1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-06-18 16:54:21 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2023-05-04 04:04:29 +00:00
parent b4e22a299c
commit dfef7f9546
11 changed files with 138 additions and 138 deletions

View File

@ -1,57 +1,57 @@
---
title: "Why Privacy Matters"
title: "Pourquoi la vie privée est importante"
icon: 'material/shield-account'
---
In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands.
À l'ère moderne de l'exploitation des données numériques, la protection de votre vie privée n'a jamais été aussi cruciale, et pourtant beaucoup pensent qu'elle est déjà une cause perdue. Ce n'est pas le cas. ==Votre vie privée est en jeu==, et vous devez vous en préoccuper. La protection de la vie privée est une question de pouvoir, et il est très important que ce pouvoir soit entre de bonnes mains.
Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters.
La protection de la vie privée concerne en fin de compte des informations humaines, et c'est important car nous savons que les informations humaines confèrent un pouvoir sur les êtres humains. Si nous tenons à notre capacité à être des êtres humains authentiques, épanouis et libres, nous devons nous préoccuper des règles qui s'appliquent aux informations nous concernant. Une grande partie de notre société moderne est structurée autour de **l'information**. Lorsque vous faites des achats en ligne, lisez les actualités, cherchez quelque chose sur internet, votez, demandez votre chemin ou que vous faites n'importe quoi d'autre, vous vous fiez à l'information. Si nous vivons dans une société de l'information, nos informations sont importantes et la vie privée l'est donc aussi.
## What is Privacy?
## Qu'est-ce que la vie privée ?
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
De nombreuses personnes confondent les concepts de **vie privée**, **sécurité**, et **anonymat**. Vous verrez des gens critiquer divers produits en disant qu'ils ne sont pas privés, alors qu'ils veulent dire qu'ils ne garantissent pas l'anonymat, par exemple. Sur ce site web, nous abordons ces trois sujets, mais il est important que vous compreniez la différence entre eux et quand chacun d'entre eux entre en jeu.
**Confidentialité**
**Vie privée**
:
==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient.
==La protection de la vie privée est l'assurance que vos données ne sont vues que par les parties que vous autorisez à les voir.== Dans le contexte d'une messagerie instantanée, par exemple, le chiffrement de bout en bout assure la confidentialité en faisant en sorte que votre message ne soit visible que par vous-même et par le destinataire.
**Sécurité**
:
Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates.
La sécurité est la capacité à faire confiance aux applications que vous utilisez, à savoir que les parties impliquées sont bien celles qu'elles prétendent être, et à garder ces applications sécurisés. Dans le contexte de la navigation sur le web, par exemple, la sécurité peut être assurée par des certificats HTTPS.
Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website.
Les certificats prouvent que vous communiquez directement avec le site web que vous visitez et empêchent les attaquants sur votre réseau de lire ou de modifier les données envoyées vers ou depuis le site web.
**Anonymity**
**Anonymat**
:
Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own.
L'anonymat est la capacité d'agir sans identifiant permanent. Vous pouvez y parvenir en ligne avec [Tor](../tor.md), qui vous permet de naviguer sur internet avec une adresse IP et une connexion réseau aléatoires au lieu de la vôtre.
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
Le **pseudonymat** est un concept similaire, mais il vous permet d'avoir un identifiant persistant sans qu'il soit lié à votre identité réelle. Si tout le monde vous connaît sous le nom de `@KevinDu59` en ligne, mais que personne ne connaît votre vrai nom, c'est votre pseudonyme.
All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
Tous ces concepts se chevauchent, mais il est possible de les combiner. Pour la plupart des gens, l'idéal est que ces trois concepts se chevauchent. Cependant, il est plus difficile d'y parvenir que beaucoup ne le croient au premier abord. Parfois, il faut faire des compromis sur certains points, et c'est très bien ainsi. C'est là que la **modélisation des menaces** entre en jeu, vous permettant de prendre des décisions éclairées sur [les logiciels et les services](../tools.md) que vous utilisez.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button}
[:material-book-outline: En savoir plus sur la modélisation des menaces](basics/threat-modeling.md ""){.md-button}
## Privacy vs. Secrecy
## Vie privée vs secret
A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong.
Un contre-argument courant aux mouvements en faveur de la protection de la vie privée est l'idée que l'on n'a pas besoin de vie privée si l'on n'a **"rien à cacher"**. Il s'agit d'une idée fausse et dangereuse, car elle donne l'impression que les personnes qui exigent le respect de la vie privée sont forcément déviantes, criminelles ou mauvaises.
==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. C'est parce que vous voulez une vie privée, et non pas du secret. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets.
==Il ne faut pas confondre vie privée et secret.== Nous savons ce qui se passe dans les toilettes, mais vous fermez quand même la porte. C'est parce que vous voulez une vie privée, et non pas du secret. Il y a toujours certains faits nous concernant - par exemple, des informations sur notre santé personnelle ou notre comportement sexuel - que nous ne voudrions pas que le monde entier connaisse, et c'est normal. Le besoin de vie privée est légitime et c'est ce qui fait de nous des êtres humains. La protection de la vie privée consiste à renforcer vos droits sur vos propres informations, et non à cacher des secrets.
## Is Privacy About Control?
## La vie privée est-elle une question de contrôle ?
A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work.
Une définition courante de la vie privée est la possibilité de *contrôler* qui a accès à vos données. C'est un piège dans lequel il est facile de tomber, et c'est en fait la définition de la vie privée sur laquelle nous avons longtemps fait fonctionner ce site web. Cela semble bien, et cela plaît à beaucoup de gens, mais dans la pratique, cela ne fonctionne pas.
Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place.
Prenons l'exemple des formulaires de consentement des cookies. Vous les rencontrez peut-être des dizaines de fois par jour sur les différents sites web que vous visitez, avec une belle série de cases à cocher et de curseurs qui vous permettent d'adapter vos préférences à vos besoins. En fin de compte, nous appuyons sur le bouton "J'accepte", parce que nous voulons simplement lire l'article ou faire un achat. Personne n'a envie de procéder à un audit de la protection de la vie privée sur chaque site web qu'il visite. Il s'agit d'un exercice [d'architecture de choix](https://en.wikipedia.org/wiki/Choice_architecture), conçu pour vous inciter à choisir la voie la plus facile au lieu de vous plonger dans un labyrinthe d'options de configuration qui n'ont pas lieu d'exister.
==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to.
==Le contrôle de votre vie privée dans la plupart des applications est une illusion.== Il s'agit d'un joli tableau de bord avec toutes sortes de choix que vous pouvez faire à propos de vos données, mais rarement les choix que vous recherchez, comme "n'utiliser mes données que pour m'aider". Ce type de contrôle vise à vous faire culpabiliser de vos choix, à vous faire comprendre que vous "aviez le choix" de rendre les applications que vous utilisez plus privées, et que vous avez choisi de ne pas le faire.
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
La protection de la vie privée doit être intégrée par défaut dans les [logiciels et services](../tools.md) que nous utilisons, car il est impossible de forcer de vous-même la plupart des applications à respecter votre vie privée.
## Sources
- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards
- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) par Neil Richards
- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/)
- [@Thorin-Oakenpants on GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298)
- [@Thorin-Oakenpants sur GitHub](https://github.com/privacytools/privacytools.io/issues/1760#issuecomment-597497298)

