diff --git a/i18n/ar/financial-services.md b/i18n/ar/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/ar/financial-services.md +++ b/i18n/ar/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/bn/financial-services.md b/i18n/bn/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/bn/financial-services.md +++ b/i18n/bn/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/cs/financial-services.md b/i18n/cs/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/cs/financial-services.md +++ b/i18n/cs/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/de/email.md b/i18n/de/email.md index 9f3786b0..0918e95b 100644 --- a/i18n/de/email.md +++ b/i18n/de/email.md @@ -102,9 +102,9 @@ Proton Mail doesn't offer a digital legacy feature. !!! recommendation - ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ align=right } + ![Mailbox.org-Logo](assets/img/email/mailboxorg.svg){ align=right } - **Mailbox.org** is an email service with a focus on being secure, ad-free, and privately powered by 100% eco-friendly energy. They have been in operation since 2014. Mailbox.org is based in Berlin, Germany. Accounts start with 2 GB of storage, which can be upgraded as needed. + **Mailbox.org** ist ein E-Mail-Dienst, mit dem Ziel sicher und werbefrei zu sein und der mit 100 % erneuerbaren Energien betrieben wird. Er ist 2014 gestartet. Mailbox.org hat seinen Sitz in Berlin, Deutschland. Der günstigste Tarif beginnt mit 2 GB Speicherplatz, der je nach Bedarf erweitert werden kann. [:octicons-home-16: Homepage](https://mailbox.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://mailbox.org/en/data-protection-privacy-policy){ .card-link title="Privacy Policy" } @@ -114,19 +114,19 @@ Proton Mail doesn't offer a digital legacy feature. - [:octicons-browser-16: Web](https://login.mailbox.org) -#### :material-check:{ .pg-green } Custom Domains and Aliases +#### :material-check:{ .pg-green } Eigene Domains und Aliase -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Bei Mailbox.org kannst du deine eigene Domain verwenden, und sie unterstützen [Catch-All](https://kb.mailbox.org/de/privat/e-mail-mit-eigener-domain/eine-eigene-domain-mit-catch-all-benutzen) Adressen. Mailbox.org unterstützt auch die [Subadressierung/Aliasse](https://kb.mailbox.org/de/privat/e-mail-artikel/was-sind-aliasse-und-wie-nutze-ich-sie), was hilfreich ist, wenn du keine Domain kaufen möchtest. -#### :material-check:{ .pg-green } Private Payment Methods +#### :material-check:{ .pg-green } Diskrete Zahlungsmöglichkeiten -Mailbox.org doesn't accept any cryptocurrencies as a result of their payment processor BitPay suspending operations in Germany. However, they do accept Cash by mail, cash payment to bank account, bank transfer, credit card, PayPal and couple of German-specific processors: paydirekt and Sofortüberweisung. +Mailbox.org akzeptiert keine Kryptowährungen, da deren Zahlungsanbieter BitPay seinen Betrieb in Deutschland eingestellt hat. Sie akzeptieren jedoch Bargeld per Post, Barzahlung auf ein Bankkonto, Banküberweisung, Kreditkarte, PayPal und einige Deutschland spezifische Anbieter: paydirekt und Sofortüberweisung. -#### :material-check:{ .pg-green } Account Security +#### :material-check:{ .pg-green } Kontosicherheit -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org unterstützt [Zwei-Faktor-Authentifizierung](https://kb.mailbox.org/de/privat/sicherheit-privatsphaere-artikel/die-zwei-faktor-authentifizierung-einrichten) nur für Webmail. Du kannst entweder TOTP oder einen [YubiKey](https://de.wikipedia.org/wiki/Yubikey) über die [YubiCloud](https://www.yubico.com/products/services-software/yubicloud)verwenden. Webstandards wie [WebAuthn](https://de.wikipedia.org/wiki/WebAuthn) werden noch nicht unterstützt. -#### :material-information-outline:{ .pg-blue } Data Security +#### :material-information-outline:{ .pg-blue } Datensicherheit Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. @@ -190,7 +190,7 @@ StartMail accepts Visa, MasterCard, American Express and Paypal. StartMail also StartMail supports TOTP two factor authentication [for webmail only](https://support.startmail.com/hc/en-us/articles/360006682158-Two-factor-authentication-2FA). They do not allow U2F security key authentication. -#### :material-information-outline:{ .pg-blue } Data Security +#### :material-information-outline:{ .pg-blue } Datensicherheit StartMail has [zero access encryption at rest](https://www.startmail.com/en/whitepaper/#_Toc458527835), using their "user vault" system. When you log in, the vault is opened, and the email is then moved to the vault out of the queue where it is decrypted by the corresponding private key. diff --git a/i18n/de/financial-services.md b/i18n/de/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/de/financial-services.md +++ b/i18n/de/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/de/index.md b/i18n/de/index.md index 90dc1c36..c3342424 100644 --- a/i18n/de/index.md +++ b/i18n/de/index.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Guides: Your Independent Privacy and Security Resource" +meta_title: "Privacy Guides: Deine unabhängige Quelle für Datenschutz und Sicherheit" template: overrides/home.de.html hide: - navigation @@ -40,9 +40,9 @@ schema: ##### "Ich habe nichts zu verbergen. Warum sollte ich mir Sorgen um meine Privatsphäre machen?" -Ähnlich wie das Recht auf gemischtrassige Ehen, das Frauenwahlrecht, das Recht auf freie Meinungsäußerung und viele andere wurde unser Recht auf Privatsphäre nicht immer gewährt. In einigen Diktaturen ist das immer noch der Fall. Generationen vor uns haben für unser Recht auf Privatsphäre gekämpft. ==Privatsphäre ist ein Menschenrecht, das uns allen innewohnt,== auf das wir (ohne Diskriminierung) Anspruch haben. +Ähnlich wie das Recht auf gemischtrassige Ehen, das Frauenwahlrecht, das Recht auf freie Meinungsäußerung und viele andere wurde unser Recht auf Privatsphäre nicht immer gewährt. In einigen Diktaturen ist das immer noch der Fall. Generationen vor uns haben für unser Recht auf Privatsphäre gekämpft. ==Privatsphäre ist ein Menschenrecht, das für uns alle gilt,== auf das jeder (egal welches Alter, Geschlecht, Herkunft, Religion, ...) Anspruch hat. -Privatsphäre sollte nicht mit Geheimhaltung verwechselt werden. Wir wissen, was auf der Toilette passiert, aber machen trotzdem die Tür zu. Das liegt daran, dass wir Privatsphäre wollen, keine Geheimhaltung. **Alle** haben etwas zu schützen. Privatsphäre ist etwas, das uns menschlich macht. +Privatsphäre sollte nicht mit Verheimlichen verwechselt werden. Wir wissen, was auf der Toilette passiert, aber machen trotzdem die Tür zu. Das liegt daran, dass du deine Privatsphäre willst, aber nicht unbedingt alles verheimlichen willst. **Alle** haben etwas zu schützen. Privatsphäre ist etwas, das uns zum Menschen macht. [:material-target-account: Common Internet Threats](basics/common-threats.md){ class="md-button md-button--primary" } diff --git a/i18n/el/financial-services.md b/i18n/el/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/el/financial-services.md +++ b/i18n/el/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/eo/financial-services.md b/i18n/eo/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/eo/financial-services.md +++ b/i18n/eo/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/es/android.md b/i18n/es/android.md index c4973af4..cdc9e556 100644 --- a/i18n/es/android.md +++ b/i18n/es/android.md @@ -1,5 +1,5 @@ --- -meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" +meta_title: "Recomendaciones Android: GrapheneOS y DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Puedes sustituir el sistema operativo de tu teléfono Android por estas alternativas seguras y respetuosas con la privacidad. @@ -225,7 +225,7 @@ En este sitio recomendamos una amplia variedad de aplicaciones para Android. Las ![Auditor logo](assets/img/android/auditor.svg#only-light){ align=right } ![Auditor logo](assets/img/android/auditor-dark.svg#only-dark){ align=right } - **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support). + **Auditor** es una aplicación que aprovecha las funciones de seguridad del hardware para supervisar la integridad de los dispositivos mediante la validación activa de la identidad de un dispositivo y la integridad de su sistema operativo. Actualmente, sólo funciona con GrapheneOS o con el sistema operativo stock para [dispositivos compatibles](https://attestation.app/about#device-support). [:octicons-home-16: Página Principal](https://attestation.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Politica de Privacidad" } diff --git a/i18n/es/basics/account-creation.md b/i18n/es/basics/account-creation.md index 61d7869d..847ceb38 100644 --- a/i18n/es/basics/account-creation.md +++ b/i18n/es/basics/account-creation.md @@ -1,5 +1,5 @@ --- -meta_title: "How to Create Internet Accounts Privately - Privacy Guides" +meta_title: "Cómo Crear Cuentas de Internet Privadas - Privacy Guides" title: "Creación de cuenta" icon: 'material/account-plus' description: Crear cuentas en línea es prácticamente una necesidad en Internet, sigue estos pasos para asegurarte de mantener tu privacidad. diff --git a/i18n/es/basics/email-security.md b/i18n/es/basics/email-security.md index 8997316f..82984c49 100644 --- a/i18n/es/basics/email-security.md +++ b/i18n/es/basics/email-security.md @@ -1,5 +1,5 @@ --- -meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides" +meta_title: "Por Qué el Correo Electrónico No es la Mejor Opción para la Privacidad y la Seguridad - Privacy Guides" title: Seguridad del correo electrónico icon: material/email description: El correo electrónico es intrínsecamente inseguro en muchos aspectos, y éstas son algunas de las razones por las que no es nuestra primera opción para las comunicaciones seguras. @@ -23,7 +23,7 @@ Los proveedores de correo electrónico que permiten utilizar protocolos de acces ### ¿Cómo puedo proteger mis claves privadas? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. El mensaje es entonces descifrado por la tarjeta inteligente y el contenido descifrado es enviado de vuelta al dispositivo. +Una tarjeta inteligente (como una [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) o una [Nitrokey](https://www.nitrokey.com)) funciona recibiendo un mensaje de correo electrónico cifrado desde un dispositivo (teléfono, tableta, ordenador, etc.) que ejecuta un cliente de correo electrónico/correo web. El mensaje es entonces descifrado por la tarjeta inteligente y el contenido descifrado es enviado de vuelta al dispositivo. Es ventajoso que el descifrado ocurra en la tarjeta inteligente para evitar la posible exposición de tu clave privada a un dispositivo comprometido. diff --git a/i18n/es/basics/threat-modeling.md b/i18n/es/basics/threat-modeling.md index c7eee6ce..831fc90b 100644 --- a/i18n/es/basics/threat-modeling.md +++ b/i18n/es/basics/threat-modeling.md @@ -1,8 +1,8 @@ --- -meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides" +meta_title: "Modelado de Amenazas: El Primer Paso en el Camino hacia la Privacidad - Privacy Guides" title: "¿Qué son los modelos de amenaza?" icon: 'material/target-account' -description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. +description: Equilibrar la seguridad, privacidad y usabilidad es una de las primeras y más difíciles tareas a las que te enfrentarás en tu camino a la privacidad. --- Equilibrar la seguridad, privacidad y usabilidad es una de las primeras y más difíciles tareas a las que te enfrentarás en tu camino de privacidad. Todo es un intercambio: Entre más seguro algo es, más restrictivo o inconveniente suele ser, etc. A menudo, gente encuentra que el problema con las herramientas que ven recomendadas es que son demasiado difíciles de comenzar a usar! diff --git a/i18n/es/basics/vpn-overview.md b/i18n/es/basics/vpn-overview.md index 4ff8e27a..7f250dbd 100644 --- a/i18n/es/basics/vpn-overview.md +++ b/i18n/es/basics/vpn-overview.md @@ -1,5 +1,5 @@ --- -meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides" +meta_title: "¿Cómo Protegen Tu Privacidad las VPN? Nuestra Vista General de las VPN - Privacy Guides" title: Vista general de VPN icon: material/vpn description: Las Redes Privadas Virtuales desplazan el riesgo de tu proveedor de Internet a un tercero quien confías. Debes tener en cuenta estas cosas. diff --git a/i18n/es/cloud.md b/i18n/es/cloud.md index 1ef7bafe..fa18ff9a 100644 --- a/i18n/es/cloud.md +++ b/i18n/es/cloud.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides" +meta_title: "Los Mejores Proveedores de Almacenamiento en la Nube Privado y Seguro - Privacy Guides" title: "Almacenamiento en la Nube" icon: material/file-cloud description: Muchos proveedores de almacenamiento en la nube exigen que confíes plenamente en que no mirarán tus archivos. Estas son alternativas privadas. diff --git a/i18n/es/cryptocurrency.md b/i18n/es/cryptocurrency.md index 3cf6c325..40a803fc 100644 --- a/i18n/es/cryptocurrency.md +++ b/i18n/es/cryptocurrency.md @@ -1,5 +1,5 @@ --- -meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" +meta_title: "Blockchains Privadas de Criptomonedas - Privacy Guides" title: Criptomonedas icon: material/bank-circle --- diff --git a/i18n/es/data-redaction.md b/i18n/es/data-redaction.md index 476bf51a..2d6e13d0 100644 --- a/i18n/es/data-redaction.md +++ b/i18n/es/data-redaction.md @@ -1,5 +1,5 @@ --- -meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides" +meta_title: "Eliminar PII con Depuradores de Metadatos y Herramientas de Edición de Datos - Privacy Guides" title: "Redacción de Datos y Metadatos" icon: material/tag-remove description: Utiliza estas herramientas para eliminar metadatos como la ubicación GPS y otros datos identificativos de las fotos y archivos que compartas. diff --git a/i18n/es/desktop-browsers.md b/i18n/es/desktop-browsers.md index 7c2aefc0..a6ecbb5a 100644 --- a/i18n/es/desktop-browsers.md +++ b/i18n/es/desktop-browsers.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" +meta_title: "Navegadores Web para PC y Mac que Respetan la Privacidad - Privacy Guides" title: "Navegadores de Escritorio" icon: material/laptop description: Estos navegadores web ofrecen protecciones de privacidad más sólidas que Google Chrome. diff --git a/i18n/es/email.md b/i18n/es/email.md index 90a84442..9901ccdb 100644 --- a/i18n/es/email.md +++ b/i18n/es/email.md @@ -1,5 +1,5 @@ --- -meta_title: "Encrypted Private Email Recommendations - Privacy Guides" +meta_title: "Recomendaciones de Correo Electrónico Privado Cifrado - Privacy Guides" title: "Servicios de Correo Electrónico" icon: material/email description: Estos proveedores de correo electrónico ofrecen un lugar estupendo para almacenar tus correos de forma segura, y muchos ofrecen encriptación OpenPGP inter operable con otros proveedores. @@ -124,7 +124,7 @@ Mailbox.org no acepta criptomonedas debido a que su procesador de pagos BitPay s #### :material-check:{ .pg-green } Seguridad de Cuenta -Mailbox.org soporta [autenticación de doble factor](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo para su correo web. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Estándares web como [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) aún no son soportados. +Mailbox.org soporta [autenticación de doble factor](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo para su correo web. Puede utilizar TOTP o una [YubiKey](https://en.wikipedia.org/wiki/YubiKey) a través de [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Estándares web como [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) aún no son soportados. #### :material-information-outline:{ .pg-blue } Seguridad de Datos diff --git a/i18n/es/encryption.md b/i18n/es/encryption.md index 160713c4..aa44e482 100644 --- a/i18n/es/encryption.md +++ b/i18n/es/encryption.md @@ -1,5 +1,5 @@ --- -meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides" +meta_title: "Software de Cifrado Recomendado:: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides" title: "Software de Cifrado" icon: material/file-lock description: El cifrado de los datos es la única forma de controlar quién puede acceder a ellos. Estas herramientas le permiten cifrar sus correos electrónicos y cualquier otro archivo. diff --git a/i18n/es/financial-services.md b/i18n/es/financial-services.md index 557167ba..710327ee 100644 --- a/i18n/es/financial-services.md +++ b/i18n/es/financial-services.md @@ -76,7 +76,7 @@ Estos servicios le permiten comprar tarjetas de regalo para una gran variedad de ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (disponible en EE.UU., Canadá y Reino Unido) le permite comprar tarjetas regalo para una gran variedad de comercios. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Página Principal](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Política de Privacidad" } diff --git a/i18n/es/index.md b/i18n/es/index.md index 4472b4b9..29455227 100644 --- a/i18n/es/index.md +++ b/i18n/es/index.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Guides: Your Independent Privacy and Security Resource" +meta_title: "Privacy Guides: Tu Recurso Independiente sobre Privacidad y Seguridad" template: overrides/home.es.html hide: - navigation diff --git a/i18n/es/mobile-browsers.md b/i18n/es/mobile-browsers.md index 44c10068..074c2ed0 100644 --- a/i18n/es/mobile-browsers.md +++ b/i18n/es/mobile-browsers.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides" +meta_title: "Navegadores Móviles para Android e iOS que Respetan la Privacidad - Privacy Guides" title: "Navegadores Móviles" icon: material/cellphone-information description: Estos navegadores son los que recomendamos actualmente para la navegación estándar/no anónima por Internet en su teléfono. diff --git a/i18n/es/multi-factor-authentication.md b/i18n/es/multi-factor-authentication.md index e9cc4c5d..af43b577 100644 --- a/i18n/es/multi-factor-authentication.md +++ b/i18n/es/multi-factor-authentication.md @@ -49,7 +49,7 @@ Para los modelos que admiten HOTP y TOTP, hay 3 ranuras para HOTP y 15 para TOTP !!! warning "Advertencia" - Aunque las Nitrokeys no revelan los secretos HOTP/TOTP al dispositivo al que están conectadas, el almacenamiento HOTP y TOTP **no** está cifrado y es vulnerable a ataques físicos. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead. + Aunque las Nitrokeys no revelan los secretos HOTP/TOTP al dispositivo al que están conectadas, el almacenamiento HOTP y TOTP **no** está cifrado y es vulnerable a ataques físicos. Si desea almacenar con HOTP o TOTP estos secretos, le recomendamos encarecidamente que utilice un YubiKey en su lugar. !!! warning "Advertencia" diff --git a/i18n/es/passwords.md b/i18n/es/passwords.md index ccec48d9..6371879a 100644 --- a/i18n/es/passwords.md +++ b/i18n/es/passwords.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides" +meta_title: "Los Mejores Administradores de Contraseñas para Proteger su Privacidad y Seguridad - Privacy Guides" title: "Administradores de Contraseñas" icon: material/form-textbox-password description: Los administradores de contraseñas le permiten almacenar y administrar de forma segura contraseñas y otras credenciales. diff --git a/i18n/es/real-time-communication.md b/i18n/es/real-time-communication.md index aaed91ad..173a5158 100644 --- a/i18n/es/real-time-communication.md +++ b/i18n/es/real-time-communication.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Private Instant Messengers - Privacy Guides" +meta_title: "Los Mejores Servicios de Mensajería Instantánea - Privacy Guides" title: "Comunicación en Tiempo Real" icon: material/chat-processing description: Otros servicios de mensajería instantánea ponen todas sus conversaciones privadas a disposición de la empresa que los gestiona. diff --git a/i18n/es/search-engines.md b/i18n/es/search-engines.md index 18ec604e..ffd6d586 100644 --- a/i18n/es/search-engines.md +++ b/i18n/es/search-engines.md @@ -1,5 +1,5 @@ --- -meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides" +meta_title: "Motores de Búsqueda Recomendados: Alternativas Anónimas a Google - Privacy Guides" title: "Motores de Búsqueda" icon: material/search-web description: Estos motores de búsqueda respetuosos con la privacidad no construyen un perfil publicitario basado en sus búsquedas. diff --git a/i18n/es/tools.md b/i18n/es/tools.md index 1ce9b503..dc2b57c4 100644 --- a/i18n/es/tools.md +++ b/i18n/es/tools.