diff --git a/i18n/ar/basics/why-privacy-matters.md b/i18n/ar/basics/why-privacy-matters.md
index 77af392d..528202bb 100644
--- a/i18n/ar/basics/why-privacy-matters.md
+++ b/i18n/ar/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/ar/tools.md b/i18n/ar/tools.md
index a24923d5..af9bee18 100644
--- a/i18n/ar/tools.md
+++ b/i18n/ar/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/bn/basics/why-privacy-matters.md b/i18n/bn/basics/why-privacy-matters.md
index eddecc9e..69a3ae4f 100644
--- a/i18n/bn/basics/why-privacy-matters.md
+++ b/i18n/bn/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/bn/tools.md b/i18n/bn/tools.md
index a24923d5..af9bee18 100644
--- a/i18n/bn/tools.md
+++ b/i18n/bn/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/cs/basics/why-privacy-matters.md b/i18n/cs/basics/why-privacy-matters.md
index 9dbe9d89..eddddab4 100644
--- a/i18n/cs/basics/why-privacy-matters.md
+++ b/i18n/cs/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/cs/tools.md b/i18n/cs/tools.md
index a24923d5..af9bee18 100644
--- a/i18n/cs/tools.md
+++ b/i18n/cs/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/de/basics/why-privacy-matters.md b/i18n/de/basics/why-privacy-matters.md
index 9a867c85..a045b9c1 100644
--- a/i18n/de/basics/why-privacy-matters.md
+++ b/i18n/de/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/de/tools.md b/i18n/de/tools.md
index c11945ef..ad0de7d6 100644
--- a/i18n/de/tools.md
+++ b/i18n/de/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/el/basics/why-privacy-matters.md b/i18n/el/basics/why-privacy-matters.md
index 5b4b8285..be54357a 100644
--- a/i18n/el/basics/why-privacy-matters.md
+++ b/i18n/el/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/el/tools.md b/i18n/el/tools.md
index 5be152b2..7b2a1833 100644
--- a/i18n/el/tools.md
+++ b/i18n/el/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/eo/basics/why-privacy-matters.md b/i18n/eo/basics/why-privacy-matters.md
index eddecc9e..69a3ae4f 100644
--- a/i18n/eo/basics/why-privacy-matters.md
+++ b/i18n/eo/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/eo/tools.md b/i18n/eo/tools.md
index a24923d5..af9bee18 100644
--- a/i18n/eo/tools.md
+++ b/i18n/eo/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/es/basics/why-privacy-matters.md b/i18n/es/basics/why-privacy-matters.md
index b8b1e912..5b618c56 100644
--- a/i18n/es/basics/why-privacy-matters.md
+++ b/i18n/es/basics/why-privacy-matters.md
@@ -19,20 +19,20 @@ Mucha gente confunde los conceptos de **privacidad**, **seguridad**, y **anonima
**Seguridad**
:
-Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates.
+La seguridad es la capacidad de confiar en las aplicaciones que utilizas -que las partes implicadas sean quienes dicen ser- y mantenerlas seguras. En el contexto de la navegación por Internet, por ejemplo, la seguridad puede ser proporcionada por certificados HTTPS.
:
-Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website.
+Los certificados demuestran que estás hablando directamente con el sitio web que visitas y evitan que los atacantes de su ted lean o modifiquen los datos enviados al sitio web o desde él.
**Anonimato**
:
-Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own.
+El anonimato es la capacidad de actuar sin un identificador persistente. Puedes conseguirlo en línea con [Tor](../tor.md), que te permite navegar por Internet con una dirección IP y una conexión de red aleatorias en lugar de las tuyas propias.
:
-**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
+El **seudonimato** es un concepto similar, pero te permite tener un identificador persistente sin que esté vinculado a tu identidad real. Si todo el mundo te conoce como `@GamerGuy12` en línea, pero nadie conoce tu nombre real, ese es tu seudónimo.
-Todos estos conceptos se solapan, pero es posible tener cualquier combinación de ellos. Para la mayoría de la gente, el punto óptimo es cuando estos tres conceptos se solapan. Sin embargo, es más difícil de conseguir de lo que muchos creen en un principio. A veces hay que hacer concesiones en algunos aspectos, y eso también está bien. Aquí es donde entra en juego el **modelado de amenazas**, que te permite tomar buenas decisiones sobre [el software y los servicios](../tools.md) que utilizas.
+Todos estos conceptos se solapan, pero es posible tener cualquier combinación de ellos. Para la mayoría de la gente, el punto óptimo es cuando estos tres conceptos se solapan. Sin embargo, es más difícil de conseguirlo de lo que muchos creen en un principio. A veces hay que hacer concesiones en algunos aspectos, y eso también está bien. Aquí es donde entra en juego el **modelado de amenazas**, que te permite tomar buenas decisiones sobre [el software y los servicios](../tools.md) que utilizas.
[:material-book-outline: Aprende más sobre el modelado de amenazas](threat-modeling.md ""){.md-button}
diff --git a/i18n/es/notebooks.md b/i18n/es/notebooks.md
index cb08565d..88c5c896 100644
--- a/i18n/es/notebooks.md
+++ b/i18n/es/notebooks.md
@@ -41,15 +41,15 @@ Si actualmente utilizas una aplicación como Evernote, Google Keep o Microsoft O
{ align=right }
- **Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/).
+ **Notesnook** es una aplicación de código abierto y gratuita para tomar notas (como en el habla) centrada en la privacidad del usuario y en la facilidad de uso. Ofrece cifrado de extremo a extremo en todas las plataformas con una potente sincronización para tomar tus notas sobre la marcha. Puedes importar fácilmente tus notas desde Evernote, OneNote y muchas otras aplicaciones utilizando su [importador oficial](https://importer.notesnook.com/).
- [:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary }
- [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" }
- [:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation}
- [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" }
- [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute }
+ [:octicons-home-16: Página Principal](https://notesnook.com/){ .md-button .md-button--primary }
+ [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Politica de Privacidad" }
+ [:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentación}
+ [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Código Fuente" }
+ [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribuir }
- ??? downloads
+ ??? descargas
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook)
- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013)
@@ -60,7 +60,7 @@ Si actualmente utilizas una aplicación como Evernote, Google Keep o Microsoft O
- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/)
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
-Notesnook does not support password/PIN protection on the web & desktop apps. However, you can still lock individual notes, and your data is always encrypted in transit and on your device using your master key.
+Notesnook no soporta la protección por contraseña/PIN en la web ni en las aplicaciones de escritorio. Sin embargo, puedes bloquear notas individuales, y tus datos siempre están encriptados en tránsito y en tu dispositivo utilizando tu clave maestra.
### Joplin
@@ -113,7 +113,7 @@ Cryptee ofrece 100MB de almacenamiento gratuito, con opciones de pago si necesit
### Org-mode
-!!! recommendation
+!!! recomendación
{ align=right }
diff --git a/i18n/es/tools.md b/i18n/es/tools.md
index aa5965ad..934142d4 100644
--- a/i18n/es/tools.md
+++ b/i18n/es/tools.md
@@ -301,8 +301,8 @@ Para obtener más información sobre cada proyecto, por qué han sido elegidos y
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Autohosteable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Autoalojable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/es/vpn.md b/i18n/es/vpn.md
index 53ee2832..39a59aa7 100644
--- a/i18n/es/vpn.md
+++ b/i18n/es/vpn.md
@@ -219,7 +219,7 @@ Proton VPN [recomienda](https://protonvpn.com/blog/wireguard/) el uso de WireGua
#### :material-alert-outline:{ .pg-orange } Reenvío Remoto de Puertos
-Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively.
+Actualmente, Proton VPN solo admite el [ reenvío del puerto](https://protonvpn.com/support/port-forwarding/) remoto y efímero a través de NAT-PMP, con tiempos de arrendamiento de 60 segundos. La aplicación de Windows ofrece una opción de fácil acceso para ello, mientras que en otros sistemas operativos tendrás que ejecutar tu propio cliente [NAT-PMP](https://protonvpn.com/support/port-forwarding-manual-setup/). Las aplicaciones de torrents suelen soportar NAT-PMP de forma nativa.
#### :material-check:{ .pg-green } Clientes Móviles
diff --git a/i18n/fa/basics/why-privacy-matters.md b/i18n/fa/basics/why-privacy-matters.md
index eddecc9e..69a3ae4f 100644
--- a/i18n/fa/basics/why-privacy-matters.md
+++ b/i18n/fa/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/fa/tools.md b/i18n/fa/tools.md
index a24923d5..af9bee18 100644
--- a/i18n/fa/tools.md
+++ b/i18n/fa/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/fr/basics/why-privacy-matters.md b/i18n/fr/basics/why-privacy-matters.md
index b3781a2b..26e55250 100644
--- a/i18n/fr/basics/why-privacy-matters.md
+++ b/i18n/fr/basics/why-privacy-matters.md
@@ -19,20 +19,20 @@ De nombreuses personnes confondent les concepts de **vie privée**, **sécurité
**Sécurité**
:
-Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates.
+La sécurité est la capacité à faire confiance aux applications que vous utilisez, à savoir que les parties impliquées sont bien celles qu'elles prétendent être, et à garder ces applications sécurisés. Dans le contexte de la navigation sur le web, par exemple, la sécurité peut être assurée par des certificats HTTPS.
:
-Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website.
+Les certificats prouvent que vous communiquez directement avec le site web que vous visitez et empêchent les attaquants sur votre réseau de lire ou de modifier les données envoyées vers ou depuis le site web.
**Anonymat**
:
-Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own.
+L'anonymat est la capacité d'agir sans identifiant permanent. Vous pouvez y parvenir en ligne avec [Tor](../tor.md), qui vous permet de naviguer sur internet avec une adresse IP et une connexion réseau aléatoires au lieu de la vôtre.
:
-**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
+Le **pseudonymat** est un concept similaire, mais il vous permet d'avoir un identifiant persistant sans qu'il soit lié à votre identité réelle. Si tout le monde vous connaît sous le nom de `@KevinDu59` en ligne, mais que personne ne connaît votre vrai nom, c'est votre pseudonyme.
-Tous ces concepts se chevauchent, mais il est possible de les combiner. Pour la plupart des gens, l'idéal est que ces trois concepts se chevauchent. Cependant, il est plus difficile d'y parvenir que beaucoup ne le croient au premier abord. Parfois, il faut faire des compromis sur certains points, et c'est très bien ainsi. C'est là que la **modélisation des menaces** entre en jeu, vous permettant de prendre des décisions éclairées sur [les logiciels et les services](../tools.md) que vous utilisez.
+Tous ces concepts se chevauchent, mais il est possible de les combiner. Pour la plupart des gens, l'idéal est quand ces trois concepts se chevauchent. Cependant, il est plus difficile d'y parvenir que beaucoup ne le croient au premier abord. Parfois, il faut faire des compromis sur certains points, et c'est très bien ainsi. C'est là que la **modélisation des menaces** entre en jeu, vous permettant de prendre des décisions éclairées sur [les logiciels et les services](../tools.md) que vous utilisez.
[:material-book-outline: En savoir plus sur la modélisation des menaces](threat-modeling.md ""){.md-button}
diff --git a/i18n/fr/notebooks.md b/i18n/fr/notebooks.md
index bb228ffd..db36e1f2 100644
--- a/i18n/fr/notebooks.md
+++ b/i18n/fr/notebooks.md
@@ -39,17 +39,17 @@ Si vous utilisez actuellement une application comme Evernote, Google Keep, ou Mi
!!! recommendation
- { align=right }
+ { align=right }
- **Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/).
+ **Notesnook** est une application de prise de notes libre & open-source axée sur la confidentialité de l'utilisateur & la facilité d'utilisation. Elle propose un chiffrement de bout en bout sur toutes les plateformes et une synchronisation puissante pour prendre vos notes en déplacement. Vous pouvez facilement importer vos notes depuis Evernote, OneNote & bien d'autres applications en utilisant leur [importateur officiel](https://importer.notesnook.com/).
- [:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary }
- [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" }
+ [:octicons-home-16: Page d'accueil](https://notesnook.com/){ .md-button .md-button--primary }
+ [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Politique de confidentialité" }
[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation}
- [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" }
- [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute }
+ [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Code source" }
+ [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribuer }
- ??? downloads
+ ??? downloads "Téléchargements"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook)
- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013)
@@ -60,7 +60,7 @@ Si vous utilisez actuellement une application comme Evernote, Google Keep, ou Mi
- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/)
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
-Notesnook does not support password/PIN protection on the web & desktop apps. However, you can still lock individual notes, and your data is always encrypted in transit and on your device using your master key.
+Notesnook ne prend pas en charge la protection par mot de passe/PIN sur les applications web & bureau. Cependant, vous pouvez toujours verrouiller des notes individuelles, et vos données sont toujours chiffrées en transit et sur votre appareil à l'aide de votre clé principale.
### Joplin
diff --git a/i18n/fr/tools.md b/i18n/fr/tools.md
index 7a541b8d..ed92f5fa 100644
--- a/i18n/fr/tools.md
+++ b/i18n/fr/tools.md
@@ -301,8 +301,8 @@ Nous [recommandons](dns.md#recommended-providers) un certain nombre de serveurs
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (auto-hébergeable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
@@ -357,11 +357,11 @@ Nous [recommandons](dns.md#recommended-providers) un certain nombre de serveurs
diff --git a/i18n/he/basics/why-privacy-matters.md b/i18n/he/basics/why-privacy-matters.md
index 6a4ef165..ffe60672 100644
--- a/i18n/he/basics/why-privacy-matters.md
+++ b/i18n/he/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-כל המושגים הללו חופפים, אבל אפשר לקבל כל שילוב של אלה. הנקודה המתוקה עבור רוב האנשים היא כאשר כל שלושת המושגים הללו חופפים. עם זאת, זה טריקי להשיג ממה שרבים מאמינים בתחילה. לפעמים, אתה צריך להתפשר על כמה מאלה, וגם זה בסדר. כאן נכנס לתמונה **מודל איומים** המאפשר לך לקבל החלטות מושכלות decisions about the [התוכנה והשירותים](../tools.md)שבהם אתה משתמש.
+כל המושגים הללו חופפים, אבל אפשר לקבל כל שילוב של אלה. הנקודה המתוקה עבור רוב האנשים היא כאשר כל שלושת המושגים הללו חופפים. However, it's trickier to achieve than many initially believe. לפעמים, אתה צריך להתפשר על כמה מאלה, וגם זה בסדר. כאן נכנס לתמונה **מודל איומים** המאפשר לך לקבל החלטות מושכלות decisions about the [התוכנה והשירותים](../tools.md)שבהם אתה משתמש.
[:material-book-outline: למד עוד על מידול סיכונים](threat-modeling.md ""){.md-button}
diff --git a/i18n/he/tools.md b/i18n/he/tools.md
index 39940491..cb776dc9 100644
--- a/i18n/he/tools.md
+++ b/i18n/he/tools.md
@@ -298,11 +298,11 @@ description: Privacy Guides הוא האתר השקוף והאמין ביותר
diff --git a/i18n/hi/basics/why-privacy-matters.md b/i18n/hi/basics/why-privacy-matters.md
index eddecc9e..69a3ae4f 100644
--- a/i18n/hi/basics/why-privacy-matters.md
+++ b/i18n/hi/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/hi/tools.md b/i18n/hi/tools.md
index a24923d5..af9bee18 100644
--- a/i18n/hi/tools.md
+++ b/i18n/hi/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/hu/basics/why-privacy-matters.md b/i18n/hu/basics/why-privacy-matters.md
index ec190c1d..53352b34 100644
--- a/i18n/hu/basics/why-privacy-matters.md
+++ b/i18n/hu/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/hu/tools.md b/i18n/hu/tools.md
index df564778..0029c5aa 100644
--- a/i18n/hu/tools.md
+++ b/i18n/hu/tools.md
@@ -301,8 +301,8 @@ Számos követelmény alapján [ajánlunk](dns.md#recommended-providers) több t
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Sajár Üzemeltetésű)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/id/basics/why-privacy-matters.md b/i18n/id/basics/why-privacy-matters.md
index e6fc838d..1a515a20 100644
--- a/i18n/id/basics/why-privacy-matters.md
+++ b/i18n/id/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/id/tools.md b/i18n/id/tools.md
index a24923d5..af9bee18 100644
--- a/i18n/id/tools.md
+++ b/i18n/id/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/it/basics/why-privacy-matters.md b/i18n/it/basics/why-privacy-matters.md
index 42d9cd85..af09b530 100644
--- a/i18n/it/basics/why-privacy-matters.md
+++ b/i18n/it/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ L'anonimato è la capacità di agire senza un identificatore persistente. Potres
**Pseudonimato** è un concetto simile, ma consente di avere un identificatore persistente senza che venga collegato alla tua vera identità. Se tutti ti conoscono come `@GamerGuy12` online, ma nessuno conosce il tuo vero nome, quello è il tuo pseudonimo.