View File

@ -38,13 +38,13 @@ schema:
<!-- markdownlint-disable-next-line -->
## En quoi ça me concerne ?
##### «Je n'ai rien à cacher. Pourquoi devrais-je me soucier de ma vie privée? »
##### «Je n'ai rien à cacher. Pourquoi devrais-je me soucier de ma vie privée ? »
Tout comme le droit au mariage mixte, le droit de vote des femmes, la liberté d'expression et bien d'autres, notre droit à la vie privée n'a pas toujours été respecté. Dans plusieurs dictatures, ce n'est toujours pas le cas. Nombreux sont nos ancêtres qui se sont battus pour notre droit à la vie privée. ==La vie privée est un droit humain inhérent à chacun d'entre nous== auquel nous avons droit sans discrimination.
Il ne faut pas confondre la vie privée et le secret. Même si on sait ce qui se passe dans la salle de bain, vous fermez quand même la porte. C'est parce que vous voulez une vie privée, et non pas du secret. **Tout le monde** a quelque chose à protéger. La vie privée est quelque chose qui nous rend humains.
[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" }
[:material-book-outline: Pourquoi la vie privée est importante](basics/why-privacy-matters.md){ class="md-button md-button--primary" }
## Que dois-je faire ?
@ -58,7 +58,7 @@ Essayer de protéger toutes vos données contre tout le monde, tout le temps, es
---
## On a besoin de vous ! Voici comment vous pouvez vous impliquer
## On a besoin de vous ! Voici comment vous pouvez vous impliquer :
[:simple-discourse:](https://discuss.privacyguides.net/){ title="Rejoignez notre forum" }
[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Suivez-nous sur Mastodon" }

