mirror of
https://github.com/privacyguides/i18n.git
synced 2025-06-19 17:24:25 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@ -8,8 +8,8 @@ cover: alternative-networks.webp
|
|||||||
<small>Protects against the following threat(s):</small>
|
<small>Protects against the following threat(s):</small>
|
||||||
|
|
||||||
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
|
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
|
||||||
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue }
|
- [:material-eye-outline: Massenüberwachung](basics/common-threats.md#mass-surveillance-programs){ .pg-blue }
|
||||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
|
- [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
|
||||||
|
|
||||||
## Anonymizing Networks
|
## Anonymizing Networks
|
||||||
|
|
||||||
|
@ -7,7 +7,7 @@ cover: browser-extensions.webp
|
|||||||
|
|
||||||
<small>Protects against the following threat(s):</small>
|
<small>Protects against the following threat(s):</small>
|
||||||
|
|
||||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
|
- [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
|
||||||
|
|
||||||
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface. They have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation.
|
In general, we recommend keeping your browser extensions to a minimum to decrease your attack surface. They have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation.
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: "Kalender-Synchronisation"
|
title: "Kalender-Synchronisation"
|
||||||
icon: material/calendar
|
icon: material/calendar
|
||||||
description: Calendars contain some of your most sensitive data; use products that implement encryption at rest.
|
description: Kalender enthalten einige deiner sensibelsten Daten; verwende Produkte, die Verschlüsselung auf dem Gerät implementieren.
|
||||||
cover: calendar.webp
|
cover: calendar.webp
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -19,7 +19,7 @@ cover: calendar.webp
|
|||||||
{ align=right }
|
{ align=right }
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Tuta** bietet einen kostenlosen und verschlüsselten Kalender auf allen unterstützten Plattformen an. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison).
|
**Tuta** bietet einen kostenlosen und verschlüsselten Kalender auf all ihren unterstützten Plattformen an. Zu den Funktionen gehören: automatische E2EE aller Daten, Freigabefunktionen, Import-/Exportfunktionen, Mehrfachauthentisierung und [mehr](https://tuta.com/calendar-app-comparison).
|
||||||
|
|
||||||
Mehrere Kalender und erweiterte Sharing-Funktionen sind auf zahlende Abonnenten beschränkt.
|
Mehrere Kalender und erweiterte Sharing-Funktionen sind auf zahlende Abonnenten beschränkt.
|
||||||
|
|
||||||
@ -50,7 +50,7 @@ Mehrere Kalender und erweiterte Sharing-Funktionen sind auf zahlende Abonnenten
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Proton Calendar** is an encrypted calendar service available to Proton members via web or mobile clients. Features include: automatic E2EE of all data, sharing features, import/export functionality, and [more](https://proton.me/support/proton-calendar-guide). Those on the free tier gain access to 3 calendars, whereas paid subscribers can create up to 25 calendars. Extended sharing functionality is also limited to paid subscribers.
|
**Proton Calendar** ist ein verschlüsselter Kalenderdienst, der Proton-Mitgliedern über Web- oder Mobilgeräten zur Verfügung steht. Zu den Funktionen gehören: automatische E2EE aller Daten, Freigabefunktionen, Import-/Exportfunktionen, und [mehr](https://proton.me/support/proton-calendar-guide). Mit der kostenlosen Version hast du Zugang zu 3 Kalendern, während du als Abonnent bis zu 25 Kalender erstellen kannst. Die erweiterten Funktionen zur gemeinsamen Nutzung sind ebenfalls auf zahlende Abonnenten beschränkt.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://proton.me/calendar){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://proton.me/calendar){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://proton.me/calendar/privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://proton.me/calendar/privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
@ -72,14 +72,14 @@ Leider hat Proton, stand August 2024, den Quellcode für ihre mobile Kalender-Ap
|
|||||||
|
|
||||||
## Kriterien
|
## Kriterien
|
||||||
|
|
||||||
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
**Bitte beachte, dass wir mit keinem der Projekte, die wir empfehlen, in Verbindung stehen.** Zusätzlich zu unseren [Standardkriterien](about/criteria.md) haben wir eine Reihe klarer Anforderungen entwickelt, die es uns ermöglichen, objektive Empfehlungen zu geben. Wir empfehlen dir, dich mit der Liste vertraut zu machen, bevor du dich für ein Projekt entscheidest, und deine eigenen Recherchen anzustellen, um sicherzustellen, dass es die richtige Wahl für dich ist.
