1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-09-19 03:22:10 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2025-09-17 18:39:28 +00:00
parent 248c9cbe9b
commit b13b368aec
16 changed files with 38 additions and 38 deletions

View File

@@ -49,7 +49,7 @@ Shelter supports blocking contact search cross profiles and sharing files across
</div>
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile.

View File

@@ -53,7 +53,7 @@ Biometrics can prevent someone from watching you type in your password, so if sh
Most implementations of face authentication require you to be looking at your phone and also only work from a relatively close distance, so you don't need to worry too much about someone pointing your phone at your face to unlock it without your consent. You can still disable biometrics when your phone is locked if you want. On iOS, you can hold the side button and a volume button for 3 seconds to disable Face ID on models that support it. On Android, hold the power button and press Lockdown on the menu.
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
Some devices do not have the proper hardware for secure face authentication. There are two main types of face authentication: 2D and 3D. 3D face authentication makes use of a dot projector that lets the device create a 3D depth map of your face. Make sure that your device has this capability.
@@ -82,7 +82,7 @@ Hardware keys are devices that use strong cryptography to authenticate you to a
If you don't want to trust your OS's permission controls to prevent the camera from activating in the first place, you can buy camera blockers that physically prevent light from reaching the camera. You could also buy a device that doesn't have a built-in camera and use an external camera that you can unplug whenever you're done using it. Some devices come with built-in camera blockers or hardware switches that physically disconnect the camera from power.
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
You should only buy covers that fit your laptop and won't cause damage when you close the lid. Covering the camera will interfere with automatic brightness and face authentication features.

View File

@@ -135,7 +135,7 @@ The command will prevent an adversary from bypassing MFA when the computer boots
### Linux
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
If the hostname of your system changes (such as due to DHCP), you would be unable to login. It is vital that you set up a proper hostname for your computer before following this guide.

View File

@@ -13,7 +13,7 @@ cover: data-redaction.webp
When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata.
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
You should **never** use blur to redact [text in images](https://bishopfox.com/blog/unredacter-tool-never-pixelation). If you want to redact text in an image, you should draw a box over the text.

View File

@@ -175,7 +175,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh
</div>
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
Tails [doesn't erase](https://gitlab.tails.boum.org/tails/tails/-/issues/5356) the [video memory](https://en.wikipedia.org/wiki/Dual-ported_video_RAM) when shutting down. When you restart your computer after using Tails, it might briefly display the last screen that was displayed in Tails. If you shut down your computer instead of restarting it, the video memory will erase itself automatically after being unpowered for some time.

View File

@@ -88,7 +88,7 @@ These tools can trigger false-positives. If any of these tools finds indicators
</div>
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
Using MVT is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool.
@@ -142,7 +142,7 @@ iMazing automates and interactively guides you through the process of using [MVT
These are apps you can install which check your device and operating system for signs of tampering, and validate the identity of your device.
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool.

View File

@@ -152,7 +152,7 @@ While RethinkDNS takes up the Android VPN slot, you can still use a VPN or Orbot
</div>
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
The anonymized DNS feature does [not](advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) anonymize other network traffic.

View File

@@ -53,7 +53,7 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo
</div>
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
When replying to someone on a mailing list in Thunderbird Mobile, the "reply" option may also include the mailing list. For more information see [thunderbird/thunderbird-android #3738](https://github.com/thunderbird/thunderbird-android/issues/3738).

