1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-18 16:54:21 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2023-10-12 15:33:16 +00:00
parent d73c3353e6
commit c5d1d17320
7 changed files with 29 additions and 29 deletions

View File

@ -21,7 +21,7 @@ Namun, mereka menyembunyikan IP Anda yang sebenarnya dari layanan pihak ketiga,
## Kapan sebaiknya saya tidak menggunakan VPN?
Using a VPN in cases where you're using your [known identity](common-misconceptions.md#complicated-is-better) is unlikely be useful.
Menggunakan VPN jika Anda menggunakan [identitas yang diketahui](common-misconceptions.md#complicated-is-better) kemungkinan tidak akan berguna.
Melakukan hal itu dapat memicu sistem deteksi spam dan penipuan, seperti jika Anda masuk ke situs web bank Anda.

View File

@ -494,7 +494,7 @@ Tidak boleh melakukan pemasaran yang tidak bertanggung jawab:
- Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it.
- Menjamin perlindungan anonimitas 100%. Ketika seseorang membuat klaim bahwa sesuatu itu 100%, itu berarti tidak ada kepastian untuk gagal. Kami tahu bahwa orang dapat dengan mudah menyamarkan nama mereka dengan beberapa cara, misalnya:
- Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.)
- Menggunakan kembali informasi pribadi (akun surel, nama samaran unik, dll.) yang mereka akses tanpa perangkat lunak anonimitas (Tor, VPN, dll.)
- [Sidik jari peramban](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint)
**Kasus Terbaik:**

View File

@ -88,7 +88,7 @@ Truecrypt has been [audited a number of times](https://en.wikipedia.org/wiki/Tru
## OS Full Disk Encryption
For encrypting the drive your operating system boots from, we generally recommend enabling the encryption software that comes with your operating system rather than using a third-party tool. This is because your operating system's native encryption tools often make use of OS and hardware-specific features like the [secure cryptoprocessor](https://en.wikipedia.org/wiki/Secure_cryptoprocessor) in your device to protect your computer against more advanced physical attacks. For secondary drives and external drives which you *don't* boot from, we still recommend using open-source tools like [VeraCrypt](#veracrypt-disk) over the tools below, because they offer additional flexibility and let you avoid vendor lock-in.
Untuk mengenkripsi kandar tempat sistem operasi Anda melakukan but, kami umumnya menyarankan untuk mengaktifkan perangkat lunak enkripsi yang disertakan dengan sistem operasi, alih-alih menggunakan alat pihak ketiga. Hal ini karena alat enkripsi asli sistem operasi Anda sering kali menggunakan OS dan fitur khusus perangkat keras seperti [secure cryptoprocessor](https://en.wikipedia.org/wiki/Secure_cryptoprocessor) di perangkat Anda untuk melindungi komputer Anda dari serangan fisik yang lebih canggih. Untuk kandar sekunder dan kandar eksternal yang *tidak* Anda gunakan untuk melakukan but, kami tetap menyarankan untuk menggunakan alat bantu sumber terbuka seperti [VeraCrypt](#veracrypt-disk) alih-alih alat bantu di bawah ini, karena alat bantu ini menawarkan fleksibilitas tambahan dan memungkinkan Anda menghindari penguncian dari vendor.
### BitLocker
@ -96,7 +96,7 @@ For encrypting the drive your operating system boots from, we generally recommen
![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right }
**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/).
**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. Alasan utama kami merekomendasikannya untuk mengenkripsi kandar but Anda adalah karena [penggunaan TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, sebuah perusahaan forensik, telah menulis tentang fitur ini di [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/).
[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
@ -104,7 +104,7 @@ BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-o
??? example "Enabling BitLocker on Windows Home"
To enable BitLocker on "Home" editions of Windows, you must have partitions formatted with a [GUID Partition Table](https://en.wikipedia.org/wiki/GUID_Partition_Table) and have a dedicated TPM (v1.2, 2.0+) module. You may need to [disable the non-Bitlocker "Device encryption" functionality](https://discuss.privacyguides.net/t/enabling-bitlocker-on-the-windows-11-home-edition/13303/5) (which is inferior because it sends your recovery key to Microsoft's servers) if it is enabled on your device already before following this guide.
To enable BitLocker on "Home" editions of Windows, you must have partitions formatted with a [GUID Partition Table](https://en.wikipedia.org/wiki/GUID_Partition_Table) and have a dedicated TPM (v1.2, 2.0+) module. Anda mungkin perlu [menonaktifkan fungsionalitas "Enkripsi perangkat" non-Bitlocker](https://discuss.privacyguides.net/t/enabling-bitlocker-on-the-windows-11-home-edition/13303/5) (yang inferior karena mengirimkan kunci pemulihan Anda ke server Microsoft) jika sudah diaktifkan di perangkat Anda sebelum mengikuti panduan ini.
1. Open a command prompt and check your drive's partition table format with the following command. You should see "**GPT**" listed under "Partition Style":

