diff --git a/i18n/it/vpn.md b/i18n/it/vpn.md index 3eaba9a9..9be191e5 100644 --- a/i18n/it/vpn.md +++ b/i18n/it/vpn.md @@ -233,11 +233,11 @@ Mullvad è molto trasparente su quali nodi [possiede o affitta](https://mullvad. ## Criteri -!!! danger +!!! danger "Attenzione" È importante notare che l'utilizzo di una VPN non ti rende anonimo, ma può migliorare la tua privacy in alcune situazioni. Una VPN non è uno strumento per attività illegali. Non affidarti ad una politica "no log". -**Si prega di notare che non siamo affiliati a nessuno dei fornitori che raccomandiamo. Questo ci permette di fornire raccomandazioni completamente oggettive.** Abbiamo sviluppato un insieme di requisti chiari per ogni provider di VPN, tra cui una forte crittografia, controlli sulla sicurezza indipendenti, tecnologia moderna e altro. Ti suggeriamo di familiarizzare con questo elenco prima di scegliere un fornitore VPN e di condurre la tua ricerca per assicurarsi che il fornitore VPN che scegli sia il più affidabile possibile. +**Si prega di notare che non siamo affiliati a nessuno dei fornitori che raccomandiamo. Ciò ci consente di fornire consigli completamente oggettivi.** Oltre ai [nostri criteri standard](about/criteria.md), abbiamo sviluppato una chiara serie di requisiti per qualsiasi fornitore di VPN che desideri essere consiglito, inclusi crittografia forte, controlli di sicurezza indipendenti, tecnologia moderna e altro. Ti suggeriamo di familiarizzare con questo elenco prima di scegliere un fornitore VPN e di condurre la tua ricerca per assicurarsi che il fornitore VPN che scegli sia il più affidabile possibile. ### Tecnologia @@ -245,7 +245,7 @@ Richiediamo a tutti i nostri fornitori di VPN consigliati di fornire i file di c **Requisiti minimi:** -- Supporto a protocolli forti, come WireGuard e OpenVPN. +- Supporto per protocolli forti come WireGuard & OpenVPN. - Killswitch integrato nei client. - Supporto multihop. Il multihopping è importante per mantenere i dati privati nel caso in cui un nodo venisse compromesso. - Se vengono forniti client VPN, devono essere [open source](https://en.wikipedia.org/wiki/Open_source), come il software VPN che generalmente hanno incorporato. Crediamo che la disponibilità del [codice sorgente](https://en.wikipedia.org/wiki/Source_code) fornisca maggiore trasparenza su ciò che il dispositivo sta effettivamente facendo. @@ -280,7 +280,7 @@ Una VPN è inutile se non è nemmeno in grado di fornire una sicurezza adeguata. - Schemi di crittografia forti: OpenVPN con autenticazione SHA-256; handshake RSA-2048 o migliore; crittografia dei dati AES-256-GCM o AES-256-CBC. - Segretezza in Avanti. -- Audit sulla sicurezza pubblicati da un'azienda terza affidabile. +- Controlli di sicurezza pubblicati da uno studio di terze parti affidabile. **Caso migliore:** @@ -312,11 +312,11 @@ Con i fornitori VPN che consigliamo, vorremmo vedere del marketing responsabile. Non deve avere alcun marketing irresponsabile: -- Garantire al 100% la protezione dell'anonimato. Quando qualcuno afferma che qualcosa è al 100% significa che non esiste fallimento. Sappiamo che le persone possono deanonimizzarsi facilmente in vari modi, ad es.: +- Garantire al 100% la protezione dell'anonimato. Quando qualcuno afferma che qualcosa è al 100%, significa che non vi è certezza di fallimento. Sappiamo che le persone possono deanonimizzarsi facilmente in vari modi, ad es.: - Riutilizzo di informazioni personali, es. (profili email, pseudonimi univoci, etc.), accessibili senza software di anonimato (Tor, VPN, etc.) - [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint) - Sostenere che una VPN a circuito singolo sia "più anonima" di Tor, che è un circuito di tre o più salti, che cambiano regolarmente. -- Utilizzare linguaggio responsabile: per esempio, è accettabile dire che la VPN è "disconnessa" o "non connessa", tuttavia affermare che un utente è "esposto", "vulnerabile" o "compromesso" può creare allarmismi incorretti e inutili. Ad esempio, quella persona potrebbe semplicemente scegliere un altro servizio VPN o utlizzare Tor. +- Utilizzare linguaggio responsabile: per esempio, è accettabile dire che la VPN è "disconnessa" o "non connessa", tuttavia affermare che un utente è "esposto", "vulnerabile" o "compromesso" può creare allarmismi incorretti e inutili. Ad esempio, quella persona potrebbe semplicemente scegliere un altro