mirror of
https://github.com/privacyguides/i18n.git
synced 2025-06-16 16:01:15 +00:00
New Crowdin translations by GitHub Action
This commit is contained in:
parent
197dd9da25
commit
e9481a1e8e
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: "Types of Communication Networks"
|
||||
title: "통신 네트워크 유형"
|
||||
icon: 'material/transit-connection-variant'
|
||||
description: An overview of several network architectures commonly used by instant messaging applications.
|
||||
---
|
||||
|
@ -4,7 +4,7 @@ icon: material/dns
|
||||
description: O Sistema de Nome de Domínio é a "agenda telefônica da internet", ajudando seu navegador a encontrar o site que ele está procurando.
|
||||
---
|
||||
|
||||
The [Domain Name System](https://en.wikipedia.org/wiki/Domain_Name_System) is the 'phonebook of the Internet'. DNS translates domain names to IP addresses so browsers and other services can load Internet resources, through a decentralized network of servers.
|
||||
The [Domain Name System](https://en.wikipedia.org/wiki/Domain_Name_System) is the 'phonebook of the Internet'. O DNS converte nomes de domínio em endereços IP para que os navegadores e outros serviços possam carregar recursos da Internet, através de uma rede descentralizada de servidores.
|
||||
|
||||
## O que é DNS?
|
||||
|
||||
|
@ -1,10 +1,10 @@
|
||||
---
|
||||
title: "Tor Overview"
|
||||
icon: 'simple/torproject'
|
||||
description: Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible.
|
||||
description: Tor é uma rede descentralizada de uso gratuito, projetada para usar a Internet com o máximo de privacidade possível.
|
||||
---
|
||||
|
||||
Tor is a free to use, decentralized network designed for using the internet with as much privacy as possible. If used properly, the network enables private and anonymous browsing and communications.
|
||||
Tor é uma rede descentralizada de uso gratuito, projetada para usar a Internet com o máximo de privacidade possível. Se usada corretamente, a rede permite navegação e comunicações privadas e anônimas.
|
||||
|
||||
## Path Building to Clearnet Services
|
||||
|
||||
@ -18,29 +18,29 @@ Every time you [connect to Tor](../tor.md), it will choose three nodes to build
|
||||
<figcaption>Tor circuit pathway</figcaption>
|
||||
</figure>
|
||||
|
||||
Each of these nodes has its own function:
|
||||
Cada um desses nós tem sua própria função:
|
||||
|
||||
### The Entry Node
|
||||
### O Nó de Entrada
|
||||
|
||||
The entry node, often called the guard node, is the first node to which your Tor client connects. The entry node is able to see your IP address, however it is unable to see what you are connecting to.
|
||||
O nó de entrada, geralmente chamado de nó de guarda, é o primeiro nó ao qual seu cliente Tor se conecta. O nó de entrada consegue ver seu endereço IP, mas não consegue ver a que você está se conectando.
|
||||
|
||||
Unlike the other nodes, the Tor client will randomly select an entry node and stick with it for two to three months to protect you from certain attacks.[^1]
|
||||
Diferente dos outros nós, o cliente Tor selecionará aleatoriamente um nó de entrada e permanecerá com ele por dois ou três meses para proteger você de determinados ataques.[^1]
|
||||
|
||||
### The Middle Node
|
||||
### O Nó Intermediário
|
||||
|
||||
The middle node is the second node to which your Tor client connects. It can see which node the traffic came from—the entry node—and to which node it goes to next. The middle node cannot, see your IP address or the domain you are connecting to.
|
||||
O nó intermediário é o segundo nó ao qual seu cliente Tor se conecta. Ele pode ver de qual nó o tráfego veio — o nó de entrada — e para qual nó ele vai em seguida. O nó intermediário não pode ver seu endereço IP ou o domínio ao qual você está se conectando.
|
||||
|
||||
For each new circuit, the middle node is randomly selected out of all available Tor nodes.
|
||||
Para cada novo circuito, o nó intermediário é selecionado aleatoriamente entre todos os nós Tor disponíveis.
