diff --git a/i18n/ar/financial-services.md b/i18n/ar/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/ar/financial-services.md +++ b/i18n/ar/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin { align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/bn/financial-services.md b/i18n/bn/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/bn/financial-services.md +++ b/i18n/bn/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin { align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/cs/financial-services.md b/i18n/cs/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/cs/financial-services.md +++ b/i18n/cs/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin { align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/de/email.md b/i18n/de/email.md index 9f3786b0..0918e95b 100644 --- a/i18n/de/email.md +++ b/i18n/de/email.md @@ -102,9 +102,9 @@ Proton Mail doesn't offer a digital legacy feature. !!! recommendation - { align=right } + { align=right } - **Mailbox.org** is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with 2 GB of storage, which can be upgraded as needed. + **Mailbox.org** ist ein E-Mail-Dienst, mit dem Ziel sicher und werbefrei zu sein und der mit 100 % erneuerbaren Energien betrieben wird. Er ist 2014 gestartet. Mailbox.org hat seinen Sitz in Berlin, Deutschland. Der günstigste Tarif beginnt mit 2 GB Speicherplatz, der je nach Bedarf erweitert werden kann. [:octicons-home-16: Homepage](https://mailbox.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://mailbox.org/en/data-protection-privacy-policy){ .card-link title="Privacy Policy" } @@ -114,19 +114,19 @@ Proton Mail doesn't offer a digital legacy feature. - [:octicons-browser-16: Web](https://login.mailbox.org) -#### :material-check:{ .pg-green } Custom Domains and Aliases +#### :material-check:{ .pg-green } Eigene Domains und Aliase -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Bei Mailbox.org kannst du deine eigene Domain verwenden, und sie unterstützen [Catch-All](https://kb.mailbox.org/de/privat/e-mail-mit-eigener-domain/eine-eigene-domain-mit-catch-all-benutzen) Adressen. Mailbox.org unterstützt auch die [Subadressierung/Aliasse](https://kb.mailbox.org/de/privat/e-mail-artikel/was-sind-aliasse-und-wie-nutze-ich-sie), was hilfreich ist, wenn du keine Domain kaufen möchtest. -#### :material-check:{ .pg-green } Private Payment Methods +#### :material-check:{ .pg-green } Diskrete Zahlungsmöglichkeiten -Mailbox.org doesn't accept any cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofortüberweisung. +Mailbox.org akzeptiert keine Kryptowährungen, da deren Zahlungsanbieter BitPay seinen Betrieb in Deutschland eingestellt hat. Sie akzeptieren jedoch Bargeld per Post, Barzahlung auf ein Bankkonto, Banküberweisung, Kreditkarte, PayPal und einige Deutschland spezifische Anbieter: paydirekt und Sofortüberweisung. -#### :material-check:{ .pg-green } Account Security +#### :material-check:{ .pg-green } Kontosicherheit -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org unterstützt [Zwei-Faktor-Authentifizierung](https://kb.mailbox.org/de/privat/sicherheit-privatsphaere-artikel/die-zwei-faktor-authentifizierung-einrichten) nur für Webmail. Du kannst entweder TOTP oder einen [YubiKey](https://de.wikipedia.org/wiki/Yubikey) über die [YubiCloud](https://www.yubico.com/products/services-software/yubicloud)verwenden. Webstandards wie [WebAuthn](https://de.wikipedia.org/wiki/WebAuthn) werden noch nicht unterstützt. -#### :material-information-outline:{ .pg-blue } Data Security +#### :material-information-outline:{ .pg-blue } Datensicherheit Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. @@ -190,7 +190,7 @@ StartMail accepts Visa, MasterCard, American Express and Paypal. StartMail also StartMail supports TOTP two factor authentication [for webmail only](https://support.startmail.com/hc/en-us/articles/360006682158-Two-factor-authentication-2FA). They do not allow U2F security key authentication. -#### :material-information-outline:{ .pg-blue } Data Security +#### :material-information-outline:{ .pg-blue } Datensicherheit StartMail has [zero access encryption at rest](https://www.startmail.com/en/whitepaper/#_Toc458527835), using their "user vault" system. When you log in, the vault is opened, and the email is then moved to the vault out of the queue where it is decrypted by the corresponding private key. diff --git a/i18n/de/financial-services.md b/i18n/de/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/de/financial-services.md +++ b/i18n/de/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin { align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/de/index.md b/i18n/de/index.md index 90dc1c36..c3342424 100644 --- a/i18n/de/index.md +++ b/i18n/de/index.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Guides: Your Independent Privacy and Security Resource" +meta_title: "Privacy Guides: Deine unabhängige Quelle für Datenschutz und Sicherheit" template: overrides/home.de.html hide: - navigation @@ -40,9 +40,9 @@ schema: ##### "Ich habe nichts zu verbergen. Warum sollte ich mir Sorgen um meine Privatsphäre machen?" -Ähnlich wie das Recht auf gemischtrassige Ehen, das Frauenwahlrecht, das Recht auf freie Meinungsäußerung und viele andere wurde unser Recht auf Privatsphäre nicht immer gewährt. In einigen Diktaturen ist das immer noch der Fall. Generationen vor uns haben für unser Recht auf Privatsphäre gekämpft. ==Privatsphäre ist ein Menschenrecht, das uns allen innewohnt,== auf das wir (ohne Diskriminierung) Anspruch haben. +Ähnlich wie das Recht auf gemischtrassige Ehen, das Frauenwahlrecht, das Recht auf freie Meinungsäußerung und viele andere wurde unser Recht auf Privatsphäre nicht immer gewährt. In einigen Diktaturen ist das immer noch der Fall. Generationen vor uns haben für unser Recht auf Privatsphäre gekämpft. ==Privatsphäre ist ein Menschenrecht, das für uns alle gilt,== auf das jeder (egal welches Alter, Geschlecht, Herkunft, Religion, ...) Anspruch hat. -Privatsphäre sollte nicht mit Geheimhaltung verwechselt werden. Wir wissen, was auf der Toilette passiert, aber machen trotzdem die Tür zu. Das liegt daran, dass wir Privatsphäre wollen, keine Geheimhaltung. **Alle** haben etwas zu schützen. Privatsphäre ist etwas, das uns menschlich macht. +Privatsphäre sollte nicht mit Verheimlichen verwechselt werden. Wir wissen, was auf der Toilette passiert, aber machen trotzdem die Tür zu. Das liegt daran, dass du deine Privatsphäre willst, aber nicht unbedingt alles verheimlichen willst. **Alle** haben etwas zu schützen. Privatsphäre ist etwas, das uns zum Menschen macht. [:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } diff --git a/i18n/el/financial-services.md b/i18n/el/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/el/financial-services.md +++ b/i18n/el/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin { align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/eo/financial-services.md b/i18n/eo/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/eo/financial-services.md +++ b/i18n/eo/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin { align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/es/android.md b/i18n/es/android.md index c4973af4..cdc9e556 100644 --- a/i18n/es/android.md +++ b/i18n/es/android.md @@ -1,5 +1,5 @@ --- -meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" +meta_title: "Recomendaciones Android: GrapheneOS y DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Puedes sustituir el sistema operativo de tu teléfono Android por estas alternativas seguras y respetuosas con la privacidad. @@ -225,7 +225,7 @@ En este sitio recomendamos una amplia variedad de aplicaciones para Android. Las { align=right } { align=right } - **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support). + **Auditor** es una aplicación que aprovecha las funciones de seguridad del hardware para supervisar la integridad de los dispositivos mediante la validación activa de la identidad de un dispositivo y la integridad de su sistema operativo. Actualmente, sólo funciona con GrapheneOS o con el sistema operativo stock para [dispositivos compatibles](https://attestation.app/about#device-support). [:octicons-home-16: Página Principal](https://attestation.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Politica de Privacidad" } diff --git a/i18n/es/basics/account-creation.md b/i18n/es/basics/account-creation.md index 61d7869d..847ceb38 100644 --- a/i18n/es/basics/account-creation.md +++ b/i18n/es/basics/account-creation.md @@ -1,5 +1,5 @@ --- -meta_title: "How to Create Internet Accounts Privately - Privacy Guides" +meta_title: "Cómo Crear Cuentas de Internet Privadas - Privacy Guides" title: "Creación de cuenta" icon: 'material/account-plus' description: Crear cuentas en línea es prácticamente una necesidad en Internet, sigue estos pasos para asegurarte de mantener tu privacidad. diff --git a/i18n/es/basics/email-security.md b/i18n/es/basics/email-security.md index 8997316f..82984c49 100644 --- a/i18n/es/basics/email-security.md +++ b/i18n/es/basics/email-security.md @@ -1,5 +1,5 @@ --- -meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides" +meta_title: "Por Qué el Correo Electrónico No es la Mejor Opción para la Privacidad y la Seguridad - Privacy Guides" title: Seguridad del correo electrónico icon: material/email description: El correo electrónico es intrínsecamente inseguro en muchos aspectos, y éstas son algunas de las razones por las que no es nuestra primera opción para las comunicaciones seguras. @@ -23,7 +23,7 @@ Los proveedores de correo electrónico que permiten utilizar protocolos de acces ### ¿Cómo puedo proteger mis claves privadas? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. El mensaje es entonces descifrado por la tarjeta inteligente y el contenido descifrado es enviado de vuelta al dispositivo. +Una tarjeta inteligente (como una [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) o una [Nitrokey](https://www.nitrokey.com)) funciona recibiendo un mensaje de correo electrónico cifrado desde un dispositivo (teléfono, tableta, ordenador, etc.) que ejecuta un cliente de correo electrónico/correo web. El mensaje es entonces descifrado por la tarjeta inteligente y el contenido descifrado es enviado de vuelta al dispositivo. Es ventajoso que el descifrado ocurra en la tarjeta inteligente para evitar la posible exposición de tu clave privada a un dispositivo comprometido. diff --git a/i18n/es/basics/threat-modeling.md b/i18n/es/basics/threat-modeling.md index c7eee6ce..831fc90b 100644 --- a/i18n/es/basics/threat-modeling.md +++ b/i18n/es/basics/threat-modeling.md @@ -1,8 +1,8 @@ --- -meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides" +meta_title: "Modelado de Amenazas: El Primer Paso en el Camino hacia la Privacidad - Privacy Guides" title: "¿Qué son los modelos de amenaza?" icon: 'material/target-account' -description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. +description: Equilibrar la seguridad, privacidad y usabilidad es una de las primeras y más difíciles tareas a las que te enfrentarás en tu camino a la privacidad. --- Equilibrar la seguridad, privacidad y usabilidad es una de las primeras y más difíciles tareas a las que te enfrentarás en tu camino de privacidad. Todo es un intercambio: Entre más seguro algo es, más restrictivo o inconveniente suele ser, etc. A menudo, gente encuentra que el problema con las herramientas que ven recomendadas es que son demasiado difíciles de comenzar a usar! diff --git a/i18n/es/basics/vpn-overview.md b/i18n/es/basics/vpn-overview.md index 4ff8e27a..7f250dbd 100644 --- a/i18n/es/basics/vpn-overview.md +++ b/i18n/es/basics/vpn-overview.md @@ -1,5 +1,5 @@ --- -meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides" +meta_title: "¿Cómo Protegen Tu Privacidad las VPN? Nuestra Vista General de las VPN - Privacy Guides" title: Vista general de VPN icon: material/vpn description: Las Redes Privadas Virtuales desplazan el riesgo de tu proveedor de Internet a un tercero quien confías. Debes tener en cuenta estas cosas. diff --git a/i18n/es/cloud.md b/i18n/es/cloud.md index 1ef7bafe..fa18ff9a 100644 --- a/i18n/es/cloud.md +++ b/i18n/es/cloud.