servizio VPN o utilizzare Tor. **Caso migliore:** @@ -327,4 +327,4 @@ Il marketing responsabile, che è sia educativo che utile per il consumatore, po ### Funzionalità aggiuntive -Anche se non requisiti rigidi, ci sono alcuni fattori che abbiamo considerato nel determinare quali servizi consigliare. Questi includono la funzionalità di blocco degli annunci/tracciatori, Warrant Canary, connessioni a salto multiiplo, supporto clienti eccellente, il numero di connessioni simultanee consentite, etc. +Anche se non requisiti rigidi, ci sono alcuni fattori che abbiamo considerato nel determinare quali servizi consigliare. Questi includono la funzionalità di blocco degli annunci/tracciatori, Warrant Canary, connessioni a salto multiplo, supporto clienti eccellente, il numero di connessioni simultanee consentite, etc. diff --git a/i18n/ja/advanced/dns-overview.md b/i18n/ja/advanced/dns-overview.md index 9fe32e15..4ce3586f 100644 --- a/i18n/ja/advanced/dns-overview.md +++ b/i18n/ja/advanced/dns-overview.md @@ -55,12 +55,12 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s If you run the Wireshark command above, the top pane shows the "[frames](https://en.wikipedia.org/wiki/Ethernet_frame)", and the bottom pane shows all the data about the selected frame. Enterprise filtering and monitoring solutions (such as those purchased by governments) can do the process automatically, without human interaction, and can aggregate those frames to produce statistical data useful to the network observer. -| 番号 | 時間 | 参照元 | Destination | プロトコル | 長さ | 詳細 | -| -- | -------- | --------- | ----------- | ----- | --- | ---------------------------------------------------------------------- | -| 1 | 0.000000 | 192.0.2.1 | 1.1.1.1 | DNS | 104 | Standard query 0x58ba A privacyguides.org OPT | -| 2 | 0.293395 | 1.1.1.1 | 192.0.2.1 | DNS | 108 | Standard query response 0x58ba A privacyguides.org A 198.98.54.105 OPT | -| 3 | 1.682109 | 192.0.2.1 | 8.8.8.8 | DNS | 104 | Standard query 0xf1a9 A privacyguides.org OPT | -| 4 | 2.154698 | 8.8.8.8 | 192.0.2.1 | DNS | 108 | Standard query response 0xf1a9 A privacyguides.org A 198.98.54.105 OPT | +| 番号 | 時間 | 参照元 | 宛先 | プロトコル | 長さ | 詳細 | +| -- | -------- | --------- | --------- | ----- | --- | ---------------------------------------------------------------------- | +| 1 | 0.000000 | 192.0.2.1 | 1.1.1.1 | DNS | 104 | Standard query 0x58ba A privacyguides.org OPT | +| 2 | 0.293395 | 1.1.1.1 | 192.0.2.1 | DNS | 108 | Standard query response 0x58ba A privacyguides.org A 198.98.54.105 OPT | +| 3 | 1.682109 | 192.0.2.1 | 8.8.8.8 | DNS | 104 | Standard query 0xf1a9 A privacyguides.org OPT | +| 4 | 2.154698 | 8.8.8.8 | 192.0.2.1 | DNS | 108 | Standard query response 0xf1a9 A privacyguides.org A 198.98.54.105 OPT | An observer could modify any of these packets. @@ -295,11 +295,11 @@ DNSSEC implements a hierarchical digital signing policy across all layers of DNS A QNAME is a "qualified name", for example `discuss.privacyguides.net`. In the past, when resolving a domain name your DNS resolver would ask every server in the chain to provide any information it has about your full query. In this example below, your request to find the IP address for `discuss.privacyguides.net` gets asked of every DNS server provider: -| サーバー | 質問 | 回答 | -| ------------------- | ------------------------------------------- | ------------------------------------------- | -| ルートサーバー | What's the IP of discuss.privacyguides.net? | わかりません。.netのサーバーに聞いてみてください。 | -| .netのサーバー | What's the IP of discuss.privacyguides.net? | I don't know, ask Privacy Guides' server... | -| Privacy Guidesのサーバー | What's the IP of discuss.privacyguides.net? | 5.161.195.190! | +| サーバー | 質問 | 回答 | +| ------------------- | ------------------------------------------- | ------------------------------------ | +| ルートサーバー | What's the IP of discuss.privacyguides.net? | わかりません。.netのサーバーに聞いてみてください。 | +| .netのサーバー | What's the IP of discuss.privacyguides.net? | わかりません、Privacy Guidesのサーバーに聞いてください…。 | +| Privacy Guidesのサーバー | What's the IP of discuss.privacyguides.net? | 5.161.195.190! | With "QNAME minimization," your DNS resolver now only asks for just enough information to find the next server in the chain. In this example, the root server is only asked for enough information to find the appropriate nameserver for the .net TLD, and so on, without ever knowing the full domain you're trying to visit: diff --git a/i18n/ja/advanced/payments.md b/i18n/ja/advanced/payments.md index 1c77fdff..60e43b9a 100644 --- a/i18n/ja/advanced/payments.md +++ b/i18n/ja/advanced/payments.md @@ -77,7 +77,7 @@ Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. -## Additional Considerations +## その他の考慮事項 When you're making a payment in-person with cash, make sure to keep your in-person privacy in mind. Security cameras are ubiquitous. Consider wearing non-distinct clothing and a face mask (such as a surgical mask or N95). Don’t sign up for rewards programs or provide any other information about yourself. diff --git a/i18n/ja/android.md b/i18n/ja/android.md index e3626589..c19bf9b1 100644 --- a/i18n/ja/android.md +++ b/i18n/ja/android.md @@ -245,7 +245,7 @@ Main privacy features include: Metadata is not currently deleted from video files but that is planned. - The image orientation metadata is not deleted. If you enable location (in Secure Camera) that **won't** be deleted either. If you want to delete that later you will need to use an external app such as [ExifEraser](data-redaction.md#exiferaser). + 画像の向きに関するメタデータは削除されません。 If you enable location (in Secure Camera) that **won't** be deleted either. If you want to delete that later you will need to use an external app such as [ExifEraser](data-redaction.md#exiferaser). ### Secure PDF Viewer diff --git a/i18n/ja/basics/account-creation.md b/i18n/ja/basics/account-creation.md index bb85bdeb..a9da2f44 100644 --- a/i18n/ja/basics/account-creation.md +++ b/i18n/ja/basics/account-creation.md @@ -11,7 +11,7 @@ There are risks associated with every new service that you use. Data breaches; d It can also be difficult to delete the accounts on some services. Sometimes [overwriting data](account-deletion.md#overwriting-account-information) associated with an account can be possible, but in other cases the service will keep an entire history of changes to the account. -## Terms of Service & Privacy Policy +## 利用規約 & プライバシーポリシー The ToS are the rules that you agree to follow when using the service. With larger services these rules are often enforced by automated systems. Sometimes these automated systems can make mistakes. For example, you may be banned or locked out of your account on some services for using a VPN or VOIP number. Appealing such bans is often difficult, and involves an automated process too, which isn't always successful. This would be one of the reasons why we wouldn't suggest using Gmail for email as an example. Email is crucial for access to other services you might have signed up for. @@ -51,7 +51,7 @@ OAuth is an authentication protocol that allows you to register for a service wi When you sign in with OAuth, it will open a login page with the provider you choose, and your existing account and new account will be connected. Your password won't be shared, but some basic information typically will (you can review it during the login request). This process is needed every time you want to log in to the same account. -The main advantages are: +主な利点は以下の通りです。 - **Security**: you don't have to trust the security practices of the service you're logging into when it comes to storing your login credentials, because they are stored with the external OAuth provider, which when it comes to services like Apple and Google typically follow the best security practices, continuously audit their authentication systems, and don't store credentials inappropriately (such as in plain text). - **Ease of use**: multiple accounts are managed by a single login. diff --git a/i18n/ja/basics/common-misconceptions.md b/i18n/ja/basics/common-misconceptions.md index ec323bea..83387295 100644 --- a/i18n/ja/basics/common-misconceptions.md +++ b/i18n/ja/basics/common-misconceptions.md @@ -30,7 +30,7 @@ schema: Focusing solely on the privacy policies and marketing of a tool or provider can blind you to its weaknesses. When you're looking for a more private solution, you should determine what the underlying problem is and find technical solutions to that problem. For example, you may want to avoid Google Drive, which gives Google access to all of your data. The underlying problem in this case is lack of E2EE, so you should make sure that the provider you switch to actually implements E2EE, or use a tool (like Cryptomator) which provides E2EE on any cloud provider. Switching to a "privacy-focused" provider (that doesn't implement E2EE) doesn't solve your problem: it just shifts trust from Google to that provider. - "@type": Question - name: How complicated should my threat model be? + name: 脅威モデルが複雑であるべき程度 acceptedAnswer: "@type": Answer text: | diff --git a/i18n/ja/basics/email-security.md b/i18n/ja/basics/email-security.md index e2c833b4..f4b54a66 100644 --- a/i18n/ja/basics/email-security.md +++ b/i18n/ja/basics/email-security.md @@ -9,7 +9,7 @@ Email is an insecure form of communication by default. You can improve your emai As a result, email is best used for receiving transactional emails (like notifications, verification emails, password resets, etc.) from the services you sign up for online, not for communicating with others. -## Email Encryption Overview +## 電子メールの暗号化の概要 The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). @@ -37,7 +37,7 @@ A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/36 It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. -## Email Metadata Overview +## 電子メールのメタデータの概要 Email metadata is stored in the [message header](https://en.wikipedia.org/wiki/Email#Message_header) of the email message and includes some visible headers that you may have seen such as: `To`, `From`, `Cc`, `Date`, `Subject`. There are also a number of hidden headers included by many email clients and providers that can reveal information about your account. diff --git a/i18n/ja/basics/multi-factor-authentication.md b/i18n/ja/basics/multi-factor-authentication.md index 79b95a83..9157efd6 100644 --- a/i18n/ja/basics/multi-factor-authentication.md +++ b/i18n/ja/basics/multi-factor-authentication.md @@ -26,7 +26,7 @@ The security of push notification MFA is dependent on both the quality of the ap ### Time-based One-time Password (TOTP) -TOTP is one of the most common forms of MFA available. When you set up TOTP, you are generally required to scan a [QR Code](https://en.wikipedia.org/wiki/QR_code) which establishes a "[shared secret](https://en.wikipedia.org/wiki/Shared_secret)" with the service that you intend to use. The shared secret is secured inside of the authenticator app's data, and is sometimes protected by a password. +TOTPは、最も一般的なMFAの形式の一つです。 When you set up TOTP, you are generally required to scan a [QR Code](https://en.wikipedia.org/wiki/QR_code) which establishes a "[shared secret](https://en.wikipedia.org/wiki/Shared_secret)" with the service that you intend to use. The shared secret is secured inside of the authenticator app's data, and is sometimes protected by a password. The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. diff --git a/i18n/ja/basics/vpn-overview.md b/i18n/ja/basics/vpn-overview.md index cff72a39..531f6bf5 100644 --- a/i18n/ja/basics/vpn-overview.md +++ b/i18n/ja/basics/vpn-overview.md @@ -108,7 +108,7 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) +- [VPNとプライバシーレビューサイトの問題点](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) - [無料VPNアプリの調査](https://www.top10vpn.com/free-vpn-app-investigation/) - [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) - [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) diff --git a/i18n/ja/desktop.md b/i18n/ja/desktop.md index 41d5f28f..505964df 100644 --- a/i18n/ja/desktop.md +++ b/i18n/ja/desktop.md @@ -171,7 +171,7 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou ![Kicksecure logo](assets/img/linux-desktop/kicksecure.svg){ align=right } - **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). + **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. また、 [Whonix](#whonix) のもとのOSとしても機能しています。 [:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } diff --git a/i18n/ja/device-integrity.md b/i18n/ja/device-integrity.md index 03a8006c..666eb965 100644 --- a/i18n/ja/device-integrity.md +++ b/i18n/ja/device-integrity.md @@ -27,7 +27,7 @@ If any of the following tools indicate a potential compromise by spyware such as - If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency -- Local law enforcement +- 地元警察 **We are unable to help you directly beyond this.