|
||||
|
||||
### The Exit Node
|
||||
### O Nó de Saída
|
||||
|
||||
The exit node is the point in which your web traffic leaves the Tor network and is forwarded to your desired destination. The exit node is unable to see your IP address, but it does know what site it's connecting to.
|
||||
O nó de saída é o ponto em que seu tráfego de internet deixa a rede Tor e é encaminhado para o destino que você deseja. O nó de saída não consegue ver seu endereço IP, mas sabe a que site você está se conectando.
|
||||
|
||||
The exit node will be chosen at random from all available Tor nodes ran with an exit relay flag.[^2]
|
||||
O nó de saída será escolhido aleatoriamente entre todos os nós Tor disponíveis executados com um identificador de retransmissão de saída.[^2]
|
||||
|
||||
## Path Building to Onion Services
|
||||
|
||||
"Onion Services" (also commonly referred to as "hidden services") are websites which can only be accessed by the Tor browser. These websites have a long randomly generated domain name ending with `.onion`.
|
||||
"Serviços Onion" (também conhecidos como "serviços ocultos") são sites que só podem ser acessados pelo Navegador Tor. Esses sites têm um nome de domínio longo, gerado aleatoriamente, que termina com `.onion`.
|
||||
|
||||
Connecting to an Onion Service in Tor works very similarly to connecting to a clearnet service, but your traffic is routed through a total of **six** nodes before reaching the destination server. Just like before however, only three of these nodes are contributing to *your* anonymity, the other three nodes protect *the Onion Service's* anonymity, hiding the website's true IP and location in the same manner that Tor Browser is hiding yours.
|
||||
|
||||
@ -52,7 +52,7 @@ Connecting to an Onion Service in Tor works very similarly to connecting to a cl
|
||||
|
||||
## Encryption
|
||||
|
||||
Tor encrypts each packet (a block of transmitted data) three times with the keys from the exit, middle, and entry node—in that order.
|
||||
Tor criptografa cada pacote (um bloco de dados transmitidos) três vezes com as chaves do nó de saída, do nó intermediário e do nó de entrada — nessa ordem.
|
||||
|
||||
Once Tor has built a circuit, data transmission is done as follows:
|
||||
|
||||
|
@ -160,9 +160,9 @@ Tenha muito **cuidado** ao comprar celulares usados nas lojas online. Sempre ver
|
||||
|
||||
Mais algumas dicas sobre os aparelhos Android e a compatibilidade do sistema operacional:
|
||||
|
||||
- Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer.
|
||||
- Não compre dispositivos que tenham atingido ou estejam próximos do fim de sua vida útil; atualizações adicionais de firmware devem ser fornecidas pelo fabricante.
|
||||
- Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with.
|
||||
- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details!
|
||||
- Em resumo, se um dispositivo ou distribuição Android não estiver listado aqui, provavelmente há um bom motivo. Confira nosso [fórum](https://discuss.privacyguides.net/) para encontrar detalhes!
|
||||
|
||||
### Google Pixel
|
||||
|
||||
@ -309,7 +309,7 @@ GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Ap
|
||||
|
||||
### Aurora Store
|
||||
|
||||
The Google Play Store requires a Google account to login which is not great for privacy. You can get around this by using an alternative client, such as Aurora Store.
|
||||
A Google Play Store exige uma conta do Google para fazer login, o que não é muito bom para a privacidade. Você pode contornar esse problema usando um cliente alternativo, como o Aurora Store.
|
||||
|
||||
!!! recommendation
|
||||
|
||||
@ -324,9 +324,9 @@ The Google Play Store requires a Google account to login which is not great for
|
||||
|
||||
- [:simple-gitlab: GitLab](https://gitlab.com/AuroraOSS/AuroraStore/-/releases)
|
||||
|
||||
Aurora Store does not allow you to download paid apps with their anonymous account feature. You can optionally log in with your Google account with Aurora Store to download apps you have purchased, which does give access to the list of apps you've installed to Google, however you still benefit from not requiring the full Google Play client and Google Play Services or microG on your device.