-Tutti questi concetti si sovrappongono, ma è possibile avere qualsiasi combinazione di tutti e tre. La perfezione per la maggior parte delle persone la si raggiunge quando tutti e tre i concetti si sovrappongono. Tuttavia, è più difficile da raggiungere di quanto molti credano inizialmente. A volte, dovrai sacrificarne uno dei 3, e va bene anche così. È qui che entra in gioco la **modellazione delle minacce** che consente di prendere decisioni informate sui [software e sui servizi](../tools.md) da utilizzare.
+Tutti questi concetti si sovrappongono, ma è possibile avere qualsiasi combinazione di tutti e tre. La perfezione per la maggior parte delle persone la si raggiunge quando tutti e tre i concetti si sovrappongono. Tuttavia, è più difficile da raggiungere di quanto molti inizialmente credano. A volte, dovrai sacrificarne uno dei 3, e va bene anche così. È qui che entra in gioco la **modellazione delle minacce** che consente di prendere decisioni informate sui [software e sui servizi](../tools.md) da utilizzare.
[:material-book-outline: Per saperne di più sulla Modellazione delle minacce](threat-modeling.md ""){.md-button}
diff --git a/i18n/it/tools.md b/i18n/it/tools.md
index 0bdaf32b..57be9a53 100644
--- a/i18n/it/tools.md
+++ b/i18n/it/tools.md
@@ -298,11 +298,11 @@ Per maggiori dettagli su ogni progetto, sul motivo per cui è stato scelto e su
diff --git a/i18n/ja/basics/why-privacy-matters.md b/i18n/ja/basics/why-privacy-matters.md
index cd5762ea..8ba41a25 100644
--- a/i18n/ja/basics/why-privacy-matters.md
+++ b/i18n/ja/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/ja/tools.md b/i18n/ja/tools.md
index 81750807..8da9cf99 100644
--- a/i18n/ja/tools.md
+++ b/i18n/ja/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/ko/basics/why-privacy-matters.md b/i18n/ko/basics/why-privacy-matters.md
index 7dcc5d46..2a063291 100644
--- a/i18n/ko/basics/why-privacy-matters.md
+++ b/i18n/ko/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. 때로는 일부를 타협해야 하겠지만, 괜찮습니다. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. 때로는 일부를 타협해야 하겠지만, 괜찮습니다. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: 위협 모델링에 대해 자세히 알아보기](threat-modeling.md ""){.md-button}
diff --git a/i18n/ko/tools.md b/i18n/ko/tools.md
index 3d892e6d..dd9a95fa 100644
--- a/i18n/ko/tools.md
+++ b/i18n/ko/tools.md
@@ -298,11 +298,11 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
diff --git a/i18n/ku-IQ/basics/why-privacy-matters.md b/i18n/ku-IQ/basics/why-privacy-matters.md
index eddecc9e..69a3ae4f 100644
--- a/i18n/ku-IQ/basics/why-privacy-matters.md
+++ b/i18n/ku-IQ/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/ku-IQ/tools.md b/i18n/ku-IQ/tools.md
index a24923d5..af9bee18 100644
--- a/i18n/ku-IQ/tools.md
+++ b/i18n/ku-IQ/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/nl/basics/why-privacy-matters.md b/i18n/nl/basics/why-privacy-matters.md
index 3878ecb1..fde898fe 100644
--- a/i18n/nl/basics/why-privacy-matters.md
+++ b/i18n/nl/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-Al deze begrippen overlappen elkaar, maar het is mogelijk om er een combinatie van te maken. De beste plek voor de meeste mensen is wanneer deze drie concepten elkaar overlappen. Het is echter lastiger te bereiken dan velen aanvankelijk denken. Soms moet je compromissen sluiten op sommige daarvan, en dat is ook oké. Dit is waar **dreigingsmodellering** wordt gebruikt, zodat je weloverwogen beslissingen kunt nemen over de [software en diensten](../tools.md) die je gebruikt.
+Al deze begrippen overlappen elkaar, maar het is mogelijk om er een combinatie van te maken. De beste plek voor de meeste mensen is wanneer deze drie concepten elkaar overlappen. However, it's trickier to achieve than many initially believe. Soms moet je compromissen sluiten op sommige daarvan, en dat is ook oké. Dit is waar **dreigingsmodellering** wordt gebruikt, zodat je weloverwogen beslissingen kunt nemen over de [software en diensten](../tools.md) die je gebruikt.
[:material-book-outline: Meer informatie over dreigingsmodellering](threat-modeling.md ""){.md-button}
diff --git a/i18n/nl/tools.md b/i18n/nl/tools.md
index cf364aa7..87451e0e 100644
--- a/i18n/nl/tools.md
+++ b/i18n/nl/tools.md
@@ -301,8 +301,8 @@ Wij [bevelen](dns.md#recommended-providers) een aantal versleutelde DNS servers
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/pl/basics/why-privacy-matters.md b/i18n/pl/basics/why-privacy-matters.md
index 1f841ff0..82482f3d 100644
--- a/i18n/pl/basics/why-privacy-matters.md
+++ b/i18n/pl/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/pl/tools.md b/i18n/pl/tools.md
index 14728af3..cc0b856e 100644
--- a/i18n/pl/tools.md
+++ b/i18n/pl/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/pt-BR/basics/why-privacy-matters.md b/i18n/pt-BR/basics/why-privacy-matters.md
index 768b68fa..d0af8da1 100644
--- a/i18n/pt-BR/basics/why-privacy-matters.md
+++ b/i18n/pt-BR/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-Todos esses conceitos se sobrepõem, mas é possível ter qualquer combinação deles. O ponto ideal para a maioria das pessoas é quando todos esses três conceitos se coincidem. Porém, isso é mais difícil de conseguir do que muitos acreditam inicialmente. Às vezes, você precisa fazer um meio-termo em relação a alguns desses itens, e isso também é normal. É nesse ponto que a **modelagem de ameaças** entra em ação, permitindo que você tome decisões informadas sobre os [aplicativos e serviços](../tools.md) que você usa.
+Todos esses conceitos se sobrepõem, mas é possível ter qualquer combinação deles. O ponto ideal para a maioria das pessoas é quando todos esses três conceitos se coincidem. However, it's trickier to achieve than many initially believe. Às vezes, você precisa fazer um meio-termo em relação a alguns desses itens, e isso também é normal. É nesse ponto que a **modelagem de ameaças** entra em ação, permitindo que você tome decisões informadas sobre os [aplicativos e serviços](../tools.md) que você usa.
[:material-book-outline: Saiba Mais Sobre a Modelagem de Ameaças](threat-modeling.md ""){.md-button}
diff --git a/i18n/pt-BR/tools.md b/i18n/pt-BR/tools.md
index 022c7605..1931237b 100644
--- a/i18n/pt-BR/tools.md
+++ b/i18n/pt-BR/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/pt/about/criteria.md b/i18n/pt/about/criteria.md
index 7914b9bd..e2c452c9 100644
--- a/i18n/pt/about/criteria.md
+++ b/i18n/pt/about/criteria.md
@@ -1,40 +1,40 @@
---
-title: General Criteria
+title: Critérios gerais
---
-!!! example "Work in Progress"
+!!! exemplo "Trabalho em curso"
- The following page is a work in progress, and does not reflect the full criteria for our recommendations at this time. Past discussion on this topic: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
+ A página seguinte é um trabalho em curso e não reflete, neste momento, todos os critérios das nossas recomendações. Discussão anterior sobre este tópico: [#24](https://github.com/privacyguides/privacyguides.org/discussions/24)
-Below are some things that must apply to all submissions to Privacy Guides. Each category will have additional requirements for inclusion.
+Seguem-se alguns aspetos que devem ser aplicados a todas as contribuições para o Privacy Guides. Cada uma das categorias tem requisitos adicionais para ser incluída.
-## Financial Disclosure
+## Divulgação financeira
-We do not make money from recommending certain products, we do not use affiliate links, and we do not provide special consideration to project donors.
+Não ganhamos dinheiro com a recomendação de determinados produtos, não utilizamos ligações de afiliados e não damos tratamento preferencial aos doadores do projeto.
-## General Guidelines
+## Orientações gerais
-We apply these priorities when considering new recommendations:
+Aos considerarmos novas recomendações, aplicamos as seguintes prioridades:
-- **Secure**: Tools should follow security best-practices wherever applicable.
-- **Source Availability**: Open source projects are generally preferred over equivalent proprietary alternatives.
-- **Cross-Platform**: We typically prefer recommendations to be cross-platform, to avoid vendor lock-in.
-- **Active Development**: The tools that we recommend should be actively developed, unmaintained projects will be removed in most cases.
-- **Usability**: Tools should be accessible to most computer users, an overly technical background should not be required.
-- **Documented**: Tools should have clear and extensive documentation for use.
+- **Segurança**: as ferramentas devem seguir as melhores práticas de segurança, sempre que aplicável.
+- **Disponibilidade da fonte**: os projetos de fonte aberta são geralmente preferidos às alternativas proprietárias equivalentes.
+- **Multiplataforma**: normalmente, preferimos que as recomendações sejam multiplataforma, para evitar a dependência do fornecedor.
+- **Desenvolvimento ativo**: as ferramentas que recomendamos devem ser desenvolvidas ativamente. Os projetos que não tenham uma manutenção regular serão removidos, na maioria dos casos.
+- **Usabilidade**: as ferramentas devem ser acessíveis à maioria dos utilizadores de computadores, não devendo ser necessária uma formação ou conhecimento demasiado técnicos.
+- **Documentado**: as ferramentas devem ter a sua utilização documentada de forma clara e extensa.
-## Developer Self-Submissions
+## Auto-submissões do desenvolvedor
-We have these requirements in regard to developers which wish to submit their project or software for consideration.
+Os programadores que pretendam submeter o seu projeto ou software para apreciação devem observar os seguintes requisitos.
-- Must disclose affiliation, i.e. your position within the project being submitted.
+- Devem indicar a sua afiliação, ou seja, a sua posição no âmbito do projeto apresentado.
-- Must have a security whitepaper if it is a project that involves handling of sensitive information like a messenger, password manager, encrypted cloud storage, etc.
- - Third party audit status. We want to know if you have one, or have one planned. If possible please mention who will be conducting the audit.
+- Devem ter um documento técnico de segurança, se se tratar de um projeto que envolva o tratamento de informações sensíveis, como um serviço de mensagens, um gestor de palavras-passe, um armazenamento encriptado na nuvem, etc.
+ - Estatuto de auditoria de terceiros. Queremos saber se solicitam auditorias ou se estão a planear solicitá-las. Sempre que possível, devem mencionar quem efetuará a(s) auditoria(s).
-- Must explain what the project brings to the table in regard to privacy.
- - Does it solve any new problem?
- - Why should anyone use it over the alternatives?
+- Devem explicar qual a mais-valia que o projeto traz às questões relacionadas com a privacidade.
+ - Resolve algum problema novo?
+ - Porque é que alguém deveria optar pelo projeto em vez das alternativas já existentes?
-- Must state what the exact threat model is with their project.
- - It should be clear to potential users what the project can provide, and what it cannot.
+- Devem indicar de forma precisa qual o modelo de ameaça do seu projeto.
+ - Deve ser claro para os potenciais utilizadores aquilo que o projeto pode fornecer e o que não pode.
diff --git a/i18n/pt/about/donate.md b/i18n/pt/about/donate.md
index 59617a2e..47dbcb07 100644
--- a/i18n/pt/about/donate.md
+++ b/i18n/pt/about/donate.md
@@ -1,29 +1,29 @@
---
-title: Apoiar-nos
+title: Como nos apoiar
---
-São precisas muitas [pessoas](https://github.com/privacyguides/privacyguides.org/graphs/contributors) e muito [trabalho](https://github.com/privacyguides/privacyguides.org/pulse/monthly) para manter o Privacy Gudes atualizado e a divulgar informações sobre privacidade e vigilância em massa. If you like what we do, consider getting involved by [editing the site](https://github.com/privacyguides/privacyguides.org) or [contributing translations](https://crowdin.com/project/privacyguides).
+São precisas muitas [pessoas](https://github.com/privacyguides/privacyguides.org/graphs/contributors) e muito [trabalho](https://github.com/privacyguides/privacyguides.org/pulse/monthly) para manter o Privacy Guides atualizado e para divulgar informações sobre privacidade e vigilância em massa. Se gosta do que fazemos, considere a possibilidade de participar na [edição do site](https://github.com/privacyguides/privacyguides.org) ou [contribuindo com traduções](https://crowdin.com/project/privacyguides).
-Se quiser apoiar-nos financeiramente, o método mais conveniente para nós são contribuições através do Open Collective, um website operado pelo nosso anfitrião fiscal. O Open Collective aceita pagamentos através de cartão de crédito/débito, PayPal e transferências bancárias.
+Se quiser apoiar-nos financeiramente, o método mais conveniente é através de contribuições no Open Collective, um website operado pelo nosso administrador fiscal. O Open Collective aceita pagamentos através de cartão de crédito/débito, PayPal e transferências bancárias.
-[Donate on OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" }
+[Doar em OpenCollective.com](https://opencollective.com/privacyguides/donate){ class="md-button md-button--primary" }
-Donations made directly to us on Open Collective are generally tax-deductible in the US, because our fiscal host (the Open Collective Foundation) is a registered 501(c)3 organization. Irá receber um recibo da Open Collective Foundation após a doação. O Privacy Guides não fornece aconselhamento financeiro. Como tal, deverá consultar um contablista para determinar se está abrangido pelo regime.
+Os donativos feitos diretamente no Open Collective são geralmente dedutíveis nos EUA, porque o nosso administrador fiscal (a Open Collective Foundation) é uma organização registada como 501(c)3. Após o donativo, um recibo da Open Collective Foundation ser-lhe-á enviado. O Privacy Guides não fornece aconselhamento financeiro. Como tal, deverá consultar um contabilista certificado para determinar se está abrangido pelo regime.
-Se já utiliza os patrocínios do GitHub, pode também patrocinar a nossa organização por lá.
+Se já utiliza os patrocínios do GitHub, poderá também patrocinar-nos a partir de lá.
[Patrocine-nos no GitHub](https://github.com/sponsors/privacyguides ""){.md-button}
-Another option to support us is by buying our merchandise from HelloTux. We get roughly $4 for every shirt sold, and you get a quality product to show for it.
+Poderá também apoiar-nos através da compra dos nossos produtos, disponíveis na HelloTux. Recebemos cerca de 4 dólares por cada t-shirt vendida, e o cliente recebe um produto de qualidade que pode orgulhosamente mostrar.
-[Buy on HelloTux.com](https://hellotux.com/privacyguides){ class="md-button" }
+[Comprar em HelloTux.com](https://hellotux.com/privacyguides){ class="md-button" }
## Contribuidores
Um agradecimento especial a todos aqueles que apoiam a nossa missão! :heart:
-*Nota: Esta secção carrega um widget diretamente do Open Collective. Esta secção não reflete donativos feitos por fora do Open Collective e nós não temos controlo sobre os doadores específicos que são destacados nesta seção.*
+*Nota: Esta secção carrega um widget diretamente do Open Collective. Esta secção apenas reflete os donativos feitos através do Open Collective, sem que tenhamos controlo sobre os doadores específicos que são destacados nesta secção.*
@@ -34,21 +34,21 @@ O Privacy Guides é uma organização **sem fins lucrativos**. Utilizamos os don
**Registos de Domínio**
:
-Temos alguns domínios tais como o `privacyguides.org`, que nos custam aproximadamente 10 USD para manter o seu registo.
+Temos alguns domínios tais como o `privacyguides.org`, cuja renovação nos custa aproximadamente 10 dólares.
**Alojamento Web**
:
-O tráfego para este website usa centenas de gigabytes de dados por mês. Nós usamos vários provedores de serviço para lidar com este tráfego.
+O tráfego originado pelo acesso ao nosso site gera centenas de gigabytes de dados por mês. Para lidar com esta quantidade de tráfego, usamos vários fornecedores de serviços.
**Serviços Online**
:
-Nós alojamos [ serviços na internet ](https://privacyguides.net) para teste e demonstração de diferentes produtos de privacidade que gostamos e [recomendamos](../tools.md). Alguns deles são disponibilizados publicamente para uso da nossa comunidade (SearXNG, Tor, etc.) e alguns são para uso dos membros da nossa equipa (e-mail, etc.).
+Alojamos [ serviços na internet ](https://privacyguides.net) para teste e demonstração de diferentes produtos de privacidade que gostamos e [recomendamos](../tools.md). Alguns deles são disponibilizados publicamente para uso da nossa comunidade (SearXNG, Tor, etc.), ao passo que outros são para uso exclusivo dos membros da nossa equipa (e-mail, etc.).
**Compras de Produtos**
:
-Ocasionamente adquirimos produtos e serviços com o propósito de testar as nossas [ferramentas recomendadas](../tools.md).
+Ocasionalmente, adquirimos produtos e serviços com o propósito de testar as nossas [ferramentas recomendadas](../tools.md).