** We are happy to discuss your specific situation or circumstances and review your results in our [community](https://discuss.privacyguides.net) spaces, but it is unlikely we can assist you beyond what is written on this page. diff --git a/i18n/ja/dns.md b/i18n/ja/dns.md index f44de81a..fb140341 100644 --- a/i18n/ja/dns.md +++ b/i18n/ja/dns.md @@ -136,5 +136,5 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf [^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) [^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) -[^5]: NextDNS can provide insights and logging features on an opt-in basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) +[^5]: NextDNS can provide insights and logging features on an opt-in basis. You can choose retention times and log storage locations for any logs you choose to keep. 特に要求されていない場合は、データは記録されません。 [https://nextdns.io/privacy](https://nextdns.io/privacy) [^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) diff --git a/i18n/ja/email.md b/i18n/ja/email.md index ce66899e..239cf9ab 100644 --- a/i18n/ja/email.md +++ b/i18n/ja/email.md @@ -260,7 +260,7 @@ Tuta [does not use OpenPGP](https://tuta.com/support/#pgp). Tuta accounts can on #### :material-information-outline:{ .pg-blue } アカウントの停止 -Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts) after six months. You can reuse a deactivated free account if you pay. +Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts) after six months. 料金を払えば、停止された無料アカウントを再利用できます。 #### :material-information-outline:{ .pg-blue } 追加機能 diff --git a/i18n/ja/meta/translations.md b/i18n/ja/meta/translations.md index b9ab5456..d8ddc39f 100644 --- a/i18n/ja/meta/translations.md +++ b/i18n/ja/meta/translations.md @@ -14,13 +14,13 @@ Throughout the site we use MkDocs's [admonitions](https://squidfunk.github.io/mk When admonitions are used they will have an English string on the site by default. This can be [customized](https://squidfunk.github.io/mkdocs-material/reference/admonitions/#changing-the-title), without too much effort. For example, if you were translating an admonition of type [`warning`](https://squidfunk.github.io/mkdocs-material/reference/admonitions/#type:warning) to Dutch, this is how you would write it: -=== "Dutch translation" +=== "オランダ語翻訳" ```text !!! warning "Waarschuwing" ``` -=== "English source text" +=== "英語の原文" ```text !!! 警告 @@ -28,13 +28,13 @@ When admonitions are used they will have an English string on the site by defaul Downloads are a [custom admonition](https://squidfunk.github.io/mkdocs-material/reference/admonitions/#custom-admonitions) which is written as follows: -=== "Dutch translation" +=== "オランダ語翻訳" ```text ??? downloads "Downloaden" ``` -=== "English source text" +=== "英語の原文" ```text ??? downloads @@ -44,13 +44,13 @@ The same goes for other types, such as `tip`, `example`, `warning`, `danger` etc Recommendations are a special type of admonition which do **not** need overriding as they have no visible text, so they are never changed: -=== "Dutch translation" +=== "オランダ語翻訳" ```text !!! recommendation ``` -=== "English source text" +=== "英語の原文" ```text !!! recommendation diff --git a/i18n/ja/meta/uploading-images.md b/i18n/ja/meta/uploading-images.md index 25dc3922..649aa990 100644 --- a/i18n/ja/meta/uploading-images.md +++ b/i18n/ja/meta/uploading-images.md @@ -60,7 +60,7 @@ In the **SVG Output** under **Pretty-printing**: - **Depth of indentation** > **1** - [ ] Turn off **Strip the "xml:space" attribute from the root SVG element** -In the **IDs** tab: +**ID**タブでは、 - [x] Turn on **Remove unused IDs** - [ ] Turn off **Shorten IDs** diff --git a/i18n/ja/mobile-browsers.md b/i18n/ja/mobile-browsers.md index 76a29b54..5c7475a4 100644 --- a/i18n/ja/mobile-browsers.md +++ b/i18n/ja/mobile-browsers.md @@ -152,7 +152,7 @@ This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/track Privacy Report provides a snapshot of cross-site trackers currently prevented from profiling you on the website you're visiting. It can also display a weekly report to show which trackers have been blocked over time. -Privacy Report is accessible via the Page Settings menu. +プライバシーレポートには、ページ設定メニューからアクセスできます。 ##### Privacy Preserving Ad Measurement diff --git a/i18n/ja/os/ios-overview.md b/i18n/ja/os/ios-overview.md index 30972fc7..a942e2ee 100644 --- a/i18n/ja/os/ios-overview.md +++ b/i18n/ja/os/ios-overview.md @@ -67,7 +67,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if Many other privacy-related settings can be found in the **Settings** app. -#### Airplane Mode +#### 機内モード Enabling **Airplane Mode** stops your phone from contacting cell towers. You will still be able to connect to Wi-Fi and Bluetooth, so whenever you are connected to Wi-Fi you can turn this setting on. diff --git a/i18n/ja/os/macos-overview.md b/i18n/ja/os/macos-overview.md index ecfe04bc..1a4286fd 100644 --- a/i18n/ja/os/macos-overview.md +++ b/i18n/ja/os/macos-overview.md @@ -96,7 +96,7 @@ Whenever an application requests a permission, it will show up here. You can dec ##### 位置情報サービス -You can individually allow location services per-app. If you don't need apps to use your location, turning off location services entirely is the most private option. +位置情報サービスは、アプリごとに個別に許可できます。 