mirror of
https://github.com/privacyguides/i18n.git
synced 2025-06-18 00:34:24 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
@ -128,7 +128,7 @@ We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmis
|
|||||||
|
|
||||||
## Why **shouldn't** I use encrypted DNS?
|
## Why **shouldn't** I use encrypted DNS?
|
||||||
|
|
||||||
In locations where there is internet filtering (or censorship), visiting forbidden resources may have its own consequences which you should consider in your [threat model](../basics/threat-modeling.md). We do **not** suggest the use of encrypted DNS for this purpose. Use [Tor](../advanced/tor-overview.md) or a [VPN](../vpn.md) instead. If you're using a VPN, you should use your VPN's DNS servers. When using a VPN, you are already trusting them with all your network activity.
|
In locations where there is internet filtering (or censorship), visiting forbidden resources may have its own consequences which you should consider in your [threat model](../basics/threat-modeling.md). We do **not** suggest the use of encrypted DNS for this purpose. Använd [Tor](../advanced/tor-overview.md) eller ett [VPN](../vpn.md) istället. If you're using a VPN, you should use your VPN's DNS servers. When using a VPN, you are already trusting them with all your network activity.
|
||||||
|
|
||||||
When we do a DNS lookup, it's generally because we want to access a resource. Below, we will discuss some of the methods that may disclose your browsing activities even when using encrypted DNS:
|
When we do a DNS lookup, it's generally because we want to access a resource. Below, we will discuss some of the methods that may disclose your browsing activities even when using encrypted DNS:
|
||||||
|
|
||||||
|
@ -152,7 +152,7 @@ DivestOS implements some system hardening patches originally developed for Graph
|
|||||||
DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.
|
DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
DivestOS firmware update [status](https://gitlab.com/divested-mobile/firmware-empty/-/blob/master/STATUS) and quality control varies across the devices it supports. We still recommend GrapheneOS depending on your device's compatibility. For other devices, DivestOS is a good alternative.
|
DivestOS firmware update [status](https://gitlab.com/divested-mobile/firmware-empty/-/blob/master/STATUS) and quality control varies across the devices it supports. We still recommend GrapheneOS depending on your device's compatibility. For other devices, DivestOS is a good alternative.
|
||||||
|
|
||||||
@ -225,7 +225,7 @@ Shelter supports blocking contact search cross profiles and sharing files across
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html).
|
Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html).
|
||||||
|
|
||||||
|
@ -137,7 +137,7 @@ Kommandot förhindrar att en motståndare kringgår MFA när datorn startar.
|
|||||||
### Linux
|
### Linux
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
Om värdnamnet på ditt system ändras (till exempel på grund av DHCP), skulle du inte kunna logga in. Det är viktigt att du skapar ett korrekt värdnamn för din dator innan du följer den här guiden.
|
Om värdnamnet på ditt system ändras (till exempel på grund av DHCP), skulle du inte kunna logga in. Det är viktigt att du skapar ett korrekt värdnamn för din dator innan du följer den här guiden.
|
||||||
|
|
||||||
|
@ -123,7 +123,7 @@ Appen erbjuder flera sätt att radera metadata från bilder. Namn:
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
Du bör **aldrig** använda oskärpa för att redigera [text i bilder] (https://bishopfox.com/blog/unredacter-tool-never-pixelation). Om du vill redigera text i en bild ritar du en ruta över texten. För detta föreslår vi appar som [Pocket Paint] (https://github.com/Catrobat/Paintroid).
|
Du bör **aldrig** använda oskärpa för att redigera [text i bilder] (https://bishopfox.com/blog/unredacter-tool-never-pixelation). Om du vill redigera text i en bild ritar du en ruta över texten. För detta föreslår vi appar som [Pocket Paint] (https://github.com/Catrobat/Paintroid).
|
||||||
|
|
||||||
|
@ -134,7 +134,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/).
|
Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/).