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides" +meta_title: "Los Mejores Proveedores de Almacenamiento en la Nube Privado y Seguro - Privacy Guides" title: "Almacenamiento en la Nube" icon: material/file-cloud description: Muchos proveedores de almacenamiento en la nube exigen que confíes plenamente en que no mirarán tus archivos. Estas son alternativas privadas. diff --git a/i18n/es/cryptocurrency.md b/i18n/es/cryptocurrency.md index 3cf6c325..40a803fc 100644 --- a/i18n/es/cryptocurrency.md +++ b/i18n/es/cryptocurrency.md @@ -1,5 +1,5 @@ --- -meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" +meta_title: "Blockchains Privadas de Criptomonedas - Privacy Guides" title: Criptomonedas icon: material/bank-circle --- diff --git a/i18n/es/data-redaction.md b/i18n/es/data-redaction.md index 476bf51a..2d6e13d0 100644 --- a/i18n/es/data-redaction.md +++ b/i18n/es/data-redaction.md @@ -1,5 +1,5 @@ --- -meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides" +meta_title: "Eliminar PII con Depuradores de Metadatos y Herramientas de Edición de Datos - Privacy Guides" title: "Redacción de Datos y Metadatos" icon: material/tag-remove description: Utiliza estas herramientas para eliminar metadatos como la ubicación GPS y otros datos identificativos de las fotos y archivos que compartas. diff --git a/i18n/es/desktop-browsers.md b/i18n/es/desktop-browsers.md index 7c2aefc0..a6ecbb5a 100644 --- a/i18n/es/desktop-browsers.md +++ b/i18n/es/desktop-browsers.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" +meta_title: "Navegadores Web para PC y Mac que Respetan la Privacidad - Privacy Guides" title: "Navegadores de Escritorio" icon: material/laptop description: Estos navegadores web ofrecen protecciones de privacidad más sólidas que Google Chrome. diff --git a/i18n/es/email.md b/i18n/es/email.md index 90a84442..9901ccdb 100644 --- a/i18n/es/email.md +++ b/i18n/es/email.md @@ -1,5 +1,5 @@ --- -meta_title: "Encrypted Private Email Recommendations - Privacy Guides" +meta_title: "Recomendaciones de Correo Electrónico Privado Cifrado - Privacy Guides" title: "Servicios de Correo Electrónico" icon: material/email description: Estos proveedores de correo electrónico ofrecen un lugar estupendo para almacenar tus correos de forma segura, y muchos ofrecen encriptación OpenPGP inter operable con otros proveedores. @@ -124,7 +124,7 @@ Mailbox.org no acepta criptomonedas debido a que su procesador de pagos BitPay s #### :material-check:{ .pg-green } Seguridad de Cuenta -Mailbox.org soporta [autenticación de doble factor](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo para su correo web. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Estándares web como [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) aún no son soportados. +Mailbox.org soporta [autenticación de doble factor](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo para su correo web. Puede utilizar TOTP o una [YubiKey](https://en.wikipedia.org/wiki/YubiKey) a través de [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Estándares web como [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) aún no son soportados. #### :material-information-outline:{ .pg-blue } Seguridad de Datos diff --git a/i18n/es/encryption.md b/i18n/es/encryption.md index 160713c4..aa44e482 100644 --- a/i18n/es/encryption.md +++ b/i18n/es/encryption.md @@ -1,5 +1,5 @@ --- -meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides" +meta_title: "Software de Cifrado Recomendado:: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides" title: "Software de Cifrado" icon: material/file-lock description: El cifrado de los datos es la única forma de controlar quién puede acceder a ellos. Estas herramientas le permiten cifrar sus correos electrónicos y cualquier otro archivo. diff --git a/i18n/es/financial-services.md b/i18n/es/financial-services.md index 557167ba..710327ee 100644 --- a/i18n/es/financial-services.md +++ b/i18n/es/financial-services.md @@ -76,7 +76,7 @@ Estos servicios le permiten comprar tarjetas de regalo para una gran variedad de { align=right } - **CoinCards** (disponible en EE.UU., Canadá y Reino Unido) le permite comprar tarjetas regalo para una gran variedad de comercios. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Página Principal](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Política de Privacidad" } diff --git a/i18n/es/index.md b/i18n/es/index.md index 4472b4b9..29455227 100644 --- a/i18n/es/index.md +++ b/i18n/es/index.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Guides: Your Independent Privacy and Security Resource" +meta_title: "Privacy Guides: Tu Recurso Independiente sobre Privacidad y Seguridad" template: overrides/home.es.html hide: - navigation diff --git a/i18n/es/mobile-browsers.md b/i18n/es/mobile-browsers.md index 44c10068..074c2ed0 100644 --- a/i18n/es/mobile-browsers.md +++ b/i18n/es/mobile-browsers.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides" +meta_title: "Navegadores Móviles para Android e iOS que Respetan la Privacidad - Privacy Guides" title: "Navegadores Móviles" icon: material/cellphone-information description: Estos navegadores son los que recomendamos actualmente para la navegación estándar/no anónima por Internet en su teléfono. diff --git a/i18n/es/multi-factor-authentication.md b/i18n/es/multi-factor-authentication.md index e9cc4c5d..af43b577 100644 --- a/i18n/es/multi-factor-authentication.md +++ b/i18n/es/multi-factor-authentication.md @@ -49,7 +49,7 @@ Para los modelos que admiten HOTP y TOTP, hay 3 ranuras para HOTP y 15 para TOTP !!! warning "Advertencia" - Aunque las Nitrokeys no revelan los secretos HOTP/TOTP al dispositivo al que están conectadas, el almacenamiento HOTP y TOTP **no** está cifrado y es vulnerable a ataques físicos. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead. + Aunque las Nitrokeys no revelan los secretos HOTP/TOTP al dispositivo al que están conectadas, el almacenamiento HOTP y TOTP **no** está cifrado y es vulnerable a ataques físicos. Si desea almacenar con HOTP o TOTP estos secretos, le recomendamos encarecidamente que utilice un YubiKey en su lugar. !!! warning "Advertencia" diff --git a/i18n/es/passwords.md b/i18n/es/passwords.md index ccec48d9..6371879a 100644 --- a/i18n/es/passwords.md +++ b/i18n/es/passwords.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides" +meta_title: "Los Mejores Administradores de Contraseñas para Proteger su Privacidad y Seguridad - Privacy Guides" title: "Administradores de Contraseñas" icon: material/form-textbox-password description: Los administradores de contraseñas le permiten almacenar y administrar de forma segura contraseñas y otras credenciales. diff --git a/i18n/es/real-time-communication.md b/i18n/es/real-time-communication.md index aaed91ad..173a5158 100644 --- a/i18n/es/real-time-communication.md +++ b/i18n/es/real-time-communication.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Private Instant Messengers - Privacy Guides" +meta_title: "Los Mejores Servicios de Mensajería Instantánea - Privacy Guides" title: "Comunicación en Tiempo Real" icon: material/chat-processing description: Otros servicios de mensajería instantánea ponen todas sus conversaciones privadas a disposición de la empresa que los gestiona. diff --git a/i18n/es/search-engines.md b/i18n/es/search-engines.md index 18ec604e..ffd6d586 100644 --- a/i18n/es/search-engines.md +++ b/i18n/es/search-engines.md @@ -1,5 +1,5 @@ --- -meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides" +meta_title: "Motores de Búsqueda Recomendados: Alternativas Anónimas a Google - Privacy Guides" title: "Motores de Búsqueda" icon: material/search-web description: Estos motores de búsqueda respetuosos con la privacidad no construyen un perfil publicitario basado en sus búsquedas. diff --git a/i18n/es/tools.md b/i18n/es/tools.md index 1ce9b503..dc2b57c4 100644 --- a/i18n/es/tools.md +++ b/i18n/es/tools.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides" +meta_title: "Las Mejores Herramientas de Privacidad, Servicios y Recomendaciones Sin Publicidad - Privacy Guides" title: "Herramientas de Privacidad" icon: material/tools hide: diff --git a/i18n/es/tor.md b/i18n/es/tor.md index 61159391..983ed66d 100644 --- a/i18n/es/tor.md +++ b/i18n/es/tor.md @@ -1,5 +1,5 @@ --- -meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" +meta_title: "Navegador y Red Tor: Navegación Web Anónima - Privacy Guides" title: "Red Tor" icon: simple/torproject description: Protege tu navegación por Internet de miradas intrusas utilizando la red Tor, una red segura que elude la censura. @@ -10,8 +10,8 @@ schema: name: Tor Browser image: /assets/img/browsers/tor.svg url: https://www.torproject.org - sameAs: https://en.wikipedia.org/wiki/Tor_(network) - applicationCategory: Web Browser + sameAs: https://es.wikipedia.org/wiki/Tor_(red_de_anonimato) + applicationCategory: Navegador Web operatingSystem: - Windows - macOS diff --git a/i18n/es/vpn.md b/i18n/es/vpn.md index b1dab8cf..3d3a1a37 100644 --- a/i18n/es/vpn.md +++ b/i18n/es/vpn.md @@ -1,5 +1,5 @@ --- -meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides" +meta_title: "Recomendaciones y Comparación de Servicios VPN Privados, Sin Patrocinadores Ni Anuncios - Privacy Guides" title: "Servicios de VPN" icon: material/vpn description: Estos son los mejores servicios VPN para proteger tu privacidad y seguridad en línea. Encuentra un proveedor aquí que no esté para espiarte. diff --git a/i18n/fa/financial-services.md b/i18n/fa/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/fa/financial-services.md +++ b/i18n/fa/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin { align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/fr/android.md b/i18n/fr/android.md index efa7921a..94c61cdb 100644 --- a/i18n/fr/android.md +++ b/i18n/fr/android.md @@ -1,5 +1,5 @@ --- -meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" +meta_title: "Recommandations Android : GrapheneOS et DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Vous pouvez remplacer le système d'exploitation de votre téléphone Android par ces alternatives sécurisées et respectueuses de la vie privée. @@ -222,10 +222,10 @@ Nous recommandons une grande variété d'applications Android sur ce site. Les a !!! recommendation - { align=right } - { align=right } + { align=right } + { align=right } - **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support). + **Auditor** est une application qui exploite les fonctions de sécurité matérielle pour assurer le contrôle de l'intégrité d'un appareil en validant activement son identité et l'intégrité de son système d'exploitation. Actuellement, elle ne fonctionne qu'avec GrapheneOS ou le système d'exploitation de base pour les [appareils pris en charge](https://attestation.app/about#device-support). [:octicons-home-16: Page d'accueil](https://attestation.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Politique de confidentialité" } diff --git a/i18n/fr/basics/account-creation.md b/i18n/fr/basics/account-creation.md index 1e90d8ec..5adc0924 100644 --- a/i18n/fr/basics/account-creation.md +++ b/i18n/fr/basics/account-creation.md @@ -1,5 +1,5 @@ --- -meta_title: "How to Create Internet Accounts Privately - Privacy Guides" +meta_title: "Comment créer des comptes internet de façon privée - Privacy Guides" title: "Création de compte" icon: 'material/account-plus' description: La création de comptes en ligne est pratiquement une nécessité sur internet, prenez ces mesures pour vous assurer de rester privé. diff --git a/i18n/fr/basics/email-security.md b/i18n/fr/basics/email-security.md index b6081683..6b3c4130 100644 --- a/i18n/fr/basics/email-security.md +++ b/i18n/fr/basics/email-security.md @@ -1,5 +1,5 @@ --- -meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides" +meta_title: "Pourquoi le courrier électronique n'est pas le meilleur choix en matière de protection de la vie privée et de sécurité - Privacy Guides" title: Sécurité des emails icon: material/email description: L'email est intrinsèquement peu sûr à bien des égards, et voici quelques-unes des raisons pour lesquelles il n'est pas notre premier choix en matière de communications sécurisées. @@ -23,7 +23,7 @@ Les fournisseurs d'emails qui vous permettent d'utiliser les protocoles d'accès ### Comment Puis-Je Protéger Mes Clés Privées? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Le message est ensuite déchiffré par la carte à puce et le contenu déchiffré est renvoyé à l'appareil. +Une carte à puce (telle qu'une [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) ou [Nitrokey](https://www.nitrokey.com)) fonctionne en recevant un email chiffré d'un appareil (téléphone, tablette, ordinateur, etc.) exécutant un client mail/webmail. Le message est ensuite déchiffré par la carte à puce et le contenu déchiffré est renvoyé à l'appareil. Il est avantageux que le déchiffrement se fasse sur la carte à puce afin d'éviter d'exposer votre clé privée à un dispositif compromis. diff --git a/i18n/fr/basics/threat-modeling.md b/i18n/fr/basics/threat-modeling.md index 725b4218..0e22e544 100644 --- a/i18n/fr/basics/threat-modeling.md +++ b/i18n/fr/basics/threat-modeling.md @@ -1,11 +1,11 @@ --- -meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides" +meta_title: "Modélisation des menaces : la première étape de votre parcours en matière de protection de la vie privée - Privacy Guides" title: "Modélisation des menaces" icon: 'material/target-account' -description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. +description: Trouver le bon équilibre entre la sécurité, la confidentialité et la commodité est l'une des premières et plus difficiles tâches que vous aurez à accomplir dans votre parcours pour regagner votre vie privée en ligne. --- -Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Tout est une histoire de compromis : plus quelque chose est sécurisé, plus il est limité ou peu pratique, etc. Souvent, les gens trouvent que le problème avec les outils qui leurs sont recommandés est qu'ils sont trop difficiles à utiliser ! +Trouver le bon équilibre entre la sécurité, la confidentialité et la commodité est l'une des premières et plus difficiles tâches que vous aurez à accomplir dans votre parcours pour regagner votre vie privée en ligne. Tout est une histoire de compromis : plus quelque chose est sécurisé, plus il est limité ou peu pratique, etc. Souvent, les gens trouvent que le problème avec les outils qui leurs sont recommandés est qu'ils sont trop difficiles à utiliser ! Si vous vouliez utiliser les outils les **plus** sécurisés actuellement disponibles, vous devriez sacrifier *beaucoup* de commodité. Et même dans ce cas, ==rien n'est jamais totalement sécurisé.== On parle de sécurité **élevée**, mais jamais de sécurité **totale**. C'est pourquoi les modèles de menace sont importants. @@ -41,7 +41,7 @@ Selon l'identité de vos adversaires, dans certaines circonstances, cette liste ### Quelle est la probabilité que je doive le protéger ? -==Le risque est la probabilité qu'une menace particulière contre un actif particulier se produise réellement. Il va de pair avec la capacité. Si votre opérateur de téléphonie mobile a la capacité d'accéder à toutes vos données, le risque qu'il publie vos données privées en ligne pour nuire à votre réputation est faible. +==Le risque est la probabilité qu'une menace particulière contre un actif particulier se produise réellement.== Il va de pair avec la capacité. Si votre opérateur de téléphonie mobile a la capacité d'accéder à toutes vos données, le risque qu'il publie vos données privées en ligne pour nuire à votre réputation est faible. Il est important de faire la distinction entre ce qui pourrait se produire et la probabilité que cela se produise. Par exemple, votre bâtiment risque de s'effondrer, mais le risque que cela se produise est bien plus grand à San Francisco (où les tremblements de terre sont fréquents) qu'à Stockholm (où ils ne le sont pas). diff --git a/i18n/fr/basics/vpn-overview.md b/i18n/fr/basics/vpn-overview.md index 18cf8e07..8bd682a0 100644 --- a/i18n/fr/basics/vpn-overview.md +++ b/i18n/fr/basics/vpn-overview.md @@ -1,5 +1,5 @@ --- -meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides" +meta_title: "Comment les VPNs protègent-ils votre vie privée ? Notre introduction aux VPNs - Privacy Guides" title: Introduction aux VPNs icon: material/vpn description: Les réseaux privés virtuels déplacent le risque de votre FAI à un tiers en qui vous avez confiance. Vous devriez garder ces éléments à l'esprit. diff --git a/i18n/fr/cloud.md b/i18n/fr/cloud.md index 9afbbf71..90a3cc08 100644 --- a/i18n/fr/cloud.md +++ b/i18n/fr/cloud.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides" +meta_title: "Les meilleurs services de stockage cloud privés et sécurisés - Privacy Guides" title: "Stockage cloud" icon: material/file-cloud description: De nombreux fournisseurs de stockage cloud nécessitent que vous leur fassiez confiance pour ne pas consulter vos fichiers. Voici des alternatives privées ! diff --git a/i18n/fr/cryptocurrency.md b/i18n/fr/cryptocurrency.md index 718eb7a8..f49e4b19 100644 --- a/i18n/fr/cryptocurrency.md +++ b/i18n/fr/cryptocurrency.md @@ -1,5 +1,5 @@ --- -meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" +meta_title: "Chaînes de blocs de crypto-monnaies privées - Privacy Guides" title: Crypto-monnaie icon: material/bank-circle --- diff --git a/i18n/fr/data-redaction.md b/i18n/fr/data-redaction.md index 6b27a444..8eea003b 100644 --- a/i18n/fr/data-redaction.md +++ b/i18n/fr/data-redaction.md @@ -1,5 +1,5 @@ --- -meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides" +meta_title: "Supprimer les DCP à l'aide de nettoyeurs de métadonnées et d'outils de suppression des données - Privacy Guides" title: "Rédaction de données et de métadonnées" icon: material/tag-remove description: Utilisez ces outils pour supprimer les métadonnées telles que la position GPS et d'autres informations d'identification des photos et des fichiers que vous partagez. diff --git a/i18n/fr/desktop-browsers.md b/i18n/fr/desktop-browsers.md index f122a304..22938d75 100644 --- a/i18n/fr/desktop-browsers.md +++ b/i18n/fr/desktop-browsers.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" +meta_title: "Navigateurs web respectueux de la vie privée pour PC et Mac - Privacy Guides" title: "Navigateurs de bureau" icon: material/laptop description: Ces navigateurs web offrent des protections de la vie privée plus solides que Google Chrome. @@ -79,13 +79,13 @@ Si vous avez besoin de naviguer anonymement sur Internet, vous devriez plutôt u - [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos) - [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux) -Comme le [Navigateur Tor](tor.md), le Navigateur Mullvad est conçu pour empêcher la prise d'empreintes numérique en rendant l'empreinte numérique de votre navigateur identique à celle de tous les autres utilisateurs du Navigateur Mullvad, et il inclut des paramètres par défaut et des extensions qui sont automatiquement configurés par les niveaux de sécurité par défaut : *Standard*, *Safer* et *Safest*. Il est donc impératif de ne pas modifier le navigateur mis à part l'ajustement des [niveaux de sécurité](https://tb-manual.torproject.org/security-settings/) par défaut. D'autres modifications rendraient votre empreinte numérique unique, ce qui irait à l'encontre de l'objectif poursuivi par l'utilisation de ce navigateur. Si vous souhaitez configurer votre navigateur de manière plus poussée et que la prise d'empreintes numérique ne vous préoccupe pas, nous vous recommandons plutôt [Firefox](#firefox). +Comme le [Navigateur Tor](tor.md), le Navigateur Mullvad est conçu pour empêcher la prise d'empreintes numériques en rendant l'empreinte numérique de votre navigateur identique à celle de tous les autres utilisateurs du Navigateur Mullvad, et il inclut des paramètres par défaut et des extensions qui sont automatiquement configurés par les niveaux de sécurité par défaut : *Standard*, *Safer* et *Safest*. Il est donc impératif de ne pas modifier le navigateur mis à part l'ajustement des [niveaux de sécurité](https://tb-manual.torproject.org/security-settings/) par défaut. D'autres modifications rendraient votre empreinte numérique unique, ce qui irait à l'encontre de l'objectif poursuivi par l'utilisation de ce navigateur. Si vous souhaitez configurer votre navigateur de manière plus poussée et que la prise d'empreintes numériques ne vous préoccupe pas, nous vous recommandons plutôt [Firefox](#firefox). ### Système anti-empreintes numériques -**Sans** utiliser un [VPN](vpn.md), le Navigateur Mullvad offre les mêmes protections contre [les scripts d'empreintes numérique naïfs](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) que d'autres navigateurs privés comme Firefox+[Arkenfox](#arkenfox-advanced) ou [Brave](#brave). Le Navigateur Mullvad fournit ces protections dès le départ, au détriment d'une certaine flexibilité et d'une commodité que d'autres navigateurs privés peuvent offrir. +**Sans** utiliser un [VPN](vpn.md), le Navigateur Mullvad offre les mêmes protections contre [les scripts d'empreintes numériques naïfs](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) que d'autres navigateurs privés comme Firefox+[Arkenfox](#arkenfox-advanced) ou [Brave](#brave). Le Navigateur Mullvad fournit ces protections dès le départ, au détriment d'une certaine flexibilité et d'une commodité que d'autres navigateurs privés peuvent offrir. -==Pour une protection anti-empreintes numérique optimale, nous recommandons d'utiliser le Navigateur Mullvad en conjonction **avec** un VPN==, qu'il s'agisse de Mullvad ou d'un autre fournisseur de VPN recommandé. Lorsque vous utilisez un VPN avec le Navigateur Mullvad, vous partagez une empreinte numérique et un ensemble d'adresses IP avec de nombreux autres utilisateurs, ce qui vous permet de vous fondre dans la "foule". Cette stratégie est le seul moyen de contrecarrer les scripts de pistage avancés, et c'est la même technique anti-empreintes numérique utilisée par le Navigateur Tor. +==Pour une protection anti-empreintes numériques optimale, nous recommandons d'utiliser le Navigateur Mullvad en conjonction **avec** un VPN==, qu'il s'agisse de Mullvad ou d'un autre fournisseur de VPN recommandé. Lorsque vous utilisez un VPN avec le Navigateur Mullvad, vous partagez une empreinte numérique et un ensemble d'adresses IP avec de nombreux autres utilisateurs, ce qui vous permet de vous fondre dans la "foule". Cette stratégie est le seul moyen de contrecarrer les scripts de pistage avancés, et c'est la même technique anti-empreintes numériques utilisée par le Navigateur Tor. Notez que si vous pouvez utiliser le Navigateur Mullvad avec n'importe quel fournisseur de VPN, d'autres personnes sur ce VPN doivent également utiliser le Navigateur Mullvad pour que cette "foule" existe, ce qui est plus probable sur le VPN Mullvad par rapport à d'autres fournisseurs, en particulier si peu de temps après le lancement du Navigateur Mullvad. Le Navigateur Mullvad ne dispose pas d'une connectivité VPN intégrée et ne vérifie pas non plus si vous utilisez un VPN avant de naviguer ; votre connexion VPN doit être configurée et gérée séparément. diff --git a/i18n/fr/email.md b/i18n/fr/email.md index dd88472b..afdbf89e 100644 --- a/i18n/fr/email.md +++ b/i18n/fr/email.md @@ -1,5 +1,5 @@ --- -meta_title: "Encrypted Private Email Recommendations - Privacy Guides" +meta_title: "Recommandations de fournisseurs d'email privés et chiffrés - Privacy Guides" title: "Services d'email" icon: material/email description: Ces fournisseurs d'email constituent un excellent moyen de stocker vos emails en toute sécurité, et nombre d'entre eux proposent un système de chiffrement OpenPGP interopérable avec d'autres fournisseurs. @@ -124,7 +124,7 @@ Mailbox.org n'accepte aucune crypto-monnaie en raison de la suspension des activ #### :material-check:{ .pg-green } Sécurité du compte -Mailbox.org prend en charge l'[authentification à deux facteurs](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) pour son webmail uniquement. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Les normes web telles que [WebAuthn](https://fr.wikipedia.org/wiki/WebAuthn) ne sont pas encore prises en charge. +Mailbox.org prend en charge l'[authentification à deux facteurs](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) pour son webmail uniquement. Vous pouvez utiliser soit TOTP, soit une [YubiKey](https://fr.wikipedia.org/wiki/YubiKey) via le [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Les normes web telles que [WebAuthn](https://fr.wikipedia.org/wiki/WebAuthn) ne sont pas encore prises en charge. #### :material-information-outline:{ .pg-blue } Sécurité des données diff --git a/i18n/fr/encryption.md b/i18n/fr/encryption.md index 5d4ea3b1..8385cfcf 100644 --- a/i18n/fr/encryption.md +++ b/i18n/fr/encryption.md @@ -1,5 +1,5 @@ --- -meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides" +meta_title: "Logiciels de chiffrement recommandés : VeraCrypt, Cryptomator, PicoCrypt et OpenPGP - Privacy Guides" title: "Logiciels de chiffrement" icon: material/file-lock description: Le chiffrement des données est le seul moyen de contrôler qui peut y accéder. Ces outils vous permettent de chiffrer vos emails et tout autre fichier. diff --git a/i18n/fr/financial-services.md b/i18n/fr/financial-services.md index cd0982af..bda6cde8 100644 --- a/i18n/fr/financial-services.md +++ b/i18n/fr/financial-services.md @@ -74,9 +74,9 @@ Ces services vous permettent d'acheter des cartes-cadeaux pour une variété de !!! recommendation - { align=right } + { align=right } - **CoinCards** (disponible aux États-Unis, au Canada et au Royaume-Uni) vous permet d'acheter des cartes-cadeaux auprès d'un grand nombre de commerçants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Page d'accueil](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Politique de confidentialité" } diff --git a/i18n/fr/index.md b/i18n/fr/index.md index 1b35660b..e70e59ef 100644 --- a/i18n/fr/index.md +++ b/i18n/fr/index.