mirror of
https://github.com/privacyguides/i18n.git
synced 2025-09-17 18:42:10 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@@ -68,6 +68,41 @@ Signal 需要手機號碼才能註冊,但是您應該建立用戶名,以隱
|
||||
|
||||
[Signal 配置和硬化 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening)
|
||||
|
||||
#### Molly (Android)
|
||||
|
||||
If you use Android and your threat model requires protecting against [:material-target-account: Targeted Attacks](basics/common-threats.md#attacks-against-specific-individuals ""){.pg-red} you may consider using this alternative app, which features a number of security and usability improvements, to access the Signal network.
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
|
||||
{ align=right }
|
||||
|
||||
**Molly** is an alternative Signal client for Android which allows you to encrypt the local database with a passphrase at rest, to have unused RAM data securely shredded, to route your connection via Tor, and [more](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening#privacy-and-security-features). It also has usability improvements including scheduled backups, automatic locking, and the ability to use your Android phone as a linked device instead of the primary device for a Signal account.
|
||||
|
||||
[:octicons-home-16: Homepage](https://molly.im){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" }
|
||||
[:octicons-info-16:](https://github.com/mollyim/mollyim-android/wiki){ .card-link title="Documentation"}
|
||||
[:octicons-code-16:](https://github.com/mollyim/mollyim-android){ .card-link title="Source Code" }
|
||||
[:octicons-heart-16:](https://opencollective.com/mollyim){ .card-link title="Contribute" }
|
||||
|
||||
<details class="downloads" markdown>
|
||||
<summary>Downloads</summary>
|
||||
|
||||
- [:simple-fdroid: F-Droid](https://molly.im/fdroid)
|
||||
- [:octicons-moon-16: Accrescent](https://accrescent.app/app/im.molly.app)
|
||||
- [:simple-github: GitHub](https://github.com/mollyim/mollyim-android/releases)
|
||||
|
||||
</details>
|
||||
|
||||
</div>
|
||||
|
||||
Molly is updated every two weeks to include the latest features and bug fixes from Signal. The exception is security issues, which are patched as soon as possible. That said, you should be aware that there might be a slight delay compared to upstream, which may affect actions such as [migrating from Signal to Molly](https://github.com/mollyim/mollyim-android/wiki/Migrating-From-Signal#migrating-from-signal).
|
||||
|
||||
Note that you are trusting multiple parties by using Molly, as you now need to trust the Signal team *and* the Molly team to deliver safe and timely updates.
|
||||
|
||||
There is a version of Molly called **Molly-FOSS** which removes proprietary code like the Google services used by both Signal and Molly, at the expense of some features like push notifications. There is also a version called [**Molly-UP**](https://github.com/mollyim/mollyim-android#unifiedpush) which is based on Molly-FOSS and adds back support for push notifications with UnifiedPush, but it requires self-hosting a program on a separate computer to function. All three versions of Molly provide the same security improvements.
|
||||
|
||||
Molly and Molly-FOSS support [reproducible builds](https://github.com/mollyim/mollyim-android/tree/main/reproducible-builds), meaning it's possible to confirm that the compiled APKs match the source code.
|
||||
|
||||
### SimpleX Chat
|
||||
|
||||
<div class="admonition recommendation" markdown>
|
||||
@@ -235,12 +270,12 @@ Session [白皮書](https://arxiv.org/pdf/2002.04609.pdf) ,描述了應用程
|
||||
|
||||
最佳案例標準代表了我們希望從這個類別的完美項目應具備的功能。 推薦產品可能沒有此功能,但若有這些功能則會讓排名更為提高。
|
||||
|
||||
- 支持前向保密[^1]
|
||||
- Supports forward secrecy[^1]
|
||||
- 支持未來保密(入侵後安全)[^2]
|
||||
- 開源伺候器。
|
||||
- 去中心化,即[聯邦式或 P2P](advanced/communication-network-types.md)。
|
||||
- 所有訊息預設為使用 E2EE。
|
||||
- 支援多平台 Linux、macOS、Windows、Android 和 iOS。
|
||||
|
||||
[^1]: [前向保密](https://en.wikipedia.org/wiki/Forward_secrecy)金鑰輪換非常頻繁,因此,如果當前加密金鑰被洩露,也不會暴露**過去**訊息
|
||||
[^1]: [Forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy) is where keys are rotated very frequently, so that if the current encryption key is compromised, it does not expose **past** messages as well.
|
||||
[^2]: 未來保密(或洩漏後安全)是防止攻擊者利用洩露的私鑰解密**未來**訊息,除非攻擊者將來也能取得更多會話金鑰。 這有效地迫使攻擊者攔截各方間的所有通訊,因為一旦發生未被攔截的密鑰交換,他們就會失去訪問權限。 [ ↩](#fnref:2){.footnote-backref}
|
||||
|
Reference in New Issue
Block a user