|
||||
Aurora Store não permite que você baixe aplicativos pagos com o recurso de conta anônima. Opcionalmente, você pode fazer login com sua conta do Google na Aurora Store para baixar os aplicativos que comprou, o que dá acesso à lista de aplicativos que você instalou para o Google, mas você ainda se beneficia por não precisar do cliente completo do Google Play e do Google Play Services ou do microG no seu dispositivo.
|
||||
|
||||
### Manually with RSS Notifications
|
||||
### Manualmente com Notificações RSS
|
||||
|
||||
For apps that are released on platforms like GitHub and GitLab, you may be able to add an RSS feed to your [news aggregator](/news-aggregators) that will help you keep track of new releases.
|
||||
|
||||
@ -344,15 +344,15 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate
|
||||
|
||||
`https://gitlab.com/AuroraOSS/AuroraStore/-/tags?format=atom`
|
||||
|
||||
#### Verifying APK Fingerprints
|
||||
#### Verificando as Impressões Digitais do APK
|
||||
|
||||
If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools).
|
||||
|
||||
1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/).
|
||||
1. Instale o [Java JDK](https://www.oracle.com/java/technologies/downloads/).
|
||||
|
||||
2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools).
|
||||
|
||||
3. Extract the downloaded archive:
|
||||
3. Extrair o arquivo baixado:
|
||||
|
||||
```bash
|
||||
unzip commandlinetools-*.zip
|
||||
@ -360,7 +360,7 @@ If you download APK files to install manually, you can verify their signature wi
|
||||
./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3"
|
||||
```
|
||||
|
||||
4. Run the signature verification command:
|
||||
4. Execute o comando de verificação de assinatura:
|
||||
|
||||
```bash
|
||||
./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk
|
||||
@ -381,9 +381,9 @@ If you download APK files to install manually, you can verify their signature wi
|
||||
|
||||
==We do **not** currently recommend F-Droid as a way to obtain apps.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are [notable problems](https://privsec.dev/posts/android/f-droid-security-issues/) with the official F-Droid client, their quality control, and how they build, sign, and deliver packages.
|
||||
|
||||
Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust.
|
||||
Devido ao seu processo de criação de aplicativos, os aplicativos no repositório oficial do F-Droid geralmente ficam para trás nas atualizações. Os mantenedores do F-Droid também reutilizam IDs de pacotes ao assinar aplicativos com suas próprias chaves, o que não é ideal, pois dá à equipe do F-Droid a confiança máxima.
|
||||
|
||||
Other popular third-party repositories such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that respository when they make it to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates.
|
||||
Other popular third-party repositories such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. O repositório IzzyOnDroid extrai as compilações diretamente do GitHub e é a melhor opção em relação aos repositórios dos próprios desenvolvedores. However, it is not something that we can recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that respository when they make it to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates.
|
||||
|
||||
That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through Play Store, Aurora Store, or by getting the APK directly from the developer. It is important to keep in mind that some apps in these repositories have not been updated in years and may rely on unsupported libraries, among other things, posing a potential security risk. You should use your best judgement when looking for new apps via this method.
|
||||
|
||||
|
@ -5,7 +5,7 @@ description: Calendars contain some of your most sensitive data; use products th
|
||||
cover: calendar.png
|
||||
---
|
||||
|
||||
Calendars contain some of your most sensitive data; use products that implement E2EE at rest to prevent a provider from reading them.
|
||||
Os calendários contêm alguns de seus dados mais confidenciais; use produtos que implementem E2EE em repouso para impedir que um provedor os leia.
|
||||
|
||||
## Tutanota
|
||||
|
||||
@ -16,7 +16,7 @@ Calendars contain some of your most sensitive data; use products that implement
|
||||
|
||||
**Tutanota** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tutanota.com/calendar-app-comparison/).
|
||||
|
||||
Multiple calendars and extended sharing functionality is limited to paid subscribers.
|
||||
A funcionalidade de múltiplos calendários e compartilhamento adicional é limitada a assinantes pagos.
|
||||
|
||||
[:octicons-home-16: Homepage](https://tutanota.com/calendar){ .md-button .md-button--primary }
|
||||
[:octicons-eye-16:](https://tutanota.com/privacy){ .card-link title="Privacy Policy" }
|
||||
@ -64,8 +64,8 @@ Calendars contain some of your most sensitive data; use products that implement
|
||||
|
||||
- Must sync and store information with E2EE to ensure data is not visible to the service provider.