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Guides: Your Independent Privacy and Security Resource" +meta_title: "Privacy Guides : votre ressource indépendante en matière de protection de la vie privée et de sécuritéPrivacy Guides" template: overrides/home.fr.html hide: - navigation diff --git a/i18n/fr/mobile-browsers.md b/i18n/fr/mobile-browsers.md index d6bd59b3..44efe66c 100644 --- a/i18n/fr/mobile-browsers.md +++ b/i18n/fr/mobile-browsers.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides" +meta_title: "Navigateurs web respectueux de la vie privée pour Android et iOS - Privacy Guides" title: "Navigateurs mobiles" icon: material/cellphone-information description: Ces navigateurs sont ceux que nous recommandons actuellement pour la navigation internet standard/non anonyme sur votre téléphone. diff --git a/i18n/fr/multi-factor-authentication.md b/i18n/fr/multi-factor-authentication.md index 37dffc03..02dd72a8 100644 --- a/i18n/fr/multi-factor-authentication.md +++ b/i18n/fr/multi-factor-authentication.md @@ -49,7 +49,7 @@ Pour les modèles qui supportent HOTP et TOTP, il y a 3 emplacements pour HOTP e !!! warning "Avertissement" - Bien que les Nitrokeys ne divulguent pas les secrets HOTP/TOTP à l'appareil auquel ils sont connectés, le stockage HOTP et TOTP n'est **pas** chiffré et est vulnérable aux attaques physiques. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead. + Bien que les Nitrokeys ne divulguent pas les secrets HOTP/TOTP à l'appareil auquel ils sont connectés, le stockage HOTP et TOTP n'est **pas** chiffré et est vulnérable aux attaques physiques. Si vous cherchez à stocker ces secrets HOTP ou TOTP, nous vous recommandons vivement d'utiliser plutôt un YubiKey. !!! warning "Avertissement" diff --git a/i18n/fr/passwords.md b/i18n/fr/passwords.md index e35a9b33..e12313d5 100644 --- a/i18n/fr/passwords.md +++ b/i18n/fr/passwords.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides" +meta_title: "Les meilleurs gestionnaires de mots de passe pour protéger votre vie privée et votre sécurité - Privacy Guides" title: "Gestionnaires de mots de passe" icon: material/form-textbox-password description: Les gestionnaires de mots de passe vous permettent de stocker et de gérer en toute sécurité des mots de passe et autres informations d'identification. diff --git a/i18n/fr/real-time-communication.md b/i18n/fr/real-time-communication.md index cc87afdb..a5e3fb9a 100644 --- a/i18n/fr/real-time-communication.md +++ b/i18n/fr/real-time-communication.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Private Instant Messengers - Privacy Guides" +meta_title: "Les meilleures messageries instantanées privées - Privacy Guides" title: "Communication en temps réel" icon: material/chat-processing description: Les autres messageries instantanées mettent toutes vos conversations privées à la disposition de la société qui les gère. diff --git a/i18n/fr/search-engines.md b/i18n/fr/search-engines.md index 7275177d..ec68739a 100644 --- a/i18n/fr/search-engines.md +++ b/i18n/fr/search-engines.md @@ -1,5 +1,5 @@ --- -meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides" +meta_title: "Moteurs de recherche recommandés : alternatives anonymes à Google - Privacy Guides" title: "Moteurs de recherche" icon: material/search-web description: Ces moteurs de recherche respectueux de la vie privée n'établissent pas de profil publicitaire sur la base de vos recherches. diff --git a/i18n/fr/tools.md b/i18n/fr/tools.md index 0f24cbc8..3215fd3a 100644 --- a/i18n/fr/tools.md +++ b/i18n/fr/tools.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides" +meta_title: "Les meilleurs outils, services, et recommandations sans publicité de protection de la vie privée - Privacy Guides" title: "Outils de protection de la vie privée" icon: material/tools hide: diff --git a/i18n/fr/tor.md b/i18n/fr/tor.md index a8b84340..07b7d25a 100644 --- a/i18n/fr/tor.md +++ b/i18n/fr/tor.md @@ -1,5 +1,5 @@ --- -meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" +meta_title: "Navigateur et réseau Tor : navigation web anonyme - Privacy Guides" title: "Réseau Tor" icon: simple/torproject description: Protégez votre navigation sur internet des regards indiscrets en utilisant le réseau Tor, un réseau sécurisé qui contourne la censure. @@ -10,7 +10,7 @@ schema: name: Navigateur Tor image: /assets/img/browsers/tor.svg url: https://www.torproject.org - sameAs: https://en.wikipedia.org/wiki/Tor_(network) + sameAs: https://fr.m.wikipedia.org/wiki/Tor_(r%C3%A9seau) applicationCategory: Web Browser operatingSystem: - Windows diff --git a/i18n/fr/vpn.md b/i18n/fr/vpn.md index c6299da5..09f1d05b 100644 --- a/i18n/fr/vpn.md +++ b/i18n/fr/vpn.md @@ -1,5 +1,5 @@ --- -meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides" +meta_title: "Recommandations et comparaison de services VPN privés, sans sponsors ni publicités - Privacy Guides" title: "Services VPN" icon: material/vpn description: Voici les meilleurs services VPN pour protéger votre vie privée et votre sécurité en ligne. Trouvez ici un fournisseur qui ne cherche pas à vous espionner. diff --git a/i18n/he/financial-services.md b/i18n/he/financial-services.md index 5b35ea27..4f931c16 100644 --- a/i18n/he/financial-services.md +++ b/i18n/he/financial-services.md @@ -74,9 +74,9 @@ Privacy.com מספק מידע על הסוחרים מהם אתה רוכש לבנ !!! recommendation - { align=right } + { align=right } - **CoinCards** (זמין בארה"ב, קנדה ובריטניה) מאפשר לך לרכוש כרטיסי מתנה עבור מגוון גדול של סוחרים. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: דף הבית](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="מדיניות פרטיות" } diff --git a/i18n/hi/financial-services.md b/i18n/hi/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/hi/financial-services.md +++ b/i18n/hi/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin { align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/hu/financial-services.md b/i18n/hu/financial-services.md index 739fb474..ef318834 100644 --- a/i18n/hu/financial-services.md +++ b/i18n/hu/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin { align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/id/financial-services.md b/i18n/id/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/id/financial-services.md +++ b/i18n/id/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin { align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/it/about/index.md b/i18n/it/about/index.md index d54d4275..bacfb4cd 100644 --- a/i18n/it/about/index.md +++ b/i18n/it/about/index.md @@ -1,6 +1,6 @@ --- -title: "About Privacy Guides" -description: Privacy Guides is a socially motivated website that provides information for protecting your data security and privacy. +title: "Informazioni su Privacy Guides" +description: Privacy Guides è un sito web a motivazione sociale che fornisce informazioni per proteggere la sicurezza e la privacy dei dati. schema: "@context": https://schema.org "@type": Organization @@ -19,7 +19,7 @@ schema: { align=right } -**Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. +**Privacy Guides** è un sito web a sfondo sociale che fornisce [informazioni](/kb) per proteggere la sicurezza e la privacy dei dati. La nostra missione è informare il pubblico sul valore della privacy digitale e sulle iniziative governative globali che mirano a monitorare la vostra attività online. Siamo un collettivo senza scopo di lucro gestito interamente da [membri del team](https://discuss.privacyguides.net/g/team) e collaboratori volontari. Il nostro sito è privo di pubblicità e non è affiliato a nessuno dei fornitori elencati. [:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } @@ -43,16 +43,16 @@ In 2022, we completed the transition of our main website framework from Jekyll t We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. -So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. +So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). Intendiamo continuare a portare avanti la nostra missione di sensibilizzazione ed educazione, trovando il modo di evidenziare più chiaramente i pericoli di una mancanza di consapevolezza della privacy nell'era digitale moderna e la prevalenza e i danni delle violazioni della sicurezza nel settore tecnologico. -## Our Team +## Il nostro team ??? person "@jonah" - [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/jonah) - [:simple-github: GitHub](https://github.com/jonaharagon "@jonaharagon") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@jonah "@jonah@neat.computer"){rel=me} - - [:fontawesome-solid-house: Homepage](https://www.jonaharagon.com) + - [:fontawesome-solid-house: Pagina iniziale](https://www.jonaharagon.com) ??? person "@niek-de-wilde" @@ -65,21 +65,21 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/dngray) - [:simple-github: GitHub](https://github.com/dngray "@dngray") - [:simple-mastodon: Mastodon](https://mastodon.social/@dngray "@dngray@mastodon.social"){rel=me} - - [:fontawesome-solid-envelope: Email](mailto:dngray@privacyguides.org) + - [:fontawesome-solid-envelope: E-Mail](mailto:dngray@privacyguides.org) ??? person "@freddy" - [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/freddy) - [:simple-github: GitHub](https://github.com/freddy-m "@freddy-m") - [:simple-mastodon: Mastodon](https://social.lol/@freddy "@freddy@social.lol"){rel=me} - - [:fontawesome-solid-envelope: Email](mailto:freddy@privacyguides.org) - - [:fontawesome-solid-house: Homepage](https://freddy.omg.lol) + - [:fontawesome-solid-envelope: E-Mail](mailto:freddy@privacyguides.org) + - [:fontawesome-solid-house: Pagina iniziale](https://freddy.omg.lol) ??? person "@mfwmyfacewhen" - [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/mfwmyfacewhen) - [:simple-github: GitHub](https://github.com/mfwmyfacewhen "@mfwmyfacewhen") - - [:fontawesome-solid-house: Homepage](https://mfw.omg.lol) + - [:fontawesome-solid-house: Pagina iniziale](https://mfw.omg.lol) ??? person "@olivia" @@ -89,14 +89,14 @@ So far in 2023 we've launched international translations of our website in [Fren Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). -Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. +I membri del nostro team controllano tutte le modifiche apportate al sito e si occupano di mansioni amministrative come l'hosting web e le finanze, ma non traggono alcun profitto personale dai contributi apportati al sito. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Le donazioni a Privacy Guides sono generalmente deducibili dalle tasse negli Stati Uniti. -## Site License +## Licenza del sito !!! danger "" - The following is a human-readable summary of (and not a substitute for) the [license](/license). + Quanto segue è un riassunto scritto in formato leggibile di (e non un sostituto di) [licenza](/licenza). -:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. **Non è possibile** utilizzare il marchio Privacy Guides nel proprio progetto senza l'esplicita approvazione da questo progetto. If you remix, transform, or build upon the content of this website, you may not distribute the modified material. +:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. **Non è possibile** utilizzare il marchio Privacy Guides nel proprio progetto senza l'esplicita approvazione da questo progetto. Se si remixa, si trasforma o si basa sul contenuto di questo sito web, non si può distribuire il materiale modificato. -This license is in place to prevent people from sharing our work without giving proper credit, and to prevent people from modifying our work in a way that could be used to mislead people. If you find the terms of this license too restrictive for the project you're working on, please reach out to us at `jonah@privacyguides.org`. We are happy to provide alternative licensing options for well-intentioned projects in the privacy space! +Questa licenza è stata istituita per evitare che le persone condividano il nostro lavoro senza dare il giusto credito e per evitare che le persone modifichino il nostro lavoro in un modo che potrebbe essere usato per ingannare le persone. If you find the terms of this license too restrictive for the project you're working on, please reach out to us at `jonah@privacyguides.org`. Siamo lieti di fornire opzioni di licenza alternative per progetti ben intenzionati nel settore della privacy! diff --git a/i18n/it/about/notices.md b/i18n/it/about/notices.md index bf37411d..4531faf4 100644 --- a/i18n/it/about/notices.md +++ b/i18n/it/about/notices.md @@ -12,13 +12,13 @@ Privacy Guides è un progetto open source a cui si contribuisce sotto licenze ch Privacy Guides inoltre non garantisce che questo sito sarà costantemente disponibile, o disponibile affatto. -## Licensing Overview +## Panoramica sulle licenze !!! danger "" - The following is a human-readable summary of (and not a substitute for) the [license](/license). + Quanto segue è un riassunto scritto in formato leggibile di (e non un sostituto di) [licenza](/licenza). -Unless otherwise noted, all **content** on this website is made available under the terms of the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). The underlying **source code** used to generate this website and display that content is released under the [MIT License](https://github.com/privacyguides/privacyguides.org/tree/main/LICENSE-CODE). +Se non diversamente indicato, tutti i **contenuti** di questo sito web sono resi disponibili secondo i termini della [Licenza Creative Commons Attribuzione-Non opere derivate 4.0 Internazionale](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). The underlying **source code** used to generate this website and display that content is released under the [MIT License](https://github.com/privacyguides/privacyguides.org/tree/main/LICENSE-CODE). Questo non include codice di terze parti incorporato in questo repository, o codice dove una licenza sostitutiva è altrimenti indicata. I seguenti sono esempi degni di nota, ma questa lista potrebbe non essere onnicomprensiva: diff --git a/i18n/it/advanced/communication-network-types.md b/i18n/it/advanced/communication-network-types.md index 748720f2..40524287 100644 --- a/i18n/it/advanced/communication-network-types.md +++ b/i18n/it/advanced/communication-network-types.md @@ -10,7 +10,7 @@ Esistono diverse architetture di rete comunemente usate per trasmettere messaggi ## Reti centralizzate -{ align=left } +{ align=left } I servizi di messaggistica centralizzati sono quelli in cui tutti i partecipanti si trovano sullo stesso server o rete di server controllati dalla stessa organizzazione. @@ -33,7 +33,7 @@ Alcuni servizi di messaggistica self-hosted consentono di configurare il proprio ## Reti federate -{ align=left } +{ align=left } I servizi di messaggistica federati usano più server indipendenti e decentralizzati, i quali sono in grado di comunicare l'uno con l'altro (la posta elettronica è un esempio di servizio federato). La federazione permette agli amministratori di sistema di controllare i loro server e far comunque parte di una rete di comunicazione più ampia. @@ -41,63 +41,63 @@ Quando "self-hostati", i membri di un server federato possono scoprire e comunic **Vantaggi:** -- Allows for greater control over your own data when running your own server. -- Allows you to choose whom to trust your data with by choosing between multiple "public" servers. -- Often allows for third-party clients which can provide a more native, customized, or accessible experience. -- Server software can be verified that it matches public source code, assuming you have access to the server or you trust the person who does (e.g., a family member). +- Consente un maggiore controllo sui propri dati quando si gestisce un proprio server. +- Permette di scegliere a chi affidare i propri dati, scegliendo tra più server "pubblici". +- Spesso consente di utilizzare client di terze parti che possono fornire un'esperienza più nativa, personalizzata o accessibile. +- È possibile verificare che il software del server corrisponda al codice sorgente pubblico, a condizione che si abbia accesso al server o che ci si fidi della persona che lo possiede (ad esempio, un familiare). **Svantaggi:** -- Adding new features is more complex because these features need to be standardized and tested to ensure they work with all servers on the network. -- Due to the previous point, features can be lacking, or incomplete or working in unexpected ways compared to centralized platforms, such as message relay when offline or message deletion. -- Some metadata may be available (e.g., information like "who is talking to whom," but not actual message content if E2EE is used). -- Federated servers generally require trusting your server's administrator. They may be a hobbyist or otherwise not a "security professional," and may not serve standard documents like a privacy policy or terms of service detailing how your data is used. -- Server administrators sometimes choose to block other servers, which are a source of unmoderated abuse or break general rules of accepted behavior. This will hinder your ability to communicate with members of those servers. +- L'aggiunta di nuove funzionalità è più complessa perché queste devono essere standardizzate e testate per garantire il funzionamento con tutti i server della rete. +- A causa del punto precedente, le funzionalità possono essere carenti, incomplete o funzionare in modo inaspettato rispetto alle piattaforme centralizzate, come ad esempio il trasferimento dei messaggi quando sono offline o la loro cancellazione. +- Alcuni metadati possono essere disponibili (ad esempio, informazioni come "chi sta parlando con chi", ma non il contenuto effettivo del messaggio se si utilizza E2EE). +- I server federati richiedono generalmente la fiducia dell'amministratore del server. Può trattarsi di un appassionato o comunque non di un "professionista della sicurezza" e potrebbe non servire documenti standard come l'informativa sulla privacy o i termini di servizio che descrivono in dettaglio l'utilizzo dei vostri dati. +- Gli amministratori dei server scelgono talvolta di bloccare altri server che sono fonte di abusi non moderati o che violano le regole generali di comportamento accettate. Questo ostacolerà la vostra capacità di comunicare con i membri di quei server. ## Reti peer-to-peer -{ align=left } +{ align=left } -P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. +I messaggeri P2P si collegano a una [rete distribuita](https://en.wikipedia.org/wiki/Distributed_networking) di nodi per trasmettere un messaggio al destinatario senza l'ausilio di un server di terze parti. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +I client (peer) di solito si trovano l'un l'altro attraverso l'uso di una rete [computazionale distribuita](https://en.wikipedia.org/wiki/Distributed_computing). Ne sono un esempio le [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), utilizzate ad esempio da [torrent](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) e [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System). Un altro approccio è quello delle reti di prossimità, in cui si stabilisce una connessione tramite WiFi o Bluetooth (ad esempio, Briar o il protocollo di social network [Scuttlebutt](https://www.scuttlebutt.nz)). -Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. +Una volta che un peer ha trovato un percorso verso il suo contatto attraverso uno di questi metodi, viene stabilita una connessione diretta tra i due. Sebbene i messaggi siano solitamente criptati, un osservatore può comunque dedurre la posizione e l'identità del mittente e del destinatario. -P2P networks do not use servers, as peers communicate directly between each other and hence cannot be self-hosted. However, some additional services may rely on centralized servers, such as user discovery or relaying offline messages, which can benefit from self-hosting. +Le reti P2P non utilizzano server, poiché i peer comunicano direttamente tra loro e quindi non possono essere auto-ospitati. Tuttavia, alcuni servizi aggiuntivi possono dipendere da server centralizzati, come la scoperta degli utenti o la trasmissione di messaggi offline, che possono trarre vantaggio dall'auto-ospitalità. **Vantaggi:** -- Minimal information is exposed to third-parties. -- Modern P2P platforms implement E2EE by default. There are no servers that could potentially intercept and decrypt your transmissions, unlike centralized and federated models. +- Le informazioni esposte a terzi sono minime. +- Le moderne piattaforme P2P implementano E2EE per impostazione predefinita. A differenza dei modelli centralizzati e federati, non ci sono server che possano intercettare e decriptare le trasmissioni. **Svantaggi:** -- Reduced feature set: -- Messages can only be sent when both peers are online, however, your client may store messages locally to wait for the contact to return online. -- Generally increases battery usage on mobile devices, because the client must stay connected to the distributed network to learn about who is online. -- Some common messenger features may not be implemented or incompletely, such as message deletion. -- Your IP address and that of the contacts you're communicating with may be exposed if you do not use the software in conjunction with a [VPN](../vpn.md) or [Tor](../tor.md). Many countries have some form of mass surveillance and/or metadata retention. +- Set di funzioni ridotto: +- I messaggi possono essere inviati solo quando entrambi i peer sono online; tuttavia, il client può memorizzare i messaggi in locale per attendere che il contatto torni online. +- In genere aumenta l'utilizzo della batteria sui dispositivi mobili, perché il client deve rimanere connesso alla rete distribuita per sapere chi è online. +- Alcune funzioni comuni del messenger potrebbero non essere implementate o essere incomplete, come l'eliminazione dei messaggi. +- Il vostro indirizzo IP e quello dei contatti con cui state comunicando possono essere esposti se non utilizzate il software insieme a una [VPN](../vpn.md) o a [Tor](../tor.md). In molti Paesi esiste una forma di sorveglianza di massa e/o di conservazione dei metadati. ## Instradamento anonimo -{ align=left } +{ align=left } -A messenger using [anonymous routing](https://doi.org/10.1007/978-1-4419-5906-5_628) hides either the identity of the sender, the receiver, or evidence that they have been communicating. Ideally, a messenger should hide all three. +Un messaggero che utilizza il [routing anonimo](https://doi.org/10.1007/978-1-4419-5906-5_628) nasconde l'identità del mittente, del destinatario o l'evidenza della comunicazione. Idealmente, un messaggero dovrebbe nascondere tutte e tre le cose. -There are [many](https://doi.org/10.1145/3182658) different ways to implement anonymous routing. One of the most famous is [onion routing](https://en.wikipedia.org/wiki/Onion_routing) (i.e. [Tor](tor-overview.md)), which communicates encrypted messages through a virtual [overlay network](https://en.wikipedia.org/wiki/Overlay_network) that hides the location of each node as well as the recipient and sender of each message. The sender and recipient never interact directly and only meet through a secret rendezvous node so that there is no leak of IP addresses nor physical location. Nodes cannot decrypt messages, nor the final destination; only the recipient can. Each intermediary node can only decrypt a part that indicates where to send the still encrypted message next, until it arrives at the recipient who can fully decrypt it, hence the "onion layers." +Esistono [molti](https://doi.org/10.1145/3182658) modi diversi per implementare il routing anonimo. Uno dei più famosi è l'[onion routing](https://en.wikipedia.org/wiki/Onion_routing) (cioè [Tor](tor-overview.md)), che comunica messaggi crittografati attraverso una [rete di overlay](https://en.wikipedia.org/wiki/Overlay_network) virtuale che nasconde la posizione di ogni nodo, nonché il destinatario e il mittente di ogni messaggio. Il mittente e il destinatario non interagiscono mai direttamente e si incontrano solo attraverso un nodo d'incontro segreto, in modo che non vi sia alcuna fuga d'indirizzi IP o di posizione fisica. I nodi non possono decrittare i messaggi, né la destinazione finale; solo il destinatario può farlo. Ogni nodo intermedio può decifrare solo una parte che indica dove inviare successivamente il messaggio ancora criptato, finché non arriva al destinatario che può decifrarlo completamente, da cui gli "strati a cipolla". -Self-hosting a node in an anonymous routing network does not provide the hoster with additional privacy benefits, but rather contributes to the whole network's resilience against identification attacks for everyone's benefit. +L'auto-ospitazione di un nodo in una rete di routing anonimo non fornisce al proprietario ulteriori vantaggi in termini di privacy, ma piuttosto contribuisce alla resilienza dell'intera rete contro gli attacchi d'identificazione, a vantaggio di tutti. **Vantaggi:** -- Minimal to no information is exposed to other parties. -- Messages can be relayed in a decentralized manner even if one of the parties is offline. +- Le informazioni esposte ad altre parti sono minime o nulle. +- I messaggi possono essere trasmessi in modo decentralizzato anche se una delle parti è offline. **Svantaggi:** -- Slow message propagation. -- Often limited to fewer media types, mostly text, since the network is slow. -- Less reliable if nodes are selected by randomized routing, some nodes may be very far from the sender and receiver, adding latency or even failing to transmit messages if one of the nodes goes offline. -- More complex to get started, as the creation and secured backup of a cryptographic private key is required. -- Just like other decentralized platforms, adding features is more complex for developers than on a centralized platform. Hence, features may be lacking or incompletely implemented, such as offline message relaying or message deletion. +- Propagazione lenta dei messaggi. +- Spesso limitato a pochi tipi di media, soprattutto testo, perché la rete è lenta. +- Meno affidabile se i nodi sono selezionati con un routing randomizzato, alcuni nodi possono essere molto lontani dal mittente e dal destinatario, aggiungendo latenza o addirittura non riuscendo a trasmettere i messaggi se uno dei nodi va offline. +- È più complesso iniziare, poiché è necessaria la creazione e il backup sicuro di una chiave privata crittografica. +- Come per altre piattaforme decentralizzate, l'aggiunta di funzionalità è più complessa per gli sviluppatori rispetto a una piattaforma centralizzata. Di conseguenza, potrebbero mancare o essere implementate in modo incompleto alcune funzioni, come la trasmissione dei messaggi offline o la cancellazione dei messaggi. diff --git a/i18n/it/android.md b/i18n/it/android.md index 892ab082..575217f1 100644 --- a/i18n/it/android.md +++ b/i18n/it/android.md @@ -1,5 +1,5 @@ --- -meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" +meta_title: "Consigli Android: GrapheneOS e DivestOS - Privacy Guides" title: "Android" icon: 'fontawesome/brands/android' description: Puoi sostituire il sistema operativo del tuo telefono Android con queste alternative sicure e rispettose della privacy. @@ -222,10 +222,10 @@ In questo sito raccomandiamo un'ampia gamma di applicazioni per Android. Le app !!! recommendation - { align=right } - { align=right } + { align=right } + { align=right } - **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support). + **Auditor * * è un'app che sfrutta le funzionalità di sicurezza hardware per fornire il monitoraggio dell'integrità del dispositivo convalidando attivamente l'identità di un dispositivo e l'integrità del suo sistema operativo. Attualmente funziona solo con GrapheneOS o con il sistema operativo stock per i [dispositivi supportati](https://attestation.app/about#device-support). [:octicons-home-16: Pagina principale](https://attestation.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Informativa sulla privacy" } diff --git a/i18n/it/basics/account-creation.md b/i18n/it/basics/account-creation.md index 5fcbf116..9789b1d9 100644 --- a/i18n/it/basics/account-creation.md +++ b/i18n/it/basics/account-creation.md @@ -1,5 +1,5 @@ --- -meta_title: "How to Create Internet Accounts Privately - Privacy Guides" +meta_title: "Come creare account internet in maniera privata - Privacy Guides" title: "Creazione account" icon: 'material/account-plus' description: La creazione di account online è praticamente una necessità di internet, adottate questi accorgimenti per assicurarvi di rimanere privati. diff --git a/i18n/it/basics/email-security.md b/i18n/it/basics/email-security.md index 3df88842..9c7c46e9 100644 --- a/i18n/it/basics/email-security.md +++ b/i18n/it/basics/email-security.md @@ -1,5 +1,5 @@ --- -meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides" +meta_title: "Perché l'email non è la scelta migliore per la privacy e la sicurezza - Privacy Guides" title: Sicurezza Email icon: material/email description: La posta elettronica è intrinsecamente insicura sotto molti punti di vista e questi sono alcuni dei motivi per cui non è la nostra scelta principale per le comunicazioni sicure. @@ -23,7 +23,7 @@ I provider di posta elettronica che consentono di utilizzare protocolli di acces ### Come proteggo la mia chiave privata? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Il messaggio viene quindi decifrato dalla smartcard e il contenuto decifrato viene inviato al dispositivo. +Una smartcard (come una [ YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) o [Nitrokey](https://www.nitrokey.com)) funziona ricevendo un messaggio email criptato da un dispositivo (telefono, tablet, computer, ecc.) con un client email/webmail. Il messaggio viene quindi decifrato dalla smartcard e il contenuto decifrato viene inviato al dispositivo. È preferibile che la decodifica avvenga sulla smartcard, per evitare di esporre la chiave privata a un dispositivo compromesso. diff --git a/i18n/it/basics/threat-modeling.md b/i18n/it/basics/threat-modeling.md index b8705aac..8949f4ef 100644 --- a/i18n/it/basics/threat-modeling.md +++ b/i18n/it/basics/threat-modeling.md @@ -1,11 +1,11 @@ --- -meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides" +meta_title: "Modello di minaccia: Il primo passo nel viaggio verso la privacy - Privacy Guides" title: "Modelli di minaccia" icon: 'material/target-account' -description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. +description: Bilanciare sicurezza, privacy e usabilità è uno dei primi e più difficili obiettivi che dovrete affrontare nel vostro viaggio verso la privacy. --- -Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Tutto è un compromesso: più qualcosa è sicuro, più è restrittivo o scomodo in generale, ecc. Spesso, le persone scoprono che il problema con gli strumenti che vedono raccomandati è che sono troppo difficili da iniziare a usare! +Bilanciare sicurezza, privacy e usabilità è uno dei primi e più difficili obiettivi che dovrete affrontare nel vostro viaggio verso la privacy. Tutto è un compromesso: più qualcosa è sicuro, più è restrittivo o scomodo in generale, ecc. Spesso, le persone scoprono che il problema con gli strumenti che vedono raccomandati è che sono troppo difficili da iniziare a usare! Se si vogliono utilizzare gli strumenti **più** sicuri a disposizione, è necessario sacrificare *molto* in termini di usabilità. E, anche allora, ==nulla è mai completamente sicuro.== C'è un alta **sicurezza**, ma mai una completa **sicurezza**. È per questo che i modelli di minaccia sono importanti. diff --git a/i18n/it/basics/vpn-overview.md b/i18n/it/basics/vpn-overview.md index f5c260e4..e9ad18b0 100644 --- a/i18n/it/basics/vpn-overview.md +++ b/i18n/it/basics/vpn-overview.md @@ -1,5 +1,5 @@ --- -meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides" +meta_title: "Come le VPN proteggono la tua privacy? La nostra panoramica sulle VPN - Privacy Guides" title: Panoramica VPN icon: material/vpn description: Le reti virtuali private spostano il rischio dal vostro ISP a una terza parte di cui vi fidate. Dovresti tenere a mente questi aspetti. diff --git a/i18n/it/data-redaction.md b/i18n/it/data-redaction.md index 972aa6af..8cebd07c 100644 --- a/i18n/it/data-redaction.md +++ b/i18n/it/data-redaction.md @@ -1,5 +1,5 @@ --- -meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides" +meta_title: "Rimuovere le PII con i metadata scrubber e gli strumenti di riduzione dei dati - Privacy Guides" title: "Rimozione di dati e metadati" icon: material/tag-remove description: Utilizza questi strumenti per rimuovere metadati come la posizione GPS e altre informazioni identificative dalle foto e dai file che condividete. diff --git a/i18n/it/desktop-browsers.md b/i18n/it/desktop-browsers.md index 08ed189a..f48fc3af 100644 --- a/i18n/it/desktop-browsers.md +++ b/i18n/it/desktop-browsers.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" +meta_title: "Browser web che rispettano la privacy per PC e Mac - Privacy Guides" title: "Browser desktop" icon: material/laptop description: Questi browser web offrono una maggiore protezione della privacy rispetto a Google Chrome. diff --git a/i18n/it/email.md b/i18n/it/email.md index 65cce189..927704bc 100644 --- a/i18n/it/email.md +++ b/i18n/it/email.md @@ -1,5 +1,5 @@ --- -meta_title: "Encrypted Private Email Recommendations - Privacy Guides" +meta_title: "Email Private Criptate consigliate - Privacy Guides" title: "Servizi mail" icon: material/email description: Questi provider di posta elettronica offrono un luogo ideale per archiviare le tue mail in modo sicuro e molti offrono la crittografia OpenPGP interoperabile con altri provider. @@ -124,7 +124,7 @@ Mailbox.org non accetta criptovalute a causa della sospensione delle attività d #### :material-check:{ .pg-green } Sicurezza dell'account -Mailbox.org supporta l'[autenticazione a due fattori](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo per la loro webmail. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Gli standard Web come [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) non sono ancora supportati. +Mailbox.org supporta l'[autenticazione a due fattori](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo per la loro webmail. Puoi usare o TOTP o una [YubiKey](https://en.wikipedia.org/wiki/YubiKey) utilizzando [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Gli standard Web come [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) non sono ancora supportati. #### :material-information-outline:{ .pg-blue } Sicurezza dei dati diff --git a/i18n/it/encryption.md b/i18n/it/encryption.md index 12150a1a..c8dcb83c 100644 --- a/i18n/it/encryption.md +++ b/i18n/it/encryption.md @@ -1,5 +1,5 @@ --- -meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides" +meta_title: "Software di crittografia consigliati: VeraCrypt, Cryptomator, PicoCrypt e OpenPGP - Privacy Guides" title: "Software di crittografia" icon: material/file-lock description: La crittografia dei dati è l'unico modo per controllare chi può accedervi. Questi strumenti ti consentono di crittografare le tue email e qualsiasi altro file. diff --git a/i18n/it/financial-services.md b/i18n/it/financial-services.md index 3e0b8b41..7d404c21 100644 --- a/i18n/it/financial-services.md +++ b/i18n/it/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin { align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/it/index.md b/i18n/it/index.md index f7c1920e..571c9aa7 100644 --- a/i18n/it/index.md +++ b/i18n/it/index.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Guides: Your Independent Privacy and Security Resource" +meta_title: "Privacy Guides: La vostra risorsa indipendente per la privacy e la sicurezza" template: overrides/home.it.html hide: - navigation diff --git a/i18n/it/mobile-browsers.md b/i18n/it/mobile-browsers.md index 2ba2ac11..875d3dd1 100644 --- a/i18n/it/mobile-browsers.md +++ b/i18n/it/mobile-browsers.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides" +meta_title: "Browser Web che rispettano la privacy per Android e iOS - Privacy Guides" title: "Browser mobile" icon: octicons/device-mobile-16 description: Questi browser sono quelli che attualmente consigliamo per la navigazione Internet standard/non anonima sul tuo telefono. diff --git a/i18n/it/multi-factor-authentication.md b/i18n/it/multi-factor-authentication.md index fbb389a6..a5eb0aad 100644 --- a/i18n/it/multi-factor-authentication.md +++ b/i18n/it/multi-factor-authentication.md @@ -49,7 +49,7 @@ Per i modelli che supportano HOTP e TOTP, ci sono 3 slot per HOTP e 15 per TOTP. !!! warning - Sebbene le Nitrokey non rilascino i segreti HOTP/TOTP al dispositivo a cui sono collegati, la memoria HOTP e TOTP non è crittografata ed è vulnerabile agli attacchi fisici. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead. + Sebbene le Nitrokey non rilascino i segreti HOTP/TOTP al dispositivo a cui sono collegati, la memoria HOTP e TOTP non è crittografata ed è vulnerabile agli attacchi fisici. Se vuoi memorizzare le chiavi segrete HOTP o TOTP, si consiglia vivamente di utilizzare una YubiKey. !!! warning diff --git a/i18n/it/passwords.md b/i18n/it/passwords.md index d52cdb50..c605a166 100644 --- a/i18n/it/passwords.md +++ b/i18n/it/passwords.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides" +meta_title: "I migliori gestori di password per proteggere la tua privacy e sicurezza - Privacy Guides" title: "Gestori di password" icon: material/form-textbox-password description: I gestori delle password permettono di archiviare e gestire con sicurezza le password e altre credenziali. diff --git a/i18n/it/real-time-communication.md b/i18n/it/real-time-communication.md index bb07a85c..ee552270 100644 --- a/i18n/it/real-time-communication.md +++ b/i18n/it/real-time-communication.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Private Instant Messengers - Privacy Guides" +meta_title: "Le migliori app di messaggistica istantanea private - Privacy Guides" title: "Comunicazione in tempo reale" icon: material/chat-processing description: Altre app di messaggistica istantanea rendono disponibili tutte le tue conversazioni private alla società che le gestisce. diff --git a/i18n/it/search-engines.md b/i18n/it/search-engines.md index b3d37768..71d0fefa 100644 --- a/i18n/it/search-engines.md +++ b/i18n/it/search-engines.md @@ -1,5 +1,5 @@ --- -meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides" +meta_title: "Motori di ricerca consigliati: Alternative anonime a Google - Privacy Guides" title: "Motori di ricerca" icon: material/search-web description: Questi motori di ricerca, che rispettano la privacy, non costruiscono un profilo pubblicitario basato sulle vostre ricerche. diff --git a/i18n/it/tools.md b/i18n/it/tools.md index 439c357c..388deacb 100644 --- a/i18n/it/tools.md +++ b/i18n/it/tools.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides" +meta_title: "I migliori strumenti, consigli e servizi senza pubblicità per la privacy - Privacy Guides" title: "Strumenti per la privacy" icon: material/tools hide: diff --git a/i18n/it/tor.md b/i18n/it/tor.md index 8776be03..03c3565c 100644 --- a/i18n/it/tor.md +++ b/i18n/it/tor.md @@ -1,24 +1,24 @@ --- -meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" +meta_title: "Browser e rete Tor: Navigazione Web Anonima - Privacy Guides" title: "Rete Tor" icon: simple/torproject description: Proteggi la tua navigazione internet da occhi indiscreti utilizzando la rete Tor, una rete sicura che elude la censura. schema: - "@context": http://schema.org - "@type": SoftwareApplication + "@type": Applicazione Software name: Tor Browser image: /assets/img/browsers/tor.svg url: https://www.torproject.org - sameAs: https://en.wikipedia.org/wiki/Tor_(network) - applicationCategory: Web Browser + sameAs: https://it.wikipedia.org/wiki/Tor_(software) + applicationCategory: Browser Web operatingSystem: - Windows - macOS - Linux - Android subjectOf: - "@type": WebPage + "@type": Pagina Web url: "./" --- diff --git a/i18n/it/vpn.md b/i18n/it/vpn.md index cbbd7668..5b571827 100644 --- a/i18n/it/vpn.md +++ b/i18n/it/vpn.md @@ -1,5 +1,5 @@ --- -meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides" +meta_title: "Suggerimenti e confronto tra servizi VPN privati, no sponsor o pubblicità - Privacy Guides" title: "Servizi VPN" icon: material/vpn description: Questi sono i migliori servizi VPN per proteggere la tua privacy e sicurezza online. Trovate un fornitore che non ti spii. diff --git a/i18n/ja/basics/threat-modeling.md b/i18n/ja/basics/threat-modeling.md index 2cf64c5e..74ceb56c 100644 --- a/i18n/ja/basics/threat-modeling.md +++ b/i18n/ja/basics/threat-modeling.md @@ -1,37 +1,37 @@ --- -meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides" -title: "Threat Modeling" +meta_title: "脅威モデリング: プライバシー保護の最初のステップ - Privacy Guides" +title: "脅威モデリング" icon: 'material/target-account' -description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. +description: セキュリティ、プライバシー、使いやすさのバランスを取ることは、プライバシー保護を考える際に最初に直面する難しい課題の一つです。 --- -Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using! +セキュリティ、プライバシー、使いやすさのバランスを取ることは、プライバシー保護を考える際に最初に直面する難しい課題の一つです。 一般的に、安全性を高めるほど制限が増え、不便になるというトレードオフが発生します。 多くの場合、おすすめされたツールの問題は、使い始めるのが難しすぎることです。 -If you wanted to use the **most** secure tools available, you'd have to sacrifice *a lot* of usability. And, even then, ==nothing is ever fully secure.== There's **high** security, but never **full** security. That's why threat models are important. +**最も**安全なツールを使うには、*多くの*使いやすさを犠牲にする必要があります。 そして、それでも、==完全に安全にはなりません。==**高レベル**のセキュリティはあっても、**完全な**セキュリティはありません。 だからこそ、脅威モデルが重要なのです。 -**So, what are these threat models, anyway?** +**脅威モデルとは何ですか?** ==A threat model is a list of the most probable threats to your security and privacy endeavors.== Since it's impossible to protect yourself against **every** attack(er), you should focus on the **most probable** threats. In computer security, a threat is an event that could undermine your efforts to stay private and secure. -Focusing on the threats that matter to you narrows down your thinking about the protection you need, so you can choose the tools that are right for the job. +あなたにとって重大な脅威に焦点を当てることで、必要な保護を絞り込み、必要なツールを選ぶことができます。 -## Creating Your Threat Model +## 脅威モデルの作成 -To identify what could happen to the things you value and determine from whom you need to protect them, you should answer these five questions: +あなたの大切なものに何が起こる可能性があるかを特定し、誰から守るべきかを判断するために、以下の5つの質問を確認しましょう: -1. What do I want to protect? -2. Who do I want to protect it from? -3. How likely is it that I will need to protect it? -4. How bad are the consequences if I fail? -5. How much trouble am I willing to go through to try to prevent potential consequences? +1. 何を守りたいか? +2. 誰から守りたいか? +3. 守る必要がどの程度あるか? +4. 守れなかった場合、どんな悪影響があるか? +5. 守るためにどの程度なら苦労していいか? -### What do I want to protect? +### 何を守りたいか? -An “asset” is something you value and want to protect. In the context of digital security, ==an asset is usually some kind of information.== For example, your emails, contact lists, instant messages, location, and files are all possible assets. Your devices themselves may also be assets. +「資産」とは、あなたが大切にしているもの、守りたいものです。 情報セキュリティにおいては、==資産とは通常、何らかの情報です。==例えば、メール、連絡帳、インスタントメッセージ、位置情報、ファイルなどはすべて資産です。 また、デバイスが資産に含まれる場合もあります。 -*Make a list of your assets: data that you keep, where it's kept, who has access to it, and what stops others from accessing it.* +*あなたの資産の一覧を作成しましょう。一覧には、あなたが保管しているデータ、その保管場所、それにアクセスできる人、他人によるアクセスを防止する方法を記載します。* -### Who do I want to protect it from? +### 誰から守りたいか? To answer this question, it's important to identify who might want to target you or your information. ==A person or entity that poses a threat to your assets is an “adversary”.== Examples of potential adversaries are your boss, your former partner, your business competition, your government, or a hacker on a public network. @@ -39,7 +39,7 @@ To answer this question, it's important to identify who might want to target you Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. -### How likely is it that I will need to protect it? +### 守る必要がどの程度あるか? ==Risk is the likelihood that a particular threat against a particular asset will actually occur.== It goes hand-in-hand with capability. While your mobile phone provider has the capability to access all of your data, the risk of them posting your private data online to harm your reputation is low. @@ -49,7 +49,7 @@ Assessing risks is both a personal and subjective process. Many people find cert *Write down which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about.* -### How bad are the consequences if I fail? +### 守れなかった場合、どんな悪影響があるか? There are many ways that an adversary could gain access to your data. For example, an adversary can read your private communications as they pass through the network, or they can delete or corrupt your data. @@ -59,7 +59,7 @@ Security planning involves understanding how bad the consequences could be if an *Write down what your adversary might want to do with your private data.* -### How much trouble am I willing to go through to try to prevent potential consequences? +### 守るためにどの程度なら苦労していいか? ==There is no perfect option for security.== Not everyone has the same priorities, concerns, or access to resources. Your risk assessment will allow you to plan the right strategy for you, balancing convenience, cost, and privacy. @@ -106,6 +106,6 @@ For people looking to increase their privacy and security online, we've compiled - [Common Goals and Threats :material-arrow-right-drop-circle:](common-threats.md) -## Sources +## ソース - [EFF Surveillance Self Defense: Your Security Plan](https://ssd.eff.org/en/module/your-security-plan) diff --git a/i18n/ja/financial-services.md b/i18n/ja/financial-services.md index 8616c032..2f5bd353 100644 --- a/i18n/ja/financial-services.md +++ b/i18n/ja/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin { align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/ja/kb-archive.md b/i18n/ja/kb-archive.md index 92daee33..df4e6c93 100644 --- a/i18n/ja/kb-archive.md +++ b/i18n/ja/kb-archive.md @@ -1,5 +1,5 @@ --- -title: KB Archive +title: 知識ベースのアーカイブ icon: material/archive description: Some pages that used to be in our knowledge base can now be found on our blog. --- diff --git a/i18n/ja/tor.md b/i18n/ja/tor.md index af9a3a9e..f83476b6 100644 --- a/i18n/ja/tor.md +++ b/i18n/ja/tor.md @@ -1,5 +1,5 @@ --- -meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" +meta_title: "Tor Browserとネットワーク: 匿名のウェブブラウジング - Privacy Guides" title: "Torネットワーク" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. @@ -11,7 +11,7 @@ schema: image: /assets/img/browsers/tor.svg url: https://www.torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) - applicationCategory: Web Browser + applicationCategory: ウェブブラウザ operatingSystem: - Windows - macOS @@ -99,7 +99,7 @@ We previously recommended enabling the *Isolate Destination Address* preference All versions are signed using the same signature so they should be compatible with each other. -## Relays and Bridges +## リレーとブリッジ ### Snowflake diff --git a/i18n/ko/basics/email-security.md b/i18n/ko/basics/email-security.md index 23f37dcf..55246c73 100644 --- a/i18n/ko/basics/email-security.md +++ b/i18n/ko/basics/email-security.md @@ -1,5 +1,5 @@ --- -meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides" +meta_title: "이메일이 프라이버시, 보안 면에서 최선의 선택이 아닌 이유 - Privacy Guides" title: 이메일 보안 icon: material/email description: 이메일은 태생적으로 여러 가지 면에서 안전하지 않습니다. 따라서 안전한 통신을 위한 최선의 선택은 아닙니다. @@ -17,26 +17,26 @@ description: 이메일은 태생적으로 여러 가지 면에서 안전하지 OpenPGP를 사용하더라도 [순방향 비밀성(Forward secrecy)](https://en.wikipedia.org/wiki/Forward_secrecy)을 지원하지 않으므로, 본인 혹은 수신자의 개인 키가 도난당할 경우 해당 키로 암호화된 이전 메시지가 전부 노출됩니다. 따라서, 개인 간 의사소통에는 이메일보다는 순방향 비밀성이 구현된 [인스턴트 메신저](../real-time-communication.md) 이용을 권장합니다. -### What Email Clients Support E2EE? +### E2EE 지원 이메일 클라이언트는 무엇인가요? -Email providers which allow you to use standard access protocols like IMAP and SMTP can be used with any of the [email clients we recommend](../email-clients.md). Depending on the authentication method, this may lead to the decrease security if either the provider or the email client does not support OATH or a bridge application as [multi-factor authentication](multi-factor-authentication.md) is not possible with plain password authentication. +IMAP, SMTP 등 표준 접속 프로토콜을 사용할 수 있는 이메일 제공 업체는 [권장 이메일 클라이언트](../email-clients.md)와 함께 사용할 수 있습니다. 인증 방법에 따라서, 이메일 제공 업체/클라이언트가 OATH를 지원하지 않거나 브리지 애플리케이션을 지원하지 않는 경우, 단순 비밀번호 인증으로는 [다중 인증](multi-factor-authentication.md)이 불가능하므로 보안이 저하될 수 있습니다. -### How Do I Protect My Private Keys? +### 개인 키를 어떻게 보호해야 하나요? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +스마트카드([YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP), [Nitrokey](https://www.nitrokey.com) 등)는 기기(스마트폰, 태블릿, PC 등)에서 실행하는 이메일/웹메일 클라이언트가 암호화된 메일을 수신했을 때 작동합니다. 암호화된 메일 내용은 스마트카드에서 복호화되며, 복호화된 내용이 스마트카드로부터 기기로 전달됩니다. -It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device. +스마트카드에서 복호화를 수행함으로써, 기기의 보안이 손상됐을 경우에도 개인 키가 노출되는 것을 방지할 수 있습니다. ## 이메일 메타데이터 개요 이메일 메타데이터는 이메일 메시지의 [메시지 헤더](https://en.wikipedia.org/wiki/Email#Message_header)에 저장됩니다. 이메일 메타데이터에는 여러분이 봐왔을 `To`(받는사람), `From`(보낸사람), `Cc`(참조), `Date`(보낸 날짜), `Subject`(제목) 등이 포함됩니다. 