diff --git a/i18n/cs/about/donation-acceptance-policy.md b/i18n/cs/about/donation-acceptance-policy.md index 98c22e7b..7037dc75 100644 --- a/i18n/cs/about/donation-acceptance-policy.md +++ b/i18n/cs/about/donation-acceptance-policy.md @@ -12,7 +12,7 @@ Privacy Guides aspires to obtain funding from a wide variety of sources to reduc In the course of our regular fundraising activities... - Donations and other forms of support will generally be accepted from individuals, corporations, foundations, or other entities, without limitations. - - This includes cash, cash equivalents (checks, money orders, credit/debit card payments), and cryptocurrency. + - This includes cash, cash equivalents (checks, money orders, credit/debit card payments), and cryptocurrency. - Gifts of Real Property, Personal Property, or Securities may only be accepted upon approval of the MAGIC Grants board of directors. Privacy Guides will only accept such gifts that are legal and consistent with our policies. Gifts must not interfere with Privacy Guides' mission, purpose, and procedures. diff --git a/i18n/cs/ai-chat.md b/i18n/cs/ai-chat.md index fbecfca9..056b7cda 100644 --- a/i18n/cs/ai-chat.md +++ b/i18n/cs/ai-chat.md @@ -163,7 +163,7 @@ To check the authenticity and safety of the model, look for: - Community reviews and usage statistics - A "Safe" badge next to the model file (Hugging Face only) - Matching checksums[^1] - - On Hugging Face, you can find the hash by clicking on a model file and looking for the **Copy SHA256** button below it. You should compare this checksum with the one from the model file you downloaded. + - On Hugging Face, you can find the hash by clicking on a model file and looking for the **Copy SHA256** button below it. You should compare this checksum with the one from the model file you downloaded. A downloaded model is generally safe if it satisfies all the above checks. diff --git a/i18n/cs/android/general-apps.md b/i18n/cs/android/general-apps.md index 800718b3..46071623 100644 --- a/i18n/cs/android/general-apps.md +++ b/i18n/cs/android/general-apps.md @@ -49,7 +49,7 @@ Shelter supports blocking contact search cross profiles and sharing files across
-

Warning

+

Varování

When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. diff --git a/i18n/cs/basics/hardware.md b/i18n/cs/basics/hardware.md index 293f58ba..577e885e 100644 --- a/i18n/cs/basics/hardware.md +++ b/i18n/cs/basics/hardware.md @@ -53,7 +53,7 @@ Biometrics can prevent someone from watching you type in your password, so if sh Most implementations of face authentication require you to be looking at your phone and also only work from a relatively close distance, so you don't need to worry too much about someone pointing your phone at your face to unlock it without your consent. You can still disable biometrics when your phone is locked if you want. On iOS, you can hold the side button and a volume button for 3 seconds to disable Face ID on models that support it. On Android, hold the power button and press Lockdown on the menu.
-

Warning

+

Varování

Some devices do not have the proper hardware for secure face authentication. There are two main types of face authentication: 2D and 3D. 3D face authentication makes use of a dot projector that lets the device create a 3D depth map of your face. Make sure that your device has this capability. @@ -82,7 +82,7 @@ Hardware keys are devices that use strong cryptography to authenticate you to a If you don't want to trust your OS's permission controls to prevent the camera from activating in the first place, you can buy camera blockers that physically prevent light from reaching the camera. You could also buy a device that doesn't have a built-in camera and use an external camera that you can unplug whenever you're done using it. Some devices come with built-in camera blockers or hardware switches that physically disconnect the camera from power.
-

Warning

+

Varování

You should only buy covers that fit your laptop and won't cause damage when you close the lid. Covering the camera will interfere with automatic brightness and face authentication features. diff --git a/i18n/cs/basics/multi-factor-authentication.md b/i18n/cs/basics/multi-factor-authentication.md index 6abb539c..2d248308 100644 --- a/i18n/cs/basics/multi-factor-authentication.md +++ b/i18n/cs/basics/multi-factor-authentication.md @@ -135,7 +135,7 @@ The command will prevent an adversary from bypassing MFA when the computer boots ### Linux
-