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides" +meta_title: "Las Mejores Herramientas de Privacidad, Servicios y Recomendaciones Sin Publicidad - Privacy Guides" title: "Herramientas de Privacidad" icon: material/tools hide: diff --git a/i18n/es/tor.md b/i18n/es/tor.md index 61159391..983ed66d 100644 --- a/i18n/es/tor.md +++ b/i18n/es/tor.md @@ -1,5 +1,5 @@ --- -meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" +meta_title: "Navegador y Red Tor: Navegación Web Anónima - Privacy Guides" title: "Red Tor" icon: simple/torproject description: Protege tu navegación por Internet de miradas intrusas utilizando la red Tor, una red segura que elude la censura. @@ -10,8 +10,8 @@ schema: name: Tor Browser image: /assets/img/browsers/tor.svg url: https://www.torproject.org - sameAs: https://en.wikipedia.org/wiki/Tor_(network) - applicationCategory: Web Browser + sameAs: https://es.wikipedia.org/wiki/Tor_(red_de_anonimato) + applicationCategory: Navegador Web operatingSystem: - Windows - macOS diff --git a/i18n/es/vpn.md b/i18n/es/vpn.md index b1dab8cf..3d3a1a37 100644 --- a/i18n/es/vpn.md +++ b/i18n/es/vpn.md @@ -1,5 +1,5 @@ --- -meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides" +meta_title: "Recomendaciones y Comparación de Servicios VPN Privados, Sin Patrocinadores Ni Anuncios - Privacy Guides" title: "Servicios de VPN" icon: material/vpn description: Estos son los mejores servicios VPN para proteger tu privacidad y seguridad en línea. Encuentra un proveedor aquí que no esté para espiarte. diff --git a/i18n/fa/financial-services.md b/i18n/fa/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/fa/financial-services.md +++ b/i18n/fa/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/fr/android.md b/i18n/fr/android.md index efa7921a..94c61cdb 100644 --- a/i18n/fr/android.md +++ b/i18n/fr/android.md @@ -1,5 +1,5 @@ --- -meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" +meta_title: "Recommandations Android : GrapheneOS et DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' description: Vous pouvez remplacer le système d'exploitation de votre téléphone Android par ces alternatives sécurisées et respectueuses de la vie privée. @@ -222,10 +222,10 @@ Nous recommandons une grande variété d'applications Android sur ce site. Les a !!! recommendation - ![Auditor logo](assets/img/android/auditor.svg#only-light){ align=right } - ![Auditor logo](assets/img/android/auditor-dark.svg#only-dark){ align=right } + ![Logo d'Auditor](assets/img/android/auditor.svg#only-light){ align=right } + ![Logo d'Auditor](assets/img/android/auditor-dark.svg#only-dark){ align=right } - **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support). + **Auditor** est une application qui exploite les fonctions de sécurité matérielle pour assurer le contrôle de l'intégrité d'un appareil en validant activement son identité et l'intégrité de son système d'exploitation. Actuellement, elle ne fonctionne qu'avec GrapheneOS ou le système d'exploitation de base pour les [appareils pris en charge](https://attestation.app/about#device-support). [:octicons-home-16: Page d'accueil](https://attestation.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Politique de confidentialité" } diff --git a/i18n/fr/basics/account-creation.md b/i18n/fr/basics/account-creation.md index 1e90d8ec..5adc0924 100644 --- a/i18n/fr/basics/account-creation.md +++ b/i18n/fr/basics/account-creation.md @@ -1,5 +1,5 @@ --- -meta_title: "How to Create Internet Accounts Privately - Privacy Guides" +meta_title: "Comment créer des comptes internet de façon privée - Privacy Guides" title: "Création de compte" icon: 'material/account-plus' description: La création de comptes en ligne est pratiquement une nécessité sur internet, prenez ces mesures pour vous assurer de rester privé. diff --git a/i18n/fr/basics/email-security.md b/i18n/fr/basics/email-security.md index b6081683..6b3c4130 100644 --- a/i18n/fr/basics/email-security.md +++ b/i18n/fr/basics/email-security.md @@ -1,5 +1,5 @@ --- -meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides" +meta_title: "Pourquoi le courrier électronique n'est pas le meilleur choix en matière de protection de la vie privée et de sécurité - Privacy Guides" title: Sécurité des emails icon: material/email description: L'email est intrinsèquement peu sûr à bien des égards, et voici quelques-unes des raisons pour lesquelles il n'est pas notre premier choix en matière de communications sécurisées. @@ -23,7 +23,7 @@ Les fournisseurs d'emails qui vous permettent d'utiliser les protocoles d'accès ### Comment Puis-Je Protéger Mes Clés Privées? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Le message est ensuite déchiffré par la carte à puce et le contenu déchiffré est renvoyé à l'appareil. +Une carte à puce (telle qu'une [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) ou [Nitrokey](https://www.nitrokey.com)) fonctionne en recevant un email chiffré d'un appareil (téléphone, tablette, ordinateur, etc.) exécutant un client mail/webmail. Le message est ensuite déchiffré par la carte à puce et le contenu déchiffré est renvoyé à l'appareil. Il est avantageux que le déchiffrement se fasse sur la carte à puce afin d'éviter d'exposer votre clé privée à un dispositif compromis. diff --git a/i18n/fr/basics/threat-modeling.md b/i18n/fr/basics/threat-modeling.md index 725b4218..0e22e544 100644 --- a/i18n/fr/basics/threat-modeling.md +++ b/i18n/fr/basics/threat-modeling.md @@ -1,11 +1,11 @@ --- -meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides" +meta_title: "Modélisation des menaces : la première étape de votre parcours en matière de protection de la vie privée - Privacy Guides" title: "Modélisation des menaces" icon: 'material/target-account' -description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. +description: Trouver le bon équilibre entre la sécurité, la confidentialité et la commodité est l'une des premières et plus difficiles tâches que vous aurez à accomplir dans votre parcours pour regagner votre vie privée en ligne. --- -Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Tout est une histoire de compromis : plus quelque chose est sécurisé, plus il est limité ou peu pratique, etc. Souvent, les gens trouvent que le problème avec les outils qui leurs sont recommandés est qu'ils sont trop difficiles à utiliser ! +Trouver le bon équilibre entre la sécurité, la confidentialité et la commodité est l'une des premières et plus difficiles tâches que vous aurez à accomplir dans votre parcours pour regagner votre vie privée en ligne. Tout est une histoire de compromis : plus quelque chose est sécurisé, plus il est limité ou peu pratique, etc. Souvent, les gens trouvent que le problème avec les outils qui leurs sont recommandés est qu'ils sont trop difficiles à utiliser ! Si vous vouliez utiliser les outils les **plus** sécurisés actuellement disponibles, vous devriez sacrifier *beaucoup* de commodité. Et même dans ce cas, ==rien n'est jamais totalement sécurisé.== On parle de sécurité **élevée**, mais jamais de sécurité **totale**. C'est pourquoi les modèles de menace sont importants. @@ -41,7 +41,7 @@ Selon l'identité de vos adversaires, dans certaines circonstances, cette liste ### Quelle est la probabilité que je doive le protéger ? -==Le risque est la probabilité qu'une menace particulière contre un actif particulier se produise réellement. Il va de pair avec la capacité. Si votre opérateur de téléphonie mobile a la capacité d'accéder à toutes vos données, le risque qu'il publie vos données privées en ligne pour nuire à votre réputation est faible. +==Le risque est la probabilité qu'une menace particulière contre un actif particulier se produise réellement.== Il va de pair avec la capacité. Si votre opérateur de téléphonie mobile a la capacité d'accéder à toutes vos données, le risque qu'il publie vos données privées en ligne pour nuire à votre réputation est faible. Il est important de faire la distinction entre ce qui pourrait se produire et la probabilité que cela se produise. Par exemple, votre bâtiment risque de s'effondrer, mais le risque que cela se produise est bien plus grand à San Francisco (où les tremblements de terre sont fréquents) qu'à Stockholm (où ils ne le sont pas). diff --git a/i18n/fr/basics/vpn-overview.md b/i18n/fr/basics/vpn-overview.md index 18cf8e07..8bd682a0 100644 --- a/i18n/fr/basics/vpn-overview.md +++ b/i18n/fr/basics/vpn-overview.md @@ -1,5 +1,5 @@ --- -meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides" +meta_title: "Comment les VPNs protègent-ils votre vie privée ? Notre introduction aux VPNs - Privacy Guides" title: Introduction aux VPNs icon: material/vpn description: Les réseaux privés virtuels déplacent le risque de votre FAI à un tiers en qui vous avez confiance. Vous devriez garder ces éléments à l'esprit. diff --git a/i18n/fr/cloud.md b/i18n/fr/cloud.md index 9afbbf71..90a3cc08 100644 --- a/i18n/fr/cloud.md +++ b/i18n/fr/cloud.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides" +meta_title: "Les meilleurs services de stockage cloud privés et sécurisés - Privacy Guides" title: "Stockage cloud" icon: material/file-cloud description: De nombreux fournisseurs de stockage cloud nécessitent que vous leur fassiez confiance pour ne pas consulter vos fichiers. Voici des alternatives privées ! diff --git a/i18n/fr/cryptocurrency.md b/i18n/fr/cryptocurrency.md index 718eb7a8..f49e4b19 100644 --- a/i18n/fr/cryptocurrency.md +++ b/i18n/fr/cryptocurrency.md @@ -1,5 +1,5 @@ --- -meta_title: "Private Cryptocurrency Blockchains - Privacy Guides" +meta_title: "Chaînes de blocs de crypto-monnaies privées - Privacy Guides" title: Crypto-monnaie icon: material/bank-circle --- diff --git a/i18n/fr/data-redaction.md b/i18n/fr/data-redaction.md index 6b27a444..8eea003b 100644 --- a/i18n/fr/data-redaction.md +++ b/i18n/fr/data-redaction.md @@ -1,5 +1,5 @@ --- -meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides" +meta_title: "Supprimer les DCP à l'aide de nettoyeurs de métadonnées et d'outils de suppression des données - Privacy Guides" title: "Rédaction de données et de métadonnées" icon: material/tag-remove description: Utilisez ces outils pour supprimer les métadonnées telles que la position GPS et d'autres informations d'identification des photos et des fichiers que vous partagez. diff --git a/i18n/fr/desktop-browsers.md b/i18n/fr/desktop-browsers.md index f122a304..22938d75 100644 --- a/i18n/fr/desktop-browsers.md +++ b/i18n/fr/desktop-browsers.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" +meta_title: "Navigateurs web respectueux de la vie privée pour PC et Mac - Privacy Guides" title: "Navigateurs de bureau" icon: material/laptop description: Ces navigateurs web offrent des protections de la vie privée plus solides que Google Chrome. @@ -79,13 +79,13 @@ Si vous avez besoin de naviguer anonymement sur Internet, vous devriez plutôt u - [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos) - [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux) -Comme le [Navigateur Tor](tor.md), le Navigateur Mullvad est conçu pour empêcher la prise d'empreintes numérique en rendant l'empreinte numérique de votre navigateur identique à celle de tous les autres utilisateurs du Navigateur Mullvad, et il inclut des paramètres par défaut et des extensions qui sont automatiquement configurés par les niveaux de sécurité par défaut : *Standard*, *Safer* et *Safest*. Il est donc impératif de ne pas modifier le navigateur mis à part l'ajustement des [niveaux de sécurité](https://tb-manual.torproject.org/security-settings/) par défaut. D'autres modifications rendraient votre empreinte numérique unique, ce qui irait à l'encontre de l'objectif poursuivi par l'utilisation de ce navigateur. Si vous souhaitez configurer votre navigateur de manière plus poussée et que la prise d'empreintes numérique ne vous préoccupe pas, nous vous recommandons plutôt [Firefox](#firefox). +Comme le [Navigateur Tor](tor.md), le Navigateur Mullvad est conçu pour empêcher la prise d'empreintes numériques en rendant l'empreinte numérique de votre navigateur identique à celle de tous les autres utilisateurs du Navigateur Mullvad, et il inclut des paramètres par défaut et des extensions qui sont automatiquement configurés par les niveaux de sécurité par défaut : *Standard*, *Safer* et *Safest*. Il est donc impératif de ne pas modifier le navigateur mis à part l'ajustement des [niveaux de sécurité](https://tb-manual.torproject.org/security-settings/) par défaut. D'autres modifications rendraient votre empreinte numérique unique, ce qui irait à l'encontre de l'objectif poursuivi par l'utilisation de ce navigateur. Si vous souhaitez configurer votre navigateur de manière plus poussée et que la prise d'empreintes numériques ne vous préoccupe pas, nous vous recommandons plutôt [Firefox](#firefox). ### Système anti-empreintes numériques -**Sans** utiliser un [VPN](vpn.md), le Navigateur Mullvad offre les mêmes protections contre [les scripts d'empreintes numérique naïfs](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) que d'autres navigateurs privés comme Firefox+[Arkenfox](#arkenfox-advanced) ou [Brave](#brave). Le Navigateur Mullvad fournit ces protections dès le départ, au détriment d'une certaine flexibilité et d'une commodité que d'autres navigateurs privés peuvent offrir. +**Sans** utiliser un [VPN](vpn.md), le Navigateur Mullvad offre les mêmes protections contre [les scripts d'empreintes numériques naïfs](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-%5BTo-RFP-or-Not%5D#-fingerprinting) que d'autres navigateurs privés comme Firefox+[Arkenfox](#arkenfox-advanced) ou [Brave](#brave). Le Navigateur Mullvad fournit ces protections dès le départ, au détriment d'une certaine flexibilité et d'une commodité que d'autres navigateurs privés peuvent offrir. -==Pour une protection anti-empreintes numérique optimale, nous recommandons d'utiliser le Navigateur Mullvad en conjonction **avec** un VPN==, qu'il s'agisse de Mullvad ou d'un autre fournisseur de VPN recommandé. Lorsque vous utilisez un VPN avec le Navigateur Mullvad, vous partagez une empreinte numérique et un ensemble d'adresses IP avec de nombreux autres utilisateurs, ce qui vous permet de vous fondre dans la "foule". Cette stratégie est le seul moyen de contrecarrer les scripts de pistage avancés, et c'est la même technique anti-empreintes numérique utilisée par le Navigateur Tor. +==Pour une protection anti-empreintes numériques optimale, nous recommandons d'utiliser le Navigateur Mullvad en conjonction **avec** un VPN==, qu'il s'agisse de Mullvad ou d'un autre fournisseur de VPN recommandé. Lorsque vous utilisez un VPN avec le Navigateur Mullvad, vous partagez une empreinte numérique et un ensemble d'adresses IP avec de nombreux autres utilisateurs, ce qui vous permet de vous fondre dans la "foule". Cette stratégie est le seul moyen de contrecarrer les scripts de pistage avancés, et c'est la même technique anti-empreintes numériques utilisée par le Navigateur Tor. Notez que si vous pouvez utiliser le Navigateur Mullvad avec n'importe quel fournisseur de VPN, d'autres personnes sur ce VPN doivent également utiliser le Navigateur Mullvad pour que cette "foule" existe, ce qui est plus probable sur le VPN Mullvad par rapport à d'autres fournisseurs, en particulier si peu de temps après le lancement du Navigateur Mullvad. Le Navigateur Mullvad ne dispose pas d'une connectivité VPN intégrée et ne vérifie pas non plus si vous utilisez un VPN avant de naviguer ; votre connexion VPN doit être configurée et gérée séparément. diff --git a/i18n/fr/email.md b/i18n/fr/email.md index dd88472b..afdbf89e 100644 --- a/i18n/fr/email.md +++ b/i18n/fr/email.md @@ -1,5 +1,5 @@ --- -meta_title: "Encrypted Private Email Recommendations - Privacy Guides" +meta_title: "Recommandations de fournisseurs d'email privés et chiffrés - Privacy Guides" title: "Services d'email" icon: material/email description: Ces fournisseurs d'email constituent un excellent moyen de stocker vos emails en toute sécurité, et nombre d'entre eux proposent un système de chiffrement OpenPGP interopérable avec d'autres fournisseurs. @@ -124,7 +124,7 @@ Mailbox.org n'accepte aucune crypto-monnaie en raison de la suspension des activ #### :material-check:{ .pg-green } Sécurité du compte -Mailbox.org prend en charge l'[authentification à deux facteurs](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) pour son webmail uniquement. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Les normes web telles que [WebAuthn](https://fr.wikipedia.org/wiki/WebAuthn) ne sont pas encore prises en charge. +Mailbox.org prend en charge l'[authentification à deux facteurs](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) pour son webmail uniquement. Vous pouvez utiliser soit TOTP, soit une [YubiKey](https://fr.wikipedia.org/wiki/YubiKey) via le [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Les normes web telles que [WebAuthn](https://fr.wikipedia.org/wiki/WebAuthn) ne sont pas encore prises en charge. #### :material-information-outline:{ .pg-blue } Sécurité des données diff --git a/i18n/fr/encryption.md b/i18n/fr/encryption.md index 5d4ea3b1..8385cfcf 100644 --- a/i18n/fr/encryption.md +++ b/i18n/fr/encryption.md @@ -1,5 +1,5 @@ --- -meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides" +meta_title: "Logiciels de chiffrement recommandés : VeraCrypt, Cryptomator, PicoCrypt et OpenPGP - Privacy Guides" title: "Logiciels de chiffrement" icon: material/file-lock description: Le chiffrement des données est le seul moyen de contrôler qui peut y accéder. Ces outils vous permettent de chiffrer vos emails et tout autre fichier. diff --git a/i18n/fr/financial-services.md b/i18n/fr/financial-services.md index cd0982af..bda6cde8 100644 --- a/i18n/fr/financial-services.md +++ b/i18n/fr/financial-services.md @@ -74,9 +74,9 @@ Ces services vous permettent d'acheter des cartes-cadeaux pour une variété de !!! recommendation - ![Logo CakePay](assets/img/financial-services/coincards.svg){ align=right } + ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (disponible aux États-Unis, au Canada et au Royaume-Uni) vous permet d'acheter des cartes-cadeaux auprès d'un grand nombre de commerçants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Page d'accueil](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Politique de confidentialité" } diff --git a/i18n/fr/index.md b/i18n/fr/index.md index 1b35660b..e70e59ef 100644 --- a/i18n/fr/index.md +++ b/i18n/fr/index.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Guides: Your Independent Privacy and Security Resource" +meta_title: "Privacy Guides : votre ressource indépendante en matière de protection de la vie privée et de sécuritéPrivacy Guides" template: overrides/home.fr.html hide: - navigation diff --git a/i18n/fr/mobile-browsers.md b/i18n/fr/mobile-browsers.md index d6bd59b3..44efe66c 100644 --- a/i18n/fr/mobile-browsers.md +++ b/i18n/fr/mobile-browsers.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides" +meta_title: "Navigateurs web respectueux de la vie privée pour Android et iOS - Privacy Guides" title: "Navigateurs mobiles" icon: material/cellphone-information description: Ces navigateurs sont ceux que nous recommandons actuellement pour la navigation internet standard/non anonyme sur votre téléphone. diff --git a/i18n/fr/multi-factor-authentication.md b/i18n/fr/multi-factor-authentication.md index 37dffc03..02dd72a8 100644 --- a/i18n/fr/multi-factor-authentication.md +++ b/i18n/fr/multi-factor-authentication.md @@ -49,7 +49,7 @@ Pour les modèles qui supportent HOTP et TOTP, il y a 3 emplacements pour HOTP e !!! warning "Avertissement" - Bien que les Nitrokeys ne divulguent pas les secrets HOTP/TOTP à l'appareil auquel ils sont connectés, le stockage HOTP et TOTP n'est **pas** chiffré et est vulnérable aux attaques physiques. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead. + Bien que les Nitrokeys ne divulguent pas les secrets HOTP/TOTP à l'appareil auquel ils sont connectés, le stockage HOTP et TOTP n'est **pas** chiffré et est vulnérable aux attaques physiques. Si vous cherchez à stocker ces secrets HOTP ou TOTP, nous vous recommandons vivement d'utiliser plutôt un YubiKey. !!! warning "Avertissement" diff --git a/i18n/fr/passwords.md b/i18n/fr/passwords.md index e35a9b33..e12313d5 100644 --- a/i18n/fr/passwords.md +++ b/i18n/fr/passwords.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides" +meta_title: "Les meilleurs gestionnaires de mots de passe pour protéger votre vie privée et votre sécurité - Privacy Guides" title: "Gestionnaires de mots de passe" icon: material/form-textbox-password description: Les gestionnaires de mots de passe vous permettent de stocker et de gérer en toute sécurité des mots de passe et autres informations d'identification. diff --git a/i18n/fr/real-time-communication.md b/i18n/fr/real-time-communication.md index cc87afdb..a5e3fb9a 100644 --- a/i18n/fr/real-time-communication.md +++ b/i18n/fr/real-time-communication.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Private Instant Messengers - Privacy Guides" +meta_title: "Les meilleures messageries instantanées privées - Privacy Guides" title: "Communication en temps réel" icon: material/chat-processing description: Les autres messageries instantanées mettent toutes vos conversations privées à la disposition de la société qui les gère. diff --git a/i18n/fr/search-engines.md b/i18n/fr/search-engines.md index 7275177d..ec68739a 100644 --- a/i18n/fr/search-engines.md +++ b/i18n/fr/search-engines.md @@ -1,5 +1,5 @@ --- -meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides" +meta_title: "Moteurs de recherche recommandés : alternatives anonymes à Google - Privacy Guides" title: "Moteurs de recherche" icon: material/search-web description: Ces moteurs de recherche respectueux de la vie privée n'établissent pas de profil publicitaire sur la base de vos recherches. diff --git a/i18n/fr/tools.md b/i18n/fr/tools.md index 0f24cbc8..3215fd3a 100644 --- a/i18n/fr/tools.md +++ b/i18n/fr/tools.