|
||||
|
||||
### Best-Case
|
||||
### Melhor Caso
|
||||
|
||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
|
||||
- Should integrate with native OS calendar and contact management apps if applicable.
|
||||
|
@ -87,9 +87,9 @@ They have also received the Digital Trust Label, a certification from the [Swiss
|
||||
- Must allow for easy exports of all files/documents.
|
||||
- Must use standard, audited encryption.
|
||||
|
||||
### Best-Case
|
||||
### Melhor Caso
|
||||
|
||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
|
||||
- Clients should be open-source.
|
||||
- Clients should be audited in their entirety by an independent third-party.
|
||||
|
@ -230,9 +230,9 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f
|
||||
- Must not collect telemetry, or have an easy way to disable all telemetry.
|
||||
- Must support OpenPGP message encryption.
|
||||
|
||||
### Best-Case
|
||||
### Melhor Caso
|
||||
|
||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
|
||||
- Should be open-source.
|
||||
- Should be cross-platform.
|
||||
|
@ -350,9 +350,9 @@ When encrypting with PGP, you have the option to configure different options in
|
||||
- External disk encryption apps must support decryption on Linux, macOS, and Windows.
|
||||
- Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively.
|
||||
|
||||
### Best-Case
|
||||
### Melhor Caso
|
||||
|
||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
|
||||
- Operating System (FDE) encryption apps should utilize hardware security such as a TPM or Secure Enclave.
|
||||
- File encryption apps should have first- or third-party support for mobile platforms.
|
||||
|
@ -140,9 +140,9 @@ ffsend upload --host https://send.vis.ee/ FILE
|
||||
- Must be open-source software.
|
||||
- Deve ter aplicativos para Linux, macOS e Windows ou ter uma interface via site.
|
||||
|
||||
#### Best-Case
|
||||
#### Melhor Caso
|
||||
|
||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
|
||||
- Has mobile clients for iOS and Android, which at least support document previews.
|
||||
- Supports photo backup from iOS and Android, and optionally supports file/folder sync on Android.
|
||||
|
@ -75,9 +75,9 @@ Nitrokey's firmware is open-source, unlike the YubiKey. The firmware on modern N
|
||||
- Must not allow private key extraction.
|
||||
- Devices which cost over $35 must support handling OpenPGP and S/MIME.
|
||||
|
||||
#### Best-Case
|
||||
#### Melhor Caso
|
||||
|
||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
|
||||
- Should be available in USB-C form-factor.
|
||||
- Should be available with NFC.
|
||||
|
@ -1,14 +1,14 @@
|
||||
---
|
||||
meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
|
||||
meta_title: "Os Melhores Gerenciadores de Senhas para Proteger sua Privacidade e Segurança — Privacy Guides"
|
||||
title: "Gerenciadores de Senhas"
|
||||
icon: material/form-textbox-password
|
||||
description: Password managers allow you to securely store and manage passwords and other credentials.
|
||||
description: Gerenciadores de senhas permitem que você armazene e gerencie com segurança senhas e outras credenciais.
|
||||
cover: passwords.png
|
||||
schema:
|
||||
-
|
||||
"@context": http://schema.org
|
||||
"@type": WebPage
|
||||
name: Password Manager Recommendations
|
||||
name: Gerenciadores de Senhas Recomendados
|
||||
url: "./"
|
||||
-
|
||||
"@context": http://schema.org
|
||||
@ -118,19 +118,19 @@ schema:
|
||||
url: "./"
|
||||
---
|
||||
|
||||
Password managers allow you to securely store and manage passwords and other credentials with the use of a master password.
|
||||
Os gerenciadores de senhas permitem que você armazene e gerencie com segurança senhas e outras credenciais com o uso de uma senha mestra.
|
||||
|
||||
[Introduction to Passwords :material-arrow-right-drop-circle:](./basics/passwords-overview.md)
|
||||
[Introdução às Senhas :material-arrow-right-drop-circle:](./basics/passwords-overview.md)
|
||||
|
||||
!!! info
|
||||
|
||||
Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have.