Warning

+

Varování

If the hostname of your system changes (such as due to DHCP), you would be unable to login. It is vital that you set up a proper hostname for your computer before following this guide. diff --git a/i18n/cs/data-redaction.md b/i18n/cs/data-redaction.md index 5b5e2d2c..ae0de4f7 100644 --- a/i18n/cs/data-redaction.md +++ b/i18n/cs/data-redaction.md @@ -13,7 +13,7 @@ cover: data-redaction.webp When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata.
-

Warning

+

Varování

You should **never** use blur to redact [text in images](https://bishopfox.com/blog/unredacter-tool-never-pixelation). If you want to redact text in an image, you should draw a box over the text. diff --git a/i18n/cs/desktop.md b/i18n/cs/desktop.md index b41faf90..805e4ea1 100644 --- a/i18n/cs/desktop.md +++ b/i18n/cs/desktop.md @@ -175,7 +175,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh
-

Warning

+

Varování

Tails [doesn't erase](https://gitlab.tails.boum.org/tails/tails/-/issues/5356) the [video memory](https://en.wikipedia.org/wiki/Dual-ported_video_RAM) when shutting down. When you restart your computer after using Tails, it might briefly display the last screen that was displayed in Tails. If you shut down your computer instead of restarting it, the video memory will erase itself automatically after being unpowered for some time. diff --git a/i18n/cs/device-integrity.md b/i18n/cs/device-integrity.md index acac6e57..b8e372c3 100644 --- a/i18n/cs/device-integrity.md +++ b/i18n/cs/device-integrity.md @@ -88,7 +88,7 @@ These tools can trigger false-positives. If any of these tools finds indicators
-

Warning

+

Varování

Using MVT is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. @@ -142,7 +142,7 @@ iMazing automates and interactively guides you through the process of using [MVT These are apps you can install which check your device and operating system for signs of tampering, and validate the identity of your device.
-

Warning

+

Varování

Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. diff --git a/i18n/cs/dns.md b/i18n/cs/dns.md index 07fb52cf..b47a1d0f 100644 --- a/i18n/cs/dns.md +++ b/i18n/cs/dns.md @@ -191,7 +191,7 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot
-

Warning

+

Varování

The anonymized DNS feature does [not](advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) anonymize other network traffic. diff --git a/i18n/cs/email-clients.md b/i18n/cs/email-clients.md index c8688566..725de460 100644 --- a/i18n/cs/email-clients.md +++ b/i18n/cs/email-clients.md @@ -53,7 +53,7 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo
-