|
||||||
|
|
||||||
### Minimum Qualifications
|
### Mindestanforderungen
|
||||||
|
|
||||||
- Must sync and store information with E2EE to ensure data is not visible to the service provider.
|
- Muss Informationen mit E2EE synchronisieren und speichern, um sicherzustellen, dass die Daten für den Dienstanbieter nicht sichtbar sind.
|
||||||
|
|
||||||
### Best-Case
|
### Im besten Fall
|
||||||
|
|
||||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
Unsere Best-Case-Kriterien stellen dar, was wir uns von einem perfekten Projekt in dieser Kategorie wünschen würden. Unsere Empfehlungen enthalten möglicherweise keine oder nicht alle dieser Funktionen, aber diejenigen, die sie enthalten, werden auf dieser Seite möglicherweise höher eingestuft als jene, die sie nicht enthalten.
|
||||||
|
|
||||||
- Should integrate with native OS calendar and contact management apps if applicable.
|
- Sollte sich gegebenenfalls mit den nativen OS-Kalender und Kontakt-Management-Apps integrieren.
|
||||||
|
@ -7,7 +7,7 @@ cover: email-aliasing.webp
|
|||||||
|
|
||||||
<small>Protects against the following threat(s):</small>
|
<small>Protects against the following threat(s):</small>
|
||||||
|
|
||||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
|
- [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
|
||||||
- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information){ .pg-green }
|
- [:material-account-search: Public Exposure](basics/common-threats.md#limiting-public-information){ .pg-green }
|
||||||
|
|
||||||
An **email aliasing service** allows you to easily generate a new email address for every website you register for. The email aliases you generate are then forwarded to an email address of your choosing, hiding both your "main" email address and the identity of your [email provider](email.md). True email aliasing is better than plus addressing commonly used and supported by many providers, which allows you to create aliases like `yourname+[anythinghere]@example.com`, because websites, advertisers, and tracking networks can trivially remove anything after the `+` sign. Organizations like the [IAB](https://en.wikipedia.org/wiki/Interactive_Advertising_Bureau) require that advertisers [normalize email addresses](https://shkspr.mobi/blog/2023/01/the-iab-loves-tracking-users-but-it-hates-users-tracking-them) so that they can be correlated and tracked, regardless of users' privacy wishes.
|
An **email aliasing service** allows you to easily generate a new email address for every website you register for. The email aliases you generate are then forwarded to an email address of your choosing, hiding both your "main" email address and the identity of your [email provider](email.md). True email aliasing is better than plus addressing commonly used and supported by many providers, which allows you to create aliases like `yourname+[anythinghere]@example.com`, because websites, advertisers, and tracking networks can trivially remove anything after the `+` sign. Organizations like the [IAB](https://en.wikipedia.org/wiki/Interactive_Advertising_Bureau) require that advertisers [normalize email addresses](https://shkspr.mobi/blog/2023/01/the-iab-loves-tracking-users-but-it-hates-users-tracking-them) so that they can be correlated and tracked, regardless of users' privacy wishes.
|
||||||
|
@ -1,29 +1,29 @@
|
|||||||
---
|
---
|
||||||
title: Language Tools
|
title: Language Tools
|
||||||
icon: material/alphabetical-variant
|
icon: material/alphabetical-variant
|
||||||
description: These language tools do not send your input text to a server and can be used offline and self-hosted.