View File

@@ -20,21 +20,21 @@ global:
## Рекомендовані сервіси
Для всього іншого ми рекомендуємо різноманітні поштові сервіси, що базуються на стійких бізнес-моделях і мають вбудовані функції безпеки та конфіденційності. Read our [full list of criteria](#criteria) for more information.
Для всього іншого ми рекомендуємо різноманітні поштові сервіси, що базуються на стійких бізнес-моделях і мають вбудовані функції безпеки та конфіденційності. Ознайомтеся з нашим [повним списком критеріїв](#criteria) для отримання додаткової інформації.
| Provider | OpenPGP / WKD | IMAP / SMTP | Zero-Access Encryption | Anonymous Payment Methods |
| ----------------------------- | -------------------------------------- | ---------------------------------------------------------- | ---------------------------------------------------- | ------------------------------------- |
| [Proton Mail](#proton-mail) | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Paid plans only | :material-check:{ .pg-green } | Cash |
| [Mailbox Mail](#mailbox-mail) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Mail only | Cash |
| [Tuta](#tuta) | :material-alert-outline:{ .pg-orange } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | Monero <br>Cash via third party |
| Сервіс | OpenPGP / WKD | IMAP / SMTP | Шифрування з нульовим доступом | Анонімні способи оплати |
| ----------------------------- | -------------------------------------- | --------------------------------------------------------------------------- | ------------------------------------------------------- | ------------------------------------------ |
| [Proton Mail](#proton-mail) | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Тільки в платних тарифних планах | :material-check:{ .pg-green } | Готівка |
| [Mailbox Mail](#mailbox-mail) | :material-check:{ .pg-green } | :material-check:{ .pg-green } | :material-information-outline:{ .pg-blue } Тільки пошта | Готівка |
| [Tuta](#tuta) | :material-alert-outline:{ .pg-orange } | :material-alert-outline:{ .pg-orange } | :material-check:{ .pg-green } | Monero <br>Готівка через третіх осіб |
In addition to (or instead of) an email provider recommended here, you may wish to consider a dedicated [email aliasing service](email-aliasing.md#recommended-providers) to protect your privacy. Among other things, these services can help protect your real inbox from spam, prevent marketers from correlating your accounts, and encrypt all incoming messages with PGP.
На додаток до (або замість) рекомендованого тут сервісу електронної пошти, ви можете розглянути можливість використання спеціального [сервісу псевдонімів](email-aliasing.md#recommended-providers) для захисту вашої приватності. Серед іншого, ці сервіси можуть допомогти захистити вашу реальну поштову скриньку від спаму, не дати маркетологам зв'язати ваші акаунти, а також зашифрувати всі вхідні повідомлення за допомогою PGP.
- [More Information :material-arrow-right-drop-circle:](email-aliasing.md)
- [Більше інформації :material-arrow-right-drop-circle:](email-aliasing.md)
## Сервіси, сумісні з OpenPGP
These providers natively support OpenPGP encryption/decryption and the [Web Key Directory (WKD) standard](basics/email-security.md#what-is-the-web-key-directory-standard), allowing for provider-agnostic end-to-end encrypted emails. For example, a Proton Mail user could send an E2EE message to a Mailbox Mail user, or you could receive OpenPGP-encrypted notifications from internet services which support it.
Ці сервіси одразу підтримують шифрування/дешифрування OpenPGP і [стандарт Web Key Directory (WKD)](basics/email-security.md#what-is-the-web-key-directory-standard), що дозволяє наскрізне шифрування електронних листів незалежно від сервісу. Наприклад, користувач Proton Mail може надіслати повідомлення E2EE користувачеві Mailbox Mail, або ви можете отримувати сповіщення, зашифровані за допомогою OpenPGP, від інтернет-сервісів, які його підтримують.
<div class="grid cards" markdown>
@@ -44,13 +44,13 @@ These providers natively support OpenPGP encryption/decryption and the [Web Key
</div>
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
When using E2EE technology like OpenPGP your email will still have some metadata that is not encrypted in the header of the email, generally including the subject line! Read more about [email metadata](basics/email-security.md#email-metadata-overview).
При використанні наскрізного шифрування (E2EE), такого як OpenPGP, ваш лист все одно буде містити деякі метадані, які не зашифровані в заголовку листа, в тому числі і рядок теми! Дізнайтеся більше про [метадані електронної пошти] (basics/email-security.md#email-metadata-overview).
OpenPGP also does not support forward secrecy, which means if the private key of either you or the message recipient is ever stolen, all previous messages encrypted with it will be exposed.
OpenPGP також не підтримує пряму секретність, що означає, що якщо приватний ключ вас або одержувача повідомлення буде викрадено, всі попередні повідомлення, зашифровані за допомогою цього ключа, будуть відкриті.
- [How do I protect my private keys?](basics/email-security.md#how-do-i-protect-my-private-keys)
- [Як захистити свої приватні ключі?] (basics/email-security.md#how-do-i-protect-my-private-keys)
</div>

View File

@@ -100,7 +100,7 @@ There are a number of public instances, with some that offer a [Tor](tor.md) oni
</div>
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
Invidious does not proxy video streams by default. Videos watched through Invidious will still make direct connections to Google's servers (e.g. `googlevideo.com`); however, some instances support video proxying—simply enable *Proxy videos* within the instances' settings or add `&local=true` to the URL.
@@ -169,7 +169,7 @@ When using FreeTube, your subscription list, playlists, watch history and search
</div>
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -204,7 +204,7 @@ When using Yattee, your subscription list is saved locally on your device.
</div>
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -239,7 +239,7 @@ Your subscription list and playlists are saved locally on your Android device.
</div>
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
When using LibreTube, your IP address will be visible to YouTube, [Piped](https://github.com/TeamPiped/Piped/wiki/Instances), or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -275,7 +275,7 @@ Your subscription list and playlists are saved locally on your Android device.
1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings****Content****PeerTube instances**.
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.