Warning

+

Varování

When replying to someone on a mailing list in Thunderbird Mobile, the "reply" option may also include the mailing list. For more information see [thunderbird/thunderbird-android #3738](https://github.com/thunderbird/thunderbird-android/issues/3738). diff --git a/i18n/cs/email.md b/i18n/cs/email.md index fcaa4300..c2a12482 100644 --- a/i18n/cs/email.md +++ b/i18n/cs/email.md @@ -14,43 +14,43 @@ global: - [:material-server-network: Poskytovatelé služeb](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal} -Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. +E-mail je prakticky nezbytný pro používání jakékoliv online služby, ale nedoporučujeme jej pro osobní konverzace. Namísto e-mailu zvažte možnost kontaktování pomocí chatovacích služeb, které podporují dopřednou bezpečnost. -[Recommended Instant Messengers](real-time-communication.md ""){.md-button} +[Doporučené messengery](real-time-communication.md ""){.md-button} -## Recommended Providers +## Doporučení poskytovatelé -For everything else, we recommend a variety of email providers based on sustainable business models and built-in security and privacy features. Read our [full list of criteria](#criteria) for more information. +Pro všechno ostatní doporučujeme různé e-mailové poskytovatele, kteří mají udržitelný byznys model a vestavěné funkce pro zachování bezpečnosti a soukromí. Přečtěte si náš [úplný seznam kritérií](#criteria) pro více informací. -| Provider | OpenPGP / WKD | IMAP / SMTP | Zero-Access Encryption | Anonymous Payment Methods | -| --------------------------- | -------------------------------------- | ---------------------------------------------------------- | ---------------------------------------------------- | ------------------------------------- | -| [Proton Mail](#proton-mail) | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Paid plans only | :material-check:{ .pg-green } | Cash | -| [Mailbox.org](#mailboxorg) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Mail only | Cash | -| [Tuta](#tuta) | :material-alert-outline:{ .pg-orange } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | Monero
Cash via third party | +| Poskytovatel | OpenPGP / WKD | IMAP / SMTP | Zero-Access šifrování | Anonymní platební metody | +| --------------------------- | -------------------------------------- | --------------------------------------------------------------- | ------------------------------------------------------ | ------------------------------------------------------ | +| [Proton Mail](#proton-mail) | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Pouze placené tarify | :material-check:{ .pg-green } | Hotovost | +| [Mailbox.org](#mailboxorg) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Pouze maily | Hotovost | +| [Tuta](#tuta) | :material-alert-outline:{ .pg-orange } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | Monero
Hotovost prostřednictvím třetí strany | -In addition to (or instead of) an email provider recommended here, you may wish to consider a dedicated [email aliasing service](email-aliasing.md#recommended-providers) to protect your privacy. Among other things, these services can help protect your real inbox from spam, prevent marketers from correlating your accounts, and encrypt all incoming messages with PGP. +Můžete navíc, nebo místo, zvážit používání kromě zmíněných e-mailových poskytovatelů i používání dedikované [služby pro e-mailové aliasy](email-aliasing.md#recommended-providers) pro ochranu vašeho soukromí. Tyto služby vám mimo jiné mohou pomoct chránit vaši pravou adresu před spamem, zabránit marketingovým týmům v korelování mezi jednotlivými účty a šifrovat všechny příchozí zprávy pomocí PGP. -- [More Information :material-arrow-right-drop-circle:](email-aliasing.md) +- [Více informací](email-aliasing.md) -## OpenPGP Compatible Services +## Služby kompatibilní s OpenPGP -These providers natively support OpenPGP encryption/decryption and the [Web Key Directory (WKD) standard](basics/email-security.md#what-is-the-web-key-directory-standard), allowing for provider-agnostic end-to-end encrypted emails. For example, a Proton Mail user could send an E2EE message to a Mailbox.org user, or you could receive OpenPGP-encrypted notifications from internet services which support it. +Tito poskytovatelé nativně podporují OpenPGP (de)šifrování a [standard Web Key Directory (WKD)](basics/email-security.md#what-is-the-web-key-directory-standard), který umožňuje posílání koncově šifrovaných e-mailů bez ohledu na poskytovatele. Například uživatel Proton Mailu může poslat koncově šifrovanou zprávu uživateli Mailbox.org, nebo může přijímat notifikace šifrované pomocí OpenPGP z internetových služeb, které to podporují.
-- ![Proton Mail logo](assets/img/email/protonmail.svg){ .twemoji } [Proton Mail](email.md#proton-mail) -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .twemoji } [Mailbox.org](email.md#mailboxorg) +- ![logo Proton Mail](assets/img/email/protonmail.svg){ .twemoji } [Proton Mail](email.md#proton-mail) +- ![logo Mailbox.org](assets/img/email/mailboxorg.svg){ .twemoji } [Mailbox.org](email.md#mailboxorg)
-