-Ainda estamos a trabalhar com o nosso anfitrião fiscal (a Open Collective Foundation) para receber donativos em criptomoeda, neste momento a contabilidade não é viável para muitas transacções mais pequenas, mas isso deverá mudar no futuro. Entretanto, se desejar fazer um donativo considerável em criptomoeda (> 100 USD), por favor contacte [jonah@privacyguides.org](mailto:jonah@privacyguides.org).
+Estamos a trabalhar com o nosso administrador fiscal (a Open Collective Foundation) para receber donativos em criptomoeda. Neste momento, a forma como a contabilidade está organizada não permite muitas transações de pequenos valores, mas essa situação deverá mudar no futuro. Entretanto, se desejar fazer um donativo considerável em criptomoeda (> 100 USD), por favor contacte [jonah@privacyguides.org](mailto:jonah@privacyguides.org).
diff --git a/i18n/pt/about/index.md b/i18n/pt/about/index.md
index 1fff7acc..378b0be8 100644
--- a/i18n/pt/about/index.md
+++ b/i18n/pt/about/index.md
@@ -17,9 +17,9 @@ schema:
- https://mastodon.neat.computer/@privacyguides
---
-{ align=right }
+{ align=right }
-**Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. A nossa missão é informar o público sobre o valor da privacidade digital e as iniciativas governamentais globais que têm como objetivo monitorizar a sua atividade online. Somos um coletivo sem fins lucrativos, gerido inteiramente por uma [equipa de voluntários](https://discuss.privacyguides.net/g/team) e colaboradores. O nosso site não tem publicidade e não é afiliado a nenhum dos fornecedores listados.
+O **Privacy Guides** é um site de motivação social que fornece [informações](/kb) com vista à segurança e a privacidade dos seus dados. A nossa missão é informar o público sobre o valor da privacidade digital e as iniciativas governamentais globais que têm como objetivo monitorizar a sua atividade online. Somos um coletivo sem fins lucrativos, gerido inteiramente por uma [equipa de voluntários](https://discuss.privacyguides.net/g/team) e colaboradores. O nosso site não tem publicidade e não é afiliado a nenhum dos fornecedores listados.
[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage }
[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Código-fonte" }
@@ -37,15 +37,15 @@ Também destacado em: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-
## História
-Privacy Guides was launched in September 2021 as a continuation of the [defunct](privacytools.md) "PrivacyTools" open-source educational project. We recognized the importance of independent, criteria-focused product recommendations and general knowledge in the privacy space, which is why we needed to preserve the work that had been created by so many contributors since 2015 and make sure that information had a stable home on the web indefinitely.
+O Privacy Guides foi lançado em setembro de 2021 como uma continuação do [defunto](privacytools.md) projeto educativo de código aberto "PrivacyTools". Reconhecemos a importância de recomendações de produtos independentes, cujo foco está centrado nas preocupações relacionadas com a privacidade, razão pela qual precisávamos de preservar o trabalho que tinha sido criado por tantos colaboradores, desde 2015, e garantir que as informações continuavam a ter uma casa estável na Web, por tempo indeterminado.
-In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document.
+Em 2022, concluímos a transição da estrutura do nosso principal site de Jekyll para MkDocs, utilizando o software de documentação `mkdocs-material`. Esta alteração tornou as contribuições de código aberto para o nosso site significativamente mais fáceis de realizar por pessoas de fora da estrutura, uma vez que deixou de ser necessária a utilização de uma sintaxe complicada para escrever mensagens de forma eficaz, bastando agora escrever um documento em formato Markdown.
-We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms.
+Além disso, lançámos o nosso novo fórum de discussão em [discuss.privacyguides.net](https://discuss.privacyguides.net/) como uma plataforma comunitária para partilhar ideias e colocar questões sobre a nossa missão. Com isto, aumentamos a nossa comunidade existente no Matrix e substituimos a nossa anterior plataforma GitHub Discussions, diminuindo a nossa dependência de plataformas de discussão proprietárias.
-So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry.
+Até ao momento, lançámos traduções internacionais do nosso site em [Francês](/fr/), [Hebraico](/he/), e [Holandês](/nl/), estando neste momento em preparação versões em mais línguas, graças ao contributo da nossa excelente equipa de tradução do [Crowdin](https://crowdin.com/project/privacyguides). Tencionamos continuar a levar por diante a nossa missão de divulgação e educação e encontrar formas de realçar mais claramente os perigos da falta de sensibilização para a privacidade na era digital moderna, bem como a prevalência e os danos das violações de segurança na indústria tecnológica.
-## Our Team
+## A nossa equipa
Recomendamos armazenar uma chave de recuperação local em um local seguro, em vez de utilizar a recuperação do iCloud FileVault. person "@jonah"
@@ -59,21 +59,21 @@ Recomendamos armazenar uma chave de recuperação local em um local seguro, em v
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/Niek-de-Wilde)
- [:simple-github: GitHub](https://github.com/blacklight447 "@blacklight447")
- [:simple-mastodon: Mastodon](https://mastodon.social/@blacklight447 "@blacklight447@mastodon.social"){rel=me}
- - [:fontawesome-solid-envelope: Email](mailto:niekdewilde@privacyguides.org)
+ - [:fontawesome-solid-envelope: E-mail](mailto:niekdewilde@privacyguides.org)
Recomendamos armazenar uma chave de recuperação local em um local seguro, em vez de utilizar a recuperação do iCloud FileVault. person "@dngray"
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/dngray)
- [:simple-github: GitHub](https://github.com/dngray "@dngray")
- [:simple-mastodon: Mastodon](https://mastodon.social/@dngray "@dngray@mastodon.social"){rel=me}
- - [:fontawesome-solid-envelope: Email](mailto:dngray@privacyguides.org)
+ - [:fontawesome-solid-envelope: E-mail](mailto:dngray@privacyguides.org)
Recomendamos armazenar uma chave de recuperação local em um local seguro, em vez de utilizar a recuperação do iCloud FileVault. person "@freddy"
- [:simple-discourse: Discourse](https://discuss.privacyguides.net/u/freddy)
- [:simple-github: GitHub](https://github.com/freddy-m "@freddy-m")
- [:simple-mastodon: Mastodon](https://social.lol/@freddy "@freddy@social.lol"){rel=me}
- - [:fontawesome-solid-envelope: Email](mailto:freddy@privacyguides.org)
+ - [:fontawesome-solid-envelope: E-mail](mailto:freddy@privacyguides.org)
- [:fontawesome-solid-house: Homepage](https://freddy.omg.lol)
Recomendamos armazenar uma chave de recuperação local em um local seguro, em vez de utilizar a recuperação do iCloud FileVault. person "@mfwmyfacewhen"
@@ -88,16 +88,16 @@ Recomendamos armazenar uma chave de recuperação local em um local seguro, em v
- [:simple-github: GitHub](https://github.com/hook9 "@hook9")
- [:simple-mastodon: Mastodon](https://mastodon.neat.computer/@oliviablob "@oliviablob@neat.computer"){rel=me}
-Additionally, [many people](https://github.com/privacyguides/privacyguides.org/graphs/contributors) have made contributions to the project. You can too, we're open sourced on GitHub, and accepting translation suggestions on [Crowdin](https://crowdin.com/project/privacyguides).
+Além destas pessoas, [muitas outras](https://github.com/privacyguides/privacyguides.org/graphs/contributors) deram o seu contributo para o projeto. Também poderá fazê-lo. O nosso código é aberto no GitHub e estamos a aceitar sugestões de tradução em [Crowdin](https://crowdin.com/project/privacyguides).
-Our team members review all changes made to the website and handle administrative duties such as web hosting and financials, however they do not personally profit from any contributions made to this site. Our financials are transparently hosted by the Open Collective Foundation 501(c)(3) at [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Donations to Privacy Guides are generally tax-deductible in the United States.
+Os membros da nossa equipa analisam todas as alterações feitas ao site e tratam das tarefas administrativas, como o alojamento Web e as finanças, sem que lucrem pessoalmente com quaisquer contribuições financeiras a este site. As nossas finanças podem ser consultadas, de forma transparente, na Open Collective Foundation 501(c)(3) em [opencollective.com/privacyguides](https://opencollective.com/privacyguides). Os donativos para o Privacy Guides são geralmente dedutíveis nos Estados Unidos.
-## Site License
+## Licença do site
!!! danger ""
Segue-se um resumo legível por humanos (e não um substituto) do [license](/license).
-:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Unless otherwise noted, the original content on this website is made available under the [Creative Commons Attribution-NoDerivatives 4.0 International Public License](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). This means that you are free to copy and redistribute the material in any medium or format for any purpose, even commercially; as long as you give appropriate credit to `Privacy Guides (www.privacyguides.org)` and provide a link to the license. Você **não pode** utilizar a marca Privacy Guides no seu próprio projecto sem a aprovação expressa deste projecto. If you remix, transform, or build upon the content of this website, you may not distribute the modified material.
+:fontawesome-brands-creative-commons: :fontawesome-brands-creative-commons-by: :fontawesome-brands-creative-commons-nd: Salvo indicação em contrário, o conteúdo original deste site é disponibilizado ao abrigo da licença pública internacional [Creative Commons Attribution-NoDerivatives 4.0](https://github.com/privacyguides/privacyguides.org/blob/main/LICENSE). Isto significa que o utilizador é livre de copiar e redistribuir o material em qualquer meio ou formato para qualquer fim, mesmo comercialmente, desde que atribua o devido crédito a `Privacy Guides (www.privacyguides.org)` e forneça uma hiperligação para a licença. Pode fazê-lo de forma razoável, mas não de uma forma que sugira que o Privacy Guides o apoia ou apoia o modo como usa a informação. Se combinar, transformar ou desenvolver conteúdo a partir deste site, não pode distribuir o material modificado.
-This license is in place to prevent people from sharing our work without giving proper credit, and to prevent people from modifying our work in a way that could be used to mislead people. If you find the terms of this license too restrictive for the project you're working on, please reach out to us at `jonah@privacyguides.org`. We are happy to provide alternative licensing options for well-intentioned projects in the privacy space!
+Esta licença existe para evitar que o nosso trabalho seja partilhado sem que seja dado o devido crédito, assim como para evitar que o nosso trabalho possa ser modificado de forma a enganar as pessoas. Se considerar que os termos desta licença são demasiado restritivos para o projeto em que está a trabalhar, contacte-nos através do e-mail `jonah@privacyguides.org`. Teremos todo o gosto em oferecer opções de licenciamento alternativas para projetos bem intencionados no âmbito da defesa da privacidade!
diff --git a/i18n/pt/advanced/payments.md b/i18n/pt/advanced/payments.md
index 9d974bff..8e280fbe 100644
--- a/i18n/pt/advanced/payments.md
+++ b/i18n/pt/advanced/payments.md
@@ -41,7 +41,7 @@ Another way to protect your information from merchants online is to use virtual,
These tend to be good options for recurring/subscription payments online, while prepaid gift cards are preferred for one-time transactions.
-## Cryptocurrency
+## Criptomoeda
Cryptocurrencies are a digital form of currency designed to work without central authorities such as a government or bank. While *some* cryptocurrency projects can allow you to make private transactions online, many use a public blockchain which does not provide any transaction privacy. Cryptocurrencies also tend to be very volatile assets, meaning their value can change rapidly and significantly at any time. As such, we generally don't recommend using cryptocurrency as a long-term store of value. If you decide to use cryptocurrency online, make sure you have a full understanding of its privacy aspects beforehand, and only invest amounts which would not be disastrous to lose.
diff --git a/i18n/pt/android.md b/i18n/pt/android.md
index 06a1669f..1dab8c1f 100644
--- a/i18n/pt/android.md
+++ b/i18n/pt/android.md
@@ -418,7 +418,7 @@ That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](htt
**PrivateBin** é um pastebin online minimalista e de código aberto onde o servidor tem zero conhecimento de dados colados. Os dados são criptografados/descriptografados no navegador usando AES de 256 bits. Psono suporta compartilhamento seguro de senhas, arquivos, marcadores e e-mails.
-### Software
+### Sistemas Operativos
- Must be open-source software.
- Must support bootloader locking with custom AVB key support.
diff --git a/i18n/pt/basics/account-deletion.md b/i18n/pt/basics/account-deletion.md
index aef13b8d..289fab5a 100644
--- a/i18n/pt/basics/account-deletion.md
+++ b/i18n/pt/basics/account-deletion.md
@@ -25,7 +25,7 @@ Desktop platforms also often have a password manager which may help you recover
- iOS [Passwords](https://support.apple.com/en-us/HT211146)
- Linux, Gnome Keyring, which can be accessed through [Seahorse](https://help.gnome.org/users/seahorse/stable/passwords-view.html.en) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager)
-### Provedores de VPN
+### E-mail
If you didn't use a password manager in the past or you think you have accounts that were never added to your password manager, another option is to search the email account(s) that you believe you signed up on. On your email client, search for keywords such as "verify" or "welcome." Almost every time you make an online account, the service will send a verification link or an introductory message to your email. This can be a good way to find old, forgotten accounts.
diff --git a/i18n/pt/basics/passwords-overview.md b/i18n/pt/basics/passwords-overview.md
index 0c2c345f..2eb98f81 100644
--- a/i18n/pt/basics/passwords-overview.md
+++ b/i18n/pt/basics/passwords-overview.md
@@ -90,7 +90,7 @@ To sum it up, diceware passphrases are your best option when you need something
## Storing Passwords
-### Redes Auto-Contidas
+### Gestores de palavras-passe
The best way to store your passwords is by using a password manager. They allow you to store your passwords in a file or in the cloud and protect them with a single master password. That way, you will only have to remember one strong password, which lets you access the rest of them.
diff --git a/i18n/pt/basics/why-privacy-matters.md b/i18n/pt/basics/why-privacy-matters.md
index c21c83a9..afe1e72d 100644
--- a/i18n/pt/basics/why-privacy-matters.md
+++ b/i18n/pt/basics/why-privacy-matters.md
@@ -19,20 +19,20 @@ Many people get the concepts of **privacy**, **security**, and **anonymity** con
**Segurança**
:
-Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates.
+A segurança é a capacidade de confiar nas aplicações que utiliza - que são o que as partes envolvidas dizem ser - e de manter essas aplicações seguras. No contexto da navegação Web, por exemplo, a segurança pode ser fornecida por certificados HTTPS.
:
-Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website.
+Os certificados permitem a certeza de que está a falar diretamente com o site que está a visitar e impedem que os atacantes na sua rede leiam ou modifiquem os dados enviados para ou a partir do site.
**Anonymity**
:
-Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own.
+O anonimato é a capacidade de agir sem um identificador persistente. Pode obter essa privacidade online com o browser [Tor](../tor.md), que lhe permite navegar na Internet com um endereço IP e uma ligação de rede aleatórios, que substituem os seus.
:
-**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
+O **Pseudonimato** é um conceito semelhante, e permite-lhe usar um identificador persistente sem ligação à sua identidade real. Se todos o conhecerem como `@GamerGuy12` online, mas ninguém souber o seu nome verdadeiro, esse será o seu pseudónimo.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. No entanto, é mais difícil de conseguir do que à partida se poderia pensar. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/pt/calendar.md b/i18n/pt/calendar.md
index 2cd9d6f7..c52ce70f 100644
--- a/i18n/pt/calendar.md
+++ b/i18n/pt/calendar.md
@@ -1,5 +1,5 @@
---
-title: "Clientes de e-mail"
+title: "Sincronização do calendário"
icon: material/calendar
description: Calendars contain some of your most sensitive data; use products that implement encryption at rest.
cover: calendar.png
diff --git a/i18n/pt/cloud.md b/i18n/pt/cloud.md
index 1b87fc85..011174b2 100644
--- a/i18n/pt/cloud.md
+++ b/i18n/pt/cloud.md
@@ -1,6 +1,6 @@
---
meta_title: "The Best Private and Secure Cloud Storage Providers - Privacy Guides"
-title: "Email"
+title: "Armazenamento em nuvem"
icon: material/file-cloud
description: Many cloud storage providers require your trust that they will not look at your files. These are private alternatives!
cover: cloud.png
diff --git a/i18n/pt/cryptocurrency.md b/i18n/pt/cryptocurrency.md
index bd83cc2a..7f7acebc 100644
--- a/i18n/pt/cryptocurrency.md
+++ b/i18n/pt/cryptocurrency.md
@@ -1,6 +1,6 @@
---
meta_title: "Private Cryptocurrency Blockchains - Privacy Guides"
-title: Cryptocurrency
+title: Criptomoeda
icon: material/bank-circle
cover: cryptocurrency.png
---
diff --git a/i18n/pt/desktop.md b/i18n/pt/desktop.md
index 7df7e617..108e622b 100644
--- a/i18n/pt/desktop.md
+++ b/i18n/pt/desktop.md
@@ -1,5 +1,5 @@
---
-title: "Armazenamento em nuvem"
+title: "Desktop/PC"
icon: fontawesome/brands/linux
description: Linux distributions are commonly recommended for privacy protection and software freedom.
cover: desktop.png
diff --git a/i18n/pt/dns.md b/i18n/pt/dns.md
index 24b64317..2569609b 100644
--- a/i18n/pt/dns.md
+++ b/i18n/pt/dns.md
@@ -57,7 +57,7 @@ Apple does not provide a native interface for creating encrypted DNS profiles. I
**DNSCloak** é um cliente iOS de código aberto que suporta [DNS-over-HTTPS](/dns/#dns-over-https-doh), [DNSCrypt](/dns/#dnscrypt), e [dnscrypt-proxy](https://github.com/DNSCrypt/dnscrypt-proxy/wiki) opções como respostas DNS em cache, consultas DNS de registo local, e listas de blocos personalizadas. Os usuários podem [adicionar resolvedores personalizados por carimbo DNS](https://medium.com/privacyguides/adding-custom-dns-over-https-resolvers-to-dnscloak-20ff5845f4b5).
