1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-08-22 14:39:15 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2023-10-11 16:36:08 +00:00
parent 1b9f402db5
commit d4ad37e6ea
728 changed files with 962 additions and 1018 deletions

View File

@@ -3,7 +3,7 @@ meta_title: "Android Recommendations: GrapheneOS and DivestOS - Privacy Guides"
title: "Android"
icon: 'simple/android'
description: You can replace the operating system on your Android phone with these secure and privacy-respecting alternatives.
cover: android.png
cover: android.webp
schema:
-
"@context": http://schema.org

View File

@@ -2,7 +2,7 @@
title: "Calendar Sync"
icon: material/calendar
description: Calendars contain some of your most sensitive data; use products that implement encryption at rest.
cover: calendar.png
cover: calendar.webp
---
Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them.

View File

@@ -3,7 +3,7 @@ meta_title: "En İyi Gizli ve Güvenli Bulut Depolama Sağlayıcıları - Privac
title: "Bulut depolama"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
cover: cloud.png
cover: cloud.webp
---
Many cloud storage providers require your full trust that they will not look at your files. Aşağıda listelenen alternatifler güvenli uçtan uca şifreleme uygulayarak güven ihtiyacını ortadan kaldırır.

View File

@@ -2,7 +2,7 @@
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
title: Cryptocurrency
icon: material/bank-circle
cover: cryptocurrency.png
cover: cryptocurrency.webp
---
Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@@ -3,7 +3,7 @@ meta_title: "Remove PII with Metadata Scrubbers and Data Redaction Tools - Priva
title: "Data and Metadata Redaction"
icon: material/tag-remove
description: Use these tools to remove metadata like GPS location and other identifying information from photos and files you share.
cover: data-redaction.png
cover: data-redaction.webp
---
When sharing files, be sure to remove associated metadata. Image files commonly include [Exif](https://en.wikipedia.org/wiki/Exif) data. Photos sometimes even include GPS coordinates in the file metadata.

View File

@@ -3,7 +3,7 @@ meta_title: "PC ve Mac için Mahremiyete Saygı Gösteren Web Tarayıcıları -
title: "Masaüstü Tarayıcıları"
icon: material/laptop
description: Bu web tarayıcıları Google Chrome'dan daha iyi mahremiyet sağlar.
cover: desktop-browsers.png
cover: desktop-browsers.webp
schema:
-
"@context": http://schema.org

View File

@@ -2,7 +2,7 @@
title: "Desktop/PC"
icon: simple/linux
description: Linux distributions are commonly recommended for privacy protection and software freedom.
cover: desktop.png
cover: desktop.webp
---
Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions.

View File

@@ -2,7 +2,7 @@
title: "DNS Çözümleyicileri"
icon: material/dns
description: Bunlar, İSS'nizin varsayılan yapılandırmasını değiştirmek için geçiş yapmanızı önerdiğimiz bazı şifreli DNS sağlayıcılarıdır.
cover: dns.png
cover: dns.webp
---
Üçüncü taraf sunucularla şifrelenmiş DNS, yalnızca herhangi bir sonucu olmayacağından emin olduğunuzda temel [DNS Engellemesini](https://en.wikipedia.org/wiki/DNS_blocking) aşmak için kullanılmalıdır. Şifrelenmiş DNS internet faaliyetlerinizi gizlemenize yardımcı olmaz.

View File

@@ -2,7 +2,7 @@
title: "Email Clients"
icon: material/email-open
description: These email clients are privacy-respecting and support OpenPGP email encryption.
cover: email-clients.png
cover: email-clients.webp
---
Our recommendation list contains email clients that support both [OpenPGP](encryption.md#openpgp) and strong authentication such as [Open Authorization (OAuth)](https://en.wikipedia.org/wiki/OAuth). OAuth allows you to use [Multi-Factor Authentication](basics/multi-factor-authentication.md) and prevent account theft.

View File

@@ -3,7 +3,7 @@ meta_title: "Şifrelenmiş Gizli E-posta Önerileri - Privacy Guides"
title: "E-posta Hizmetleri"
icon: material/email
description: These email providers offer a great place to store your emails securely, and many offer interoperable OpenPGP encryption with other providers.
cover: email.png
cover: email.webp
---
E-posta, herhangi bir çevrimiçi hizmeti kullanmak için pratikte bir gerekliliktir, ancak bireysel görüşmeler için e-posta kullanılmasını önermiyoruz. Rather than using email to contact other people, consider using an instant messaging medium that supports forward secrecy.