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides" +meta_title: "Les meilleurs outils, services, et recommandations sans publicité de protection de la vie privée - Privacy Guides" title: "Outils de protection de la vie privée" icon: material/tools hide: diff --git a/i18n/fr/tor.md b/i18n/fr/tor.md index a8b84340..07b7d25a 100644 --- a/i18n/fr/tor.md +++ b/i18n/fr/tor.md @@ -1,5 +1,5 @@ --- -meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" +meta_title: "Navigateur et réseau Tor : navigation web anonyme - Privacy Guides" title: "Réseau Tor" icon: simple/torproject description: Protégez votre navigation sur internet des regards indiscrets en utilisant le réseau Tor, un réseau sécurisé qui contourne la censure. @@ -10,7 +10,7 @@ schema: name: Navigateur Tor image: /assets/img/browsers/tor.svg url: https://www.torproject.org - sameAs: https://en.wikipedia.org/wiki/Tor_(network) + sameAs: https://fr.m.wikipedia.org/wiki/Tor_(r%C3%A9seau) applicationCategory: Web Browser operatingSystem: - Windows diff --git a/i18n/fr/vpn.md b/i18n/fr/vpn.md index c6299da5..09f1d05b 100644 --- a/i18n/fr/vpn.md +++ b/i18n/fr/vpn.md @@ -1,5 +1,5 @@ --- -meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides" +meta_title: "Recommandations et comparaison de services VPN privés, sans sponsors ni publicités - Privacy Guides" title: "Services VPN" icon: material/vpn description: Voici les meilleurs services VPN pour protéger votre vie privée et votre sécurité en ligne. Trouvez ici un fournisseur qui ne cherche pas à vous espionner. diff --git a/i18n/he/financial-services.md b/i18n/he/financial-services.md index 5b35ea27..4f931c16 100644 --- a/i18n/he/financial-services.md +++ b/i18n/he/financial-services.md @@ -74,9 +74,9 @@ Privacy.com מספק מידע על הסוחרים מהם אתה רוכש לבנ !!! recommendation - ![CakePay לוגו](assets/img/financial-services/coincards.svg){ align=right } + ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (זמין בארה"ב, קנדה ובריטניה) מאפשר לך לרכוש כרטיסי מתנה עבור מגוון גדול של סוחרים. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: דף הבית](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="מדיניות פרטיות" } diff --git a/i18n/hi/financial-services.md b/i18n/hi/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/hi/financial-services.md +++ b/i18n/hi/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/hu/financial-services.md b/i18n/hu/financial-services.md index 739fb474..ef318834 100644 --- a/i18n/hu/financial-services.md +++ b/i18n/hu/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/id/financial-services.md b/i18n/id/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/id/financial-services.md +++ b/i18n/id/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/it/about/index.md b/i18n/it/about/index.md index d54d4275..bacfb4cd 100644 --- a/i18n/it/about/index.md +++ b/i18n/it/about/index.md @@ -1,6 +1,6 @@ --- -title: "About Privacy Guides" -description: Privacy Guides is a socially motivated website that provides information for protecting your data security and privacy. +title: "Informazioni su Privacy Guides" +description: Privacy Guides è un sito web a motivazione sociale che fornisce informazioni per proteggere la sicurezza e la privacy dei dati. schema: "@context": https://schema.org "@type": Organization @@ -19,7 +19,7 @@ schema: ![Privacy Guides logo](../assets/brand/png/square/pg-yellow.png){ align=right } -**Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. +**Privacy Guides** è un sito web a sfondo sociale che fornisce [informazioni](/kb) per proteggere la sicurezza e la privacy dei dati. La nostra missione è informare il pubblico sul valore della privacy digitale e sulle iniziative governative globali che mirano a monitorare la vostra attività online. Siamo un collettivo senza scopo di lucro gestito interamente da [membri del team](https://discuss.privacyguides.net/g/team) e collaboratori volontari. Il nostro sito è privo di pubblicità e non è affiliato a nessuno dei fornitori elencati. [:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } @@ -43,16 +43,16 @@ In 2022, we completed the transition of our main website framework from Jekyll t We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. -So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. +So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). Intendiamo continuare a portare avanti la nostra missione di sensibilizzazione ed educazione, trovando il modo di evidenziare più chiaramente i pericoli di una mancanza di consapevolezza della privacy nell'era digitale moderna e la prevalenza e i danni delle violazioni della sicurezza nel settore tecnologico. -## Our Team +## Il nostro team ??? person "@jonah" - [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/jonah) - [:simple-github: GitHub](https://github.com/jonaharagon "@jonaharagon") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@jonah "@jonah@neat.computer"){rel=me} - - [:fontawesome-solid-house: Homepage](https://www.jonaharagon.com) + - [:fontawesome-solid-house: Pagina iniziale](https://www.jonaharagon.com) ??? person "@niek-de-wilde" @@ -65,21 +65,21 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/dngray) - [:simple-github: GitHub](https://github.com/dngray "@dngray") - [:simple-mastodon: Mastodon](https://mastodon.social/@dngray "@dngray@mastodon.social"){rel=me} - - [:fontawesome-solid-envelope: Email](mailto:dngray@privacyguides.org) + - [:fontawesome-solid-envelope: E-Mail](mailto:dngray@privacyguides.org) ??? person "@freddy" - [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/freddy) - [:simple-github: GitHub](https://github.com/freddy-m "@freddy-m") - [:simple-mastodon: Mastodon](https://social.lol/@freddy "@freddy@social.lol"){rel=me} - - [:fontawesome-solid-envelope: Email](mailto:freddy@privacyguides.org) - - [:fontawesome-solid-house: Homepage](https://freddy.omg.lol) + - [:fontawesome-solid-envelope: E-Mail](mailto:freddy@privacyguides.org) + - [:fontawesome-solid-house: Pagina iniziale](https://freddy.omg.lol) ??? person "@mfwmyfacewhen" - [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/mfwmyfacewhen) - [:simple-github: GitHub](https://github.com/mfwmyfacewhen "@mfwmyfacewhen") - - [:fontawesome-solid-house: Homepage](https://mfw.omg.lol) + - [:fontawesome-solid-house: Pagina iniziale](https://mfw.omg.lol) ??? person "@olivia" @@ -89,14 +89,14 @@ So far in 2023 we've launched international translations of our website in [Fren Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides). -Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States. +I membri del nostro team controllano tutte le modifiche apportate al sito e si occupano di mansioni amministrative come l'hosting web e le finanze, ma non traggono alcun profitto personale dai contributi apportati al sito. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Le donazioni a Privacy Guides sono generalmente deducibili dalle tasse negli Stati Uniti. -## Site License +## Licenza del sito !!! danger "" - The following is a human-readable summary of (and not a substitute for) the [license](/license). + Quanto segue è un riassunto scritto in formato leggibile di (e non un sostituto di) [licenza](/licenza). -:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. **Non è possibile** utilizzare il marchio Privacy Guides nel proprio progetto senza l'esplicita approvazione da questo progetto. If you remix, transform, or build upon the content of this website, you may not distribute the modified material. +:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. **Non è possibile** utilizzare il marchio Privacy Guides nel proprio progetto senza l'esplicita approvazione da questo progetto. Se si remixa, si trasforma o si basa sul contenuto di questo sito web, non si può distribuire il materiale modificato. -This license is in place to prevent people from sharing our work without giving proper credit, and to prevent people from modifying our work in a way that could be used to mislead people. If you find the terms of this license too restrictive for the project you're working on, please reach out to us at `jonah@privacyguides.org`. We are happy to provide alternative licensing options for well-intentioned projects in the privacy space! +Questa licenza è stata istituita per evitare che le persone condividano il nostro lavoro senza dare il giusto credito e per evitare che le persone modifichino il nostro lavoro in un modo che potrebbe essere usato per ingannare le persone. If you find the terms of this license too restrictive for the project you're working on, please reach out to us at `jonah@privacyguides.org`. Siamo lieti di fornire opzioni di licenza alternative per progetti ben intenzionati nel settore della privacy! diff --git a/i18n/it/about/notices.md b/i18n/it/about/notices.md index bf37411d..4531faf4 100644 --- a/i18n/it/about/notices.md +++ b/i18n/it/about/notices.md @@ -12,13 +12,13 @@ Privacy Guides è un progetto open source a cui si contribuisce sotto licenze ch Privacy Guides inoltre non garantisce che questo sito sarà costantemente disponibile, o disponibile affatto. -## Licensing Overview +## Panoramica sulle licenze !!! danger "" - The following is a human-readable summary of (and not a substitute for) the [license](/license). + Quanto segue è un riassunto scritto in formato leggibile di (e non un sostituto di) [licenza](/licenza). -Unless otherwise noted, all **content** on this website is made available under the terms of the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). The underlying **source code** used to generate this website and display that content is released under the [MIT License](https://github.com/privacyguides/privacyguides.org/tree/main/LICENSE-CODE). +Se non diversamente indicato, tutti i **contenuti** di questo sito web sono resi disponibili secondo i termini della [Licenza Creative Commons Attribuzione-Non opere derivate 4.0 Internazionale](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). The underlying **source code** used to generate this website and display that content is released under the [MIT License](https://github.com/privacyguides/privacyguides.org/tree/main/LICENSE-CODE). Questo non include codice di terze parti incorporato in questo repository, o codice dove una licenza sostitutiva è altrimenti indicata. I seguenti sono esempi degni di nota, ma questa lista potrebbe non essere onnicomprensiva: diff --git a/i18n/it/advanced/communication-network-types.md b/i18n/it/advanced/communication-network-types.md index 748720f2..40524287 100644 --- a/i18n/it/advanced/communication-network-types.md +++ b/i18n/it/advanced/communication-network-types.md @@ -10,7 +10,7 @@ Esistono diverse architetture di rete comunemente usate per trasmettere messaggi ## Reti centralizzate -![Centralized networks diagram](../assets/img/layout/network-centralized.svg){ align=left } +![Diagramma reti centralizzate](../assets/img/layout/network-centralized.svg){ align=left } I servizi di messaggistica centralizzati sono quelli in cui tutti i partecipanti si trovano sullo stesso server o rete di server controllati dalla stessa organizzazione. @@ -33,7 +33,7 @@ Alcuni servizi di messaggistica self-hosted consentono di configurare il proprio ## Reti federate -![Federated networks diagram](../assets/img/layout/network-decentralized.svg){ align=left } +![Diagramma reti federate](../assets/img/layout/network-decentralized.svg){ align=left } I servizi di messaggistica federati usano più server indipendenti e decentralizzati, i quali sono in grado di comunicare l'uno con l'altro (la posta elettronica è un esempio di servizio federato). La federazione permette agli amministratori di sistema di controllare i loro server e far comunque parte di una rete di comunicazione più ampia. @@ -41,63 +41,63 @@ Quando "self-hostati", i membri di un server federato possono scoprire e comunic **Vantaggi:** -- Allows for greater control over your own data when running your own server. -- Allows you to choose whom to trust your data with by choosing between multiple "public" servers. -- Often allows for third-party clients which can provide a more native, customized, or accessible experience. -- Server software can be verified that it matches public source code, assuming you have access to the server or you trust the person who does (e.g., a family member). +- Consente un maggiore controllo sui propri dati quando si gestisce un proprio server. +- Permette di scegliere a chi affidare i propri dati, scegliendo tra più server "pubblici". +- Spesso consente di utilizzare client di terze parti che possono fornire un'esperienza più nativa, personalizzata o accessibile. +- È possibile verificare che il software del server corrisponda al codice sorgente pubblico, a condizione che si abbia accesso al server o che ci si fidi della persona che lo possiede (ad esempio, un familiare). **Svantaggi:** -- Adding new features is more complex because these features need to be standardized and tested to ensure they work with all servers on the network. -- Due to the previous point, features can be lacking, or incomplete or working in unexpected ways compared to centralized platforms, such as message relay when offline or message deletion. -- Some metadata may be available (e.g., information like "who is talking to whom," but not actual message content if E2EE is used). -- Federated servers generally require trusting your server's administrator. They may be a hobbyist or otherwise not a "security professional," and may not serve standard documents like a privacy policy or terms of service detailing how your data is used. -- Server administrators sometimes choose to block other servers, which are a source of unmoderated abuse or break general rules of accepted behavior. This will hinder your ability to communicate with members of those servers. +- L'aggiunta di nuove funzionalità è più complessa perché queste devono essere standardizzate e testate per garantire il funzionamento con tutti i server della rete. +- A causa del punto precedente, le funzionalità possono essere carenti, incomplete o funzionare in modo inaspettato rispetto alle piattaforme centralizzate, come ad esempio il trasferimento dei messaggi quando sono offline o la loro cancellazione. +- Alcuni metadati possono essere disponibili (ad esempio, informazioni come "chi sta parlando con chi", ma non il contenuto effettivo del messaggio se si utilizza E2EE). +- I server federati richiedono generalmente la fiducia dell'amministratore del server. Può trattarsi di un appassionato o comunque non di un "professionista della sicurezza" e potrebbe non servire documenti standard come l'informativa sulla privacy o i termini di servizio che descrivono in dettaglio l'utilizzo dei vostri dati. +- Gli amministratori dei server scelgono talvolta di bloccare altri server che sono fonte di abusi non moderati o che violano le regole generali di comportamento accettate. Questo ostacolerà la vostra capacità di comunicare con i membri di quei server. ## Reti peer-to-peer -![P2P diagram](../assets/img/layout/network-distributed.svg){ align=left } +![Diagramma P2P](../assets/img/layout/network-distributed.svg){ align=left } -P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. +I messaggeri P2P si collegano a una [rete distribuita](https://en.wikipedia.org/wiki/Distributed_networking) di nodi per trasmettere un messaggio al destinatario senza l'ausilio di un server di terze parti. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +I client (peer) di solito si trovano l'un l'altro attraverso l'uso di una rete [computazionale distribuita](https://en.wikipedia.org/wiki/Distributed_computing). Ne sono un esempio le [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), utilizzate ad esempio da [torrent](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) e [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System). Un altro approccio è quello delle reti di prossimità, in cui si stabilisce una connessione tramite WiFi o Bluetooth (ad esempio, Briar o il protocollo di social network [Scuttlebutt](https://www.scuttlebutt.nz)). -Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. +Una volta che un peer ha trovato un percorso verso il suo contatto attraverso uno di questi metodi, viene stabilita una connessione diretta tra i due. Sebbene i messaggi siano solitamente criptati, un osservatore può comunque dedurre la posizione e l'identità del mittente e del destinatario. -P2P networks do not use servers, as peers communicate directly between each other and hence cannot be self-hosted. However, some additional services may rely on centralized servers, such as user discovery or relaying offline messages, which can benefit from self-hosting. +Le reti P2P non utilizzano server, poiché i peer comunicano direttamente tra loro e quindi non possono essere auto-ospitati. Tuttavia, alcuni servizi aggiuntivi possono dipendere da server centralizzati, come la scoperta degli utenti o la trasmissione di messaggi offline, che possono trarre vantaggio dall'auto-ospitalità. **Vantaggi:** -- Minimal information is exposed to third-parties. -- Modern P2P platforms implement E2EE by default. There are no servers that could potentially intercept and decrypt your transmissions, unlike centralized and federated models. +- Le informazioni esposte a terzi sono minime. +- Le moderne piattaforme P2P implementano E2EE per impostazione predefinita. A differenza dei modelli centralizzati e federati, non ci sono server che possano intercettare e decriptare le trasmissioni. **Svantaggi:** -- Reduced feature set: -- Messages can only be sent when both peers are online, however, your client may store messages locally to wait for the contact to return online. -- Generally increases battery usage on mobile devices, because the client must stay connected to the distributed network to learn about who is online. -- Some common messenger features may not be implemented or incompletely, such as message deletion. -- Your IP address and that of the contacts you're communicating with may be exposed if you do not use the software in conjunction with a [VPN](../vpn.md) or [Tor](../tor.md). Many countries have some form of mass surveillance and/or metadata retention. +- Set di funzioni ridotto: +- I messaggi possono essere inviati solo quando entrambi i peer sono online; tuttavia, il client può memorizzare i messaggi in locale per attendere che il contatto torni online. +- In genere aumenta l'utilizzo della batteria sui dispositivi mobili, perché il client deve rimanere connesso alla rete distribuita per sapere chi è online. +- Alcune funzioni comuni del messenger potrebbero non essere implementate o essere incomplete, come l'eliminazione dei messaggi. +- Il vostro indirizzo IP e quello dei contatti con cui state comunicando possono essere esposti se non utilizzate il software insieme a una [VPN](../vpn.md) o a [Tor](../tor.md). In molti Paesi esiste una forma di sorveglianza di massa e/o di conservazione dei metadati. ## Instradamento anonimo -![Anonymous routing diagram](../assets/img/layout/network-anonymous-routing.svg){ align=left } +![Diagramma d'instradamento anonimo](../assets/img/layout/network-anonymous-routing.svg){ align=left } -A messenger using [anonymous routing](https://doi.org/10.1007/978-1-4419-5906-5_628) hides either the identity of the sender, the receiver, or evidence that they have been communicating. Ideally, a messenger should hide all three. +Un messaggero che utilizza il [routing anonimo](https://doi.org/10.1007/978-1-4419-5906-5_628) nasconde l'identità del mittente, del destinatario o l'evidenza della comunicazione. Idealmente, un messaggero dovrebbe nascondere tutte e tre le cose. -There are [many](https://doi.org/10.1145/3182658) different ways to implement anonymous routing. One of the most famous is [onion routing](https://en.wikipedia.org/wiki/Onion_routing) (i.e. [Tor](tor-overview.md)), which communicates encrypted messages through a virtual [overlay network](https://en.wikipedia.org/wiki/Overlay_network) that hides the location of each node as well as the recipient and sender of each message. The sender and recipient never interact directly and only meet through a secret rendezvous node so that there is no leak of IP addresses nor physical location. Nodes cannot decrypt messages, nor the final destination; only the recipient can. Each intermediary node can only decrypt a part that indicates where to send the still encrypted message next, until it arrives at the recipient who can fully decrypt it, hence the "onion layers." +Esistono [molti](https://doi.org/10.1145/3182658) modi diversi per implementare il routing anonimo. Uno dei più famosi è l'[onion routing](https://en.wikipedia.org/wiki/Onion_routing) (cioè [Tor](tor-overview.md)), che comunica messaggi crittografati attraverso una [rete di overlay](https://en.wikipedia.org/wiki/Overlay_network) virtuale che nasconde la posizione di ogni nodo, nonché il destinatario e il mittente di ogni messaggio. Il mittente e il destinatario non interagiscono mai direttamente e si incontrano solo attraverso un nodo d'incontro segreto, in modo che non vi sia alcuna fuga d'indirizzi IP o di posizione fisica. I nodi non possono decrittare i messaggi, né la destinazione finale; solo il destinatario può farlo. Ogni nodo intermedio può decifrare solo una parte che indica dove inviare successivamente il messaggio ancora criptato, finché non arriva al destinatario che può decifrarlo completamente, da cui gli "strati a cipolla". -Self-hosting a node in an anonymous routing network does not provide the hoster with additional privacy benefits, but rather contributes to the whole network's resilience against identification attacks for everyone's benefit. +L'auto-ospitazione di un nodo in una rete di routing anonimo non fornisce al proprietario ulteriori vantaggi in termini di privacy, ma piuttosto contribuisce alla resilienza dell'intera rete contro gli attacchi d'identificazione, a vantaggio di tutti. **Vantaggi:** -- Minimal to no information is exposed to other parties. -- Messages can be relayed in a decentralized manner even if one of the parties is offline. +- Le informazioni esposte ad altre parti sono minime o nulle. +- I messaggi possono essere trasmessi in modo decentralizzato anche se una delle parti è offline. **Svantaggi:** -- Slow message propagation. -- Often limited to fewer media types, mostly text, since the network is slow. -- Less reliable if nodes are selected by randomized routing, some nodes may be very far from the sender and receiver, adding latency or even failing to transmit messages if one of the nodes goes offline. -- More complex to get started, as the creation and secured backup of a cryptographic private key is required. -- Just like other decentralized platforms, adding features is more complex for developers than on a centralized platform. Hence, features may be lacking or incompletely implemented, such as offline message relaying or message deletion. +- Propagazione lenta dei messaggi. +- Spesso limitato a pochi tipi di media, soprattutto testo, perché la rete è lenta. +- Meno affidabile se i nodi sono selezionati con un routing randomizzato, alcuni nodi possono essere molto lontani dal mittente e dal destinatario, aggiungendo latenza o addirittura non riuscendo a trasmettere i messaggi se uno dei nodi va offline. +- È più complesso iniziare, poiché è necessaria la creazione e il backup sicuro di una chiave privata crittografica. +- Come per altre piattaforme decentralizzate, l'aggiunta di funzionalità è più complessa per gli sviluppatori rispetto a una piattaforma centralizzata. Di conseguenza, potrebbero mancare o essere implementate in modo incompleto alcune funzioni, come la trasmissione dei messaggi offline o la cancellazione dei messaggi. diff --git a/i18n/it/android.md b/i18n/it/android.md index 892ab082..575217f1 100644 --- a/i18n/it/android.md +++ b/i18n/it/android.md @@ -1,5 +1,5 @@ --- -meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" +meta_title: "Consigli Android: GrapheneOS e DivestOS - Privacy Guides" title: "Android" icon: 'fontawesome/brands/android' description: Puoi sostituire il sistema operativo del tuo telefono Android con queste alternative sicure e rispettose della privacy. @@ -222,10 +222,10 @@ In questo sito raccomandiamo un'ampia gamma di applicazioni per Android. Le app !!! recommendation - ![Auditor logo](assets/img/android/auditor.svg#only-light){ align=right } - ![Auditor logo](assets/img/android/auditor-dark.svg#only-dark){ align=right } + ![Logo Auditor](assets/img/android/auditor.svg#only-light){ align=right } + ![Logo Auditor](assets/img/android/auditor-dark.svg#only-dark){ align=right } - **Auditor** is an app which leverages hardware security features to provide device integrity monitoring by actively validating the identity of a device and the integrity of its operating system. Currently, it only works with GrapheneOS or the stock operating system for [supported devices](https://attestation.app/about#device-support). + **Auditor * * è un'app che sfrutta le funzionalità di sicurezza hardware per fornire il monitoraggio dell'integrità del dispositivo convalidando attivamente l'identità di un dispositivo e l'integrità del suo sistema operativo. Attualmente funziona solo con GrapheneOS o con il sistema operativo stock per i [dispositivi supportati](https://attestation.app/about#device-support). [:octicons-home-16: Pagina principale](https://attestation.