|
||||||
|
|
||||||
@ -251,7 +251,7 @@ Brave bygger på webbläsarprojektet Chromium, så den bör kännas bekant och h
|
|||||||
**macOS users:** The download for Brave Browser from their official website is a `.pkg` installer which requires admin privileges to run (and may run other unnecessary scripts on your machine). As an alternative, you can download the latest `Brave-Browser-universal.dmg` file from their [GitHub releases](https://github.com/brave/brave-browser/releases/latest) page, which provides a traditional "drag to Applications folder" install.
|
**macOS users:** The download for Brave Browser from their official website is a `.pkg` installer which requires admin privileges to run (and may run other unnecessary scripts on your machine). As an alternative, you can download the latest `Brave-Browser-universal.dmg` file from their [GitHub releases](https://github.com/brave/brave-browser/releases/latest) page, which provides a traditional "drag to Applications folder" install.
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
Brave adds a "[referral code](https://github.com/brave/brave-browser/wiki/Brave%E2%80%99s-Use-of-Referral-Codes)" to the file name in downloads from the Brave website, which is used to track which source the browser was downloaded from, for example `BRV002` in a download named `Brave-Browser-BRV002.pkg`. The installer will then ping Brave's server with the referral code at the end of the installation process. If you're concerned about this, you can rename the installer file before opening it.
|
Brave adds a "[referral code](https://github.com/brave/brave-browser/wiki/Brave%E2%80%99s-Use-of-Referral-Codes)" to the file name in downloads from the Brave website, which is used to track which source the browser was downloaded from, for example `BRV002` in a download named `Brave-Browser-BRV002.pkg`. The installer will then ping Brave's server with the referral code at the end of the installation process. If you're concerned about this, you can rename the installer file before opening it.
|
||||||
|
|
||||||
|
@ -169,7 +169,7 @@ Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Wh
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
Tails [doesn't erase](https://gitlab.tails.boum.org/tails/tails/-/issues/5356) the [video memory](https://en.wikipedia.org/wiki/Dual-ported_video_RAM) when shutting down. When you restart your computer after using Tails, it might briefly display the last screen that was displayed in Tails. If you shut down your computer instead of restarting it, the video memory will erase itself automatically after being unpowered for some time.
|
Tails [doesn't erase](https://gitlab.tails.boum.org/tails/tails/-/issues/5356) the [video memory](https://en.wikipedia.org/wiki/Dual-ported_video_RAM) when shutting down. When you restart your computer after using Tails, it might briefly display the last screen that was displayed in Tails. If you shut down your computer instead of restarting it, the video memory will erase itself automatically after being unpowered for some time.
|
||||||
|
|
||||||
|
@ -82,7 +82,7 @@ These tools can trigger false-positives. If any of these tools finds indicators
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
Using MVT is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool.
|
Using MVT is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool.
|
||||||
|
|
||||||
@ -131,7 +131,7 @@ iMazing automates and interactively guides you through the process of using [MVT
|
|||||||
These are apps you can install which check your device and operating system for signs of tampering, and validate the identity of your device.
|
These are apps you can install which check your device and operating system for signs of tampering, and validate the identity of your device.
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool.
|
Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool.
|
||||||
|
|
||||||
@ -184,7 +184,7 @@ If your [threat model](basics/threat-modeling.md) requires privacy, you could co
|
|||||||
These are apps you can install on your device which scan your device for signs of compromise.
|
These are apps you can install on your device which scan your device for signs of compromise.
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool.
|
Using these apps is insufficient to determine that a device is "clean", and not targeted with a particular spyware tool.
|
||||||
|
|
||||||
|
@ -185,7 +185,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
The anonymized DNS feature does [not](advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) anonymize other network traffic.
|
The anonymized DNS feature does [not](advanced/dns-overview.md#why-shouldnt-i-use-encrypted-dns) anonymize other network traffic.
|
||||||
|
|
||||||
|
@ -108,7 +108,7 @@ Apple Mail has the ability to load remote content in the background or block it
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<details class="warning" markdown>
|
<details class="warning" markdown>
|
||||||
<summary>Warning</summary>
|
<summary>Varning</summary>
|
||||||
|
|
||||||
Canary Mail only recently released a Windows and Android client, though we don't believe they are as stable as their iOS and Mac counterparts.