View File

@@ -3,7 +3,7 @@ meta_title: "Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt,
title: "Encryption Software"
icon: material/file-lock
description: Encryption of data is the only way to control who can access it. These tools allow you to encrypt your emails and any other files.
cover: encryption.png
cover: encryption.webp
---
Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails or files, you should pick an option here.

View File

@@ -2,7 +2,7 @@
title: "File Sharing and Sync"
icon: material/share-variant
description: Discover how to privately share your files between your devices, with your friends and family, or anonymously online.
cover: file-sharing.png
cover: file-sharing.webp
---
Discover how to privately share your files between your devices, with your friends and family, or anonymously online.

View File

@@ -1,7 +1,7 @@
---
title: Financial Services
icon: material/bank
cover: financial-services.png
cover: financial-services.webp
---
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:

View File

@@ -2,7 +2,7 @@
title: "Frontends"
icon: material/flip-to-front
description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances.
cover: frontends.png
cover: frontends.webp
---
Sometimes services will try to force you to sign up for an account by blocking access to content with annoying popups. They might also break without JavaScript enabled. These frontends can allow you to get around these restrictions.

View File

@@ -3,7 +3,7 @@ meta_title: "Privacy Respecting Mobile Web Browsers for Android and iOS - Privac
title: "Mobil Tarayıcılar"
icon: material/cellphone-information
description: Bu tarayıcılar telefonunuzda yaptığınız standart internet taraması için önerdiğimiz tarayıcılardır.
cover: mobile-browsers.png
cover: mobile-browsers.webp
schema:
-
"@context": http://schema.org

View File

@@ -2,7 +2,7 @@
title: "Multi-Factor Authenticators"
icon: 'material/two-factor-authentication'
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
cover: multi-factor-authentication.png
cover: multi-factor-authentication.webp
---
## Hardware Security Keys

View File

@@ -2,7 +2,7 @@
title: "News Aggregators"
icon: material/rss
description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS.
cover: news-aggregators.png
cover: news-aggregators.webp
---
A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to keep up with your favorite blogs and news sites.

View File

@@ -2,7 +2,7 @@
title: "Notebooks"
icon: material/notebook-edit-outline
description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party.
cover: notebooks.png
cover: notebooks.webp
---
Keep track of your notes and journalings without giving them to a third-party.

View File

@@ -118,12 +118,6 @@ Decide whether you want personalized ads based on your usage.
- [ ] Uncheck **Personalized Ads**
##### Security
Apps from the App Store are subject to stricter security guidelines, such as stricter sandboxing. If the only apps you need are available from the App Store, change the **Allow applications downloaded from** setting to **App Store** to prevent accidentally running other apps. This is a good option particularly if you are configuring a machine for other, less technical users such as children.
If you choose to also allow applications from identified developers, be careful about the apps you run and where you obtain them.
##### FileVault
On modern devices with a Secure Enclave (Apple T2 Security Chip, Apple silicon), your data is always encrypted, but is decrypted automatically by a hardware key if your device doesn't detect it's been tampered with. Enabling FileVault additionally requires your password to decrypt your data, greatly improving security, especially when powered off or before the first login after powering on.
@@ -140,17 +134,21 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio
### MAC Address Randomization
Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so you'll need to do it with a command or a script.
macOS uses a randomized MAC address when performing Wi-Fi scans while disconnected from a network. However, when you connect to a preferred Wi-Fi network, the MAC address used is never randomized. Full MAC address randomization is an advanced topic, and most people don't need to worry about performing the following steps.
You open up your Terminal and enter this command to randomize your MAC address:
Unlike iOS, macOS doesn't give you an option to randomize your MAC address in the settings, so if you wish to change this identifier, you'll need to do it with a command or a script. To set a random MAC address, first disconnect from the network if you're already connected, then open **Terminal** and enter this command to randomize your MAC address:
``` zsh
openssl rand -hex 6 | sed 's/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en1 ether
openssl rand -hex 6 | sed 's/^\(.\{1\}\)./\12/; s/\(..\)/\1:/g; s/.$//' | xargs sudo ifconfig en0 ether
```
en1 is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen.
`en0` is the name of the interface you're changing the MAC address for. This might not be the right one on every Mac, so to check you can hold the option key and click the Wi-Fi symbol at the top right of your screen. "Interface name" should be displayed at the top of the dropdown menu.
This will be reset on reboot.
This command sets your MAC address to a randomized, "locally administered" address, matching the behavior of iOS, Windows, and Android's MAC address randomization features. This means that every character in the MAC address is fully randomized except the second character, which denotes the MAC address as *locally administered* and not in conflict with any actual hardware. This method is most compatible with modern networks. An alternative method is to set the first six characters of the MAC address to one of Apple's existing *Organizational Unique Identifiers*, which we'll leave as an exercise to the reader. That method is more likely to conflict with some networks, but may be less noticeable. Given the prevalence of randomized, locally administered MAC addresses in other modern operating systems, we don't think either method has significant privacy advantages over the other.
When you connect to the network again, you'll connect with a random MAC address. This will be reset on reboot.
Your MAC address is not the only unique information about your device which is broadcast on the network, your hostname is another piece of information which could uniquely identify you. You may wish to set your hostname to something generic like "MacBook Air", "Laptop", "John's MacBook Pro", or "iPhone" in **System Settings** > **General** > **Sharing**. Some [privacy scripts](https://github.com/sunknudsen/privacy-guides/tree/master/how-to-spoof-mac-address-and-hostname-automatically-at-boot-on-macos#guide) allow you to easily generate hostnames with random names.
## Security Protections