-## Encrypted DNS Proxies
+## Proxies DNS encriptados
Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](advanced/dns-overview.md#unencrypted-dns) resolver to forward to. Typically it is used on platforms that don't natively support [encrypted DNS](advanced/dns-overview.md#what-is-encrypted-dns).
@@ -100,7 +100,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad
- [:simple-apple: macOS](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-macOS)
- [:simple-linux: Linux](https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Installation-linux)
-## Self-hosted Solutions
+## Soluções auto-hospedadas
A self-hosted DNS solution is useful for providing filtering on controlled platforms, such as Smart TVs and other IoT devices, as no client-side software is needed.
diff --git a/i18n/pt/email-clients.md b/i18n/pt/email-clients.md
index c228f798..c9ddbd30 100644
--- a/i18n/pt/email-clients.md
+++ b/i18n/pt/email-clients.md
@@ -1,5 +1,5 @@
---
-title: "Partilha de ficheiros"
+title: "Clientes de e-mail"
icon: material/email-open
description: These email clients are privacy-respecting and support OpenPGP email encryption.
cover: email-clients.png
diff --git a/i18n/pt/file-sharing.md b/i18n/pt/file-sharing.md
index 43ba2df0..6b7f941e 100644
--- a/i18n/pt/file-sharing.md
+++ b/i18n/pt/file-sharing.md
@@ -1,5 +1,5 @@
---
-title: "Ferramentas de Autenticação Multi-Factor"
+title: "Partilha e sincronização de ficheiros"
icon: material/share-variant
description: Descubra como partilhar os seus ficheiros em privado entre os seus dispositivos, com os seus amigos e família, ou anonimamente online.
cover: file-sharing.png
diff --git a/i18n/pt/financial-services.md b/i18n/pt/financial-services.md
index 8cc22e00..62bb0bb1 100644
--- a/i18n/pt/financial-services.md
+++ b/i18n/pt/financial-services.md
@@ -1,5 +1,5 @@
---
-title: Financial Services
+title: Serviços financeiros
icon: material/bank
cover: financial-services.png
---
@@ -8,7 +8,7 @@ Making payments online is one of the biggest challenges to privacy. These servic
[Making Private Payments :material-arrow-right-drop-circle:](advanced/payments.md ""){.md-button}
-## Payment Masking Services
+## Serviços de mascaramento de pagamentos
There are a number of services which provide "virtual debit cards" which you can use with online merchants without revealing your actual banking or billing information in most cases. It's important to note that these financial services are **not** anonymous and are subject to "Know Your Customer" (KYC) laws and may require your ID or other identifying information. These services are primarily useful for protecting you from merchant data breaches, less sophisticated tracking or purchase correlation by marketing agencies, and online data theft; and **not** for making a purchase completely anonymously.
diff --git a/i18n/pt/frontends.md b/i18n/pt/frontends.md
index af5f841b..bd676730 100644
--- a/i18n/pt/frontends.md
+++ b/i18n/pt/frontends.md
@@ -1,5 +1,5 @@
---
-title: "Gestores de senhas"
+title: "Interfaces"
icon: material/flip-to-front
description: These open-source frontends for various internet services allow you to access content without JavaScript or other annoyances.
cover: frontends.png
@@ -86,7 +86,7 @@ When you are using an instance run by someone else, make sure to read the privac
!!! Recomendamos que você verifique o [documentação](https://developers.yubico.com/SSH/) de Yubico sobre como configurar isso.
- When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
+ When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Considere a utilização de uma [VPN](vpn.md) ou [Tor](https://www.torproject.org) se o seu [modelo de ameaça](basics/threat-modeling.md) exigir a ocultação do seu endereço IP.
### Yattee
@@ -112,7 +112,7 @@ When you are using an instance run by someone else, make sure to read the privac
!!! Recomendamos que você verifique o [documentação](https://developers.yubico.com/SSH/) de Yubico sobre como configurar isso.
- When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
+ When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Considere a utilização de uma [VPN](vpn.md) ou [Tor](https://www.torproject.org) se o seu [modelo de ameaça](basics/threat-modeling.md) exigir a ocultação do seu endereço IP.
By default, Yattee blocks all YouTube advertisements. In addition, Yattee optionally integrates with [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments.
@@ -139,7 +139,7 @@ By default, Yattee blocks all YouTube advertisements. In addition, Yattee option
!!! Recomendamos que você verifique o [documentação](https://developers.yubico.com/SSH/) de Yubico sobre como configurar isso.
- When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
+ When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Considere a utilização de uma [VPN](vpn.md) ou [Tor](https://www.torproject.org) se o seu [modelo de ameaça](basics/threat-modeling.md) exigir a ocultação do seu endereço IP.
By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube uses [SponsorBlock](https://sponsor.ajay.app) to help you skip sponsored video segments. You are able to fully configure the types of segments that SponsorBlock will skip, or disable it completely. There is also a button on the video player itself to disable it for a specific video if desired.
@@ -167,7 +167,7 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube
!!! Recomendamos que você verifique o [documentação](https://developers.yubico.com/SSH/) de Yubico sobre como configurar isso.
- When using NewPipe, your IP address will be visible to the video providers used. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
+ When using NewPipe, your IP address will be visible to the video providers used. Considere a utilização de uma [VPN](vpn.md) ou [Tor](https://www.torproject.org) se o seu [modelo de ameaça](basics/threat-modeling.md) exigir a ocultação do seu endereço IP.
### Invidious
diff --git a/i18n/pt/news-aggregators.md b/i18n/pt/news-aggregators.md
index 41dddc05..d856fbd7 100644
--- a/i18n/pt/news-aggregators.md
+++ b/i18n/pt/news-aggregators.md
@@ -1,5 +1,5 @@
---
-title: "Comunicação em Tempo Real"
+title: "Agregadores de notícias"
icon: material/rss
description: These news aggregator clients let you keep up with your favorite blogs and news sites using internet standards like RSS.
cover: news-aggregators.png
diff --git a/i18n/pt/notebooks.md b/i18n/pt/notebooks.md
index 43600c9d..91e2cc90 100644
--- a/i18n/pt/notebooks.md
+++ b/i18n/pt/notebooks.md
@@ -1,5 +1,5 @@
---
-title: "Cadernos de notas"
+title: "Blocos de notas"
icon: material/notebook-edit-outline
description: These encrypted note-taking apps let you keep track of your notes without giving them to a third-party.
cover: notebooks.png
@@ -39,15 +39,15 @@ Se você está usando atualmente uma aplicação como Evernote, Google Keep ou M
!!! nota
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
- { align=right }
+ { align=right }
- **Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/).
+ **Notesnook** é uma aplicação de anotações de código aberto & gratuita (como na liberdade de expressão), centrada na privacidade do utilizador e na facilidade de utilização. Possui encriptação de ponta a ponta em todas as plataformas e uma sincronização poderosa para que possa escrever as suas notas em qualquer local e dispositivo. Pode importar facilmente as suas notas do Evernote, OneNote e de muitas outras aplicações, utilizando o seu [importador oficial] (https://importer.notesnook.com/).
[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary }
- [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" }
- [:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation}
- [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" }
- [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute }
+ [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Política de Privacidade" }
+ [:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentação}
+ [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Codigo-fonte" }
+ [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribuir }
??? downloads
@@ -60,7 +60,7 @@ Se você está usando atualmente uma aplicação como Evernote, Google Keep ou M
- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/)
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
-Notesnook does not support password/PIN protection on the web & desktop apps. However, you can still lock individual notes, and your data is always encrypted in transit and on your device using your master key.
+O Notesnook não suporta proteção por palavra-passe/PIN de proteção na web e aplicações de ambiente de trabalho. No entanto, poderá continuar a bloquear notas individuais e os seus dados são sempre encriptados em trânsito e no seu dispositivo, utilizando a sua chave mestra.
### Joplin
diff --git a/i18n/pt/passwords.md b/i18n/pt/passwords.md
index 0a8a1c5c..9f3955e8 100644
--- a/i18n/pt/passwords.md
+++ b/i18n/pt/passwords.md
@@ -1,6 +1,6 @@
---
meta_title: "The Best Password Managers to Protect Your Privacy and Security - Privacy Guides"
-title: "Redes Auto-Contidas"
+title: "Gestores de palavras-passe"
icon: material/form-textbox-password
description: Password managers allow you to securely store and manage passwords and other credentials.
cover: passwords.png
diff --git a/i18n/pt/productivity.md b/i18n/pt/productivity.md
index 6245e559..d661f390 100644
--- a/i18n/pt/productivity.md
+++ b/i18n/pt/productivity.md
@@ -1,5 +1,5 @@
---
-title: "Clientes de streaming de vídeo"
+title: "Ferramentas de produtividade"
icon: material/file-sign
description: Most online office suites do not support E2EE, meaning the cloud provider has access to everything you do.
cover: productivity.png
diff --git a/i18n/pt/real-time-communication.md b/i18n/pt/real-time-communication.md
index ed483753..4a139acf 100644
--- a/i18n/pt/real-time-communication.md
+++ b/i18n/pt/real-time-communication.md
@@ -1,35 +1,35 @@
---
-meta_title: "The Best Private Instant Messengers - Privacy Guides"
-title: "Clientes de streaming de vídeo"
+meta_title: "As melhores aplicações de mensagens instantâneas com foco na privacidade - Privacy Guides"
+title: "Comunicação em tempo real"
icon: material/chat-processing
-description: Other instant messengers make all of your private conversations available to the company that runs them.
+description: Outras aplicações de mensagens instantâneas disponibilizam todas as suas conversas privadas à empresa que as gere.
cover: real-time-communication.png
---
-These are our recommendations for encrypted real-time communication.
+Estas são as nossas recomendações para comunicação encriptada em tempo real.
-[Types of Communication Networks :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
+[Tipos de redes de comunicação :material-arrow-right-drop-circle:](./advanced/communication-network-types.md)
-## Mensageiros Instantâneos Criptografados
+## Aplicações de mensagens encriptadas
-These messengers are great for securing your sensitive communications.
+Estas aplicações de mensagens são ótimas para proteger as suas comunicações sensíveis.
### Signal
!!! nota
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
- { align=right }
+ { align=right }
- **Sinal*** é uma aplicação móvel desenvolvida pela Signal Messenger LLC. O aplicativo fornece mensagens instantâneas, bem como chamadas de voz e vídeo.
+ **Signal** é uma aplicação para dispositivos móveis desenvolvida pela Signal Messenger LLC. A aplicação permite o envio de mensagens instantâneas, bem como chamadas de voz e vídeo.
- Todas as comunicações são E2EE. As listas de contatos são criptografadas usando seu PIN de login e o servidor não tem acesso a elas. Personal profiles are also encrypted and only shared with contacts you chat with.
+ Todas as comunicações são E2EE. As listas de contactos são encriptadas utilizando o PIN do Signal e o servidor não tem acesso a elas. Os perfis pessoais também são encriptados e apenas são partilhados com os contactos com quem conversa.
[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary }
- [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" }
- [:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation}
- [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" }
- [:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute }
+ [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Política de Privacidade" }
+ [:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentação}
+ [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Código-fonte" }
+ [:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribuir }
??? downloads
@@ -40,41 +40,37 @@ These messengers are great for securing your sensitive communications.
- [:simple-apple: macOS](https://signal.org/download/macos)
- [:simple-linux: Linux](https://signal.org/download/linux)
-Signal supports [private groups](https://signal.org/blog/signal-private-group-system/). The server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. Signal requires your phone number as a personal identifier.
+O Signal suporta [grupos privados](https://signal.org/blog/signal-private-group-system/). O servidor não tem qualquer registo dos grupos a que pertence, títulos de grupo, avatares de grupo ou atributos de grupo. O Signal tem metadados mínimos quando se ativa o[Sealed Sender](https://signal.org/blog/sealed-sender/). O endereço do remetente é encriptado juntamente com o corpo da mensagem e apenas o endereço do destinatário é visível para o servidor. O Sealed Sender só está ativado para as pessoas da sua lista de contactos, mas pode ser ativado para todos os destinatários, com o risco acrescido de poder receber spam. O Signal requer o seu número de telefone como identificador pessoal.
-The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/).
+O protocolo foi objeto de uma [auditoria](https://eprint.iacr.org/2016/1013.pdf) independente em 2016. A especificação do protocolo Signal pode ser encontrada na sua [documentação](https://signal.org/docs/).
-We have some additional tips on configuring and hardening your Signal installation:
+Temos algumas dicas adicionais sobre como configurar e fortalecer a sua instalação do Signal:
-[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/)
+[Configuração e robustecimento do Signal :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/)
### SimpleX Chat
!!! nota
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
- Element logo](/assets/img/messengers/element.svg){ align=right }
+ { align=right }
- **Element** é o cliente de referência para o protocolo [Matrix](https://matrix.org/docs/guides/introduction), um [padrão aberto](https://matrix.org/docs/spec) para comunicação segura descentralizada em tempo real. As mensagens e ficheiros partilhados em salas privadas (aquelas que requerem um convite) são, por defeito, E2EE, tal como as chamadas de voz e vídeo de 1 para 1.
+ O **SimpleX** Chat é uma aplicação descentralizada de mensagens instantâneas e não depende de quaisquer identificadores únicos, tais como números de telefone ou nomes de utilizador. Os utilizadores do SimpleX Chat podem fazer scan a um código QR ou clicar numa ligação de convite para participar em conversas de grupo.
- [Visit element.io](https://element.io/){ .md-button .md-button--primary }
+ [:octicons-home-16: Homepage](https://simplex.chat){ .md-button .md-button--primary }
+ [:octicons-eye-16:](https://github.com/simplex-chat/simplex-chat/blob/stable/PRIVACY.md){ .card-link title="Política de Privacidade" }
+ [:octicons-info-16:](https://github.com/simplex-chat/simplex-chat/tree/stable/docs){ .card-link title=Documentação}
+ [:octicons-code-16:](https://github.com/simplex-chat){ .card-link title="Código-fonte" }
- **Downloads***
- - [:fontawesome-brands-windows: Windows](https://element.io/get-started)
- - [:fontawesome-brands-apple: macOS](https://element.io/get-started)
- - [:fontawesome-brands-linux: Linux](https://element.io/get-started)
- - [:fontawesome-brands-android: Android](https://f-droid.org/packages/im.vector.app/)
- - [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=im.vector.app)
- - [:fontawesome-brands-app-store-ios: App Store](https://apps.apple.com/app/vector/id1083446067)
- - [:fontawesome-brands-github: Source](https://github.com/vector-im/element-web) downloads
+ ??? downloads
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app)
- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084)
- [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases)
-SimpleX Chat [was audited](https://simplex.chat/blog/20221108-simplex-chat-v4.2-security-audit-new-website.html) by Trail of Bits in October 2022.
+O SimpleX Chat [foi auditado](https://simplex.chat/blog/20221108-simplex-chat-v4.2-security-audit-new-website.html) por Trail of Bits, em outubro de 2022.
-Currently SimpleX Chat only provides a client for Android and iOS. Basic group chatting functionality, direct messaging, editing of messages and markdown are supported. E2EE Audio and Video calls are also supported.
+Atualmente, o SimpleX Chat apenas disponibiliza clientes para Android e iOS. São suportadas as funcionalidades básicas de conversação em grupo, mensagens diretas, edição de mensagens e markdown. E2EE Audio and Video calls are also supported.
Your data can be exported, and imported onto another device, as there are no central servers where this is backed up.
diff --git a/i18n/pt/router.md b/i18n/pt/router.md
index 19cd0dae..07f661bf 100644
--- a/i18n/pt/router.md
+++ b/i18n/pt/router.md
@@ -1,53 +1,53 @@
---
-title: "Router Firmware"
+title: "Firmware do router"
icon: material/router-wireless
-description: These alternative operating systems can be used to secure your router or Wi-Fi access point.
+description: Estes sistemas operativos alternativos podem ser utilizados para proteger o seu router ou ponto de acesso Wi-Fi.
cover: router.png
---
-Abaixo estão alguns sistemas operacionais alternativos, que podem ser usados em roteadores, pontos de acesso Wi-Fi, etc.