|
||||
Gerenciadores de senhas que vêm de fábrica em aplicativos como navegadores e sistemas operacionais às vezes não são tão bons quanto um aplicativo exclusivo para gerenciamento de senhas. A vantagem de um gerenciador de senhas interno é a boa integração com o programa, mas, em geral, ele pode ser muito simples e não ter os recursos de privacidade e segurança que as ofertas autônomas têm.
|
||||
|
||||
For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default.
|
||||
Por exemplo, o gerenciador de senhas do Microsoft Edge não oferece em absoluto o E2EE. O gerenciador de senhas do Google tem [optional](https://support.google.com/accounts/answer/11350823) E2EE, e [Apple's](https://support.apple.com/en-us/HT202303) oferece E2EE por padrão.
|
||||
|
||||
## Cloud-based
|
||||
## Baseado na nuvem
|
||||
|
||||
These password managers sync your passwords to a cloud server for easy accessibility from all your devices and safety against device loss.
|
||||
Esses gerenciadores de senhas sincronizam suas senhas com um servidor em nuvem para facilitar o acesso a partir de todos os seus dispositivos e proteger contra a perda de dispositivos.
|
||||
|
||||
### Bitwarden
|
||||
|
||||
@ -163,7 +163,7 @@ You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#co
|
||||
|
||||
Bitwarden's server-side code is [open-source](https://github.com/bitwarden/server), so if you don't want to use the Bitwarden cloud, you can easily host your own Bitwarden sync server.
|
||||
|
||||
**Vaultwarden** is an alternative implementation of Bitwarden's sync server written in Rust and compatible with official Bitwarden clients, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal. If you are looking to self-host Bitwarden on your own server, you almost certainly want to use Vaultwarden over Bitwarden's official server code.
|
||||
**Vaultwarden** é uma implementação alternativa do servidor de sincronização do Bitwarden, escrito em Rust e compatível com os clientes oficiais do Bitwarden, perfeito para a implementação auto-hospedada em que a execução do serviço oficial com muitos recursos pode não ser ideal. Se você deseja hospedar o Bitwarden em seu próprio servidor, é quase certo que queira usar o Vaultwarden em vez do código de servidor oficial do Bitwarden.
|
||||
|
||||
[:octicons-repo-16: Vaultwarden Repository](https://github.com/dani-garcia/vaultwarden ""){.md-button} [:octicons-info-16:](https://github.com/dani-garcia/vaultwarden/wiki){ .card-link title=Documentation}
|
||||
[:octicons-code-16:](https://github.com/dani-garcia/vaultwarden){ .card-link title="Source Code" }
|
||||
@ -189,11 +189,11 @@ Bitwarden's server-side code is [open-source](https://github.com/bitwarden/serve
|
||||
- [:simple-apple: macOS](https://1password.com/downloads/mac/)
|
||||
- [:simple-linux: Linux](https://1password.com/downloads/linux/)
|
||||
|
||||
Traditionally, **1Password** has offered the best password manager user experience for people using macOS and iOS; however, it has now achieved feature-parity across all platforms. It boasts many features geared towards families and less technical people, as well as advanced functionality.
|
||||
Tradicionalmente, o **1Password** oferece a melhor experiência de usuário de gerenciador de senhas para pessoas que usam macOS e iOS; no entanto, agora ele atingiu a igualdade de recursos em todas as plataformas. Ele apresenta muitos recursos voltados para famílias e pessoas menos técnicas, bem como funcionalidades avançadas.
|
||||
|
||||
Your 1Password vault is secured with both your master password and a randomized 34-character security key to encrypt your data on their servers. This security key adds a layer of protection to your data because your data is secured with high entropy regardless of your master password. Many other password manager solutions are entirely reliant on the strength of your master password to secure your data.
|
||||
Seu cofre do 1Password é protegido com sua senha mestra e uma chave de segurança aleatória de 34 caracteres para criptografar seus dados nos servidores. Essa chave de segurança adiciona uma camada de proteção aos seus dados porque eles são protegidos com alta entropia, independentemente da sua senha mestra. Muitas outras soluções de gerenciador de senhas dependem totalmente da força de sua senha mestra para proteger seus dados.