View File

@@ -3,7 +3,7 @@ meta_title: "Gizliliğinizi ve Güvenliğinizi Korumanız için En İyi Parola Y
title: "Parola yöneticileri"
icon: material/form-textbox-password
description: Parola yöneticileri, parolaları ve diğer kimlik bilgilerini güvenli bir şekilde saklayabilir ve yönetebilirsiniz.
cover: passwords.png
cover: passwords.webp
schema:
-
"@context": http://schema.org

View File

@@ -2,7 +2,7 @@
title: "Üretkenlik Araçları"
icon: material/file-sign
description: Çoğu çevrimiçi ofis uygulmaları uçtan uca şifrelemeyi desteklemez, bu da bulut sağlayıcısının yaptığınız her şeye erişebileceği anlamına gelir.
cover: productivity.png
cover: productivity.webp
---
Çoğu çevrimiçi ofis uygulmaları uçtan uca şifrelemeyi desteklemez, bu da bulut sağlayıcısının yaptığınız her şeye erişebileceği anlamına gelir. Gizlilik politikası haklarınızı yasal olarak koruyabilir, ancak teknik erişim kısıtlamaları sağlamaz.

View File

@@ -3,7 +3,7 @@ meta_title: "The Best Private Instant Messengers - Privacy Guides"
title: "Gerçek Zamanlı İletişim"
icon: material/chat-processing
description: Diğer anlık mesajlaşma uygulamaları, tüm özel konuşmalarınızı kendilerini işleten şirketin kullanımına sunuyor.
cover: real-time-communication.png
cover: real-time-communication.webp
---
Bunlar, şifrelenmiş gerçek zamanlı iletişim için önerilerimizdir.

View File

@@ -2,7 +2,7 @@
title: "Yönlendirici Yazılımı"
icon: material/router-wireless
description: These alternative operating systems can be used to secure your router or Wi-Fi access point.
cover: router.png
cover: router.webp
---
Aşağıda; yönlendiricilerde, Wi-Fi erişim noktalarında vb. kullanılabilecek birkaç alternatif işletim sistemi bulunmaktadır.

View File

@@ -3,7 +3,7 @@ meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy
title: "Search Engines"
icon: material/search-web
description: These privacy-respecting search engines don't build an advertising profile based on your searches.
cover: search-engines.png
cover: search-engines.webp
---
Use a search engine that doesn't build an advertising profile based on your searches.

View File

@@ -3,7 +3,7 @@ meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
title: "Tor Network"
icon: simple/torproject
description: Protect your internet browsing from prying eyes by using the Tor network, a secure network which circumvents censorship.
cover: tor.png
cover: tor.webp
schema:
-
"@context": http://schema.org

View File

@@ -3,7 +3,7 @@ meta_title: "Private VPN Service Recommendations and Comparison, No Sponsors or
title: "VPN Services"
icon: material/vpn
description: These are the best VPN services for protecting your privacy and security online. Find a provider here that isnt out to spy on you.
cover: vpn.png
cover: vpn.webp
---
If you're looking for additional **privacy** from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved. We think these providers are a cut above the rest: