1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-08-25 07:39:15 +00:00

New Crowdin translations by GitHub Action

This commit is contained in:
Crowdin Bot
2023-06-20 04:04:21 +00:00
parent b2ef40c8c6
commit ead1329395
91 changed files with 834 additions and 848 deletions

View File

@@ -25,7 +25,7 @@ Desktop platforms also often have a password manager which may help you recover
- iOS [Passwords](https://support.apple.com/en-us/HT211146)
- Linux, Gnome Keyring, which can be accessed through [Seahorse](https://help.gnome.org/users/seahorse/stable/passwords-view.html.en) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager)
### Provedores de VPN
### E-mail
If you didn't use a password manager in the past or you think you have accounts that were never added to your password manager, another option is to search the email account(s) that you believe you signed up on. On your email client, search for keywords such as "verify" or "welcome." Almost every time you make an online account, the service will send a verification link or an introductory message to your email. This can be a good way to find old, forgotten accounts.

View File

@@ -90,7 +90,7 @@ To sum it up, diceware passphrases are your best option when you need something
## Storing Passwords
### Redes Auto-Contidas
### Gestores de palavras-passe
The best way to store your passwords is by using a password manager. They allow you to store your passwords in a file or in the cloud and protect them with a single master password. That way, you will only have to remember one strong password, which lets you access the rest of them.

View File

@@ -19,20 +19,20 @@ Many people get the concepts of **privacy**, **security**, and **anonymity** con
**Segurança**
:
Security is the ability to trust the applications you use—that the parties involved are who they say they are—and keep those applications safe. In the context of browsing the web, for example, security can be provided by HTTPS certificates.
A segurança é a capacidade de confiar nas aplicações que utiliza - que são o que as partes envolvidas dizem ser - e de manter essas aplicações seguras. No contexto da navegação Web, por exemplo, a segurança pode ser fornecida por certificados HTTPS.
:
Certificates prove you are talking directly to the website you're visiting, and keep attackers on your network from reading or modifying the data sent to or from the website.
Os certificados permitem a certeza de que está a falar diretamente com o site que está a visitar e impedem que os atacantes na sua rede leiam ou modifiquem os dados enviados para ou a partir do site.
**Anonymity**
:
Anonymity is the ability to act without a persistent identifier. You might achieve this online with [Tor](../tor.md), which allows you to browse the internet with a random IP address and network connection instead of your own.
O anonimato é a capacidade de agir sem um identificador persistente. Pode obter essa privacidade online com o browser [Tor](../tor.md), que lhe permite navegar na Internet com um endereço IP e uma ligação de rede aleatórios, que substituem os seus.
:
**Pseudonymity** is a similar concept, but it allows you to have a persistent identifier without it being tied to your real identity. If everybody knows you as `@GamerGuy12` online, but nobody knows your real name, that is your pseudonym.
O **Pseudonimato** é um conceito semelhante, e permite-lhe usar um identificador persistente sem ligação à sua identidade real. Se todos o conhecerem como `@GamerGuy12` online, mas ninguém souber o seu nome verdadeiro, esse será o seu pseudónimo.
All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. However, it's tricker to achieve than many initially believe. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
All of these concepts overlap, but it is possible to have any combination of these. The sweet spot for most people is when all three of these concepts overlap. No entanto, é mais difícil de conseguir do que à partida se poderia pensar. Sometimes, you have to compromise on some of these, and that's okay too. This is where **threat modeling** comes into play, allowing you to make informed decisions about the [software and services](../tools.md) you use.
[:material-book-outline: Learn More About Threat Modeling](threat-modeling.md ""){.md-button}