Warning

+

Varování

-When using E2EE technology like OpenPGP your email will still have some metadata that is not encrypted in the header of the email, generally including the subject line! Read more about [email metadata](basics/email-security.md#email-metadata-overview). +I při používání E2EE technologie, jako je OpenPGP, budou vaše e-maily přesto obsahovat některá metadata, která nebudou šifrovaná v hlavičce e-mailu, obvykle včetně předmětu. Přečtěte si více o [e-mailových metadatech](basics/email-security.md#email-metadata-overview). -OpenPGP also does not support forward secrecy, which means if the private key of either you or the message recipient is ever stolen, all previous messages encrypted with it will be exposed. +OpenPGP také nepodporuje dopřednou bezpečnost, což znamená, že pokud někdo jiný získá soukromý klíč, ať už váš, nebo protistrany, všechny vaše předchozí šifrované zprávy budou odhaleny. -- [How do I protect my private keys?](basics/email-security.md#how-do-i-protect-my-private-keys) +- [Jak mohu ochránit své soukromé klíče?](basics/email-security.md#how-do-i-protect-my-private-keys)
diff --git a/i18n/cs/frontends.md b/i18n/cs/frontends.md index 1fc3ee22..9e667c34 100644 --- a/i18n/cs/frontends.md +++ b/i18n/cs/frontends.md @@ -100,7 +100,7 @@ There are a number of public instances, with some that offer a [Tor](tor.md) oni
-

Warning

+

Varování

Invidious does not proxy video streams by default. Videos watched through Invidious will still make direct connections to Google's servers (e.g. `googlevideo.com`); however, some instances support video proxying—simply enable *Proxy videos* within the instances' settings or add `&local=true` to the URL. @@ -169,7 +169,7 @@ When using FreeTube, your subscription list, playlists, watch history and search
-

Warning

+

Varování

When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -204,7 +204,7 @@ When using Yattee, your subscription list is saved locally on your device.
-

Warning

+

Varování

When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -239,7 +239,7 @@ Your subscription list and playlists are saved locally on your Android device.
-

Warning

+

Varování

When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -275,7 +275,7 @@ Your subscription list and playlists are saved locally on your Android device. 1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**.
-

Warning

+

Varování

When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. diff --git a/i18n/cs/meta/admonitions.md b/i18n/cs/meta/admonitions.md index 80b860cc..e1a564db 100644 --- a/i18n/cs/meta/admonitions.md +++ b/i18n/cs/meta/admonitions.md @@ -104,7 +104,7 @@ Lorem ipsum dolor sit amet, consectetur adipiscing elit. #### `warning`
-

Warning

+

Varování

Lorem ipsum dolor sit amet, consectetur adipiscing elit. diff --git a/i18n/cs/mobile-phones.md b/i18n/cs/mobile-phones.md index 8713a4da..2c9e982f 100644 --- a/i18n/cs/mobile-phones.md +++ b/i18n/cs/mobile-phones.md @@ -36,7 +36,7 @@ The mobile devices listed here provide a long lifespan of guaranteed security up [Recommended Android Distributions :material-arrow-right-drop-circle:](android/distributions.md){ .md-button .md-button--primary } [Details about Android Security :material-arrow-right-drop-circle:](os/android-overview.md#security-protections){ .md-button }
-

Warning

+

Varování

End-of-life devices (such as GrapheneOS's "extended support" devices) do not have full security patches (firmware updates) due to the OEM discontinuing support. These devices cannot be considered completely secure regardless of installed software. diff --git a/i18n/cs/os/android-overview.md b/i18n/cs/os/android-overview.md index 4ff9761a..2ec0440f 100644 --- a/i18n/cs/os/android-overview.md +++ b/i18n/cs/os/android-overview.md @@ -75,7 +75,7 @@ An app may request a permission for a specific feature it has. For example, any [Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.
-

Warning

+

Varování

If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. diff --git a/i18n/cs/os/ios-overview.md b/i18n/cs/os/ios-overview.md index e740cb08..9f721674 100644 --- a/i18n/cs/os/ios-overview.md +++ b/i18n/cs/os/ios-overview.md @@ -157,7 +157,7 @@ After enabling Stolen Device Protection, [certain actions](https://support.apple iPhones are already resistant to brute-force attacks by making you wait long periods of time after multiple failed attempts; however, there have historically been exploits to get around this. To be extra safe, you can set your phone to wipe itself after 10 failed passcode attempts.
-