View File

@ -134,9 +134,9 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio
### MAC Address Randomization
macOS menggunakan alamat MAC secara acak saat melakukan pemindaian Wi-Fi ketika terputus dari jaringan. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps.
macOS menggunakan alamat MAC secara acak saat melakukan pemindaian Wi-Fi ketika terputus dari jaringan. Namun, apabila Anda tersambung ke jaringan Wi-Fi pilihan, alamat MAC yang digunakan tidak pernah diacak. Pengacakan alamat MAC penuh adalah topik tingkat lanjut, dan kebanyakan orang tidak perlu khawatir untuk melakukan langkah-langkah berikut ini.
Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address:
Tidak seperti iOS, macOS tidak memberi Anda opsi untuk mengacak alamat MAC Anda dalam pengaturan, jadi jika Anda ingin mengubah pengenal ini, Anda harus melakukannya dengan perintah atau skrip. Untuk mengatur alamat MAC acak, pertama-tama putuskan sambungan dari jaringan jika Anda sedang tersambung, lalu buka **Terminal** dan masukkan perintah ini untuk mengacak alamat MAC Anda:
``` zsh
openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether
@ -144,7 +144,7 @@ openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs
`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu.
This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other.
This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. Metode ini paling kompatibel dengan jaringan modern. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other.
When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot.

View File

@ -18,7 +18,7 @@ Untuk detail lebih lanjut tentang setiap proyek, mengapa proyek tersebut dipilih
<div class="grid cards annotate" markdown>
- ![Tor Browser logo](assets/img/browsers/tor.svg){ .twemoji } [Tor Browser](tor.md#tor-browser)
- ![Orbot logo](assets/img/self-contained-networks/orbot.svg){ .twemoji } [Orbot (Smartphone Tor Proxy)](tor.md#orbot)
- ![Orbot logo](assets/img/self-contained-networks/orbot.svg){ .twemoji } [Orbot (Proksi Tor untuk Ponsel Pintar)](tor.md#orbot)
- ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ .twemoji } [Onion Browser (Tor for iOS)](tor.md#onion-browser)
- ![Snowflake logo](assets/img/browsers/snowflake.svg#only-light){ .twemoji }![Snowflake logo](assets/img/browsers/snowflake-dark.svg#only-dark){ .twemoji } [Snowflake](tor.md#snowflake) (1)

View File

@ -105,15 +105,15 @@ We previously recommended enabling the *Isolate Destination Address* preference
![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right }
**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/).
**Onion Browser** adalah peramban bersumber terbuka yang memungkinkan Anda menjelajah web secara anonim melalui jaringan Tor di perangkat-perangkat iOS, dan didukung oleh [Tor Project](https://support.torproject.org/glossary/onion-browser/).
[:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary }
[:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://onionbrowser.com/faqs){ .card-link title=Documentation}
[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Source Code" }
[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Contribute }
[:octicons-home-16: Beranda](https://strongboxsafe.com){ .md-button .md-button--primary }
[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Kebijakan Privasi" }
[:octicons-info-16:](https://onionbrowser.com/faqs/){ .card-link title=Dokumentasi}
[:octicons-code-16:](https://github.com/OnionBrowser/OnionBrowser){ .card-link title="Kode Sumber" }
[:octicons-heart-16:](https://onionbrowser.com/donate){ .card-link title=Kontribusi }
??? downloads
??? unduhan
- [:simple-appstore: App Store](https://apps.apple.com/app/id519296448)
@ -121,7 +121,7 @@ We previously recommended enabling the *Isolate Destination Address* preference
### Snowflake
!!! recommendation
!!! rekomendasi
![Logo Snowflake](assets/img/browsers/snowflake.svg#only-light){ align=right }
![Logo Snowflake](assets/img/browsers/snowflake-gelap.svg#only-dark){ align=right }

View File

@ -5,27 +5,27 @@ config:
copyright:
-
1: |
Privacy Guides is a non-profit, socially motivated website that provides information for protecting your data security and privacy.
Privacy Guides adalah situs web nirlaba dan bermotif sosial yang menyediakan informasi untuk melindungi keamanan dan privasi data Anda.
-
2: |
We do not make money from recommending certain products, and we do not use affiliate links.
Kami tidak menghasilkan uang dari merekomendasikan produk tertentu, dan kami tidak menggunakan tautan afiliasi.
-
3: |
Privacy Guides and contributors.
Privacy Guides dan para kontributor.
-
4: |
Content licensed under CC BY-ND 4.0.
Konten berlisensi CC BY-ND 4.0.
feedback:
question: Was this page helpful?
yes: This page was helpful
yes-note: Thanks for your feedback!
no: This page could be improved
question: Apakah laman ini bermanfaat?
yes: Laman ini bermanfaat
yes-note: Terima kasih atas tanggapan Anda!
no: Laman ini dapat diperbaiki
no-note: |
Thanks for your feedback! Help us improve this page by opening a discussion on our forum.
Bantu kami memperbaiki halaman ini dengan membuka diskusi di forum kami.
theme:
dark: Switch to dark mode
light: Switch to light mode
system: Switch to system theme
dark: Ubah ke mode gelap
light: Ubah ke mode terang
system: Ubah ke tema sistem
nav:
Home: Home
Knowledge Base: Knowledge Base