1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-23 11:14:21 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2023-04-15 04:04:19 +00:00
parent bc4a8543f1
commit c1037c7482
583 changed files with 1521 additions and 503 deletions

View File

@ -1,4 +1,5 @@
---
meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
@ -89,8 +90,6 @@ These are the Android operating systems, devices, and apps we recommend to maxim
[General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
## AOSP Derivatives
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
@ -120,6 +119,8 @@ GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandbox
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
### DivestOS
!!! recommendation
@ -224,7 +225,7 @@ We recommend a wide variety of Android apps throughout this site. The apps liste
![Auditor logo](assets/img/android/auditor.svg#only-light){ align=right }
![Auditor logo](assets/img/android/auditor-dark.svg#only-dark){ align=right }
**Auditor** is an app which leverages hardware security features to provide device integrity monitoring for [supported devices](https://attestation.app/about#device-support). Currently, it only works with GrapheneOS and the device's stock operating system.
**Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support).
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }

View File

@ -1,4 +1,5 @@
---
meta_title: "How to Create Internet Accounts Privately - Privacy Guides"
title: "Account Creation"
icon: 'material/account-plus'
description: Creating accounts online is practically an internet necessity, take these steps to make sure you stay private.

View File

@ -1,4 +1,5 @@
---
meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides"
title: Email Security
icon: material/email
description: Email is inherently insecure in many ways, and these are some of the reasons it isn't our top choice for secure communications.
@ -22,7 +23,7 @@ Email providers which allow you to use standard access protocols like IMAP and S
### How Do I Protect My Private Keys?
A smartcard (such as a [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device.
It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device.

View File

@ -1,4 +1,5 @@
---
meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides"
title: "Threat Modeling"
icon: 'material/target-account'
description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey.

View File

@ -1,4 +1,5 @@
---
meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides"
title: VPN Overview
icon: material/vpn
description: Virtual Private Networks shift risk away from your ISP to a third-party you trust. You should keep these things in mind.

View File

@ -1,4 +1,5 @@
---
meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
title: "Cloud Storage"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!

View File

@ -1,4 +1,5 @@
---
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
---

View File

@ -1,4 +1,5 @@
---
meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides"
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.

View File

@ -1,4 +1,5 @@
---
meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides"
title: "Prohlížeče pro počítače"
icon: material/laptop
description: Tyto webové prohlížeče nabízejí lepší ochranu soukromí než Google Chrome.

View File

@ -1,4 +1,5 @@
---
meta_title: "Encrypted Private Email Recommendations - Privacy Guides"
title: "Email Services"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
@ -123,7 +124,7 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro
#### :material-check:{ .pg-green } Account Security
Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [Yubikey](https://en.wikipedia.org/wiki/YubiKey) via the [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported.
#### :material-information-outline:{ .pg-blue } Data Security

View File

@ -1,4 +1,5 @@
---
meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides"
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.