View File

@@ -104,7 +104,7 @@ Lorem ipsum dolor sit amet, consectetur adipiscing elit.
#### `warning`
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
Lorem ipsum dolor sit amet, consectetur adipiscing elit.

View File

@@ -36,7 +36,7 @@ The mobile devices listed here provide a long lifespan of guaranteed security up
[Recommended Android Distributions :material-arrow-right-drop-circle:](android/distributions.md){ .md-button .md-button--primary } [Details about Android Security :material-arrow-right-drop-circle:](os/android-overview.md#security-protections){ .md-button }
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
End-of-life devices (such as GrapheneOS's "extended support" devices) do not have full security patches (firmware updates) due to the OEM discontinuing support. These devices cannot be considered completely secure regardless of installed software.

View File

@@ -75,7 +75,7 @@ An app may request a permission for a specific feature it has. For example, any
[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

View File

@@ -157,7 +157,7 @@ After enabling Stolen Device Protection, [certain actions](https://support.apple
iPhones are already resistant to brute-force attacks by making you wait long periods of time after multiple failed attempts; however, there have historically been exploits to get around this. To be extra safe, you can set your phone to wipe itself after 10 failed passcode attempts.
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
With this setting enabled, someone could intentionally wipe your phone by entering the wrong password many times. Make sure you have proper backups and only enable this setting if you feel comfortable with it.

View File

@@ -151,7 +151,7 @@ macOS employs defense in depth by relying on multiple layers of software and har
### Software Security
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
macOS allows you to install beta updates. These are unstable and may come with extra telemetry since they're for testing purposes. Because of this, we recommend you avoid beta software in general.
@@ -176,7 +176,7 @@ System Integrity Protection makes critical file locations read-only to protect a
On macOS, whether an app is sandboxed is determined by the developer when they sign it. The App Sandbox protects against vulnerabilities in the apps you run by limiting what a malicious actor can access in the event that the app is exploited. The App Sandbox *alone* can't protect against [:material-package-variant-closed-remove: Supply Chain Attacks](../basics/common-threats.md#attacks-against-certain-organizations ""){.pg-viridian} by malicious developers. For that, sandboxing needs to be enforced by someone other than the developer themselves, as it is on the App Store.
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
Software downloaded from outside the official App Store is not required to be sandboxed. If your threat model prioritizes defending against [:material-bug-outline: Passive Attacks](../basics/common-threats.md#security-and-privacy){ .pg-orange }, then you may want to check if the software you download outside the App Store is sandboxed, which is up to the developer to *opt in*.
@@ -187,7 +187,7 @@ You can check if an app uses the App Sandbox in a few ways:
You can check if apps that are already running are sandboxed using the [Activity Monitor](https://developer.apple.com/documentation/security/protecting-user-data-with-app-sandbox#Verify-that-your-app-uses-App-Sandbox).
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
Just because one of an app's processes is sandboxed doesn't mean they all are.

View File

@@ -41,7 +41,7 @@ This key provides only basic FIDO2 functionality, but for most people that is al
If you need any of those features, you should consider their higher-end [YubiKey](#yubikey) series instead.
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
The firmware of Yubico's Security Keys is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key.
@@ -72,7 +72,7 @@ YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/suppor
For models which [support HOTP and TOTP](https://support.yubico.com/hc/articles/360013790319-How-many-accounts-can-I-register-my-YubiKey-with), the secrets are stored encrypted on the key and never exposed to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker.
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
The firmware of YubiKey is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key.
@@ -101,7 +101,7 @@ The [comparison table](https://nitrokey.com/products/nitrokeys#:~:text=The%20Nit
Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download).
<div class="admonition warning" markdown>
<p class="admonition-title">Warning</p>
<p class="admonition-title">Попередження</p>
Excluding the Nitrokey 3, Nitrokeys which support HOTP and TOTP do not have encrypted storage, making them vulnerable to physical attacks.