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Informativa sulla privacy" } diff --git a/i18n/it/basics/account-creation.md b/i18n/it/basics/account-creation.md index 5fcbf116..9789b1d9 100644 --- a/i18n/it/basics/account-creation.md +++ b/i18n/it/basics/account-creation.md @@ -1,5 +1,5 @@ --- -meta_title: "How to Create Internet Accounts Privately - Privacy Guides" +meta_title: "Come creare account internet in maniera privata - Privacy Guides" title: "Creazione account" icon: 'material/account-plus' description: La creazione di account online è praticamente una necessità di internet, adottate questi accorgimenti per assicurarvi di rimanere privati. diff --git a/i18n/it/basics/email-security.md b/i18n/it/basics/email-security.md index 3df88842..9c7c46e9 100644 --- a/i18n/it/basics/email-security.md +++ b/i18n/it/basics/email-security.md @@ -1,5 +1,5 @@ --- -meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides" +meta_title: "Perché l'email non è la scelta migliore per la privacy e la sicurezza - Privacy Guides" title: Sicurezza Email icon: material/email description: La posta elettronica è intrinsecamente insicura sotto molti punti di vista e questi sono alcuni dei motivi per cui non è la nostra scelta principale per le comunicazioni sicure. @@ -23,7 +23,7 @@ I provider di posta elettronica che consentono di utilizzare protocolli di acces ### Come proteggo la mia chiave privata? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Il messaggio viene quindi decifrato dalla smartcard e il contenuto decifrato viene inviato al dispositivo. +Una smartcard (come una [ YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) o [Nitrokey](https://www.nitrokey.com)) funziona ricevendo un messaggio email criptato da un dispositivo (telefono, tablet, computer, ecc.) con un client email/webmail. Il messaggio viene quindi decifrato dalla smartcard e il contenuto decifrato viene inviato al dispositivo. È preferibile che la decodifica avvenga sulla smartcard, per evitare di esporre la chiave privata a un dispositivo compromesso. diff --git a/i18n/it/basics/threat-modeling.md b/i18n/it/basics/threat-modeling.md index b8705aac..8949f4ef 100644 --- a/i18n/it/basics/threat-modeling.md +++ b/i18n/it/basics/threat-modeling.md @@ -1,11 +1,11 @@ --- -meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides" +meta_title: "Modello di minaccia: Il primo passo nel viaggio verso la privacy - Privacy Guides" title: "Modelli di minaccia" icon: 'material/target-account' -description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. +description: Bilanciare sicurezza, privacy e usabilità è uno dei primi e più difficili obiettivi che dovrete affrontare nel vostro viaggio verso la privacy. --- -Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Tutto è un compromesso: più qualcosa è sicuro, più è restrittivo o scomodo in generale, ecc. Spesso, le persone scoprono che il problema con gli strumenti che vedono raccomandati è che sono troppo difficili da iniziare a usare! +Bilanciare sicurezza, privacy e usabilità è uno dei primi e più difficili obiettivi che dovrete affrontare nel vostro viaggio verso la privacy. Tutto è un compromesso: più qualcosa è sicuro, più è restrittivo o scomodo in generale, ecc. Spesso, le persone scoprono che il problema con gli strumenti che vedono raccomandati è che sono troppo difficili da iniziare a usare! Se si vogliono utilizzare gli strumenti **più** sicuri a disposizione, è necessario sacrificare *molto* in termini di usabilità. E, anche allora, ==nulla è mai completamente sicuro.== C'è un alta **sicurezza**, ma mai una completa **sicurezza**. È per questo che i modelli di minaccia sono importanti. diff --git a/i18n/it/basics/vpn-overview.md b/i18n/it/basics/vpn-overview.md index f5c260e4..e9ad18b0 100644 --- a/i18n/it/basics/vpn-overview.md +++ b/i18n/it/basics/vpn-overview.md @@ -1,5 +1,5 @@ --- -meta_title: "How Do VPNs Protect Your Privacy? Our VPN Overview - Privacy Guides" +meta_title: "Come le VPN proteggono la tua privacy? La nostra panoramica sulle VPN - Privacy Guides" title: Panoramica VPN icon: material/vpn description: Le reti virtuali private spostano il rischio dal vostro ISP a una terza parte di cui vi fidate. Dovresti tenere a mente questi aspetti. diff --git a/i18n/it/data-redaction.md b/i18n/it/data-redaction.md index 972aa6af..8cebd07c 100644 --- a/i18n/it/data-redaction.md +++ b/i18n/it/data-redaction.md @@ -1,5 +1,5 @@ --- -meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Privacy Guides" +meta_title: "Rimuovere le PII con i metadata scrubber e gli strumenti di riduzione dei dati - Privacy Guides" title: "Rimozione di dati e metadati" icon: material/tag-remove description: Utilizza questi strumenti per rimuovere metadati come la posizione GPS e altre informazioni identificative dalle foto e dai file che condividete. diff --git a/i18n/it/desktop-browsers.md b/i18n/it/desktop-browsers.md index 08ed189a..f48fc3af 100644 --- a/i18n/it/desktop-browsers.md +++ b/i18n/it/desktop-browsers.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" +meta_title: "Browser web che rispettano la privacy per PC e Mac - Privacy Guides" title: "Browser desktop" icon: material/laptop description: Questi browser web offrono una maggiore protezione della privacy rispetto a Google Chrome. diff --git a/i18n/it/email.md b/i18n/it/email.md index 65cce189..927704bc 100644 --- a/i18n/it/email.md +++ b/i18n/it/email.md @@ -1,5 +1,5 @@ --- -meta_title: "Encrypted Private Email Recommendations - Privacy Guides" +meta_title: "Email Private Criptate consigliate - Privacy Guides" title: "Servizi mail" icon: material/email description: Questi provider di posta elettronica offrono un luogo ideale per archiviare le tue mail in modo sicuro e molti offrono la crittografia OpenPGP interoperabile con altri provider. @@ -124,7 +124,7 @@ Mailbox.org non accetta criptovalute a causa della sospensione delle attività d #### :material-check:{ .pg-green } Sicurezza dell'account -Mailbox.org supporta l'[autenticazione a due fattori](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo per la loro webmail. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Gli standard Web come [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) non sono ancora supportati. +Mailbox.org supporta l'[autenticazione a due fattori](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo per la loro webmail. Puoi usare o TOTP o una [YubiKey](https://en.wikipedia.org/wiki/YubiKey) utilizzando [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Gli standard Web come [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) non sono ancora supportati. #### :material-information-outline:{ .pg-blue } Sicurezza dei dati diff --git a/i18n/it/encryption.md b/i18n/it/encryption.md index 12150a1a..c8dcb83c 100644 --- a/i18n/it/encryption.md +++ b/i18n/it/encryption.md @@ -1,5 +1,5 @@ --- -meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides" +meta_title: "Software di crittografia consigliati: VeraCrypt, Cryptomator, PicoCrypt e OpenPGP - Privacy Guides" title: "Software di crittografia" icon: material/file-lock description: La crittografia dei dati è l'unico modo per controllare chi può accedervi. Questi strumenti ti consentono di crittografare le tue email e qualsiasi altro file. diff --git a/i18n/it/financial-services.md b/i18n/it/financial-services.md index 3e0b8b41..7d404c21 100644 --- a/i18n/it/financial-services.md +++ b/i18n/it/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/it/index.md b/i18n/it/index.md index f7c1920e..571c9aa7 100644 --- a/i18n/it/index.md +++ b/i18n/it/index.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Guides: Your Independent Privacy and Security Resource" +meta_title: "Privacy Guides: La vostra risorsa indipendente per la privacy e la sicurezza" template: overrides/home.it.html hide: - navigation diff --git a/i18n/it/mobile-browsers.md b/i18n/it/mobile-browsers.md index 2ba2ac11..875d3dd1 100644 --- a/i18n/it/mobile-browsers.md +++ b/i18n/it/mobile-browsers.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides" +meta_title: "Browser Web che rispettano la privacy per Android e iOS - Privacy Guides" title: "Browser mobile" icon: octicons/device-mobile-16 description: Questi browser sono quelli che attualmente consigliamo per la navigazione Internet standard/non anonima sul tuo telefono. diff --git a/i18n/it/multi-factor-authentication.md b/i18n/it/multi-factor-authentication.md index fbb389a6..a5eb0aad 100644 --- a/i18n/it/multi-factor-authentication.md +++ b/i18n/it/multi-factor-authentication.md @@ -49,7 +49,7 @@ Per i modelli che supportano HOTP e TOTP, ci sono 3 slot per HOTP e 15 per TOTP. !!! warning - Sebbene le Nitrokey non rilascino i segreti HOTP/TOTP al dispositivo a cui sono collegati, la memoria HOTP e TOTP non è crittografata ed è vulnerabile agli attacchi fisici. If you are looking to store HOTP or TOTP these secrets, we highly recommend that you use a YubiKey instead. + Sebbene le Nitrokey non rilascino i segreti HOTP/TOTP al dispositivo a cui sono collegati, la memoria HOTP e TOTP non è crittografata ed è vulnerabile agli attacchi fisici. Se vuoi memorizzare le chiavi segrete HOTP o TOTP, si consiglia vivamente di utilizzare una YubiKey. !!! warning diff --git a/i18n/it/passwords.md b/i18n/it/passwords.md index d52cdb50..c605a166 100644 --- a/i18n/it/passwords.md +++ b/i18n/it/passwords.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides" +meta_title: "I migliori gestori di password per proteggere la tua privacy e sicurezza - Privacy Guides" title: "Gestori di password" icon: material/form-textbox-password description: I gestori delle password permettono di archiviare e gestire con sicurezza le password e altre credenziali. diff --git a/i18n/it/real-time-communication.md b/i18n/it/real-time-communication.md index bb07a85c..ee552270 100644 --- a/i18n/it/real-time-communication.md +++ b/i18n/it/real-time-communication.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Private Instant Messengers - Privacy Guides" +meta_title: "Le migliori app di messaggistica istantanea private - Privacy Guides" title: "Comunicazione in tempo reale" icon: material/chat-processing description: Altre app di messaggistica istantanea rendono disponibili tutte le tue conversazioni private alla società che le gestisce. diff --git a/i18n/it/search-engines.md b/i18n/it/search-engines.md index b3d37768..71d0fefa 100644 --- a/i18n/it/search-engines.md +++ b/i18n/it/search-engines.md @@ -1,5 +1,5 @@ --- -meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides" +meta_title: "Motori di ricerca consigliati: Alternative anonime a Google - Privacy Guides" title: "Motori di ricerca" icon: material/search-web description: Questi motori di ricerca, che rispettano la privacy, non costruiscono un profilo pubblicitario basato sulle vostre ricerche. diff --git a/i18n/it/tools.md b/i18n/it/tools.md index 439c357c..388deacb 100644 --- a/i18n/it/tools.md +++ b/i18n/it/tools.md @@ -1,5 +1,5 @@ --- -meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides" +meta_title: "I migliori strumenti, consigli e servizi senza pubblicità per la privacy - Privacy Guides" title: "Strumenti per la privacy" icon: material/tools hide: diff --git a/i18n/it/tor.md b/i18n/it/tor.md index 8776be03..03c3565c 100644 --- a/i18n/it/tor.md +++ b/i18n/it/tor.md @@ -1,24 +1,24 @@ --- -meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" +meta_title: "Browser e rete Tor: Navigazione Web Anonima - Privacy Guides" title: "Rete Tor" icon: simple/torproject description: Proteggi la tua navigazione internet da occhi indiscreti utilizzando la rete Tor, una rete sicura che elude la censura. schema: - "@context": http://schema.org - "@type": SoftwareApplication + "@type": Applicazione Software name: Tor Browser image: /assets/img/browsers/tor.svg url: https://www.torproject.org - sameAs: https://en.wikipedia.org/wiki/Tor_(network) - applicationCategory: Web Browser + sameAs: https://it.wikipedia.org/wiki/Tor_(software) + applicationCategory: Browser Web operatingSystem: - Windows - macOS - Linux - Android subjectOf: - "@type": WebPage + "@type": Pagina Web url: "./" --- diff --git a/i18n/it/vpn.md b/i18n/it/vpn.md index cbbd7668..5b571827 100644 --- a/i18n/it/vpn.md +++ b/i18n/it/vpn.md @@ -1,5 +1,5 @@ --- -meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or Ads - Privacy Guides" +meta_title: "Suggerimenti e confronto tra servizi VPN privati, no sponsor o pubblicità - Privacy Guides" title: "Servizi VPN" icon: material/vpn description: Questi sono i migliori servizi VPN per proteggere la tua privacy e sicurezza online. Trovate un fornitore che non ti spii. diff --git a/i18n/ja/basics/threat-modeling.md b/i18n/ja/basics/threat-modeling.md index 2cf64c5e..74ceb56c 100644 --- a/i18n/ja/basics/threat-modeling.md +++ b/i18n/ja/basics/threat-modeling.md @@ -1,37 +1,37 @@ --- -meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides" -title: "Threat Modeling" +meta_title: "脅威モデリング: プライバシー保護の最初のステップ - Privacy Guides" +title: "脅威モデリング" icon: 'material/target-account' -description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. +description: セキュリティ、プライバシー、使いやすさのバランスを取ることは、プライバシー保護を考える際に最初に直面する難しい課題の一つです。 --- -Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using! +セキュリティ、プライバシー、使いやすさのバランスを取ることは、プライバシー保護を考える際に最初に直面する難しい課題の一つです。 一般的に、安全性を高めるほど制限が増え、不便になるというトレードオフが発生します。 多くの場合、おすすめされたツールの問題は、使い始めるのが難しすぎることです。 -If you wanted to use the **most** secure tools available, you'd have to sacrifice *a lot* of usability. And, even then, ==nothing is ever fully secure.== There's **high** security, but never **full** security. That's why threat models are important. +**最も**安全なツールを使うには、*多くの*使いやすさを犠牲にする必要があります。 そして、それでも、==完全に安全にはなりません。==**高レベル**のセキュリティはあっても、**完全な**セキュリティはありません。 だからこそ、脅威モデルが重要なのです。 -**So, what are these threat models, anyway?** +**脅威モデルとは何ですか?** ==A threat model is a list of the most probable threats to your security and privacy endeavors.== Since it's impossible to protect yourself against **every** attack(er), you should focus on the **most probable** threats. In computer security, a threat is an event that could undermine your efforts to stay private and secure. -Focusing on the threats that matter to you narrows down your thinking about the protection you need, so you can choose the tools that are right for the job. +あなたにとって重大な脅威に焦点を当てることで、必要な保護を絞り込み、必要なツールを選ぶことができます。 -## Creating Your Threat Model +## 脅威モデルの作成 -To identify what could happen to the things you value and determine from whom you need to protect them, you should answer these five questions: +あなたの大切なものに何が起こる可能性があるかを特定し、誰から守るべきかを判断するために、以下の5つの質問を確認しましょう: -1. What do I want to protect? -2. Who do I want to protect it from? -3. How likely is it that I will need to protect it? -4. How bad are the consequences if I fail? -5. How much trouble am I willing to go through to try to prevent potential consequences? +1. 何を守りたいか? +2. 誰から守りたいか? +3. 守る必要がどの程度あるか? +4. 守れなかった場合、どんな悪影響があるか? +5. 守るためにどの程度なら苦労していいか? -### What do I want to protect? +### 何を守りたいか? -An “asset” is something you value and want to protect. In the context of digital security, ==an asset is usually some kind of information.== For example, your emails, contact lists, instant messages, location, and files are all possible assets. Your devices themselves may also be assets. +「資産」とは、あなたが大切にしているもの、守りたいものです。 情報セキュリティにおいては、==資産とは通常、何らかの情報です。==例えば、メール、連絡帳、インスタントメッセージ、位置情報、ファイルなどはすべて資産です。 また、デバイスが資産に含まれる場合もあります。 -*Make a list of your assets: data that you keep, where it's kept, who has access to it, and what stops others from accessing it.* +*あなたの資産の一覧を作成しましょう。一覧には、あなたが保管しているデータ、その保管場所、それにアクセスできる人、他人によるアクセスを防止する方法を記載します。* -### Who do I want to protect it from? +### 誰から守りたいか? To answer this question, it's important to identify who might want to target you or your information. ==A person or entity that poses a threat to your assets is an “adversary”.== Examples of potential adversaries are your boss, your former partner, your business competition, your government, or a hacker on a public network. @@ -39,7 +39,7 @@ To answer this question, it's important to identify who might want to target you Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. -### How likely is it that I will need to protect it? +### 守る必要がどの程度あるか? ==Risk is the likelihood that a particular threat against a particular asset will actually occur.== It goes hand-in-hand with capability. While your mobile phone provider has the capability to access all of your data, the risk of them posting your private data online to harm your reputation is low. @@ -49,7 +49,7 @@ Assessing risks is both a personal and subjective process. Many people find cert *Write down which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about.* -### How bad are the consequences if I fail? +### 守れなかった場合、どんな悪影響があるか? There are many ways that an adversary could gain access to your data. For example, an adversary can read your private communications as they pass through the network, or they can delete or corrupt your data. @@ -59,7 +59,7 @@ Security planning involves understanding how bad the consequences could be if an *Write down what your adversary might want to do with your private data.* -### How much trouble am I willing to go through to try to prevent potential consequences? +### 守るためにどの程度なら苦労していいか? ==There is no perfect option for security.