mirror of
https://github.com/privacyguides/i18n.git
synced 2025-08-25 15:49:18 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@@ -33,7 +33,7 @@ If you use a shared domain from a provider which doesn't support WKD, like @gmai
|
||||
|
||||
### כיצד אוכל להגן על המפתחות הפרטיים שלי?
|
||||
|
||||
A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](../multi-factor-authentication.md#nitrokey)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. לאחר מכן, ההודעה מפוענחת על ידי הכרטיס החכם והתוכן המפוענח נשלח חזרה למכשיר.
|
||||
A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](../security-keys.md#nitrokey)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. לאחר מכן, ההודעה מפוענחת על ידי הכרטיס החכם והתוכן המפוענח נשלח חזרה למכשיר.
|
||||
|
||||
זה יתרון שהפענוח יתרחש בכרטיס החכם כדי למנוע חשיפת המפתח הפרטי שלך למכשיר שנפגע.
|
||||
|
||||
|
@@ -72,5 +72,4 @@ cover: multi-factor-authentication.webp
|
||||
|
||||
- קוד המקור חייב להיות זמין לציבור.
|
||||
- אסור לדרוש חיבור לאינטרנט.
|
||||
- אסור לסנכרן לשירות סנכרון/גיבוי בענן של צד שלישי.
|
||||
- **אופציונלי** תמיכה בסנכרון E2EE עם כלים מקוריים של מערכת ההפעלה מקובלת, למשל. סנכרון מוצפן באמצעות iCloud.
|
||||
- Cloud syncing must be optional, and (if available) sync functionality must be E2EE.
|
||||
|
@@ -59,17 +59,17 @@ The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes
|
||||
|
||||
We [recommend](../advanced/tor-overview.md) connecting to the Tor network via a [VPN](../vpn.md) provider, and luckily Qubes makes this easy to do with a combination of ProxyVMs and Whonix.
|
||||
|
||||
After [creating a new ProxyVM](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) which connects to the VPN of your choice, you can chain your Whonix qubes to that ProxyVM **before** they connect to the Tor network, by setting the NetVM of your Whonix **Gateway** (`sys-whonix`) to the newly-created ProxyVM.
|
||||
After [creating a new ProxyVM](https://forum.qubes-os.org/t/configuring-a-proxyvm-vpn-gateway/19061) which connects to the VPN of your choice, you can chain your Whonix qubes to that ProxyVM **before** they connect to the Tor network, by setting the NetVM of your Whonix **Gateway** (`sys-whonix`) to the newly-created ProxyVM.
|
||||
|
||||
Your qubes should be configured in a manner similar to this:
|
||||
|
||||
| Qube name | Qube description | NetVM |
|
||||
| --------------- | ---------------------------------------------------------------------------------------------------------------- | --------------- |
|
||||
| sys-net | *Your default network qube (pre-installed)* | *n/a* |
|
||||
| sys-firewall | *Your default firewall qube (pre-installed)* | sys-net |
|
||||
| ==sys-proxyvm== | The VPN ProxyVM you [created](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md) | sys-firewall |
|
||||
| sys-whonix | Your Whonix Gateway VM | ==sys-proxyvm== |
|
||||
| anon-whonix | Your Whonix Workstation VM | sys-whonix |
|
||||
| Qube name | Qube description | NetVM |
|
||||
| --------------- | --------------------------------------------------------------------------------------------------- | --------------- |
|
||||
| sys-net | *Your default network qube (pre-installed)* | *n/a* |
|
||||
| sys-firewall | *Your default firewall qube (pre-installed)* | sys-net |
|
||||
| ==sys-proxyvm== | The VPN ProxyVM you [created](https://forum.qubes-os.org/t/configuring-a-proxyvm-vpn-gateway/19061) | sys-firewall |
|
||||
| sys-whonix | Your Whonix Gateway VM | ==sys-proxyvm== |
|
||||
| anon-whonix | Your Whonix Workstation VM | sys-whonix |
|
||||
|
||||
## מקורות נוספים
|
||||
|
||||
|
Reference in New Issue
Block a user