|
description: Diese Sprachtools senden deinen Eingabetext nicht an einen Server und können offline und selbst gehostet verwendet werden.
|
||||||
cover: language-tools.webp
|
cover: language-tools.webp
|
||||||
---
|
---
|
||||||
|
|
||||||
<small>Protects against the following threat(s):</small>
|
<small>Schützt vor der/den folgenden Bedrohung(en):</small>
|
||||||
|
|
||||||
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
|
- [:material-server-network: Service Providers](basics/common-threats.md#privacy-from-service-providers){ .pg-teal }
|
||||||
- [:material-eye-outline: Mass Surveillance](basics/common-threats.md#mass-surveillance-programs){ .pg-blue }
|
- [:material-eye-outline: Massenüberwachung](basics/common-threats.md#mass-surveillance-programs){ .pg-blue }
|
||||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
|
- [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model){ .pg-brown }
|
||||||
- [:material-close-outline: Censorship](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray }
|
- [:material-close-outline: Zensur](basics/common-threats.md#avoiding-censorship){ .pg-blue-gray }
|
||||||
|
|
||||||
Text inputted to grammar, spelling, and style checkers, as well as translation services, can contain sensitive information which may be stored on their servers for an indefinite amount of time. The language tools listed on this page do not send your submitted text to a server, and can be self-hosted and used offline for maximum control of your data.
|
Texte, die in Grammatik-, Rechtschreib- und Stilprüfungsprogramme sowie in Übersetzungsdienste eingegeben werden, können vertrauliche Informationen enthalten, die auf ihren Servern auf unbestimmte Zeit gespeichert werden können. Die auf dieser Seite aufgeführten Sprachtools senden den von dir eingegebenen Text nicht an einen Server und können selbst gehostet und offline verwendet werden, um eine maximale Kontrolle über deine Daten zu gewährleisten.
|
||||||
|
|
||||||
## LanguageTool
|
## LanguageTool
|
||||||
|
|
||||||
<div class="admonition recommendation" markdown>
|
<div class="admonition recommendation" markdown>
|
||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**LanguageTool** is a multilingual grammar, style and spell checker that supports more than 20 languages. The software is [self-hostable](https://dev.languagetool.org/http-server), and the extensions do not send your input text to their server.
|
**LanguageTool** ist eine mehrsprachige Grammatik-, Stil- und Rechtschreibprüfung, die mehr als 20 Sprachen unterstützt. Die Software ist [selbst-hostbar](https://dev.languagetool.org/http-server), und die Erweiterungen senden deinen Eingabetext nicht an ihren Server.
|
||||||
|
|
||||||
LanguageTool offers integration with a variety of [office suites](https://languagetool.org/services#text_editors) and [email clients](https://languagetool.org/services#mail_clients).
|
LanguageTool bietet die Integration mit einer Vielzahl von [Office-Suits](https://languagetool.org/services#text_editors) und [E-Mail-Clients](https://languagetool.org/services#mail_clients).
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://languagetool.org){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://languagetool.org/legal/privacy){ .card-link title="Privacy Policy" }
|
||||||
@ -45,9 +45,9 @@ LanguageTool offers integration with a variety of [office suites](https://langua
|
|||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
## Criteria
|
## Kriterien
|
||||||
|
|
||||||
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. Wir empfehlen dir, dich mit der Liste vertraut zu machen, bevor du dich für ein Projekt entscheidest, und deine eigenen Recherchen anzustellen, um sicherzustellen, dass es die richtige Wahl für dich ist.
|
||||||
|
|
||||||
- Must be open source.
|
- Muss Open Source sein.
|
||||||
- Must be possible to self-host.
|
- Es muss möglich sein, es selbst zu hosten.