== Not everyone has the same priorities, concerns, or access to resources. Your risk assessment will allow you to plan the right strategy for you, balancing convenience, cost, and privacy. @@ -106,6 +106,6 @@ For people looking to increase their privacy and security online, we've compiled - [Common Goals and Threats :material-arrow-right-drop-circle:](common-threats.md) -## Sources +## ソース - [EFF Surveillance Self Defense: Your Security Plan](https://ssd.eff.org/en/module/your-security-plan) diff --git a/i18n/ja/financial-services.md b/i18n/ja/financial-services.md index 8616c032..2f5bd353 100644 --- a/i18n/ja/financial-services.md +++ b/i18n/ja/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/ja/kb-archive.md b/i18n/ja/kb-archive.md index 92daee33..df4e6c93 100644 --- a/i18n/ja/kb-archive.md +++ b/i18n/ja/kb-archive.md @@ -1,5 +1,5 @@ --- -title: KB Archive +title: 知識ベースのアーカイブ icon: material/archive description: Some pages that used to be in our knowledge base can now be found on our blog. --- diff --git a/i18n/ja/tor.md b/i18n/ja/tor.md index af9a3a9e..f83476b6 100644 --- a/i18n/ja/tor.md +++ b/i18n/ja/tor.md @@ -1,5 +1,5 @@ --- -meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides" +meta_title: "Tor Browserとネットワーク: 匿名のウェブブラウジング - Privacy Guides" title: "Torネットワーク" icon: simple/torproject description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship. @@ -11,7 +11,7 @@ schema: image: /assets/img/browsers/tor.svg url: https://www.torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) - applicationCategory: Web Browser + applicationCategory: ウェブブラウザ operatingSystem: - Windows - macOS @@ -99,7 +99,7 @@ We previously recommended enabling the *Isolate Destination Address* preference All versions are signed using the same signature so they should be compatible with each other. -## Relays and Bridges +## リレーとブリッジ ### Snowflake diff --git a/i18n/ko/basics/email-security.md b/i18n/ko/basics/email-security.md index 23f37dcf..55246c73 100644 --- a/i18n/ko/basics/email-security.md +++ b/i18n/ko/basics/email-security.md @@ -1,5 +1,5 @@ --- -meta_title: "Why Email Isn't the Best Choice for Privacy and Security - Privacy Guides" +meta_title: "이메일이 프라이버시, 보안 면에서 최선의 선택이 아닌 이유 - Privacy Guides" title: 이메일 보안 icon: material/email description: 이메일은 태생적으로 여러 가지 면에서 안전하지 않습니다. 따라서 안전한 통신을 위한 최선의 선택은 아닙니다. @@ -17,26 +17,26 @@ description: 이메일은 태생적으로 여러 가지 면에서 안전하지 OpenPGP를 사용하더라도 [순방향 비밀성(Forward secrecy)](https://en.wikipedia.org/wiki/Forward_secrecy)을 지원하지 않으므로, 본인 혹은 수신자의 개인 키가 도난당할 경우 해당 키로 암호화된 이전 메시지가 전부 노출됩니다. 따라서, 개인 간 의사소통에는 이메일보다는 순방향 비밀성이 구현된 [인스턴트 메신저](../real-time-communication.md) 이용을 권장합니다. -### What Email Clients Support E2EE? +### E2EE 지원 이메일 클라이언트는 무엇인가요? -Email providers which allow you to use standard access protocols like IMAP and SMTP can be used with any of the [email clients we recommend](../email-clients.md). Depending on the authentication method, this may lead to the decrease security if either the provider or the email client does not support OATH or a bridge application as [multi-factor authentication](multi-factor-authentication.md) is not possible with plain password authentication. +IMAP, SMTP 등 표준 접속 프로토콜을 사용할 수 있는 이메일 제공 업체는 [권장 이메일 클라이언트](../email-clients.md)와 함께 사용할 수 있습니다. 인증 방법에 따라서, 이메일 제공 업체/클라이언트가 OATH를 지원하지 않거나 브리지 애플리케이션을 지원하지 않는 경우, 단순 비밀번호 인증으로는 [다중 인증](multi-factor-authentication.md)이 불가능하므로 보안이 저하될 수 있습니다. -### How Do I Protect My Private Keys? +### 개인 키를 어떻게 보호해야 하나요? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +스마트카드([YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP), [Nitrokey](https://www.nitrokey.com) 등)는 기기(스마트폰, 태블릿, PC 등)에서 실행하는 이메일/웹메일 클라이언트가 암호화된 메일을 수신했을 때 작동합니다. 암호화된 메일 내용은 스마트카드에서 복호화되며, 복호화된 내용이 스마트카드로부터 기기로 전달됩니다. -It is advantageous for the decryption to occur on the smartcard so as to avoid possibly exposing your private key to a compromised device. +스마트카드에서 복호화를 수행함으로써, 기기의 보안이 손상됐을 경우에도 개인 키가 노출되는 것을 방지할 수 있습니다. ## 이메일 메타데이터 개요 이메일 메타데이터는 이메일 메시지의 [메시지 헤더](https://en.wikipedia.org/wiki/Email#Message_header)에 저장됩니다. 이메일 메타데이터에는 여러분이 봐왔을 `To`(받는사람), `From`(보낸사람), `Cc`(참조), `Date`(보낸 날짜), `Subject`(제목) 등이 포함됩니다. 이외에도 여러 숨겨진 헤더가 이메일 클라이언트 및 제공 업체로부터 추가되며, 이러한 정보는 여러분의 계정에 대한 정보를 노출시킬 수 있습니다. -Client software may use email metadata to show who a message is from and what time it was received. Servers may use it to determine where an email message must be sent, among [other purposes](https://en.wikipedia.org/wiki/Email#Message_header) which are not always transparent. +클라이언트 소프트웨어는 이메일 메타데이터를 사용해 메시지의 발신자와 수신 시간을 표시할 수 있습니다. 서버는 항상 투명하지만은 않은 [다른 목적지](https://en.wikipedia.org/wiki/Email#Message_header) 중 어디에 이메일을 보내야 할지 결정하는 데에 메타데이터를 활용할 수 있습니다. -### Who Can View Email Metadata? +### 이메일 메타데이터는 누가 볼 수 있나요? -Email metadata is protected from outside observers with [Opportunistic TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS) protecting it from outside observers, but it is still able to be seen by your email client software (or webmail) and any servers relaying the message from you to any recipients including your email provider. Sometimes email servers will also use third-party services to protect against spam, which generally also have access to your messages. +이메일 메타데이터는 [Opportunistic TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS)를 통해 외부 관찰자로부터 보호됩니다. 하지만 여러분이 사용하는 이메일 클라이언트 소프트웨어나 웹메일은 메타데이터를 볼 수 있습니다. 또한 여러분의 이메일 제공 업체를 포함한, 여러분과 상대 수신자 사이의 모든 메시지 전달 서버 역시 메타데이터를 볼 수 있습니다. 이메일 서버 중에는 스팸 차단 목적으로 타사 서비스를 사용하기도 하는데, 보통 이런 타사 서비스도 여러분의 메시지에 접근할 수 있습니다. -### Why Can't Metadata be E2EE? +### 메타데이터는 종단 간 암호화를 적용할 수 없나요? -Email metadata is crucial to the most basic functionality of email (where it came from, and where it has to go). E2EE was not built into the email protocols originally, instead requiring add-on software like OpenPGP. Because OpenPGP messages still have to work with traditional email providers, it cannot encrypt email metadata, only the message body itself. That means that even when using OpenPGP, outside observers can see lots of information about your messages, such as who you're emailing, the subject lines, when you're emailing, etc. +이메일 메타데이터는 이메일의 가장 기본적인 기능(어디에서 왔는지, 어디로 가야하는지 등)에 매우 중요한 역할을 합니다. 이메일 프로토콜에는 본래 E2EE가 내장되지 않았기 때문에, OpenPGP 등의 애드온 소프트웨어가 필요합니다. 그러나 OpenPGP 메시지는 여전히 기존 이메일 제공 업체와도 작동해야 합니다. 따라서 메시지 본문은 암호화할 수 있으나, 메타데이터는 암호화할 수 없습니다. 따라서, OpenPGP를 사용하더라도 외부 관찰자는 이메일 수신자, 제목, 이메일 작성 시간 등 여러 정보를 볼 수 있습니다. diff --git a/i18n/ko/basics/multi-factor-authentication.md b/i18n/ko/basics/multi-factor-authentication.md index ae57848d..f1815a22 100644 --- a/i18n/ko/basics/multi-factor-authentication.md +++ b/i18n/ko/basics/multi-factor-authentication.md @@ -1,5 +1,5 @@ --- -title: "Multi-Factor Authentication" +title: "다중 인증" icon: 'material/two-factor-authentication' description: MFA is a critical security mechanism for securing your online accounts, but some methods are stronger than others. --- @@ -10,7 +10,7 @@ Normally, if a hacker (or adversary) is able to figure out your password then th MFA methods vary in security, but are based on the premise that the more difficult it is for an attacker to gain access to your MFA method, the better. Examples of MFA methods (from weakest to strongest) include SMS, Email codes, app push notifications, TOTP, Yubico OTP and FIDO. -## MFA Method Comparison +## MFA 방식 비교 ### SMS or Email MFA diff --git a/i18n/ko/basics/passwords-overview.md b/i18n/ko/basics/passwords-overview.md index 6858d8b5..75a813b0 100644 --- a/i18n/ko/basics/passwords-overview.md +++ b/i18n/ko/basics/passwords-overview.md @@ -6,15 +6,15 @@ description: These are some tips and tricks on how to create the strongest passw Passwords are an essential part of our everyday digital lives. We use them to protect our accounts, our devices and our secrets. Despite often being the only thing between us and an adversary who's after our private information, not a lot of thought is put into them, which often leads to people using passwords that can be easily guessed or brute-forced. -## Best Practices +## 모범 사례 -### Use unique passwords for every service +### 모든 서비스마다 서로 다른 비밀번호 사용하기 -Imagine this; you sign up for an account with the same e-mail and password on multiple online services. If one of those service providers is malicious, or their service has a data breach that exposes your password in an unencrypted format, all a bad actor would have to do is try that e-mail and password combination across multiple popular services until they get a hit. It doesn't matter how strong that one password is, because they already have it. +여러분이 여러 온라인 서비스에 똑같은 이메일, 비밀번호로 가입했다고 가정해봅시다. 서비스 제공 업체 중 하나가 악의적이거나, 해당 서비스에서 데이터 유출 사고가 발생해 비밀번호가 암호화되지 않은 형식으로 노출될 경우, 악의적인 공격자는 여러 유명 서비스에서 해당 이메일과 비밀번호 조합을 시도해 성공할 때까지 기다리기만 하면 됩니다. 비밀번호를 이미 알아낸 상태이기 때문에, 비밀번호가 얼마나 강력한지는 중요하지 않습니다. -This is called [credential stuffing](https://en.wikipedia.org/wiki/Credential_stuffing), and it is one of the most common ways that your accounts can be compromised by bad actors. To avoid this, make sure that you never re-use your passwords. +이를 [크리덴셜 스터핑(Credential stuffing)](https://en.wikipedia.org/wiki/Credential_stuffing)이라 하며, 악의적인 공격자가 계정을 탈취하는 굉장히 흔한 방법 중 하나입니다. 이를 방지하려면 비밀번호를 재사용하지 말아야 합니다. -### Use randomly generated passwords +### 무작위로 생성된 비밀번호 사용하기 ==You should **never** rely on yourself to come up with a good password.== We recommend using [randomly generated passwords](#passwords) or [diceware passphrases](#diceware-passphrases) with sufficient entropy to protect your accounts and devices. @@ -30,15 +30,15 @@ When it comes to passwords that you don't have to remember (such as passwords st If your password manager lets you check for compromised passwords, make sure to do so and promptly change any password that may have been exposed in a data breach. Alternatively, you could follow [Have I Been Pwned's Latest Breaches feed](https://feeds.feedburner.com/HaveIBeenPwnedLatestBreaches) with the help of a [news aggregator](../news-aggregators.md). -## Creating strong passwords +## 강력한 비밀번호 만들기 -### Passwords +### 패스워드 A lot of services impose certain criteria when it comes to passwords, including a minimum or maximum length, as well as which special characters, if any, can be used. You should use your password manager's built-in password generator to create passwords that are as long and complex as the service will allow by including capitalized and lowercase letters, numbers and special characters. If you need a password you can memorize, we recommend a [diceware passphrase](#diceware-passphrases). -### Diceware Passphrases +### Diceware 패스프레이즈 Diceware is a method for creating passphrases which are easy to remember, but hard to guess. @@ -90,15 +90,15 @@ To sum it up, diceware passphrases are your best option when you need something ## Storing Passwords -### Password Managers +### 비밀번호 관리자 -The best way to store your passwords is by using a password manager. They allow you to store your passwords in a file or in the cloud and protect them with a single master password. That way, you will only have to remember one strong password, which lets you access the rest of them. +비밀번호를 저장하는 가장 좋은 방법은 비밀번호 관리자를 사용하는 것입니다. They allow you to store your passwords in a file or in the cloud and protect them with a single master password. That way, you will only have to remember one strong password, which lets you access the rest of them. There are many good options to choose from, both cloud-based and local. Choose one of our recommended password managers and use it to establish strong passwords across all of your accounts. We recommend securing your password manager with a [diceware passphrase](#diceware-passphrases) comprised of at least seven words. [List of recommended password managers](../passwords.md ""){.md-button} -!!! warning "Don't place your passwords and TOTP tokens inside the same password manager" +!!! warning "비밀번호와 TOTP 토큰을 하나의 비밀번호 관리자에 저장하지 마세요" When using TOTP codes as [multi-factor authentication](../multi-factor-authentication.md), the best security practice is to keep your TOTP codes in a [separate app](../multi-factor-authentication.md#authenticator-apps). @@ -106,6 +106,6 @@ There are many good options to choose from, both cloud-based and local. Choose o Furthermore, we do not recommend storing single-use recovery codes in your password manager. Those should be stored separately such as in an encrypted container on an offline storage device. -### Backups +### 백업 -You should store an [encrypted](../encryption.md) backup of your passwords on multiple storage devices or a cloud storage provider. This can help you access your passwords if something happens to your primary device or the service you are using. +비밀번호를 [암호화하여](../encryption.md) 백업하고 여러 저장 장치 혹은 클라우드 서비스에 저장해야 합니다. 이렇게 함으로써 주로 사용하는 기기나 이용하는 서비스에 문제가 생기더라도 자신의 비밀번호에 접근할 수 있습니다. diff --git a/i18n/ko/basics/vpn-overview.md b/i18n/ko/basics/vpn-overview.md index bfbc0670..af1f31b8 100644 --- a/i18n/ko/basics/vpn-overview.md +++ b/i18n/ko/basics/vpn-overview.md @@ -11,7 +11,7 @@ Encryption protocols such as HTTPS are commonly used on the internet, so they ma A VPN can help as it can shift trust to a server somewhere else in the world. As a result, the ISP then only sees that you are connected to a VPN and nothing about the activity that you're passing into it. -## Should I use a VPN? +## VPN을 사용해야 하나요? **Yes**, unless you are already using Tor. A VPN does two things: shifting the risks from your Internet Service Provider to itself and hiding your IP from a third-party service. diff --git a/i18n/ko/desktop-browsers.md b/i18n/ko/desktop-browsers.md index 8ae0a230..a132bb92 100644 --- a/i18n/ko/desktop-browsers.md +++ b/i18n/ko/desktop-browsers.md @@ -1,8 +1,8 @@ --- -meta_title: "Privacy Respecting Web Browsers for PC and Mac - Privacy Guides" +meta_title: "프라이버시 중점 PC, Mac용 웹 브라우저 - Privacy Guides" title: "데스크톱 브라우저" icon: material/laptop -description: These web browsers provide stronger privacy protections than Google Chrome. +description: Google Chrome보다 강력한 프라이버시 보호 기능을 제공하는 브라우저 목록입니다. schema: - "@context": http://schema.org @@ -56,30 +56,30 @@ schema: url: "./" --- -These are our currently recommended desktop web browsers and configurations for standard/non-anonymous browsing. We recommend [Mullvad Browser](#mullvad-browser) if you are focused on strong privacy protections and anti-fingerprinting out of the box, [Firefox](#firefox) for casual internet browsers looking for a good alternative to Google Chrome, and [Brave](#brave) if you need Chromium browser compatibility. +본 내용은 현재 표준/비익명 인터넷 탐색 용도로 권장되는 데스크톱 웹 브라우저 및 관련 설정 목록입니다. 강력한 프라이버시 보호 및 핑거프린팅 방지가 기본 제공되는 브라우저를 원하신다면 [Mullvad Browser](#mullvad-browser)를, 평범한 인터넷 브라우저 중 Google Chrome의 적절한 대체제를 원하신다면 [Firefox](#firefox)를, Chromium 브라우저 호환성이 필요하시다면 [Brave](#brave)를 추천드립니다. -If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. We make some configuration recommendations on this page, but all browsers other than Tor Browser will be traceable by *somebody* in some manner or another. +익명으로 인터넷을 탐색해야 하는 경우라면, [Tor](tor.md)를 사용해야 합니다. 본 내용에서 몇 가지 권장 설정을 알려드리고 있지만, Tor 브라우저를 제외한 모든 브라우저는 *누군가* 어떻게든 추적할 수 있습니다. ## Mullvad Browser !!! recommendation - ![Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ align=right } + ![Mullvad Browser 로고](assets/img/browsers/mullvad_browser.svg){ align=right } - **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. + **Mullvad Browser**는 [Tor 브라우저](tor.md#tor-browser)에서 Tor 네트워크 통합을 제거한 버전입니다. Tor 브라우저의 핑거프린팅 방지 브라우저 기술을 VPN 사용자에게 제공하는 것을 주된 목적으로 합니다. Tor 프로젝트에서 개발하고 [Mullvad](vpn.md#mullvad)에서 배포합니다. Mullvad VPN 사용이 필수적이지 **않습니다**. - [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } - [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } - [:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} - [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" } + [:octicons-home-16: 홈페이지](https://mullvad.net/en/browser){ .md-button .md-button--primary } + [:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="프라이버시 정책" } + [:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=문서} + [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="소스 코드" } - ??? downloads + ??? downloads "다운로드" - [:simple-windows11: Windows](https://mullvad.net/en/download/browser/windows) - [:simple-apple: macOS](https://mullvad.net/en/download/browser/macos) - [:simple-linux: Linux](https://mullvad.net/en/download/browser/linux) -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +[Tor 브라우저](tor.md)와 마찬가지로, Mullvad Browser는 브라우저 핑거프린트를 모든 Mullvad Browser 사용자끼리 동일하게 만들어 핑거프린팅을 방지하도록 설계되었습니다. 기본 보안 단계(*Standard*, *Safer*, *Safest*)에 따라 자동으로 설정되는 기본 설정 및 확장 프로그램을 포함하고 있습니다. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -222,9 +222,9 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand These options can be found in :material-menu: → **Settings**. -#### Settings +#### 설정 -##### Shields +##### 보호 Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. @@ -232,34 +232,34 @@ Shields' options can be downgraded on a per-site basis as needed, but by default
-- [x] Select **Prevent sites from fingerprinting me based on my language preferences** -- [x] Select **Aggressive** under Trackers & ads blocking +- [x] **언어 환경 설정을 기반으로 사이트가 지문을 남기지 못하게 합니다** 활성화 +- [x] 추적기 & 광고 차단을 **공격적**으로 설정 - ??? warning "Use default filter lists" - Brave allows you to select additional content filters within the internal `brave://adblock` page. We advise against using this feature; instead, keep the default filter lists. Using extra lists will make you stand out from other Brave users and may also increase attack surface if there is an exploit in Brave and a malicious rule is added to one of the lists you use. + ??? warning "기본 필터 목록을 사용하세요" + Brave 브라우저는 `brave://adblock` 내부 페이지에서 추가적인 콘텐츠 필터를 선택할 수 있습니다. 이 기능을 사용하지 말고 기본 필터 목록을 유지할 것을 권장드립니다. 추가적인 목록을 사용하면 다른 Brave 사용자에 비해 더 눈에 띄게 되며, 만약 Brave에 취약점이 존재하고 여러분이 사용하는 규칙 목록에 악성 규칙이 포함될 경우 공격 표면을 증가시킬 수도 있습니다. -- [x] (Optional) Select **Block Scripts** (1) -- [x] Select **Strict, may break sites** under Block fingerprinting +- [x] (선택 사항) **스크립트 차단** 활성화 (1) +- [x] 지문 차단을 **엄격, 사이트가 손상될 수 있음**으로 설정
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. 해당 옵션은 uBlock Origin의 고급 [차단 모드](https://github.com/gorhill/uBlock/wiki/Blocking-mode)나 [NoScript](https://noscript.net/) 확장 프로그램과 유사한 기능을 제공합니다. -##### Social media blocking +##### 소셜 미디어 차단 -- [ ] Uncheck all social media components +- [ ] 모든 소셜 미디어 항목 비활성화 -##### Privacy and security +##### 개인 정보 보호 및 보안
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) -- [ ] Uncheck **Use Google services for push messaging** -- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** -- [ ] Uncheck **Automatically send daily usage ping to Brave** -- [ ] Uncheck **Automatically send diagnostic reports** -- [x] Select **Always use secure connections** in the **Security** menu -- [ ] Uncheck **Private window with Tor** (1) +- [x] [WebRTC IP 처리 방침](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc)에서 **프록시가 아닌 UDP 비활성화하기** 선택 +- [ ] **푸시 메시지에 Google 서비스 사용** 비활성화 +- [ ] **프라이버시 보호 제품 분석(P3A) 허용** 비활성화 +- [ ] **일일 사용 Ping을 Brave에 자동으로 보내기** 비활성화 +- [ ] **진단 보고서 자동 전송** 비활성화 +- [x] **보안** 메뉴에서 **항상 보안 연결 사용** 활성화 +- [ ] **Tor와 함께하는 개인정보 보호 창** 비활성화 (1) !!! tip "Sanitizing on Close" @@ -269,34 +269,34 @@ Shields' options can be downgraded on a per-site basis as needed, but by default
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave 브라우저의 핑거프린팅 방지 기능은 Tor 브라우저만큼 강력하지 **않습니다**. 또한 Brave에서 Tor를 사용하는 사람은 훨씬 적기 때문에, 더욱 눈에 띄게 됩니다. [강력한 익명성이 필요한 경우라면](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) [Tor 브라우저](tor.md#tor-browser)를 사용해야 합니다. -##### Extensions +##### 확장 프로그램 Disable built-in extensions you do not use in **Extensions** -- [ ] Uncheck **Hangouts** -- [ ] Uncheck **WebTorrent** +- [ ] **Hangouts** 비활성화 +- [ ] **WebTorrent** 비활성화 ##### Web3 Brave's Web3 features can potentially add to your browser fingerprint and attack surface. Unless you use any of features, they should be disabled. -- [ ] Set **Default Ethereum Wallet** to **None** -- [ ] Set **Default Solana Wallet** to **None** -- [ ] Set **Method to resolve IPFS resources** to **Disabled +- [ ] **기본 이더리움 월렛**을 **없음**으로 설정 +- [ ] **기본 Solana 월렛**을 **없음**으로 설정 +- [ ] **IPFS 리소스 리졸빙에 사용하는 방법**을 **사용 중지**로 설정 -##### System +##### 시스템
-- [ ] Uncheck **Continue running apps when Brave is closed** to disable background apps (1) +- [ ] **Brave 종료 후에도 백그라운드 앱을 계속 실행** 비활성화 (1)
-1. This option is not present on all platforms. +1. 플랫폼에 따라 해당 옵션이 제공되지 않을 수 있습니다. -#### Sync +#### 동기화 [Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. diff --git a/i18n/ko/email.md b/i18n/ko/email.md index 6cfba49d..635df187 100644 --- a/i18n/ko/email.md +++ b/i18n/ko/email.md @@ -1,37 +1,37 @@ --- -meta_title: "Encrypted Private Email Recommendations - Privacy Guides" +meta_title: "비공개 암호화 이메일 서비스 권장 목록 - Privacy Guides" title: "이메일 서비스" icon: material/email description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers. --- -Email is practically a necessity for using any online service, however we do not recommend it for person-to-person conversations. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy. +이메일은 모든 온라인 서비스 이용에 사실상 필수적이지만, 개인 간 대화에는 권장드리지 않습니다. 다른 사람에게 연락할 때는 이메일 대신, 순방향 비밀성을 지원하는 인스턴트 메신저를 사용하는 것이 좋습니다. [Recommended Instant Messengers](real-time-communication.md ""){.md-button} For everything else, we recommend a variety of email providers based on sustainable business models and built-in security and privacy features. -- [OpenPGP-Compatible Email Providers :material-arrow-right-drop-circle:](#openpgp-compatible-services) -- [Other Encrypted Providers :material-arrow-right-drop-circle:](#more-providers) -- [Email Aliasing Services :material-arrow-right-drop-circle:](#email-aliasing-services) +- [OpenPGP 호환 이메일 제공 업체 :material-arrow-right-drop-circle:](#openpgp-compatible-services) +- [기타 암호화 이메일 제공 업체 :material-arrow-right-drop-circle:](#more-providers) +- [이메일 별칭 서비스 :material-arrow-right-drop-circle:](#email-aliasing-services) - [Self-Hosted Options :material-arrow-right-drop-circle:](#self-hosting-email) -## OpenPGP Compatible Services +## OpenPGP 호환 서비스 -These providers natively support OpenPGP encryption/decryption and the Web Key Directory (WKD) standard, allowing for provider-agnostic E2EE emails. For example, a Proton Mail user could send an E2EE message to a Mailbox.org user, or you could receive OpenPGP-encrypted notifications from internet services which support it. +다음 제공 업체는 Open PGP 암호화/복호화 및 Web Key Directory(WKD) 표준을 기본적으로 지원하므로, 제공 업체를 가리지 않고 E2EE 이메일 이용이 가능합니다. 예를 들어, Proton Mail 사용자는 Mailbox.org 사용자에게 E2EE 메시지를 보내거나, OpenPGP 지원 인터넷 서비스에서 OpenPGP로 암호화된 알림을 받을 수 있습니다.