+Apresentamos alguns sistemas operativos alternativos, que podem ser usados em routers, access points Wi-Fi, etc.
## OpenWrt
!!! nota
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
- { align=right }
- { align=right }
+ { align=right }
+ { align=right }
- **OpenWrt*** é um sistema operacional (em particular, um sistema operacional embarcado) baseado no kernel Linux, usado principalmente em dispositivos embarcados para rotear o tráfego da rede. Os principais componentes são o kernel Linux, util-linux, uClibc, e BusyBox. Todos os componentes foram optimizados em tamanho, para serem suficientemente pequenos para se adaptarem ao armazenamento limitado e à memória disponível nos routers domésticos.
+ O **OpenWrt** é um sistema operativo baseado em Linux; é utilizado principalmente em dispositivos incorporados para encaminhar o tráfego de rede. Inclui util-linux, uClibc e BusyBox. Todos os componentes foram otimizados para routers domésticos.
- [Visite openwrt.org](https://openwrt.org){ .md-button .md-button--primary }
-
- **Downloads***
- - [:fontawesome-brands-git: Fonte](https://git.openwrt.org)
+ [:octicons-home-16: Homepage](https://openwrt.org){ .md-button .md-button--primary }
+ [:octicons-info-16:](https://openwrt.org/docs/start){ .card-link title=Documentação}
+ [:octicons-code-16:](https://github.com/openwrt/openwrt){ .card-link title="Código-fonte" }
+ [:octicons-heart-16:](https://openwrt.org/donate){ .card-link title=Contribuir }
-You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to check if your device is supported.
+Pode consultar a [tabela de hardware](https://openwrt.org/toh/start) do OpenWrt para verificar se o seu dispositivo é suportado.
## OPNsense
!!! nota
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
- { align=right }
- { align=right }
+ { align=right }
- pfSense é uma distribuição de software de firewall/router de computador de código aberto baseada no FreeBSD. Ele é instalado em um computador para fazer um firewall/router dedicado para uma rede e é notado por sua confiabilidade e oferecendo recursos muitas vezes encontrados apenas em firewalls comerciais caros.
+ O **OPNsense** é uma plataforma de firewall e roteamento de código aberto, baseada no FreeBSD, que incorpora muitos recursos avançados, como modelagem de tráfego, balanceamento de carga e recursos de VPN, com muitos outros recursos disponíveis na forma de plugins. O OPNsense é normalmente implementado como firewall de perímetro, router, ponto de acesso sem fio, servidor DHCP, servidor DNS e ponto terminal de VPN.
- O pfSense é normalmente implantado como firewall perimetral, roteador, ponto de acesso sem fio, servidor DHCP, servidor DNS e VPN endpoint.
+ [:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary }
+ [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentação}
+ [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Código-fonte" }
+ [:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribuir }
-OPNsense was originally developed as a fork of [pfSense](https://en.wikipedia.org/wiki/PfSense), and both projects are noted for being free and reliable firewall distributions which offer features often only found in expensive commercial firewalls. Launched in 2015, the developers of OPNsense [cited](https://docs.opnsense.org/history/thefork.html) a number of security and code-quality issues with pfSense which they felt necessitated a fork of the project, as well as concerns about Netgate's majority acquisition of pfSense and the future direction of the pfSense project.
+O OPNsense foi originalmente desenvolvido como um fork de [pfSense](https://en.wikipedia.org/wiki/PfSense), e ambos os projetos são conhecidos por serem distribuições de firewall livres e fiáveis que oferecem funcionalidades muitas vezes apenas encontradas em firewalls comerciais caras. O OPNsense foi lançado em 2015 como fork do pfSense, pelo facto dos seus desenvolvedores terem [detetado](https://docs.opnsense.org/history/thefork.html) uma série de problemas de segurança e qualidade do código produto original, além das preocupações relacionadas com a aquisição maioritária do pfSense pela Netgate, que colocavam dúvidas quanto ao seu futuro.
-## Framadate
+## Critérios
-**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
+**Note que não estamos associados a nenhum dos projetos que recomendamos.** Para além dos [nossos critérios padrão](about/criteria.md), temos um conjunto claro de requisitos que nos permitem fornecer recomendações objetivas. Sugerimos que se familiarize com esta lista antes de optar por um projeto e que desenvolva a sua própria investigação para garantir que se trata da escolha certa para si.
-!!! Considere o auto-hospedagem para mitigar esta ameaça.
+!!! exemplo "Esta secção é nova"
- { align=right }
-
- **PrivateBin** é um pastebin online minimalista e de código aberto onde o servidor tem zero conhecimento de dados colados. Os dados são criptografados/descriptografados no navegador usando AES de 256 bits. Psono suporta compartilhamento seguro de senhas, arquivos, marcadores e e-mails.
+ Estamos a trabalhar no sentido de estabelecer critérios para cada secção do nosso site, o que pode originar alterações. Se tiver alguma dúvida sobre os critérios utilizados, por favor [pergunte no nosso fórum] (https://discuss.privacyguides.net/latest) e não parta do princípio de que algo foi excluído das nossas recomendações, caso não esteja listado aqui. São muitos os fatores considerados e discutidos quando recomendamos um projeto, e documentar cada um deles é um trabalho em curso.
-- Must be open source.
-- Must receive regular updates.
-- Must support a wide variety of hardware.
+- Deve ser de fonte aberta.
+- Deve receber atualizações regulares.
+- Deve suportar uma grande variedade de hardware.
diff --git a/i18n/pt/search-engines.md b/i18n/pt/search-engines.md
index af83d15d..7da54035 100644
--- a/i18n/pt/search-engines.md
+++ b/i18n/pt/search-engines.md
@@ -1,112 +1,114 @@
---
-meta_title: "Recommended Search Engines: Anonymous Google Alternatives - Privacy Guides"
+meta_title: "Motores de pesquisa recomendados: alternativas anónimas ao Google - Privacy Guides"
title: "Motores de Busca"
icon: material/search-web
-description: These privacy-respecting search engines don't build an advertising profile based on your searches.
+description: Estes motores de busca, que respeitam a privacidade, não criam um perfil de marketing com base nas suas pesquisas.
cover: search-engines.png
---
-Use um motor de busca que não construa um perfil publicitário baseado nas suas pesquisas.
+Utilize um motor de busca que não crie um perfil de marketing com base nas suas pesquisas.
-As recomendações aqui são baseadas nos méritos da política de privacidade de cada serviço. Há **sem garantia** de que estas políticas de privacidade sejam honradas.
+As recomendações aqui apresentadas baseiam-se nos méritos da política de privacidade de cada serviço. Não existe **qualquer garantia** de que estas políticas de privacidade sejam respeitadas.
-Considere usar um [VPN](/vpn) ou [Tor](https://www.torproject.org/) se o seu modelo de ameaça requer esconder o seu endereço IP do fornecedor de pesquisa.
+Considere a utilização de uma [VPN](vpn.md) ou o [Tor](https://www.torproject.org/), se o seu modelo de ameaça exigir a ocultação do seu endereço IP do motor de busca.
## Brave Search
!!! nota
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
- { align=right }
+ { align=right }
- **DuckDuckGo*** é um motor de busca popular e é o padrão para o Tor Browser. DuckDuckGo usa uma API comercial Bing e várias [outras fontes](https://help.duckduckgo.com/results/sources) para fornecer seus dados de pesquisa.
+ O **Brave Search** é desenvolvido pela Brave e apresenta resultados que resultam do seu próprio índice independente. O índice está otimizado para emular a pesquisa Google e, por esse motivo, está em condições de fornecer resultados mais precisos em termos contextuais do que outras alternativas.
- [Visite duckduckgo.com](https://duckduckgo.com){ .md-button .md-button--primary } [:pg-tor:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .md-button } [Política de Privacidade](https://duckduckgo.com/privacy){ .md-button }
+ O Brave Search inclui funcionalidades exclusivas, como as Discussões, que destacam resultados centrados em conversações, como publicações em fóruns.
- We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings.
+ Recomendamos que desative a opção [Métricas de utilização anónimas] (https://search.brave.com/help/usage-metrics), nas definições, uma vez que está ativada por defeito.
[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary }
- [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" }
- [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" }
- [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation}
+ [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Serviço Onion" }
+ [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Política de Privacidade" }
+ [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentação}
-Brave Search is based in the United States. Their [privacy policy](https://search.brave.com/help/privacy-policy) states they collect aggregated usage metrics, which includes the operating system and browser in use, however no personally identifiable information is collected. IP addresses are temporarily processed, but are not retained.
+O Brave Search está sediado nos Estados Unidos. A sua [ política de privacidade ](https://search.brave.com/help/privacy-policy) faz saber que recolhem métricas de utilização agregadas, que incluem o sistema operativo e o browser utilizado, mas não são recolhidas informações pessoais. Os endereços IP são processados temporariamente, mas não são armazenados.
## DuckDuckGo
!!! nota
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
- DuckDuckGo está sediado em 🇺🇸 US. Sua [Política de Privacidade](https://duckduckgo.com/privacy) declara que eles registram sua consulta de pesquisa, mas não o seu IP ou qualquer outra informação de identificação. The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results.
+ { align=right }
- DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser.
+ O **DuckDuckGo** é um dos motores de pesquisa mais comuns, no que toca à privacidade. De entre as suas notáveis funcionalidades de pesquisa, destque para os [bangs](https://duckduckgo.com/bang) e muitas [respostas instantâneas] (https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). Para fornecer os resultado, o motor de busca baseia-se numa API comercial do Bing, embora utilize diversas [outras fontes] (https://help.duckduckgo.com/results/sources/) para respostas instantâneas e outros resultados não primários.
+
+ O DuckDuckGo é o motor de busca predefinido do browser Tor e é uma das poucas opções disponíveis no browser Safari da Apple.
[:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary }
- [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" }
- [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" }
- [:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation}
+ [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Serviço Onion" }
+ [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Política de Privacidade" }
+ [:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentação}
-DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information.
+O DuckDuckGo está sediado nos Estados Unidos. A sua [política de privacidade](https://duckduckgo.com/privacy) faz saber que **são feitos** registos das suas pesquisas para fins de melhoria do produto, mas não o seu endereço IP ou qualquer outra informação de identificação pessoal.
-DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version.
+O DuckDuckGo oferece duas [outras versões](https://help.duckduckgo.com/features/non-javascript/) do seu motor de pesquisa, e ambas não requerem JavaScript. No entanto, estas versões carecem de funcionalidades. Estas versões também podem ser utilizadas em conjunto com o seu endereço [onion no Tor](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/), acrescentando [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) ou [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) para a respectiva versão.
## SearXNG
!!! nota
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
- { align=right }
+ { align=right }
- **Startpage** é um motor de pesquisa que fornece resultados de pesquisa do Google. É uma forma muito conveniente de obter resultados de pesquisa no Google sem experimentar padrões escuros, tais como capturas difíceis ou acesso recusado porque você usou um [VPN](/vpn) ou [Tor](https://www.torproject.org/download/).
+ **SearXNG** é um motor de meta-pesquisa de código aberto, auto-hospedado, que agrega os resultados de outros motores de busca, sem armazenar qualquer informação. É um fork de [SearX](https://github.com/searx/searx) com atualizações regulares.
- [Visite startpage.com](https://www.startpage.com){ .md-button .md-button--primary } [Política de Privacidade](https://www.startpage.com/en/privacy-policy){ .md-button }
+ [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary }
+ [:octicons-server-16:](https://searx.space/){ .card-link title="Instâncias públicas"}
+ [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Código-fonte" }
-SearXNG is a proxy between you and the search engines it aggregates from. Your search queries will still be sent to the search engines that SearXNG gets its results from.
+O SearXNG funciona como um proxy entre si e os motores de busca que agrega. As suas consultas de pesquisa continuarão a ser enviadas para os motores de busca, sendo os resultados obtidos pelo SearXNG.
-When self-hosting, it is important that you have other people using your instance so that the queries would blend in. You should be careful with where and how you are hosting SearXNG, as people looking up illegal content on your instance could draw unwanted attention from authorities.
+Ao usar a auto-hospedagem, é importante as outras pessoas utilizem a sua instância, de forma a que as consultas sejam integradas. Deve ter cuidado com o local e a forma como aloja o SearXNG, uma vez que as pessoas que procuram conteúdos ilegais na sua instância podem chamar a atenção indesejada das autoridades.
-When you are using a SearXNG instance, be sure to go read their privacy policy. Since SearXNG instances may be modified by their owners, they do not necessarily reflect their privacy policy. Some instances run as a Tor hidden service, which may grant some privacy as long as your search queries does not contain PII.
+Quando estiver a utilizar uma instância do SearXNG, certifique-se de que lê a política de privacidade. Uma vez que as instâncias do SearXNG podem ser modificadas pelos seus proprietários, não é garantido que sigam a sua política de privacidade. Algumas instâncias são executadas como um serviço oculto Tor, o que pode garantir alguma privacidade, desde que as suas consultas de pesquisa não contenham informações pessoais.
-## Startpage
+## StartPage
!!! nota
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
- { align=right }
- { align=right }
+ { align=right }
+ { align=right }
- **Startpage** is a private search engine known for serving Google search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead.
+ O **Startpage** é um motor de pesquisa com a privacidade em mente, conhecido por apresentar resultados de pesquisa do Google. Uma das características únicas do Startpage é a [Visualização anónima] (https://www.startpage.com/en/anonymous-view/), tentando normalizar a atividade do utilizador para que a sua identificação exclusiva seja dificultada. A funcionalidade pode ser útil para ocultar [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) propriedades da rede e do browser. Ao contrário do que o nome sugere, esta funcionalidade não deve ser utilizada para garantir o anonimato. Se procura anonimato, utilize o [Browser Tor] (tor.md#tor-browser).
[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary }
- [:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" }
- [:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
+ [:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Política de Privacidade" }
+ [:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentação}
-!!! Recomendamos que você verifique o [documentação](https://developers.yubico.com/SSH/) de Yubico sobre como configurar isso.
+!!! aviso
- Startpage regularly limits service access to certain IP addresses, such as IPs reserved for VPNs or Tor. [DuckDuckGo](#duckduckgo) and [Brave Search](#brave-search) are friendlier options if your threat model requires hiding your IP address from the search provider.
+ O Startpage limita regularmente o acesso a determinados endereços IP, tais como IPs reservados para VPNs ou Tor. O [DuckDuckGo](#duckduckgo) e o [Brave Search](#brave-search) são opções mais amigáveis, se o seu modelo de ameaça exigir que oculte o seu endereço IP do motor de busca.
-Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information.
+O Startpage está sediado nos Países Baixos. De acordo com a sua [política de privacidade](https://www.startpage.com/en/privacy-policy/), são registados detalhes como: sistema operativo, tipo de browser e idioma. Não registam o seu endereço IP, pesquisas ou outras informações de identificação pessoal.
-Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received.
+O acionista maioritário do Startpage é a System1, uma empresa marketing tecnológico. Não acreditamos que isso constitua um problema, uma vez que têm uma [ política de privacidade](https://system1.com/terms/privacy-policy) separada. A equipa do Privacy Guides contactou o Startpage [em 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) para esclarecer preocupações suscitadas pelo investimento considerável da System1 no serviço. Ficámos satisfeitos com as respostas que recebemos.
-## Framadate
+## Critérios
-**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
+**Note que não estamos associados a nenhum dos projetos que recomendamos.** Para além dos [nossos critérios padrão](about/criteria.md), temos um conjunto claro de requisitos que nos permitem fornecer recomendações objetivas. Sugerimos que se familiarize com esta lista antes de optar por um projeto e que desenvolva a sua própria investigação para garantir que se trata da escolha certa para si.
-!!! Considere o auto-hospedagem para mitigar esta ameaça.
+!!! exemplo "Esta secção é nova"
- { align=right }
-
- **PrivateBin** é um pastebin online minimalista e de código aberto onde o servidor tem zero conhecimento de dados colados. Os dados são criptografados/descriptografados no navegador usando AES de 256 bits. Psono suporta compartilhamento seguro de senhas, arquivos, marcadores e e-mails.
+ Estamos a trabalhar no sentido de estabelecer critérios para cada secção do nosso site, o que pode originar alterações. Se tiver alguma dúvida sobre os critérios utilizados, por favor [pergunte no nosso fórum] (https://discuss.privacyguides.net/latest) e não parta do princípio de que algo foi excluído das nossas recomendações, caso não esteja listado aqui. São muitos os fatores considerados e discutidos quando recomendamos um projeto, e documentar cada um deles é um trabalho em curso.
-### Minimum Requirements
+### Requisitos mínimos
-- Must not collect personally identifiable information per their privacy policy.
-- Must not allow users to create an account with them.
+- A sua política de privacidade deve garantir que não são recolhidas informações pessoais identificáveis.
+- Não deve ser obrigatório criar uma conta.
-### Best-Case
+### Melhor caso
-Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page.
+Os nossos melhores critérios representam o que gostaríamos de ver num projeto perfeito desta categoria. As nossas recomendações podem não incluir todas as funcionalidades, mas incluem as que, na nossa opinião, têm um impacto mais elevado.