View File

@ -18,93 +18,93 @@ description: These are some tips and tricks on how to create the strongest passw
==You should **never** rely on yourself to come up with a good password.== We recommend using [randomly generated passwords](#passwords) or [diceware passphrases](#diceware-passphrases) with sufficient entropy to protect your accounts and devices.
All of our [recommended password managers](../passwords.md) include a built-in password generator that you can use.
저희가 [권장하는 비밀번호 관리자](../passwords.md)는 전부 비밀번호 생성기를 내장하고 있습니다.
### 비밀번호 변경
You should avoid changing passwords that you have to remember (such as your password manager's master password) too often unless you have reason to believe it has been compromised, as changing it too often exposes you to the risk of forgetting it.
비밀번호 관리자의 마스터 비밀번호처럼 머릿속에 외워둬야 하는 비밀번호는 유출이 발생했다고 판단되지 않는 한 자주 변경하지 않는 편이 좋습니다. 잊어버릴 위험성이 높아지기 때문입니다.
When it comes to passwords that you don't have to remember (such as passwords stored inside your password manager), if your [threat model](threat-modeling.md) calls for it, we recommend going through important accounts (especially accounts that don't use multi-factor authentication) and changing their password every couple of months, in case they have been compromised in a data breach that hasn't become public yet. Most password managers allow you to set an expiry date for your password to make this easier to manage.
비밀번호 관리자 내에서 관리하는 비밀번호 등, 직접 외울 필요가 없는 비밀번호는 여러분의 [위협 모델](threat-modeling.md)에 따라 중요한 계정(특히 다중 인증을 사용하지 않는 계정)은 아직 공개되지 않은 데이터 유출이 발생했을 경우를 대비해 몇 달마다 비밀번호를 변경할 것을 권장합니다. 대부분의 비밀번호 관리자는 비밀번호 만료일 설정 기능을 제공하기 때문에 더욱 관리하기 쉽습니다.
!!! tip "Checking for data breaches"
!!! tip "데이터 유출 확인"
If your password manager lets you check for compromised passwords, make sure to do so and promptly change any password that may have been exposed in a data breach. Alternatively, you could follow [Have I Been Pwned's Latest Breaches feed](https://feeds.feedburner.com/HaveIBeenPwnedLatestBreaches) with the help of a [news aggregator](../news-aggregators.md).
비밀번호 관리자에서 유출된 비밀번호 확인 기능을 제공하는 경우, 반드시 해당 기능을 사용해 데이터 유출로 인해 노출됐을 가능성이 있는 비밀번호는 즉시 변경하세요. 혹은 [뉴스 애그리게이터](../news-aggregators.md)를 이용해 [내가 겪은 최근 유출 사례(Have I Been Pwned's Latest Breaches feed)](https://feeds.feedburner.com/HaveIBeenPwnedLatestBreaches)를 팔로우 해두는 방법도 있습니다.
## 강력한 비밀번호 만들기
### 패스워드
A lot of services impose certain criteria when it comes to passwords, including a minimum or maximum length, as well as which special characters, if any, can be used. You should use your password manager's built-in password generator to create passwords that are as long and complex as the service will allow by including capitalized and lowercase letters, numbers and special characters.
많은 서비스는 최소/최대 길이, 사용 가능한 특수 문자 등 비밀번호에 특정 제한이 존재합니다. 비밀번호 관리자에 내장된 비밀번호 생성기를 사용해 해당 서비스에서 허용되는 한도 내에서 최대한 길고 복잡한(대문자, 소문자, 숫자, 특수 문자를 포함한) 비밀번호를 만들어야 합니다.
If you need a password you can memorize, we recommend a [diceware passphrase](#diceware-passphrases).
외워두어야 하는 비밀번호의 경우, [Diceware 패스프레이즈](#diceware-passphrases) 방식으로 생성할 것을 권장합니다.
### Diceware 패스프레이즈
Diceware is a method for creating passphrases which are easy to remember, but hard to guess.
다이스웨어(Diceware) 방식을 사용하면 기억하기 쉬우면서도 추측하기는 어려운 패스프레이즈(Passphrase)를 만들 수 있습니다.
Diceware passphrases are a great option when you need to memorize or manually input your credentials, such as for your password manager's master password or your device's encryption password.
다이스웨어 패스프레이즈는 비밀번호 관리자의 마스터 비밀번호나 기기 암호화 비밀번호 등 직접 머릿속에 외워둬야 하거나 수동으로 입력해야 하는 비밀번호에 유용합니다.
An example of a diceware passphrase is `viewable fastness reluctant squishy seventeen shown pencil`.
다이스웨어 패스프레이즈의 예시는 이와 같습니다. `viewable fastness reluctant squishy seventeen shown pencil`
To generate a diceware passphrase using real dice, follow these steps:
실물 주사위를 사용해 다이스웨어 패스프레이즈를 생성하는 방법은 다음과 같습니다:
!!! note
!!! note "참고"
These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
본 내용에서는 [EEF 대규모 단어 목록](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt)를 활용해 단어당 5번씩 주사위를 굴려 패스프레이즈를 생성한다고 가정합니다. 다른 단어 목록을 사용할 경우에는 주사위를 굴려야 하는 횟수 혹은 동일한 엔트로피를 달성하기 위해 필요한 단어의 양이 달라질 수 있습니다.
1. Roll a six-sided die five times, noting down the number after each roll.
1. 6면체 주사위를 5번 굴려서 각 주사위를 굴릴 때마다 숫자를 적습니다.
2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`.
2. 예를 들어, `2-5-2-6-6`가 나왔다고 가정해 보겠습니다. [EEF 대규모 단어 목록](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt)에서 `25266`에 해당하는 단어를 찾아봅시다.
3. You will find the word `encrypt`. Write that word down.
3. `encrypt` 단어를 찾았습니다. 이 단어를 받아 적습니다.
4. Repeat this process until your passphrase has as many words as you need, which you should separate with a space.
