From c00f9323ecb27a78fe1534d9e7d303c7b27d16c5 Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Sat, 24 May 2025 02:07:32 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/ja/android/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/ja/android/index.md b/i18n/ja/android/index.md index a1a0267b..ad48e10b 100644 --- a/i18n/ja/android/index.md +++ b/i18n/ja/android/index.md @@ -46,7 +46,7 @@ Androidのカスタムディストリビューションを選択する場合に ### root化を避けよう -[Rooting](https://en.wikipedia.org/wiki/Rooting_\(Android\)) Android phones can decrease security significantly as it weakens the complete [Android security model](https://en.wikipedia.org/wiki/Android_\(operating_system\)#Security_and_privacy). root化によって低下したセキュリティーの脆弱性が悪用されると、プライバシーが損なわれてしまう可能性があります。 一般的な方法でroot化を行うと、ブートパーティションが直接変更されてしまうため、確認付きブートを行うことはできなくなります。 Apps that require root will also modify the system partition, meaning that Verified Boot would have to remain disabled. Having root exposed directly in the user interface also increases the attack surface of your device and may assist in [privilege escalation](https://en.wikipedia.org/wiki/Privilege_escalation) vulnerabilities and SELinux policy bypasses. +Androidスマホを[root化](https://ja.wikipedia.org/wiki/Root%E5%8C%96_\(Android_OS\))すると、本来全体としてまとまっている[Androidセキュリティモデル](https://en.wikipedia.org/wiki/Android_\(operating_system\)#Security_and_privacy)を弱めることになるため、セキュリティを大幅に低下させる可能性があります。 root化によって低下したセキュリティーの脆弱性が悪用されると、プライバシーが損なわれてしまう可能性があります。 一般的な方法でroot化を行うと、ブートパーティションが直接変更されてしまうため、確認付きブートを行うことはできなくなります。 Apps that require root will also modify the system partition, meaning that Verified Boot would have to remain disabled. Having root exposed directly in the user interface also increases the attack surface of your device and may assist in [privilege escalation](https://en.wikipedia.org/wiki/Privilege_escalation) vulnerabilities and SELinux policy bypasses. Content blockers which modify the [hosts file](https://en.wikipedia.org/wiki/Hosts_\(file\)) (like AdAway) and firewalls which require root access persistently (like AFWall+) are dangerous and should not be used. They are also not the correct way to solve their intended purposes. For content blocking, we suggest encrypted [DNS](../dns.md) or content blocking functionality provided by a VPN instead. TrackerControl and AdAway in non-root mode will take up the VPN slot (by using a local loopback VPN), preventing you from using privacy-enhancing services such as [Orbot](../alternative-networks.md#orbot) or a [real VPN provider](../vpn.md).