-- Should be based on open-source software.
-- Should not block Tor exit node IP addresses.
+- Deve basear-se em software de fonte aberta.
+- Não deve bloquear os endereços IP dos nós de saída do Tor.
diff --git a/i18n/pt/tools.md b/i18n/pt/tools.md
index cf022dc0..90714cb5 100644
--- a/i18n/pt/tools.md
+++ b/i18n/pt/tools.md
@@ -1,488 +1,477 @@
---
-meta_title: "The Best Privacy Tools, Services, and Ad-Free Recommendations - Privacy Guides"
-title: "Ferramentas de Privacidade"
+meta_title: "As melhores ferramentas de privacidade, serviços e recomendações sem anúncios - Privacy Guides"
+title: "Ferramentas de privacidade"
icon: material/tools
hide:
- toc
-description: Privacy Guides is the most transparent and reliable website for finding software, apps, and services that protect your personal data from mass surveillance programs and other internet threats.
+description: O Privacy Guides é o site mais transparente e fiável para encontrar software, aplicações e serviços que protegem os seus dados pessoais contra programas de vigilância em massa e outras ameaças da Internet.
---
-Se você está procurando uma solução específica para algo, estas são as ferramentas de hardware e software que recomendamos em uma variedade de categorias. Nossas ferramentas de privacidade recomendadas são escolhidas principalmente com base em recursos de segurança, com ênfase adicional em ferramentas descentralizadas e de código aberto. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs.
+Se estiver à procura de uma solução específica para algo, estas são as ferramentas de hardware e software que recomendamos, numa variedade de categorias. As nossas ferramentas de privacidade recomendadas são escolhidas principalmente com base em características de segurança, com ênfase adicional em ferramentas descentralizadas e de código aberto. São aplicáveis a uma variedade de modelos de ameaças, desde a proteção contra programas globais de vigilância em massa efetuada por grandes empresas tecnológicas até à atenuação de ataques, mas só o utilizador poderá determinar o que melhor se adequa às suas necessidades.
-If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community!
+Se necessitar de ajuda para descobrir as melhores ferramentas de privacidade e programas alternativos para as suas necessidades, inicie uma discussão no nosso [fórum](https://discuss.privacyguides.net/) ou na nossa comunidade [Matrix](https://matrix.to/#/#privacyguides:matrix.org)!
-For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page.
+Para obter mais detalhes sobre cada projeto, o motivo pelo qual foi escolhido e dicas ou truques adicionais que recomendamos, clique na ligação "Saiba mais" em cada secção, ou clique na própria recomendação para consultar essa secção específica da página.
-## Tor Network
+## Rede Tor
-1. Snowflake does not increase privacy, however it allows you to easily contribute to the Tor network and help people in censored networks achieve better privacy.
+1. O Snowflake não aumenta a privacidade, mas permite-lhe contribuir facilmente para a rede Tor e ajudar as pessoas em redes censuradas a obter uma maior privacidade.
-[Saiba mais...](tor.md)
+[Saiba mais :material-arrow-right-drop-circle:](tor.md)
-## Sistemas Operacionais
+## Browsers para Desktop
-[Saiba mais...](desktop-browsers.md#additional-resources)
+[Saiba mais :material-arrow-right-drop-circle:](desktop-browsers.md#additional-resources)
-## Prestadores de serviços
+## Browsers para dispositivos móveis
-
-[Saiba mais...](cloud.md)
-
-### DNS
-
-#### DNS Providers
-
-We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended.
-
-[Saiba mais...](dns.md)
-
-#### Encrypted DNS Proxies
-
-
-
-[Saiba mais...](search-engines.md)
-
-### VPN Providers
-
-Recomendamos armazenar uma chave de recuperação local em um local seguro, em vez de utilizar a recuperação do iCloud FileVault. perigo "As VPNs não proporcionam anonimato".
-
- Usando uma VPN **não*** manterá seus hábitos de navegação anônimos, nem adicionará segurança adicional ao tráfego não seguro (HTTP).
-
- Se você está procurando por **anonimato**, você deve usar o Navegador Tor **em vez de** de uma VPN.
-
- Se você está procurando por **security** adicionado, você deve sempre garantir que você está se conectando a sites usando [HTTPS](https://en.wikipedia.org/wiki/HTTPS). Uma VPN não é um substituto para as boas práticas de segurança.
-
- [Saiba mais](vpn.md)
-
-
-
-[Saiba mais...](email-clients.md)
-
-### Software de encriptação
-
-Recomendamos armazenar uma chave de recuperação local em um local seguro, em vez de utilizar a recuperação do iCloud FileVault. info "Operating System Disk Encryption"
-
- Para criptografar a unidade do seu sistema operacional, normalmente recomendamos usar qualquer ferramenta de criptografia que o seu sistema operacional forneça, seja **BitLocker** no Windows, **FileVault** no MacOS, ou **LUKS*** no Linux. Estas ferramentas estão disponíveis fora da caixa e normalmente utilizam elementos de encriptação de hardware como um TPM que outros softwares de encriptação de disco completo como o VeraCrypt não utilizarão. O VeraCrypt ainda é adequado para discos de sistemas não operacionais, como acionamentos externos, especialmente acionamentos que podem ser acessados de vários sistemas operacionais.
-
- [Saiba mais](encryption.md###operating-system-included-full-disk-encryption-fde)
-
-
-[Saiba mais...](desktop.md)
+[Saiba mais :material-arrow-right-drop-circle:](cloud.md)
-### Router Firmware
+### DNS
+
+#### Fornecedores de DNS
+
+Com base em vários critérios, [recomendamos](dns.md#recommended-providers) uma série de servidores DNS encriptados, como o [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) e o [Quad9](https://quad9.net/), entre outros. Recomendamos que leia as nossas páginas sobre DNS antes de escolher um fornecedor. Em muitos casos, a utilização de um fornecedor de DNS alternativo não é recomendada.
+
+[Saiba mais :material-arrow-right-drop-circle:](dns.md)
+
+#### Proxies DNS encriptados
+
+[Saiba mais :material-arrow-right-drop-circle:](search-engines.md)
+
+### Fornecedores de VPN
+
+Recomendamos armazenar uma chave de recuperação local em um local seguro, em vez de utilizar a recuperação do iCloud FileVault. perigo "As VPNs não proporcionam anonimato"
+
+ A utilização de uma VPN **não** manterá os seus hábitos de navegação anónimos, nem acrescentará segurança adicional ao tráfego não seguro (HTTP).
+
+ Se procura **anonimato**, deve utilizar o browser Tor, **em vez** de uma VPN.
+
+ Se procura mais **segurança**, deve sempre garantir que se liga a sites utilizando HTTPS. Uma VPN não substitui as boas práticas de segurança.
+
+ [Saiba mais :material-arrow-right-drop-circle:](vpn.md)
+
+
+
+[Saiba mais :material-arrow-right-drop-circle:](email-clients.md)
+
+### Software de encriptação
+
+Recomendamos armazenar uma chave de recuperação local em um local seguro, em vez de utilizar a recuperação do iCloud FileVault. informação "Encriptação de discos do sistema operativo"
+
+ Para encriptar a unidade de disco, recomendamos normalmente a utilização das ferramentas de encriptação fornecidas pelo seu sistema operativo, quer seja **BitLocker** no Windows, **FileVault** no macOS ou **LUKS** no Linux. Estas ferramentas estão incluídas no sistema operativo e, normalmente, utilizam elementos de encriptação de hardware, como o TPM, que outros softwares de encriptação de disco completo, como o VeraCrypt, não utilizam. O VeraCrypt é ainda adequado para discos de sistemas não operativos, tais como unidades externas, especialmente unidades que podem ser acedidas a partir de vários sistemas operativos.
+
+ [Saiba mais :material-arrow-right-drop-circle:](encryption.md##operating-system-included-full-disk-encryption-fde)
+
+
+
+[Saiba mais :material-arrow-right-drop-circle:](router.md)
diff --git a/i18n/pt/video-streaming.md b/i18n/pt/video-streaming.md
index 239edb71..c90f9ba7 100644
--- a/i18n/pt/video-streaming.md
+++ b/i18n/pt/video-streaming.md
@@ -1,25 +1,27 @@
---
-title: "Transmissão de vídeo"
+title: "Streaming de vídeo"
icon: material/video-wireless
-description: These networks allow you to stream internet content without building an advertising profile based on your interests.
+description: Estas redes permitem-lhe fazer streaming de conteúdos na Internet sem que seja necessário criar um perfil baseado nos seus interesses.
cover: video-streaming.png
---
-A principal ameaça ao usar uma plataforma de streaming de vídeo é que os seus hábitos de streaming e listas de assinaturas podem ser usados para traçar o seu perfil. Você deve combinar estas ferramentas com um [VPN](/vpn) ou [Tor](https://www.torproject.org/) para tornar mais difícil o perfil do seu uso.
+A principal ameaça quando se utiliza uma plataforma de streaming de vídeo é que os seus hábitos de streaming e listas de subscrição podem ser utilizados para traçar o seu perfil. Deve combinar estas ferramentas com uma [VPN](vpn.md) ou [com o Tor](https://www.torproject.org/), de forma a dificultar a definição do seu perfil de utilização.
-## Clientes
+## LBRY
!!! nota
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
- Ao usar o Freetube, seu endereço IP ainda é conhecido pelo YouTube, [Invidious](https://instances.invidious.io) e as instâncias SponsorBlock que você usa. It uses a [BitTorrent](https://wikipedia.org/wiki/BitTorrent)-like network to store the video content, and a [blockchain](https://wikipedia.org/wiki/Blockchain) to store the indexes for those videos. The main benefit of this design is censorship resistance.
+ { align=right }
- **The LBRY desktop client** helps you stream videos from the LBRY network and stores your subscription list in your own LBRY wallet.
+ **A rede LBRY** é uma rede descentralizada de partilha de vídeos. Utiliza uma rede do tipo [BitTorrent](https://wikipedia.org/wiki/BitTorrent) para armazenar o conteúdo de vídeo e uma rede do tipo [blockchain](https://wikipedia.org/wiki/Blockchain) para armazenar os índices desses vídeos. A principal vantagem deste modelo conceptual é a resistência à censura.
+
+ **O cliente de desktop LBRY** ajuda-o a fazer stream vídeos da rede LBRY e armazena a sua lista de subscrições na sua própria carteira LBRY.
[:octicons-home-16: Homepage](https://lbry.com){ .md-button .md-button--primary }
- [:octicons-eye-16:](https://lbry.com/privacypolicy){ .card-link title="Privacy Policy" }
- [:octicons-info-16:](https://lbry.com/faq){ .card-link title=Documentation}
- [:octicons-code-16:](https://github.com/lbryio/lbry-desktop){ .card-link title="Source Code" }
+ [:octicons-eye-16:](https://lbry.com/privacypolicy){ .card-link title="Política de Privacidade" }
+ [:octicons-info-16:](https://lbry.com/faq){ .card-link title=Documentação}
+ [:octicons-code-16:](https://github.com/lbryio/lbry-desktop){ .card-link title="Código-fonte" }
??? downloads
@@ -27,27 +29,25 @@ A principal ameaça ao usar uma plataforma de streaming de vídeo é que os seus
- [:simple-apple: macOS](https://lbry.com/osx)
- [:simple-linux: Linux](https://lbry.com/linux)
-!!! note
+!!! nota
- Only the **LBRY desktop client** is recommended, as the [Odysee](https://odysee.com) website and the LBRY clients in F-Droid, Play Store, and the App Store have mandatory synchronization and telemetry.
+ Apenas recomendamos a utilização do **cliente LBRY para desktop**, uma vez que o site [Odysee](https://odysee.com) e os clientes LBRY no F-Droid, Play Store e App Store têm sincronização e telemetria obrigatórias.
-!!! Recomendamos que você verifique o [documentação](https://developers.yubico.com/SSH/) de Yubico sobre como configurar isso.
+!!! aviso
- While watching and hosting videos, your IP address is visible to the LBRY network. Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
+ Durante a visualização e hospedagem de vídeos, o seu endereço IP fica visível para a rede LBRY. Considere a utilização de uma [VPN](vpn.md) ou [Tor](https://www.torproject.org) se o seu [modelo de ameaça](basics/threat-modeling.md) exigir a ocultação do seu endereço IP.
-We recommend **against** synchronizing your wallet with LBRY Inc., as synchronizing encrypted wallets is not supported yet. If you synchronize your wallet with LBRY Inc., you have to trust them to not look at your subscription list, [LBC](https://lbry.com/faq/earn-credits) funds, or take control of your channel.
+Recomendamos ** que não sincronize** a sua carteira com a LBRY Inc., uma vez que a sincronização de carteiras encriptadas ainda não é suportada. Se sincronizar a sua carteira com a LBRY Inc., terá de confiar que a lista de subscrições não será acedida, ou divulgada a fundos [LBC](https://lbry.com/faq/earn-credits), ou mesmo que o controle do canal possa ser assumido indevidamente.
-You can disable *Save hosting data to help the LBRY network* option in :gear: **Settings** → **Advanced Settings**, to avoid exposing your IP address and watched videos when using LBRY for a prolonged period of time.
+Pode desativar a opção *Guardar dados de alojamento para ajudar a rede LBRY* em :gear: **Definições** → **Definições avançadas**, para evitar a exposição do seu endereço IP e dos vídeos vistos quando utilizar LBRY durante um período de tempo prolongado.
-## Framadate
+## Critérios
-**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
+**Note que não estamos associados a nenhum dos projetos que recomendamos.** Para além dos [nossos critérios padrão](about/criteria.md), desenvolvemos um conjunto claro de requisitos que nos permitem fornecer recomendações objetivas. Sugerimos que se familiarize com esta lista antes de optar pela utilização de um projeto, e que faça a sua própria investigação para garantir que a escolha que faz é a certa para si.
-!!! Considere o auto-hospedagem para mitigar esta ameaça.
+!!! exemplo "Esta secção é nova"
- { align=right }
-
- **PrivateBin** é um pastebin online minimalista e de código aberto onde o servidor tem zero conhecimento de dados colados. Os dados são criptografados/descriptografados no navegador usando AES de 256 bits. Psono suporta compartilhamento seguro de senhas, arquivos, marcadores e e-mails.
+ Estamos a trabalhar no sentido de definir critérios para cada secção do nosso site, o que pode dar origem a alterações. Se tiver alguma dúvida sobre os nossos critérios, por favor [pergunte no nosso fórum] (https://discuss.privacyguides.net/latest) e não parta do princípio de que omitimos algum projeto nas nossas recomendações, caso ele não se encontre nas nossas recomendações. São muitos os fatores considerados e discutidos quando recomendamos um projeto, e a documentação de cada um deles é um trabalho em curso.
-- Must not require a centralized account to view videos.
- - Decentralized authentication, such as via a mobile wallet's private key is acceptable.
+- Não deve ser exigida uma conta centralizada para visualizar vídeos.
+ - A autenticação descentralizada através da chave privada de uma carteira móvel é aceitável.
diff --git a/i18n/ru/advanced/dns-overview.md b/i18n/ru/advanced/dns-overview.md
index 142645d8..945691ce 100644
--- a/i18n/ru/advanced/dns-overview.md
+++ b/i18n/ru/advanced/dns-overview.md
@@ -8,23 +8,23 @@ description: Система доменных имен - это "телефонн
## Что такое DNS?
-When you visit a website, a numerical address is returned. For example, when you visit `privacyguides.org`, the address `192.98.54.105` is returned.
+Когда вы посещаете веб-сайт, вам возвращается числовой адрес. Например, при посещении сайта `privacyguides.org`возвращается адрес `192.98.54.105`.
-DNS has existed since the [early days](https://en.wikipedia.org/wiki/Domain_Name_System#History) of the Internet. DNS requests made to and from DNS servers are **not** generally encrypted. In a residential setting, a customer is given servers by the ISP via [DHCP](https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol).
+DNS существует с [первых дней](https://en.wikipedia.org/wiki/Domain_Name_System#History) существования Интернета. DNS-запросы, направляемые на DNS-серверы и от них, обычно **не** зашифрованы. Клиент получает серверы от провайдера через [DHCP](https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol) по месту жительства.
-Unencrypted DNS requests are able to be easily **surveilled** and **modified** in transit. In some parts of the world, ISPs are ordered to do primitive [DNS filtering](https://en.wikipedia.org/wiki/DNS_blocking). When you request the IP address of a domain that is blocked, the server may not respond or may respond with a different IP address. As the DNS protocol is not encrypted, the ISP (or any network operator) can use [DPI](https://en.wikipedia.org/wiki/Deep_packet_inspection) to monitor requests. ISPs can also block requests based on common characteristics, regardless of which DNS server is used. Unencrypted DNS always uses [port](https://en.wikipedia.org/wiki/Port_(computer_networking)) 53 and always uses UDP.