4. 원하는 개수의 단어를 얻을 때까지 이 과정을 반복하고, 각 단어는 공백으로 구분합니다.
!!! warning "Important"
!!! warning "중요"
You should **not** re-roll words until you get a combination of words that appeal to you. The process should be completely random.
단어 조합이 마음에 들지 않는다는 이유로 단어를 다시 선택해서는 **안 됩니다**. 패스프레이즈 생성 과정은 완전히 랜덤으로 진행되어야 합니다.
If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords.
실물 주사위가 없거나 사용하고 싶지 않은 경우, 비밀번호 관리자에 내장된 비밀번호 생성기를 사용하면 됩니다. 대부분의 비밀번호 관리자는 일반적인 패스워드 방식뿐만 아니라 다이스웨어 패스프레이즈도 지원합니다.
We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
저희는 원본 목록과 동일한 수준의 보안을 제공하면서 외우기 쉬운 단어로 이루어진 [EEF 대규모 단어 목록](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt)을 활용해 다이스웨어 패스프레이즈를 생성할 것을 권장드립니다. 영어 외 언어로 패스프레이즈를 생성하고자 하시는 경우 [다른 언어 단어 목록](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline)도 있습니다.
??? note "Explanation of entropy and strength of diceware passphrases"
??? note "다이스웨어 패스프레이즈의 엔트로피 및 강도"
To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example.
다이스웨어 패스프레이즈의 강도를 알려드리기 위해, 앞서 언급한 7 단어 패스프레이즈(`viewable fastness reluctant squishy seventeen shown pencil`) [EEF 대규모 암호 목록](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt)을 예로 들어보겠습니다.
One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$.
다이스웨어 패스프레이즈 강도를 결정하는 지표 한 가지는 엔트로피의 크기입니다. 다이스웨어 패스프레이즈의 단어당 엔트로피는 $\text{log}_2(\text{WordsInList})$, 전체 패스프레이즈 엔트로피는 $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$로 계산됩니다.
Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$).
따라서, 앞서 언급한 목록 내 각 단어는 ~12.9비트 엔트로피($\text{log}_2(7776)$), 7 단어 패스프레이즈는 ~90.47비트 엔트로피($\text{log}_2(7776^7)$)를 갖습니다.
The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$.
[EEF 대규모 단어 목록](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt)에 포함된 단어의 수는 7776개입니다. 만들어질 수 있는 패스프레이즈의 양을 계산하면 $\text{WordsInList}^\text{WordsInPhrase}$, $7776^7$입니다.
Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases.
종합하면, [EEF 대규모 단어 목록](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt)을 활용해 생성한 7 단어 패스프레이즈는 1,719,070,799,748,422,500,000,000,000개 경우의 수 중 하나입니다.
On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true:
평균적으로, 누군가의 패스프레이즈를 알아맞히려면 가능한 모든 조합의 50%를 시도해야만 합니다. 이 점을 고려하여 계산해보면 공격자가 만약 초당 1,000,000,000,000번 시도한다고 가정해도 여러분의 패스프레이즈를 알아맞히는 데에는 27,255,689년이 걸립니다. 심지어 이는 다음 조건을 충족하는 경우의 이야기입니다:
- Your adversary knows that you used the diceware method.
- Your adversary knows the specific wordlist that you used.
- Your adversary knows how many words your passphrase contains.
- 여러분이 다이스웨어 방식을 사용했다는 점을 공격자가 알고 있습니다.
- 여러분이 어떤 단어 목록을 활용했는지를 공격자가 알고 있습니다.
- 여러분의 패스프레이즈 단어 개수를 공격자가 알고 있습니다.
To sum it up, diceware passphrases are your best option when you need something that is both easy to remember *and* exceptionally strong.
요약하자면, 기억하기 쉬우면서*도* 매우 강력한 비밀번호가 필요할 경우에는 다이스웨어 패스프레이즈가 최선의 선택입니다.
## 비밀번호 저장
### 비밀번호 관리자
비밀번호를 저장하는 가장 좋은 방법은 비밀번호 관리자를 사용하는 것입니다. They allow you to store your passwords in a file or in the cloud and protect them with a single master password. That way, you will only have to remember one strong password, which lets you access the rest of them.
비밀번호를 저장하는 가장 좋은 방법은 비밀번호 관리자를 사용하는 것입니다. 파일이나 클라우드에 비밀번호들을 저장하고 마스터 비밀번호 하나로 보호할 수 있습니다. 이로써, 강력한 비밀번호 하나만 외워두면 모든 비밀번호를 관리할 수 있습니다.
There are many good options to choose from, both cloud-based and local. Choose one of our recommended password managers and use it to establish strong passwords across all of your accounts. We recommend securing your password manager with a [diceware passphrase](#diceware-passphrases) comprised of at least seven words.
클라우드 기반, 로컬 기반 각각 훌륭한 선택지가 여럿 있습니다. 권장 비밀번호 관리자 중 하나를 선택해 모든 계정의 비밀번호를 강력하게 설정하세요. 비밀번호 관리자 마스터 비밀번호는 [다이스웨어 패스프레이즈](#diceware-passphrases)를 사용하여 7개 단어 이상으로 구성할 것을 권장드립니다.
[권장 비밀번호 관리자 목록](../passwords.md ""){.md-button}
!!! warning "비밀번호와 TOTP 토큰을 하나의 비밀번호 관리자에 저장하지 마세요"
When using TOTP codes as [multi-factor authentication](../multi-factor-authentication.md), the best security practice is to keep your TOTP codes in a [separate app](../multi-factor-authentication.md#authenticator-apps).
TOTP 코드 [다중 인증](../multi-factor-authentication.md) 방식을 사용하는 경우, TOTP 코드는 [별도 앱](../multi-factor-authentication.md#authenticator-apps)에서 보관하는 것이 가장 좋은 방법입니다.
Storing your TOTP tokens in the same place as your passwords, while convenient, reduces the accounts to a single factor in the event that an adversary gains access to your password manager.
TOTP 토큰과 비밀번호를 한 곳에서 관리하면 편리하지만, 만약 공격자가 여러분의 비밀번호 관리자에 접근 가능할 경우 다중 인증은 무용지물이 됩니다.
Furthermore, we do not recommend storing single-use recovery codes in your password manager. Those should be stored separately such as in an encrypted container on an offline storage device.
일회용 복구 코드 또한 비밀번호 관리자에 저장하지 말 것을 권장드립니다. 이러한 정보는 오프라인 저장 장치의 암호화 컨테이너 등에 별도로 보관해야 합니다.
### 백업