|
Canary Mail only recently released a Windows and Android client, though we don't believe they are as stable as their iOS and Mac counterparts.
|
||||||
|
|
||||||
@ -190,7 +190,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
When replying to someone on a mailing list the "reply" option may also include the mailing list. For more information see [thundernest/k-9 #3738](https://github.com/thundernest/k-9/issues/3738).
|
When replying to someone on a mailing list the "reply" option may also include the mailing list. For more information see [thundernest/k-9 #3738](https://github.com/thundernest/k-9/issues/3738).
|
||||||
|
|
||||||
|
@ -41,7 +41,7 @@ These providers natively support OpenPGP encryption/decryption and the [Web Key
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
When using E2EE technology like OpenPGP your email will still have some metadata that is not encrypted in the header of the email, generally including the subject line! Read more about [email metadata](basics/email-security.md#email-metadata-overview).
|
When using E2EE technology like OpenPGP your email will still have some metadata that is not encrypted in the header of the email, generally including the subject line! Read more about [email metadata](basics/email-security.md#email-metadata-overview).
|
||||||
|
|
||||||
|
@ -102,7 +102,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
@ -135,7 +135,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) b
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
@ -170,7 +170,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
@ -206,7 +206,7 @@ Your subscription list and playlists are saved locally on your Android device.
|
|||||||
1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
|
||||||
|
|
||||||
@ -234,7 +234,7 @@ There are a number of public instances, with some instances having [Tor](tor.md)
|
|||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
Invidious does not proxy video streams by default. Videos watched through Invidious will still make direct connections to Google's servers (e.g. `googlevideo.com`); however, some instances support video proxying—simply enable *Proxy videos* within the instances' settings or add `&local=true` to the URL.
|
Invidious does not proxy video streams by default. Videos watched through Invidious will still make direct connections to Google's servers (e.g. `googlevideo.com`); however, some instances support video proxying—simply enable *Proxy videos* within the instances' settings or add `&local=true` to the URL.
|
||||||
|
|
||||||
|
@ -103,7 +103,7 @@ Lorem ipsum dolor sit amet, consectetur adipiscing elit.
|
|||||||
#### `warning`
|
#### `warning`
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
|
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
|
||||||
|
|
||||||
|
@ -100,7 +100,7 @@ An app may request a permission for a specific feature it has. For example, any
|
|||||||
[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.
|
[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.
|
If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.
|
||||||
|
|
||||||
|
@ -147,7 +147,7 @@ After enabling stolen data protection, [certain actions](https://support.apple.c
|
|||||||
iPhones are already resistant to brute-force attacks by making you wait long periods of time after multiple failed attempts; however, there have historically been exploits to get around this. To be extra safe, you can set your phone to wipe itself after 10 failed passcode attempts.
|
iPhones are already resistant to brute-force attacks by making you wait long periods of time after multiple failed attempts; however, there have historically been exploits to get around this. To be extra safe, you can set your phone to wipe itself after 10 failed passcode attempts.
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
With this setting enabled, someone could intentionally wipe your phone by entering the wrong password many times. Make sure you have proper backups and only enable this setting if you feel comfortable with it.
|
With this setting enabled, someone could intentionally wipe your phone by entering the wrong password many times. Make sure you have proper backups and only enable this setting if you feel comfortable with it.
|
||||||
|
|
||||||
|
@ -157,7 +157,7 @@ macOS employs defense in depth by relying on multiple layers of software and har
|
|||||||
### Software Security
|
### Software Security
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
macOS allows you to install beta updates. These are unstable and may come with extra telemetry since they're for testing purposes. Because of this, we recommend you avoid beta software in general.
|
macOS allows you to install beta updates. These are unstable and may come with extra telemetry since they're for testing purposes. Because of this, we recommend you avoid beta software in general.
|
||||||
|
|
||||||
@ -182,7 +182,7 @@ System Integrity Protection makes critical file locations read-only to protect a
|
|||||||
macOS apps submitted to the App Store after June 1, 2012 are required to be sandboxed using the [App Sandbox](https://developer.apple.com/documentation/security/app_sandbox).
|
macOS apps submitted to the App Store after June 1, 2012 are required to be sandboxed using the [App Sandbox](https://developer.apple.com/documentation/security/app_sandbox).