+Незашифрованные DNS запросы могут быть легко **подсмотрены** и **изменены** во время передачи. В некоторых частях мира интернет-провайдеры обязаны осуществлять примитивную [DNS-фильтрацию](https://en.wikipedia.org/wiki/DNS_blocking). Когда вы запрашиваете IP-адрес домена, который заблокирован, сервер может не ответить или ответить другим IP-адресом. Поскольку протокол DNS не зашифрован, провайдер (или любой оператор сети) может использовать [DPI](https://en.wikipedia.org/wiki/Deep_packet_inspection) для мониторинга запросов. Интернет-провайдеры также могут блокировать запросы на основе общих характеристик, независимо от того, какой DNS-сервер используется. Незашифрованный DNS всегда использует [порт](https://en.wikipedia.org/wiki/Port_(computer_networking)) 53 и UDP.
-Below, we discuss and provide a tutorial to prove what an outside observer may see using regular unencrypted DNS and [encrypted DNS](#what-is-encrypted-dns).
+Ниже мы рассмотрим и предоставим учебное пособие для доказательства того, что может увидеть сторонний наблюдатель, используя обычный незашифрованный DNS и [зашифрованный DNS](#what-is-encrypted-dns).
### Незашифрованный DNS
-1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified:
+1. Используя [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (часть проекта [Wireshark](https://en.wikipedia.org/wiki/Wireshark)), мы можем отслеживать и записывать поток интернет-пакетов. Эта команда записывает пакеты, которые соответствуют заданным правилам:
```bash
tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8
```
-2. We can then use [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS, etc.) or [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) to send the DNS lookup to both servers. Software such as web browsers do these lookups automatically, unless they are configured to use encrypted DNS.
+2. Затем мы можем использовать [`dig`](https://en.wikipedia.org/wiki/Dig_(command)) (Linux, MacOS и т.д.) или [`nslookup`](https://en.wikipedia.org/wiki/Nslookup) (Windows) для поиска DNS на обоих серверах. Такие программы, как веб-браузеры, выполняют эти поиски автоматически, если только они не настроены на использование зашифрованного DNS.
=== "Linux, macOS"
@@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s
nslookup privacyguides.org 8.8.8.8
```
-3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results:
+3. Далее мы хотим [проанализировать](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) результаты:
=== "Wireshark"
@@ -53,16 +53,16 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s
tshark -r /tmp/dns.pcap
```
-If you run the Wireshark command above, the top pane shows the "[frames](https://en.wikipedia.org/wiki/Ethernet_frame)", and the bottom pane shows all the data about the selected frame. Enterprise filtering and monitoring solutions (such as those purchased by governments) can do the process automatically, without human interaction, and can aggregate those frames to produce statistical data useful to the network observer.
+Если вы pfgecnbnt приведенную выше команду Wireshark, на верхней панели отобразится "[frames](https://en.wikipedia.org/wiki/Ethernet_frame)", а на нижней - все данные о выбранном кадре(frame). Корпоративные решения для фильтрации и мониторинга (например, те, которые приобретаются правительствами) могут выполнять этот процесс автоматически, без участия человека, и могут собирать эти frames для получения статистических данных, полезных для сетевого наблюдателя.
-| № | Время | Источник | Назначение | Протокол | Длина | Инфо |
-| - | -------- | --------- | ---------- | -------- | ----- | ---------------------------------------------------------------------- |
-| 1 | 0.000000 | 192.0.2.1 | 1.1.1.1 | DNS | 104 | Standard query 0x58ba A privacyguides.org OPT |
-| 2 | 0.293395 | 1.1.1.1 | 192.0.2.1 | DNS | 108 | Standard query response 0x58ba A privacyguides.org A 198.98.54.105 OPT |
-| 3 | 1.682109 | 192.0.2.1 | 8.8.8.8 | DNS | 104 | Standard query 0xf1a9 A privacyguides.org OPT |
-| 4 | 2.154698 | 8.8.8.8 | 192.0.2.1 | DNS | 108 | Standard query response 0xf1a9 A privacyguides.org A 198.98.54.105 OPT |
+| No. (Номер) | Time (Время) | Source (Источник) | Destination (Назначение) | Protocol (Протокол) | Length (Длина) | Info (Инфо) |
+| ----------- | ------------ | ----------------- | ------------------------ | ------------------- | -------------- | ---------------------------------------------------------------------- |
+| 1 | 0.000000 | 192.0.2.1 | 1.1.1.1 | DNS | 104 | Standard query 0x58ba A privacyguides.org OPT |
+| 2 | 0.293395 | 1.1.1.1 | 192.0.2.1 | DNS | 108 | Standard query response 0x58ba A privacyguides.org A 198.98.54.105 OPT |
+| 3 | 1.682109 | 192.0.2.1 | 8.8.8.8 | DNS | 104 | Standard query 0xf1a9 A privacyguides.org OPT |
+| 4 | 2.154698 | 8.8.8.8 | 192.0.2.1 | DNS | 108 | Standard query response 0xf1a9 A privacyguides.org A 198.98.54.105 OPT |
-An observer could modify any of these packets.
+Наблюдатель может изменить любой из этих пакетов.
## Что такое "зашифрованный DNS"?
@@ -70,79 +70,79 @@ An observer could modify any of these packets.
### DNSCrypt
-[**DNSCrypt**](https://en.wikipedia.org/wiki/DNSCrypt) was one of the first methods of encrypting DNS queries. DNSCrypt operates on port 443 and works with both the TCP or UDP transport protocols. DNSCrypt has never been submitted to the [Internet Engineering Task Force (IETF)](https://en.wikipedia.org/wiki/Internet_Engineering_Task_Force) nor has it gone through the [Request for Comments (RFC)](https://en.wikipedia.org/wiki/Request_for_Comments) process, so it has not been used widely outside of a few [implementations](https://dnscrypt.info/implementations). As a result, it has been largely replaced by the more popular [DNS over HTTPS](#dns-over-https-doh).
+[**DNSCrypt**](https://en.wikipedia.org/wiki/DNSCrypt) был одним из первых методов шифрования DNS-запросов. DNSCrypt работает через порт 443 и работает с транспортными протоколами TCP или UDP. DNSCrypt никогда не был представлен в [Internet Engineering Task Force (IETF)](https://en.wikipedia.org/wiki/Internet_Engineering_Task_Force) и не проходил через [Request for Comments (RFC)](https://en.wikipedia.org/wiki/Request_for_Comments) процесс, поэтому он не использовался широко за пределами нескольких [реализаций](https://dnscrypt.info/implementations). В результате он был в значительной степени заменён более популярным [DNS через HTTPS](#dns-over-https-doh).
### DNS через TLS (DoT)
-[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls.
+[**DNS через TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) - это еще один метод шифрования DNS-коммуникаций, который определен в [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Впервые поддержка была реализована в Android 9, iOS 14 и в Linux в [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) в версии 237. В последние годы предпочтение в этой отрасли отошло от DoT к DoH, поскольку DoT является [комплексным протоколом](https://dnscrypt.info/faq/) и имеет различное соответствие RFC между существующими реализациями. DoT также работает на выделенном порту 853, который может быть легко заблокирован брандмауэрами.
### DNS через HTTPS (DoH)
-[**DNS over HTTPS**](https://en.wikipedia.org/wiki/DNS_over_HTTPS) as defined in [RFC 8484](https://datatracker.ietf.org/doc/html/rfc8484) packages queries in the [HTTP/2](https://en.wikipedia.org/wiki/HTTP/2) protocol and provides security with HTTPS. Support was first added in web browsers such as Firefox 60 and Chrome 83.
+[**DNS через HTTPS**](https://en.wikipedia.org/wiki/DNS_over_HTTPS) как определено в [RFC 8484](https://datatracker.ietf.org/doc/html/rfc8484) упаковывает запросы в [HTTP/2](https://en.wikipedia.org/wiki/HTTP/2) протокол и обеспечивает безопасность с помощью HTTPS. Впервые поддержка была добавлена в таких браузерах, как Firefox 60 и Chrome 83.
-Native implementation of DoH showed up in iOS 14, macOS 11, Microsoft Windows, and Android 13 (however, it won't be enabled [by default](https://android-review.googlesource.com/c/platform/packages/modules/DnsResolver/+/1833144)). General Linux desktop support is waiting on the systemd [implementation](https://github.com/systemd/systemd/issues/8639) so [installing third-party software is still required](../dns.md#encrypted-dns-proxies).
+Нативная реализация DoH появилась в iOS 14, macOS 11, Microsoft Windows и Android 13 (однако она не будет включена [по умолчанию](https://android-review.googlesource.com/c/platform/packages/modules/DnsResolver/+/1833144)). Общая поддержка Linux'а ожидает [реализации](https://github.com/systemd/systemd/issues/8639) systemd, поэтому [всё еще требуется установка стороннего программного обеспечения](../dns.md#encrypted-dns-proxies).
-## What can an outside party see?
+## Что может увидеть посторонний человек?
-In this example we will record what happens when we make a DoH request:
+В этом примере мы запишем, что происходит, когда мы делаем запрос DoH:
-1. First, start `tshark`:
+1. Сначала запустите `tshark`:
```bash
tshark -w /tmp/dns_doh.pcap -f "tcp port https and host 1.1.1.1"
```
-2. Second, make a request with `curl`:
+2. Во-вторых, сделайте запрос с помощью `curl`:
```bash
curl -vI --doh-url https://1.1.1.1/dns-query https://privacyguides.org
```
-3. After making the request, we can stop the packet capture with CTRL + C.
+3. После выполнения запроса мы можем остановить захват пакетов с помощью CTRL + C.
-4. Analyse the results in Wireshark:
+4. Проанализируйте результаты в программе Wireshark:
```bash
wireshark -r /tmp/dns_doh.pcap
```
-We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned.
+Мы видим [установление соединения](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) и [TLS-рукопожатие](https://www.cloudflare.com/ru-ru/learning/ssl/what-happens-in-a-tls-handshake/), которое происходит при любом зашифрованном соединении. При просмотре последующих пакетов "данных приложения" ни один из них не содержит запрашиваемого нами домена или возвращаемого IP-адреса.
-## Почему **не следует** использовать зашифрованный DNS?
+## Почему мне **не следует** использовать зашифрованный DNS?
-In locations where there is internet filtering (or censorship), visiting forbidden resources may have its own consequences which you should consider in your [threat model](../basics/threat-modeling.md). We do **not** suggest the use of encrypted DNS for this purpose. Use [Tor](https://torproject.org) or a [VPN](../vpn.md) instead. If you're using a VPN, you should use your VPN's DNS servers. When using a VPN, you are already trusting them with all your network activity.
+В местах, где существует фильтрация интернета (или цензура), посещение запрещенных ресурсов может иметь свои последствия, которые следует учитывать в [модели угроз](../basics/threat-modeling.md). Мы **не** предлагаем использовать для этих целей зашифрованный DNS. Вместо этого используйте [Tor](https://torproject.org) или [VPN](../vpn.md). Если вы используете VPN, вам следует использовать DNS-серверы вашего VPN. Используя VPN, вы уже доверяете им всю свою сетевую активность.
-When we do a DNS lookup, it's generally because we want to access a resource. Below, we will discuss some of the methods that may disclose your browsing activities even when using encrypted DNS:
+Когда мы выполняем поиск в DNS, это, как правило, связано с тем, что мы хотим получить доступ к ресурсу. Ниже мы покажем некоторые методы, которые могут раскрыть вашу активность в интернете, даже при использовании зашифрованного DNS:
### IP-адрес
-The simplest way to determine browsing activity might be to look at the IP addresses your devices are accessing. For example, if the observer knows that `privacyguides.org` is at `198.98.54.105`, and your device is requesting data from `198.98.54.105`, there is a good chance you're visiting Privacy Guides.
+Самым простым способом определения активности в интернете может быть просмотр IP-адресов, к которым обращаются ваши устройства. Например, если наблюдатель знает, что сайт `privacyguides.org` находится по адресу `198.98.54.105`, а ваше устройство запрашивает данные с `198.98.54.105`, то велика вероятность, что вы посещаете Privacy Guides.
-This method is only useful when the IP address belongs to a server that only hosts few websites. It's also not very useful if the site is hosted on a shared platform (e.g. Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger, etc.). It also isn't very useful if the server is hosted behind a [reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy), which is very common on the modern Internet.
+Этот метод полезен только в том случае, если IP-адрес принадлежит серверу, на котором размещено всего несколько веб-сайтов. Он также не очень полезен, если сайт размещен на общей платформе (например, Github Pages, Cloudflare Pages, Netlify, WordPress, Blogger и т.д.). Он также не очень полезен, если сервер размещен за [обратным прокси](https://en.wikipedia.org/wiki/Reverse_proxy), что очень часто встречается в современном интернете.
-### Server Name Indication (SNI)
+### Индикация имени сервера (SNI)
-Server Name Indication is typically used when a IP address hosts many websites. This could be a service like Cloudflare, or some other [Denial-of-service attack](https://en.wikipedia.org/wiki/Denial-of-service_attack) protection.
+Индикация имени сервера обычно используется, когда на одном IP-адресе размещается множество веб-сайтов. Это может быть сервис, например Cloudflare, или какая-либо другая защита от [Denial-of-Service атак](https://en.wikipedia.org/wiki/Denial-of-service_attack).
-1. Start capturing again with `tshark`. We've added a filter with our IP address so you don't capture many packets:
+1. Снова запустите захват с помощью `tshark`. Мы добавили фильтр с нашим IP-адресом, чтобы не перехватывать много пакетов:
```bash
tshark -w /tmp/pg.pcap port 443 and host 198.98.54.105
```
-2. Then we visit [https://privacyguides.org](https://privacyguides.org).
+2. Затем мы посетим сайт [https://privacyguides.org](https://privacyguides.org).
-3. After visiting the website, we want to stop the packet capture with CTRL + C.
+3. После посещения сайта мы хотим остановить захват пакетов с помощью CTRL + C.
-4. Next we want to analyze the results:
+4. Далее мы хотим проанализировать полученные результаты:
```bash
wireshark -r /tmp/pg.pcap
```
- We will see the connection establishment, followed by the TLS handshake for the Privacy Guides website. Around frame 5. you'll see a "Client Hello".
+ Мы увидим установление соединения, а затем TLS-рукопожатие для сайта Privacy Guides. Около frame 5. вы увидите "Client Hello".
-5. Expand the triangle ▸ next to each field:
+5. Раскройте треугольник ▸ рядом с каждым полем:
```text
▸ Transport Layer Security
diff --git a/i18n/ru/basics/account-deletion.md b/i18n/ru/basics/account-deletion.md
index abce4392..6ef0f1fe 100644
--- a/i18n/ru/basics/account-deletion.md
+++ b/i18n/ru/basics/account-deletion.md
@@ -1,16 +1,16 @@
---
title: "Удаление аккаунта"
icon: 'material/account-remove'
-description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection.
+description: Легко накопить большое количество интернет-аккаунтов, вот несколько советов о том, как уменьшить их количество.
---
-Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence.
+Со временем можно легко накопить множество учетных записей в Интернете, многие из которых вы можете уже не использовать. Удаление этих неиспользуемых учетных записей - важный шаг в восстановлении конфиденциальности, поскольку неиспользуемые учетные записи уязвимы для утечки данных. Утечка данных - это когда безопасность сервиса скомпрометирована, и защищенная информация просматривается, передается или похищается неавторизованными лицами. К сожалению, утечки данных - [слишком частое](https://haveibeenpwned.com/PwnedWebsites) явление в наши дни, поэтому соблюдение правил цифровой гигиены - лучший способ минимизировать их влияние на вашу жизнь. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence.
-## Finding Old Accounts
+## Поиск старых аккаунтов
-### Password Manager
+### Менеджер паролей
-If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/).
+Если у вас есть менеджер паролей, которым вы пользовались на протяжении всей своей цифровой жизни, то эта часть будет очень простой. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/).

diff --git a/i18n/ru/basics/why-privacy-matters.md b/i18n/ru/basics/why-privacy-matters.md
index ad12fc27..75b29812 100644
--- a/i18n/ru/basics/why-privacy-matters.md
+++ b/i18n/ru/basics/why-privacy-matters.md
@@ -19,18 +19,18 @@ icon: 'material/shield-account'
**Безопасность**
:
-Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates.
+Безопасность - это возможность доверять приложениям (которые вы используете), что участвующие стороны являются теми, за кого себя выдают, и обеспечивать безопасность этих приложений. В контексте активности в интернете, безопасность может быть обеспечена сертификатами HTTPS.
:
-Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website.
+Сертификаты подтверждают, что вы напрямую общаетесь с посещаемым сайтом, и не позволяют злоумышленникам в вашей сети читать или изменять данные, отправленные на сайт или с сайта.
**Анонимность**
:
-Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own.
+Анонимность - это возможность действовать без постоянного идентификатора. Вы можете достичь этого в интернете с помощью [Tor](../tor.md), который позволяет просматривать интернет со случайным IP-адресом и сетевым подключением вместо вашего собственного.