|
||||
|
||||
One advantage 1Password has over Bitwarden is its first-class support for native clients. While Bitwarden relegates many duties, especially account management features, to their web vault interface, 1Password makes nearly every feature available within its native mobile or desktop clients. 1Password's clients also have a more intuitive UI, which makes them easier to use and navigate.
|
||||
Uma vantagem do 1Password sobre o Bitwarden é seu suporte de primeira classe dos clientes nativos. Enquanto o Bitwarden reserva muitas funções, especialmente os recursos de gerenciamento de contas, para sua interface de cofre do site, o 1Password disponibiliza quase todos os recursos em seus clientes nativos para celular ou desktop. Os clientes do 1Password também têm uma interface de usuário mais intuitiva, o que os torna mais fáceis de usar e navegar.
|
||||
|
||||
### Psono
|
||||
|
||||
@ -216,7 +216,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native
|
||||
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo)
|
||||
- [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client)
|
||||
|
||||
Psono provides extensive documentation for their product. The web-client for Psono can be self-hosted; alternatively, you can choose the full Community Edition or the Enterprise Edition with additional features.
|
||||
Psono fornece uma extensa documentação para seu produto. The web-client for Psono can be self-hosted; alternatively, you can choose the full Community Edition or the Enterprise Edition with additional features.
|
||||
|
||||
### Criteria
|
||||
|
||||
@ -229,14 +229,14 @@ Psono provides extensive documentation for their product. The web-client for Pso
|
||||
#### Minimum Requirements
|
||||
|
||||
- Must utilize strong, standards-based/modern E2EE.
|
||||
- Must have thoroughly documented encryption and security practices.
|
||||
- Must have a published audit from a reputable, independent third-party.
|
||||
- All non-essential telemetry must be optional.
|
||||
- Must not collect more PII than is necessary for billing purposes.
|
||||
- Deve ter práticas de criptografia e segurança totalmente documentadas.
|
||||
- Deve ter uma auditoria publicada por um terceiro independente e de boa reputação.
|
||||
- Toda telemetria não essencial deve ser opcional.
|
||||
- Não deve coletar mais PII (dados pessoais identificáveis) do que o necessário para fins de faturamento.
|
||||
|
||||
#### Best-Case
|
||||
#### Melhor Caso
|
||||
|
||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
|
||||
- Telemetry should be opt-in (disabled by default) or not collected at all.
|
||||
- Should be open-source and reasonably self-hostable.
|
||||
|
@ -68,9 +68,9 @@ In general, we define collaboration platforms as full-fledged suites which could
|
||||
- Supports real-time document collaboration.
|
||||
- Supports exporting documents to standard document formats (e.g. ODF).
|
||||
|
||||
#### Best-Case
|
||||
#### Melhor Caso
|
||||
|
||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
|
||||
- Should store files in a conventional filesystem.
|
||||
- Should support TOTP or FIDO2 multi-factor authentication support, or Passkey logins.
|
||||
|
@ -185,9 +185,9 @@ Session has a [whitepaper](https://arxiv.org/pdf/2002.04609.pdf) describing the
|
||||
- Must support E2EE for all messages.
|
||||
- Must have been independently audited.
|
||||
|
||||
### Best-Case
|
||||
### Melhor Caso
|
||||
|
||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
|
||||
- Should have Perfect Forward Secrecy.
|
||||
- Should have open-source servers.
|
||||
|
@ -102,9 +102,9 @@ Startpage's majority shareholder is System1 who is an adtech company. We don't b
|
||||
- Must not collect personally identifiable information per their privacy policy.
|
||||
- Must not allow users to create an account with them.
|
||||
|
||||
### Best-Case
|
||||
### Melhor Caso
|
||||
|
||||
Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
Nosso critério de melhor caso representa o que gostaríamos de ver em um projeto perfeito nessa categoria. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
|
||||
|
||||
- Should be based on open-source software.
|
||||
- Should not block Tor exit node IP addresses.
|
||||
|
Loading…
x
Reference in New Issue
Block a user