View File

@ -12,7 +12,7 @@ cover: cloud.png
??? question "Nextcloud를 찾고 계신가요?"
Nextcloud는 자체 호스팅 파일 관리 제품군으로 [권장 목록에 존재](productivity.md)하고 있습니다. 하지만, 현재로서 Privacy Guides는 제3자 Nextcloud 스토리지 제공 업체를 권장하지 않습니다. Nextcloud 내장 E2EE 기능을 일반 사용자에게 [권장하지 않기 때문](https://discuss.privacyguides.net/t/dont-recommend-nextcloud-e2ee/10352/29)입니다.
Nextcloud는 자체 호스팅 파일 관리 제품군으로 [권장 목록에 존재](productivity.md)하고 있습니다. 하지만, 현재로서 저희는 제3자 Nextcloud 스토리지 제공 업체를 권장하지 않습니다. Nextcloud 내장 E2EE 기능을 일반 사용자에게 [권장하지 않기 때문](https://discuss.privacyguides.net/t/dont-recommend-nextcloud-e2ee/10352/29)입니다.
## Proton Drive

View File

@ -66,11 +66,11 @@ cover: email-clients.png
**Apple Mail**은 macOS에 기본 포함되어 있으며, PGP 암호화 이메일 전송 기능을 추가하는 [GPG Suite](encryption.md#gpg-suite)를 통해 OpenPGP를 지원하도록 확장 가능합니다.
[:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary }
[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation}
[:octicons-home-16: 홈페이지](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary }
[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="프라이버시 정책" }
[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=문서}
Apple Mail has the ability to load remote content in the background or block it entirely and hide your IP address from senders on [macOS](https://support.apple.com/guide/mail/mlhl03be2866/mac) and [iOS](https://support.apple.com/guide/iphone/iphf084865c7/ios).
Apple Mail은 외부 콘텐츠를 백그라운드에서 로드하거나, 완전히 차단해 발신자로부터 IP 주소를 숨길 수 있는 기능을 [macOS](https://support.apple.com/guide/mail/mlhl03be2866/mac) [iOS](https://support.apple.com/guide/iphone/iphf084865c7/ios)에서 제공합니다.
### Canary Mail (iOS)
@ -92,7 +92,7 @@ Apple Mail has the ability to load remote content in the background or block it
!!! warning "경고"
Canary Mail은 Windows 및 Android용 클라이언트를 최근 출시했지만, Privacy Guides는 해당 클라이언트가 iOS/Mac용 클라이언트만큼 안정적이진 않다고 판단하고 있습니다.
Canary Mail은 Windows 및 Android용 클라이언트를 최근 출시했지만, 저희는 해당 클라이언트가 iOS/Mac용 클라이언트만큼 안정적이진 않다고 판단하고 있습니다.
Canay Mail은 오픈 소스가 아닙니다. iOS에서 PGP E2EE를 지원하는 이메일 클라이언트가 몇 없기 때문에 권장 목록에 등재되었습니다.

View File

@ -1,54 +1,54 @@
---
title: "Why Privacy Matters"
title: "Почему приватность имеет значение"
icon: 'material/shield-account'
---
In the modern age of digital data exploitation, your privacy has never been more critical, and yet many believe it is already a lost cause. It is not. ==Your privacy is up for grabs==, and you need to care about it. Privacy is about power, and it is so important that this power ends up in the right hands.
Ваша приватность никогда не была столь важна, как в современную эпоху эксплуатации цифровых данных, хотя многие и считают, что она уже потеряна. Это не так. ==Вашу приватность хотят отнять==, и вы должны обратить на это внимание. Приватность - это власть, поэтому так важно, чтобы эта власть оказалась в правильных руках.
Privacy is ultimately about human information, and this is important because we know that human information confers power over human beings. If we care about our ability to be authentic, fulfilled, and free humans, we have to care about the rules that apply to information about us. So much of our modern society is structured around **information**. When you shop online, read the news, look something up, vote, seek directions, or really anything else, you are relying on information. If we live in an information society, our information matters, and therefore privacy matters.
Приватность в конечном итоге связана с информацией о человеке, и это важно, потому что мы знаем, что информация о человеке дает власть над ним. Если нас волнует наша способность быть настоящими, полноценными и свободными людьми, мы должны заботиться о правилах, которые применяются к нашей информации. Большая часть нашего современного общества построена вокруг **информации**. Когда вы совершаете покупки в интернете, читаете новости, ищете что-то, голосуете, ищете дорогу или делаете что-то еще, вы полагаетесь на информацию. Если мы живем в информационном обществе, то наша информация имеет значение, поэтому имеет значение и приватность.
## What is Privacy?
## Что такое приватность?
Many people get the concepts of **privacy**, **security**, and **anonymity** confused. You'll see people criticize various products as "not private" when really they mean it doesn't provide anonymity, for example. On this website, we cover all three of these topics, but it is important you understand the difference between them, and when each one comes into play.
Многие люди путают **приватность**, **безопасность** и **анонимность**. Вы можете видеть, как люди критикуют различные продукты как "не приватные", когда на самом деле они имеют в виду, что они не обеспечивают анонимность. На этом сайте мы рассматриваем все эти три темы, но важно понимать разницу между ними, и когда каждая из них вступает в игру.
**Privacy**
**Приватность**
:
==Privacy is the assurance that your data is only seen by the parties you intend to view it.== In the context of an instant messenger, for example, end-to-end encryption provides privacy by keeping your message visible only to yourself and the recipient.
== Приватность - это гарантия того, что ваши данные будут видны только тем лицам, которым они предназначены для просмотра.== Например, в контексте обмена сообщениями сквозное шифрование обеспечивает приватность, поскольку ваше сообщение видно только вам и получателю.
**Security**
**Безопасность**
:
Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates.
Безопасность - это возможность доверять приложениям, которые вы используете, что участвующие стороны являются теми, за кого себя выдают. В контексте интернет сёрфинга, безопасность может быть обеспечена сертификатами HTTPS.
Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website.
Сертификаты подтверждают, что вы напрямую общаетесь с веб-сайтом, который посещаете, и не позволяют злоумышленникам в вашей сети читать или изменять данные, отправленные на веб-сайт или из него.
**Anonymity**
**Анонимность**
:
Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own.
Анонимность - это возможность действовать без постоянного идентификатора. Вы можете достичь этого онлайн с помощью [Tor](../tor.md), который позволяет просматривать интернет со случайным IP адресом и сетевым подключением вместо вашего собственного.
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
**Псевдоним** является похожим понятием, но он позволяет иметь постоянный идентификатор без его привязки к вашей реальной личности. Если в интернете все знают вас как `@GamerGuy12`, но никто не знает вашего настоящего имени, это и есть ваш псевдоним.
All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
Все эти понятия накладываются друг на друга, и возможно любое их сочетание. Для большинства людей оптимальный вариант - когда все эти три понятия пересекаются. Однако добиться этого гораздо сложнее, чем многие думают на первый взгляд. Иногда приходится идти на компромисс в некоторых вопросах, и это тоже нормально. Вот где **моделирование угроз** становится важным, позволяя вам принимать обоснованные решения относительно [программ и услуг](../tools.md), которые вы используете.
[:material-book-outline: Learn More About Threat Modeling](basics/threat-modeling.md ""){.md-button}
[:material-book-outline: Узнайте больше о моделировании угроз](basics/threat-modeling.md ""){.md-button}
## Privacy vs. Secrecy
## Приватность или секретность
A common counter-argument to pro-privacy movements is the notion that one doesn't need privacy if they have **"nothing to hide."** This is a dangerous misconception, because it creates a sense that people who demand privacy must be deviant, criminal, or wrong.
Распространенным контраргументом против движения за приватность является представление о том, что человеку не нужна приватность, если ему **"нечего скрывать".** Это опасное заблуждение, потому что оно создает ощущение, что люди, требующие приватности, являются девиантами, преступниками или неправильными.
==You shouldn't confuse privacy with secrecy.== We know what happens in the bathroom, but you still close the door. Это потому, что вы хотите приватности, а не секретности. There are always certain facts about us—say, personal health information, or sexual behavior—that we wouldn't want the whole world to know, and that's okay. The need for privacy is legitimate, and that's what makes us human. Privacy is about empowering your rights over your own information, not about hiding secrets.
==Не стоит путать приватность и секретность.== Мы все знаем, что происходит в ванной, но вы все равно закрываете дверь. Это потому, что вы хотите приватности, а не секретности. Всегда есть определенные факты о нас, например информация о личном здоровье или сексуальном поведении, которыми мы бы не хотели делиться со всем миром, и это нормально. Потребность в приватности легитимна, и именно это делает нас людьми. Приватность - это ваши права на вашу собственную информацию, а не сокрытие секретов.
## Is Privacy About Control?
## Приватность - это контроль?
A common definition of privacy is that it is the ability to *control* who has access to your data. This is an easy trap to fall into, in fact it is the definition of privacy we operated this website on for a long time. It sounds nice, and it appeals to many people, but in practice it just doesn't work.
Общепринятое определение приватности - это возможность *контролировать*, кто имеет доступ к вашим данным. В такую ловушку легко попасть, ведь именно с таким определением приватности мы долгое время работали на этом сайте. Это звучит красиво, и это нравится многим людям, но на практике это просто не работает.
Take cookie consent forms, for example. You may encounter these dozens of times per day on the various websites you visit, with a nice array of checkboxes and sliders which allow you to "curate" your preferences to exactly fit your needs. In the end, we just hit the "I Agree" button, because we just want to read the article or make a purchase. Nobody wants to complete a personal privacy audit on every single website they visit. This is an exercise in [choice architecture](https://en.wikipedia.org/wiki/Choice_architecture), designed to make you take the easy route out instead of delving into a maze of configuration options that don't need to exist in the first place.
Возьмем, к примеру, формы согласия на использование cookie. Вы можете встретить их десятки раз в день на различных веб-сайтах, с приятным набором флажков и ползунков, которые позволяют вам "контролировать" ваши предпочтения, чтобы они точно соответствовали вашим потребностям. В итоге мы просто нажимаем кнопку "Принять все", потому что просто хотим прочитать статью или совершить покупку. Никто не хочет проводить аудит личной приватности на каждом посещаемом сайте. Эта [архитектура выбора](https://ru.wikipedia.org/wiki/архитектура_выбора) построена так, чтобы заставить вас выбрать легкий путь, вместо того чтобы углубляться в дебри опций и конфигурации, которые вообще не должны существовать.
==Control over your privacy inside most apps is an illusion.== It's a shiny dashboard with all sorts of choices you can make about your data, but rarely the choices you're looking for, like "only use my data to help me." This type of control is meant to make you feel guilty about your choices, that you "had the choice" to make the apps you use more private, and you chose not to.
==Контроль над вашей приватностью в большинстве приложений - это иллюзия.== Это блестящий дашборд со всеми возможными выборами, которые вы можете сделать в отношении ваших данных. Но не выбор, который вы ищете, например "использовать мои данные только для того, чтобы помочь мне". Этот тип контроля призван заставить вас чувствовать вину за свой выбор. У вас был "выбор" сделать приложения, которые вы используете, более приватными, но вы решили этого не делать.
Privacy is something we need to have baked into the [software and services](../tools.md) we use by default, you can't bend most apps into being private on your own.
Приватность должна быть встроена по умолчанию в [программы и сервисы](../tools.md), которые мы используем, у вас нет возможности самостоятельно настроить большинство приложений на приватность.
## Источники

