年](https://proton.me/blog/security-audit-all-proton-apps)由 Securitum 獨立審核,並未公開完整詳細資料,但 Securitum 的認證信函指出: diff --git a/i18n/zh-Hant/encryption.md b/i18n/zh-Hant/encryption.md index 13d1554b..683e279f 100644 --- a/i18n/zh-Hant/encryption.md +++ b/i18n/zh-Hant/encryption.md @@ -223,30 +223,6 @@ BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device -## 瀏覽器端 - -當您需要加密檔案但無法在裝置上安裝軟體或應用程式時,透過瀏覽器來加密可能很有用。 - - - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** 是一款在瀏覽器中提供安全用戶端檔案加密的網頁應用程式。 它也可以是自行託管,如果您需要加密文件,但由於組織政策無法在設備上安裝任何軟件,這個方法將非常有用。 - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - - - - ## 命令列 命令行界面的工具可用於集成 [shell 腳本](https://en.wikipedia.org/wiki/Shell_script)。 diff --git a/i18n/zh-Hant/notebooks.md b/i18n/zh-Hant/notebooks.md index 2e698bfe..9fe0da5e 100644 --- a/i18n/zh-Hant/notebooks.md +++ b/i18n/zh-Hant/notebooks.md @@ -87,7 +87,7 @@ Notesnook 僅允許使用其付費昇級方案使用本地筆記加密[私人保 - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin 不支援 [應用程式本身或個別筆記和筆記本](https://github.com/laurent22/joplin/issues/289)的密碼/PIN保護。 但是您的資料在傳輸與同步位置中仍會使用主密鑰加密。 自2023年1月起, Joplin 支援 [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) 和 [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z)的生物識別應用程式鎖定功能。 +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. 但是您的資料在傳輸與同步位置中仍會使用主密鑰加密。 Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/zh-Hant/real-time-communication.md b/i18n/zh-Hant/real-time-communication.md index 699580e4..b3c33024 100644 --- a/i18n/zh-Hant/real-time-communication.md +++ b/i18n/zh-Hant/real-time-communication.md @@ -140,7 +140,7 @@ Briar 使用 Bramble [Handshake](https://code.briarproject.org/briar/briar-spec/ Matrix 協議本身 [理論上支援 PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy),但目前Element 不支援 PFS ,因為它破壞一些使用者體驗,例如密鑰備份和共享訊息歷史記錄。

-其協議在 2016年獨立進行了 [審計](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) 。 Matrix 協議的規範可以在他們的 [文檔](https://spec.matrix.org/latest/)中找到。 Matrix 使用的 [Olm](https://matrix.org/docs/projects/other/olm) 加密棘輪是Signal [Double Ratchet 演算法](https://signal.org/docs/specifications/doubleratchet/)的實現。 +其協議在 2016年獨立進行了 [審計](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) 。 Matrix 協議的規範可以在他們的 [文檔](https://spec.matrix.org/latest/)中找到。 The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). diff --git a/i18n/zh-Hant/tools.md b/i18n/zh-Hant/tools.md index 89cd3441..0a96c80e 100644 --- a/i18n/zh-Hant/tools.md +++ b/i18n/zh-Hant/tools.md @@ -287,7 +287,6 @@ description: Privacy Guides 是最透明和可靠的網站,用於尋找保護 - ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) - ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) - ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) -- ![Hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ .twemoji }![Hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ .twemoji } [Hat.sh (Browser-based)](encryption.md#hatsh) - ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) - ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb) diff --git a/i18n/zh/cloud.md b/i18n/zh/cloud.md index e67164f4..6b7baa83 100644 --- a/i18n/zh/cloud.md +++ b/i18n/zh/cloud.md @@ -32,6 +32,7 @@ If these alternatives do not fit your needs, we suggest you look into using encr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.drive) - [:simple-appstore: App Store](https://apps.apple.com/app/id1509667851) - [:simple-windows11: Windows](https://proton.me/drive/download) + - [:simple-apple: macOS](https://proton.me/drive/download) The Proton Drive web application has been independently audited by Securitum in [2021](https://proton.me/blog/security-audit-all-proton-apps), full details were not made available, but Securitum's letter of attestation states: diff --git a/i18n/zh/encryption.md b/i18n/zh/encryption.md index f98730cb..df832a80 100644 --- a/i18n/zh/encryption.md +++ b/i18n/zh/encryption.md @@ -187,25 +187,6 @@ We recommend storing a local recovery key in a secure place as opposed to using cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img ``` -## Browser-based - -Browser-based encryption can be useful when you need to encrypt a file but cannot install software or apps on your