From d7a6f50140e20f1be564e241f6cc83f45ca06b16 Mon Sep 17 00:00:00 2001 From: Crowdin Bot Date: Thu, 16 Nov 2023 08:32:53 +0000 Subject: [PATCH] New Crowdin translations by GitHub Action --- i18n/ja/about/privacytools.md | 2 +- i18n/ja/advanced/communication-network-types.md | 2 +- i18n/ja/basics/passwords-overview.md | 2 +- i18n/ja/cryptocurrency.md | 2 +- i18n/ja/desktop-browsers.md | 2 +- i18n/ja/desktop.md | 2 +- i18n/ja/email.md | 2 +- i18n/ja/financial-services.md | 2 +- i18n/ja/meta/translations.md | 2 +- i18n/ja/os/ios-overview.md | 2 +- i18n/ja/os/linux-overview.md | 2 +- i18n/ja/photo-management.md | 2 +- 12 files changed, 12 insertions(+), 12 deletions(-) diff --git a/i18n/ja/about/privacytools.md b/i18n/ja/about/privacytools.md index ac67543a..de287b5d 100644 --- a/i18n/ja/about/privacytools.md +++ b/i18n/ja/about/privacytools.md @@ -8,7 +8,7 @@ title: "PrivacyToolsに関するよくある質問" Having built a reputable site and set of services on PrivacyTools.io, this caused grave concerns for the future of PrivacyTools, as any future disruption could wipe out the entire organization with no recovery method. This transition was communicated to the PrivacyTools community many months in advance via a variety of channels including its blog, Twitter, Reddit, and Mastodon to ensure the entire process went as smoothly as possible. We did this to ensure nobody was kept in the dark, which has been our modus operandi since our team was created, and to make sure Privacy Guides was recognized as the same reliable organization that PrivacyTools was before the transition. -After the organizational move was completed, the founder of PrivacyTools returned and began to spread misinformation about the Privacy Guides project. They continue to spread misinformation in addition to operating a paid link farm on the PrivacyTools domain. We are creating this page to clear up any misconceptions. +After the organizational move was completed, the founder of PrivacyTools returned and began to spread misinformation about the Privacy Guides project. They continue to spread misinformation in addition to operating a paid link farm on the PrivacyTools domain. 私たちは誤解を解くためにこのページを作りました。 ## PrivacyTools とは? diff --git a/i18n/ja/advanced/communication-network-types.md b/i18n/ja/advanced/communication-network-types.md index 6f9f8705..ee11dcb7 100644 --- a/i18n/ja/advanced/communication-network-types.md +++ b/i18n/ja/advanced/communication-network-types.md @@ -31,7 +31,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. -## Federated Networks +## フェデレーション(連合)型ネットワーク ![Federated networks diagram](../assets/img/layout/network-decentralized.svg){ align=left } diff --git a/i18n/ja/basics/passwords-overview.md b/i18n/ja/basics/passwords-overview.md index c555979f..dd07668d 100644 --- a/i18n/ja/basics/passwords-overview.md +++ b/i18n/ja/basics/passwords-overview.md @@ -30,7 +30,7 @@ When it comes to passwords that you don't have to remember (such as passwords st If your password manager lets you check for compromised passwords, make sure to do so and promptly change any password that may have been exposed in a data breach. Alternatively, you could follow [Have I Been Pwned's Latest Breaches feed](https://feeds.feedburner.com/HaveIBeenPwnedLatestBreaches) with the help of a [news aggregator](../news-aggregators.md). -## Creating strong passwords +## 強力なパスワードの作成 ### パスワード diff --git a/i18n/ja/cryptocurrency.md b/i18n/ja/cryptocurrency.md index 28cedbf9..d50d3c06 100644 --- a/i18n/ja/cryptocurrency.md +++ b/i18n/ja/cryptocurrency.md @@ -7,7 +7,7 @@ cover: cryptocurrency.webp Making payments online is one of the biggest challenges to privacy. These cryptocurrencies provide transaction privacy by default (something which is **not** guaranteed by the majority of cryptocurrencies), provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: -[Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} +[プライベートな支払い :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} !!! 警告 diff --git a/i18n/ja/desktop-browsers.md b/i18n/ja/desktop-browsers.md index be9e2a61..cecc3747 100644 --- a/i18n/ja/desktop-browsers.md +++ b/i18n/ja/desktop-browsers.md @@ -182,7 +182,7 @@ FirefoxはMozillaのウェブサイトからのダウンロードに一意の[ ##### DNS over HTTPS -If you use a [DNS over HTTPS provider](dns.md): +[DNS over HTTPSプロバイダー](dns.md)を使用している場合は、 - [x] Select **Max Protection** and choose a suitable provider diff --git a/i18n/ja/desktop.md b/i18n/ja/desktop.md index 505964df..881f3c2b 100644 --- a/i18n/ja/desktop.md +++ b/i18n/ja/desktop.md @@ -7,7 +7,7 @@ cover: desktop.webp Linux distributions are commonly recommended for privacy protection and software freedom. If you don't already use Linux, below are some distributions we suggest trying out, as well as some general privacy and security improvement tips that are applicable to many Linux distributions. -- [General Linux Overview :material-arrow-right-drop-circle:](os/linux-overview.md) +- [Linuxの概要 :material-arrow-right-drop-circle:](os/linux-overview.md) ## 伝統的なディストリビューション diff --git a/i18n/ja/email.md b/i18n/ja/email.md index 239cf9ab..37bc19dc 100644 --- a/i18n/ja/email.md +++ b/i18n/ja/email.md @@ -294,7 +294,7 @@ They also have a number of benefits over "temporary email" services: - Emails