diff --git a/i18n/sv/advanced/dns-overview.md b/i18n/sv/advanced/dns-overview.md index b00dc759..9c41665b 100644 --- a/i18n/sv/advanced/dns-overview.md +++ b/i18n/sv/advanced/dns-overview.md @@ -128,7 +128,7 @@ We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmis ## Why **shouldn't** I use encrypted DNS? -In locations where there is internet filtering (or censorship), visiting forbidden resources may have its own consequences which you should consider in your [threat model](../basics/threat-modeling.md). We do **not** suggest the use of encrypted DNS for this purpose. Use [Tor](../advanced/tor-overview.md) or a [VPN](../vpn.md) instead. If you're using a VPN, you should use your VPN's DNS servers. When using a VPN, you are already trusting them with all your network activity. +In locations where there is internet filtering (or censorship), visiting forbidden resources may have its own consequences which you should consider in your [threat model](../basics/threat-modeling.md). We do **not** suggest the use of encrypted DNS for this purpose. Använd [Tor](../advanced/tor-overview.md) eller ett [VPN](../vpn.md) istället. If you're using a VPN, you should use your VPN's DNS servers. When using a VPN, you are already trusting them with all your network activity. When we do a DNS lookup, it's generally because we want to access a resource. Below, we will discuss some of the methods that may disclose your browsing activities even when using encrypted DNS: diff --git a/i18n/sv/android.md b/i18n/sv/android.md index 2c4cb380..12d5047e 100644 --- a/i18n/sv/android.md +++ b/i18n/sv/android.md @@ -152,7 +152,7 @@ DivestOS implements some system hardening patches originally developed for Graph DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.
Warning
+Varning
DivestOS firmware update [status](https://gitlab.com/divested-mobile/firmware-empty/-/blob/master/STATUS) and quality control varies across the devices it supports. We still recommend GrapheneOS depending on your device's compatibility. For other devices, DivestOS is a good alternative. @@ -225,7 +225,7 @@ Shelter supports blocking contact search cross profiles and sharing files acrossWarning
+Varning
Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). diff --git a/i18n/sv/basics/multi-factor-authentication.md b/i18n/sv/basics/multi-factor-authentication.md index bad25acf..97b67b04 100644 --- a/i18n/sv/basics/multi-factor-authentication.md +++ b/i18n/sv/basics/multi-factor-authentication.md @@ -137,7 +137,7 @@ Kommandot förhindrar att en motståndare kringgår MFA när datorn startar. ### LinuxWarning
+Varning
Om värdnamnet på ditt system ändras (till exempel på grund av DHCP), skulle du inte kunna logga in. Det är viktigt att du skapar ett korrekt värdnamn för din dator innan du följer den här guiden. diff --git a/i18n/sv/data-redaction.md b/i18n/sv/data-redaction.md index 16d7c94d..10278a8a 100644 --- a/i18n/sv/data-redaction.md +++ b/i18n/sv/data-redaction.md @@ -123,7 +123,7 @@ Appen erbjuder flera sätt att radera metadata från bilder. Namn:Warning
+Varning
Du bör **aldrig** använda oskärpa för att redigera [text i bilder] (https://bishopfox.com/blog/unredacter-tool-never-pixelation). Om du vill redigera text i en bild ritar du en ruta över texten. För detta föreslår vi appar som [Pocket Paint] (https://github.com/Catrobat/Paintroid). diff --git a/i18n/sv/desktop-browsers.md b/i18n/sv/desktop-browsers.md index 83f2d15e..4c1c1c53 100644 --- a/i18n/sv/desktop-browsers.md +++ b/i18n/sv/desktop-browsers.md @@ -134,7 +134,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-Warning
+Varning
Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). @@ -251,7 +251,7 @@ Brave bygger på webbläsarprojektet Chromium, så den bör kännas bekant och h **macOS users:** The download for Brave Browser from their official website is a `.pkg` installer which requires admin privileges to run (and may run other unnecessary scripts on your machine). As an alternative, you can download the latest `Brave-Browser-universal.dmg` file from their [GitHub releases](https://github.com/brave/brave-browser/releases/latest) page, which provides a traditional "drag to Applications folder" install.Warning
+Varning
Brave adds a "[referral code](https://github.com/brave/brave-browser/wiki/Brave%E2%80%99s-Use-of-Referral-Codes)" to the file name in downloads from the Brave website, which is used to track which source the browser was downloaded from, for example `BRV002` in a download named `Brave-Browser-BRV002.pkg`. The installer will then ping Brave's server with the referral code at the end of the installation process. If you're concerned about this, you can rename the installer file before opening it. diff --git a/i18n/sv/desktop.md b/i18n/sv/desktop.md index 6db44d02..cc97a561 100644 --- a/i18n/sv/desktop.md +++ b/i18n/sv/desktop.md @@ -169,7 +169,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/WhWarning