:
-**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
+**Псевдонимность** является похожим понятием, но оно позволяет иметь постоянный идентификатор без его привязки к вашей реальной личности. Если в интернете все знают вас как `@GamerGuy12`, но никто не знает вашего настоящего имени, это и есть ваш псевдоним.
Все эти понятия накладываются друг на друга, и возможно любое их сочетание. Для большинства людей оптимальный вариант - когда все эти три понятия пересекаются. Однако добиться этого гораздо сложнее, чем многие думают на первый взгляд. Иногда приходится идти на компромисс в некоторых вопросах, и это тоже нормально. Вот где **моделирование угроз** становится важным, позволяя вам принимать обоснованные решения относительно [программ и услуг](../tools.md), которые вы используете.
diff --git a/i18n/ru/desktop-browsers.md b/i18n/ru/desktop-browsers.md
index fd1e6ee9..8fd4416c 100644
--- a/i18n/ru/desktop-browsers.md
+++ b/i18n/ru/desktop-browsers.md
@@ -341,7 +341,7 @@ Brave содержит несколько инструментов защиты
**Обрати внимание, что у нас нет связей ни с одним проектом, который мы рекомендуем.** В дополнение к [нашим стандартным критериям](about/criteria.md) мы разработали четкий набор требований, позволяющий давать объективные рекомендации. Мы рекомендуем тебе ознакомиться с этим списком, прежде чем выбрать продукт, и провести собственное исследование, чтобы убедиться в правильности своего выбора.
-!!! example "Это новая секция"
+!!! example "Это новый раздел"
Мы сейчас работаем над установлением точных критериев для каждого раздела нашего сайта, поэтому они могут поменяться в будущем. Если у тебя есть вопросы относительно наших критериев, [задай вопрос на нашем форуме](https://discuss.privacyguides.net/latest). Не делай вывод, что мы что-то не учли при составлении наших рекомендаций, если это здесь не указано. Мы учитываем и обсуждаем много факторов, перед тем как рекомендовать какой-то проект, и документирование каждого из них ещё не завершено.
diff --git a/i18n/ru/mobile-browsers.md b/i18n/ru/mobile-browsers.md
index 9181b0cb..947539f3 100644
--- a/i18n/ru/mobile-browsers.md
+++ b/i18n/ru/mobile-browsers.md
@@ -209,7 +209,7 @@ Brave включает несколько инструментов защиты
**Обрати внимание, что у нас нет связей ни с одним проектом, который мы рекомендуем.** В дополнение к [нашим стандартным критериям](about/criteria.md) мы разработали четкий набор требований, позволяющий давать объективные рекомендации. Мы рекомендуем тебе ознакомиться с этим списком, прежде чем выбрать продукт, и провести собственное исследование, чтобы убедиться в правильности своего выбора.
-!!! example "Это новая секция"
+!!! example "Это новый раздел"
Мы сейчас работаем над установлением точных критериев для каждого раздела нашего сайта, поэтому они могут поменяться в будущем. Если у тебя есть вопросы по поводу наших критериев, пожалуйста, [задавай их на нашем форуме](https://discuss.privacyguides.net/latest) и не думай, что мы не учли что-то при составлении наших рекомендаций, если это не указано здесь. Мы учитываем и обсуждаем много факторов, перед тем как рекомендовать какой-то проект, и документирование каждого из них ещё не завершено.
diff --git a/i18n/ru/notebooks.md b/i18n/ru/notebooks.md
index b92a07e2..57a71b10 100644
--- a/i18n/ru/notebooks.md
+++ b/i18n/ru/notebooks.md
@@ -39,17 +39,17 @@ cover: notebooks.png
!!! recommendation
- { align=right }
+ { align=right }
- **Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/).
+ **Notesnook** - это бесплатное (на словах) & приложение для ведения заметок с открытым исходным кодом, ориентированное на конфиденциальность пользователей & простоту использования. В нем реализовано сквозное шифрование на всех платформах и мощная синхронизация, позволяющая делать заметки на ходу. Вы можете легко импортировать свои заметки из Evernote, OneNote & и многих других приложений, используя их [официальный импортер] (https://importer.notesnook.com/).
- [:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary }
- [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" }
- [:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation}
- [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" }
- [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute }
+ [:octicons-home-16: Домашняя страница](https://notesnook.com/){ .md-button .md-button--primary }
+ [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Политика конфиленциальности" }
+ [:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Документация}
+ [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Исходный код" }
+ [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Поддержать }
- ??? downloads
+ ??? downloads "Скачать"
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook)
- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013)
@@ -60,7 +60,7 @@ cover: notebooks.png
- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/)
- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
-Notesnook does not support password/PIN protection on the web & desktop apps. However, you can still lock individual notes, and your data is always encrypted in transit and on your device using your master key.
+Notesnook не поддерживает защиту паролем/PIN-кодом на веб-сайте & в настольных приложениях. Однако вы по-прежнему можете блокировать отдельные заметки, и ваши данные всегда зашифрованы при передаче и на вашем устройстве с помощью мастер-ключа.
### Joplin
@@ -113,7 +113,7 @@ Cryptee предлагает 100 МБ хранилища бесплатно, а
### Org-mode
-!!! recommendation
+!!! recommendation "Рекомендация"
{ align=right }
diff --git a/i18n/ru/passwords.md b/i18n/ru/passwords.md
index 5ec8678c..fd2ad876 100644
--- a/i18n/ru/passwords.md
+++ b/i18n/ru/passwords.md
@@ -2,7 +2,7 @@
meta_title: "Лучшие менеджеры паролей для защиты вашей конфиденциальности и безопасности - Privacy Guides"
title: "Менеджеры паролей"
icon: material/form-textbox-password
-description: Менеджеры паролей позволяют безопасно хранить и управлять паролями и другими учетными данными.
+description: Менеджеры паролей позволяют безопасно хранить и управлять не только паролями, но и другими данными аккаунтов.
cover: passwords.png
schema:
-
@@ -52,7 +52,7 @@ schema:
name: Psono
image: /assets/img/password-management/psono.svg
url: https://psono.com
- applicationCategory: Password Manager
+ applicationCategory: Менеджер паролей
operatingSystem:
- Android
- iOS
@@ -67,7 +67,7 @@ schema:
image: /assets/img/password-management/keepassxc.svg
url: https://keepassxc.org/
sameAs: https://en.wikipedia.org/wiki/KeePassXC
- applicationCategory: Password Manager
+ applicationCategory: Менеджер паролей
operatingSystem:
- Windows
- macOS
@@ -82,7 +82,7 @@ schema:
name: KeePassDX
image: /assets/img/password-management/keepassdx.svg
url: https://www.keepassdx.com/
- applicationCategory: Password Manager
+ applicationCategory: Менеджер паролей
operatingSystem: Android
subjectOf:
"@context": http://schema.org
@@ -94,7 +94,7 @@ schema:
name: Strongbox
image: /assets/img/password-management/strongbox.svg
url: https://strongboxsafe.com/
- applicationCategory: Password Manager
+ applicationCategory: Менеджер паролей
operatingSystem: iOS
subjectOf:
"@context": http://schema.org
@@ -106,7 +106,7 @@ schema:
name: gopass
image: /assets/img/password-management/gopass.svg
url: https://www.gopass.pw/
- applicationCategory: Password Manager
+ applicationCategory: Менеджер паролей
operatingSystem:
- Windows
- macOS
@@ -138,7 +138,7 @@ schema:
{ align=right }
- **Bitwarden** - это свободный менеджер паролей с открытым исходным кодом. Он направлен на решение проблем управления паролями для отдельных лиц, команд и организаций. Bitwarden - одно из лучших и самых безопасных решений для хранения всех ваших логинов и паролей с удобной синхронизацией данных между всеми вашими устройствами.
+ **Bitwarden** - это бесплатный менеджер паролей с открытым исходным кодом. Он направлен на решение проблем управления паролями для отдельных лиц, команд и организаций. Bitwarden - одно из лучших и самых безопасных решений для хранения всех ваших логинов и паролей с удобной синхронизацией данных между всеми вашими устройствами.
[:octicons-home-16: Домашняя страница](https://bitwarden.com){ .md-button .md-button--primary }
[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Политика конфиденциальности" }
@@ -175,7 +175,7 @@ Bitwarden также имеет функцию [Bitwarden Send](https://bitwarde
{ align=right }
- **1Password** — это менеджер паролей с акцентом на безопасность и простоту использования, который позволяет хранить пароли, кредитные карты, лицензии на программное обеспечение и любую другую конфиденциальную информацию в надежном цифровом хранилище. Ваши данные хранятся на серверах 1Password за [ежемесячную плату](https://1password.com/ru/sign-up/). 1Password регулярно проходит [независимые проверки на безопасность](https://support.1password.com/security-assessments/) и обеспечивает прекрасную поддержку клиентов. 1Password имеет закрытый исходный код, но безопасность продукта подробно описана в их [вайт пейпере по безопасности](https://1passwordstatic.com/files/security/1password-white-paper.pdf).
+ **1Password** — это менеджер паролей с акцентом на безопасность и простоту использования, который позволяет хранить пароли, кредитные карты, лицензии на программное обеспечение и любую другую конфиденциальную информацию в надежном цифровом хранилище. Ваши данные хранятся на серверах 1Password за [ежемесячную плату](https://1password.com/ru/sign-up/). 1Password регулярно проходит [независимые проверки на безопасность](https://support.1password.com/security-assessments/) и обеспечивает прекрасную поддержку клиентов. 1Password имеет закрытый исходный код, но безопасность продукта подробно описана в их [технической документации по безопасности](https://1passwordstatic.com/files/security/1password-white-paper.pdf).
[:octicons-home-16: Домашняя страница](https://1password.com/){ .md-button .md-button--primary }
[:octicons-eye-16:](https://1password.com/ru/legal/privacy/){ .card-link title="Политика конфиденциальности" }
@@ -222,7 +222,7 @@ Psono предоставляет подробную документацию п
**Обратите внимание, что у нас нет связей ни с одним из проектов, которые мы рекомендуем.** В дополнение к [нашим стандартным критериям](about/criteria.md)мы разработали четкий набор требований, позволяющий нам давать объективные рекомендации. Мы рекомендуем вам ознакомиться с этим списком, прежде чем выбрать программу, и провести самостоятельное исследование, чтобы убедиться, что это правильный выбор для вас.
-!!! Для уменьшения этой угрозы рассмотрите возможность самостоятельного хостинга.
+!!! example "Это новый раздел"
Мы пока работаем над установлением определенных критериев для каждого раздела нашего сайта, и они могут поменяться в будущем. Если у вас есть вопросы по поводу наших критериев, пожалуйста, [задавайте их на нашем форуме](https://discuss.privacyguides.net/latest) и не думайте, что мы не учли что-то при составлении наших рекомендаций, если это не указано здесь. Мы учитываем и обсуждаем много факторов, перед тем как рекомендовать какой-то проект, и документирование каждого из них ещё не завершено.
diff --git a/i18n/ru/tools.md b/i18n/ru/tools.md
index 5856dfdd..19fe318e 100644
--- a/i18n/ru/tools.md
+++ b/i18n/ru/tools.md
@@ -313,11 +313,11 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
diff --git a/i18n/sv/basics/why-privacy-matters.md b/i18n/sv/basics/why-privacy-matters.md
index eddecc9e..69a3ae4f 100644
--- a/i18n/sv/basics/why-privacy-matters.md
+++ b/i18n/sv/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/sv/tools.md b/i18n/sv/tools.md
index 4f56f07c..dcddd67f 100644
--- a/i18n/sv/tools.md
+++ b/i18n/sv/tools.md
@@ -301,8 +301,8 @@ Vi [rekommenderar](dns.md#recommended-providers) ett antal krypterade DNS-servra
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/tr/basics/why-privacy-matters.md b/i18n/tr/basics/why-privacy-matters.md
index d37ffac8..5bddf531 100644
--- a/i18n/tr/basics/why-privacy-matters.md
+++ b/i18n/tr/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/tr/tools.md b/i18n/tr/tools.md
index eb912f85..88a5e0d8 100644
--- a/i18n/tr/tools.md
+++ b/i18n/tr/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/uk/basics/why-privacy-matters.md b/i18n/uk/basics/why-privacy-matters.md
index b974e07d..737d76c1 100644
--- a/i18n/uk/basics/why-privacy-matters.md
+++ b/i18n/uk/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/uk/tools.md b/i18n/uk/tools.md
index 503bfd89..53768939 100644
--- a/i18n/uk/tools.md
+++ b/i18n/uk/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/vi/basics/why-privacy-matters.md b/i18n/vi/basics/why-privacy-matters.md
index eddecc9e..69a3ae4f 100644
--- a/i18n/vi/basics/why-privacy-matters.md
+++ b/i18n/vi/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/vi/tools.md b/i18n/vi/tools.md
index 7ad21b79..cb05ecbe 100644
--- a/i18n/vi/tools.md
+++ b/i18n/vi/tools.md
@@ -301,8 +301,8 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/zh-Hant/basics/why-privacy-matters.md b/i18n/zh-Hant/basics/why-privacy-matters.md
index 6dd40342..bdc1beb2 100644
--- a/i18n/zh-Hant/basics/why-privacy-matters.md
+++ b/i18n/zh-Hant/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-這些概念都有重疊,也有可能將這些概念任意組合。 對大多數人來說,最佳狀態是這三個概念都重疊的時候。 然而,實現起來比許多人原本想的更困難。 有時候必須在某些部份讓步,這也沒關係。 這就是**威脅建模**發揮作用之處,讓您可以就使用[軟體和服務](../tools.md) 做出明智決定 。
+這些概念都有重疊,也有可能將這些概念任意組合。 對大多數人來說,最佳狀態是這三個概念都重疊的時候。 However, it's trickier to achieve than many initially believe. 有時候必須在某些部份讓步,這也沒關係。 這就是**威脅建模**發揮作用之處,讓您可以就使用[軟體和服務](../tools.md) 做出明智決定 。
[:material-book-outline: 了解更多威脅模型](threat-modeling.md ""){.md-button}
diff --git a/i18n/zh-Hant/tools.md b/i18n/zh-Hant/tools.md
index f977807a..8734ab35 100644
--- a/i18n/zh-Hant/tools.md
+++ b/i18n/zh-Hant/tools.md
@@ -301,8 +301,8 @@ description: Privacy Guides 是最透明和可靠的網站,用於尋找保護
- { .twemoji } [Send](file-sharing.md#send)
- { .twemoji } [OnionShare](file-sharing.md#onionshare)
- { .twemoji } [FreedomBox](file-sharing.md#freedombox)
-- { .twemoji } [Nextcloud (Self-Hostable)](productivity.md#nextcloud)
-- { .twemoji } [Syncthing](file-sharing.md#syncthing)
+- { .twemoji } [Nextcloud (Self-Hostable)](file-sharing.md#nextcloud-client-server)
+- { .twemoji } [Syncthing](file-sharing.md#syncthing-p2p)
diff --git a/i18n/zh/basics/why-privacy-matters.md b/i18n/zh/basics/why-privacy-matters.md
index fcad896a..b7e20ce6 100644
--- a/i18n/zh/basics/why-privacy-matters.md
+++ b/i18n/zh/basics/why-privacy-matters.md
@@ -32,7 +32,7 @@ Anonymity is the ability to act without a persistent identifier. You might achie
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
-All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
+All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's trickier to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}
diff --git a/i18n/zh/tools.md b/i18n/zh/tools.md
index 1a279cd5..bf08db86 100644
--- a/i18n/zh/tools.md
+++ b/i18n/zh/tools.md
@@ -303,12 +303,11 @@ We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers b
diff --git a/includes/abbreviations.es.txt b/includes/abbreviations.es.txt
index a0eb696c..ddaec089 100644
--- a/includes/abbreviations.es.txt
+++ b/includes/abbreviations.es.txt
@@ -52,8 +52,8 @@
*[MEID]: Identificador de Equipo Móvil
*[MFA]: Autenticación de Múltiples Factores
*[NVMe]: Memoria No Volátil Express
-*[NAT]: Network address translation
-*[NAT-PMP]: NAT Port Mapping Protocol
+*[NAT]: Traducción de direcciones de red
+*[NAT-PMP]: NAT Protocolo de Asignación de Puertos
*[NTP]: Protocolo de Tiempo de Red
*[OCI]: Iniciativa de Contenedor Abierto
*[OCSP]: Protocolo del Estado del Certificado de Línea
diff --git a/includes/strings.fa.yml b/includes/strings.fa.yml
index ee45e937..7ed2c861 100644
--- a/includes/strings.fa.yml
+++ b/includes/strings.fa.yml
@@ -27,10 +27,10 @@ config:
light: Switch to light mode
system: Switch to system theme
nav:
- Home: Home
- Knowledge Base: Knowledge Base
+ Home: خانه
+ Knowledge Base: پایگاه دانش
Technology Essentials: Technology Essentials
- Operating Systems: Operating Systems
+ Operating Systems: سیستم عامل
Advanced Topics: Advanced Topics
Recommendations: Recommendations
Internet Browsing: Internet Browsing