If you don't need apps to use your location, turning off location services entirely is the most private option. - [ ] Uncheck **Location Services** @@ -184,7 +184,7 @@ macOS apps downloaded from the App Store are required to be sandboxed usng the [ ##### アンチウィルス -macOS comes with two forms of malware defense: +macOSには、2種類のマルウェア防御機能が付属しています。 1. Protection against launching malware in the first place is provided by the App Store's review process for App Store applications, or *Notarization* (part of *Gatekeeper*), a process where third-party apps are scanned for known malware by Apple before they are allowed to run. 2. Protection against other malware and remediation from existing malware on your system is provided by *XProtect*, a more traditional antivirus software built-in to macOS. diff --git a/i18n/ja/passwords.md b/i18n/ja/passwords.md index 4b72f1a3..0ba71d9a 100644 --- a/i18n/ja/passwords.md +++ b/i18n/ja/passwords.md @@ -268,7 +268,7 @@ These options allow you to manage an encrypted password database locally. - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) -KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. We advise you check each record manually. +KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-separated_values) files. This may mean data loss if you import this file into another password manager. 各記録を手動でチェックすることをお勧めします。 ### KeePassDX (Android) diff --git a/i18n/ja/productivity.md b/i18n/ja/productivity.md index 4188400a..6d423e90 100644 --- a/i18n/ja/productivity.md +++ b/i18n/ja/productivity.md @@ -143,7 +143,7 @@ In general, we define office suites as applications which could reasonably act a ![PrivateBin logo](assets/img/productivity/privatebin.svg){ align=right } - **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. There is a [list of instances](https://privatebin.info/directory/). + **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. PrivateBinはZeroBinの改良版です。 There is a [list of instances](https://privatebin.info/directory/). [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } [:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} @@ -161,7 +161,7 @@ In general, we define office suites as applications which could reasonably act a #### 最低要件 - オープンソースであること。 -- Must implement "zero-trust" end-to-end encryption. +- 「ゼロトラスト」のエンドツーエンド暗号化を実装すること。 - パスワードで保護されたファイルをサポートすること。 #### 満たされることが望ましい基準 diff --git a/i18n/ja/real-time-communication.md b/i18n/ja/real-time-communication.md index 024caf50..8fcc2671 100644 --- a/i18n/ja/real-time-communication.md +++ b/i18n/ja/real-time-communication.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Private Instant Messengers - Privacy Guides" +meta_title: "最高のプライベートインスタントメッセンジャー - Privacy Guides" title: "リアルタイムコミュニケーション" icon: material/chat-processing description: Other instant messengers make all of your private conversations available to the company that runs them. diff --git a/i18n/ja/search-engines.md b/i18n/ja/search-engines.md index ccafbe3e..93b3081b 100644 --- a/i18n/ja/search-engines.md +++ b/i18n/ja/search-engines.md @@ -29,7 +29,7 @@ Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your thr [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} -Brave Search is based in the United States. Their [privacy policy](https://search.brave.com/help/privacy-policy) states they collect aggregated usage metrics, which includes the operating system and browser in use, however no personally identifiable information is collected. IP addresses are temporarily processed, but are not retained. +Brave Searchは米国に拠点を置いています。 Their [privacy policy](https://search.brave.com/help/privacy-policy) states they collect aggregated usage metrics, which includes the operating system and browser in use, however no personally identifiable information is collected. IP addresses are temporarily processed, but are not retained. ## DuckDuckGo