+Varning
Tails [doesn't erase](https://gitlab.tails.boum.org/tails/tails/-/issues/5356) the [video memory](https://en.wikipedia.org/wiki/Dual-ported_video_RAM) when shutting down. When you restart your computer after using Tails, it might briefly display the last screen that was displayed in Tails. If you shut down your computer instead of restarting it, the video memory will erase itself automatically after being unpowered for some time. diff --git a/i18n/sv/device-integrity.md b/i18n/sv/device-integrity.md index 8d4fbfa4..90b3ad25 100644 --- a/i18n/sv/device-integrity.md +++ b/i18n/sv/device-integrity.md @@ -82,7 +82,7 @@ These tools can trigger false-positives. If any of these tools finds indicatorsWarning
+Varning
Using MVT is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. @@ -131,7 +131,7 @@ iMazing automates and interactively guides you through the process of using [MVT These are apps you can install which check your device and operating system for signs of tampering, and validate the identity of your device.Warning
+Varning
Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. @@ -184,7 +184,7 @@ If your [threat model](basics/threat-modeling.md) requires privacy, you could co These are apps you can install on your device which scan your device for signs of compromise.Warning
+Varning
Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool. diff --git a/i18n/sv/dns.md b/i18n/sv/dns.md index 1feb02f2..3166e45f 100644 --- a/i18n/sv/dns.md +++ b/i18n/sv/dns.md @@ -185,7 +185,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](adWarning
+Varning
The anonymized DNS feature does [not](advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) anonymize other network traffic. diff --git a/i18n/sv/email-clients.md b/i18n/sv/email-clients.md index 07941a29..49b71804 100644 --- a/i18n/sv/email-clients.md +++ b/i18n/sv/email-clients.md @@ -108,7 +108,7 @@ Apple Mail has the ability to load remote content in the background or block itWarning
+Varning
When replying to someone on a mailing list the "reply" option may also include the mailing list. For more information see [thundernest/k-9 #3738](https://github.com/thundernest/k-9/issues/3738). diff --git a/i18n/sv/email.md b/i18n/sv/email.md index 01864c6c..e0aee57f 100644 --- a/i18n/sv/email.md +++ b/i18n/sv/email.md @@ -41,7 +41,7 @@ These providers natively support OpenPGP encryption/decryption and the [Web KeyWarning
+Varning
When using E2EE technology like OpenPGP your email will still have some metadata that is not encrypted in the header of the email, generally including the subject line! Read more about [email metadata](basics/email-security.md#email-metadata-overview). diff --git a/i18n/sv/frontends.md b/i18n/sv/frontends.md index 7beccad8..f335d4f8 100644 --- a/i18n/sv/frontends.md +++ b/i18n/sv/frontends.md @@ -102,7 +102,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube opWarning
+Varning
When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -135,7 +135,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) bWarning
+Varning
When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -170,7 +170,7 @@ LibreTube allows you to store your subscription list and playlists locally on yoWarning
+Varning
When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -206,7 +206,7 @@ Your subscription list and playlists are saved locally on your Android device. 1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**Warning
+Varning
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. @@ -234,7 +234,7 @@ There are a number of public instances, with some instances having [Tor](tor.md)Warning
+Varning
Invidious does not proxy video streams by default. Videos watched through Invidious will still make direct connections to Google's servers (e.g. `googlevideo.com`); however, some instances support video proxying—simply enable *Proxy videos* within the instances' settings or add `&local=true` to the URL. diff --git a/i18n/sv/meta/admonitions.md b/i18n/sv/meta/admonitions.md index d47127e0..ee404244 100644 --- a/i18n/sv/meta/admonitions.md +++ b/i18n/sv/meta/admonitions.md @@ -103,7 +103,7 @@ Lorem ipsum dolor sit amet, consectetur adipiscing elit. #### `warning`Warning
+Varning