이외에도 여러 숨겨진 헤더가 이메일 클라이언트 및 제공 업체로부터 추가되며, 이러한 정보는 여러분의 계정에 대한 정보를 노출시킬 수 있습니다. -Client software may use email metadata to show who a message is from and what time it was received. Servers may use it to determine where an email message must be sent, among [other purposes](https://en.wikipedia.org/wiki/Email#Message_header) which are not always transparent. +클라이언트 소프트웨어는 이메일 메타데이터를 사용해 메시지의 발신자와 수신 시간을 표시할 수 있습니다. 서버는 항상 투명하지만은 않은 [다른 목적지](https://en.wikipedia.org/wiki/Email#Message_header) 중 어디에 이메일을 보내야 할지 결정하는 데에 메타데이터를 활용할 수 있습니다. -### Who Can View Email Metadata? +### 이메일 메타데이터는 누가 볼 수 있나요? -Email metadata is protected from outside observers with [Opportunistic TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS) protecting it from outside observers, but it is still able to be seen by your email client software (or webmail) and any servers relaying the message from you to any recipients including your email provider. Sometimes email servers will also use third-party services to protect against spam, which generally also have access to your messages. +이메일 메타데이터는 [Opportunistic TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS)를 통해 외부 관찰자로부터 보호됩니다. 하지만 여러분이 사용하는 이메일 클라이언트 소프트웨어나 웹메일은 메타데이터를 볼 수 있습니다. 또한 여러분의 이메일 제공 업체를 포함한, 여러분과 상대 수신자 사이의 모든 메시지 전달 서버 역시 메타데이터를 볼 수 있습니다. 이메일 서버 중에는 스팸 차단 목적으로 타사 서비스를 사용하기도 하는데, 보통 이런 타사 서비스도 여러분의 메시지에 접근할 수 있습니다. -### Why Can't Metadata be E2EE? +### 메타데이터는 종단 간 암호화를 적용할 수 없나요? -Email metadata is crucial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into the email protocols originally, instead requiring add-on software like OpenPGP. Because OpenPGP messages still have to work with traditional email providers, it cannot encrypt email metadata, only the message body itself. That means that even when using OpenPGP, outside observers can see lots of information about your messages, such as who you're emailing, the subject lines, when you're emailing, etc. +이메일 메타데이터는 이메일의 가장 기본적인 기능(어디에서 왔는지, 어디로 가야하는지 등)에 매우 중요한 역할을 합니다. 이메일 프로토콜에는 본래 E2EE가 내장되지 않았기 때문에, OpenPGP 등의 애드온 소프트웨어가 필요합니다. 그러나 OpenPGP 메시지는 여전히 기존 이메일 제공 업체와도 작동해야 합니다. 따라서 메시지 본문은 암호화할 수 있으나, 메타데이터는 암호화할 수 없습니다. 따라서, OpenPGP를 사용하더라도 외부 관찰자는 이메일 수신자, 제목, 이메일 작성 시간 등 여러 정보를 볼 수 있습니다. diff --git a/i18n/ko/basics/multi-factor-authentication.md b/i18n/ko/basics/multi-factor-authentication.md index ae57848d..f1815a22 100644 --- a/i18n/ko/basics/multi-factor-authentication.md +++ b/i18n/ko/basics/multi-factor-authentication.md @@ -1,5 +1,5 @@ --- -title: "Multi-Factor Authentication" +title: "다중 인증" icon: 'material/two-factor-authentication' description: MFA is a critical security mechanism for securing your online accounts, but some methods are stronger than others. --- @@ -10,7 +10,7 @@ Normally, if a hacker (or adversary) is able to figure out your password then th MFA methods vary in security, but are based on the premise that the more difficult it is for an attacker to gain access to your MFA method, the better. Examples of MFA methods (from weakest to strongest) include SMS, Email codes, app push notifications, TOTP, Yubico OTP and FIDO. -## MFA Method Comparison +## MFA 방식 비교 ### SMS or Email MFA diff --git a/i18n/ko/basics/passwords-overview.md b/i18n/ko/basics/passwords-overview.md index 6858d8b5..75a813b0 100644 --- a/i18n/ko/basics/passwords-overview.md +++ b/i18n/ko/basics/passwords-overview.md @@ -6,15 +6,15 @@ description: These are some tips and tricks on how to create the strongest passw Passwords are an essential part of our everyday digital lives. We use them to protect our accounts, our devices and our secrets. Despite often being the only thing between us and an adversary who's after our private information, not a lot of thought is put into them, which often leads to people using passwords that can be easily guessed or brute-forced. -## Best Practices +## 모범 사례 -### Use unique passwords for every service +### 모든 서비스마다 서로 다른 비밀번호 사용하기 -Imagine this; you sign up for an account with the same e-mail and password on multiple online services. If one of those service providers is malicious, or their service has a data breach that exposes your password in an unencrypted format, all a bad actor would have to do is try that e-mail and password combination across multiple popular services until they get a hit. It doesn't matter how strong that one password is, because they already have it. +여러분이 여러 온라인 서비스에 똑같은 이메일, 비밀번호로 가입했다고 가정해봅시다. 서비스 제공 업체 중 하나가 악의적이거나, 해당 서비스에서 데이터 유출 사고가 발생해 비밀번호가 암호화되지 않은 형식으로 노출될 경우, 악의적인 공격자는 여러 유명 서비스에서 해당 이메일과 비밀번호 조합을 시도해 성공할 때까지 기다리기만 하면 됩니다. 비밀번호를 이미 알아낸 상태이기 때문에, 비밀번호가 얼마나 강력한지는 중요하지 않습니다. -This is called [credential stuffing](https://en.wikipedia.org/wiki/Credential_stuffing), and it is one of the most common ways that your accounts can be compromised by bad actors. To avoid this, make sure that you never re-use your passwords. +이를 [크리덴셜 스터핑(Credential stuffing)](https://en.wikipedia.org/wiki/Credential_stuffing)이라 하며, 악의적인 공격자가 계정을 탈취하는 굉장히 흔한 방법 중 하나입니다. 이를 방지하려면 비밀번호를 재사용하지 말아야 합니다. -### Use randomly generated passwords +### 무작위로 생성된 비밀번호 사용하기 ==You should **never** rely on yourself to come up with a good password.== We recommend using [randomly generated passwords](#passwords) or [diceware passphrases](#diceware-passphrases) with sufficient entropy to protect your accounts and devices. @@ -30,15 +30,15 @@ When it comes to passwords that you don't have to remember (such as passwords st If your password manager lets you check for compromised passwords, make sure to do so and promptly change any password that may have been exposed in a data breach. Alternatively, you could follow [Have I Been Pwned's Latest Breaches feed](https://feeds.feedburner.com/HaveIBeenPwnedLatestBreaches) with the help of a [news aggregator](../news-aggregators.md). -## Creating strong passwords +## 강력한 비밀번호 만들기 -### Passwords +### 패스워드 A lot of services impose certain criteria when it comes to passwords, including a minimum or maximum length, as well as which special characters, if any, can be used. You should use your password manager's built-in password generator to create passwords that are as long and complex as the service will allow by including capitalized and lowercase letters, numbers and special characters. If you need a password you can memorize, we recommend a [diceware passphrase](#diceware-passphrases). -### Diceware Passphrases +### Diceware 패스프레이즈 Diceware is a method for creating passphrases which are easy to remember, but hard to guess. @@ -90,15 +90,15 @@ To sum it up, diceware passphrases are your best option when you need something ## Storing Passwords -### Password Managers +### 비밀번호 관리자 -The best way to store your passwords is by using a password manager. They allow you to store your passwords in a file or in the cloud and protect them with a single master password. That way, you will only have to remember one strong password, which lets you access the rest of them. +비밀번호를 저장하는 가장 좋은 방법은 비밀번호 관리자를 사용하는 것입니다. They allow you to store your passwords in a file or in the cloud and protect them with a single master password. That way, you will only have to remember one strong password, which lets you access the rest of them. There are many good options to choose from, both cloud-based and local. Choose one of our recommended password managers and use it to establish strong passwords across all of your accounts. We recommend securing your password manager with a [diceware passphrase](#diceware-passphrases) comprised of at least seven words. [List of recommended password managers](../passwords.md ""){.md-button} -!!! warning "Don't place your passwords and TOTP tokens inside the same password manager" +!!! warning "비밀번호와 TOTP 토큰을 하나의 비밀번호 관리자에 저장하지 마세요" When using TOTP codes as [multi-factor authentication](../multi-factor-authentication.md), the best security practice is to keep your TOTP codes in a [separate app](../multi-factor-authentication.md#authenticator-apps). @@ -106,6 +106,6 @@ There are many good options to choose from, both cloud-based and local. Choose o Furthermore, we do not recommend storing single-use recovery codes in your password manager. Those should be stored separately such as in an encrypted container on an offline storage device. -### Backups +### 백업 -You should store an [encrypted](../encryption.md) backup of your passwords on multiple storage devices or a cloud storage provider. This can help you access your passwords if something happens to your primary device or the service you are using. +비밀번호를 [암호화하여](../encryption.md) 백업하고 여러 저장 장치 혹은 클라우드 서비스에 저장해야 합니다. 이렇게 함으로써 주로 사용하는 기기나 이용하는 서비스에 문제가 생기더라도 자신의 비밀번호에 접근할 수 있습니다. diff --git a/i18n/ko/basics/vpn-overview.md b/i18n/ko/basics/vpn-overview.md index bfbc0670..af1f31b8 100644 --- a/i18n/ko/basics/vpn-overview.md +++ b/i18n/ko/basics/vpn-overview.md @@ -11,7 +11,7 @@ Encryption protocols such as HTTPS are commonly used on the internet, so they ma A VPN can help as it can shift trust to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing into it. -## Should I use a VPN? +## VPN을 사용해야 하나요? **Yes**, unless you are already using Tor. A VPN does two things: shifting the risks from your Internet Service Provider to itself and hiding your IP from a third-party service. diff --git a/i18n/ko/desktop-browsers.md b/i18n/ko/desktop-browsers.md index 8ae0a230..a132bb92 100644 --- a/i18n/ko/desktop-browsers.md +++ b/i18n/ko/desktop-browsers.md @@ -1,8 +1,8 @@ --- -meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" +meta_title: "프라이버시 중점 PC, Mac용 웹 브라우저 - Privacy Guides" title: "데스크톱 브라우저" icon: material/laptop -description: These web browsers provide stronger privacy protections than Google Chrome. +description: Google Chrome보다 강력한 프라이버시 보호 기능을 제공하는 브라우저 목록입니다. schema: - "@context": http://schema.org @@ -56,30 +56,30 @@ schema: url: "./" --- -These are our currently recommended desktop web browsers and configurations for standard/non-anonymous browsing. We recommend [Mullvad Browser](#mullvad-browser) if you are focused on strong privacy protections and anti-fingerprinting out of the box, [Firefox](#firefox) for casual internet browsers looking for a good alternative to Google Chrome, and [Brave](#brave) if you need Chromium browser compatibility. +본 내용은 현재 표준/비익명 인터넷 탐색 용도로 권장되는 데스크톱 웹 브라우저 및 관련 설정 목록입니다. 강력한 프라이버시 보호 및 핑거프린팅 방지가 기본 제공되는 브라우저를 원하신다면 [Mullvad Browser](#mullvad-browser)를, 평범한 인터넷 브라우저 중 Google Chrome의 적절한 대체제를 원하신다면 [Firefox](#firefox)를, Chromium 브라우저 호환성이 필요하시다면 [Brave](#brave)를 추천드립니다. -If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. We make some configuration recommendations on this page, but all browsers other than Tor Browser will be traceable by *somebody* in some manner or another. +익명으로 인터넷을 탐색해야 하는 경우라면, [Tor](tor.md)를 사용해야 합니다. 본 내용에서 몇 가지 권장 설정을 알려드리고 있지만, Tor 브라우저를 제외한 모든 브라우저는 *누군가* 어떻게든 추적할 수 있습니다. ## Mullvad Browser !!! recommendation - { align=right } + { align=right } - **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. + **Mullvad Browser**는 [Tor 브라우저](tor.md#tor-browser)에서 Tor 네트워크 통합을 제거한 버전입니다. Tor 브라우저의 핑거프린팅 방지 브라우저 기술을 VPN 사용자에게 제공하는 것을 주된 목적으로 합니다. Tor 프로젝트에서 개발하고 [Mullvad](vpn.md#mullvad)에서 배포합니다. Mullvad VPN 사용이 필수적이지 **않습니다**. - [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } - [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} - [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" } + [:octicons-home-16: 홈페이지](https://mullvad.net/en/browser){ .md-button .md-button--primary } + [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="프라이버시 정책" } + [:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=문서} + [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="소스 코드" } - ??? downloads + ??? downloads "다운로드" - [:simple-windows11: Windows](https://mullvad.net/en/download/browser/windows) - [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos) - [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux) -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +[Tor 브라우저](tor.md)와 마찬가지로, Mullvad Browser는 브라우저 핑거프린트를 모든 Mullvad Browser 사용자끼리 동일하게 만들어 핑거프린팅을 방지하도록 설계되었습니다. 기본 보안 단계(*Standard*, *Safer*, *Safest*)에 따라 자동으로 설정되는 기본 설정 및 확장 프로그램을 포함하고 있습니다. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -222,9 +222,9 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand These options can be found in :material-menu: → **Settings**. -#### Settings +#### 설정 -##### Shields +##### 보호 Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. @@ -232,34 +232,34 @@ Shields' options can be downgraded on a per-site basis as needed, but by default
大規模な組織が、あなたのオンラインでの活動を監視しています。 Privacy Guidesはあなたがオンラインで自分自身を守るための、プライバシーとセキュリティに関するリソースです。
- + プライバシー保護を始める