1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-18 16:54:21 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2023-11-16 08:32:53 +00:00
parent 915b5eddf0
commit d7a6f50140
12 changed files with 12 additions and 12 deletions

View File

@ -8,7 +8,7 @@ title: "PrivacyToolsに関するよくある質問"
Having built a reputable site and set of services on PrivacyTools.io, this caused grave concerns for the future of PrivacyTools, as any future disruption could wipe out the entire organization with no recovery method. This transition was communicated to the PrivacyTools community many months in advance via a variety of channels including its blog, Twitter, Reddit, and Mastodon to ensure the entire process went as smoothly as possible. We did this to ensure nobody was kept in the dark, which has been our modus operandi since our team was created, and to make sure Privacy Guides was recognized as the same reliable organization that PrivacyTools was before the transition.
After the organizational move was completed, the founder of PrivacyTools returned and began to spread misinformation about the Privacy Guides project. They continue to spread misinformation in addition to operating a paid link farm on the PrivacyTools domain. We are creating this page to clear up any misconceptions.
After the organizational move was completed, the founder of PrivacyTools returned and began to spread misinformation about the Privacy Guides project. They continue to spread misinformation in addition to operating a paid link farm on the PrivacyTools domain. 私たちは誤解を解くためにこのページを作りました。
## PrivacyTools とは?

View File

@ -31,7 +31,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca
- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on.
- Self-hosting requires effort and knowledge of how to set up a service.
## Federated Networks
## フェデレーション(連合)型ネットワーク
![Federated networks diagram](../assets/img/layout/network-decentralized.svg){ align=left }

View File

@ -30,7 +30,7 @@ When it comes to passwords that you don't have to remember (such as passwords st
If your password manager lets you check for compromised passwords, make sure to do so and promptly change any password that may have been exposed in a data breach. Alternatively, you could follow [Have I Been Pwned's Latest Breaches feed](https://feeds.feedburner.com/HaveIBeenPwnedLatestBreaches) with the help of a [news aggregator](../news-aggregators.md).
## Creating strong passwords
## 強力なパスワードの作成
### パスワード

View File

@ -7,7 +7,7 @@ cover: cryptocurrency.webp
Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:
[Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button}
[プライベートな支払い :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button}
!!! 警告

View File

@ -182,7 +182,7 @@ FirefoxはMozillaのウェブサイトからのダウンロードに一意の[
##### DNS over HTTPS
If you use a [DNS over HTTPS provider](dns.md):
[DNS over HTTPSプロバイダー](dns.md)を使用している場合は、
- [x] Select **Max Protection** and choose a suitable provider

View File

@ -7,7 +7,7 @@ cover: desktop.webp
Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions.
- [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md)
- [Linuxの概要 :material-arrow-right-drop-circle:](os/linux-overview.md)
## 伝統的なディストリビューション

View File

@ -294,7 +294,7 @@ They also have a number of benefits over "temporary email" services:
- Emails are sent to your trusted mailbox rather than stored by the alias provider.
- Temporary email services typically have public mailboxes which can be accessed by anyone who knows the address, aliases are private to you.
Our email aliasing recommendations are providers that allow you to create aliases on domains they control, as well as your own custom domain(s) for a modest yearly fee. They can also be self-hosted if you want maximum control. However, using a custom domain can have privacy-related drawbacks: If you are the only person using your custom domain, your actions can be easily tracked across websites simply by looking at the domain name in the email address and ignoring everything before the at (@) sign.
Our email aliasing recommendations are providers that allow you to create aliases on domains they control, as well as your own custom domain(s) for a modest yearly fee. また、最大限のコントロールを望むなら、セルフホスティングも可能です。 However, using a custom domain can have privacy-related drawbacks: If you are the only person using your custom domain, your actions can be easily tracked across websites simply by looking at the domain name in the email address and ignoring everything before the at (@) sign.
Using an aliasing service requires trusting both your email provider and your aliasing provider with your unencrypted messages. Some providers mitigate this slightly with automatic PGP encryption, which reduces the number of parties you need to trust from two to one by encrypting incoming emails before they are delivered to your final mailbox provider.

View File

@ -6,7 +6,7 @@ cover: financial-services.webp
Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases:
[Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button}
[プライベートな支払い :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button}
## 支払いマスキングサービス

View File

@ -56,7 +56,7 @@ Recommendations are a special type of admonition which do **not** need overridin
!!! recommendation
```
## Translation output
## 翻訳の出力
Translation software gets the translation quite accurate; however, you need to make sure the translated string is correct.

View File

@ -204,7 +204,7 @@ If you need to hide information in a photo, you can use Apple's built-in tools t
### iOSのベータ版
Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities.
Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. お使いの電話にベータ版ソフトウェアをインストールすることはお勧めしません。 Beta releases are potentially unstable and could have undiscovered security vulnerabilities.
## Security Highlights

View File

@ -68,7 +68,7 @@ The Atomic update method is used for immutable distributions like Silverblue, Tu
There is often some confusion between “security-focused” distributions and “pentesting” distributions. A quick search for “the most secure Linux distribution” will often give results like Kali Linux, Black Arch, or Parrot OS. These distributions are offensive penetration testing distributions that bundle tools for testing other systems. They dont include any “extra security” or defensive mitigations intended for regular use.
### Arch-based distributions
### Archベースのディストリビューション
Arch and Arch-based distributions are not recommended for those new to Linux (regardless of distribution) as they require regular [system maintenance](https://wiki.archlinux.org/title/System_maintenance). Arch does not have a distribution update mechanism for the underlying software choices. As a result you have to stay aware with current trends and adopt technologies as they supersede older practices on your own.

View File

@ -88,7 +88,7 @@ We are working on establishing defined criteria for every section of our site, a
### 最低要件
- Cloud-hosted providers must enforce end-to-end encryption.
- クラウドホスティングプロバイダーが、エンド・ツー・エンドの暗号化を実施していること。
- Must offer a free plan or trial period for testing.
- Must support TOTP or FIDO2 multi-factor authentication, or Passkey logins.
- Must offer a web interface which supports basic file management functionality.