View File

@ -1,5 +1,6 @@
---
template: overrides/home.en.html
meta_title: "Privacy Guides: Your Independent Privacy and Security Resource"
template: overrides/home.cs.html
hide:
- navigation
- toc
@ -35,36 +36,36 @@ schema:
---
<!-- markdownlint-disable-next-line -->
## Why should I care?
## Proč by mě to mělo zajímat?
##### “I have nothing to hide. Why should I care about my privacy?”
##### "Nic před nikým neskrývám. Proč by mě mělo soukromí zajímat?"
Much like the right to interracial marriage, woman's suffrage, freedom of speech, and many others, our right to privacy hasn't always been upheld. In several dictatorships, it still isn't. Generations before ours fought for our right to privacy. ==Privacy is a human right, inherent to all of us,== that we are entitled to (without discrimination).
Stejně jako právo na mezirasové manželství, volební právo žen, svoboda projevu a mnoho dalších, ani právo na soukromí nebylo vždy respektováno. V několika diktátorských státech tomu stále tak není. Minulé generace bojovaly za naše právo na soukromí. ==Soukromí je lidské právo, které patří každému z nás== a na které máme právo (bez diskriminace).
You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to protect. Privacy is something that makes us human.
Neplťte si soukromí s utajováním nějaké činnosti. Všichni víme, co se děje v kouplně, ale přesto si zavřete dveře. To proto, že chcete soukromí, ne kvůli utajení něčeho, co v koupelně děláte. **Každý** má co chránit. Soukromí je něco, co nás dělá lidmi.
[:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" }
[:material-target-account: Běžné internetové hrozby](basics/common-threats.md){ class="md-button md-button--primary" }
## What should I do?
## Co mám dělat?
##### First, you need to make a plan
##### Nejprve si musíte vytvořit plán
Trying to protect all your data from everyone all the time is impractical, expensive, and exhausting. But don't worry! Security is a process, and, by thinking ahead, you can put together a plan that's right for you. Security isn't just about the tools you use or the software you download. Rather, it begins by understanding the unique threats you face, and how you can mitigate them.
Snažit se neustále chránit všechna data před všemi je nepraktické, nákladné a vyčerpávající. Ale nebojte se! Security is a process, and, by thinking ahead, you can put together a plan that's right for you. Bezpečnost se netýká jen nástrojů, které používáte, nebo softwaru, který stahujete. Vše začíná tím, že pochopíte, jakým hrozbám čelíte a jak je můžete zmírnit.
==This process of identifying threats and defining countermeasures is called **threat modeling**==, and it forms the basis of every good security and privacy plan.
==Tento proces identifikace hrozeb a vytváření protiopatření se nazývá **threat modeling**== a tvoří základ každého dobrého plánu pro bezpečnost a ochranu soukromí.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md){ class="md-button md-button--primary" }
[:material-book-outline: Další informace o threat modelingu](basics/threat-modeling.md){ class="md-button md-button--primary" }
---
## We need you! Here's how to get involved:
## Potřebujeme vás! Zde je návod, jak začít:
[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" }
[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" }
[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" }
[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" }
[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" }
[:material-information-outline:](about/index.md){ title="Learn more about us" }
[:material-hand-coin-outline:](about/donate.md){ title="Support the project" }
[:simple-discourse:](https://discuss.privacyguides.net/){ title="Zapojte se na našem fóru" }
[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Sledujte nás na Mastodonu" }
[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Připějte na této stránce" }
[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Pomožte s překladem stránky" }
[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Napište nám na Matrixu" }
[:material-information-outline:](about/index.md){ title="Dozvěťte se o nás více" }
[:material-hand-coin-outline:](about/donate.md){ title="Podpořte projekt" }
It's important for a website like Privacy Guides to always stay up-to-date. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.
Pro webové stránky jako je Privacy Guides je důležité, aby byly vždy aktuální. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know.

View File

@ -1,4 +1,5 @@
---
meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides"
title: "Mobile Browsers"
icon: material/cellphone-information
description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone.

View File

@ -49,7 +49,7 @@ For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 fo
!!! warning
While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a Yubikey instead.
While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead.
!!! warning

View File

@ -1,4 +1,5 @@
---
meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
title: "Password Managers"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.

View File

@ -1,4 +1,5 @@
---
meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Real-Time Communication"
icon: material/chat-processing
description: Other instant messengers make all of your private conversations available to the company that runs them.

View File

@ -1,4 +1,5 @@
---
meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.

View File

@ -1,4 +1,5 @@
---
meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
title: "Privacy Tools"
icon: material/tools
hide:

View File

@ -1,7 +1,25 @@
---
meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
schema:
-
"@context": http://schema.org
"@type": SoftwareApplication
name: Tor Browser
image: /assets/img/browsers/tor.svg
url: https://www.torproject.org
sameAs: https://en.wikipedia.org/wiki/Tor_(network)
applicationCategory: Web Browser
operatingSystem:
- Windows
- macOS
- Linux
- Android
subjectOf:
"@type": WebPage
url: "./"
---
![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right }

View File

@ -1,4 +1,5 @@
---
meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides"
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isnt out to spy on you.