-- ![Proton Mail logo](assets/img/email/protonmail.svg){ .twemoji } [Proton Mail](email.md#proton-mail) -- ![Mailbox.org logo](assets/img/email/mailboxorg.svg){ .twemoji } [Mailbox.org](email.md#mailboxorg) +- ![Proton Mail 로고](assets/img/email/protonmail.svg){ .twemoji } [Proton Mail](email.md#proton-mail) +- ![Mailbox.org 로고](assets/img/email/mailboxorg.svg){ .twemoji } [Mailbox.org](email.md#mailboxorg)
-!!! warning +!!! warning "경고" - OpenPGP와 같은 종단간 암호화 기술을 사용하더라도 이메일의 헤더에 일부 메타데이터는 암호화되지 않습니다. Read more about [email metadata](basics/email-security.md#email-metadata-overview). + OpenPGP 등 E2EE 기술을 사용하더라도, 이메일 헤더의 일부 메타데이터는 암호화되지 않은 채로 존재합니다. [이메일 메타데이터 개요](basics/email-security.md#email-metadata-overview)를 살펴보세요. - 또한, OpenPGP는 순방향 비밀성을 제공하지 않습니다. 따라서 발신자 또는 수신자의 개인 키가 유출된다면 지금까지 같은 키로 암호화된 메세지의 내용 또한 유출됩니다. [내 개인 키를 보호하려면 어떻게 해야 하나요?](basics/email-security.md#how-do-i-protect-my-private-keys) + 또한, OpenPGP는 순방향 비밀성을 지원하지 않습니다. 따라서 본인 혹은 수신자의 개인 키가 유출될 경우, 해당 키로 암호화된 이전 메시지가 전부 노출됩니다. [개인 키를 어떻게 보호해야 하나요?](basics/email-security.md#how-do-i-protect-my-private-keys) ### Proton Mail diff --git a/i18n/ko/financial-services.md b/i18n/ko/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/ko/financial-services.md +++ b/i18n/ko/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/ko/index.md b/i18n/ko/index.md index eb90a3b9..0f366bd0 100644 --- a/i18n/ko/index.md +++ b/i18n/ko/index.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Guides: Your Independent Privacy and Security Resource" +meta_title: "Privacy Guides: 여러분의 개인 프라이버시, 보안 리소스" template: overrides/home.ko.html hide: - navigation diff --git a/i18n/ko/mobile-browsers.md b/i18n/ko/mobile-browsers.md index bdf0de25..a08fc1ce 100644 --- a/i18n/ko/mobile-browsers.md +++ b/i18n/ko/mobile-browsers.md @@ -1,5 +1,5 @@ --- -meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides" +meta_title: "프라이버시 중점 모바일(Android, iOS) 웹 브라우저 - Privacy Guides" title: "모바일 브라우저" icon: material/cellphone-information description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. @@ -36,7 +36,7 @@ schema: url: "./" --- -These are our currently recommended mobile web browsers and configurations for standard/non-anonymous internet browsing. If you need to browse the internet anonymously, you should use [Tor](tor.md) instead. In general, we recommend keeping extensions to a minimum; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. +본 내용은 현재 표준/비익명 인터넷 탐색 용도로 권장되는 모바일 웹 브라우저 및 관련 설정 목록입니다. 익명으로 인터넷을 탐색해야 하는 경우라면, [Tor](tor.md)를 사용해야 합니다. In general, we recommend keeping extensions to a minimum; they have privileged access within your browser, require you to trust the developer, can make you [stand out](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), and [weaken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ) site isolation. ## Android diff --git a/i18n/ku-IQ/financial-services.md b/i18n/ku-IQ/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/ku-IQ/financial-services.md +++ b/i18n/ku-IQ/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/nl/financial-services.md b/i18n/nl/financial-services.md index e3effe0d..7aa92cb1 100644 --- a/i18n/nl/financial-services.md +++ b/i18n/nl/financial-services.md @@ -76,7 +76,7 @@ Met deze diensten kunt je online cadeaubonnen kopen voor verschillende handelare ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - ** CoinCards ** (beschikbaar in de VS, Canada en het VK) kunt je cadeaubonnen kopen voor een grote verscheidenheid aan verkopers. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacybeleid" } diff --git a/i18n/pl/financial-services.md b/i18n/pl/financial-services.md index 95af41ad..8dfff6f4 100644 --- a/i18n/pl/financial-services.md +++ b/i18n/pl/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/pt-BR/advanced/dns-overview.md b/i18n/pt-BR/advanced/dns-overview.md index 12789a10..f88ae345 100644 --- a/i18n/pt-BR/advanced/dns-overview.md +++ b/i18n/pt-BR/advanced/dns-overview.md @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS sobre TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS sobre TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) é outro método para criptografar a comunicação de DNS definido em [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). O suporte foi implementado pela primeira vez no Android 9, iOS 14 e no Linux em [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) na versão 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS sobre HTTPS (DoH) diff --git a/i18n/pt-BR/financial-services.md b/i18n/pt-BR/financial-services.md index f930ee20..8eac8dab 100644 --- a/i18n/pt-BR/financial-services.md +++ b/i18n/pt-BR/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/pt-BR/vpn.md b/i18n/pt-BR/vpn.md index a009b723..8f36ec0b 100644 --- a/i18n/pt-BR/vpn.md +++ b/i18n/pt-BR/vpn.md @@ -29,7 +29,7 @@ Se você está procurando mais **privacidade** do seu provedor de internet (ISP) ## Provedores Recomendados -Nossos fornecedores recomendados usam encriptação, aceitam Monero, suportam WireGuard e OpenVPN, e têm uma política de não-rastreamento. Leia nossa [lista completa de requisitos](#criteria) para mais informações. +Nossos provedores recomendados usam criptografia, aceitam Monero, suportam WireGuard & OpenVPN, e têm uma política de não registro. Leia nossa [lista completa de requisitos](#criteria) para mais informações. ### IVPN @@ -197,7 +197,7 @@ Nós também consideramos que é melhor para a segurança das chaves privadas do #### :material-check:{ .pg-green } Examinado por auditores externos -Em Janeiro de 2020, ProtonVPN foi submetida a uma auditoria independente pela SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +Em Janeiro de 2020, ProtonVPN foi submetida a uma auditoria independente pela SEC Consult. A SEC Consult encontrou algumas vulnerabilidades de médio e baixo risco nos aplicativos Windows, Android e iOS da Proton VPN, todos os quais foram "devidamente corrigidos" pela Proton VPN antes que os relatórios fossem publicados. Nenhum dos problemas identificados teria proporcionado acesso remoto ao seu dispositivo ou tráfego. Você pode ver os relatórios individuais para cada plataforma em [protonvpn.com](https://protonvpn.com/blog/open-source/). Em abril de 2022 Proton VPN passou por [outra auditoria](https://protonvpn.com/blog/no-logs-audit/) e o relatório foi [produzido pelo Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). Um [certificado de segurança](https://proton.me/blog/security-audit-all-proton-apps) foi concedido para os aplicativos do Proton Mail em 9 de Novembro de 2021 pela [Securitium](https://research.securitum.com). #### :material-check:{ .pg-green } Clientes de Código Aberto (Open-Source) diff --git a/i18n/pt/financial-services.md b/i18n/pt/financial-services.md index 73602ba2..9d376c95 100644 --- a/i18n/pt/financial-services.md +++ b/i18n/pt/financial-services.md @@ -82,7 +82,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/ru/about/donate.md b/i18n/ru/about/donate.md index d5c3e90c..97139841 100644 --- a/i18n/ru/about/donate.md +++ b/i18n/ru/about/donate.md @@ -3,13 +3,13 @@ title: Поддержать нас --- -Нам нужно много [людей](https://github.com/privacyguides/privacyguides.org/graphs/contributors) и [работы](https://github.com/privacyguides/privacyguides.org/pulse/monthly) чтобы поддерживать Priacy Guides в актуальном состоянии и распространять информацию о безопасности и массовой слежке. If you like what we do, consider getting involved by [editing the site](https://github.com/privacyguides/privacyguides.org) or [contributing translations](https://crowdin.com/project/privacyguides). +Нам нужно много [людей](https://github.com/privacyguides/privacyguides.org/graphs/contributors) и [работы](https://github.com/privacyguides/privacyguides.org/pulse/monthly) чтобы поддерживать Priacy Guides в актуальном состоянии и распространять информацию о безопасности и массовой слежке. Если вам нравится то, что мы делаем, лучший способ помочь - это принять участие [редактируя сайт](https://github.com/privacyguides/privacyguides.org) или [помогая с его переводом](https://crowdin.com/project/privacyguides). Если вы хотите помочь нам материально, лучшим способом будет пожертвование через Open Collective, ресурс, управляемый нашим фискальным агентом. Open Collective поддерживает оплату через кредитную или дебетовую карту, PayPal, банковские переводы. -[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" } +[Пожертвовать на OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" } -Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. После пожертвования вы получите чек от Фонда Open Collective. Privacy Guides не предоставляет финансовых консультаций, и вам следует обратиться к своему налоговому консультанту, чтобы узнать, применимо ли это к вам. +Пожертвования сделанные нам непосредственно через Open Collective не облагаются налогами США, потому что наш фискальный агент (Фонд Open Collective) - зарегистрированная организация 501 (с)3. После пожертвования вы получите чек от Фонда Open Collective. Privacy Guides не предоставляет финансовых консультаций, и вам следует обратиться к своему налоговому консультанту, чтобы узнать, применимо ли это к вам. Если вы уже пользуетесь спонсорством на GitHub, вы также можете спонсировать нашу организацию там. diff --git a/i18n/ru/about/index.md b/i18n/ru/about/index.md index 4a16f58a..857dda3f 100644 --- a/i18n/ru/about/index.md +++ b/i18n/ru/about/index.md @@ -1,6 +1,6 @@ --- -title: "About Privacy Guides" -description: Privacy Guides is a socially motivated website that provides information for protecting your data security and privacy. +title: "О Privacy Guides" +description: Privacy Guides - это сайт, предоставляющий информацию по защите безопасности и конфиденциальности ваших данных. schema: "@context": https://schema.org "@type": Organization @@ -17,7 +17,7 @@ schema: - https://mastodon.neat.computer/@privacyguides --- -![Privacy Guides logo](../assets/brand/png/square/pg-yellow.png){ align=right } +![Лого Privacy Guides](../assets/brand/png/square/pg-yellow.png){ align=right } **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. @@ -52,7 +52,7 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/jonah) - [:simple-github: GitHub](https://github.com/jonaharagon "@jonaharagon") - [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@jonah "@jonah@neat.computer"){rel=me} - - [:fontawesome-solid-house: Homepage](https://www.jonaharagon.com) + - [:fontawesome-solid-house: Домашняя страница](https://www.jonaharagon.com) ??? person "@niek-de-wilde" @@ -73,13 +73,13 @@ So far in 2023 we've launched international translations of our website in [Fren - [:simple-github: GitHub](https://github.com/freddy-m "@freddy-m") - [:simple-mastodon: Mastodon](https://social.lol/@freddy "@freddy@social.lol"){rel=me} - [:fontawesome-solid-envelope: Email](mailto:freddy@privacyguides.org) - - [:fontawesome-solid-house: Homepage](https://freddy.omg.lol) + - [:fontawesome-solid-house: Домашняя страница](https://freddy.omg.lol) ??? person "@mfwmyfacewhen" - [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/mfwmyfacewhen) - [:simple-github: GitHub](https://github.com/mfwmyfacewhen "@mfwmyfacewhen") - - [:fontawesome-solid-house: Homepage](https://mfw.omg.lol) + - [:fontawesome-solid-house: Домашняя страница](https://mfw.omg.lol) ??? person "@olivia" diff --git a/i18n/ru/about/privacy-policy.md b/i18n/ru/about/privacy-policy.md index 7288aaca..4fb867e9 100644 --- a/i18n/ru/about/privacy-policy.md +++ b/i18n/ru/about/privacy-policy.md @@ -9,13 +9,13 @@ Privacy Guides - это общественный проект, управляе Конфиденциальность посетителей нашего сайта очень важна для нас, поэтому мы не отслеживаем конкретных людей. Если вы посетитель нашего сайта: - Никакая персональная информация о вас не собирается -- No information such as cookies are stored in the browser +- В браузере не сохраняется такая информация, как, например, файлы cookie - Никакая информация не передаётся третьим лицам - Никакая информация не передаётся рекламным компаниям - Никакая информация не собирается для изучения личных и поведенческих тенденций - Ваша информация не монетизируется -You can view the data we collect on our [statistics](statistics.md) page. +Вы можете ознакомиться с данными, которые мы собираем, на нашей странице [статистики](statistics.md). Мы используем self-hosted установку [Plausible Analytics](https://plausible.io) для сбора некоторых анонимных данных об использовании в статистических целях. Цель заключается в отслеживании общих тенденций посещаемости нашего сайта, а не в отслеживании отдельных посетителей. Все данные приведены только в агрегированном виде. Никакие личные данные не собираются. diff --git a/i18n/ru/about/privacytools.md b/i18n/ru/about/privacytools.md index 515c21f5..928df548 100644 --- a/i18n/ru/about/privacytools.md +++ b/i18n/ru/about/privacytools.md @@ -1,118 +1,118 @@ --- -title: "PrivacyTools FAQ" +title: "FAQ по PrivacyTools" --- -# Why we moved on from PrivacyTools +# Почему мы перешли с PrivacyTools -In September 2021, every active contributor unanimously agreed to move from PrivacyTools to work on this site: Privacy Guides. This decision was made because PrivacyTools’ founder and controller of the domain name had disappeared for an extended period of time and could not be contacted. +В сентябре 2021 года все активные участники единогласно согласились перейти из PrivacyTools для работы на этом сайте: Privacy Guides. Это решение было принято потому, что основатель PrivacyTools и контроллер доменного имени исчезли на длительный период времени, и с ними невозможно было связаться. -Having built a reputable site and set of services on PrivacyTools.io, this caused grave concerns for the future of PrivacyTools, as any future disruption could wipe out the entire organization with no recovery method. This transition was communicated to the PrivacyTools community many months in advance via a variety of channels including its blog, Twitter, Reddit, and Mastodon to ensure the entire process went as smoothly as possible. We did this to ensure nobody was kept in the dark, which has been our modus operandi since our team was created, and to make sure Privacy Guides was recognized as the same reliable organization that PrivacyTools was before the transition. +После создания авторитетного сайта и набора услуг на PrivacyTools.io, это вызвало серьезные опасения за будущее PrivacyTools, поскольку любой будущий сбой мог уничтожить всю организацию без возможности восстановления. Об этом переходе сообщество PrivacyTools было проинформировано за много месяцев до этого по различным каналам, включая блог, Twitter, Reddit и Mastodon, чтобы весь процесс прошел как можно более гладко. Мы сделали это для того, чтобы никто не оставался в неведении, что было нашим методом работы с момента создания нашей команды, а также для того, чтобы Privacy Guides была признана той же надежной организацией, какой была PrivacyTools до перехода. -After the organizational move was completed, the founder of PrivacyTools returned and began to spread misinformation about the Privacy Guides project. They continue to spread misinformation in addition to operating a paid link farm on the PrivacyTools domain. We are creating this page to clear up any misconceptions. +После завершения организационного переезда основатель PrivacyTools вернулся и начал распространять дезинформацию о проекте Privacy Guides. Он продолжает распространять дезинформацию, а также добавил платные ссылки на домене PrivacyTools. Мы создали эту страницу, чтобы прояснить все заблуждения. -## What is PrivacyTools? +## Что такое PrivacyTools? -PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. +PrivacyTools был создан в 2015 году "BurungHantu", который хотел сделать информационный ресурс о конфиденциальности - полезные инструменты после разоблачений Сноудена. Сайт превратился в процветающий проект с открытым исходным кодом, [в котором участвовало множество участников](https://github.com/privacytools/privacytools.io/graphs/contributors), некоторые из которых в конечном итоге получили различные организационные обязанности, такие как управление такими онлайн-сервисами, как Matrix и Mastodon, управление и проверка изменений на сайте GitHub, поиск спонсоров для проекта, написание статей в блоге и управление платформами для работы с социальными сетями, такими как Twitter, и т.д. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Начиная с 2019 года, BurungHantu все больше и больше отдалялся от активного развития сайта и сообществ, и начал задерживать платежи, связанные с серверами, которыми мы управляли. Чтобы не заставлять нашего системного администратора оплачивать расходы на сервер из своего кармана, мы изменили способы пожертвований, указанные на сайте, с личных PayPal и криптовалютных счетов BurungHantu на новую страницу OpenCollective на сайте [31 октября 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). Это дало дополнительные преимущества: наши финансы стали полностью прозрачными, во что мы очень верим, и их можно было вычесть из налогов в США, поскольку они хранились в фонде Open Collective Foundation 501(c)3. Это изменение было единогласно одобрено командой и не оспаривалось. -## Why We Moved On +## Почему мы переехали -In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. +В 2020 году отсутствие BurungHantu стало гораздо более заметным. В какой-то момент мы потребовали изменить серверы имен домена на серверы имен, контролируемые нашим системным администратором, чтобы избежать будущих сбоев, и это изменение не было завершено более чем за месяц после первоначального запроса. Он пропадал из чатов на Matrix несколько месяцев подряд, изредка появляясь, чтобы дать небольшой отзыв или пообещать быть более активным, а затем снова исчезал. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +В октябре 2020 года системный администратор PrivacyTools (Jonah) [покинул](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) проект из-за этих трудностей, передав управление другому давнему участнику. Jonah работал почти со всеми сервисами PrivacyTools и выступал в качестве *де-факто* руководителя проекта в отсутствие BurungHantu, поэтому его уход стал значительным изменением в организации. В то время, в связи с этими значительными организационными изменениями, BurungHantu пообещал оставшейся команде вернуться и взять на себя управление проектом в дальнейшем. ==Команда PrivacyTools пыталась связаться и ним несколькими способами связи в течение последующих месяцев, но не получила никакого ответа.== -## Domain Name Reliance +## Надежность доменных имен -At the beginning of 2021, the PrivacyTools team grew worried about the future of the project, because the domain name was set to expire on 1st March 2021. The domain was ultimately renewed by BurungHantu with no comment. +В начале 2021 года команда PrivacyTools начала беспокоиться о будущем проекта, поскольку срок действия доменного имени истекал 1 марта 2021 года. В конечном итоге домен был продлен BurungHantu без каких-либо комментариев. -The team’s concerns were not addressed, and we realized this would be a problem every year: If the domain expired it would have allowed it to be stolen by squatters or spammers, thus ruining the organization's reputation. We also would have had trouble reaching the community to inform them of what took place. +Опасения команды не были учтены, и мы поняли, что такая проблема будет возникать каждый год: если бы срок действия домена истек, это позволило бы сквоттерам или спамерам украсть его, что испортило бы репутацию организации. Нам также было бы трудно связаться с сообществом, чтобы сообщить им о том, что произошло. -Without being in any contact with BurungHantu, we decided the best course of action would be to move to a new domain name while we still had guaranteed control over the old domain name, sometime before March 2022. This way, we would be able to cleanly redirect all PrivacyTools resources to the new site without any interruption in service. This decision was made many months in advance and communicated to the entire team in the hopes that BurungHantu would reach out and assure his continued support for the project, because with a recognizable brand name and large communities online, moving away from "PrivacyTools" was the least desirable possible outcome. +Не имея никаких контактов с BurungHantu, мы решили, что лучшим вариантом действий будет переход на новое доменное имя, пока у нас еще есть гарантированный контроль над старым доменным именем, где-то до марта 2022 года. Таким образом, мы сможем чётко перенаправить все ресурсы PrivacyTools на новый сайт без каких-либо перебоев в работе. Это решение было принято за много месяцев до начала проекта и доведено до сведения всей команды в надежде на то, что BurungHantu выйдет на связь и заверит в своей дальнейшей поддержке проекта, поскольку, имея узнаваемое имя бренда и большие сообщества в сети, уход от "PrivacyTools" был наименее желательным возможным результатом. -In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the team to help with the transition. +В середине 2021 года команда PrivacyTools связалась с Jonah, который согласился вернуться в команду, чтобы помочь с переходом. -## Community Call to Action +## Призыв сообщества к действию -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +В конце июля 2021 года мы [сообщили](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) сообществу PrivacyTools о нашем намерении выбрать новое имя и продолжить проект на новом домене, который будет [выбран](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) 2 августа 2022 года. В итоге был выбран "Privacy Guides", при этом домен `privacyguides.org` уже принадлежал Jonah для сайд-проекта 2020 года, который так и остался неразработанным. -## Control of r/privacytoolsIO +## Контроль над r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Одновременно с текущими проблемами с сайтом privacytools.io команда модераторов r/privacytoolsIO столкнулась с трудностями в управлении сабреддитом. Сабреддит всегда управлялся в основном независимо от развития сайта, но BurungHantu был основным модератором сабреддита, и он был единственным модератором, получившим привилегии "Полный контроль". u/trai_dep был единственным активным модератором в то время, и [разместил](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) запрос администраторам Reddit 28 июня 2021 года с просьбой предоставить ему должность основного модератора и полные привилегии контроля, чтобы внести необходимые изменения в сабреддит. -Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. +Reddit требует, чтобы у сабреддитов были активные модераторы. Если основной модератор неактивен в течение длительного периода времени (например, года), должность основного модератора может быть переназначена следующему по очереди модератору. Для того чтобы эта просьба была удовлетворена, BurungHantu должен был полностью отсутствовать на Reddit в течение длительного периода времени, что соответствовало его поведению на других платформах. -> If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. +> Если вы были удалены из роли модератора на сабреддите через запрос на Reddit, это произошло потому, что ваша недостаточная активность и отсутствие ответов на сообщения привели к тому, что сабреддит был переведен под управление r/redditrequest. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest - это способ Reddit убедиться, что сообщества имеют активных модераторов, и является частью [Кодекса поведения модераторов](https://www.redditinc.com/policies/moderator-code-of-conduct). -## Beginning the Transition +## Начало перехода -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +14 сентября 2021 года мы [объявили](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) о начале перехода на новый домен: -> [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. +> [...] мы сочли необходимым сделать этот переход как можно раньше, чтобы люди поскорее узнали о нем. Это даст нам достаточно времени для перехода на доменное имя, которое в настоящее время перенаправляется на www.privacyguides.org, и, надеюсь, даст всем достаточно времени, чтобы заметить изменения, обновить закладки и веб-сайты и т.д. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +Это изменение [повлекло за собой:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) -- Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). -- Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. -- Posting announcements to our subreddit and various other communities informing people of the official change. -- Formally closing privacytools.io services, like Matrix and Mastodon, and encouraging existing users to migrate as soon as possible. +- Перенаправление www.privacytools.io на [www.privacyguides.org](https://www.privacyguides.org). +- Архивирование исходного кода на GitHub для сохранения нашей прошлой работы и трекера проблем, который мы продолжали использовать в течение нескольких месяцев будущего развития этого сайта. +- Размещение объявлений на нашем subreddit и в различных других сообществах, информирующих людей об официальных изменениях. +- Официальное закрытие сервисов privacytools.io, таких как Matrix и Mastodon, и поощрение существующих пользователей к скорейшей миграции. -Things appeared to be going smoothly, and most of our active community made the switch to our new project exactly as we hoped. +Все шло гладко, и большая часть нашего активного сообщества перешла на новый проект именно так, как мы надеялись. -## Following Events +## Следующие события -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Примерно через неделю после перехода BurungHantu вернулся в сеть впервые почти за год, однако никто из нашей команды не захотел возвращаться в PrivacyTools из-за его ненадежности. Вместо того чтобы извиниться за свое длительное отсутствие, он сразу перешел в наступление и позиционировал переход на Privacy Guides как нападение на него и его проект. Впоследствии он [удалил](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) многие из этих сообщений, когда сообщество указало на его отсутствие и отказ от проекта. -At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). +В этот момент BurungHantu заявил, что хочет продолжить работу над privacytools.io самостоятельно, и попросил убрать перенаправление с www.privacytools.io на [www.privacyguides.org](https://www.privacyguides.org). Мы согласились и попросили его оставить поддомены для Matrix, Mastodon и PeerTube активными, чтобы мы могли использовать их в качестве общественной службы для нашего сообщества, по крайней мере, в течение нескольких месяцев, чтобы пользователи этих платформ могли легко перейти на другие аккаунты. Из-за федеративного характера услуг, которые мы предоставляли, они были привязаны к определенным доменным именам, что делало миграцию очень сложной (а в некоторых случаях и невозможной). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +К сожалению, поскольку контроль над сабреддитом r/privacytoolsIO не был возвращен BurungHantu по его требованию (дополнительная информация ниже), эти поддомены были [отключены](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) в начале октября, что положило конец любым возможностям миграции для пользователей, все еще использующих эти сервисы. -Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. +После этого BurungHantu выдвинул ложные обвинения в том, что Jonah крадет пожертвования из проекта. С момента предполагаемого инцидента в BurungHantu прошло более года, но он так и не поставил никого в известность о нем до тех пор, пока не произошла миграция на Privacy Guides. Команда [и сообщество](https://twitter.com/TommyTran732/status/1526153536962281474)неоднократно просили BurungHantu предоставить доказательства и прокомментировать причину его молчания, но он этого так и не сделал. -BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status/1510560676967710728) alleging that an "attorney" had reached out to him on Twitter and was providing advice, in another attempt to bully us into giving him control of our subreddit, and as part of his smear campaign to muddy the waters surrounding the launch of Privacy Guides while pretending to be a victim. +BurungHantu также опубликовал сообщение в [своём твиттере](https://twitter.com/privacytoolsIO/status/1510560676967710728), в котором утверждал, что "адвокат" связался с ним и проконсультировался с ним, в очередной попытке запугать нас, чтобы мы отдали ему контроль над нашим сабреддитом, и как часть его клеветнической кампании, чтобы запутать людей вокруг запуска Privacy Guides, притворяясь жертвой. -## PrivacyTools.io Now +## PrivacyTools.io сейчас -As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. +По состоянию на 25 сентября 2022 года мы видим, как планы BurungHantu воплощаются в жизнь на сайте privacytools.io, и именно по этой причине мы решили создать сегодня эту пояснительную страницу. Сайт, которым он управляет, похоже, является сильно SEO-оптимизированной версией сайта, который рекомендует инструменты в обмен на финансовую компенсацию. Совсем недавно из PrivacyTools были удалены IVPN и Mullvad, два VPN-провайдера, почти повсеместно [рекомендованные](../vpn.md) сообществом по защите конфиденциальности и известные своей позицией против партнерских программ. Ну а что взамен? NordVPN, Surfshark, ExpressVPN и hide.me; гигантские VPN-корпорации с ненадежными платформами и деловой практикой, печально известные своим агрессивным маркетингом и партнерскими программами. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools стал именно таким сайтом, от которого мы [предостерегали](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) в блоге PrivacyTools в 2019 году.**== Мы старались держаться на расстоянии от PrivacyTools с момента перехода, но их продолжающаяся травля нашего проекта, а теперь и абсурдное злоупотребление доверием к их бренду, завоеванным за 6 лет вклада в открытый исходный код, нас крайне беспокоит. Те из нас, кто действительно борется за конфиденциальность, не борются друг против друга и не получают советы от тех, кто больше заплатит. -## r/privacytoolsIO Now +## r/privacytoolsIO Сейчас -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +После запуска [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), для u/trai_dep было нецелесообразно продолжать модерировать оба сабреддита, и после того, как сообщество согласилось с переходом, r/privacytoolsIO стал [ограничен](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) от 1 ноября 2021 года: -> [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. +> [...] Рост этого сабреддита - результат огромных усилий команды PrivacyGuides.org на протяжении нескольких лет. А также усилий каждого из вас. > -> A Subreddit is a great deal of work to administer and moderate. Like a garden, it requires patient tending and daily care. It’s not a task for dilettantes or commitment-challenged people. It can’t thrive under a gardener who abandons it for several years, then shows up demanding this year’s harvest as their tribute. It’s unfair to the team formed years ago. It’s unfair to you. [...] +> Сабреддит - это большая работа по администрированию и модерированию. Как и сад, он требует терпеливого ухода и ежедневной заботы. Это задача не для дилетантов и не для тех, кто боится обязательств. Он не сможет процветать под руководством садовника, который забросил его на несколько лет, а затем явился с требованием отдать ему урожай этого года. Это несправедливо по отношению к команде, сформированной много лет назад. Это несправедливо и по отношению к вам. [...] -Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. +Сабреддиты не принадлежат никому, и, в особенности, владельцам брендов. Они принадлежат своим сообществам, и сообщество и его модераторы приняли решение поддержать переход на r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +В последующие месяцы BurungHantu угрожал и умолял вернуть управление сабреддитом на его аккаунт в [нарушение](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) правил Reddit: -> Retaliation from any moderator with regards to removal requests is disallowed. +> Ответные действия со стороны любого модератора в отношении запросов на удаление запрещены. -For a community with many thousands of remaining subscribers, we feel that it would be incredibly disrespectful to return control of that massive platform to the person who abandoned it for over a year, and who now operates a website that we feel provides very low-quality information. Preserving the years of past discussions in that community is more important to us, and thus u/trai_dep and the rest of the subreddit moderation team has made the decision to keep r/privacytoolsIO as-is. +Для сообщества с многими тысячами оставшихся подписчиков мы считаем, что было бы невероятно неуважительно вернуть контроль над этой массивной платформой человеку, который забросил ее более чем на год и который теперь управляет сайтом, предоставляющим, по нашему мнению, очень низкокачественную информацию. Для нас важнее сохранить многолетние обсуждения в этом сообществе, и поэтому u/trai_dep и остальная команда модераторов сабреддита приняли решение оставить r/privacytoolsIO как есть. -## OpenCollective Now +## OpenCollective сейчас -Our fundraising platform, OpenCollective, is another source of contention. Our position is that OpenCollective was put in place by our team and managed by our team to fund services we currently operate and which PrivacyTools no longer does. We [reached out](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) to all of our donors regarding our move to Privacy Guides, and we were unanimously supported by our sponsors and community. +Наша платформа для сбора средств, OpenCollective, является еще одним источником разногласий. Наша позиция заключается в том, что OpenCollective был создан нашей командой и управлялся нашей командой для финансирования услуг, которые мы предоставляем в настоящее время и которые PrivacyTools больше не предоставляет. Мы [обратились](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) ко всем нашим спонсорам и сообществу по поводу нашего перехода на Privacy Guides, и мы были единогласно поддержаны ими. -Thus, the funds in OpenCollective belong to Privacy Guides, they were given to our project, and not the owner of a well known domain name. In the announcement made to donors on September 17th, 2021, we offered refunds to any donor who disagrees with the stance we took, but nobody has taken us up on this offer: +Таким образом, средства в OpenCollective принадлежат Privacy Guides, они были переданы нашему проекту, а не владельцу известного доменного имени. В объявлении, сделанном донорам 17 сентября 2021 года, мы предложили возврат средств любому спонсору, который не согласен с занятой нами позицией, но никто не воспользовался этим предложением: -> If any sponsors or backers disagree with or feel misled by these recent events and would like to request a refund given these highly unusual circumstances, please get in touch with our project admin by emailing jonah@triplebit.net. +> Если кто-либо из спонсоров не согласен с этими недавними событиями или считает, что его ввели в заблуждение, и хотел бы потребовать возврата средств, учитывая эти крайне необычные обстоятельства, пожалуйста, свяжитесь с администратором проекта по электронной почте jonah@triplebit.net. -## Further Reading +## К дальнейшему прочтению -This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. +Эта тема активно обсуждалась в наших сообществах в разных местах, и, вероятно, большинство людей, читающих эту страницу, уже знакомы с событиями, приведшими к переходу на Privacy Guides. Некоторые из наших предыдущих сообщений по этому вопросу могут содержать дополнительные подробности, которые мы опустили здесь для краткости. Для полноты картины они приведены ниже. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) -- [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) -- [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) -- [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) -- [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) +- [28 июня 2021 года запрос на контроль над r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) +- [27 июля 2021 года объявление о наших намерениях переехать в блоге PrivacyTools, написанное командой](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) +- [13 сентября 2021 года объявление о начале нашего перехода на Privacy Guides на r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [17 сентября 2021 года объявление на OpenCollective от Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) +- [30 сентября 2021 года в Твиттере подробно описано большинство событий, описанных на этой странице](https://twitter.com/privacy_guides/status/1443633412800225280) +- [1 октября 2021 года сообщение от u/dng99 о сбое поддомена](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) +- [2 апреля 2022 года ответ u/dng99 на обвинения в блоге PrivacyTools](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [16 мая 2022 года ответ от @TommyTran732 в Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) +- [3 сентября 2022 года пост на форуме Techlore от @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/ru/about/services.md b/i18n/ru/about/services.md index b1be5234..6439cea4 100644 --- a/i18n/ru/about/services.md +++ b/i18n/ru/about/services.md @@ -2,7 +2,7 @@ Мы держим ряд веб-сервисов для тестирования возможностей и продвижения классных децентрализованных, федеративных и/или открытых проектов. Многие из этих сервисов доступны публично и описаны ниже. -[:material-comment-alert: Report an issue](https://discuss.privacyguides.net/c/services/2){ class="md-button md-button--primary" } +[:material-comment-alert: Сообщить о проблеме](https://discuss.privacyguides.net/c/services/2){ class="md-button md-button--primary" } ## Discourse @@ -32,7 +32,7 @@ ## Invidious -- Domain: [invidious.privacyguides.net](https://invidious.privacyguides.net) -- Availability: Semi-Public - We host Invidious primarily to serve embedded YouTube videos on our website, this instance is not intended for general-purpose use and may be limited at any time. -- Source: [github.com/iv-org/invidious](https://github.com/iv-org/invidious) +- Домен: [invidious.privacyguides.net](https://invidious.privacyguides.net) +- Доступность: Полупубличный + Мы размещаем Invidious в основном для обслуживания встроенных видеороликов YouTube на нашем сайте, этот экземпляр не предназначен для общего использования и может быть ограничен в любое время. +- Исходный код: [github.com/iv-org/invidious](https://github.com/iv-org/invidious) diff --git a/i18n/ru/android.md b/i18n/ru/android.md index f6f5d96a..18a0b998 100644 --- a/i18n/ru/android.md +++ b/i18n/ru/android.md @@ -1,8 +1,8 @@ --- -meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides" +meta_title: "Рекомендации по Android: GrapheneOS и DivestOS - Privacy Guides" title: "Android" icon: 'simple/android' -description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives. +description: Вы можете заменить операционную систему на своем Android на эти безопасные и конфиденциальные альтернативы. schema: - "@context": http://schema.org @@ -15,7 +15,7 @@ schema: name: Android image: /assets/img/android/android.svg url: https://source.android.com/ - sameAs: https://en.wikipedia.org/wiki/Android_(operating_system) + sameAs: https://ru.wikipedia.org/wiki/Android - "@context": http://schema.org "@type": CreativeWork @@ -46,7 +46,7 @@ schema: "@type": Brand name: Google image: /assets/img/android/google-pixel.png - sameAs: https://en.wikipedia.org/wiki/Google_Pixel + sameAs: https://ru.wikipedia.org/wiki/Google_Pixel review: "@type": Review author: @@ -149,33 +149,33 @@ DivestOS uses F-Droid as its default app store. Normally, we would recommend avo Not all of the supported devices have verified boot, and some perform it better than others. -## Android Devices +## Android-устройства -When purchasing a device, we recommend getting one as new as possible. The software and firmware of mobile devices are only supported for a limited time, so buying new extends that lifespan as much as possible. +При покупке устройства рекомендуем приобрести как можно более новое. ПО и прошивка мобильных устройств поддерживаются в только в течение ограниченного периода времени, поэтому покупка нового устройства продлевает его жизненный цикл настолько, насколько это возможно. -Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. +Избегайте покупки телефонов у операторов мобильной связи. У них часто **заблокирован ОС** и они не поддерживают [OEM разблокировку](https://source.android.com/devices/bootloader/locking_unlocking). Эти варианты телефонов не позволят вам установить какой-либо альтернативный дистрибутив Android. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of [IMEI blacklisting](https://www.gsma.com/security/resources/imei-blacklisting/). There is also a risk involved with you being associated with the activity of the previous owner. +Будьте **очень осторожны** при покупке подержанных телефонов в интернет-магазинах. Всегда проверяйте репутацию продавца. Если устройство украдено, существует вероятность [внесения его IMEI в черный список](https://www.gsma.com/security/resources/imei-blacklisting/). Также существует риск связывания вас с действиями предыдущего владельца устройства. -A few more tips regarding Android devices and operating system compatibility: +Еще несколько советов относительно устройств Android и совместимости с операционной системой: -- Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. -- Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- Не покупайте устройства, срок службы которых истек или близок к концу, дополнительные обновления прошивки должны быть предоставлены производителем. +- Не покупайте телефоны с предустановленной LineageOS или /e/ OS или любые телефоны Android без надлежащей поддержки [Проверенной загрузки (Verified Boot)](https://source.android.com/security/verifiedboot?hl=ru) и обновлений прошивки. Вы также не сможете проверить, взломаны ли эти устройства. +- Короче, если устройство или дистрибутив Android не указаны в этом списке, вероятно, на это есть веская причина. Загляните на наш [форум](https://discuss.privacyguides.net/), чтобы узнать подробности! ### Google Pixel -Google Pixel phones are the **only** devices we recommend for purchase. Pixel phones have stronger hardware security than any other Android devices currently on the market, due to proper AVB support for third-party operating systems and Google's custom [Titan](https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html) security chips acting as the Secure Element. +Телефоны Google Pixel - это **единственные** устройства, которые мы рекомендуем к покупке. Телефоны Pixel имеют более высокий уровень аппаратной безопасности, чем любые другие устройства Android, представленные в настоящее время на рынке, благодаря надлежащей поддержке AVB для сторонних операционных систем и пользовательским чипам безопасности Google [Titan](https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html), выступающим в качестве безопасного элемента. !!! recommendation ![Google Pixel 6](assets/img/android/google-pixel.png){ align=right } - **Google Pixel** devices are known to have good security and properly support [Verified Boot](https://source.android.com/security/verifiedboot), even when installing custom operating systems. + Устройства **Google Pixel** известны хорошей безопасностью и правильной поддержкой [Verified Boot](https://source.android.com/security/verifiedboot), даже при установке сторонних операционных систем. - Beginning with the **Pixel 6** and **6 Pro**, Pixel devices receive a minimum of 5 years of guaranteed security updates, ensuring a much longer lifespan compared to the 2-4 years competing OEMs typically offer. + Начиная с **Pixel 6** и **6 Pro**, устройства Pixel получают минимум 5 лет гарантированных обновлений безопасности, что обеспечивает гораздо более длительный срок службы по сравнению с 2-4 годами, которые обычно предлагают конкурирующие OEM-производители. - [:material-shopping: Store](https://store.google.com/category/phones){ .md-button .md-button--primary } + [:material-shopping: Магазин](https://store.google.com/category/phones){ .md-button .md-button--primary } Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface. diff --git a/i18n/ru/basics/common-threats.md b/i18n/ru/basics/common-threats.md index 53205087..fe60bd69 100644 --- a/i18n/ru/basics/common-threats.md +++ b/i18n/ru/basics/common-threats.md @@ -29,51 +29,51 @@ Some of these threats may be more important to you than others, depending on you :material-bug-outline: Пассивные атаки -Security and privacy are also often confused, because you need security to obtain any semblance of privacy: Using tools—even if they're private by design—is