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
Software downloaded from outside the official App Store is not required to be sandboxed. You should avoid non-App Store software as much as possible.
|
Software downloaded from outside the official App Store is not required to be sandboxed. You should avoid non-App Store software as much as possible.
|
||||||
|
|
||||||
|
@ -129,7 +129,7 @@ Briar supports forward secrecy[^1] by using the Bramble [Handshake](https://code
|
|||||||
## Additional Options
|
## Additional Options
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
These messengers do not have forward secrecy[^1], and while they fulfill certain needs that our previous recommendations may not, we do not recommend them for long-term or sensitive communications. Any key compromise among message recipients would affect the confidentiality of **all** past communications.
|
These messengers do not have forward secrecy[^1], and while they fulfill certain needs that our previous recommendations may not, we do not recommend them for long-term or sensitive communications. Any key compromise among message recipients would affect the confidentiality of **all** past communications.
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Security Keys
|
title: Säkerhetsnycklar
|
||||||
icon: material/key-chain
|
icon: material/key-chain
|
||||||
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
|
description: These tools assist you with securing your internet accounts with Multi-Factor Authentication without sending your secrets to a third-party.
|
||||||
cover: multi-factor-authentication.webp
|
cover: multi-factor-authentication.webp
|
||||||
@ -36,7 +36,7 @@ This key provides only basic FIDO2 functionality, but for most people that is al
|
|||||||
If you need any of those features, you should consider their higher-end [YubiKey](#yubikey) of products instead.
|
If you need any of those features, you should consider their higher-end [YubiKey](#yubikey) of products instead.
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
The firmware of Yubico's Security Keys is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key.
|
The firmware of Yubico's Security Keys is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key.
|
||||||
|
|
||||||
@ -69,7 +69,7 @@ YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/suppor
|
|||||||
For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker.
|
For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker.
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
The firmware of YubiKey is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key.
|
The firmware of YubiKey is not updatable. If you want features in newer firmware versions, or if there is a vulnerability in the firmware version you are using, you would need to purchase a new key.
|
||||||
|
|
||||||
@ -97,17 +97,17 @@ The [comparison table](https://nitrokey.com/#comparison) shows the features and
|
|||||||
|
|
||||||
Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download).
|
Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download).
|
||||||
|
|
||||||
For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface.
|
For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Vissa Nitrokeys kan fungera som lösenordshanterare. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface.
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP secrets, we highly recommend that you use a YubiKey instead.
|
While Nitrokeys do not release the HOTP/TOTP secrets to the device they are plugged into, the HOTP and TOTP storage is **not** encrypted and is vulnerable to physical attacks. If you are looking to store HOTP or TOTP secrets, we highly recommend that you use a YubiKey instead.
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="admonition warning" markdown>
|
<div class="admonition warning" markdown>
|
||||||
<p class="admonition-title">Warning</p>
|
<p class="admonition-title">Varning</p>
|
||||||
|
|
||||||
Resetting the OpenPGP interface on a Nitrokey will also make the password database [inaccessible](https://docs.nitrokey.com/pro/linux/factory-reset).
|
Resetting the OpenPGP interface on a Nitrokey will also make the password database [inaccessible](https://docs.nitrokey.com/pro/linux/factory-reset).
|
||||||
|
|
||||||
|
@ -425,7 +425,7 @@ For encrypting your operating system drive, we typically recommend using whichev
|
|||||||
|
|
||||||
## Hardware
|
## Hardware
|
||||||
|
|
||||||
### Security Keys
|
### Säkerhetsnycklar
|
||||||
|
|
||||||
<div class="grid cards" markdown>
|
<div class="grid cards" markdown>
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user