Lorem ipsum dolor sit amet, consectetur adipiscing elit. diff --git a/i18n/sv/os/android-overview.md b/i18n/sv/os/android-overview.md index f866b6cb..06cca227 100644 --- a/i18n/sv/os/android-overview.md +++ b/i18n/sv/os/android-overview.md @@ -100,7 +100,7 @@ An app may request a permission for a specific feature it has. For example, any [Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.Warning
+Varning
If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. diff --git a/i18n/sv/os/ios-overview.md b/i18n/sv/os/ios-overview.md index 8a9e096f..4f85b9d6 100644 --- a/i18n/sv/os/ios-overview.md +++ b/i18n/sv/os/ios-overview.md @@ -147,7 +147,7 @@ After enabling stolen data protection, [certain actions](https://support.apple.c iPhones are already resistant to brute-force attacks by making you wait long periods of time after multiple failed attempts; however, there have historically been exploits to get around this. To be extra safe, you can set your phone to wipe itself after 10 failed passcode attempts.Warning
+Varning
With this setting enabled, someone could intentionally wipe your phone by entering the wrong password many times. Make sure you have proper backups and only enable this setting if you feel comfortable with it. diff --git a/i18n/sv/os/macos-overview.md b/i18n/sv/os/macos-overview.md index acb8e05f..005dcbda 100644 --- a/i18n/sv/os/macos-overview.md +++ b/i18n/sv/os/macos-overview.md @@ -157,7 +157,7 @@ macOS employs defense in depth by relying on multiple layers of software and har ### Software SecurityWarning
+Varning
macOS allows you to install beta updates. These are unstable and may come with extra telemetry since they're for testing purposes. Because of this, we recommend you avoid beta software in general. @@ -182,7 +182,7 @@ System Integrity Protection makes critical file locations read-only to protect a macOS apps submitted to the App Store after June 1, 2012 are required to be sandboxed using the [App Sandbox](https://developer.apple.com/documentation/security/app_sandbox).Warning
+Varning
Software downloaded from outside the official App Store is not required to be sandboxed. You should avoid non-App Store software as much as possible. diff --git a/i18n/sv/real-time-communication.md b/i18n/sv/real-time-communication.md index 960fdbb4..06c95f70 100644 --- a/i18n/sv/real-time-communication.md +++ b/i18n/sv/real-time-communication.md @@ -129,7 +129,7 @@ Briar supports forward secrecy[^1] by using the Bramble [Handshake](https://code ## Additional OptionsWarning
+Varning
These messengers do not have forward secrecy[^1], and while they fulfill certain needs that our previous recommendations may not, we do not recommend them for long-term or sensitive communications. Any key compromise among message recipients would affect the confidentiality of **all** past communications. diff --git a/i18n/sv/security-keys.md b/i18n/sv/security-keys.md index 4c343d30..a40c5845 100644 --- a/i18n/sv/security-keys.md +++ b/i18n/sv/security-keys.md @@ -1,5 +1,5 @@ --- -title: Security Keys +title: Säkerhetsnycklar icon: material/key-chain description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party. cover: multi-factor-authentication.webp @@ -36,7 +36,7 @@ This key provides only basic FIDO2 functionality, but for most people that is al If you need any of those features, you should consider their higher-end [YubiKey](#yubikey) of products instead.Warning
+Varning
The firmware of Yubico's Security Keys is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. @@ -69,7 +69,7 @@ YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/suppor For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker.Warning
+Varning
The firmware of YubiKey is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key. @@ -97,17 +97,17 @@ The [comparison table](https://nitrokey.com/#comparison) shows the features and Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). -For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. +For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Vissa Nitrokeys kan fungera som lösenordshanterare. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface.Warning
+Varning
While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP secrets, we highly recommend that you use a YubiKey instead.Warning
+Varning
Resetting the OpenPGP interface on a Nitrokey will also make the password database [inaccessible](https://docs.nitrokey.com/pro/linux/factory-reset). diff --git a/i18n/sv/tools.md b/i18n/sv/tools.md index dafbf7a5..4ffce834 100644 --- a/i18n/sv/tools.md +++ b/i18n/sv/tools.md @@ -425,7 +425,7 @@ For encrypting your operating system drive, we typically recommend using whichev ## Hardware -### Security Keys +### Säkerhetsnycklar