Warning

+

Varování

With this setting enabled, someone could intentionally wipe your phone by entering the wrong password many times. Make sure you have proper backups and only enable this setting if you feel comfortable with it. diff --git a/i18n/cs/os/macos-overview.md b/i18n/cs/os/macos-overview.md index 6f1dbef4..63496b4d 100644 --- a/i18n/cs/os/macos-overview.md +++ b/i18n/cs/os/macos-overview.md @@ -151,7 +151,7 @@ macOS employs defense in depth by relying on multiple layers of software and har ### Software Security
-

Warning

+

Varování

macOS allows you to install beta updates. These are unstable and may come with extra telemetry since they're for testing purposes. Because of this, we recommend you avoid beta software in general. @@ -176,7 +176,7 @@ System Integrity Protection makes critical file locations read-only to protect a On macOS, whether an app is sandboxed is determined by the developer when they sign it. The App Sandbox protects against vulnerabilities in the apps you run by limiting what a malicious actor can access in the event that the app is exploited. The App Sandbox *alone* can't protect against [:material-package-variant-closed-remove: Supply Chain Attacks](../basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian} by malicious developers. For that, sandboxing needs to be enforced by someone other than the developer themselves, as it is on the App Store.
-

Warning

+

Varování

Software downloaded from outside the official App Store is not required to be sandboxed. If your threat model prioritizes defending against [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }, then you may want to check if the software you download outside the App Store is sandboxed, which is up to the developer to *opt in*. @@ -187,7 +187,7 @@ You can check if an app uses the App Sandbox in a few ways: You can check if apps that are already running are sandboxed using the [Activity Monitor](https://developer.apple.com/documentation/security/protecting-user-data-with-app-sandbox#Verify-that-your-app-uses-App-Sandbox).
-

Warning

+

Varování

Just because one of an app's processes is sandboxed doesn't mean they all are. diff --git a/i18n/cs/os/windows/group-policies.md b/i18n/cs/os/windows/group-policies.md index cadf541d..c97fb7d6 100644 --- a/i18n/cs/os/windows/group-policies.md +++ b/i18n/cs/os/windows/group-policies.md @@ -20,8 +20,8 @@ To change any group policy, double click it and select Enabled or Disabled at th #### Device Guard - Turn On Virtualization Based Security: **Enabled** - - Platform Security Level: **Secure Boot and DMA Protection** - - Secure Launch Configuration: **Enabled** + - Platform Security Level: **Secure Boot and DMA Protection** + - Secure Launch Configuration: **Enabled** #### Internet Communication Management @@ -52,14 +52,14 @@ AutoRun and AutoPlay are features which allow Windows to run a script or perform - Turn off AutoPlay: **Enabled** - Disallow Autoplay for nonvolume devices: **Enabled** - Set the default behavior for AutoRun: **Enabled** - - Default AutoRun Behavior: **Do not execute any AutoRun commands** + - Default AutoRun Behavior: **Do not execute any AutoRun commands** #### BitLocker Drive Encryption You may wish to re-encrypt your operating system drive after changing these settings. - Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7): **Enabled** - - Select the encryption method: **AES-256** + - Select the encryption method: **AES-256** Setting the cipher strength for the Windows 7 policy still applies that strength to newer versions of Windows. @@ -85,12 +85,12 @@ Despite the names of these policies, this doesn't _require_ you to do anything b #### Data Collection and Preview Builds - Allow Diagnostic Data: **Enabled** - - Options: **Send required diagnostic data** (Pro Edition); or - - Options: **Diagnostic data off** (Enterprise or Education Edition) + - Options: **Send required diagnostic data** (Pro Edition); or + - Options: **Diagnostic data off** (Enterprise or Education Edition) - Limit Diagnostic Log Collection: **Enabled** - Limit Dump Collection: **Enabled** - Limit optional diagnostic data for Desktop Analytics: **Enabled** - - Options: **Disable Desktop Analytics collection** + - Options: **Disable Desktop Analytics collection** - Do not show feedback notifications: **Enabled** #### File Explorer @@ -118,7 +118,7 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Allow Cortana: **Disabled** - Don't search the web or display web results in Search: **Enabled** - Set what information is shared in Search: **Enabled** - - Type of information: **Anonymous info** + - Type of information: **Anonymous info** #### Sync your settings @@ -132,4 +132,4 @@ This last setting disables OneDrive on your system; make sure to change it to ** - Do not send additional data: **Enabled** - Consent > Configure Default consent: **Enabled** - - Consent level: **Always ask before sending data** + - Consent level: **Always ask before sending data** diff --git a/i18n/cs/security-keys.md b/i18n/cs/security-keys.md index 69c9e26e..fbdda30e 100644 --- a/i18n/cs/security-keys.md +++ b/i18n/cs/security-keys.md @@ -41,7 +41,7 @@ This key provides only basic FIDO2 functionality, but for most people that is al If you need any of those features, you should consider their higher-end [YubiKey](#yubikey) of products instead.
-

Warning

+

Varování

The firmware of Yubico's Security Keys is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. @@ -72,7 +72,7 @@ YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/suppor For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never exposed to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker.
-

Warning

+

Varování

The firmware of YubiKey is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. @@ -103,14 +103,14 @@ Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface.
-

Warning

+

Varování

While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP secrets, we highly recommend that you use a YubiKey instead.
-

Warning

+

Varování

Resetting the OpenPGP interface on a Nitrokey [Pro 2](https://docs.nitrokey.com/nitrokeys/pro/factory-reset) or Nitrokey [Start 2](https://docs.nitrokey.com/nitrokeys/storage/factory-reset) will also make the password database inaccessible. diff --git a/i18n/cs/self-hosting/index.md b/i18n/cs/self-hosting/index.md index fda8adcc..ac94ce5b 100644 --- a/i18n/cs/self-hosting/index.md +++ b/i18n/cs/self-hosting/index.md @@ -68,32 +68,32 @@ Self-hosting your own instance of a web-based frontend can help you circumvent r - ![Redlib logo](../assets/img/frontends/redlib.svg){ .lg .middle .twemoji } [**Redlib (Reddit)**](../frontends.md#redlib) - --- + --- - [:octicons-info-16:](https://github.com/redlib-org/redlib#deployment){ .card-link title="Admin Documentation" } - [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" } + [:octicons-info-16:](https://github.com/redlib-org/redlib#deployment){ .card-link title="Admin Documentation" } + [:octicons-code-16:](https://github.com/redlib-org/redlib){ .card-link title="Source Code" } - ![ProxiTok logo](../assets/img/frontends/proxitok.svg){ .lg .middle .twemoji } [**ProxiTok (TikTok)**](../frontends.md#proxitok) - --- + --- - [:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki/Self-hosting){ .card-link title="Admin Documentation" } - [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } + [:octicons-info-16:](https://github.com/pablouser1/ProxiTok/wiki/Self-hosting){ .card-link title="Admin Documentation" } + [:octicons-code-16:](https://github.com/pablouser1/ProxiTok){ .card-link title="Source Code" } - ![Invidious logo](../assets/img/frontends/invidious.svg#only-light){ .twemoji }![Invidious logo](../assets/img/frontends/invidious-dark.svg#only-dark){ .twemoji } [**Invidious (YouTube)**](../frontends.md#invidious) - --- + --- - [:octicons-home-16:](https://invidious.io){ .card-link title="Homepage" } - [:octicons-info-16:](https://docs.invidious.io/installation){ .card-link title="Admin Documentation" } - [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } + [:octicons-home-16:](https://invidious.io){ .card-link title="Homepage" } + [:octicons-info-16:](https://docs.invidious.io/installation){ .card-link title="Admin Documentation" } + [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } - ![Piped logo](../assets/img/frontends/piped.svg){ .twemoji } [**Piped (YouTube)**](../frontends.md#piped) - --- + --- - [:octicons-info-16:](https://docs.piped.video/docs/self-hosting){ .card-link title="Admin Documentation" } - [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } + [:octicons-info-16:](https://docs.piped.video/docs/self-hosting){ .card-link title="Admin Documentation" } + [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" }