futile if they could be easily exploited by attackers who later release your data. However, the inverse isn't necessarily true: The most secure service in the world *isn't necessarily* private. The best example of this is trusting data to Google who, given their scale, have had few security incidents by employing industry-leading security experts to secure their infrastructure. Even though Google provides very secure services, very few people would consider their data private in Google's free consumer products (Gmail, YouTube, etc.) +Безопасность и конфиденциальность также часто путают, поскольку для получения хоть какого-то подобия конфиденциальности необходима безопасность: использование инструментов - даже если они приватны по своей конструкции - бесполезно, если они могут быть легко использованы злоумышленниками, которые впоследствии обнародуют ваши данные. Однако обратное не всегда верно: самый защищенный в мире сервис *необязательно* приватный. Лучшим примером этого является передача данных компании Google, у которой, учитывая ее масштабы, было мало инцидентов, связанных с безопасностью, за счёт привлечения экспертов по безопасности, лидирующих в данной отрасли, для защиты своей инфраструктуры. Несмотря на то, что Google предоставляет очень безопасные услуги, очень немногие люди сочтут свои данные конфиденциальными в бесплатных продуктах Google (Gmail, YouTube и т. д.) -When it comes to application security, we generally don't (and sometimes can't) know if the software we use is malicious, or might one day become malicious. Even with the most trustworthy developers, there's generally no guarantee that their software doesn't have a serious vulnerability that could later be exploited. +Когда речь идет о безопасности приложений, мы обычно не знаем (а иногда и не можем знать), является ли используемое нами программное обеспечение вредоносным или может ли оно однажды стать таковым. Даже у самых надежных разработчиков, как правило, нет гарантии, что их программное обеспечение не имеет серьезной уязвимости, которая впоследствии может быть использована. -To minimize the damage that a malicious piece of software *could* do, you should employ security by compartmentalization. For example, this could come in the form of using different computers for different jobs, using virtual machines to separate different groups of related applications, or using a secure operating system with a strong focus on application sandboxing and mandatory access control. +Чтобы минимизировать возможный ущерб, которое *может* причинить вредоносное ПО, следует использовать защиту путём разделения. К примеру, это может выражаться в использовании разных компьютеров для разных задач, использовании виртуальных машин для разделения различных групп связанных приложений или использовании безопасной операционной системы с сильным акцентом на "песочницу" приложений и обязательный контроль доступа. !!! tip - Mobile operating systems generally have better application sandboxing than desktop operating systems: Apps can't obtain root access, and require permission for access to system resources. + Мобильные операционные системы, как правило, имеют лучшую "песочницу" для приложений, чем настольные операционные системы: приложения не могут получить root-доступ и требуют разрешения на доступ к системным ресурсам. - Desktop operating systems generally lag behind on proper sandboxing. ChromeOS has similar sandboxing capabilities to Android, and macOS has full system permission control (and developers can opt-in to sandboxing for applications). However, these operating systems do transmit identifying information to their respective OEMs. Linux tends to not submit information to system vendors, but it has poor protection against exploits and malicious apps. This can be mitigated somewhat with specialized distributions which make significant use of virtual machines or containers, such as [Qubes OS](../../desktop/#qubes-os). + Настольные операционные системы, как правило, отстают по части надлежащей "песочницы". ChromeOS имеет возможности "песочницы", аналогичные Android, а macOS имеет полный контроль системных разрешений (и разработчики могут отказаться от "песочницы" для приложений). Однако эти операционные системы передают идентифицирующую информацию своим соответствующим OEM-производителям. Linux, как правило, не предоставляет информацию поставщикам систем, но имеет слабую защиту от эксплойтов и вредоносных приложений. Это можно несколько смягчить с помощью специализированных дистрибутивов, которые в значительной степени используют виртуальные машины или контейнеры, например [Qubes OS](../../desktop/#qubes-os). -:material-target-account: Targeted Attacks +:material-target-account: Целевые атаки -Targeted attacks against a specific person are more problematic to deal with. Common attacks include sending malicious documents via email, exploiting vulnerabilities (e.g. in browsers and operating systems), and physical attacks. If this is a concern for you, you should employ more advanced threat mitigation strategies. +С целенаправленными атаками на конкретного человека бороться сложнее. К распространенным атакам относятся рассылка вредоносных документов по электронной почте, использование уязвимостей (например, в браузерах и операционных системах) и физические атаки. Если это вас беспокоит, вам следует использовать более продвинутые стратегии защиты от угроз. !!! tip - By design, **web browsers**, **email clients**, and **office applications** typically run untrusted code, sent to you from third parties. Running multiple virtual machines—to separate applications like these from your host system, as well as each other—is one technique you can use to mitigate the chance of an exploit in these applications compromising the rest of your system. For example, technologies like Qubes OS or Microsoft Defender Application Guard on Windows provide convenient methods to do this. + По своей конструкции **веб-браузеры**, **почтовые клиенты** и **офисные приложения** обычно выполняют ненадёжный код, переданный вам третьими лицами. Запуск нескольких виртуальных машин для отделения подобных приложений от хост-системы, а также друг от друга - это одна из техник, которую можно использовать для снижения вероятности того, что эксплойт в этих приложениях скомпрометирует остальную часть вашей системы. Например, такие технологии, как Qubes OS или Microsoft Defender Application Guard в Windows, предоставляют удобные методы для этого. -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +Если вы опасаетесь **физических атак**, вам следует использовать операционную систему с реализацией безопасной проверенной загрузки, например Android, iOS, macOS или [Windows (с TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). Также следует убедиться, что диск зашифрован и что операционная система использует TPM или [Secure Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) или [Secure Element](https://developers.google.com/android/security/android-ready-se) для ограничения количества попыток ввода парольной фразы шифрования. Вам следует избегать совместного использования компьютера с людьми, которым вы не доверяете, поскольку большинство настольных операционных систем не шифруют данные отдельно для каждого пользователя. -## Privacy From Service Providers +## Конфиденциальность от поставщиков услуг -:material-server-network: Service Providers +:material-server-network: Поставщики услуг -We live in a world where almost everything is connected to the internet. Our "private" messages, emails, and social interactions are typically stored on a server, somewhere. Generally, when you send someone a message it's stored on a server, and when your friend wants to read the message the server will show it to them. +Мы живем в мире, где почти всё подключено к Интернету. Наши "личные" сообщения, электронные письма и социальные взаимодействия обычно хранятся где-то на каком-то сервере. Как правило, когда вы отправляете кому-либо сообщение, оно сохраняется на сервере, и когда ваш друг захочет прочитать сообщение, сервер отобразит ему его содержимое. -The obvious problem with this is that the service provider (or a hacker who has compromised the server) can access your conversations whenever and however they want, without you ever knowing. This applies to many common services, like SMS messaging, Telegram, and Discord. +Очевидная проблема заключается в том, что поставщик услуг (или хакер, взломавший сервер) может получить доступ к вашим сообщениям когда угодно и как угодно, без вашего ведома. Это относится ко многим распространенным сервисам, таким как SMS, Telegram и Discord. -Thankfully, E2EE can alleviate this issue by encrypting communications between you and your desired recipients before they are even sent to the server. The confidentiality of your messages is guaranteed, assuming the service provider doesn't have access to the private keys of either party. +К счастью, сквозное шифрование (далее - E2EE) может облегчить эту проблему, шифруя сообщения между вами и желаемыми получателями еще до того, как они будут отправлены на сервер. Конфиденциальность ваших сообщений гарантирована при условии, что поставщик услуг не имеет доступа к закрытым ключам ни одной из сторон. !!! note "Note on Web-based Encryption" - In practice, the effectiveness of different E2EE implementations varies. Applications, such as [Signal](../real-time-communication.md#signal), run natively on your device, and every copy of the application is the same across different installations. If the service provider were to introduce a [backdoor](https://en.wikipedia.org/wiki/Backdoor_(computing)) in their application—in an attempt to steal your private keys—it could later be detected with [reverse engineering](https://en.wikipedia.org/wiki/Reverse_engineering). + На практике эффективность различных реализаций E2EE может варьироваться. Приложения, такие как [Signal](../real-time-communication.md#signal), работают на вашем устройстве, и каждая копия приложения является одинаковой при различных установках. Если поставщик услуг внедрит [backdoor](https://ru.wikipedia.org/wiki/%D0%91%D1%8D%D0%BA%D0%B4%D0%BE%D1%80) в свое приложение - в попытке украсть ваши закрытые ключи - это можно будет обнаружить с помощью [reverse engineering] (https://ru.wikipedia.org/wiki/%D0%9E%D0%B1%D1%80%D0%B0%D1%82%D0%BD%D0%B0%D1%8F_%D1%80%D0%B0%D0%B7%D1%80%D0%B0%D0%B1%D0%BE%D1%82%D0%BA%D0%B0). - On the other hand, web-based E2EE implementations, such as Proton Mail's webmail or Bitwarden's *Web Vault*, rely on the server dynamically serving JavaScript code to the browser to handle cryptography. A malicious server can target you and send you malicious JavaScript code to steal your encryption key (and it would be extremely hard to notice). Because the server can choose to serve different web clients to different people—even if you noticed the attack—it would be incredibly hard to prove the provider's guilt. + С другой стороны, реализации E2EE, такие, как почта Proton Mail или *Web Vault* от Bitwarden, полагаются на то, что сервер динамически предоставляет браузеру код JavaScript для обработки криптографии. Вредоносный сервер может нацелиться на вас и отправить вам вредоносный код JavaScript, чтобы украсть ваш ключ шифрования (и это будет крайне сложно заметить). Поскольку сервер может выбирать для обслуживания разных веб-клиентов разных людей - даже если вы заметили атаку - доказать вину провайдера будет невероятно сложно. - Therefore, you should use native applications over web clients whenever possible. + Поэтому при любой возможности следует использовать нативные приложения вместо веб-клиентов. -Even with E2EE, service providers can still profile you based on **metadata**, which typically isn't protected. While the service provider can't read your messages, they can still observe important things, such as who you're talking to, how often you message them, and when you're typically active. Protection of metadata is fairly uncommon, and—if it's within your [threat model](threat-modeling.md)—you should pay close attention to the technical documentation of the software you're using to see if there's any metadata minimization or protection at all. +Даже при использовании E2EE поставщики услуг все равно могут составить ваш профиль на основе **метаданных**, которые, как правило, не защищены. Хотя поставщик услуг не может читать ваши сообщения, он все же может наблюдать за такими важными вещами, как то, с кем вы общаетесь, как часто вы пишете им сообщения и когда вы обычно активны. Защита метаданных - довольно редкое явление, и, если это входит в вашу [модель угроз](threat-modeling.md), вам следует обратить пристальное внимание на техническую документацию используемого вами программного обеспечения, чтобы узнать, есть ли в нем минимизация или защита метаданных вообще. -## Mass Surveillance Programs +## Программы массового наблюдения -:material-eye-outline: Mass Surveillance +:material-eye-outline: Массовое наблюдение Mass surveillance is the intricate effort to monitor the "behavior, many activities, or information" of an entire (or substantial fraction of a) population.[^1] It often refers to government programs, such as the ones [disclosed by Edward Snowden in 2013](https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)). However, it can also be carried out by corporations, either on behalf of government agencies or by their own initiative. diff --git a/i18n/ru/basics/threat-modeling.md b/i18n/ru/basics/threat-modeling.md index 56e49ef2..f8d4bd9b 100644 --- a/i18n/ru/basics/threat-modeling.md +++ b/i18n/ru/basics/threat-modeling.md @@ -1,15 +1,15 @@ --- -meta_title: "Threat Modeling: The First Step on Your Privacy Journey - Privacy Guides" +meta_title: "Моделирование угроз: Первый шаг на пути к конфиденциальности - Privacy Guides" title: "Моделирование угроз" icon: 'material/target-account' -description: Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. +description: Баланс между безопасностью, конфиденциальностью и удобством использования - одна из первых и самых сложных задач, с которыми вы столкнетесь на пути к конфиденциальности. --- -Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, etc. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using! +Баланс между безопасностью, конфиденциальностью и удобством использования - одна из первых и самых сложных задач, с которыми вы столкнетесь на пути к конфиденциальности. Все является компромиссом: чем более безопасно что-либо, тем больше ограничений или неудобств оно обычно вызывает. Often, people find that the problem with the tools they see recommended is that they're just too hard to start using! Если вы хотите использовать **наиболее** безопасные инструменты, то вам придется пожертвовать *множеством* удобств. And, even then, ==nothing is ever fully secure.== There's **high** security, but never **full** security. Поэтому модели угроз очень важны. -**So, what are these threat models, anyway?** +**Итак, что же из себя представляют эти модели угроз?** ==A threat model is a list of the most probable threats to your security and privacy endeavors.== Since it's impossible to protect yourself against **every** attack(er), you should focus on the **most probable** threats. In computer security, a threat is an event that could undermine your efforts to stay private and secure. @@ -100,7 +100,7 @@ These questions can apply to a wide variety of situations, online and offline. A Составление плана безопасности поможет вам понять, какие угрозы характерны только для вас, оценить ваше имущество, ваших противников и их возможности, а также вероятность рисков, с которыми вы можете столкнуться. -## Further Reading +## К дальнейшему прочтению For people looking to increase their privacy and security online, we've compiled a list of common threats our visitors face or goals our visitors have, to give you some inspiration and demonstrate the basis of our recommendations. diff --git a/i18n/ru/financial-services.md b/i18n/ru/financial-services.md index 45becd74..4c6b0b1c 100644 --- a/i18n/ru/financial-services.md +++ b/i18n/ru/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/ru/mobile-browsers.md b/i18n/ru/mobile-browsers.md index fb305a19..dacdc41e 100644 --- a/i18n/ru/mobile-browsers.md +++ b/i18n/ru/mobile-browsers.md @@ -1,8 +1,8 @@ --- -meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privacy Guides" -title: "Mobile Browsers" +meta_title: "Мобильные веб-браузеры для Android и iOS, соблюдающие конфиденциальность - Privacy Guides" +title: "Мобильные браузеры" icon: material/cellphone-information -description: These browsers are what we currently recommend for standard/non-anonymous internet browsing on your phone. +description: Мы рекомендуем эти браузеры для обычного/неанонимного интернет-браузинга на вашем телефоне. schema: - "@context": http://schema.org @@ -139,11 +139,11 @@ Shields' options can be downgraded on a per-site basis as needed, but by default #### Рекомендованные настройки -These options can be found in :gear: **Settings** → **Safari** → **Privacy and Security**. +Эти параметры можно найти в разделе :gear: **Настройки** → **Safari** → **Конфиденциальность и безопасность**. -##### Cross-Site Tracking Prevention +##### Предотвращение перекрёстного отслеживания -- [x] Enable **Prevent Cross-Site Tracking** +- [x] Включите **Предотвращать перекрестное отслеживание** This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but it does not block all tracking avenues because it is designed to not interfere with website usability. @@ -202,7 +202,7 @@ If you use iCloud with Advanced Data Protection disabled, we also recommend chec Дополнительные списки блокировки замедляют работу браузера и могут упростить атаку, поэтому пользуйтесь только тем, что вам необходимо. -## Criteria +## Критерии **Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you. diff --git a/i18n/sv/financial-services.md b/i18n/sv/financial-services.md index 030c6f9a..bbf55e49 100644 --- a/i18n/sv/financial-services.md +++ b/i18n/sv/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/tr/financial-services.md b/i18n/tr/financial-services.md index 6b6b5e7c..eb76f042 100644 --- a/i18n/tr/financial-services.md +++ b/i18n/tr/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/uk/financial-services.md b/i18n/uk/financial-services.md index 07a6787d..a22bf6a7 100644 --- a/i18n/uk/financial-services.md +++ b/i18n/uk/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/vi/financial-services.md b/i18n/vi/financial-services.md index e95547fc..7ebb0942 100644 --- a/i18n/vi/financial-services.md +++ b/i18n/vi/financial-services.md @@ -82,7 +82,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/zh-Hant/financial-services.md b/i18n/zh-Hant/financial-services.md index 9aca9168..3833d8cf 100644 --- a/i18n/zh-Hant/financial-services.md +++ b/i18n/zh-Hant/financial-services.md @@ -74,9 +74,9 @@ Privacy.com 預設情況下將您購買的商家資訊提供給您的銀行。 !!! recommendation - ! [CakePay標誌] (assets/img/financial-services/coincards.svg) {align = right} + ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - * * CoinCards * * (在美國、加拿大和英國)允許您購買各種商家禮品卡。 + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/i18n/zh/financial-services.md b/i18n/zh/financial-services.md index 480c924c..f61b90ea 100644 --- a/i18n/zh/financial-services.md +++ b/i18n/zh/financial-services.md @@ -76,7 +76,7 @@ These services allow you to purchase gift cards for a variety of merchants onlin ![CakePay logo](assets/img/financial-services/coincards.svg){ align=right } - **CoinCards** (available in the US, Canada, and UK) allows you to purchase gift cards for a large variety of merchants. + **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. [:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } [:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } diff --git a/includes/abbreviations.ko.txt b/includes/abbreviations.ko.txt index d72f9f45..6fb92542 100644 --- a/includes/abbreviations.ko.txt +++ b/includes/abbreviations.ko.txt @@ -1,4 +1,4 @@ -*[2FA]: 2단계 인증 +*[2FA]: 이중 인증 *[ADB]: Android 디버그 브리지 *[AOSP]: Android 오픈소스 프로젝트 *[ATA]: 고급 기술 결합(Advanced Technology Attachment) @@ -50,7 +50,7 @@ *[MAC]: Media Access Control *[MDAG]: Microsoft Defender Application Guard *[MEID]: Mobile Equipment Identifier -*[MFA]: Multi-Factor Authentication +*[MFA]: 다중 인증 *[NVMe]: Nonvolatile Memory Express *[NTP]: 네트워크 타임 프로토콜(Network Time Protocol) *[OCI]: Open Container Initiative diff --git a/includes/strings.ja.yml b/includes/strings.ja.yml index 76c1d813..96536392 100644 --- a/includes/strings.ja.yml +++ b/includes/strings.ja.yml @@ -28,7 +28,7 @@ config: system: システムテーマに切り替える nav: Home: ホーム - Knowledge Base: ナレッジベース + Knowledge Base: 知識ベース Technology Essentials: 技術の概要 Operating Systems: OS Advanced Topics: 高度なトピック diff --git a/includes/strings.ko.yml b/includes/strings.ko.yml index 28e8fb72..07fde7f7 100644 --- a/includes/strings.ko.yml +++ b/includes/strings.ko.yml @@ -5,13 +5,13 @@ config: copyright: - 1: | - Privacy Guides is a non-profit, socially motivated website that provides information for protecting your data security and privacy. + Privacy Guides는 여러분의 데이터 보안, 프라이버시 보호 정보 제공을 목적으로 운영되는 비영리 사이트입니다. - 2: | 우리는 특정 제품을 추천하여 수익을 창출하지 않으며, 제휴 링크를 사용하지 않습니다. - 3: | - Privacy Guides and contributors. + Privacy Guides 및 기여자 - 4: | Content licensed under CC BY-ND 4.0. diff --git a/includes/strings.ru.yml b/includes/strings.ru.yml index 6a1098fa..74968fb2 100644 --- a/includes/strings.ru.yml +++ b/includes/strings.ru.yml @@ -43,9 +43,9 @@ nav: Contributing: Помощь проекту Writing Guide: Writing Guide Technical Guides: Technical Guides - Changelog: Changelog + Changelog: Список изменений Forum: Форум Blog: Блог site: translation: | - You're viewing the English copy of Privacy Guides, translated by our fantastic language team on Crowdin. If you notice an error, or see any untranslated sections on this page, please consider helping out! + Вы просматриваете русскую копию Privacy Guides, переведённую нашей невероятной командой переводчиков на Crowdin. Если вы нашли ошибку или непереведённые разделы на этой странице, пожалуйста, помогите нам! diff --git a/theme/overrides/home.ja.html b/theme/overrides/home.ja.html index 2f4e0611..3423d3f2 100644 --- a/theme/overrides/home.ja.html +++ b/theme/overrides/home.ja.html @@ -34,7 +34,7 @@

オンラインプライバシーを取り戻すためのガイドです。

大規模な組織が、あなたのオンラインでの活動を監視しています。 Privacy Guidesはあなたがオンラインで自分自身を守るための、プライバシーとセキュリティに関するリソースです。

- + プライバシー保護を始める