are sent to your trusted mailbox rather than stored by the alias provider. - Temporary email services typically have public mailboxes which can be accessed by anyone who knows the address, aliases are private to you. -Our email aliasing recommendations are providers that allow you to create aliases on domains they control, as well as your own custom domain(s) for a modest yearly fee. They can also be self-hosted if you want maximum control. However, using a custom domain can have privacy-related drawbacks: If you are the only person using your custom domain, your actions can be easily tracked across websites simply by looking at the domain name in the email address and ignoring everything before the at (@) sign. +Our email aliasing recommendations are providers that allow you to create aliases on domains they control, as well as your own custom domain(s) for a modest yearly fee. また、最大限のコントロールを望むなら、セルフホスティングも可能です。 However, using a custom domain can have privacy-related drawbacks: If you are the only person using your custom domain, your actions can be easily tracked across websites simply by looking at the domain name in the email address and ignoring everything before the at (@) sign. Using an aliasing service requires trusting both your email provider and your aliasing provider with your unencrypted messages. Some providers mitigate this slightly with automatic PGP encryption, which reduces the number of parties you need to trust from two to one by encrypting incoming emails before they are delivered to your final mailbox provider. diff --git a/i18n/ja/financial-services.md b/i18n/ja/financial-services.md index fbf7173b..62ac5ddc 100644 --- a/i18n/ja/financial-services.md +++ b/i18n/ja/financial-services.md @@ -6,7 +6,7 @@ cover: financial-services.webp Making payments online is one of the biggest challenges to privacy. These services can assist you in protecting your privacy from merchants and other trackers, provided you have a strong understanding of how to make private payments effectively. We strongly encourage you first read our payments overview article before making any purchases: -[Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} +[プライベートな支払い :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button} ## 支払いマスキングサービス diff --git a/i18n/ja/meta/translations.md b/i18n/ja/meta/translations.md index d8ddc39f..34c19711 100644 --- a/i18n/ja/meta/translations.md +++ b/i18n/ja/meta/translations.md @@ -56,7 +56,7 @@ Recommendations are a special type of admonition which do **not** need overridin !!! recommendation ``` -## Translation output +## 翻訳の出力 Translation software gets the translation quite accurate; however, you need to make sure the translated string is correct. diff --git a/i18n/ja/os/ios-overview.md b/i18n/ja/os/ios-overview.md index a942e2ee..f36bc7d4 100644 --- a/i18n/ja/os/ios-overview.md +++ b/i18n/ja/os/ios-overview.md @@ -204,7 +204,7 @@ If you need to hide information in a photo, you can use Apple's built-in tools t ### iOSのベータ版 -Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. We don't recommend installing beta software on your phone. Beta releases are potentially unstable and could have undiscovered security vulnerabilities. +Apple always makes beta versions of iOS available early for those that wish to help find and report bugs. お使いの電話にベータ版ソフトウェアをインストールすることはお勧めしません。 Beta releases are potentially unstable and could have undiscovered security vulnerabilities. ## Security Highlights diff --git a/i18n/ja/os/linux-overview.md b/i18n/ja/os/linux-overview.md index 0aa54578..285dda21 100644 --- a/i18n/ja/os/linux-overview.md +++ b/i18n/ja/os/linux-overview.md @@ -68,7 +68,7 @@ The Atomic update method is used for immutable distributions like Silverblue, Tu There is often some confusion between “security-focused” distributions and “pentesting” distributions. A quick search for “the most secure Linux distribution” will often give results like Kali Linux, Black Arch, or Parrot OS. These distributions are offensive penetration testing distributions that bundle tools for testing other systems. They don’t include any “extra security” or defensive mitigations intended for regular use. -### Arch-based distributions +### Archベースのディストリビューション Arch and Arch-based distributions are not recommended for those new to Linux (regardless of distribution) as they require regular [system maintenance](https://wiki.archlinux.org/title/System_maintenance). Arch does not have a distribution update mechanism for the underlying software choices. As a result you have to stay aware with current trends and adopt technologies as they supersede older practices on your own. diff --git a/i18n/ja/photo-management.md b/i18n/ja/photo-management.md index 474e8ea3..f7245144 100644 --- a/i18n/ja/photo-management.md +++ b/i18n/ja/photo-management.md @@ -88,7 +88,7 @@ We are working on establishing defined criteria for every section of our site, a ### 最低要件 -- Cloud-hosted providers must enforce end-to-end encryption. +- クラウドホスティングプロバイダーが、エンド・ツー・エンドの暗号化を実施していること。 - Must offer a free plan or trial period for testing. - Must support TOTP or FIDO2 multi-factor authentication, or Passkey logins. - Must offer a web interface which supports basic file management functionality.