|
||||||
|
@ -6,12 +6,12 @@ description: Andere Instant Messenger stellen dem Unternehmen, das sie betreibt,
|
|||||||
cover: real-time-communication.webp
|
cover: real-time-communication.webp
|
||||||
---
|
---
|
||||||
|
|
||||||
<small>Protects against the following threat(s):</small>
|
<small>Schützt vor der/den folgenden Bedrohung(en):</small>
|
||||||
|
|
||||||
- [:material-bug-outline: Passive Angriffe](basics/common-threats.md#security-and-privacy ""){.pg-orange}
|
- [:material-bug-outline: Passive Angriffe](basics/common-threats.md#security-and-privacy ""){.pg-orange}
|
||||||
- [:material-server-network: Diensteanbieter](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal}
|
- [:material-server-network: Diensteanbieter](basics/common-threats.md#privacy-from-service-providers ""){.pg-teal}
|
||||||
- [:material-eye-outline: Massenüberwachung](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
- [:material-eye-outline: Massenüberwachung](basics/common-threats.md#mass-surveillance-programs ""){.pg-blue}
|
||||||
- [:material-account-cash: Surveillance Capitalism](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
- [:material-account-cash: Überwachungskapitalismus](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
|
||||||
|
|
||||||
These are our recommendations for encrypted **real-time communication**.
|
These are our recommendations for encrypted **real-time communication**.
|
||||||
|
|
||||||
@ -76,7 +76,7 @@ If you use Android and your threat model requires protecting against [:material-
|
|||||||
|
|
||||||
{ align=right }
|
{ align=right }
|
||||||
|
|
||||||
**Molly** is an alternative Signal client for Android which allows you to encrypt the local database with a passphrase at rest, to have unused RAM data securely shredded, to route your connection via Tor, and [more](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening#privacy-and-security-features). It also has usability improvements including scheduled backups, automatic locking, and the ability to use your Android phone as a linked device instead of the primary device for a Signal account.
|
**Molly** is an alternative Signal client for Android which allows you to encrypt the local database with a passphrase at rest, to have unused RAM data securely shredded, to route your connection via Tor, and [more](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening#privacy-and-security-features). Außerdem gibt es Verbesserungen bei der Benutzerfreundlichkeit, wie z. B. geplante Backups, automatisches Sperren und die Möglichkeit, dein Android-Telefon als verknüpftes Gerät anstelle des Hauptgeräts für ein Signal-Konto zu verwenden.
|
||||||
|
|
||||||
[:octicons-home-16: Homepage](https://molly.im){ .md-button .md-button--primary }
|
[:octicons-home-16: Homepage](https://molly.im){ .md-button .md-button--primary }
|
||||||
[:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" }
|
[:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" }
|
||||||
@ -95,7 +95,7 @@ If you use Android and your threat model requires protecting against [:material-
|
|||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
Molly is updated every two weeks to include the latest features and bug fixes from Signal. The exception is security issues, which are patched as soon as possible. That said, you should be aware that there might be a slight delay compared to upstream, which may affect actions such as [migrating from Signal to Molly](https://github.com/mollyim/mollyim-android/wiki/Migrating-From-Signal#migrating-from-signal).
|
Molly wird alle zwei Wochen aktualisiert, um die neuesten Funktionen und Fehlerbehebungen von Signal einzubinden. Die Ausnahme sind Sicherheitsprobleme, die so schnell wie möglich behoben werden. Allerdings sollten Sie sich darüber im Klaren sein, dass es zu einer leichten Verzögerung im Vergleich zum Upstream kommen kann, was sich auf Aktionen wie die [Migration von Signal zu Molly](https://github.com/mollyim/mollyim-android/wiki/Migrating-From-Signal#migrating-from-signal) auswirken kann.
|
||||||
|
|
||||||
Note that you are trusting multiple parties by using Molly, as you now need to trust the Signal team *and* the Molly team to deliver safe and timely updates.
|
Note that you are trusting multiple parties by using Molly, as you now need to trust the Signal team *and* the Molly team to deliver safe and timely updates.
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user