View File

@ -44,7 +44,7 @@ schema:
Не стоит путать приватность с секретностью. Все знают, что происходит в вашей ванной, но вы всё равно закрываете дверь. Это потому, что вы хотите приватности, а не секретности. **Каждому** есть что защищать. Приватность — это то, что делает вас человеком.
[:material-book-outline: Why Privacy Matters](basics/why-privacy-matters.md){ class="md-button md-button--primary" }
[:material-book-outline: Почему приватность имеет значение](basics/why-privacy-matters.md){ class="md-button md-button--primary" }
## И что же мне делать?

View File

@ -1,5 +1,5 @@
---
meta_title: "Tor Browser and Network: Anonymous Web Browsing - Privacy Guides"
meta_title: "Браузер и сеть Tor: Анонимный браузинг - Privacy Guides"
title: "Сеть Tor"
icon: simple/torproject
description: Защитите свой интернет-сёрфинг от посторонних глаз, используя сеть Tor - безопасную сеть, обходящую цензуру.
@ -23,7 +23,7 @@ schema:
url: "./"
---
![Tor logo](assets/img/self-contained-networks/tor.svg){ align=right }
![Логотип Tor](assets/img/self-contained-networks/tor.svg){ align=right }
Сеть **Tor** - это группа серверов, управляемых волонтёрами, которая позволяет вам бесплатно подключаться к сети и повышать уровень конфиденциальности и безопасности в интернете. Частные лица и организации также могут делиться информацией через сеть Tor с помощью "скрытых сервисов .onion" без ущерба для своей конфиденциальности. Поскольку трафик Tor сложно заблокировать и отследить, Tor является эффективным инструментом обхода цензуры.
@ -90,7 +90,7 @@ Tor работает, направляя ваш трафик через эти
- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599)
- [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
We previously recommended enabling the *Isolate Destination Address* preference in Orbot settings. Хотя эта настройка теоретически может улучшить конфиденциальность за счет принудительного использования отдельной схемы для каждого IP-адреса, к которому вы подключаетесь, она не дает практического преимущества для большинства приложений (особенно для просмотра веб-страниц), может сопровождаться значительным снижением производительности и увеличивает нагрузку на сеть Tor. Мы больше не рекомендуем изменять этот параметр по сравнению с его значением по умолчанию, если вы не уверены в том, что это необходимо.[^1]
Ранее мы рекомендовали включать *Изолировать адреса назначения* в настройках Orbot. Хотя эта настройка теоретически может улучшить конфиденциальность за счет принудительного использования отдельной схемы для каждого IP-адреса, к которому вы подключаетесь, она не дает практического преимущества для большинства приложений (особенно для просмотра веб-страниц), может сопровождаться значительным снижением производительности и увеличивает нагрузку на сеть Tor. Мы больше не рекомендуем изменять этот параметр по сравнению с его значением по умолчанию, если вы не уверены в том, что это необходимо.[^1]
!!! совет "Советы для Android"