device. - -### hat.sh - -!!! recommendation - - ![hat.sh logo](assets/img/encryption-software/hat-sh.png#only-light){ align=right } - ![hat.sh logo](assets/img/encryption-software/hat-sh-dark.png#only-dark){ align=right } - - **Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be self-hosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. - - [:octicons-globe-16: Website](https://hat.sh){ .md-button .md-button--primary } - [:octicons-eye-16:](https://hat.sh/about/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://hat.sh/about/){ .card-link title=Documentation} - [:octicons-code-16:](https://github.com/sh-dv/hat.sh){ .card-link title="Source Code" } - [:octicons-heart-16:](https://github.com/sh-dv/hat.sh#donations){ .card-link title="Donations methods can be found at the bottom of the website" } - ## Command-line Tools with command-line interfaces are useful for integrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). diff --git a/i18n/zh/notebooks.md b/i18n/zh/notebooks.md index 56fd0657..aad0c7b8 100644 --- a/i18n/zh/notebooks.md +++ b/i18n/zh/notebooks.md @@ -87,7 +87,7 @@ Notesnook only allows local note encryption with the [private vault](https://hel - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek) -Joplin does not support password/PIN protection for the [application itself or individual notes and notebooks](https://github.com/laurent22/joplin/issues/289). However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin supports biometrics app lock for [Android](https://joplinapp.org/changelog_android/#android-v2-10-3-https-github-com-laurent22-joplin-releases-tag-android-v2-10-3-pre-release-2023-01-05t11-29-06z) and [iOS](https://joplinapp.org/changelog_ios/#ios-v12-10-2-https-github-com-laurent22-joplin-releases-tag-ios-v12-10-2-2023-01-20t17-41-13z). +Joplin does not [support](https://github.com/laurent22/joplin/issues/289) password/PIN protection for the application itself or individual notes and notebooks. However, your data is still encrypted in transit and at the sync location using your master key. Since January 2023, Joplin [supports biometrics](https://github.com/laurent22/joplin/commit/f10d9f75b055d84416053fab7e35438f598753e9) app lock for Android and iOS. ### Cryptee diff --git a/i18n/zh/real-time-communication.md b/i18n/zh/real-time-communication.md index 3c7e91b1..144d40f8 100644 --- a/i18n/zh/real-time-communication.md +++ b/i18n/zh/real-time-communication.md @@ -139,7 +139,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports PFS](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy), however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm](https://matrix.org/docs/projects/other/olm) cryptographic ratchet used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). ### Session diff --git a/i18n/zh/tools.md b/i18n/zh/tools.md index 7dc5bad3..bdf13626 100644 --- a/i18n/zh/tools.md +++ b/i18n/zh/tools.md @@ -290,10 +290,11 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
-- ![GnuPG logo](assets/img/encryption-software/gnupg.svg){ .twemoji } [GnuPG](encryption.md#gnu-privacy-guard) -- ![GPG4Win logo](assets/img/encryption-software/gpg4win.svg){ .twemoji } [GPG4Win (Windows)](encryption.md#gpg4win) -- ![GPG Suite logo](assets/img/encryption-software/gpgsuite.png){ .twemoji } [GPG Suite (macOS)](encryption.md#gpg-suite) -- ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ .twemoji } [OpenKeychain](encryption.md#openkeychain) +- ![Cryptomator logo](assets/img/encryption-software/cryptomator.svg){ .twemoji } [Cryptomator](encryption.md#cryptomator-cloud) +- ![Picocrypt logo](assets/img/encryption-software/picocrypt.svg){ .twemoji } [Picocrypt](encryption.md#picocrypt-file) +- ![VeraCrypt logo](assets/img/encryption-software/veracrypt.svg#only-light){ .twemoji }![VeraCrypt logo](assets/img/encryption-software/veracrypt-dark.svg#only-dark){ .twemoji } [VeraCrypt (FDE)](encryption.md#veracrypt-disk) +- ![Kryptor logo](assets/img/encryption-software/kryptor.png){ .twemoji } [Kryptor](encryption.md#kryptor) +- ![Tomb logo](assets/img/encryption-software/tomb.png){ .twemoji } [Tomb](encryption.md#tomb)