@@ -105,66 +105,66 @@ Tool recommendations in other categories of the website also provide a self-host - ![Addy.io logo](../assets/img/email-aliasing/addy.svg){ .twemoji } [**Addy.io**](../email-aliasing.md#addyio) - --- + --- - [:octicons-home-16:](https://addy.io){ .card-link title="Homepage" } - [:octicons-info-16:](https://addy.io/self-hosting){ .card-link title="Admin Documentation" } - [:octicons-code-16:](https://github.com/anonaddy){ .card-link title="Source Code" } + [:octicons-home-16:](https://addy.io){ .card-link title="Homepage" } + [:octicons-info-16:](https://addy.io/self-hosting){ .card-link title="Admin Documentation" } + [:octicons-code-16:](https://github.com/anonaddy){ .card-link title="Source Code" } - ![SimpleLogin logo](../assets/img/email-aliasing/simplelogin.svg){ .twemoji } [**SimpleLogin**](../email-aliasing.md#simplelogin) - --- + --- - [:octicons-home-16:](https://addy.io){ .card-link title="Homepage" } - [:octicons-info-16:](https://github.com/simple-login/app#prerequisites){ .card-link title="Admin Documentation" } - [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" } + [:octicons-home-16:](https://addy.io){ .card-link title="Homepage" } + [:octicons-info-16:](https://github.com/simple-login/app#prerequisites){ .card-link title="Admin Documentation" } + [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" } - ![CryptPad logo](../assets/img/document-collaboration/cryptpad.svg){ .twemoji } [**CryptPad**](../document-collaboration.md#cryptpad) - --- + --- - [:octicons-home-16:](https://cryptpad.fr){ .card-link title="Homepage" } - [:octicons-info-16:](https://docs.cryptpad.org/en/admin_guide/index.html){ .card-link title="Admin Documentation" } - [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } + [:octicons-home-16:](https://cryptpad.fr){ .card-link title="Homepage" } + [:octicons-info-16:](https://docs.cryptpad.org/en/admin_guide/index.html){ .card-link title="Admin Documentation" } + [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } - ![Miniflux logo](../assets/img/news-aggregators/miniflux.svg#only-light){ .twemoji }![Miniflux logo](../assets/img/news-aggregators/miniflux-dark.svg#only-dark){ .twemoji } [**Miniflux**](../news-aggregators.md#miniflux) - --- + --- - [:octicons-home-16:](https://miniflux.app){ .card-link title="Homepage" } - [:octicons-info-16:](https://miniflux.app/docs/index.html#administration-guide){ .card-link title="Admin Documentation" } - [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } + [:octicons-home-16:](https://miniflux.app){ .card-link title="Homepage" } + [:octicons-info-16:](https://miniflux.app/docs/index.html#administration-guide){ .card-link title="Admin Documentation" } + [:octicons-code-16:](https://github.com/miniflux/v2){ .card-link title="Source Code" } - ![Standard Notes logo](../assets/img/notebooks/standard-notes.svg){ .twemoji } [**Standard Notes**](../notebooks.md#standard-notes) - --- + --- - [:octicons-home-16:](https://standardnotes.com){ .card-link title="Homepage" } - [:octicons-info-16:](https://standardnotes.com/help/47/can-i-self-host-standard-notes){ .card-link title="Admin Documentation" } - [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } + [:octicons-home-16:](https://standardnotes.com){ .card-link title="Homepage" } + [:octicons-info-16:](https://standardnotes.com/help/47/can-i-self-host-standard-notes){ .card-link title="Admin Documentation" } + [:octicons-code-16:](https://github.com/standardnotes){ .card-link title="Source Code" } - ![PrivateBin logo](../assets/img/pastebins/privatebin.svg){ .twemoji } [**PrivateBin**](../pastebins.md#privatebin) - --- + --- - [:octicons-home-16:](https://privatebin.info){ .card-link title="Homepage" } - [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/blob/master/doc/Installation.md){ .card-link title="Admin Documentation" } - [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } + [:octicons-home-16:](https://privatebin.info){ .card-link title="Homepage" } + [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/blob/master/doc/Installation.md){ .card-link title="Admin Documentation" } + [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } - ![Paaster logo](../assets/img/pastebins/paaster.svg){ .twemoji } [**Paaster**](../pastebins.md#paaster) - --- + --- - [:octicons-home-16:](https://paaster.io){ .card-link title="Homepage" } - [:octicons-info-16:](https://github.com/WardPearce/paaster#deployment){ .card-link title="Admin Documentation" } - [:octicons-code-16:](https://github.com/WardPearce/paaster){ .card-link title="Source Code" } + [:octicons-home-16:](https://paaster.io){ .card-link title="Homepage" } + [:octicons-info-16:](https://github.com/WardPearce/paaster#deployment){ .card-link title="Admin Documentation" } + [:octicons-code-16:](https://github.com/WardPearce/paaster){ .card-link title="Source Code" } - ![SimpleX Chat logo](../assets/img/messengers/simplex.svg){ .twemoji } [**SimpleX Chat**](../real-time-communication.md#simplex-chat) - --- + --- - [:octicons-home-16:](https://simplex.chat){ .card-link title="Homepage" } - [:octicons-info-16:](https://simplex.chat/docs/server.html){ .card-link title="Admin Documentation" } - [:octicons-code-16:](https://github.com/simplex-chat){ .card-link title="Source Code" } + [:octicons-home-16:](https://simplex.chat){ .card-link title="Homepage" } + [:octicons-info-16:](https://simplex.chat/docs/server.html){ .card-link title="Admin Documentation" } + [:octicons-code-16:](https://github.com/simplex-chat){ .card-link title="Source Code" }
diff --git a/i18n/cs/social-networks.md b/i18n/cs/social-networks.md index 96eaefb1..e9be7104 100644 --- a/i18n/cs/social-networks.md +++ b/i18n/cs/social-networks.md @@ -77,7 +77,7 @@ There are a number of privacy controls under the **privacy and reach** tab here. - [ ] **Automatically accept new followers**: You should consider unchecking this box to have a private profile. This will allow you to review who can follow your account before accepting them. - In contrast to most social media platforms, if you have a private profile you still have the _option_ to publish posts which are publicly visible to non-followers and can still be boosted by non-followers. Therefore, unchecking this box is the only way to have the _choice_ to publish to either the entire world or a select group of people. + In contrast to most social media platforms, if you have a private profile you still have the _option_ to publish posts which are publicly visible to non-followers and can still be boosted by non-followers. Therefore, unchecking this box is the only way to have the _choice_ to publish to either the entire world or a select group of people. - [ ] **Show follows and followers on profile**: You should uncheck this box to hide your social graph from the public. It is fairly uncommon for the list of people you follow to have some genuine benefit to others, but that information can present a risk to you. diff --git a/includes/strings.cs.env b/includes/strings.cs.env index 45d7b980..a533daae 100644 --- a/includes/strings.cs.env +++ b/includes/strings.cs.env @@ -1,5 +1,5 @@ ANALYTICS_FEEDBACK_NEGATIVE_NAME="Tato stránka by mohla být vylepšena" -ANALYTICS_FEEDBACK_NEGATIVE_NOTE="Thanks for your feedback! If you want to let us know more, please leave a post on our forum." +ANALYTICS_FEEDBACK_NEGATIVE_NOTE="Děkujeme za váš názor. Pokud nám toho chcete říct víc, přidejte prosím příspěvek na naše fórum." ANALYTICS_FEEDBACK_POSITIVE_NAME="Tato stránka byla užitečná" ANALYTICS_FEEDBACK_POSITIVE_NOTE="Děkujeme Vám za zpětnou vazbu!" ANALYTICS_FEEDBACK_TITLE="Byla tato stránka užitečná?"