View File

@ -18,7 +18,7 @@ Privacy Guides 預設的 [讀者群](https://www.plainlanguage.gov/guidelines/au
### 直接向人們講述
We're writing *for* a wide variety of people, but we are writing *to* the person who is actually reading it. 使用“您”直接稱呼讀者。
我們*為*各種各樣的人寫作,更是*寫給*真正閱讀的人。 使用“您”直接稱呼讀者。
> 使用“您”讓用戶覺得這些資訊與他們息息相關。
>
@ -41,13 +41,13 @@ We're writing *for* a wide variety of people, but we are writing *to* the person
### 以主題句開頭
> 如果告訴讀者他們會讀到什麼,他們不太可能再去閱讀整段文字。 標題有幫助,但還不夠。 Establish a context for your audience before you provide them with the details.
> 如果告訴讀者他們會讀到什麼,他們不太可能再去閱讀整段文字。 標題有幫助,但還不夠。 提供細節之前,先讓讀者了解情況脈絡。
>
> We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where youre going. Dont make readers hold a lot of information in their heads before getting to the point.
> 我們常按照自己的想法寫作,先是前提,然後結論。 這可能是發展思想的自然方式,以主題句作為以段落最後的結束。 把它放在前面,讓讀者知道要去哪裡。 進入正題之前,先別讓讀者腦子裝入過多資訊。
Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/)
出處: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/)
## Choose your words carefully
## 謹選擇用字
> 字字珠璣。 它們是書面和口頭溝通的最基本組成部分。 不要使用人們無法理解的行話、技術術語或縮寫來使事情變得複雜。
@ -55,33 +55,33 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/ha
> Kathy McGinty 提供了簡單而直接的句子:
>
> > There is no escaping the fact that it is considered very important to note that a number of various available applicable studies ipso facto have generally identified the fact that additional appropriate nocturnal employment could usually keep juvenile adolescents off thoroughfares during the night hours, including but not limited to the time prior to midnight on weeknights and/or 2 a.m. 週末期間。
> > 值得注意且無法迴避的事實是,許多研究已經普遍確定這個事實,即額外的適當夜間工作,指工作日午夜和/或凌晨 2 點之前的,通常可以使青少年在夜間遠離主幹道 週末期間。
>
> And the original, using stronger, simpler words:
> 原創,更強烈簡單的用字:
>
> > More night jobs would keep youths off the streets.
> > 更多的夜班工作會讓年輕人遠離街頭。
## 簡明扼要
> Unnecessary words waste your audiences time. Great writing is like a conversation. Omit information that the audience doesnt need to know. This can be difficult as a subject matter expert so its important to have someone look at the information from the audiences perspective.
> 沒必要的文字將會浪費大家的時間。 好的寫作就像生活對話。 減除讀者無須知道的資訊。 在意主題的專家不容易處理此事,所以若有審計者角度來看待資訊就很重要。
Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/)
來源: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/)
## 保持文字像在交談
> Verbs are the fuel of writing. They give your sentences power and direction. They enliven your writing and make it more interesting.
> 動詞是寫作的燃料。 它們賦予句子力量與方向。 它們使寫作更加生動有趣。
>
> Verbs tell your audience what to do. Make sure its clear who does what.
> 動詞可告訴觀眾要做什麼。 確保誰來做什麼很清楚。
### Use active voice
### 採主動語調
> Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.”
> 主動語調讓主詞與行動更為明確。 它可減少責任不清的情況 不用被動式,請用主動語氣。
Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/)
出處: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/)
### Use "must" for requirements
### "必須"表示要求 for requirements
> - “必須” 表示義務
> - “不必” 表示嚴禁
> - “may” for a discretionary action
> - “也許” 表示禮貌請求的行動
> - "應該"用於建議

View File

@ -10,7 +10,7 @@
*[CVE]: Common Vulnerabilities and Exposures
*[Цифровое наследие]: Цифровое наследие относится к функциям, которые позволяют вам предоставить другим людям доступ к вашим данным после вашей смерти
*[DNSSEC]: Domain Name System Security Extensions
*[DNS]: Domain Name System
*[DNS]: Система доменных имён (Domain Name System)
*[DoH]: DNS через HTTPS
*[DoQ]: DNS через QUIC
*[DoH3]: DNS через HTTP/3
@ -18,18 +18,18 @@
*[E2EE]: Сквозное шифрование
*[ECS]: EDNS Client Subnet
*[EEA]: European Economic Area
*[entropy]: A measurement of how unpredictable something is
*[энтропия]: A measurement of how unpredictable something is
*[EOL]: End-of-Life
*[Exif]: Exchangeable image file format
*[FCM]: Firebase Cloud Messaging
*[FDE]: Шифрование всего диска
*[FIDO]: Fast IDentity Online
*[форк]: Новое программное обеспечение, созданное путем модификации открытого кода существующего проекта
*[GDPR]: General Data Protection Regulation
*[GPG]: GNU Privacy Guard (PGP implementation)
*[GPS]: Global Positioning System
*[GDPR]: Общее положение о защите данных (General Data Protection Regulation)
*[GPG]: GNU Privacy Guard (реализация PGP)
*[GPS]: Глобальная система позиционирования (Global Positioning System)
*[GUI]: Графический пользовательский интерфейс
*[GnuPG]: GNU Privacy Guard (PGP implementation)
*[GnuPG]: GNU Privacy Guard (реализация PGP)
*[HDD]: Жесткий диск
*[HOTP]: HMAC (Hash-based Message Authentication Code) based One-Time Password
*[HTTPS]: Hypertext Transfer Protocol Secure
@ -40,13 +40,13 @@
*[IMEI]: International Mobile Equipment Identity
*[IMSI]: International Mobile Subscriber Identity
*[IP]: Internet Protocol
*[IPv4]: Internet Protocol version 4
*[IPv6]: Internet Protocol version 6
*[IPv4]: Интернет протокол версии 4 (Internet Protocol version 4)
*[IPv6]: Интернет протокол версии 6 (Internet Protocol version 6)
*[ISP]: Интернет-провайдер
*[ISPs]: Интернет-провайдеры
*[JNI]: Java Native Interface
*[KYC]: Know Your Customer
*[LUKS]: Linux Unified Key Setup (Full-Disk Encryption)
*[KYC]: Знай своего клиента (Know Your Customer)
*[LUKS]: Шифрование всего диска Linux (Linux Unified Key Setup)
*[MAC]: Media Access Control
*[MDAG]: Microsoft Defender Application Guard
*[MEID]: Mobile Equipment Identifier
@ -58,13 +58,13 @@
*[OEM]: Original Equipment Manufacturer
*[OEMs]: Original Equipment Manufacturers
*[OS]: Операционная система
*[OTP]: One-Time Password
*[OTPs]: One-Time Passwords
*[OpenPGP]: Open-source implementation of Pretty Good Privacy (PGP)
*[OTP]: Одноразовый пароль (One-Time Password)
*[OTPs]: Одноразовые пароли (One-Time Passwords)
*[OpenPGP]: Реализация PGP с открытым исходным кодом
*[P2P]: Peer-to-Peer
*[PAM]: Linux Pluggable Authentication Modules
*[POP3]: Post Office Protocol 3
*[PGP]: Pretty Good Privacy (see OpenPGP)
*[PGP]: Pretty Good Privacy (смотри OpenPGP)
*[ПД]: Персональные данные
*[QNAME]: Qualified Name
*[rolling release]: Updates which are released frequently rather than set intervals
@ -78,13 +78,13 @@
*[SSH]: Secure Shell
*[SUID]: Set Owner User ID
*[SaaS]: Программное обеспечение как услуга (облачное программное обеспечение)
*[SoC]: System on Chip
*[SoC]: Система на кристалле (System on Chip)
*[SSO]: Single sign-on
*[TCP]: Transmission Control Protocol
*[TEE]: Trusted Execution Environment
*[TLS]: Протокол защиты транспортного уровня
*[ToS]: Условия использования
*[TOTP]: Одноразовый пароль, основанный на времени
*[TOTP]: Одноразовый пароль, основанный на времени (Time-based One-Time Password)
*[TPM]: Trusted Platform Module
*[U2F]: Универсальный второй фактор
*[UEFI]: Unified Extensible Firmware Interface

View File

@ -1,8 +1,8 @@
*[2FA]: 雙因素驗證
*[ADB]: Android 偵錯橋接器
*[AOSP]: Android 開放原始碼計畫 (AOSP)
*[ATA]: Advanced Technology Attachment
*[attack surface]: The total number of possible entry points for unauthorized access to a system
*[ATA]: 高技術配置
*[attack surface]: 攻擊面,表示整個未經授權卻可存取訪問系統的潛在數量
*[AVB]: Android Verified Boot
*[cgroups]: 對照組
*[CLI]: 命令列介面
@ -24,12 +24,12 @@
*[FCM]: Firebase 雲消息
*[FDE]: 完整磁碟加密
*[FIDO]: 快速線上身份驗證(FIDO)
*[fork]: A new software project created by copying an existing project and adding to it independently
*[fork]: 從現有軟體專案複製再另外分隔出來的新獨立專案。
*[GDPR]: 一般資料保護法規
*[GPG]: GNU Privacy Guard (PGP implementation)
*[GPG]: GNU Privacy Guard (PGP 實行)
*[GPS]: 全球定位系統
*[GUI]: 圖形用戶界面
*[GnuPG]: GNU Privacy Guard (PGP implementation)
*[GnuPG]: GNU Privacy Guard (PGP 實行)
*[HDD]: 硬碟
*[HOTP]: 雜湊式訊息驗證碼(HMAC)基礎的單次密碼
*[HTTPS]: Hypertext Transfer Protocol Secure
@ -60,7 +60,7 @@
*[OS]: 作業系統
*[OTP]: 一次性密碼
*[OTPs]: 一次性密碼
*[OpenPGP]: Open-source implementation of Pretty Good Privacy (PGP)
*[OpenPGP]: 開源執行 Pretty Good Privacy (PGP)
*[P2P]: 點對點
*[PAM]: Linux 插入式驗證模組
*[POP3]: 郵件協議 3
@ -69,8 +69,8 @@
*[QNAME]: 限定名稱
*[rolling release]: 頻繁發布而不是設定間隔的更新
*[RSS]: 真正簡易新聞訂閱方式
*[SELinux]: Security-Enhanced Linux
*[SIM]: Subscriber Identity Module
*[SELinux]: 安全強化 Linux
*[SIM]: 用戶識別模組
*[SMS]: 短訊服務(標準短訊)
*[SMTP]: 簡易郵件傳輸通訊協定
*[SNI]: 伺服器名稱指示